Scenario: An individual is arrested by the police. It is alleged that individual called high public figures who then used their authority to squash the incident and release said individual.
"A lie is the truth, absent relevant information."
With that said, I'll assume the allegations are true and examine the vulnerabilities of this scenario.
- The scene of the arrest contains information why the individual was arrested, what was said, who arrested him and witnesses. That information can point to a victim or public disturbance.
- The police contain the above information including exact time and reason for arrest.
- The individual's phone. Call logs, phone company logs, contact list.
Those are only 3 vulnerabilities attributed to the individual. Then comes the complex web of vulnerabilities that may connect to him to others through this event.
Containment should be about identifying and mitigating those vulnerabilities.
No comments:
Post a Comment