Discussion about this post

User's avatar
Rikard's avatar

I'm going to be boring:

4. Assess cost of 1-3 and preventing/mitigating the event.

Reason being, if the cost of protecting something is greater than its worth, you're doing it wrong.

Example:

You can have your eight-digit code, locked windows, and good security. Then I come along with my coolant spray-can, hammer and chisel, and a hinge-breaker and ignore your locking mechanism. There's not one place I've worked at, schools or other places, that I couldn't jimmie the lock or in other ways gain access in under a minute if prepared - without breaking windows.

Alarms and sensors can be spoofed or disconnected. Yeah, they'll send a car round to check. Maybe reset the alarm.

You think they'll do that the tenth time it goes off in the same night? Nope. They disconnect it and notify the techs, who'll pop around at nineish the next day, at earliest. Unless it's a holiday, then the alarm will be off until next weekday.

Speaking from experience, you need far fewer tries than 10 000. About twenty-thirty will do it, most of the time If:

The keypad has metal keys. Lean in close and breathe on it. Unless it is cleaned every day, fat from the fingertips of anyone entering the code will show up, because your breath will condense differently, giving you 4 numbers (or fewer, if a number occurs more than once in the code).

Your typical locker has an bolt going through the door with a flange fitting into a slot in the side of the locker, right? So, put a 4" metal bar (piece of rebar f.e.) through the lock and twist counter-clockwise; you'll easily turn the entire thing in the door. Takes about 5-10 seconds.

Or, if it's the kind of lockers schools favour for storing students' laptops, just turn the entire thing out from the wall so the back is clear. Most such lockers only have the top and side plates folded over the back plate to keep it in place - unfolding you can do with a metal butter knife, or a proper tool. Then peel the back off.

Sorry, I may have missed your actual point, getting locked in on the wrong stuff maybe, but there's a point to it: the tech is never better than the brain using it.

Expand full comment
LSWCHP's avatar

After 25 years in mission critical military software engineering I needed a change. After a chat with The Boss, I took on a new role aimed at improving our corporate cyber security posture. At the end of that period, our top national domestic security agencies stated that we were worldwide exemplars for cyber security. Far more so than our major banks and government departments, for example.

I was pleased with myself, but along the way had to deal with events such as the employee who, being bored at lunchtime used his best efforts to covertly install a computer game he'd downloaded off the net onto our internal network. This game contained Chinese malware of course, and set off alarms like atom bombs at our network perimeter as soon as it tried to connect to the mothership. He left our employment shortly thereafter.

Then there was the time I had to provide a security lecture to the CEO of one of our smaller suppliers. They had Nigerian malware on their internal network, which intercepted an invoice being prepared. The bad guys changed the payee details to their own bank account, and payment of nearly $100K went to them instead of to the supplier. The content of the lecture was "This is why you didn't get paid. Tough shit. Be more careful in future".

I could go on and on for hours...NorK spooks approaching our staff (and me!!) under the guise of being Brits looking for work etc...

Most civilians have no idea what a fantastically dangerous place the internet is.

Expand full comment
10 more comments...

No posts