>On Fri, 5 May 2000 08:58:45 -0400 "Arnold G. Reinhold" 
><[EMAIL PROTECTED]> writes:
>> It's worse than that. The new reports are to cover "law enforcement
>> encounters with encrypted communications in the execution of wiretap
>> orders." http://www.politechbot.com/docs/clinton-crypto.050300.html
>> "Encounters" suggests that there will be no distinction between
>> encryption that hinders law enforcement access and encryption that
>> does not. For example, any tap of a GSM cell phone could be reported
>> even though the cipher GSM uses is relatively easy to break.  In 1999
>> there were 676 authorized taps for cell phones and pagers vs. 399 for
>> stationary phones. (1998: 576 vs 494, so the trend is toward cell
>> phones)
>
>Any tap on the GSM cell phone will _not_ be on the encrypted over-the-air
>interface but simply on the plaintext leaving the base station on the fixed
>network.

According to the White House press release the test was "encountered 
encryption" and they could well have counted GSM even if they could 
get around the encryption as you describe. Declan points out that the 
law was worded more carefully than the press release, so things are 
not as bad as I feared. Point for Congress.

It will be interesting to see what the reports say. But it is worth 
noting that according to 
http://www.uscourts.gov/wiretap99/contents.html there were 1350 
wiretaps approved by state and federal judges in the US in 1999. 72% 
were for drug cases.  Over the last 10 years, wiretaps have accounted 
for an average of less than 2500 convictions per year. Hence wiretaps 
convict only a tiny fraction of the US prison population, which is 
now over 1.3 million.

Furthermore, law enforcement has many ways to deal with encryption: 
traffic analysis, bugs, viruses, informers,...  If it gets the bad 
guys to talk more, encryption could be a boon for LE.

Arnold Reinhold


Reply via email to