On Fri, 5 May 2000 08:58:45 -0400 "Arnold G. Reinhold" <[EMAIL PROTECTED]> writes:
> It's worse than that. The new reports are to cover "law enforcement 
> encounters with encrypted communications in the execution of wiretap 
> orders." http://www.politechbot.com/docs/clinton-crypto.050300.html 
> "Encounters" suggests that there will be no distinction between 
> encryption that hinders law enforcement access and encryption that 
> does not. For example, any tap of a GSM cell phone could be reported 
> even though the cipher GSM uses is relatively easy to break.  In 1999 
> there were 676 authorized taps for cell phones and pagers vs. 399 for 
> stationary phones. (1998: 576 vs 494, so the trend is toward cell 
> phones)

Any tap on the GSM cell phone will _not_ be on the encrypted over-the-air
interface but simply on the plaintext leaving the base station on the fixed
network. 

Jaap-Henk

-- 
Jaap-Henk Hoepman             | Come sail your ships around me
Dept. of Computer Science     | And burn these bridges down
University of Twente          |       Nick Cave - "Ship Song"
Email: [EMAIL PROTECTED] === WWW: www.cs.utwente.nl/~hoepman
Phone: +31 53 4893795 === Secr: +31 53 4893770 === Fax: +31 53 4894590
PGP ID: 0xF52E26DD  Fingerprint: 1AED DDEB C7F1 DBB3  0556 4732 4217 ABEF

Reply via email to