1993-07-15 - Re: The right to be secure (fwd Computerworld article)

Header Data

From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
To: cypherpunks@toad.com
Message Hash: 29d6908dd9910f2e84fe4d244650ff62645942a5f3b9673922797f07f68c237c
Message ID: <9307150109.AA04795@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1993-07-15 01:51:31 UTC
Raw Date: Wed, 14 Jul 93 18:51:31 PDT

Raw message

From: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
Date: Wed, 14 Jul 93 18:51:31 PDT
To: cypherpunks@toad.com
Subject: Re: The right to be secure (fwd Computerworld article)
Message-ID: <9307150109.AA04795@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text


Paul Ferguson sent out a copy of a ComputerWorld article "The right to be secure"
(ComputerWorld, Volume 27, Number 28, July 12, 1993, page 28, James Daly),
which had NIST/NSA Q&A on Clipper.   A couple things were mildly interesting
(assertion that use of escrow products would be voluntary (if we can trust them)),
but one was complex and nasty:
   To obtain the key needed to unlock the encryption, law
   enforcement must present evidence of its authority for a key,
   typically a court order, to both key escrow authorities.
   ^^^^^^^^^^^^^^^^^^^^^^^^
   Finally, the system will be designed to ensure that law
   enforcement destroys the keys it receives when its authority
   to conduct the electronic surveillance has expired.
 
"Typically", of course, means "not always", and it's coupled with the phrase
"establishment of procedures by the attorney general for the access of the keys"
in a previous answer, which means that anything the attorney general wants,
he can get.  It also suggests that keys *can* be kept longer than court
orders permit if the attorney general wants.

			Bill Stewart




Thread