Usually, when we do something off the wall like my article and slideshow on L.A. crime scenes and the psychology of security, some readers are left asking what the subject matter has to do with their cyber-based jobs. The short answer is that CSO covers physical as well as cyber security. We spend a lot of time illustrating where the two sides connect. But once in a great while, we deliberately go off the tried-and-true path and focus on something readers might consider whacky. This is one of those times. The truth is that I’ve always had a personal fascination with true crime cases, especially the Manson Murders. Ever since I was a kid and I first saw the 1976 TV movie on the Manson Murders, I've been fascinated. I've read "Helter Skelter," the book by Manson prosecutor Vincent Bugliosi, dozens of times. I own the 1976 and 2004 versions of the film on DVD, along with a documentary called "The Six Degrees of Helter Skelter," where host Scott Michaels, keeper of the popular Findadeath.com site, takes the viewer on a tour of places connected to the case, including Cielo Drive, scene of the Tate murders. Why the fascination with such an awful tragedy? Not because of the brutal nature of the murders. I've seen the crime scene forensic photos, and they made me sick to my stomach. It's really part of my fascination with history. Like it or not, this is a piece of American history. It's a snapshot of everything that went wrong in the 1960s, where a counterculture born of good intentions -- a craving for peace in Vietnam and at home -- lost it's way because there were no rules, no discipline and there was no sobriety. I agree with those who believe the promise of the 1960s died abruptly in the summer of 1969. I'm also fascinated because it shows how easily seemingly stable people can be brainwashed and controlled to the point where they would willingly heed orders to commit the worst of sins. In my mind, this stuff fits the subject of security like a glove. After all, security is largely a game of examining the psychology of criminals who lurk in the physical and cyber worlds and how best to protect our employers, friends and family from their sinister schemes. That said, I knew turning this into a security project would be a stretch. But I decided to see where it took me anyway. The big lesson was that the things you think are there for security are often just there for show. No big revelation there, but it was an interesting journey all the same. Thanks for indulging me. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe