{"id":5319,"date":"2004-04-07T15:01:50","date_gmt":"2004-04-07T22:01:50","guid":{"rendered":"http:\/\/hill-kleerup.org\/blog\/wp\/2004\/04\/07\/what-we-dont-know-can-hurt-us.html"},"modified":"2004-04-07T15:01:50","modified_gmt":"2004-04-07T22:01:50","slug":"what_we_dont_kn","status":"publish","type":"post","link":"https:\/\/hill-kleerup.org\/blog\/2004\/04\/07\/what_we_dont_kn.html","title":{"rendered":"What we don&#8217;t know <i>can <\/i>hurt us"},"content":{"rendered":"<p>Here&#8217;s a long and fascinating article about something I touched on briefly <a href=\"https:\/\/www.hill-kleerup.org\/blog\/2004\/04\/06\/no_fly.html\">yesterday<\/a>, the tension between <a title=\"City Journal Spring 2004 | What We Don\u00e2\u20ac\u2122t Know Can Hurt Us by Heather Mac Donald\" href=\"http:\/\/www.city-journal.org\/html\/14_2_what_we_dont_know.html\">security and privacy<\/a>.  <\/p>\n<p class=\"block\">Immediately after 9\/11, politicians and pundits slammed the Bush administration for failing to \u201cconnect the dots\u201d foreshadowing the attack. What a difference a little amnesia makes. For two years now, left- and right-wing advocates have shot down nearly every proposal to use intelligence more effectively\u2014to connect the dots\u2014as an assault on \u201cprivacy.\u201d Though their facts are often wrong and their arguments specious, they have come to dominate the national security debate virtually without challenge. The consequence has been devastating: just when the country should be unleashing its technological ingenuity to defend against future attacks, scientists stand irresolute, cowed into inaction.<\/p>\n<p>In a sense, the no-budge attitudes of privacy advocates serve a useful purpose &#8212; to keep constraints on what data-based security we use, and thus, potentially, abuse.  That dynamic tension usually serves as useful restraints on governmental power, and drives reforms (as in law suits to create ways to get peoples&#8217; names off of security lists).<\/p>\n<p>The question is, will that useful purpose also lead to preventable further loss of life?  And is that a cost we&#8217;re willing to pay?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s a long and fascinating article about something I touched on briefly yesterday, the tension between security and privacy. Immediately after 9\/11, politicians and pundits slammed the Bush administration for&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_seopress_analysis_target_kw":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[17],"tags":[],"class_list":["post-5319","post","type-post","status-publish","format-standard","hentry","category-homeland-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2686,"url":"https:\/\/hill-kleerup.org\/blog\/2002\/05\/16\/damned_if_you_d.html","url_meta":{"origin":5319,"position":0},"title":"Damned if you do &#8230;","author":"***Dave","date":"Thu 16-May-02 4:58pm","format":false,"excerpt":"Is anyone else amused that the Bush Administration, which has been criticized for issuing overly-vague security warnings to the public since 9-11, is now being criticized (in many cases by...","rel":"","context":"In &quot;Fourth Estate&quot;","block_context":{"text":"Fourth Estate","link":"https:\/\/hill-kleerup.org\/blog\/category\/media\/fourth-estate"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1619,"url":"https:\/\/hill-kleerup.org\/blog\/2001\/12\/03\/geeks_and_spook.html","url_meta":{"origin":5319,"position":1},"title":"Geeks and spooks","author":"***Dave","date":"Mon 3-Dec-01 3:10pm","format":false,"excerpt":"Here's a transcript of Bruce Sterling's speech at \"Global Challenges, Trends and Best Practices in Cryptography,\" the Information System Security and Education Center, Washington, DC, on 20 November. It's a...","rel":"","context":"In &quot;Politics &amp; Law&quot;","block_context":{"text":"Politics &amp; Law","link":"https:\/\/hill-kleerup.org\/blog\/category\/politics-law"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":503,"url":"https:\/\/hill-kleerup.org\/blog\/2003\/04\/07\/guarded_pessimi.html","url_meta":{"origin":5319,"position":2},"title":"Guarded pessimism","author":"***Dave","date":"Mon 7-Apr-03 9:55am","format":false,"excerpt":"Here's are the entertaining results of Privacy International's The Stupid Security Competition They are broken down into short lists of Most Inexplicable, Most Intrusive, Most Counter-Productive, Most Annoying and Most...","rel":"","context":"In &quot;Homeland Security&quot;","block_context":{"text":"Homeland Security","link":"https:\/\/hill-kleerup.org\/blog\/category\/politics-law\/homeland-security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":583,"url":"https:\/\/hill-kleerup.org\/blog\/2001\/09\/14\/modern_risks.html","url_meta":{"origin":5319,"position":3},"title":"Modern RISKS","author":"***Dave","date":"Fri 14-Sep-01 6:56pm","format":false,"excerpt":"For a number of years now, I've subscribed to an e-mail version of comp.risks, RISKS-L. This list\/Usenet site details \"risks to the public in computers and related systems.\" While that...","rel":"","context":"In &quot;Hi-Tech&quot;","block_context":{"text":"Hi-Tech","link":"https:\/\/hill-kleerup.org\/blog\/category\/hi-tech"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":39348,"url":"https:\/\/hill-kleerup.org\/blog\/2013\/10\/23\/security-checks-begin-at-home.html","url_meta":{"origin":5319,"position":4},"title":"Security Checks Begin at Home","author":"***Dave","date":"Wed 23-Oct-13 10:58am","format":false,"excerpt":"Lots of moving parts in this article about TSA's expansion of its security work, but a few noteworthy pieces:1. TSA is now checking out people well in advance of their arriving at the airport, cross-referencing their reservations with a variety federal databases for all sorts of things. The goal is\u2026","rel":"","context":"In &quot;~PlusPosts&quot;","block_context":{"text":"~PlusPosts","link":"https:\/\/hill-kleerup.org\/blog\/category\/blogging\/plusposts"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11860,"url":"https:\/\/hill-kleerup.org\/blog\/2008\/01\/17\/security_and_privacy.html","url_meta":{"origin":5319,"position":5},"title":"Security and Privacy","author":"***Dave","date":"Thu 17-Jan-08 11:04am","format":false,"excerpt":"Les passes on this little gem: US intel chief wants carte blanche to peep all \u2018Net traffic - ArsTechnica.com While short on specifics, the New Yorker piece recognizes that any...","rel":"","context":"In &quot;Homeland Security&quot;","block_context":{"text":"Homeland Security","link":"https:\/\/hill-kleerup.org\/blog\/category\/politics-law\/homeland-security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts\/5319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/comments?post=5319"}],"version-history":[{"count":0,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/posts\/5319\/revisions"}],"wp:attachment":[{"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/media?parent=5319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/categories?post=5319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hill-kleerup.org\/blog\/wp-json\/wp\/v2\/tags?post=5319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}