Devil's Advocate (again)
Michael Handler
grendel at netaxs.com
Fri Jul 1 12:45:31 PDT 1994
On Fri, 1 Jul 1994, Jim choate wrote:
> > There are a number of good ways to breach modern cryptography without
> > torture. They include:
> >
> > Van Eck (Tempest) monitoring.
> > Sodium pentathol & its more modern cousins.
> >
> I believe this is considered torture in the US.
>
> > Bribery.
> > Blackmail.
>
> Both of these are great but any evidence is inadmissable in court and
> therefore of no use to a prosecutor.
Do you think the NSA cares either about the majority of US laws
or the admissibility of evidence? If they want your key badly enough,
they will get it, and in all probability will have no compunctions
against any of those methods.
--------------------------------------------------------------------------
Michael Brandt Handler <grendel at netaxs.com>
Philadelphia, PA <mh7p+ at andrew.cmu.edu>
Currently at CMU, Pittsburgh, PA PGP v2.6 public key on request
Boycott Canter & Siegel <<NSA>> 1984: We're Behind Schedule
More information about the cypherpunks-legacy
mailing list