Re: [iwar] - Sword cuts both ways


From: Tony Bartoletti
From: azb@llnl.gov
To: iwar@yahoogroups.com

Tue, 20 Feb 2001 11:14:47 -0800


fc  Tue Feb 20 11:09:09 2001
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 20 Feb 2001 11:09:09 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Feb 20 19:09:03 2001)
X-From_: azb@llnl.gov  Tue Feb 20 13:08:44 2001
Received: from b05.egroups.com (b05.egroups.com [208.50.144.96])
	by multi33.netcomi.com (8.9.3/8.9.3) with SMTP id NAA16969
	for ; Tue, 20 Feb 2001 13:06:53 -0600
X-eGroups-Return: sentto-279987-971-982695993-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by b05.egroups.com with NNFMP; 20 Feb 2001 19:06:33 -0000
X-Sender: azb@llnl.gov
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_0_3); 20 Feb 2001 19:06:32 -0000
Received: (qmail 31069 invoked from network); 20 Feb 2001 19:06:32 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 20 Feb 2001 19:06:32 -0000
Received: from unknown (HELO smtp-1.llnl.gov) (128.115.250.81) by mta2 with SMTP; 20 Feb 2001 19:06:31 -0000
Received: from poptop.llnl.gov (localhost [127.0.0.1]) by smtp-1.llnl.gov (8.9.3/8.9.3/LLNL-gateway-1.0) with ESMTP id LAA26577 for ; Tue, 20 Feb 2001 11:06:29 -0800 (PST)
Received: from catalyst (catalyst.llnl.gov [128.115.222.68]) by poptop.llnl.gov (8.8.8/LLNL-3.0.2/pop.llnl.gov-5.1) with ESMTP id LAA00708 for ; Tue, 20 Feb 2001 11:06:29 -0800 (PST)
Message-Id: <4.2.2.20010220105107.00ab6220@poptop.llnl.gov>
X-Sender: e048786@poptop.llnl.gov
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 
To: iwar@yahoogroups.com
In-Reply-To: <4.3.2.7.2.20010220131937.00c297f0@90.0.0.1>
References: <4.2.2.20010220102352.00aa56e0@poptop.llnl.gov> <200102171640.IAA12756@all.net>
From: Tony Bartoletti 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 20 Feb 2001 11:14:47 -0800
Reply-To: iwar@yahoogroups.com
Subject: Re: [iwar] - Sword cuts both ways
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit


>At 10:33 AM 2/20/01 -0800, Tony Bartoletti wrote:
> >I don't want to tell some father that his child was abducted or killed
> >because an email between relatives detailing the child's itinerary was
> >not allowed to be strongly encrypted.
>
>One could use this as an argument in favor of government-managed key escrow
>of strong encryption, of course... you shouldn't have anything to fear from
>the FBI alone having the means to break your encryption, and goodness
>knows, what if both parties to the e-mail were run over by trucks and a
>third relative needed to get access to the note to successfully pick up the
>child at the airport?  What then, huh? :-)

Good point.  Of course, similar mishaps can occur (regularly) with
ordinary un-encrypted email.  Encryption is not yet used so ubiquitously
that folks are in the habit establishing good use-protocols, such as
a personal "key-escrow" regime among family or close friends.

Of course, the FBI has never abused its power in harassing law-abiding
citizens for political reasons ... and never will. :)

>I think it's a weak argument in support of free strong cryptography (there
>are many better), as the folks who are going to be breaking weak crypto are
>more likely to be governments, and criminal enterprises seeking financial
>or political gain... Joe Pedophile won't be hacking code, though perhaps if
>I were a criminal wanting to want to kidnap, say, Kathy Lee Gifford's kid
>for ransom, it might be worth the trouble.  So perhaps better to say that I
>don't want to tell the shareholders of Boeing that its stock was driven
>through the floor because an e-mail outlining its proposed bid for a
>multi-billion dollar contract with the government of the PRC and
>intercepted by the French was weakly encrypted.

Granted, such arguments are valid, and will carry more weight in congress.

Still, with CPU power still rising, the ability to break the currently-weak
cryptographic methods will become as trivial for individuals as it is today
for governments.

I suppose my reason for making the comment in the first place was a sense
of insult at the "pull-at-your-heart-strings" form of argument put forward
in the Shelby quote.  Clearly, the great bulk of such "useful" intercepts
would be domestic, and thus speak not to the laws on "export" but rather
hint at restricting domestic civilian access to strong cryptography.

The "really bad people" are not restricted to weak cryptography in any
practical sense.  I tend to believe that efforts to slow the spread of
strong cryptography aim to protect an investment in "fishing nets".

___tony___


Tony Bartoletti 925-422-3881 
Information Operations, Warfare and Assurance Center
Lawrence Livermore National Laboratory
Livermore, CA 94551-9900


------------------------ Yahoo! Groups Sponsor ---------------------~-~>
eGroups is now Yahoo! Groups
Click here for more details
http://click.egroups.com/1/11231/1/_/595019/_/982695993/
---------------------------------------------------------------------_->

------------------
http://all.net/