I'm never sure who to to: and who to cc:...

I been fascinated with coding since I was a kid and I think the
keyword
referenced is "conceal".  Encryption is like having a puzzle
placed on
the table right in front of you.  I think steganography is much
preferred by those wishing to communicate in secret.  I'm
certain there
are other techniques the big boys use that we have yet to hear
about...

Matthew Tallon

"Now if the Flintstones have taught us anything,
it's that pelicans can be used to mix cement."


> -----Original Message-----
> From: Meritt James [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, April 30, 2002 2:46 PM
> To: Jay D. Dyson
> Cc: Davis Don (CPOCEUR); Security-Basics List;
> [EMAIL PROTECTED]
> Subject: IS is not just IT (was: Re: strong encryption -
governments
> denyingindividuals the right to use
>
>
> Just a minor nit - that particular method is nowhere near
"assured".
> That has been the topic of espionage for a few thousand years.
>
> "Information Systems" security is a LOT more complex than
merely
> "Information Technology" security.
>
> Think "spies", don't think "computers"...
>
> Jim
>
> "Jay D. Dyson" wrote:
>
> >         Additionally, there is absolutely no evidence that
> terrorist-
> > supporting nations and/or terrorists themselves are
> utilizing cryptography
> > to conceal their data.  If anything, the al Qaeda network
prefers to
> > convey all genuinely meaningful data in the only way in
> which trust is
> > assured: face-to-face communication in meatspace.  Thus,
even the
> > outlawing of crypto for individual use is an exercise in
futility.
>
> --
> James W. Meritt CISSP, CISA
> Booz | Allen | Hamilton
> phone: (410) 684-6566

Reply via email to