Archive for the ‘Business’ Category

Why Conflicts Solve Many Security Problems: About Attacks and Mistakes

Tuesday, November 20th, 2007

One of the most interesting jobs in my career was the management of the Security in a big bank. It was an interesting job but also a very stressful job.

When you are responsible for Security you are always fighting against two forces. The first force is the Outside Attacker. The other force is your Boss.

When “Things Go Terribly Wrong” your Boss will be very angry.

When “Nothing is Happening” he will reduce your budget or he will tell you to stop “boddering people” with all the things you do to “Prevent that Terrible Things will Be Happening”.

People don’t like Security Measures.

One of the most spectaculair activities was “The Simulated Attack“. We paid people to attack our Systems and we hoped we could stop them. I can tell you one thing. They always succeeded! Personnally I am convinced it will be much easier to attack a bank than 10 years ago. I still know “How They Did It” and I know it is almost impossible to prevent “This to Happen”.

If you know a little bit about the way payments are processed the only thing you have to do is to change a software-program. “This” can be done on many levels in the IT-Infrastructure. When you do “this” on a “deep level” you need a lot of technical expertise. You can also do it in a simple way. Just sell yourself as a programmer to a contracter or sub-contracter.

The funny things is that you can also Attack a Bank without the intention to Attack the Bank. Just “Make a Vital Mistake” and Complete Systems Stop Working. Soon I discovered that “Preventing Small Mistakes” was much more important than “Preventing a Big Attack”.

The most important reason is that when somebody wants to Attack a Bank you just cannot stop them without Stopping the Bank.

You need to take so many “Counter-Measures” that everybody (Personel and Customers) is simply stopped in everything they want to do.

One of the people that inspired me the most was Prof.dr. Willem Albert Wagenaar. He showed me that it is almost impossible to prevent mistakes.

When you want to Prevent a Mistake you Have to  Change the System Not the People.

Many Security systems are Symbolic Systems. You are not allowed to exceed a speed-limit when you drive a car. It would be much easier to block the car to exceed the limit.

The only thing you can do is to “design” systems that are resistant to the things “you don’t want to happen”. But Beware of the “Total Blocking Effect”.

A very effective way to do this is to “Create a Conflict”.

When you don’t want somebody to spend money without permission make Two persons responsible for the decision to spend the money. When you want to prevent that your personnel is treated badly make one person responsible for the Care of the personnel and another for the Use of the personnel. When you want High Quality and Speedy Delivery make one person responsible for Quality and the other for Speed.

The most important thing you have to do to make this work is to give them Equal Power. When you don’t do this one of them will become the Slave of the Other. When you give them Equal Power they have to Negociate the Two Conflicting Forces.

A Projectmanager needs a Very Special Expert to reach his goals in time and the Expert is very tired or sick or his father is dying. The  solution is to talk with the Customer and explain the problem to him. Perhaps he wants to postpone the project for a few days.

A bad solution is to waste the Expert (he will make mistakes) or to use an unexperienced employee (he will make mistakes). When they make mistakes the project has to be postponed and the Customer will loose his faith in your competence.

When the Opponents are unable to solve the conflict give a third party (The Wise Judge) the Power to Decide and write down “How He Solved the Conflict”.

This will prevent the next one.

Be Honest to Yourselve and Others

Monday, June 11th, 2007

This afternoon an old friend of mine told me a funny story. He told me that he was treated by a doctor. As a child he could do all kind of tricks like getting out of his body and getting into others and explore them from the inside. He was lying on the coach and suddenly for fun he moved into the doctor and explored him. He found many interesting things about him and his patients. Suddenly he realized he was exploring a very private environment and moved out.

He did not tell me what he found out but let’s suppose he did and later by accident I found out that the doctor was a friend of a friend and for fun I told my friend what I knew and later he told his friend for fun what he heard. What am I trying to show here is that by accident and for fun we get to know a lot about others.

People (Yes Females and Males) are always gossiping so beware of the fact that if you have a secret in the end people will find out.

It is not necessary to use a paranormal ability. People talk, mail, chat, sms, write letters and everything you want to keep secret arrives at a certain moment at the wrong person by accident (Murphy’s law).

Modern technology is making it worse.

You are talking with a friend in the train using your mobile phone and you get into a very private conversation about a deal and you forget you are in the train. Just a few meters behind you somebody is listening and by accident he is of the competition. Bingo. He knows everything and two days later your world falls apart. They have taken it all. When I was driving to Brussels (I was doing lobbying for a big bank) I heard all the private conversations of politicians and their friends about what they were trying to accomplish.

You send a private email to a friend and he sends it to somebody else. Almost nobody uses the so called Internet Ettiquette. You put a very extensive text in your Email (“This message contains confidential information and is intended only for the individual named.”) to prevent this and the person who is sending it to somebody else does not know that he is liable for the consequence.

Or you are using Google Desktop and you don’t know that it is recording all your private chats with your lover and at a certain moment your wife wants to search something and she finds them.

Or worse imagine Google is storing your private chats on their computers and years later You Are Running For President and they phone you. You don’t need Google. All the data of the Internet is stored in the Internet Archive.

Or worse imagine A person called Hitler is taking over power and takes over the archives and you are arrested because you are a threat to them,

Or worse imagine somebody makes a mistake and you are selected as a possible terrorist and you behavior fits the profile and you are arrested and taken to Cuba and they use advanced techniques to find out what you were doing and to stop the pain you confess.

I think you got the message.

Now I want to get back to the beginning.

On April 28 2001 Commander L. R. Bremseth of the United States Navy wrote a private recommendation to the government. It’s called Unconventional Human Intelligence Support: Transcendent and Asymmetric Warfare Implications of Remote Viewing. The document can be found on the Internet.

A citation: “Concerned that a psychical (PSI) gap existed between U.S. and Soviet paranormal research efforts, the CIA sponsored discreet research into paranormal phenomena commencing in 1972. …..Over the succeeding twenty-three years, the U.S. military and intelligence services were actively involved in paranormal research and operations involving a process known as remote viewing. Remote viewing, which produced specialized human intelligence support, served as part of overall military and government organizations’ intelligence collection efforts“.

Remote viewing is what my friend did for fun (getting information by entering a person).

Commander L. R. Bremseth’s advice:

Establish a new, broad-based paranormal research program within a highly selective, military or intra-agency organization, employing the strictest screening procedures used by SRI, CIA, DIA and INSCOM in selecting/identifying remote viewing candidates and support personnel.

Model the new program from the best features of the remote viewing program, but do not limit research to remote viewing alone.

Explore a myriad of phenomena having potential military applications with the goal of developing transcendent and asymmetrical warfare approaches.

We are now 5 years later and research has advanced. I can imagine there must be transcendent wapensystems operational because research-companies like SRI need the money and researchers want to explore deeper and deeper into the human mind and even the human Soul..

Later they wake up (like Oppenheimer) and realize what they have given to the world. I can imagine that also!

Do you want to know more about this subject? Have a look at this website

LINKS

The Document of Bremseth