From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: Brian Davis <bdavis@thepoint.net>
Message Hash: affbd81322e8e82aca3509f4325a2540c0bde2b2565aa4311d5eb29a06b265c3
Message ID: <9509131628.AA00879@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1995-09-13 16:32:16 UTC
Raw Date: Wed, 13 Sep 95 09:32:16 PDT
From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Wed, 13 Sep 95 09:32:16 PDT
To: Brian Davis <bdavis@thepoint.net>
Subject: Re: GAK/weak crypto rationale?
Message-ID: <9509131628.AA00879@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain
Brain Davis writes:
[...snip...]
> Particularly effective were the court-approved video and audio
> tapes of the Speaker taking a bribe in exchange for certain action
> on legislation
[...snip...]
> Wiretaps, hidden microphones, and hidden cameras put corrupt
> politicians (I know - redundant) out of business.
Encryption does little to protect you from hidden cameras and microphones (or
informants!). If you already know your target then you can probably get
around encryption (sure it's not as simple as a wiretap, but hey, nobody said
it had to be easy). Encryption prevents 'fishing expeditions' and
unauthorized monitoring; this is what the LEAs don't want to admit.
andrew
Return to September 1995
Return to “Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>”
1995-09-13 (Wed, 13 Sep 95 09:32:16 PDT) - Re: GAK/weak crypto rationale? - Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>