[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: KEY ESCROW PROCEDURES



>From: Mike Godwin <[email protected]>
>Message-Id: <[email protected]>
>Subject: Re: KEY ESCROW PROCEDURES
>Date: Sat, 18 Sep 1993 14:51:57 -0400 (EDT)

> 
>Carl writes:
> 
>> Meanwhile, where is the proof that the key being requested corresponds to
>> a person on whom a wiretap has been ordered?
>
>The authorized key request will normally occur after law-enforcement
>officials have snagged the chip serial number from the LEAF
>(law-enforcement field) of the signal they captured with an authorized
>wiretap.

Mike,

	that's the theory but there is no proof that the signal was captured
with an authorized wiretap.  For that, the  key registration agents have
to trust the law enforcement agency.

	If the LE agency can be trusted, there's no need for the
key registration agencies.

	Part of the reason for encryption of communications is to guard
against illegal actions by law enforcement agencies.

 - Carl