Category Archives: Uncategorized

Everyday Privacy and Security: Buying Age Restricted Products

So, I go into an Exxon, looking to buy a pack of butts. (An evil, nasty habit I am trying to quit, but the demon weed still has its claws in me.) I ask for a pack of what they … Continue reading

Posted in Uncategorized | Leave a comment

Impacted Molars: Pay Hell Gettin’ It Done Edition

Random Eye-tooth:I’ve been reading the Counterinsurgency Manual, and I’m figuring there is some analogue to a corporate approach to minimize the “insider threat.” Extraction:Mr. Loblaw describes a grisly example of privacy abuse in a recent decision du jour, selecting the … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Describing Difficult Procedures

Lately, I’ve been working on my 1972 Alfa Romeo GTV. What I’ve learned about project management seems to evaporate into red mist in my garage. Currently, as part of changing my fuel system from the wonderful yet arcane SPICA mechanical … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Half Baked

What follows are annoying thoughts that have been ground to meaningless gravel in my head for the past month or so. As soon as I think them through, and dismiss them, my brain belches them back up. Committing them to … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Privacy is a Technological Imperative

My seasonal July funk has been working on me and my attitude, but not so much that I can’t find some perverse humor in the slashdot discussion on privacy as a biological imperative. Ms. Sweeney’s correlation of privacy to the … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

The Easy No

From Concurring Opinions, this commentary on a recent New York Times article on Hypercompliance on the HIPAA front. Health care folks have been intimidated into denying access to PHI to people who have legitimate inquiries and a legal right to … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Dog of War or McGriff the Crime Dog?

So, solider or cop? War or Crime? Or both? I ask this question of my own self after reading (and enjoying) Michael C. W. Research’s recent posts on security framed in the context of Clauswitz. Thinking it through, though, I … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

New Concepts in Data, Compliance and Marketing or The Overly Dramatic Truth

Like the rest of the world, I read J. Cline’s article on the upcoming data eclipse while listening to El P’s I’ll Sleep When You’re Dead, which is the best way to read it. J. Cline is prophesyin’ the impending … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Vulnerabilty v. Threat

Jeremiah Grossman’s analysis of the MSNBC stock contest cheat. It seems to me that this sort of flaw would rise to the surface quickly from a threat perspective, but slower from a vulnerability perspective. I’m not sure why though.

Posted in Uncategorized | Tagged , , , | 2 Comments

The Italian Job

Odd ball kidnapping heist documented at MCN and Roadracing World illustrates the danger of the insider beyond the pilfered laptop or unexpired system credentials. Apparently the Alto Evolution World Superbike team “reduced the responsibilities” of Sergio Bertocchi, their erstwhile manager, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment