[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Use encryption to foil spooks' data harvesting, says US state dept
- To: [email protected]
- Subject: Use encryption to foil spooks' data harvesting, says US state dept
- From: Anonymous <[email protected]>
- Date: Wed, 14 Oct 1998 18:17:01 +0200
- Comments: This message did not originate from the Sender address above.It was remailed automatically by anonymizing remailer software.Please report problems or inappropriate use to theremailer administrator at <[email protected]>.
- Sender: [email protected]
http://ds.state.gov/documents/protect.doc
�Most international U.S. corporate telecommunications are not encrypted.
Some countries do not allow encryption of telecommuni-cations traffic
within their borders, but it should be considered where feasible for any
transmission of competitive information.
�Many telecommunications transmissions will contain "key words", used to
identify information of interest to a third party. A key word can be the
name of a technology, product, project, or anything else which may identify
the subject of the transmission.
� Encryption should be the first line of defense since it is easier
for foreign intelligence services to monitor lines than to place "bugs",
however encryption will provide little if any security if a careful
examination for audio "bugs" elsewhere in the room is not conducted.