From owner-freebsd-chat@FreeBSD.ORG Tue Jan 6 17:14:56 2004 Return-Path: Delivered-To: freebsd-chat@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1894216A4CE for ; Tue, 6 Jan 2004 17:14:56 -0800 (PST) Received: from vhost109.his.com (vhost109.his.com [216.194.225.101]) by mx1.FreeBSD.org (Postfix) with ESMTP id 54DB443D46 for ; Tue, 6 Jan 2004 17:14:53 -0800 (PST) (envelope-from brad.knowles@skynet.be) Received: from [10.0.1.4] (localhost.his.com [127.0.0.1]) by vhost109.his.com (8.12.6p3/8.12.3) with ESMTP id i071Elxe090775; Tue, 6 Jan 2004 20:14:49 -0500 (EST) (envelope-from brad.knowles@skynet.be) Mime-Version: 1.0 X-Sender: bs663385@pop.skynet.be Message-Id: In-Reply-To: <20040107001001.GA65133@kosmos.my.net> References: <20040106202408.GC63867@kosmos.my.net> <20040106233751.A32387-100000@haldjas.folklore.ee> <20040107001001.GA65133@kosmos.my.net> Date: Wed, 7 Jan 2004 02:12:48 +0100 To: Allan Bowhill From: Brad Knowles Content-Type: text/plain; charset="us-ascii" ; format="flowed" cc: freebsd-chat@freebsd.org Subject: Re: Personal patches X-BeenThere: freebsd-chat@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Non technical items related to the community List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Jan 2004 01:14:56 -0000 At 4:10 PM -0800 2004/01/06, Allan Bowhill wrote: > How so? There is nothing illegitmate, arbitrary, illegal, secret or > repressive about requiring fingerprints and photos of visitors who come > across our international borders. It is necessary record-keeping. Why not just torture them until they confess their obvious crimes? > {Personally I hope genetic fingerprinting ultimately replaces this > system. This method of identification has proven indispensable in > catching criminals who would otherwise have gone unnoticed. It works. Have you ever heard of "contamination" or "computer error"? What about outright abuse of the system? We computer types should understand the concept of "garbage-in, garbage-out", as well as the concept of "no computer is infallible". > Again, why should we trust? I see. Obviously all extranationals are criminals, so why don't we just nuke them all out of existence and solve the problem? > No organization (or nation) with plenty to lose will base it's practices > on institutionalized trust. It's always institutionalized mistrust that > makes it possible to conduct business. Like with banks. This says volumes for how little you actually understand security. The biggest crimes are always committed by insiders. You or I would be unlikely to steal thousands of dollars from a bank, and totally unable to steal billions of dollars from a bank, but for insiders it could be very easy. Indeed, for them the larger the numbers, the easier they are to hide. Or haven't you heard of Long Term Capital Management? > The point is to identify and catch people posing as travelers who > are known to be terrorists, or associated with terrorism. If the > system helps law enforcement catch other people on the lam, then > more power to it. They don't freakin' speak the bloody language of the people they are claiming to be terrorists. They can't even properly spell the names of the supposed terrorists. If they think that every "Mohammed" is a criminal, let's see them put every "Mr. Smith" in jail, or every Chang in China. Let them start spelling the names properly. Let them start understanding the language. Let them figure out that Mohammed ibn Saud (or whatever) is about as common a name as "Fred Smith", and the name alone is far from enough information to tell you whether a particular person may or may not be a supposed terrorist. Or do you really want to turn this into a GATTACA, or maybe 1984? -- Brad Knowles, "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania. GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+ !w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++) tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)