From: Ernest Hua <Hua@teralogic-inc.com>
To: “‘John Young’” <jya@pipeline.com>
Message Hash: 4b679b633b1aaf4497108cfbdd2bae691c79ea54a06a45d04c7005f1c9a29fb1
Message ID: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Reply To: N/A
UTC Datetime: 1998-06-25 16:45:19 UTC
Raw Date: Thu, 25 Jun 1998 09:45:19 -0700 (PDT)
From: Ernest Hua <Hua@teralogic-inc.com>
Date: Thu, 25 Jun 1998 09:45:19 -0700 (PDT)
To: "'John Young'" <jya@pipeline.com>
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
MIME-Version: 1.0
Content-Type: text/plain
I just don't understand how, in 1998, anyone could let Tenet get away
with a claim about key recovery like this. Didn't anyone ask him how he
expected high-tech hackers (especially those possibly aided by foreign
intelligence agencies) to use key recovery?
Ern
-----Original Message-----
From: John Young [SMTP:jya@pipeline.com]
Sent: Thursday, June 25, 1998 5:37 AM
To: cypherpunks@toad.com
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press
WASHINGTON (AP) -- Intrusion into government computers
[SNIP]
Unless the computer industry and the government find a
legislative compromise, the government could fall victim to
hackers able to hide their own actions in impenetrable
encryption codes. It may take a major computer-hacker
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted
databases.
"There is a train wreck waiting to happen unless we deal
with the recovery aspect of the encryption debate," Tenet
said.
Return to June 1998
Return to “mgraffam@mhv.net”