1993-11-18 - The Republic of Desire (anonymous organizations)

Header Data

From: “Alan (Gesture Man) Wexelblat” <wex@media.mit.edu>
To: cfrye@ciis.mitre.org
Message Hash: c63936e57846aff77c0d0dae8b01a361f0a491fad5544247164304c914b368b6
Message ID: <9311181704.AA21053@media.mit.edu>
Reply To: <9311181554.AA05033@ciis.mitre.org>
UTC Datetime: 1993-11-18 17:06:29 UTC
Raw Date: Thu, 18 Nov 93 09:06:29 PST

Raw message

From: "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Date: Thu, 18 Nov 93 09:06:29 PST
To: cfrye@ciis.mitre.org
Subject: The Republic of Desire (anonymous organizations)
In-Reply-To: <9311181554.AA05033@ciis.mitre.org>
Message-ID: <9311181704.AA21053@media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


This is kind of off-topic, but I thought the classic three-person cell was
as follows:

				A
			       / \
			      B - C
			     /     \
			    D       G
			   / \     / \
			  E - F   H - I

where a line shows cell membership.  So A commands a cell of himself, B and
C but knows no one below.  A is either the leader, or is known by one member
above.  B knows D is the leader of another cell, but does not know who E and
F are (or even if they exist).  Similarly for C.

This organization is vulnerable in two ways: any one person can give up
three others; and the chain can be followed (e.g. compromising B can lead to
compromising D and then to E, etc.).  Because information has to flow
between the cells, there is potential for compromise.

I can't think of a way around this problem.  If information flows from B to
E, either B must know of E's existence or non-existence.

--Alan Wexelblat, Reality Hacker, Author, and Cyberspace Bard
Media Lab - Advanced Human Interface Group	wex@media.mit.edu
Voice: 617-258-9168, Pager: 617-945-1842	PUBLIC KEY available by request
Try not to have a good time ... This is supposed to be educational.





Thread