From: Mike Godwin <mnemonic@eff.org>
To: cme@ellisun.sw.stratus.com (Carl Ellison)
Message Hash: b4978b4f4f2cdc01ab14501cf10b2cb72c1f895196a51562b0e1a8436d3a9048
Message ID: <199309181851.AA05084@eff.org>
Reply To: <9309171855.AA00716@ellisun.sw.stratus.com>
UTC Datetime: 1993-09-18 18:55:31 UTC
Raw Date: Sat, 18 Sep 93 11:55:31 PDT
From: Mike Godwin <mnemonic@eff.org>
Date: Sat, 18 Sep 93 11:55:31 PDT
To: cme@ellisun.sw.stratus.com (Carl Ellison)
Subject: Re: KEY ESCROW PROCEDURES
In-Reply-To: <9309171855.AA00716@ellisun.sw.stratus.com>
Message-ID: <199309181851.AA05084@eff.org>
MIME-Version: 1.0
Content-Type: text/plain
Carl writes:
> Meanwhile, where is the proof that the key being requested corresponds to
> a person on whom a wiretap has been ordered?
The authorized key request will normally occur after law-enforcement
officials have snagged the chip serial number from the LEAF
(law-enforcement field) of the signal they captured with an authorized
wiretap.
--Mike
Return to September 1993
Return to “Mike Godwin <mnemonic@eff.org>”