[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Clipper and Traffic Analysis
-----BEGIN PGP SIGNED MESSAGE-----
Mike Godwin asks whether one of Clipper's attractive points (well, not
to us, anyway) is the increased ability of LE to do traffic analysis.
> The reason I ask is, I have this sense that one reason the government
> likes Clipper is that the Law Enforcement Access Field enables agents
> to draw inferences about who's talking to whom and what they're saying,
> even without decrypting the actual communications.
Of course! Let's say that you call someone who's under Clipper
surveillance. Of course, you use your Clipperphone(*). The feds can
now go to a judge and say "Well, we know the holder of this key ID
called the suspect we have under surveillance... we want to surveil
_his_ line too." Guilt by association.
The agents should ideally have lawful authorization to be monitoring
the line, but think how easy it would be to do full-time, real-time
traffic analysis based on LEAF information.
- -Paul
(*) Not meant to imply that Mike would be likely to use a Clipperphone.
- --
Paul Robichaux, KD4JZG | PGP key via finger & keyservers.
[email protected] | Be a cryptography user- ask me how.
Intergraph Federal Systems | Of course I don't speak for Intergraph.
-----BEGIN PGP SIGNATURE-----
Version: 2.3a
iQCVAgUBLWD0FiA78To+806NAQF8KgP+PNlaWhQeBKXZuMLnvAqX0PaPwpnY+R6g
3g1snyCjLNxOGYlCOO0y/NczPsSxyp0yMMvod/XWrVCZutx/aKaepzq6AXA4o8qh
e0OnpgEKwkyfK49qTx5As7ajdRcDMIGSmiUvrKKodEZZhSB2+V3hKfN8Hdgq0A6b
aDIUhxHPXFs=
=1qsj
-----END PGP SIGNATURE-----