Doomed from the start
A lot of time and money has been spent on location based security technology (firewalls, intrusion detection, etc.) Only recently, however, is the realization slowly dawning that these techniques were doomed from the start and a different approach is needed to solve the problems.