From: Chris Knight <cknight@crl.com>
To: cypherpunks@toad.com
Message Hash: acdb7a4bba218338ab5f8822e0c2d2441ca7def7d328afdb7a9b8227fc1a70d6
Message ID: <Pine.3.87.9402151505.A20750-0100000@crl.crl.com>
Reply To: <9402151503.AA32096@Hacker2.cpsr.digex.net>
UTC Datetime: 1994-02-15 23:31:45 UTC
Raw Date: Tue, 15 Feb 94 15:31:45 PST
From: Chris Knight <cknight@crl.com>
Date: Tue, 15 Feb 94 15:31:45 PST
To: cypherpunks@toad.com
Subject: A questions of records...
In-Reply-To: <9402151503.AA32096@Hacker2.cpsr.digex.net>
Message-ID: <Pine.3.87.9402151505.A20750-0100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain
Perhaps I haven't been paying attention, and perhaps this question has
been posed, or answered... Still this thought comes to mind.
Assuming that the FBI, SS, NSA, BATF, cops in general & Current Events
all play by the "rules" for obtaining the escrow key in the first place,
what guarantees that they "destroy" their copy at the end of an
investigation?
Suppose John Smith Late Nite BBS is suspected of aiding in the
transmission of copyrighted software. The proper warrants are obtained,
the keys are released, and his BBS is monitored for a set amount of
time. No evidence is found, so the official investigation ends. But
Agent Joe Smarty always gets his board, so he keeps the "keys" to
periodically check the BBS...
Perhaps we need to make known that the Key Escrow proceedure, even at
it's best, only "protects" the privacy of the citizen the first time.
-ck
Return to February 1994
Return to “Dave Banisar <Banisar@washofc.cpsr.org>”