My Photo

Your email address:


Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« The Six Degrees of Kevin Arbitrary | Main | Responsible Innovation: Staying Engaged With the Privacy Community »

May 18, 2006

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Jim Harper

I'm reading this through the filter of the National Security Agency spying program revealed by USA Today the other week. I take it you would argue in favor of secrecy in such programs because this gives the good guys an advantage. This sounds like an argument for security through obscurity, which is a highly debatable security practice.

http://en.wikipedia.org/wiki/Security_through_obscurity

Indeed, your story shows how dangerous it can be. If the Cali cartel knows how you do your intel, but you don't know that they know, they can play you like a fiddle.

Also, I wonder if secrecy is appropriate in the governmental context given that it prevents tuning and honing of such programs through public discussion and debate. I sense from your writings and our past conversations that if the NSA effort to use phone traffic analysis is a pure data mining operation seeking after terrorists that you would argue against it. But you can't because it's secret.

Your thoughts, Mr. Jonas?

cheap eve isk

Indeed, your story shows how dangerous it can be. If the Cali cartel knows how you do your intel, but you don't know that they know, they can play you like a fiddle.

The comments to this entry are closed.