Saturday, December 24, 2011

Theory?

"It is quite simple. Many critical functions are being outsourced to private contractors by administrators who are unaware of the security breach implications or are complicit with an agenda that does not track the client's."

"But that is illegal."

"The law is moot if it cannot be enforced meaningfully or, worse yet, the law breaking is not detected."

One solution is to have a technically competent team of 'untouchable' members. If immune to bribery or other corruption and with sufficient resources, such capability would be formidable opposition to electronic predation.

As has been noted here before, authentic personal identity should be the foundation of the group's integrity. False and multiple personas are the antithesis of trust in this context.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

No comments:

Post a Comment