From: Pubkeybreaker on 18 Apr 2008 19:13 * The CATO Institute, "Congressional Testimony", May 24, 1995 * * During the next week, "the FBI used megaphones to taunt the family. * 'Good Morning Mrs. Weaver. We had pancakes for breakfast. What did * you have?'" asked the FBI agents in at least one exchange. * * Weaver's daughter, Sarah, 16, said the baby, Elisheba, was often * crying for her mother's milk when the FBI messages were heard. The Justice Department's own report recommended criminal prosecution of federal agents; the surviving Weavers won $3.1 million in civil damages from U.S. taxpayers. Deval Patrick, the Assistant Attorney General for civil rights, and Louis Freeh, Director of the FBI, took no serious action. Larry Potts was the senior official in charge of the operation. Not only was he not prosecuted, Freeh promoted him to acting deputy FBI director. * "Documents Were Destroyed as FBI Resisted Siege Investigation, Report Says" * By David Johnston, July 16, 1995 * * Mr. Pott's former subordinate Michael Kahoe admitted he destroyed key *
From: Pubkeybreaker on 18 Apr 2008 21:23 personnel file. Police chiefs oppose the legislations because it * could undermine early warning systems for spotting bad officers. * * In some states, police unions have begun filing libel suits against those * who file police complaints. * * The police officers assert that paper trails on complaints can ruin * law-enforcement careers. Police are the same bunch of law enforcement personnel who keep extensive non-criminal notes and allegations on citizenry. In fact, NYC Police have TWICE been caught using a form marked "for unofficial notes, not to be kept with the normal records". In other words, when the defendant tries to use discovery to get details of the police case against them, so they can analyze what happened, these "offline" notes are how the police withhold the information. You know, like Geronimo Pratt's primary prosecution witness was a paid government informer. And the FBI won't delete the file of the kid who aspires to be in our Foreign Service, but made the mistake of writing to foreign embassies in grade school. Poor schmuck. The FBI wants to keep "suspect" information on anyone in its NCIC 2000 system. ---- Some people feel the smart card will quickly give away to implantable biometric transponders. Once everyone is fingerprinted, you may as well! Guess what? They exist, and aren't that big: * http://www.radioamerica.com/relevance/11-94.html * * Martin Anderson, former senior member of Ronald Reagan's Economic Policy * Advisory Board fears that th
From: Pubkeybreaker on 18 Apr 2008 20:50 personal privacy, and might # not respect our personal rights and business needs. Because of # this, foreign governments must not be allowed access to the # escrow key." # - George Fisher - Chairman and CEO Motorola # # "The NIST proposal states that the escrow agents will provide # the key components to a government agency that 'properly # demonstrates legal authorization to conduct electronic # surveillance of communications which are encrypted.' The term # 'legal authorization' leaves open the possibility that court # issued warrants may not be required in some circumstances." # - Robert H. Follett - Program Director IBM # # "If people choose to deposit their keys with the government or # any other escrow agent, they must have some legal recourse in # the event that those keys are improperly released. The most # recent draft of the escrow procedures specifically states, # however: # # 'These procedures do not create, and are not intended to # create, any substantive rights for individuals intercepted # through electronic surveillance, and noncompliance with these # procedures shall not provide the basis for any motion to # suppress or other objection to the introduction of electronic # surveillance evidence lawfully acquired.' # # "Leaving users with no recourse will discourage use of the # system and is a tacit acceptance of unscrupulous government # behavior." # - Jim Hickstein - TERADYNE # # "Wiretap subje
From: Risto Lankinen on 18 Apr 2008 18:48 means. American # business has well-publicized problems with industrial espionage # by other nations." # - Michael B. Packer, Managing Director - Bankers Trust Company o To Safeguard Your Privacy * "Clinton's Encryption Plan Fits Law and Market" * Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96 * * Users may need a "spare key" to recover information that is lost or * otherwise inaccessible, in much the same way that we give a trusted * neighbor a spare key to our house...and the U.S. will have that key. The government says in case you lose you own decryption key, they will be there to save the day with their LE key. (Key Recovery has a 'Law Enforcement' key, which is a SECOND key to decrypt the same traffic.) Without getting into a lot of technical detail, basically, the LE KEY = Your Key. So, because they have a separate but equivalent key, they are claiming to be your emergency backup key, like a key left with a neighbor. People who have no idea how computer systems work will think like that sounds like a reasonable thing. Like a "good faith attempt to balance...". Now picture it being YOUR business. You have a cryptographic key that needs to be protected. The key itself is a big number you can't memorize. The key itself is protected by a (MD5-like) password to unlock access to it. That means the password can be as long a thing as you'd like to type in, not merely a short password. As long as you can remember it. This is standard...MIT's Kerberos and Phil Zimmerman's PGP use a password to unlock the cryptographic key. So, how do you back up the key without GAK? In other words, what do all companies do for this situation now? A situation that applies to all company data whether or not it is encrypted. A situation that has existed since the invention of the computer. Simple.
From: Phil Carmody on 18 Apr 2008 18:54
capability NSA denied having was right there. In a small black box, not much bigger than a briefcase, was "Oratory." This portable key-word selection computer could be taken almost anywhere and set to pick out pre-selected words and automatically monitor and record fax, voice, or teletype messages that contained them. Developed by NSA, "Oratory" was "tempest-proof" (i.e. shielded to prevent emmisions that could lead to detection), small, virtually indestructible, and easy to repair: all you had to do was open the lid and replace the self-diagnosed defective component. [snip] In pursuit of plausible deniability, CSE, GCHQ, and NSA have used each others' personnel and resources to evade laws against domestic spying. [ an example given in which the NSA wanted to spy on someone within the US, even though they had no authorization for such an operation ] ...So, two Canadians were sent to conduct a counter-espionage operation on US soil at US taxpayer expense so that NSA could maintain deniability. In every way that counts, NSA broke US law and spied on its own citizens. [ A UK operation by CSE described next. Margaret Thatcher (then Prime Minister) thinks two of the ministers in her cabinet are not 'on side' ...so she wants to find out if they are... So GCHQ asked CSE operators to come to |