1995-09-12 - Re: GAK/weak crypto rationale?

Header Data

From: Jim Gillogly <jim@acm.org>
To: cypherpunks@toad.com
Message Hash: fedac4319801d0d52b1ecaf363338dec164a329e2438f5d0d05ccf2510a29fe8
Message ID: <199509122307.QAA02486@mycroft.rand.org>
Reply To: <Pine.D-G.3.91.950912174515.23949C-100000@dg.thepoint.net>
UTC Datetime: 1995-09-12 23:07:16 UTC
Raw Date: Tue, 12 Sep 95 16:07:16 PDT

Raw message

From: Jim Gillogly <jim@acm.org>
Date: Tue, 12 Sep 95 16:07:16 PDT
To: cypherpunks@toad.com
Subject: Re: GAK/weak crypto rationale?
In-Reply-To: <Pine.D-G.3.91.950912174515.23949C-100000@dg.thepoint.net>
Message-ID: <199509122307.QAA02486@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain



> Brian Davis <bdavis@thepoint.net> writes:
> No question.  Many high profile public corruption, Mafia, and high-level...
> ...In our district, we managed to convict almost 20 people...
> Particularly effective were the court-approved video and audio tapes of...

> I don't doubt that wiretaps may sometimes be abused despite the 
> incredibly onerous review process, but they have positive aspects, too.

In how many of these cases did you fail to get the necessary information
because of encryption?  Has this proportion been changing over the years?

	Jim Gillogly
	Hevensday, 21 Halimath S.R. 1995, 23:06





Thread