1995-09-13 - Re: GAK/weak crypto rationale?

Header Data

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: Brian Davis <bdavis@thepoint.net>
Message Hash: affbd81322e8e82aca3509f4325a2540c0bde2b2565aa4311d5eb29a06b265c3
Message ID: <9509131628.AA00879@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1995-09-13 16:32:16 UTC
Raw Date: Wed, 13 Sep 95 09:32:16 PDT

Raw message

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Wed, 13 Sep 95 09:32:16 PDT
To: Brian Davis <bdavis@thepoint.net>
Subject: Re: GAK/weak crypto rationale?
Message-ID: <9509131628.AA00879@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain


Brain Davis writes:
[...snip...]
>  Particularly effective were the court-approved video and audio
>  tapes of the Speaker taking a bribe in exchange for certain action
>  on legislation
[...snip...]
>  Wiretaps, hidden microphones, and hidden cameras put corrupt
>  politicians (I know - redundant) out of business.

Encryption does little to protect you from hidden cameras and microphones (or  
informants!).  If you already know your target then you can probably get  
around encryption (sure it's not as simple as a wiretap, but hey, nobody said  
it had to be easy).  Encryption prevents 'fishing expeditions' and  
unauthorized monitoring;  this is what the LEAs don't want to admit.


andrew





Thread