1994-02-25 - Re: Clipper

Header Data

From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
To: ebrandt@jarthur.claremont.edu
Message Hash: 441d371212fb76e3fddc0dd48d64d3992308d75cbed17882780d04d5d073e643
Message ID: <9402250016.AA13044@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1994-02-25 00:17:26 UTC
Raw Date: Thu, 24 Feb 94 16:17:26 PST

Raw message

From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
Date: Thu, 24 Feb 94 16:17:26 PST
To: ebrandt@jarthur.claremont.edu
Subject: Re: Clipper
Message-ID: <9402250016.AA13044@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Clipper is currently only rated for non-classified use.
It could be done securely, assuming there aren't any unannounced backdoors,
by simply using chips for which the keys are not escrowed, or are only
held by the military and protected with certain classification levels,
but they'd have to do a couple of things to use it.
The most important is making sure that a secure Clipperphone
is only used to talk to other secure Clipperphones,
and in addition you'd probably want to make sure the users
have some way of knowing they're talking to appropirately cleared users,
since it's sometimes hard to tell if the voice on teh other end of the phone
really has the authorization it claims it does.  
Features like these are built into STU-II and other classified-use approved
phones, but aren't likely to be built into vanilla Clipperphones.
It may be possible to do that with Tessera, though; I'd have to see more
information than they're likely to give out....

	Bill
# Bill Stewart  AT&T Global Information Solutions, aka NCR Corp
# 6870 Koll Center Parkway, Pleasanton CA, 94566 Phone 1-510-484-6204 fax-6399
# email bill.stewart@pleasantonca.ncr.com billstewart@attmail.com
# ViaCrypt PGP Key IDs 384/C2AFCD 1024/9D6465






Thread