From: Pubkeybreaker on
* The CATO Institute, "Congressional Testimony", May 24, 1995
*
* During the next week, "the FBI used megaphones to taunt the family.
* 'Good Morning Mrs. Weaver. We had pancakes for breakfast. What did
* you have?'" asked the FBI agents in at least one exchange.
*
* Weaver's daughter, Sarah, 16, said the baby, Elisheba, was often
* crying for her mother's milk when the FBI messages were heard.

The Justice Department's own report recommended criminal prosecution of
federal agents; the surviving Weavers won $3.1 million in civil damages
from U.S. taxpayers.

Deval Patrick, the Assistant Attorney General for civil rights, and
Louis Freeh, Director of the FBI, took no serious action.

Larry Potts was the senior official in charge of the operation. Not only
was he not prosecuted, Freeh promoted him to acting deputy FBI director.

* "Documents Were Destroyed as FBI Resisted Siege Investigation, Report Says"
* By David Johnston, July 16, 1995
*
* Mr. Pott's former subordinate Michael Kahoe admitted he destroyed key
*


From: Pubkeybreaker on
personnel file. Police chiefs oppose the legislations because it
* could undermine early warning systems for spotting bad officers.
*
* In some states, police unions have begun filing libel suits against those
* who file police complaints.
*
* The police officers assert that paper trails on complaints can ruin
* law-enforcement careers.

Police are the same bunch of law enforcement personnel who keep extensive
non-criminal notes and allegations on citizenry.

In fact, NYC Police have TWICE been caught using a form marked "for unofficial
notes, not to be kept with the normal records".

In other words, when the defendant tries to use discovery to get details of
the police case against them, so they can analyze what happened, these
"offline" notes are how the police withhold the information.

You know, like Geronimo Pratt's primary prosecution witness was a paid
government informer.

And the FBI won't delete the file of the kid who aspires to be in our Foreign
Service, but made the mistake of writing to foreign embassies in grade school.

Poor schmuck.

The FBI wants to keep "suspect" information on anyone in its NCIC 2000 system.

----

Some people feel the smart card will quickly give away to implantable
biometric transponders. Once everyone is fingerprinted, you may as well!

Guess what?

They exist, and aren't that big:

* http://www.radioamerica.com/relevance/11-94.html
*
* Martin Anderson, former senior member of Ronald Reagan's Economic Policy
* Advisory Board fears that th


From: Pubkeybreaker on
personal privacy, and might
# not respect our personal rights and business needs. Because of
# this, foreign governments must not be allowed access to the
# escrow key."
# - George Fisher - Chairman and CEO Motorola
#
# "The NIST proposal states that the escrow agents will provide
# the key components to a government agency that 'properly
# demonstrates legal authorization to conduct electronic
# surveillance of communications which are encrypted.' The term
# 'legal authorization' leaves open the possibility that court
# issued warrants may not be required in some circumstances."
# - Robert H. Follett - Program Director IBM
#
# "If people choose to deposit their keys with the government or
# any other escrow agent, they must have some legal recourse in
# the event that those keys are improperly released. The most
# recent draft of the escrow procedures specifically states,
# however:
#
# 'These procedures do not create, and are not intended to
# create, any substantive rights for individuals intercepted
# through electronic surveillance, and noncompliance with these
# procedures shall not provide the basis for any motion to
# suppress or other objection to the introduction of electronic
# surveillance evidence lawfully acquired.'
#
# "Leaving users with no recourse will discourage use of the
# system and is a tacit acceptance of unscrupulous government
# behavior."
# - Jim Hickstein - TERADYNE
#
# "Wiretap subje


From: Risto Lankinen on
means. American
# business has well-publicized problems with industrial espionage
# by other nations."
# - Michael B. Packer, Managing Director - Bankers Trust Company



o To Safeguard Your Privacy

* "Clinton's Encryption Plan Fits Law and Market"
* Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96
*
* Users may need a "spare key" to recover information that is lost or
* otherwise inaccessible, in much the same way that we give a trusted
* neighbor a spare key to our house...and the U.S. will have that key.

The government says in case you lose you own decryption key,
they will be there to save the day with their LE key. (Key Recovery
has a 'Law Enforcement' key, which is a SECOND key to decrypt the
same traffic.)

Without getting into a lot of technical detail, basically,
the LE KEY = Your Key.

So, because they have a separate but equivalent key, they are claiming
to be your emergency backup key, like a key left with a neighbor.

People who have no idea how computer systems work will
think like that sounds like a reasonable thing.

Like a "good faith attempt to balance...".

Now picture it being YOUR business.

You have a cryptographic key that needs to be protected.

The key itself is a big number you can't memorize.

The key itself is protected by a (MD5-like) password to
unlock access to it. That means the password can be as long
a thing as you'd like to type in, not merely a short password.
As long as you can remember it.

This is standard...MIT's Kerberos and Phil Zimmerman's PGP
use a password to unlock the cryptographic key.

So, how do you back up the key without GAK?

In other words, what do all companies do for this situation now?

A situation that applies to all company data whether or not it is encrypted.

A situation that has existed since the invention of the computer.

Simple.




From: Phil Carmody on
capability NSA denied having was right there.

In a small black box, not much bigger than a briefcase, was "Oratory."

This portable key-word selection computer could be taken almost anywhere
and set to pick out pre-selected words and automatically monitor and
record fax, voice, or teletype messages that contained them.

Developed by NSA, "Oratory" was "tempest-proof" (i.e. shielded to
prevent emmisions that could lead to detection), small, virtually
indestructible, and easy to repair: all you had to do was open the
lid and replace the self-diagnosed defective component.
[snip]

In pursuit of plausible deniability, CSE, GCHQ, and NSA have used each
others' personnel and resources to evade laws against domestic spying.

[ an example given in which the NSA wanted to spy on someone within
the US, even though they had no authorization for such an operation ]

...So, two Canadians were sent to conduct a counter-espionage operation
on US soil at US taxpayer expense so that NSA could maintain deniability.

In every way that counts, NSA broke US law and spied on its own citizens.

[ A UK operation by CSE described next. Margaret Thatcher (then Prime
Minister) thinks two of the ministers in her cabinet are not 'on side'
...so she wants to find out if they are... So GCHQ asked CSE operators
to come to