Steven P. McNicoll wrote:
While they're doing that the other marshal shoots and kills them.
You're assuming secrets staying secret, again.
How did the terrorists identify the marshal?
The usual ways: security leak, observation, information intercept, etc.
These are all the usual ways that generic secrets may be compromised. I'm
sure that someone with knowledge of how the program works would have more
specific ideas.
But *my* knowing how to do this isn't important. What's important is that
nobody with security experience would assume that the secret would stay
secret. They don't.
You keep trusting the secrecy of the secret for your security. Worse, you
ask questions which indicate that someone needs to prove to you that the
secret can be compromised. Security starts by assuming a "failure" (ie.
the secret is out, someone smuggles a weapon aboard, etc.) and addressing
it.
After all, that's precisely the point of the air marshal program: to handle
the case where the perimeter security fails. So what handles the case
where the air marshal program fails?
- Andrew
|