Some of what we do is conducted at night to avoid untimely scrutiny. The disclosure mechanism defaults to making the same message available to friends and foes simultaneously. As a result, secrecy vulnerabilities are virtually eliminated.
No interest in Keystone XL? |
Hattiesburg is a good example. With insufficient data, we cannot be sure what, if any, significance it poses. Using the techniques described is a way to detect intention without unduly jeopardizing parties at either end.
© 2012 Buzz Hill
No comments:
Post a Comment