Security StrategiesThis newsletter is sponsored by SymantecNetwork World's Security Strategies Newsletter, 05/24/07Brennan Center provides resources for security activistsBy M. E. KabayOne of my constant themes to students (and to readers) is that security professionals ought to apply our knowledge of security fundamentals and technology to all aspects of our lives, including our roles as citizens. Here in the United States, one of the areas where I have personally contributed my perspective as a professional in the public sphere is discussions of electronic voting systems. As I have written in previous columns over the years (see for example this, this, and this), I profoundly object to electronic-voting systems that have no independently verifiable audit trail; I’ve testified to that effect before the Vermont Senate, in public meetings on the issue, and in briefings presented to the office of the secretary of state of Vermont.
On this theme of public involvement, I want to draw readers’ attention to an excellent resource that touches on many aspects close to our professional interests: the Brennan Center for Justice of the New York University School of Law. The Center has many areas of possible interest, including: - Access to Justice Readers of this column may be particularly interested in the resources in the three sections I have marked with an asterisk. On the “Liberty & National Security” page the Center has links to many valuable documents discussing security implications of issues such as the abrogation of habeas corpus, the implications of unchecked presidential power, reduced independence of the federal courts, increased governmental secrecy, and racial and ethnic profiling. The “Criminal Justice Reforms” section has a number of areas of possible interest to security practitioners, especially those with experience in or ties to law enforcement. Topics where security experts may be particularly interested in contributing their expertise include: * Sentencing reform, where one can read about attempts to “promote rational sentencing approaches through law reform that secures both fairness and safety” and which may help us reduce recidivism and the dangers posed by habitual offenders. * Post-conviction penalties, which examines to what degree offenders should continue to carry the stigmata of their crimes after their sentences are complete. These issues significantly affect our hiring policies and practices. “Voting Rights & Elections” is potentially the most interesting to technically savvy security experts. There’s a comprehensive report available that appeared in October called “The Machinery of Democracy: Voting System Security, Accessibility, Usability, and Cost” that packs in 190 pages of detailed analysis of all aspects of electronic voting systems (watch out for the violently red page 2, which practically burst my eyeballs when I switched past it the first time). I was particularly pleased to see a section entitled “Voting System Vulnerabilities” that defined threat analysis and then went into several pages of details of potential attacks on voting systems. The six security recommendations are interesting and I encourage readers to study them in detail: 1. Conduct Automatic Routine Audit of Paper Records In summary, there’s plenty of material on the Brennan Center’s site for anyone to study. Whether you agree with the Brennan Center’s positions, I hope that some readers will be motivated to get involved in their local, state and national affairs to contribute their intelligence and expertise.
|
Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. Special discount for Network World Security Strategies readers: For a 10% discount on the upcoming INFOSEC Year in Review workshop in Marina Del Ray, Calif., on June 4-5, 2007, use code WNW07 when registering online or by phone. This newsletter is sponsored by SymantecARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment