Somebody Must’ve Thought It Through Maxim: The more important the security application, the less careful and critical thought and research has gone into it.
Comment: Research-based practice is rare in important security applications. For example, while the security of candy and soda vending machines has been carefully analyzed and researched, the security of nuclear materials has not. Perhaps this is because when we have a very important security application, committees, bureaucrats, power grabbers, business managers, and linear/plodding/unimaginative thinkers take over.
Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory