From: Hallam-Baker <hallam@ai.mit.edu>
To: Bill Frantz <frantz@netcom.com>
Message Hash: 1f2164ce15a2513f485285e1235b1dd2e0ac0019ebdcbbe8c2aa16943bc474a6
Message ID: <31BF463C.15FB@ai.mit.edu>
Reply To: <4pj38q$o1i@life.ai.mit.edu>
UTC Datetime: 1996-06-13 04:32:39 UTC
Raw Date: Thu, 13 Jun 1996 12:32:39 +0800
From: Hallam-Baker <hallam@ai.mit.edu>
Date: Thu, 13 Jun 1996 12:32:39 +0800
To: Bill Frantz <frantz@netcom.com>
Subject: Re: whitehouse queries files on political enemies
In-Reply-To: <4pj38q$o1i@life.ai.mit.edu>
Message-ID: <31BF463C.15FB@ai.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
Bill Frantz wrote:
>
> OBCrypto: William Safire, in his 6/10/96 column on this subject, says,
> "Under Freeh, the anti-encryption zealot hand-picked by the man whose name
> was used on the phony requisitions, the Justice Department's most
> confidential file room has become a walk-in closet for White House pols."
Well Safire should know about Nixon type dirty tricks, after all he worked for
Nixon as a speachwriter and wrote a book about it:-
http://econ158.berkeley.edu/williamsafire.html
http://econ158.berkeley.edu/haldeman.html
>From a pro-crypto point of view it is more advantageous to accept the
administration position that the requests were made in error. After all that
demonstrates that the govt. is not capable of admininistering sensitive
information properly even when it is what must surely count as the most
sensitive information the govt. tracks. If the system is ineffective in
protecting the files of the party workers of opposed factions then it is
unlikely to protect the secrecy of less sensitive files.
This aside the general problem is one of authorisation. The current USGovt
security system is based on principles of security clearances and "need to
know". But how does the guardian of various personal files know _who_ needs to
know?
This is a _very_ hard problem, one that I for one would like an answer to.
Unfortunately the USGovt is not like a computer system where the authorisation
policy for information is enforced via ACLs or the like. Perhaps it should be
Phill
Return to June 1996
Return to “Hallam-Baker <hallam@ai.mit.edu>”
Unknown thread root