From: peb@PROCASE.COM
To: habs@Panix.Com
Message Hash: 62a35a47b345cad564adbad86f6aa1a579c28dd7604c931035391c8411454707
Message ID: <9304212235.AA03841@banff>
Reply To: N/A
UTC Datetime: 1993-04-21 23:07:41 UTC
Raw Date: Wed, 21 Apr 93 16:07:41 PDT
From: peb@PROCASE.COM
Date: Wed, 21 Apr 93 16:07:41 PDT
To: habs@Panix.Com
Subject: Re: The Family Key
Message-ID: <9304212235.AA03841@banff>
MIME-Version: 1.0
Content-Type: text/plain
>From: Harry Shapiro <habs@Panix.Com>
>press release claims that the Clipper
>chip doesn't provide anything more than what Law Enforcement already
>has. That is not true.
I was about to say this myself too, but Hellman already pointed it out.
However, it is worth mentioning for emphasis.
The Family key is known not only to the NSA, but to the FBI with their
black box units. No special protection is given to this key and it
allows the equivalent of Caller-ID *and* Callee-ID over all transmissions
using Clipper regardless of how the calls are routed. This is *much*
cheaper than speaker recognition used in roving wiretaps! Roving wire
taps are given out sparingly, but it seems that Clipper would make the
scanning of huge numbers of calls and saving traffic info the normal
mode of operation.
In my letter to Casa Blanca I mentioned that I noticed this deception
in the NIST press release.
Another feature of the F key is that it could be changed in new runs of
chip making, but evidently, protecting F is not a great concern by
NIST/FBI, et al. The 3, 34 bit pads, if/when the entire system is
entirely compromised, could be changed--in fact they could do it regularly
anyway--they can keep a list of Serial number to pad mappings. This
would prevent the system from entirely being compromised by an outside
[NSA] entity, so it is somewhat robust to that possibility.
Paul E. Baclace
peb@procase.com
Return to April 1993
Return to “peb@PROCASE.COM”
1993-04-21 (Wed, 21 Apr 93 16:07:41 PDT) - Re: The Family Key - peb@PROCASE.COM