From: Pubkeybreaker on 18 Apr 2008 19:00 ! ! Walter G. Deeley, NSA deputy director for communications security ! said, "It is technically possible for the Government to read such ! messages, but it would be insane for it to do so. It would be an ! extraordinarily expensive undertaking and would require a massive ! increase in computer power." Probably since noone believed that, they admitted it, and said why they needed to decrypt in real-time: # Encryption and Law Enforcement # # Dorothy E. Denning # Georgetown University # # February 21, 1994 # # To implement lawful interceptions of encrypted communications, they # need a real-time or near real-time decryption capability in order # to keep up with the traffic and prevent potential acts of violence. # Since there can be hundreds of calls a day on a tapped line, any # solution that imposes a high overhead per call is impractical. And if uncrackable crypto were in
From: fortune.bruce on 18 Apr 2008 20:29 the five months of monitoring at Salomon, I also ran the previous four months of Internet email (from the backups) through my analytics. I found plenty of stuff there too. Another major category of incidents: people in their last week at work. In most cases from the backups, the person had already left the firm. Even when they were still here: ********** begin excerpt from 'Corruption at Salomon Brothers' ********** ! 18,525 lines of proprietary YieldBook C source. ! The user is still here (voicemail answers). ! Sent to themselves, or a relative, into a college campus. ! This source is very Salomon-specific, and could not be useful ! to transmit offsite for "testing". ! It executes other programs in the YieldBook package tree, and ! needs a full setup of YieldBook to operate. ! ! Shall I do the secondary searches and an incident report? ! ---guy ! ! ********************************* ! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995 ! Sender: blort(a)bpann ! Recipient: blort(a)cornell.edu ! ********************************* ********** end excerpt from 'Corruption at Salomon Brothers' ********** Nothing was done: I had completely overwhelmed Salomon Legal with security incidents, and many were ignored. In general, when you catch something in the backups, there are two choices: o Grin and bear it o File criminal or civil charges in court Two of the security incidents found in the backups qualified for criminal prosecution. One was a source for the Finance Desk Trading System [FDTS]. ********** begin excerpt from 'Corruption at Salomon Brothers' ********** >Date: Tue, 7 May 96 23:38:00 EDT >From: guy >To: vivian >Subject: Jan 26 1996 REDHOT >Cc: <others> Vivian, On Jan 26 1996: 18,184 lines of C++ source of
From: Risto Lankinen on 18 Apr 2008 19:34 for feedback of weapons systems (picking out a submarine from the background noise of the ocean) as they do for describing human life, as they do for the political organization of a country. Like I said, an awesome scope. Norbert Wiener even came up with a physics-based description of how life is formed by information. Check it out. Hang in there too, it's worth it. * "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1 * * The term 'entropy' began life as a subtle measure of energy flow. * * When something hotter is systemically bound to something cooler, the * greater energy of the hotter stuff migrates---inexorably migrates--- * into the cooler stuff. This is one manifestation of the Second Law of * Thermodynamics, which everyone of education has encountered. * * This is sometimes referred to as 'the universe is running down'. Okay, 'entropy', yeah I remember that kinda. Keep going: Our solar system is a lot of matter that is NOT sitting in a situation of entropy: the sun is radiating heat at the planets. I
From: Risto Lankinen on 18 Apr 2008 21:28 Yes. [801] * * Waiver of any provision of Act by * Executive Order. * No. Yes [901] * * * *The Encrypted Data Security Act, draft dated April 29, 1997. * * **The Secure Public Networks Act, as released on June 17 * by Senator Kerrey's office. Crypto is either GAK crackable, or it is real crypto. There is no such thing as "good faith attempts to balance". You either have to choose between the best interests of the people, or the best interests of the ever-paranoid Militia. I mean the ever-paranoid Military. ****************************************************************************** Feds' Wacky Pro-GAK Logic ---- ----- --- --- ----- Here are a couple of the wacky reasons they give for everyone wanting GAK. o Business Will Demand It They say setting up a GAK infrastructure will form a defacto standard for interchange of public encryption keys, which business need for interoperability of the various cryptography products. Noone has clamored for crackable crypto to be the driving force behind such a standard. It's a very silly thing for them to assert. * "Clinton's Encryption Plan Fits Law and Market" * Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96 * * Many companies are eager to market Key Recovery [compromised] products. Exact same deal: Here are the actual comments on Key Recovery's predecessor, Key Escrow: : Charles R. Smith, master of FOIA, SOFTWAR, http://www.us.net/softwar : # "It is essential that the end-user's rights to and expectations # of personal privacy be met by this technology. Multi-national # companies are faced with strong privacy laws in many countries, # some of which are far st
From: Gerry Myerson on 18 Apr 2008 20:01
across California. * * Because the San Jose City Attorney's office brought action against the * defendants under a civil procedure, the defendants were not guaranteed * the standard protections of criminal law. * * "Liberty unrestrained is an invitation to anarchy," Justice Brown wrote. * * The defendants may not engage in any form of public association: "standing, * sitting, walking, driving, gathering or appearing anywhere in public view" * in the neighborhood, or face 6 months in jail. * * They further may not: "climb trees or fences, make loud noises, possess * wire cutters or marbles [What???], wear particular clothes, make certain * hand signs, or carry marking pens or pagers." The worst-case version of a National ID Card is a biometric-based one. Biometrics means that card is numbered with your fingerprint, or retina scan, or other unique physical characteristic. You would be enumerated. Numbered for all time. * CARROLLTON, Texas--(BUSINESS WIRE)--May 16, 1997--Sandia Imaging, a * majority-owned subsidiary of Lasertechnics, Inc. (Nasdaq: LASX) and a * leader in secure card technologies, will premiere the world's first * printer that can personalize, print and encode optical cards in a * single, on-line process, during CardTech/SecurTech '97 in Orlando, FL * from May 19 through 22. * * This new technology significantly str |