From: “Alan (Gesture Man) Wexelblat” <wex@media.mit.edu>
To: cfrye@ciis.mitre.org
Message Hash: c63936e57846aff77c0d0dae8b01a361f0a491fad5544247164304c914b368b6
Message ID: <9311181704.AA21053@media.mit.edu>
Reply To: <9311181554.AA05033@ciis.mitre.org>
UTC Datetime: 1993-11-18 17:06:29 UTC
Raw Date: Thu, 18 Nov 93 09:06:29 PST
From: "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Date: Thu, 18 Nov 93 09:06:29 PST
To: cfrye@ciis.mitre.org
Subject: The Republic of Desire (anonymous organizations)
In-Reply-To: <9311181554.AA05033@ciis.mitre.org>
Message-ID: <9311181704.AA21053@media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
This is kind of off-topic, but I thought the classic three-person cell was
as follows:
A
/ \
B - C
/ \
D G
/ \ / \
E - F H - I
where a line shows cell membership. So A commands a cell of himself, B and
C but knows no one below. A is either the leader, or is known by one member
above. B knows D is the leader of another cell, but does not know who E and
F are (or even if they exist). Similarly for C.
This organization is vulnerable in two ways: any one person can give up
three others; and the chain can be followed (e.g. compromising B can lead to
compromising D and then to E, etc.). Because information has to flow
between the cells, there is potential for compromise.
I can't think of a way around this problem. If information flows from B to
E, either B must know of E's existence or non-existence.
--Alan Wexelblat, Reality Hacker, Author, and Cyberspace Bard
Media Lab - Advanced Human Interface Group wex@media.mit.edu
Voice: 617-258-9168, Pager: 617-945-1842 PUBLIC KEY available by request
Try not to have a good time ... This is supposed to be educational.
Return to November 1993
Return to “Chester Edelman <coe@panix.com>”