The Business of Torture

Written by Sam Vaknin


The European Court of Human Rights agreed yesterday - more than two years afterrepparttar applications have been filed - to hear six cases filed by Chechens against Russia. The claimants accuserepparttar 103739 Russian military of torture and indiscriminate killings. The Court has ruled inrepparttar 103740 past againstrepparttar 103741 Russian Federation and awarded assorted plaintiffs thousands of euros per case in compensation.

As awareness of human rights increased, as their definition expanded and as new, often authoritarian polities, resorted to torture and repression - human rights advocates and non-governmental organizations proliferated. It has become a business in its own right: lawyers, consultants, psychologists, therapists, law enforcement agencies, scholars and pundits tirelessly peddle books, seminars, conferences, therapy sessions for victims, court appearances and other services.

Human rights activists target mainly countries and multinationals.

In June 2001,repparttar 103742 International Labor Rights Fund filed a lawsuit on behalf of 11 villagers againstrepparttar 103743 American oil behemoth, ExxonMobile, for "abetting" abuses in Aceh, Indonesia. They alleged thatrepparttar 103744 company providedrepparttar 103745 army with equipment for digging mass graves and helped inrepparttar 103746 construction of interrogation and torture centers.

This past November,repparttar 103747 law firm of Cohen, Milstein, Hausfeld & Toll joined other American and South African law firms in filing a complaint that "seeks to hold businesses responsible for aiding and abettingrepparttar 103748 apartheid regime in South Africa ... forced labor, genocide, extrajudicial killing, torture, sexual assault, and unlawful detention".

Amongrepparttar 103749 accused: "IBM and ICL which providedrepparttar 103750 computers that enabled South Africa to ... controlrepparttar 103751 black South African population. Car manufacturers providedrepparttar 103752 armored vehicles that were used to patrolrepparttar 103753 townships. Arms manufacturers violatedrepparttar 103754 embargoes on sales to South Africa, as didrepparttar 103755 oil companies. The banks providedrepparttar 103756 funding that enabled South Africa to expand its police and security apparatus."

Charges were leveled against Unocal in Myanmar and dozens of other multinationals. Berger & Montague filed, last September, a class action complaint against Royal Dutch Petroleum and Shell Transport. The oil giants are charged with "purchasing ammunition and using ... helicopters and boats and providing logistical support for 'Operation Restore Order in Ogoniland'" which was designed, according torepparttar 103757 law firm, to "terrorizerepparttar 103758 civilian population into ending peaceful protests against Shell's environmentally unsound oil exploration and extraction activities".

The defendants in all these court cases strongly deny any wrongdoing.

But this is merely one facet ofrepparttar 103759 torture business.

Torture implements are produced - mostly inrepparttar 103760 West - and sold openly, frequently to nasty regimes in developing countries and even throughrepparttar 103761 Internet. Hi-tech devices abound: sophisticated electroconvulsive stun guns, painful restraints, truth serums, chemicals such as pepper gas. Export licensing is universally minimal and non-intrusive and completely ignoresrepparttar 103762 technical specifications ofrepparttar 103763 goods (for instance, whether they could be lethal, or merely inflict pain).

Amnesty International andrepparttar 103764 UK-based Omega Foundation, found more than 150 manufacturers of stun guns inrepparttar 103765 USA alone. They face tough competition from Germany (30 companies), Taiwan (19), France (14), South Korea (13), China (12), South Africa (nine), Israel (eight), Mexico (six), Poland (four), Russia (four), Brazil (three), Spain (three) andrepparttar 103766 Czech Republic (two).

Many torture implements pass through "off-shore" supply networks in Austria, Canada, Indonesia, Kuwait, Lebanon, Lithuania, Macedonia, Albania, Russia, Israel,repparttar 103767 Philippines, Romania and Turkey. This helps European Union based companies circumvent legal bans at home. The US government has traditionally turned a blind eye torepparttar 103768 international trading of such gadgets.

Passwords and the Human Factor

Written by Terrence F. Doheny


Passwords andrepparttar Human Factor

Passwords have a strange dual nature. The stronger and saferrepparttar 103738 passwordrepparttar 103739 more likely it will be undermined by human weakness.

It is widely known that passwords arerepparttar 103740 most common means of access control. It is also common knowledge that passwords arerepparttar 103741 easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down or store them on a hand held device, etc. thus destroyingrepparttar 103742 integrity ofrepparttar 103743 password.

The integrity of passwords can also be circumvented through “Social Engineering.” People can unwittingly make grave errors in judgment in situations that they may view as harmless or even helpful. For example, a password shared with a forgetful employee can compromise an entire system. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as a senior executive or help desk employee to obtain that persons password. People have also been duped by callers claiming an emergency, cajoling or even threateningrepparttar 103744 employee's job if a password is not supplied.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee ofrepparttar 103745 enterprise. Management support of this training andrepparttar 103746 security policy is critical to its success. To be effective, training should be repetitive with periodic reviews ofrepparttar 103747 company policy. There can also be frequent reminders, such as banners or other notices regarding password security that appear during logon.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use