1994-02-25 - RE: Clipper Death Threat

Header Data

From: “LYLE, DAVID R. COMPEX” <lyled@pentagon-emh9.army.mil>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: f332ced1df82617a30b778704a62fee1f525becc0feb7ab2150819e16b5b6069
Message ID: <2D6E4545@Pentagon-EMH9.army.mil>
Reply To: N/A
UTC Datetime: 1994-02-25 15:35:05 UTC
Raw Date: Fri, 25 Feb 94 07:35:05 PST

Raw message

From: "LYLE, DAVID R. COMPEX" <lyled@pentagon-emh9.army.mil>
Date: Fri, 25 Feb 94 07:35:05 PST
To: cypherpunks <cypherpunks@toad.com>
Subject: RE: Clipper Death Threat
Message-ID: <2D6E4545@Pentagon-EMH9.army.mil>
MIME-Version: 1.0
Content-Type: text/plain





 -->  The first hurdle I can see now is the eye-glaze factor for John Q. 
Public.
 -->Where can  I  find  more layman-oriented  information sources?   Like 
 these
 -->sorts:
 -->
 -->1.  Simple  explanation of cryptography, *what* not  how. Maybe  a little 
on
 -->public/private keys.
 -->
 -->2.   Why laymen, corporations, etc.  need access to strong encryption. 
 Good
 -->analogies are  needed here.  (e.g., wireless  telecom is easily 
compromised,
 -->etc.)
 -->

Corporate espionage is very common in todays business world.  This is very 
well known and documented in the press.  If I was the head of a corporation, 
I would be VERY interested in encryption technology in order to safeguard my 
corporate interests.

For individuals, it's sorta like the difference between standard snail mail 
envelopes and post cards.  The post card can be read by anyone whom the card 
passes, while an envelope makes the message inside somewhat private.  (I.E. 
it takes law enforcement to legally open the message)  While this only works 
on a very basic level to explain to a lay-person, perhaps it is a way for 
them to begin to understand.

Another way of looking at it is the difference between private phone lines 
like we have today (yes, I know, not TRUELY private, but you get the point) 
and party lines of old.


 -->3.  Why we have a right to strong encryption.

Actually, our constitution does not say we have the right to private 
communication.  It would be nice, but it's not a right.

 -->
 -->4.  How the Clipper implementation infringes on our rights.

See #3 above.  Clipper is just plain a bad idea.  Unfortunately, I suspect 
everyone's a bit late on this one.  Newspapers have already written about a 
huge purchase by several large government agencies of technology with the 
chip in place.

Funny thing is, it may end up being only our govenment who's security is 
comprimised by this action, since no one else wants anything to do with it. 
 Especially after the current mole uncovering, I begin to wonder if it's yet 
more moles who are pushing this technology forward.  After all, if there is 
a backdoor, you KNOW every country in the world will try to get in.  Of 
course, this defeats the entire purpose of security.







Thread