From: Brad Huntting <huntting@glarp.com>
To: tcmay@netcom.com (Timothy C. May)
Message Hash: db186f46131621ba223c04c64a73b3f7a3c4c184182333aaae21e49fb40b4606
Message ID: <199409121441.IAA11650@misc.glarp.com>
Reply To: <199409120049.RAA15757@netcom11.netcom.com>
UTC Datetime: 1994-09-12 14:47:36 UTC
Raw Date: Mon, 12 Sep 94 07:47:36 PDT
From: Brad Huntting <huntting@glarp.com>
Date: Mon, 12 Sep 94 07:47:36 PDT
To: tcmay@netcom.com (Timothy C. May)
Subject: Re: Running PGP on Netcom (and Similar)
In-Reply-To: <199409120049.RAA15757@netcom11.netcom.com>
Message-ID: <199409121441.IAA11650@misc.glarp.com>
MIME-Version: 1.0
Content-Type: text/plain
> A "Cypherpunk RISK" (apologies to the "RISKS" list) to running PGP on
> Netcom, Portal, America Online, etc. systems (and on university,
> corporate, etc. systems), is the obtaiing of *all* records,
> directories, etc. by court order.
> This has happened more than once, and will likely happen more and more
> in the future, as law enforcement realizes what a treasure trove this
> can be.
I am under the impression that many if not all Internet providers
which provide interactive logins have been raided durring the past
year. The raids I know of were conducted by U S Marshalls acting
on behalf of a few large electronics firms (who just happen to all
have the same intelectual property atourney).
brad
Return to September 1994
Return to “tcmay@netcom.com (Timothy C. May)”