Entries in military (1)

Predatory Encryption and Risk Management

We learned some things this week about the US Predator drone program that has some people appalled and indignant - it is the kind of story that makes news.

A Predator drone is an unmanned aerial vehicle (UAV) used by the United States Air Force both for reconnaissance and for offensive operations. It seems that the video downlink from these drones has never been encrypted and it has been possible for those under surveillance to intercept and view the video feed.

This is the kind of news that makes great headlines. People read about it and slap their foreheads, proclaiming in a righteous voice, "What were they thinking? Head's should roll!" Stuff like that.

Here is an alternative viewpoint: this whole situation could just be a result of acceptable RISK MANAGEMENT practices.

Click to read more ...