From: Black Unicorn <unicorn@schloss.li>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: 4b5d0ae50958bdeda330f19a4ba232141026be9b6271b3e513f9cd20cdf5830c
Message ID: <Pine.SUN.3.94.961019145359.19884L-100000@polaris>
Reply To: N/A
UTC Datetime: 1996-10-19 21:40:33 UTC
Raw Date: Sat, 19 Oct 1996 14:40:33 -0700 (PDT)
From: Black Unicorn <unicorn@schloss.li>
Date: Sat, 19 Oct 1996 14:40:33 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Wrap Up: Conference on Law Enforcement and Intelligence
Message-ID: <Pine.SUN.3.94.961019145359.19884L-100000@polaris>
MIME-Version: 1.0
Content-Type: text/plain
Summary:
1. Digital Cash is on the map. The Department of Justice will be
aggressively pursuing it.
Money laundering is becoming an increasing priority and crypto policy in
the United States is almost certain to be a casualty. It's no longer, as
it seemed to have been 6 months ago, a question of "well until the
government finds out what the potential is, we are ok." It is now: "Until
the government can manage to get the right people in an office together."
I'm not sure this is a particularly long time.
2. Remailers are on the map. The Department of Justice will be watching
these and an active effort to penetrate them is under way. What this
means exactly is unclear.
The Department of Justice, according to Jeff Smith and acknowledged by
nods and "hmmm"'s of agreement from the DoJ panel members, is going to be
attacking remailers. No idea how this may take shape, but its in the
works. Beware Vatis and his ilk.
3. Both law enforcement and intelligence are displayingh an unnerving
amount of cooperation.
No longer can we depend on turf wars to distract them.
4. Might be a good idea to review implementations of crypto.
Both James Woolsey and Stewart Baker made sly remarks about the
reliability of crypto in the public domain. While this is to be expected,
it might be a good idea to begin to look at crypto with a more discerning
eye. In private conversation with Stewart Baker, my collegue mentioned
the potency of crypto algorthms in the public domain. Wouldn't this make
criminal use simply too easy? Should law enforcement not be considering
banning all crypto. Baker wasn't giving away any secrets, obviously, but
he did suggest that tho many of the publicly available methods were
potent, their implementations might be weak. (This while touting a cute
little "PGP" litigation bag. Anyone know where these can be found?)
Perhaps its time to consider a more direct and careful implementation
review of IDEA, 3DES, MD5 and other common methods?
How widely reviewed is PGP's implementation REALLY?
What about other public products?
Bottom line:
Be afraid, be very afraid.
--
I hate lightning - finger for public key - Vote Monarchist
unicorn@schloss.li
Return to October 1996
Return to “James Morris <jmorris@intercode.com.au>”