Devil's Advocate (again)

Michael Handler grendel at netaxs.com
Fri Jul 1 12:45:31 PDT 1994


On Fri, 1 Jul 1994, Jim choate wrote:

> > There are a number of good ways to breach modern cryptography without
> > torture.  They include:
> > 
> > Van Eck (Tempest) monitoring.
> > Sodium pentathol & its more modern cousins.
> >
> I believe this is considered torture in the US.
> 
> > Bribery.
> > Blackmail.
>
> Both of these are great but any evidence is inadmissable in court and 
> therefore of no use to a prosecutor.

	Do you think the NSA cares either about the majority of US laws 
or the admissibility of evidence? If they want your key badly enough, 
they will get it, and in all probability will have no compunctions 
against any of those methods.

--------------------------------------------------------------------------
Michael Brandt Handler                                <grendel at netaxs.com> 
Philadelphia, PA                                    <mh7p+ at andrew.cmu.edu>
Currently at CMU, Pittsburgh, PA            PGP v2.6 public key on request
Boycott Canter & Siegel                <<NSA>> 1984: We're Behind Schedule







More information about the cypherpunks-legacy mailing list