From: Duncan Frissell <frissell@panix.com>
To: cypherpunks@toad.com
Message Hash: 86beef56be57e43bc87062ab0d976ece19a66333c1dfdc51282000606c90a682
Message ID: <2.2.32.19960703002028.00ba3b24@panix.com>
Reply To: N/A
UTC Datetime: 1996-07-03 04:24:53 UTC
Raw Date: Wed, 3 Jul 1996 12:24:53 +0800
From: Duncan Frissell <frissell@panix.com>
Date: Wed, 3 Jul 1996 12:24:53 +0800
To: cypherpunks@toad.com
Subject: LE Risks with No Crypto
Message-ID: <2.2.32.19960703002028.00ba3b24@panix.com>
MIME-Version: 1.0
Content-Type: text/plain
Did anyone notice the fun little bit in the story of the bust of the Viper
Militia in Arizona?
The state employee that BATF sent to infiltrate the group almost "assumed
room temperature" because an ally of the Militia working for AT&T pulled his
long distance phone records. The infiltrator was questioned rather closely
about some of his phone calls to official numbers. He managed to persuade
them that he wasn't a Fed.
Too bad AT&T doesn't use an encrypted open books system to store is records
so that "bad guys" can't abuse those records and put our heroic law
enforcement personnel at risk.
This is a perfect illustration of the fact that technology puts the
government most at risk because it will always be the juiciest target.
"Worth the powder to blow it up with."
DCF
Return to July 1996
Return to “Rich Graves <llurch@networking.stanford.edu>”