From: fortune.bruce on
employer. First read this section.


*** "Secret Power" by Nicky Hager, 1996, ISBN 0-908802-35-8


GCSB is New Zealand's Government Communications Security Bureau.

P8-9
It was with some apprehension that I learned Nicky Hager was researching the
activity of our intelligence community. He has long been a pain in the
establishment's neck.

There are many things in the book with which I am familiar. I couldn't tell
him which was which. Nor can I tell you.

But it is an outrage that I and other ministers were told so little [yea NSA]
and this raises the question of to whom those concerned saw themselves
ultimately responsible.

David Lange
Prime Minister of New Zealand 1984-89


P9
Another aspect of the Second World War that carried over into the Cold War
era was the close co-operation between five countries - the United States,
the United Kingdom, Canada, Australia and New Zealand - formalized with the
UKUSA Security Agreement of 1948.

Although the treaty has never been made public, it has become clear that it
provided not only for a division of collecting tasks and sharing of the
product, but for common guidelines for the classification an


From: Matthew T. Russotto on
will be there to save the day with their LE key. (Key Recovery
has a 'Law Enforcement' key, which is a SECOND key to decrypt the
same traffic.)

Without getting into a lot of technical detail, basically,
the LE KEY = Your Key.

So, because they have a separate but equivalent key, they are claiming
to be your emergency backup key, like a key left with a neighbor.

People who have no idea how computer systems work will
think like that sounds like a reasonable thing.

Like a "good faith attempt to balance...".

Now picture it being YOUR business.

You have a cryptographic key that needs to be protected.

The key itself is a big number you can't memorize.

The key itself is protected by a (MD5-like) password to
unlock access to it. That means the password can be as long
a thing as you'd like to type in, not merely a short password.
As long as you can remember it.

This is standard...MIT's Kerberos and Phil Zimmerman's PGP
use a password to unlock the cryptographic key.

So, how do you back up the key without GAK?

In other words, what do all companies do for this situation now?

A situation that applies to all company data whether or not it is encrypted.

A situation that has existed since the invention of the computer.

Simple.

You back it up.

Make backups of the key.

You can start by making your own key copy using off-site secure storage backup.

Several authorized people can have a copy of the key, and they
can each use


From: Rotwang on
must not be allowed access to the
# escrow key."
# - George Fisher - Chairman and CEO Motorola
#
# "The NIST proposal states that the escrow agents will provide
# the key components to a government agency that 'properly
# demonstrates legal authorization to conduct electronic
# surveillance of communications which are encrypted.' The term
# 'legal authorization' leaves open the possibility that court
# issued warrants may not be required in some circumstances."
# - Robert H. Follett - Program Director IBM
#
# "If people choose to deposit their keys with the government or
# any other escrow agent, they must have some legal recourse in
# the event that those keys are improperly released. The most
# recent draft of the escrow procedures specifically states,
# however:
#
# 'These procedures do not create, and are not intended to
# create, any substantive rights for individuals intercepted
# through electronic surveillance, and noncompliance with these
# procedures shall not provide the basis for any motion to
# suppress or other objection to the introduction of electronic
# surveillance evidence lawfully acquired


From: quasi on
dragnet
fashion not even George Orwell could have imagined.

This was all paid for by U.S. taxpayers.

Built in secret. Not debated.

The CALEA legislation is a shameful takes-us-into-the-abyss domestic spy bill.
It is for the FBI to simultaneously monitor HUGE amounts of our phone calls.

And when the judiciary found out about NSA monitoring U.S. citizens'
overseas telephone calls without a warrant: they approved the loss
of our Fourth Amendment rights.

Giving Presidential Directives the same force of law as the Constitution.

Congress has lost it too.

* The New York Times, undated
*
* The House is not expected to vote on the search-and-seizure bill until
* at least Wednesday. But tonight the Republicans defeated a Democratic
* amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF
* THE UNITED STATES CONSTITUTION.
*
* The vote was 303 to 121.
*
* The Democrats were trying to portray the Republicans as wanting to
* eliminate the constitu


From: David Bernier on
Varney and Morris arrived
> in the same car.
>
> Tom Varney of the Secret Service then told the judge that he believed
> Cummings to be a major threat to society and that he was concerned
> because of the upcoming presidential campaign. It was unclear if he
> was actually implying that Cummings would somehow be a threat to the
> president but the judge and the police listened intently.
>
> This was the first time a Secret Service agent had come to their town.
> Varney continued to describe the threatening items that had been found
> in Cummings' residence: a copy of The Anarchist's Cookbook, publications
> from Loompanix, a mag stripe read head (no electronics) which "could have
> been used" to commit fraud, and material thought to be C4 but later
> proven not to be. However, Varney said, the fact that it could have been
> showed how serious this was. Nobody questioned his logic.

Wow, I'd better throw out my copy of "The Anarchist's Cookbook", eh?.
Oh wait: it would be more fitting if I blew it up.

* C-SPAN Television, Wednesday June 5th, 1997
*
* Andrew Grove, Chairman & CEO of Intel Corporation, is asked whether
* bomb-making information should be censored from the Internet.
*
* "No. The same information is available in libraries, and we don't
* censor libraries, nor should we. When I was thirteen I built a
* nitroglycerin bomb. It was an incredibly stupid thing to do,
* and I knew someone who had their hand blown off, but I am
* adamantly against censoring such material."
*
* "And unlike a library, a par