home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!munnari.oz.au!metro!sequoia!acacia!mgream
- From: M.Gream@uts.EDU.AU (Matthew Gream)
- Newsgroups: comp.security.misc
- Subject: Re: CERT and the Dept. of Justice on keystr
- Date: 16 Dec 1992 10:41:54 GMT
- Organization: University of Technology, Sydney
- Lines: 53
- Message-ID: <1gn15iINN30f@sequoia.ccsd.uts.EDU.AU>
- References: <1992Dec14.203615.14721@lambda.msfc.nasa.gov>
- NNTP-Posting-Host: acacia.ccsd.uts.edu.au
- X-Newsreader: TIN [version 1.1 PL8]
-
- Paul (Cliffy) Palmer (palmer@Trade_Zone.msfc.nasa.gov) wrote:
-
- : Possibly another helpful analogy to understanding the issue of keystroke
- : monitoring is the steps taken by department stores against shoplifters in
- : the U.S. (and possibly elsewhere).
-
- : - Detectors at the exits might be considered as a selective form of
- : auditing. When they go off, they trigger the activity of the
- : appropriate security officers, who usually attempt to handle the
- : situation politely and discreetly. They will monitor you until they
- : can determine whether you have actually tried to do something illegal.
- : Sometimes false alarms do occur and the unfortunate (and usually
- : embarrassed) individual is briefly monitored while they demonstrate
- : their innocence.
-
- : - Some stores that have a high incidence of shoplifting occuring
- : within the dressing rooms post observers to monitor the dressing rooms
- : themselves. Everyone is scrutinized...the observer pays special
- : attention to what goes into the dressing room and what comes out (this
- : may be a little embarassing to the man trying on woman's underwear, but
- : he can always shop elsewhere :-) This could be analogous to monitoring
- : file activity for sensitive files.
-
- : - Most stores employ special security officers who patrol the store
- : looking for suspicious activity. Everyone is scrutinized to some
- : degree, but the trained officer can generally spot the individuals who
- : warrant closer scrutiny. If he judges that a crime may have taken
- : place, he can request that the individual subject their belongings to
- : examination and if they refuse he can detain them until the legal
- : authorities can be summoned (who will examine their belongings!) This
- : is roughly analogous to keystroke monitoring, when performed
- : ethically.
-
- In all these cases, they do not look through your most personal
- belongings, (unlike capturing your keystrokes). In Australia, at least,
- it is policy (though by legislation or a code of ethics developed
- by the retail industry, im not sure), that your _personal_ belongings
- cannot be searched (ie, handbags ).
- Im sure that there are other ways to monitor suspicious activity
- before resorting to keystroke monitoring of _everyone_'s activities,
- and then with sufficient evidence start keystroke monitoring, but even
- this should be selective in what it captures.
- If the police know that a burglar lives in your block of flats, they
- can watch and monitor to their hearts content, but they _cannot_ intrude
- on you unless they have evidence. No matter whether you own your flat
- or you are renting it from the government or you are living on social
- benefits from the government.
-
-
- Matthew.
- -- ___
- Matthew Gream - rfc822-mail: M.Gream@uts.EDU.AU
- ---
-