[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: TIS, SKE, & CyberCash Inc.



>Timothy C. May <[email protected]> wrote:
>					    
>> A "voluntary" software key escrow system is of course OK (useful for
>> people afraid of forgetting their keys, for companies that don't want
>> the death of employees to cut them off from corporate secrets, etc.).
>> But any system in which the escrow key holders are *not* freely
>> selectable from a list one generates one's self (where the agents may
>> be the company lawyer, one's mother, one's priest, the bit bucket, the
>> machine down the hall, or nothing at all, etc.) is *not voluntary*.
>
>
>
>
>	"To amend the National Institute of Standards and Technology 
>	 Act to provide for the establishment and management of 
>	 voluntary encryption standards to protect the privacy and 
>	 security of electronic information, and for other purposes."
                                                     ~~~~~~~~~~~~~~

Government-ese for "here, bend over this barrel".

>
>	 
>Then in the Findings and Purposes section it starts to get at the
>crux of the real agenda:
>
>
>	"(2) The proliferation of communications and information
>	 technology has made it increasingly difficult for the 
>	 government to obtain and interpret, in a timely manner,
>	 electronic information that is necessary to provide for
>	 public safety and national security."
                           ~~~~~~~~~~~~~~~~~
Grab your vaseline,

>	 
>
>This primary agenda is restated in the Requirements subsection 
>under Federal Encryption Standards:
>
>
>	"(C) shall contribute to public safety and national security;
>	

big dude named "Bubba" and his frinds are gonna pay you a conjugal visit;

>	 (E) shall preserve the functional ability of the government
>	 to interpret, in a timely manner, electronic information 
>	 that has been obtained pursuant to an electronic surveillance
>	 permitted by law;
>	 

no condom.

>	 (F) may be implemented in software, firmware, hardware, or
>	 any combination thereof; and
>	     

Assume the position,

>	 (G) shall include a validation program to determine the 
>	 extent to which such standards have been implemented in
>	 conformance with the requirements set forth in this paragraph."
>	  

and *smile*.

>
>Later on, in the Definitions section, the term "electronic
>information" for the purposes of the legislation is defined in what
>I find to be an ominously expansive way:
>
>
>	"(8) The term 'electronic information' means the content,
>     source, or destination of any information in any electronic
>     form and in any medium which has not been specifically 
>     authorized by a Federal statute or an Executive Order to be
>     kept secret in the interest of national defense or foreign
>     policy and which is stored, processed, transmitted or 
>     otherwise communicated, domestically or internationally, in
>     an electronic communications system..."
>

Oh, yeah - you get charged barrel rent, too.

- - - - - - - - - - - - - - - - - - - - - - - - - - 
Finger [email protected] for PGP/RIPEM public keys and fingerprints.
Unencrypted Email may be ignored without notice to sender.  PGP preferred.
Remember: It is not enough to _obey_ Big Brother; you must also learn to
*love* Big Brother.