Category Archives: Security

Dr. Crippen Exonerated

Reuters reports that the police convicted Crippen on false evidence:

A team led by John Trestrail, head of the regional poison centre in Grand Rapids, Michigan, took mitochondrial DNA — genetic material passed on through the mother — from a tissue sample from the corpse kept in a London museum.

They then compared it with samples from three of Cora Crippen’s female descendants, found after a 7-year search.

“That body was not Cora Crippen’s,” said David Foran, a forensic biologist at Michigan State University. “We don’t know who that body was or how it got there.”

As I read this I thought about an incident I had to investigate recently.

Business executives, as expected, quickly wanted a summary of events and then to move on in their work. They threw some opinions around and weighed in before the facts were fully known, as if making a decision about general operational risks.

The security team, on the other hand, wanted to study the data and come to a reliable understanding of the threat as well as vulnerabilities before letting the case be closed.

You can guess which one carries more weight in the average corporate environment. Let me try to put it a different way:

If the job is to keep the business processes firing (like pistons in an engine) then reactions will be necessarily oriented to moving things along without delay. If the job is to keep the business running (like avoiding a cliff) then delay might be warranted if danger is ahead.

Why did a team want to research the Crippen case? Curiosity and doubt about the accuracy of conviction, surely, which is also the sort of quality you should seek in security teams who will be faced with incident response and investigation.

Identities and Cemeteries

The AP calls it a “Grave Error“. Apparently two men are being buried in a military cemetery with the same name and same social security number, one a popular family man and the other alone and homeless:

“I’ve got 200,000 people buried here, but I’ve never seen anything like this,” Calverton director Michael Picerno said. “Ninety-nine percent of the time, the family has all the information, all the documentation, so these things never happen.”

Well, 99% of 200,000 is 198,000, so that leaves 2,000 people buried without all the documentation. Seems like a sizeable number.

Officials are exploring several scenarios in trying to solve the mystery.

One is identity theft — the man who died in 2003 could have simply stolen Willie Hayes’ personal information at some point and went to his grave as an impostor.

I guess it is unlikely he stole it after he went to his grave.

Another is that the man in the grave really was named Willie Hayes — and perhaps even a veteran — but his Social Security number and personal information somehow got mixed up with those of the other Willie Hayes.

Somehow? What kind of scenario includes “somehow” as the root-cause?

I have not looked into it but I suppose there is no advantage to identity theft in death except for in the military cemeteries.

Nobel Green Prize, Culture and Security

Interesting study of how security can often be about incentives (the carrot) as much as the penalties (stick):

A Zambian man has won a prestigious Goldman Prize for helping to curb widespread elephant poaching by setting up economic projects for villagers.

Hammerskjoeld Simwinga wins $125,000 for the award, sometimes called the Nobel prize for the environment.

He helped set up bee-keeping and fish-farming projects for people in the North Luangwa valley, where elephant numbers had shown a dramatic fall.

Falling elephants? But seriously, there are some neat cultural details to the story:

Over 70% of loans are made to women and Mr Simwinga says they are the backbone of the programme.

“We deliberately pushed our resources to the womenfolk in the community because we knew that working with the women was the strongest part of persuasion,” he told Reuters news agency.

Local communities were given a grinding mill to earn money but this was withdrawn if elephants were poached in the area.

Brilliant security solutions customized to local conditions. It gives me hope that someone might be able to save others under threat of attack.

US-CERT EBK

US-CERT has released a draft of the “security essential body of knowledge” (EBK).

IT Security Competency Areas (Definitions and Functions)
2.1 Data Security
2.2 Digital Forensics
2.3 Enterprise Continuity
2.4 Incident Management
2.5 IT Security Training and Awareness
2.6 IT Systems Operations and Maintenance
2.7 Network Security and Telecommunications
2.8 Personnel Security
2.9 Physical and Environmental Security
2.10 Procurement
2.11 Regulatory and Standards Compliance
2.12 Risk Management
2.13 Strategic Management
2.14 System and Application Security

Fourteen? Maybe they wanted to differentiate from all the other guides that seem to revolve around a dozen. The authors are requesting comments now.