Just a minor nit - that particular method is nowhere near "assured". That has been the topic of espionage for a few thousand years.
"Information Systems" security is a LOT more complex than merely "Information Technology" security. Think "spies", don't think "computers"... Jim "Jay D. Dyson" wrote: > Additionally, there is absolutely no evidence that terrorist- > supporting nations and/or terrorists themselves are utilizing cryptography > to conceal their data. If anything, the al Qaeda network prefers to > convey all genuinely meaningful data in the only way in which trust is > assured: face-to-face communication in meatspace. Thus, even the > outlawing of crypto for individual use is an exercise in futility. -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566