From: cme@ellisun.sw.stratus.com (Carl Ellison)
To: cypherpunks@toad.com
Message Hash: 3958041ceec51bfd41431ac358f037d9bb5fbb273727ea4e24a0033c175f49f3
Message ID: <9309201410.AA06972@ellisun.sw.stratus.com>
Reply To: N/A
UTC Datetime: 1993-09-20 14:16:07 UTC
Raw Date: Mon, 20 Sep 93 07:16:07 PDT
From: cme@ellisun.sw.stratus.com (Carl Ellison)
Date: Mon, 20 Sep 93 07:16:07 PDT
To: cypherpunks@toad.com
Subject: Re: KEY ESCROW PROCEDURES
Message-ID: <9309201410.AA06972@ellisun.sw.stratus.com>
MIME-Version: 1.0
Content-Type: text/plain
>From: Mike Godwin <mnemonic@eff.org>
>Message-Id: <199309181851.AA05084@eff.org>
>Subject: Re: KEY ESCROW PROCEDURES
>Date: Sat, 18 Sep 1993 14:51:57 -0400 (EDT)
>
>Carl writes:
>
>> Meanwhile, where is the proof that the key being requested corresponds to
>> a person on whom a wiretap has been ordered?
>
>The authorized key request will normally occur after law-enforcement
>officials have snagged the chip serial number from the LEAF
>(law-enforcement field) of the signal they captured with an authorized
>wiretap.
Mike,
that's the theory but there is no proof that the signal was captured
with an authorized wiretap. For that, the key registration agents have
to trust the law enforcement agency.
If the LE agency can be trusted, there's no need for the
key registration agencies.
Part of the reason for encryption of communications is to guard
against illegal actions by law enforcement agencies.
- Carl
Return to September 1993
Return to “cme@ellisun.sw.stratus.com (Carl Ellison)”
1993-09-20 (Mon, 20 Sep 93 07:16:07 PDT) - Re: KEY ESCROW PROCEDURES - cme@ellisun.sw.stratus.com (Carl Ellison)