1994-07-01 - Re: Devil’s Advocate (again)

Header Data

From: Jim choate <ravage@bga.com>
To: adam@bwh.harvard.edu (Adam Shostack)
Message Hash: 45ca63996cae7f597c9afbcf97544390c5622eab147a5ddc9e202423162fcbd9
Message ID: <199407011815.NAA21951@zoom.bga.com>
Reply To: <199407011746.NAA13073@duke.bwh.harvard.edu>
UTC Datetime: 1994-07-01 18:15:45 UTC
Raw Date: Fri, 1 Jul 94 11:15:45 PDT

Raw message

From: Jim choate <ravage@bga.com>
Date: Fri, 1 Jul 94 11:15:45 PDT
To: adam@bwh.harvard.edu (Adam Shostack)
Subject: Re: Devil's Advocate (again)
In-Reply-To: <199407011746.NAA13073@duke.bwh.harvard.edu>
Message-ID: <199407011815.NAA21951@zoom.bga.com>
MIME-Version: 1.0
Content-Type: text


> 
> There are a number of good ways to breach modern cryptography without
> torture.  They include:
> 
> Van Eck (Tempest) monitoring.
> Sodium pentathol & its more modern cousins.
>
I believe this is considered torture in the US.

Bribery.
> Blackmail.
>
Both of these are great but any evidence is inadmissable in court and 
therefore of no use to a prosecutor.
> -- 
> Adam Shostack 				       adam@bwh.harvard.edu





Thread