Re: KEY ESCROW PROCEDURES
From: Mike Godwin <mnemonic@eff.org> Message-Id: <199309181851.AA05084@eff.org> Subject: Re: KEY ESCROW PROCEDURES Date: Sat, 18 Sep 1993 14:51:57 -0400 (EDT)
Carl writes:
Meanwhile, where is the proof that the key being requested corresponds to a person on whom a wiretap has been ordered?
The authorized key request will normally occur after law-enforcement officials have snagged the chip serial number from the LEAF (law-enforcement field) of the signal they captured with an authorized wiretap.
Mike, that's the theory but there is no proof that the signal was captured with an authorized wiretap. For that, the key registration agents have to trust the law enforcement agency. If the LE agency can be trusted, there's no need for the key registration agencies. Part of the reason for encryption of communications is to guard against illegal actions by law enforcement agencies. - Carl
participants (1)
-
cme@ellisun.sw.stratus.com