From: Jim choate <ravage@bga.com>
To: adam@bwh.harvard.edu (Adam Shostack)
Message Hash: 45ca63996cae7f597c9afbcf97544390c5622eab147a5ddc9e202423162fcbd9
Message ID: <199407011815.NAA21951@zoom.bga.com>
Reply To: <199407011746.NAA13073@duke.bwh.harvard.edu>
UTC Datetime: 1994-07-01 18:15:45 UTC
Raw Date: Fri, 1 Jul 94 11:15:45 PDT
From: Jim choate <ravage@bga.com>
Date: Fri, 1 Jul 94 11:15:45 PDT
To: adam@bwh.harvard.edu (Adam Shostack)
Subject: Re: Devil's Advocate (again)
In-Reply-To: <199407011746.NAA13073@duke.bwh.harvard.edu>
Message-ID: <199407011815.NAA21951@zoom.bga.com>
MIME-Version: 1.0
Content-Type: text
>
> There are a number of good ways to breach modern cryptography without
> torture. They include:
>
> Van Eck (Tempest) monitoring.
> Sodium pentathol & its more modern cousins.
>
I believe this is considered torture in the US.
Bribery.
> Blackmail.
>
Both of these are great but any evidence is inadmissable in court and
therefore of no use to a prosecutor.
> --
> Adam Shostack adam@bwh.harvard.edu
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”