<jats:p>Why it is difficult---but essential---to monitor the effectiveness of security technologies.</jats:p>