[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Devil's Advocate (again)
On Fri, 1 Jul 1994, Jim choate wrote:
> > There are a number of good ways to breach modern cryptography without
> > torture. They include:
> >
> > Van Eck (Tempest) monitoring.
> > Sodium pentathol & its more modern cousins.
> >
> I believe this is considered torture in the US.
>
> > Bribery.
> > Blackmail.
>
> Both of these are great but any evidence is inadmissable in court and
> therefore of no use to a prosecutor.
Do you think the NSA cares either about the majority of US laws
or the admissibility of evidence? If they want your key badly enough,
they will get it, and in all probability will have no compunctions
against any of those methods.
--------------------------------------------------------------------------
Michael Brandt Handler <[email protected]>
Philadelphia, PA <[email protected]>
Currently at CMU, Pittsburgh, PA PGP v2.6 public key on request
Boycott Canter & Siegel <<NSA>> 1984: We're Behind Schedule