1996-03-29 - Re: So, what crypto legislation (if any) is necessary?

Header Data

From: shamrock@netcom.com (Lucky Green)
To: Michael Froomkin <froomkin@law.miami.edu>
Message Hash: 6dc41d3987c589e257eb1b03fb1ac7414d0d6bba377908b7ee2d25752eea8614
Message ID: <v02120d63ad7f5b7c4b69@[192.0.2.1]>
Reply To: N/A
UTC Datetime: 1996-03-29 19:42:51 UTC
Raw Date: Sat, 30 Mar 1996 03:42:51 +0800

Raw message

From: shamrock@netcom.com (Lucky Green)
Date: Sat, 30 Mar 1996 03:42:51 +0800
To: Michael Froomkin <froomkin@law.miami.edu>
Subject: Re: So, what crypto legislation (if any) is necessary?
Message-ID: <v02120d63ad7f5b7c4b69@[192.0.2.1]>
MIME-Version: 1.0
Content-Type: text/plain


At 10:47 3/27/96, Michael Froomkin wrote:

>I see no reason whatsoever to believe that an un-warranted wiretap would
>be legal in any but two cases.  (1) Emergency threatening life (e.g.
>hostage-taking) pending judicial authorizaiton -- very rare.
>(2) The president claims residual authority to wiretap on national
>security grounds without a court order.  Since the FISA court provides
>the authority, this (one is told) is not used.

On what do you base your belief, give that the law explicitly allows for
"other forms of authorization"? Where does it say that these "other forms
of authorization" are limited to the examples you give?

TIA,



-- Lucky Green <mailto:shamrock@netcom.com>
   PGP encrypted mail preferred.







Thread