home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:4951 alt.privacy:2323 comp.org.eff.talk:7110
- Newsgroups: sci.crypt,alt.privacy,comp.org.eff.talk
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!iggy.GW.Vitalink.COM!cs.widener.edu!eff!news.byu.edu!gatech!news.ans.net!newsgate.watson.ibm.com!yktnews!admin!aixproj!uri
- From: uri@watson.ibm.com (Uri Blumenthal)
- Subject: Re: A Silver Bullet to Limit Crypto?
- Sender: news@watson.ibm.com (NNTP News Poster)
- Message-ID: <1992Nov17.235659.32235@watson.ibm.com>
- Date: Tue, 17 Nov 1992 23:56:59 GMT
- Reply-To: uri@watson.ibm.com
- Disclaimer: This posting represents the poster's views, not necessarily those of IBM
- References: <01010064.iqm1p1@titipu.resun.com>
- Nntp-Posting-Host: aixproj.watson.ibm.com
- Organization: Get lost.
- Lines: 19
-
- In article <01010064.iqm1p1@titipu.resun.com>, ed@titipu.resun.com (Edward Reid) writes:
- |> > When this brief period finally comes to an end, LE will have to go back
- |> > to doing what it did before.
- |>
- |> Not exactly. "What it did before" was part of a world without electronic
- |> communication. Whatever happens wrt cryptography, electronic communication
- |> will remain. The old LE tools are not likely to be applicable.
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ bull****
- There still are those "traditional" methods, like personal
- surveillance, monitoring personal contacts, planting mics,
- eavesdropping on terminal emissions and so on. These tools
- are perfectly applicable. Besides, how about witnesses, or
- evidence (like blooded knife, gun, banknotes with recorded
- numbers)?
- --
- Regards,
- Uri. uri@watson.ibm.com
- ------------
- <Disclaimer>
-