I'm never sure who to to: and who to cc:...
I been fascinated with coding since I was a kid and I think the keyword referenced is "conceal". Encryption is like having a puzzle placed on the table right in front of you. I think steganography is much preferred by those wishing to communicate in secret. I'm certain there are other techniques the big boys use that we have yet to hear about... Matthew Tallon "Now if the Flintstones have taught us anything, it's that pelicans can be used to mix cement." > -----Original Message----- > From: Meritt James [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, April 30, 2002 2:46 PM > To: Jay D. Dyson > Cc: Davis Don (CPOCEUR); Security-Basics List; > [EMAIL PROTECTED] > Subject: IS is not just IT (was: Re: strong encryption - governments > denyingindividuals the right to use > > > Just a minor nit - that particular method is nowhere near "assured". > That has been the topic of espionage for a few thousand years. > > "Information Systems" security is a LOT more complex than merely > "Information Technology" security. > > Think "spies", don't think "computers"... > > Jim > > "Jay D. Dyson" wrote: > > > Additionally, there is absolutely no evidence that > terrorist- > > supporting nations and/or terrorists themselves are > utilizing cryptography > > to conceal their data. If anything, the al Qaeda network prefers to > > convey all genuinely meaningful data in the only way in > which trust is > > assured: face-to-face communication in meatspace. Thus, even the > > outlawing of crypto for individual use is an exercise in futility. > > -- > James W. Meritt CISSP, CISA > Booz | Allen | Hamilton > phone: (410) 684-6566
