Just a minor nit - that particular method is nowhere near "assured". 
That has been the topic of espionage for a few thousand years.

"Information Systems" security is a LOT more complex than merely
"Information Technology" security.

Think "spies", don't think "computers"...

Jim

"Jay D. Dyson" wrote:

>         Additionally, there is absolutely no evidence that terrorist-
> supporting nations and/or terrorists themselves are utilizing cryptography
> to conceal their data.  If anything, the al Qaeda network prefers to
> convey all genuinely meaningful data in the only way in which trust is
> assured: face-to-face communication in meatspace.  Thus, even the
> outlawing of crypto for individual use is an exercise in futility.

-- 
James W. Meritt CISSP, CISA
Booz | Allen | Hamilton
phone: (410) 684-6566

Reply via email to