From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com
Message Hash: 620043bf6fe771e79aaf50f8f22766a7e2f7333f224d86d56884a709c03bac4a
Message ID: <199810141617.SAA07987@replay.com>
Reply To: N/A
UTC Datetime: 1998-10-14 16:51:25 UTC
Raw Date: Thu, 15 Oct 1998 00:51:25 +0800
From: Anonymous <nobody@replay.com>
Date: Thu, 15 Oct 1998 00:51:25 +0800
To: cypherpunks@toad.com
Subject: Use encryption to foil spooks' data harvesting, says US state dept
Message-ID: <199810141617.SAA07987@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
http://ds.state.gov/documents/protect.doc
Most international U.S. corporate telecommunications are not encrypted.
Some countries do not allow encryption of telecommuni-cations traffic
within their borders, but it should be considered where feasible for any
transmission of competitive information.
Many telecommunications transmissions will contain "key words", used to
identify information of interest to a third party. A key word can be the
name of a technology, product, project, or anything else which may identify
the subject of the transmission.
Encryption should be the first line of defense since it is easier
for foreign intelligence services to monitor lines than to place "bugs",
however encryption will provide little if any security if a careful
examination for audio "bugs" elsewhere in the room is not conducted.
Return to October 1998
Return to “Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>”