For those that are curious, this is what I’ve been working on lately. I happened to be leaving work on Tuesday when N46IFT took off. I pulled the car over and she floated off towards Mount St. Helens as my eyes quickly looked over her body, stem to stern. Even in the distance I could still identify the distinct features that made her a tanker, especially my part — the Wing Aerial Refueling Pods that graced her tips.
On Tuesday’s flight, the [KC-46] prototype for the first time carried a refueling boom, a rigid tube extended back from the plane’s underside that’s used to pass fuel to an aircraft flying behind and below the tanker. The prototype was also fitted with wing-refueling pods, which are used to refuel aircraft with different in-flight fuel-docking systems that fly behind and to the side of the tanker.
Photo: John D. Parker/Boeing
Jeffrey Goldberg at Agilebits, who make 1Password, has a great primer on why law enforcement back doors are bad for security architecture. The entire article is worth a read, presents a solid yet easily understood technical discussion — but I think it really can be distilled down to this:
Just because something would be useful for law enforcement doesn’t mean that they should have it. There is no doubt that law enforcement would be able to catch more criminals if they weren’t bound by various rules. If they could search any place or anybody any time they wished (instead of being bound by various rules about when they can), they would clearly be able to solve and prevent more crimes. That is just one of many examples of where we deny to law enforcement tools that would obviously be useful to them.
Quite simply, non-tyrannical societies don’t give every power to law enforcement that law enforcement would find useful. Instead we make choices based on a whole complex array of factors. Obviously the value of some power is one factor that plays a role in such a decision, and so it is important to hear from law enforcement about what they would find useful. But that isn’t where the conversation ends, it is where it begins.
Whenever that conversation does takes place, it is essential that all the participants understand the nature of the technology: There are some things that we simply can’t do without deeply undermining the security of the systems that we all rely on to keep us safe.