1997-09-07 - Re: BXA Testimony at SAFE Hearing

Header Data

From: “William H. Geiger III” <whgiii@amaranth.com>
To: John Young <jya@pipeline.com>
Message Hash: 5a7d5bbcab7237ef993d03d1e72e0f3d2ecd78a572a028c73a3c127748841add
Message ID: <199709071220.IAA01391@users.invweb.net>
Reply To: <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>
UTC Datetime: 1997-09-07 12:40:00 UTC
Raw Date: Sun, 7 Sep 1997 20:40:00 +0800

Raw message

From: "William H. Geiger III" <whgiii@amaranth.com>
Date: Sun, 7 Sep 1997 20:40:00 +0800
To: John Young <jya@pipeline.com>
Subject: Re: BXA Testimony at SAFE Hearing
In-Reply-To: <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>
Message-ID: <199709071220.IAA01391@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

In <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>, on 09/06/97 
   at 07:43 PM, John Young <jya@pipeline.com> said:

>See William Reinsch's testimony on the administration's 
>encryption policy at the September 4 SAFE hearing:

>   http://jya.com/bxa090497.htm

>Perhaps dissimulating, or not then clued to the draft GAK bill, Reinsch
>states:

>1. Foreign crypto products are not as widely available as export control
>critics claim, and thus do not threaten US products.

Lie

>2. The administration is against mandatory key escrow.

Lie

>3. Finds the SAFE bill unhelpful but likes its crypto-criminalization
>provision and favors McCain-Kerrey's Secure Public Network  Act bill or
>other legislation that will:

>  Expressly confirm the freedom of domestic users to choose 
>  any type or strength of encryption.

Lie

>  Explicitly state that participation in a key management 
>  infrastructure is voluntary .

Lie

>  Set forth legal conditions for the release of recovery 
>  information to law enforcement officials pursuant to lawful 
>  authority and provide liability protection for key recovery 
>  agents who have properly released such information.

Any time they want it.

>  Criminalize the misuse of keys and the use of encryption to 
>  further a crime. 

Any and all uses will be a crime.	  

>  Offer, on a voluntary basis, firms that are in the business of 
>  providing public cryptography keys the opportunity to obtain 
>  government recognition, allowing them to market the 
>  trustworthiness implied by government approval.


They don't want it nor do they need it.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNBKFoY9Co1n+aLhhAQH0OgQAxkQp423VxnMp9N9MtUYdj5iyFrreJCB6
O4t86fHIU74mpVs1KyBicWBw2k7CZrLXnc9LaTUXU4l1WXbGeahCVsFoh+FkbtVJ
gZnY3eygHYDvQePPgu+QEafwjfCbxixb60nYYMBR6MpTTlDZAJWwxnGDU+e8b6o2
mmmjulN/KS8=
=4SO4
-----END PGP SIGNATURE-----






Thread