From: shamrock@netcom.com (Lucky Green)
To: Michael Froomkin <froomkin@law.miami.edu>
Message Hash: 6dc41d3987c589e257eb1b03fb1ac7414d0d6bba377908b7ee2d25752eea8614
Message ID: <v02120d63ad7f5b7c4b69@[192.0.2.1]>
Reply To: N/A
UTC Datetime: 1996-03-29 19:42:51 UTC
Raw Date: Sat, 30 Mar 1996 03:42:51 +0800
From: shamrock@netcom.com (Lucky Green)
Date: Sat, 30 Mar 1996 03:42:51 +0800
To: Michael Froomkin <froomkin@law.miami.edu>
Subject: Re: So, what crypto legislation (if any) is necessary?
Message-ID: <v02120d63ad7f5b7c4b69@[192.0.2.1]>
MIME-Version: 1.0
Content-Type: text/plain
At 10:47 3/27/96, Michael Froomkin wrote:
>I see no reason whatsoever to believe that an un-warranted wiretap would
>be legal in any but two cases. (1) Emergency threatening life (e.g.
>hostage-taking) pending judicial authorizaiton -- very rare.
>(2) The president claims residual authority to wiretap on national
>security grounds without a court order. Since the FISA court provides
>the authority, this (one is told) is not used.
On what do you base your belief, give that the law explicitly allows for
"other forms of authorization"? Where does it say that these "other forms
of authorization" are limited to the examples you give?
TIA,
-- Lucky Green <mailto:shamrock@netcom.com>
PGP encrypted mail preferred.
Return to March 1996
Return to “shamrock@netcom.com (Lucky Green)”
1996-03-29 (Sat, 30 Mar 1996 03:42:51 +0800) - Re: So, what crypto legislation (if any) is necessary? - shamrock@netcom.com (Lucky Green)