home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!sdd.hp.com!elroy.jpl.nasa.gov!lambda.msfc.nasa.gov!news
- From: palmer@Trade_Zone.msfc.nasa.gov (Paul (Cliffy) Palmer)
- Subject: Re: CERT and the Dept. of Justice on keystr
- Message-ID: <1992Dec14.203615.14721@lambda.msfc.nasa.gov>
- Sender: news@lambda.msfc.nasa.gov (Newsmaster)
- Nntp-Posting-Host: isabella.msfc.nasa.gov
- Reply-To: palmer@Trade_Zone.msfc.nasa.gov
- Organization: New Technology, Inc.
- References: <1992Dec14.180915.13795@cc.ic.ac.uk>
- Date: Mon, 14 Dec 1992 20:36:15 GMT
- Lines: 34
-
- Possibly another helpful analogy to understanding the issue of keystroke
- monitoring is the steps taken by department stores against shoplifters in
- the U.S. (and possibly elsewhere).
-
- - Detectors at the exits might be considered as a selective form of
- auditing. When they go off, they trigger the activity of the
- appropriate security officers, who usually attempt to handle the
- situation politely and discreetly. They will monitor you until they
- can determine whether you have actually tried to do something illegal.
- Sometimes false alarms do occur and the unfortunate (and usually
- embarrassed) individual is briefly monitored while they demonstrate
- their innocence.
-
- - Some stores that have a high incidence of shoplifting occuring
- within the dressing rooms post observers to monitor the dressing rooms
- themselves. Everyone is scrutinized...the observer pays special
- attention to what goes into the dressing room and what comes out (this
- may be a little embarassing to the man trying on woman's underwear, but
- he can always shop elsewhere :-) This could be analogous to monitoring
- file activity for sensitive files.
-
- - Most stores employ special security officers who patrol the store
- looking for suspicious activity. Everyone is scrutinized to some
- degree, but the trained officer can generally spot the individuals who
- warrant closer scrutiny. If he judges that a crime may have taken
- place, he can request that the individual subject their belongings to
- examination and if they refuse he can detain them until the legal
- authorities can be summoned (who will examine their belongings!) This
- is roughly analogous to keystroke monitoring, when performed
- ethically.
-
- ---
- Paul (Cliffy) Palmer
-
-