From: tchow on
(D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
:


From: S.C.Sprong on
debunked. And our nation's experts say it
will hurt security. The GAO says the same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creeping Police State

Basically, Louis Freeh is the anti-Christ leading us to Hell.
National ID cards are effectively being implemented without
needing to issue cards. The U.S. Government is trying to
monitor all phone calls and banking transactions, and have
all equipment worldwide designed for their monitoring. They
are bent on controlling the world to the point of there being
no crime left on the planet. Of course, democracy destroyed
is the direct result.


----


This publication advocates five major items:

o Passage of ProCode/SAFE legislation, allowing U.S. companies to
export unlimited strength cryptography, free from "Key Recovery".
Key Recovery means messages are no longer a secret, because the
Government has screwed around with it.

o Killing the CALEA legislation, which orders all communications
equipment be DESIGNED so the Government can spy on it.

o Dismantling domestic


From: Rotwang on
and to BE FREE OF UNREASONABLE SEIZURES, and our
* right to PRIVACY, as long as they are neat about it, eh?
*
* Your PRIVATE INFORMATION will be stored in the bar code on your
* driver's license and in the police computer, too.
*
* You DO know that ANY federal agency, including the IRS, and FBI, and
* ANY police agency can ALSO access that big computer database, too, don't
* you?
[
Charles R. Smith, SOFTWAR, http://www.us.net/softwar:
Department of Motor Vehicle computer systems are required to be up and
available 24 hours a day for access by the FBI's National Crime
Information Center (NCIC). This is the one used by all local police
in their cars when they pull you over.
]
* Originally the government told us that the law requiring us to get a
* driver's licenses was to "protect" us, to make sure people could drive.
*
* Now we know better. For example, as long as the government calls you a
* "deadbeat dad," it can "revoke" your driver's license. What does this
* have to do with making the roads safe? Nothing. Licensing isn't about
* "protecting" us from anything, it is about CONTROLLING us. Our
* "servants" have become dictators.
*
* In a FREE COUNTRY, the public servants do not dictate to the people.
* Folks, we ARE NOT FREE.
*
* Remember the lie about Social Security numbers? They were supposedly
* "for our good," too, just to insure that we were signed up in the social
* security program for our retirement in years to come, right? The old
* cards said, "Not for identification purposes." Now, you can't get a
* BANK ACCOUNT without one, and your money and financial transactions are
* reported to goons and thugs at the IRS who are happy to steal money from
* grandmothers. In fact, the IRS can get your bank records WITHOUT YOUR
* PERMISSION.
[
: ftp ftp.fourmilab.ch,


From: Risto Lankinen on
specific data as needed; and whether there is a single centralized infrastruc-
ture, many decentralized infrastructures, or a collection of different
approaches.

All key-recovery systems require the existence of a highly sensitive and
highly-available secret key or collection of keys that must be maintained in a
secure manner over an extended time period. These systems must make decryption
information quickly accessible to law enforcement agencies without notice to
the key owners. These basic requirements make the problem of general key
recovery difficult and expensive - and potentially too insecure and too costly
for many applications and many users.

Attempts to force the widespread adoption of key-recovery encryption through
export controls, import or domestic use regulations, or international standards
should be considered in light of these factors. The public must carefully
consider the costs and benefits of embracing government-access key recovery
before imposing the new security risks and spending the huge investment
required (potentially many billions of dollars, in direct and indirect costs)
to deploy a global key recovery infrastructure.


******************************************************************************

Government Steamroller
---------- -----------

Force anyone receiving government money to use crackable crypto?

Import restrictions in the U.S.?

Outlaw all non-government approved crypto?

That would never happen...would it?

: http://cgi.pathfinder.com/netly/ [search for article title]
:
: The Netly News
:
: Bill of Goods
:
: by Declan McCullagh May 9,


From: Matthew T. Russotto on
"
]

Before anything goes into the database, the actual searching and selection of
intercepted messages has already occurred - in the Dictionary computers at
the New Zealand and overseas stations.

This is an enormous mass of material - literally all the business, government
and personal messages that the station catches.

The computers automatically search through everything as it arrives at the
station.

This is the work of the Dictionary program.

It reads every word and number in every single incoming message and picks out
all the ones containing target keywords and numbers.

Thousands of simultaneous messages are read in 'real time' as they pour into
the station, hour after hour, day after day, as the computer finds
intelligence needles in the telecommunications haystack.

Telephone calls containing keywords are automatically extracted from the
masses of other calls and digitally recorded to be listened to by analysts
back in the agency headquarters.

The implications of this capability are immense.

The UKUSA agencies can use machines to search through all the telephone calls
in the world, just as they do for written messages.

It has nothing to do with whether someone is deliberately tapping your phone,
simply whether you say a keyword or combination of keywords that is of
interest to one of the UKUSA agencies.


P47
The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communicat