From: David Lesher <wb8foz@nrk.com>
To: cypherpunks@toad.com (Cypherpunks)
Message Hash: 05cd0ee875a2121f342412689ac3c07862b7701053056add047de8fdf945a2bf
Message ID: <199602181513.KAA32731@nrk.com>
Reply To: <v02130503ad4c7ab7db8a@[205.179.23.30]>
UTC Datetime: 1996-02-18 15:39:59 UTC
Raw Date: Sun, 18 Feb 1996 23:39:59 +0800
From: David Lesher <wb8foz@nrk.com>
Date: Sun, 18 Feb 1996 23:39:59 +0800
To: cypherpunks@toad.com (Cypherpunks)
Subject: Re: Using lasers to communicate
In-Reply-To: <v02130503ad4c7ab7db8a@[205.179.23.30]>
Message-ID: <199602181513.KAA32731@nrk.com>
MIME-Version: 1.0
Content-Type: text/plain
Lasers DO accomplish one task.
They force the interceptor to commit vulnerable forces to the attack.
It's pretty damn hard to get into room 24Z6 @ the Fort & prove that they
are working on YOUR text -- snatched in a phonetap.
It's a lot easier to catch the two guys on a bucket truck, or the Feebs
doing a black bag job on Ames' PC. That's exactly why TPTB prefer
Option A, the FBI wiretap act, to B.
But a more interesting question, maybe for Brian. How DO the wiretap
laws treat non common-carrier communications -- be it YOUR wire strung
from Tom to Jerry's house, or such? And where does the FCC authority
stop, and whoever regulates laser-safety start?
I vaguely recall that some BBC competitor was going to use the
wavelength loophole to get around the Beeb's monopoly... so the Crown
immediately raised the bar up to the gamma ray level or such.
--
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433
Return to February 1996
Return to “SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>”