[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: <none provided>
There's nothing technical here; it's a political rant, though
more or less related to the list topic.
In article <[email protected]>,
Anonymous <[email protected]> wrote:
: Posted by a misguided, hysterical, raster-burned ranter:
: What happens when one of these HR4079, Digital
: Telephony, Clipper/Capstone/Skipjack proposals passes,
: and Cyphernacht takes place? Storm troopers will throw
: your nice little PC's on the ground to ruin the hard
: drives, and only the new, improved hard drives, with
: access for legitimate law enforcement needs will be sold.
: Storm troopers? You take this all a little too seriously.
: What makes you think that you and your nasty little private
: secrets warrent the time, money and effort of non-existant
Well, in the finest of Usenet tradition :-), let me ask: What
would have made a Jew think that innocent, innocuous little him
would warrant the time, money and effort of non-existant storm-
troopers? Other than, that is, that the storm-troopers were real
and they had already gone after lots of people just like him....
To answer the question, though: once the law enforcement folks
decide to make unapproved cryptography illegal, they *will* use
it, not only for the purpose it's intended, as bad as that is
(and, remember: *anyone* no matter how small, can serve as an
example to deter others), but as an excuse for various and sundry
invasions and seizures. I draw your attention to RICO, forfeiture
laws, the use of traffic tickets for police funding, Steve
Jackson Games, not to mention the rather dramatic destruction of
our civil liberties attendant (not at all coincidentally) on the
so-called Drug War.
One lesson of history is quite clear: governments have an
absolute tendency to misuse their power. Furthermore, the further
the misuse has progressed and been accepted as "normal", the
harder it is to stop, or reverse.
I could go on and on but the bottom line is that any attempt by
the government to exercise prior constraint on either the content
*or* methods of communication, as the latter entails the former,
must be absolutely rejected and without consideration for
utilitarian or other similar arguments. Ultimately, the free
flow of information is the only constraint on government.