One physical location. Its where the key “lives’. The ongoing connection to it can not be discovered easily. Of course, this is a single point of vulnerability so it is the highest priority in the operation’s mission.
We have limited resources, especially people, so this path serves the purpose. It has been proven in other venues.
The contents of the Core will remain secure as long as the location is not discovered.
We have limited resources, especially people, so this path serves the purpose. It has been proven in other venues.
The contents of the Core will remain secure as long as the location is not discovered.
© 2015 Buzz Hill
No comments:
Post a Comment