1994-02-15 - A questions of records…

Header Data

From: Chris Knight <cknight@crl.com>
To: cypherpunks@toad.com
Message Hash: acdb7a4bba218338ab5f8822e0c2d2441ca7def7d328afdb7a9b8227fc1a70d6
Message ID: <Pine.3.87.9402151505.A20750-0100000@crl.crl.com>
Reply To: <9402151503.AA32096@Hacker2.cpsr.digex.net>
UTC Datetime: 1994-02-15 23:31:45 UTC
Raw Date: Tue, 15 Feb 94 15:31:45 PST

Raw message

From: Chris Knight <cknight@crl.com>
Date: Tue, 15 Feb 94 15:31:45 PST
To: cypherpunks@toad.com
Subject: A questions of records...
In-Reply-To: <9402151503.AA32096@Hacker2.cpsr.digex.net>
Message-ID: <Pine.3.87.9402151505.A20750-0100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain


  Perhaps I haven't been paying attention, and perhaps this question has 
been posed, or answered...  Still this thought comes to mind.

  Assuming that the FBI, SS, NSA, BATF, cops in general & Current Events 
all play by the "rules" for obtaining the escrow key in the first place, 
what guarantees that they "destroy" their copy at the end of an 
investigation?

  Suppose John Smith Late Nite BBS is suspected of aiding in the 
transmission of copyrighted software.  The proper warrants are obtained, 
the keys are released, and his BBS is monitored for a set amount of 
time.  No evidence is found, so the official investigation ends.  But 
Agent Joe Smarty always gets his board, so he keeps the "keys" to 
periodically check the BBS...  

  Perhaps we need to make known that the Key Escrow proceedure, even at 
it's best, only "protects" the privacy of the citizen the first time.


-ck






Thread