Use encryption to foil spooks' data harvesting, says US state dept

http://ds.state.gov/documents/protect.doc ·Most international U.S. corporate telecommunications are not encrypted. Some countries do not allow encryption of telecommuni-cations traffic within their borders, but it should be considered where feasible for any transmission of competitive information. ·Many telecommunications transmissions will contain "key words", used to identify information of interest to a third party. A key word can be the name of a technology, product, project, or anything else which may identify the subject of the transmission. · Encryption should be the first line of defense since it is easier for foreign intelligence services to monitor lines than to place "bugs", however encryption will provide little if any security if a careful examination for audio "bugs" elsewhere in the room is not conducted.

Anonymous wrote:
http://ds.state.gov/documents/protect.doc
transmission of competitive information.
·Many telecommunications transmissions will contain "key words", used to
HUM SOunds like the idea of the 'auto record' I say a keyword on the phone and wham I am being recorded to see *IF* I am some sort of terrorist trying to overthrow the government, get stuff that I should not have like a fully functional missile and what not. Do you all believe this? I do. I can not say why but I do. (Actually I could say why but it is two long stories.) Do you believe this is done in phone calls in the US based on the telephone switch doing the monitoring and it monitors ALL calls not just those that go over seas??? I believe so... See my above statement. Have you been recorded before??? I believe I have.... WHY??? Well, if you ask that then you do not belong on this group! - lhe

Anonymous wrote:
·Many telecommunications transmissions will contain "key words", used to identify information of interest to a third party. A key word can be the name of a technology, product, project, or anything else which may identify the subject of the transmission.
The communications of criminals are certainly not billions bytes long but rather short and if they use 'key words' these can hardly be detected. This shows the nonsense of prohibiting use (or restricting export) of strong crypto by the general public and also the total ineffectivity of wiretapping etc. by the authority. A tiny history: During WWII there was a time when much commodities were smuggled between Hongkong and Macao. Letters were subject to opening by the Japanese occupation. Using 'key words' the smugglers of one city put little harmless looking announces in local newspapers which the complices at the other city could read the next day just as fast as if the information were sent via the post. This clearly shows that those attempting to push through crypto laws or regulations have either very low IQ or have high IQ but are in fact pursuing other (undisclosed) goals than what they publically claim (fighting criminality etc.). M. K. Shen
participants (3)
-
Anonymous
-
Leif Ericksen
-
Mok-Kong Shen