Sorry. Jay's right. Sure, they may use encryption, but they don't need to
use anything so neat as a 3DES algorithm.

Example: (Suggested by Sir Arthur Conan Doyle way back when)
 Take any lengthy document. In meatspace, make sure your counterpart has the
exact same document. Write your message in the form of Page#Line#word#.
Anything not found in the document gets spelled out with
Page#Line#Word#Character#. Tada! An unbreakable code. Add the use of an
electronic document on a zip disk stored in a deguasser box hooked up to a
simple intrusion detection system (meatspace, not cyberspace) and a quick
little C+ lookup script to encode and decode a plain text message, and
there's no effort necessary at all to send encrypted messages that would
piss off even the NSA's ability to crack cipher.
:elpmaxE

Unfortunately, terrorists do a better job of using the KISS principle than
the average office. Terrorists use simple stuff, like Moses' "Lamb Blood On
The Door Frame Means Don't Kill This Family" method. And they use great
money movement techniques.

Sorry. Jay is right when he thinks restricting strong encryption won't do a
bit of good. It's like restricting guns. Capt. Kirk made a cannon that shot
diamond buckshot, all in one day, while being pursued by a lizard. I can
make a bomb out of a pile of manure and a bag of flour. Heck, a heaping
tablespoonful of powdered coffee creamer, slowly poured over a lighter from
a height of two feet will give you a flame six feet high (DO NOT TRY THIS AT
HOME! I'M SERIOUS, IT WORKS. DO IT OUTSIDE AWAY FROM FLAMMABLES AND DON'T
CATCH YOUR HAIR OR EYEBROWS ON FIRE!! I REFUSE TO BE RESPONSIBLE FOR YOUR
BURNING YOURSELF) Restricting guns did not stop our homegrown fools from
mixing aircraft fuel and fertilizer and killing those innocents in Oklahoma,
gun restrictions didn't stop the foreign murderers from using Bernoulli's
principle as a tool of mass murder on 9/11, and the control of strong
encryption techniques will not stop terrorists from sharing secrets and
planning atrocities.

I wish they could, but they can't.

D. Weiss
CCNA/MCSE/SSP2

-----Original Message-----
From: Jay D. Dyson [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, April 30, 2002 7:36 AM
To: Davis, Don (CPOCEUR)
Cc: ken; Security-Basics List; [EMAIL PROTECTED]
Subject: RE: strong encryption - governments denying individuals the
right to use


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, 30 Apr 2002, Davis, Don (CPOCEUR) wrote:

> I'm going to have to drop out of this thread...  Most of us are a bit
> too close to the subject, and we're obviously of two different minds.

        Indeed.

> I don't advocate invasion of privacy or total governmental control in
> every aspect of our lives, however from a national security standpoint,
> I'll accept not having strong encryption as opposed to the possible
> alternatives.

        Yet there's absolutely no evidence to support even the mere
suggestion that encryption enables the activities of terrorists.  None.
Saying that one should forego access to encryption in the interests of
national security is like saying that one should walk around with a banana
in one's ear to keep the alligators out of North Dakota.  (Naturally,
there will be those who will argue that the absence of alligators in North
Dakota is proof that the banana-in-the-ear technique works...)

- -Jay

  (    (                                                          _______
  ))   ))   .--"There's always time for a good cup of coffee"--.   >====<--.
C|~~|C|~~| (>------ Jay D. Dyson -- [EMAIL PROTECTED] ------<) |    = |-'
 `--' `--'  `- O Lord, make my enemies ridiculous. - Voltaire -'  `------'

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SunOS)
Comment: See http://www.treachery.net/~jdyson/ for current keys.

iEYEARECAAYFAjzOLUcACgkQGI2IHblM+8FIZgCcDBWEm46gHkya4IySMUgAB2MZ
GIUAnj+kxJ9EvGfuc5iNBSVqNKJW7cTw
=HZTL
-----END PGP SIGNATURE-----


Reply via email to