Israeli Airport Security Questioning Re: CRYPTO-GRAM, December 15, 2004

R.A. Hettinga rah at shipwright.com
Wed Dec 15 05:21:04 PST 2004


At 11:41 PM -0600 12/14/04, Bruce Schneier wrote:
>     Security Notes from All Over:  Israeli
>       Airport Security Questioning
>
>
>http://www.schneier.com/blog/archives/2004/12/security_notes.html
>
>In both "Secrets and Lies" and "Beyond Fear," I discuss a key
>difference between attackers and defenders: the ability to concentrate
>resources.  The defender must defend against all possible attacks,
>while the attacker can concentrate his forces on one particular avenue
>of attack.  This precept is fundamental to a lot of security, and can
>be seen very clearly in counterterrorism.  A country is in the position
>of the interior; it must defend itself against all possible terrorist
>attacks: airplane terrorism, chemical bombs, threats at the ports,
>threats through the mails, lone lunatics with automatic weapons,
>assassinations, etc, etc, etc.  The terrorist just needs to find one
>weak spot in the defenses, and exploit that.  This concentration versus
>diffusion of resources is one reason why the defender's job is so much
>harder than the attackers.
>
>This same principle guides security questioning at the Ben Gurion
>Airport in Israel.  In this example, the attacker is the security
>screener and the defender is the terrorist.  (It's important to
>remember that "attacker" and "defender" are not moral labels, but
>tactical ones.  Sometimes the defenders are the good guys and the
>attackers are the bad guys.  In this case, the bad guy is trying to
>defend his cover story against the good guy who is attacking it.)
>
>Security is impressively tight at the airport, and includes a
>potentially lengthy interview by a trained security screener.  The
>screener asks each passenger questions, trying to determine if he's a
>security risk.  But instead of asking different questions -- where do
>you live, what do you do for a living, where were you born -- the
>screener asks questions that follow a storyline:  "Where are you
>going?  Who do you know there?  How did you meet him?  What were you
>doing there?"  And so on.
>
>See the ability to concentrate resources?  The defender -- the
>terrorist trying to sneak aboard the airplane -- needs a cover story
>sufficiently broad to be able to respond to any line of
>questioning.  So he might memorize the answers to several hundred
>questions.  The attacker -- the security screener -- could ask
>questions scattershot, but instead concentrates his questioning along
>one particular line.  The theory is that eventually the defender will
>reach the end of his memorized story, and that the attacker will then
>notice the subtle changes in the defender as he starts to make up answers.

-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





More information about the cypherpunks-legacy mailing list