From: Michael Handler <grendel@netaxs.com>
To: Jim choate <ravage@bga.com>
Message Hash: 30224e96c4051b465460dce25c9693f9f5bfa7785ba9d063b464661ccb12451a
Message ID: <Pine.3.89.9407011532.A929-0100000@unix2.netaxs.com>
Reply To: <199407011815.NAA21951@zoom.bga.com>
UTC Datetime: 1994-07-01 19:45:31 UTC
Raw Date: Fri, 1 Jul 94 12:45:31 PDT
From: Michael Handler <grendel@netaxs.com>
Date: Fri, 1 Jul 94 12:45:31 PDT
To: Jim choate <ravage@bga.com>
Subject: Re: Devil's Advocate (again)
In-Reply-To: <199407011815.NAA21951@zoom.bga.com>
Message-ID: <Pine.3.89.9407011532.A929-0100000@unix2.netaxs.com>
MIME-Version: 1.0
Content-Type: text/plain
On Fri, 1 Jul 1994, Jim choate wrote:
> > There are a number of good ways to breach modern cryptography without
> > torture. They include:
> >
> > Van Eck (Tempest) monitoring.
> > Sodium pentathol & its more modern cousins.
> >
> I believe this is considered torture in the US.
>
> > Bribery.
> > Blackmail.
>
> Both of these are great but any evidence is inadmissable in court and
> therefore of no use to a prosecutor.
Do you think the NSA cares either about the majority of US laws
or the admissibility of evidence? If they want your key badly enough,
they will get it, and in all probability will have no compunctions
against any of those methods.
--------------------------------------------------------------------------
Michael Brandt Handler <grendel@netaxs.com>
Philadelphia, PA <mh7p+@andrew.cmu.edu>
Currently at CMU, Pittsburgh, PA PGP v2.6 public key on request
Boycott Canter & Siegel <<NSA>> 1984: We're Behind Schedule
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”