From: smb@research.att.com
To: gnu@toad.com
Message Hash: 0e36bd94b1f89eb8eb639a320fc8100dc9e48bed03337dc13e34f6857720fb9e
Message ID: <9402280124.AA13270@toad.com>
Reply To: N/A
UTC Datetime: 1994-02-28 01:24:16 UTC
Raw Date: Sun, 27 Feb 94 17:24:16 PST
From: smb@research.att.com
Date: Sun, 27 Feb 94 17:24:16 PST
To: gnu@toad.com
Subject: Re: I have FOIA'd the Clipper Key Escrow databases
Message-ID: <9402280124.AA13270@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Also, giving classified information to unauthorized people is a major
offense. They threatened me with that offense one time, over texts
that I found in a library. If the keys in the database are
classified, they can't give them out to cops. FOIA requires that they
"segregate" any classified part and give me the rest of what's there,
so if they claim that "well, one key isn't classified, but ten or a
thousand of them are classified", I bet we can (1) get some keys out,
(2) challenge this idea in court. In particular, it should be
possible to record the LEAF from a particular chip (whether you own
it, or not!) and send it to them in a FOIA request asking for the
matching unit key. They clearly can map a LEAF to a key (they do it
for cops), and FOIA only requires that you "reasonably describe" the
records you want. Given their mapping capability, the LEAF is a
reasonable description of the record you want.
Good strategy. I still wonder if the decrypted keys are (all) classified,
while the encrypted ones aren't. After all, the local cops' magic decoder
boxes can strip off that layer of encryption (as, of course, anyone
who steals one of those boxes or bribes a local cop).
Anyway, I hope the idea works, or at least drives them a bit crazy...
Return to February 1994
Return to “smb@research.att.com”
1994-02-28 (Sun, 27 Feb 94 17:24:16 PST) - Re: I have FOIA’d the Clipper Key Escrow databases - smb@research.att.com