On Fri, 29 Oct 1999, Bjørn Remseth wrote:
> it
> Reply-To:
> In-Reply-To: <[EMAIL PROTECTED]>; from John Gilmore on Fri, Oct
> 29, 199
> Organization: Yes Interactive AS
>
> > Years of work in standards committees and years of technical work can
> > all go for naught, when those responsible for
On Sat, Oct 30, 1999 at 10:12:21AM +0200, Per Kangru wrote:
> Are you realy sure that it was designed by the Norwegian defense forces?
> The Swedish military has aswell bought the phone (before the Norwegians)
> and to the best of my knowledge Sectra has been doing the construction
> much of thei
it
Reply-To:
In-Reply-To: <[EMAIL PROTECTED]>; from John Gilmore on Fri, Oct
29, 199
Organization: Yes Interactive AS
> Years of work in standards committees and years of technical work can
> all go for naught, when those responsible for operating the service are
> untrustworthy. End-to-end encr
> In the US, the different cellphone standards support different crypto,
> and some cell companies or cell sites don't use it.
So far I have *never* found a US TDMA cellphone site that supports
encryption. I have it enabled in my Nokia phone, and every time I make a
call, it beeps at me to tell
At 08:21 AM 10/25/1999 -0400, Marcus J. Ranum wrote:
>>>including use of the Internet, encrypted telephones, and cloned cellular
>>>telephones
>
>They don't say what "encrypted telephones" mean, either. Remember,
>these are the same guys who try to tell people that spread spectrum
>is "encryption"
At 9:35 AM -0700 10/24/99, Tim May wrote:
>At 3:33 AM -0700 1999-10-24, Arnold G. Reinhold wrote:
>
>>I have long doubted the very premise that encrypted communications
>>are a asset to criminals and a threat to law enforcement. The
>>standard way LE penetrates criminal organizations is to work fr
>>including use of the Internet, encrypted telephones, and cloned cellular
>>telephones
They don't say what "encrypted telephones" mean, either. Remember,
these are the same guys who try to tell people that spread spectrum
is "encryption" or at least "secure."
I'll bet $100 to a $1 that if there
At 3:33 AM -0700 1999-10-24, Arnold G. Reinhold wrote:
>I have long doubted the very premise that encrypted communications
>are a asset to criminals and a threat to law enforcement. The
>standard way LE penetrates criminal organizations is to work from the
>bottom. Someone at the retail level is
At 10:49 AM -0400 10/22/99, Declan McCullagh wrote:
>...
...
>PRESS CONFERENCE
>WITH U.S. ATTORNEY GENERAL JANET RENO
>COLOMBIAN AMBASSADOR ALBERTO MORENO
>
>SUBJECT: ARREST OF COLOMBIAN DRUG TRAFFICKERS
>IN OPERATION MILLENNIUM
>THE DEPARTMENT OF JUSTICE
>WASHINGTON, D.C.
>OCTOBER 13, 1999, WED
I used to work for a guy who was an ex NSA man. He had his own company that
built crypto phones and sold them world wide. The Saudis bought them as well
as a few smaller countries. One time he had guy with " a South American
accent" call him to order some phones. He contacted the agency to see if
Note this sounds a lot like what the DEA and Reno have been saying for years:
inserting backdoors into crypto products to preserve the balance between
privacy and snoopability. So what's changed after the announcement last month?
DEA: "We hope that we don't lose the ability to intercept encrypted
11 matches
Mail list logo