Ali, Saqib wrote:
> New types of technologies that emerged in 2007 addressed data leakage
> at the endpoint and helped reduce the problem of data simply walking
> out the door. "In five years, we probably won't sell encryption
> software," said Malte Pollman, Utimaco vice president of products, but
> key and other management services for Intel, Seagate and any other
> hardware encryption companies.

So the castle wall will be so high, so thick and so chink free 
that nothing will get out without going through the proper 
gateways with the approval of the guardians, right?

Somehow I just don't believe it. Besides, that is not the only 
way to do serious damage.

What about those who consume the unprotected grain stored in the 
warehouse, the unprotected wine stored in the cellars and the 
unprotected pies cooling on the racks for their own purposes?

Let's posit that corporate infighting for power is going on amid 
the day to day affairs. How could I use data, that does not have 
an in depth defense in place, against my target as I climb the 
corporate ladder? Not being a very experienced corporate 
infighter I don't have a lot of ideas but I am sure they are 
there waiting to be used by those whose ethics got checked at the 
door.

Here is one idea that is strictly dirty pool but might work. 
Access the HR records of your enemies and see where the chinks 
might be in their CV. Go home and research them and their 
relatives. Remembering the old saw about all of us being only a 
generation or so from horse thieves, create rumors and postings 
on the Internet alleging that the reality is that your target had 
a wild youth with drugs, has a cousin up the river for drugs, 
check kiting and they helped them, or whatever might fit into the 
gaps that are present in almost anyone's CV. Add to that one of 
the US Supreme Court Justice's dictum: "He who has not been 
arrested for committing a felony by age 21 is already in jail for 
a misdemeanor, in a hospital or mental institution, or dead." 
(Approx - can't find the exact wording. I think it was either 
Hugo Black or Learned Hand.)

Now spread the word via TOR to all kinds of sites so it can be 
found by Google. Then send an e-mail to HR via TOR telling them 
to look it up on the net. Given the number of urban legends that 
get repeated even though Snopes and other sites debunk them, 
don't you think it might have an effect of your target's career?

There are many examples of this sort of dirty tricks in politics, 
  why would you not expect them inside the corporate LAN?

However if the data were encrypted..., well that would at least 
add one more layer of protection.

Best,

Allen
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to