1998-04-10 - Re: Secure Cell Phones for State

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a417b04618a2e44f7091137ce3a2200ff1c753e37507f35c80a7eb5068d0f486
Message ID: <199804102301.TAA07614@camel7.mindspring.com>
Reply To: N/A
UTC Datetime: 1998-04-10 23:01:55 UTC
Raw Date: Fri, 10 Apr 1998 16:01:55 -0700 (PDT)

Raw message

From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 16:01:55 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Secure Cell Phones for State
Message-ID: <199804102301.TAA07614@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain


Motorola's site is informative (thanks for the pointers and comments), 
and perhaps cannot reveal the detail needed to compare security 
level to other systems in the US and other countries. 

Dave Emery probes the tech questions a bit and I'll go further, with 
Adam Shostack and others, to ask as a citizen why we cannot 
purchase the level of cell phone privacy that our gov and mil folks 
can with our money (a return to the NSA-crippled algo of CMEA 
and CAVE).

There has been some discussion of this on UK Crypto about
the various telco security systems in Europe and the same
critique of a double standard has been made. Cell phone
manufacturers would have a big stake in who gets the best
security to the global public first.

Moreover, as Scientific American points out in its special
section this month, applications of wireless technology are 
rapidly growing for a host of new information distribution,
collection and interactive purposes. The need for security
of this data floating through the spectrum could hardly
be greater, not only for privacy but for prtoection against 
tampering, insertion of disinformation, and a variety of new 
ways to warp data to fit schemes the owners and originators 
never dreamed of. 

Is end to end encryption of the STU-III sort going to be 
needed for all wireless or are there other plans in the works
at TLAs and TIAs?

It would be greatly appreciated if those who may be
tongue-tied by NDA and worse, if we were pointed in the
right direction by, say, semaphore, to the likely places
where we can dig out, say, by FOIA, what we need to 
know about Albright-privileged wireless security.

Finally, are the TAC-2000 units useful for the Secretary's
global travels? If so, are they supported by military networks 
overseas? Or do American officials use a different system
when traveling?

Note: We're commencing a log of this discussion of this 
topic from several lists at:

   http://jya.com/tac-2000.htm






Thread