Newsgroups: sci.electronics
Path: utzoo!utgpu!news-server.csri.toronto.edu!rpi!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!cunixf.cc.columbia.edu!cunixa.cc.columbia.edu!cy5
From: cy5@cunixa.cc.columbia.edu (Conway Yee)
Subject: Re: Library anti-theft walk-thru device...????
Message-ID: <1991May14.155250.25003@cunixf.cc.columbia.edu>
Sender: usenet@cunixf.cc.columbia.edu (The Network News)
Nntp-Posting-Host: cunixa.cc.columbia.edu
Reply-To: cy5@cunixa.cc.columbia.edu (Conway Yee)
Organization: Columbia University
References: <1991May13.124937.4956@e2big.mko.dec.com> <1991May14.152521.7935@hubcap.clemson.edu>
Distribution: usa
Date: Tue, 14 May 1991 15:52:50 GMT

In article rbrink@hubcap.clemson.edu (Rick Brink) writes:
>
>There are 2 distinctly different types of systems.  One has active components
>in the books, the other has a passive component in the book.  It depends on
>which security fairy godmother talked to the business, as to which type of
>system they chose.  Both can work very well, when deligently installed and
>serviced.  As has been mentioned, may places don't have the patience to get
>it working correctly.  Many environmental things can and do affect the
>sensitivity of the detectors. 3M's system (ours) works well for us.  We keep
>it on, and we test it daily.  Of course, with all the little hints and direct
>information presented in discussions here, there are now thousands of people
>who know how to beat it.  But I hope they are understanding when they visit 
>their local library, and after searching for a reference that is crutial to
>their research, are told that the book is missing from the collection.  You
>help crooks steal, and eventally they will steal from YOU.

Ah, yet another advocate of security by obscurity!  This has shown not to
be incredibly effective.  You should always assume that "the enemy" has
general knowledge of your security or crypto system.  If a system can be
broken, it will be broken.  One of the effects of security by obscurity
is to promote complacency.  Bug fixes do not get installed (because nobody
knows about the bug), propagation of bug fixes is hindered, and discoveries
of bugs are hindered.  Remember, "the enemy" is not hindered by such policies.
Frequently, when a bug is uncovered, word of mouth spreads rather rapidly.

					Conway Yee, N2JWQ
yee@ming.mipg.upenn.edu    (preferred)             231 S. Melville St.
cy5@cunixa.cc.columbia.edu (forwarded to above)    Philadelphia, Pa 19139
yee@bnlx26.nsls.bnl.gov    (rarely checked)        (215) 386-1312
