Need-to-know principle

Contents

The need-to-know principle states that sensitive information should be shared only when it is necessary to do so, and only to the extent necessary. This makes repression more difficult by controlling the flow of information through networks to make them more opaque to outsiders and harder to disrupt.

In relation to a planned or past action, the need-to-know principle should be applied in the following ways:

In addition, everyone should stop any violation of the need-to-know principle in conversations. For example, if you hear people talking about their involvement in the action or speculating about the involvement of others, tell them to stop.

When multiple groups of people participate in an action, a coordinating structure that embodies the need-to-know principle is the “spokes council”. In this structure, one or two people from each group are designated to participate in the spokes council, where they meet with the designated people from the other groups. In this way, the groups can coordinate through the spokes council without anyone having to know everyone involved. However, this structure runs the risk of creating “choke-points” of coordination — if one person is the only bridge between two groups, this can create a gate-keeping dynamic, as well as make coordination impossible if that person is arrested by an adversary.

See also:

Techniques addressed by this mitigation

NameDescription
Evidence fabrication

Evidence fabrication is harder to achieve when an adversary has less information about our lives. The need-to-know principle controls the flow of information through networks to make them more opaque to adversaries.

Infiltrators

The need-to-know principle controls the flow of information through networks to make them more opaque and difficult to disrupt. If an infiltrator isn't involved in an action, they shouldn't know who was involved even if it's their own roommate.

Informants

The need-to-know principle controls the flow of information through networks to make them more opaque and difficult to disrupt. If an informant isn't involved in an action, they shouldn't know who was involved even if it's their own roommate.

Network mapping

Gossip that could be used for network mapping should be avoided.