What spying questions are the uk press failing to pose, properly?

Spying is compartmentalized by its nature – so spys can spy on each other (including your own side, ex presidents (to be) with an apparently fatuous comprehension of what little the us constitution is actually worth, lawyerly presidents who didn’t have “sex” with “that woman”, camelot  presidents who sleep with movie stars, and presidents who attempt to maintain the compartments by rationalizing about what the meaning of ‘”is” is’). The rediculousness is a function of the need to lie.

Assume the silicon valley ceo hires folks with clearances in order that s/he can disclaim knowledge of “secret ongoings” in the firm – since the ceo has no clearance. This is a typical corporate trick (that the typical board should be looking for). Why not ask about it? Or dont, if you want to keep your board perks (the bribe).

Assume that its a secret that what is “against policy” for the us to do in the us when targeting us persons is not illegal for the uk to do (and share back with the us). The secret is the bilateral agreement to mutually skirt public policy, with the uk receiving reciprocal benefits, including getting the good story line that appears to do other than what is is the intent of the (secret protocols of the) policy. Why not ask about the history of such practices (and the intent to mislead parliament). Forget your knighthood if you do.

Follow the money on the funding of the “semantic web”, and note where most of it came from. Why! Who in the standards setting knew the ulterior motives, or should have known? How deeply involved are engineering groups in “facilitating” spying?

Ask why intel is on the list of firms to receive special attention from the fbi. Goes to the heart of the pc (technical) trust model! Crypto is only as good as the machine doing the computation, remember.


About home_pw

Computer Programmer who often does network administration with focus on security servers. Sometimes plays at slot machine programming.
This entry was posted in coding theory. Bookmark the permalink.