From: Pubkeybreaker on
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "It is technically possible for the Government to read such
! messages, but it would be insane for it to do so. It would be an
! extraordinarily expensive undertaking and would require a massive
! increase in computer power."

Probably since noone believed that, they admitted it, and said why they
needed to decrypt in real-time:

# Encryption and Law Enforcement
#
# Dorothy E. Denning
# Georgetown University
#
# February 21, 1994
#
# To implement lawful interceptions of encrypted communications, they
# need a real-time or near real-time decryption capability in order
# to keep up with the traffic and prevent potential acts of violence.
# Since there can be hundreds of calls a day on a tapped line, any
# solution that imposes a high overhead per call is impractical.


And if uncrackable crypto were in


From: fortune.bruce on
the five months of monitoring at Salomon, I also ran the previous
four months of Internet email (from the backups) through my analytics.

I found plenty of stuff there too.

Another major category of incidents: people in their last week at work.

In most cases from the backups, the person had already left the firm.

Even when they were still here:

********** begin excerpt from 'Corruption at Salomon Brothers' **********

! 18,525 lines of proprietary YieldBook C source.
! The user is still here (voicemail answers).
! Sent to themselves, or a relative, into a college campus.
! This source is very Salomon-specific, and could not be useful
! to transmit offsite for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: blort(a)bpann
! Recipient: blort(a)cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********

>Date: Tue, 7 May 96 23:38:00 EDT
>From: guy
>To: vivian
>Subject: Jan 26 1996 REDHOT
>Cc: <others>

Vivian,

On Jan 26 1996:

18,184 lines of C++ source of


From: Risto Lankinen on
for feedback of weapons systems
(picking out a submarine from the background noise of the ocean) as they
do for describing human life, as they do for the political organization
of a country.

Like I said, an awesome scope.

Norbert Wiener even came up with a physics-based
description of how life is formed by information.

Check it out. Hang in there too, it's worth it.

* "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1
*
* The term 'entropy' began life as a subtle measure of energy flow.
*
* When something hotter is systemically bound to something cooler, the
* greater energy of the hotter stuff migrates---inexorably migrates---
* into the cooler stuff. This is one manifestation of the Second Law of
* Thermodynamics, which everyone of education has encountered.
*
* This is sometimes referred to as 'the universe is running down'.

Okay, 'entropy', yeah I remember that kinda. Keep going:

Our solar system is a lot of matter that is NOT sitting in a situation of
entropy: the sun is radiating heat at the planets. I


From: Risto Lankinen on
Yes. [801]
*
* Waiver of any provision of Act by
* Executive Order.
* No. Yes [901]
*
*
* *The Encrypted Data Security Act, draft dated April 29, 1997.
*
* **The Secure Public Networks Act, as released on June 17
* by Senator Kerrey's office.


Crypto is either GAK crackable, or it is real crypto.

There is no such thing as "good faith attempts to balance".

You either have to choose between the best interests of the people,
or the best interests of the ever-paranoid Militia.

I mean the ever-paranoid Military.


******************************************************************************

Feds' Wacky Pro-GAK Logic
---- ----- --- --- -----

Here are a couple of the wacky reasons they give for everyone wanting GAK.


o Business Will Demand It

They say setting up a GAK infrastructure will form a defacto standard for
interchange of public encryption keys, which business need for
interoperability of the various cryptography products.

Noone has clamored for crackable crypto to be the driving force
behind such a standard.

It's a very silly thing for them to assert.

* "Clinton's Encryption Plan Fits Law and Market"
* Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96
*
* Many companies are eager to market Key Recovery [compromised] products.

Exact same deal:
Here are the actual comments on Key Recovery's predecessor, Key Escrow:

: Charles R. Smith, master of FOIA, SOFTWAR, http://www.us.net/softwar
:
# "It is essential that the end-user's rights to and expectations
# of personal privacy be met by this technology. Multi-national
# companies are faced with strong privacy laws in many countries,
# some of which are far st


From: Gerry Myerson on
across California.
*
* Because the San Jose City Attorney's office brought action against the
* defendants under a civil procedure, the defendants were not guaranteed
* the standard protections of criminal law.
*
* "Liberty unrestrained is an invitation to anarchy," Justice Brown wrote.
*
* The defendants may not engage in any form of public association: "standing,
* sitting, walking, driving, gathering or appearing anywhere in public view"
* in the neighborhood, or face 6 months in jail.
*
* They further may not: "climb trees or fences, make loud noises, possess
* wire cutters or marbles [What???], wear particular clothes, make certain
* hand signs, or carry marking pens or pagers."


The worst-case version of a National ID Card is a biometric-based one.

Biometrics means that card is numbered with your fingerprint, or retina
scan, or other unique physical characteristic.

You would be enumerated. Numbered for all time.

* CARROLLTON, Texas--(BUSINESS WIRE)--May 16, 1997--Sandia Imaging, a
* majority-owned subsidiary of Lasertechnics, Inc. (Nasdaq: LASX) and a
* leader in secure card technologies, will premiere the world's first
* printer that can personalize, print and encode optical cards in a
* single, on-line process, during CardTech/SecurTech '97 in Orlando, FL
* from May 19 through 22.
*
* This new technology significantly str