ONLY two more days left to christmas Jimbo
 
 
This sort of stuff will only go on for a few more years until the
distributed process and universal namespace sorts of approaches replace
the current paradigms. When that happens losing a laptop will mean nothing
because it won't have the data 'on it' in the conventional sense.


On Sun, 24 Feb 2002, John Young wrote:

> We've noted here the rise in "lost" and "stolen" laptops
> containing sensitive and classified information. First,
> one or two disappeared while a spook was drunk or
> was left behind in a taxi or taken from an unidentified
> location.
>
> Then amazing reports of more losses, the number rising
> quickly, finally with surveys revealing hundreds of laptops
> have been lost by spooks, cops, senior officals, nuclear
> labs, state departments, and so on. Now and then encryption
> is mentioned.
>
> We can see that the lost laptop, and its recent corollary,
> the discovered laptop, has become as useful for disinformation
> as what is being found in newly revealed secret archives
> like those reported today in the Wash Post, "Spies, Lies and
> the Distortion of History:"
>
>
> http://www.washingtonpost.com/wp-dyn/articles/A55522-2002Feb23.html
>
> To be sure, the flood of lost laptops both diminishes the
> credibility of what is on the laptops and increases it. One way
> to increase credibility is to claim files are encrypted.
>
> What we also know is that encrypted files are now a leading
> indicator of credibility, along with the shadowy and enticing
> methods used to decrypt by unidentified parties, and to then
> carefully distribute the decrypted, authenticated thereby,
> if demonized, material.
>
> Whether there is actually sensitive material in the demonized
> files is hard to determine so long as access to the original
> files, and a credible account of how they were comeby is
> not made available. As with the long history of astonishing
> revelations of secrets, lies and videotapes.
>
> Moving to a related topic, is the use of the Internet for
>
> leaking and/or psyopping disinformation, in particular
> the use of honeypots.
>
> Cryptome is occasionally charged with being a honeypot,
> and it could be, wittingly so if we are succesful in putting
> up lurid material to bring in more luridities. A question
> though is what information is being gathered by Cryptome
> honeypot? The access logs, the pattern and content of
> publication, the receipt of hot material, the distribution
> of lies and deceptions? And if these are the profits of the
> honeypot how is the data collection about them being
> done?
>
> We dream of being able to watch the honeypot harvestors
> at work, which accounts for admitting to running a honeypot,
> our lost laptop if you will. This hoary rabbit-running practice,
> you being the rabbit, as we see here with several practitioners,
> carries a Daniel Pearl-like risk. You may well lose your head
> to somebody who believes you are a wolf not merely a
> headgames-player.
>