On Fri, 5 May 2000 08:58:45 -0400 "Arnold G. Reinhold" <[EMAIL PROTECTED]> writes:
> It's worse than that. The new reports are to cover "law enforcement
> encounters with encrypted communications in the execution of wiretap
> orders." http://www.politechbot.com/docs/clinton-crypto.050300.html
> "Encounters" suggests that there will be no distinction between
> encryption that hinders law enforcement access and encryption that
> does not. For example, any tap of a GSM cell phone could be reported
> even though the cipher GSM uses is relatively easy to break. In 1999
> there were 676 authorized taps for cell phones and pagers vs. 399 for
> stationary phones. (1998: 576 vs 494, so the trend is toward cell
> phones)
Any tap on the GSM cell phone will _not_ be on the encrypted over-the-air
interface but simply on the plaintext leaving the base station on the fixed
network.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn these bridges down
University of Twente | Nick Cave - "Ship Song"
Email: [EMAIL PROTECTED] === WWW: www.cs.utwente.nl/~hoepman
Phone: +31 53 4893795 === Secr: +31 53 4893770 === Fax: +31 53 4894590
PGP ID: 0xF52E26DD Fingerprint: 1AED DDEB C7F1 DBB3 0556 4732 4217 ABEF