From: Michael Motyka <mmotyka@lsil.com>
To: John Young <cypherpunks@cyberpass.net
Message Hash: 5b911957bc5947c9613a950f16fe588d46c39969a5fb77858ffb7aecbba2a70b
Message ID: <364C9320.2E73@lsil.com>
Reply To: <199811131720.MAA28921@smtp0.atl.mindspring.net>
UTC Datetime: 1998-11-13 21:27:15 UTC
Raw Date: Sat, 14 Nov 1998 05:27:15 +0800
From: Michael Motyka <mmotyka@lsil.com>
Date: Sat, 14 Nov 1998 05:27:15 +0800
To: John Young <cypherpunks@cyberpass.net
Subject: Re: Info Age Crime Terror and War
In-Reply-To: <199811131720.MAA28921@smtp0.atl.mindspring.net>
Message-ID: <364C9320.2E73@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain
John,
The 1st - encrypted communications are speech.
The 4th - plaintext that has been encrypted cannot be "found."
The 5th - If your password is memorized then the only way to produce it
is as a witness against yourself.
So much for the layman's view. What is the current legal thinking and,
more importantly, the relevant legal precedents? Aren't they ( LE )
making a bit of a leap when they say that the Constitution defines
access to information not just items? It looks like the only way to
achieve the information access they want is through modification of the
Constitution.
There is often a right-leaning political flavor to the CP list but isn't
it such right-wingers as Rhenquist and Starr who invented the various
forms of immunity that already can be used to subvert the 5th?
Now they are trying to establish the legal equivalence of the physical
and the virtual. I wish Kyle et al well in their fight against legions
of terrorists but I hope that they have an impossible battle ahead of
them when it comes to downgrading the Bill of Rights. Besides, more than
wanting to protect us little lambs from terrorists, I think they
recognize the degree to which technology is changing the world and are
trying to resist the power shifts that are likely. The other reasons
they give are mostly chaff.
Regards,
Mike
John Young wrote:
>
> Senator Kyl has issued a long report, "Crime, Terror &
> War: National Security and Public Safety in the Information
> Age," which recounts his Subcommittee's hearings and
> recommendations on encryption, Y2K, terrorism, info war,
> domestic preparedness, wiretap, and more:
>
> http://jya.com/ctw.htm (97K)
>
> It describes a plan to combat threats to critical infrastructure
> and the US homeland which, if implemented, would criminalize
> much held dear to a few of this list's subscribers; other lurkers
> will be overjoyed to read Kyl coming to the rescue of careers
> and budgets of MIB and their suppliers of technologies of
> political control.
>
> He wants DoD to get cracking on domestic protection, move over
> piddling LEA. Civil liberties, nonsense. Crypto genie out of the bottle,
> more nonsense. Getting government access to encrypted
> communications, you bet. Through commercial products, yep.
>
Return to November 1998
Return to “Michael Motyka <mmotyka@lsil.com>”
Unknown thread root