[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: The right to be secure (fwd Computerworld article)
- To: [email protected]
- Subject: Re: The right to be secure (fwd Computerworld article)
- From: [email protected] (Bill_Stewart(HOY002)1305)
- Date: Wed, 14 Jul 93 21:09:45 EDT
- Original-From: anchor.ho.att.com!wcs (Bill_Stewart(HOY002)1305)
- Original-To: toad.com!cypherpunks
Paul Ferguson sent out a copy of a ComputerWorld article "The right to be secure"
(ComputerWorld, Volume 27, Number 28, July 12, 1993, page 28, James Daly),
which had NIST/NSA Q&A on Clipper. A couple things were mildly interesting
(assertion that use of escrow products would be voluntary (if we can trust them)),
but one was complex and nasty:
To obtain the key needed to unlock the encryption, law
enforcement must present evidence of its authority for a key,
typically a court order, to both key escrow authorities.
^^^^^^^^^^^^^^^^^^^^^^^^
Finally, the system will be designed to ensure that law
enforcement destroys the keys it receives when its authority
to conduct the electronic surveillance has expired.
"Typically", of course, means "not always", and it's coupled with the phrase
"establishment of procedures by the attorney general for the access of the keys"
in a previous answer, which means that anything the attorney general wants,
he can get. It also suggests that keys *can* be kept longer than court
orders permit if the attorney general wants.
Bill Stewart