Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security Your Rights Online

Dear Mr. Straw 176

Stand.org.uk has taken issue with the UK's proposed new e-commerce bill in a novel fashion. The Bill includes an assortment of new powers for law enforcement to combat the spread of that dread menace, cryptography. Police can demand that you decrypt and provide the keys for any encrypted communications in your possession - with a penalty of two years in jail. But what if you don't have the key? An excellent letter and even more excellent photo-essay. -- michael
This discussion has been archived. No new comments can be posted.

Dear Mr. Straw

Comments Filter:
  • by Anonymous Coward
    "If the police ask you keep the demand to hand
    over the key secret, telling anyone would
    render you liable to 5 years in jail."


    Urgh. It took me about 6 passes to parse this sentence. At a minimum, there needs to be a "to" inserted after the first "you." At best, it needs to be re-written entirely.
  • by Anonymous Coward
    Take a look at this:-

    http://www.stand.org.uk/dearjack /images/swear1.jpg [stand.org.uk]

    Given this carelessness, finding out who the 'mystery man' is becomes much easier. :)

  • by Anonymous Coward
    There is no requirement that one has a knowlege of French to become a landed immegrant in Canada. Entry is based on a point system and you will get points for having English or French. If you have both, then more points (up to some maximum.)

    For the record, only the federal, Ontario, New Brunswick and Manitoba governments are bilingual. All others (including Quebec are unilingual.)

    Steemheet@hotmail.com who still can't get a password from slashdot!
  • by Anonymous Coward
    it isn't handing over the crypto key that's the problem. it's that if you don't prove you don't have it you've got a problem, a jailable one. it's more as if they got a warrent and searched your shed for the bodies, found none, and then arrested you if you couldn't produce your family. no, that wouldn't last long in america, (i'd hope!) but i don't think it would be blasted out by the 5th. i would hope it would be blasted by the presumption of innocence. quinn@ambiguous.org
  • by Anonymous Coward
    Encrypt a file of keys that you use, but you don't record which key goes to which file. That way you dont really have the key. But if you wanted to get back into a file encrypted with one of the keys, do a dictionary attack using the keys from that file. It shouldn't take too long.
  • 10. O.J. Simpson
    9. Ted Kennedy
    8. Patrick Naughton
    7. Kevin Mitnick
    6. JonBenet's daddy
    5. Whoever shot JR
    4. Eric Clapton ("I shot the sherriff...")
    3. But he didn't shoot the deputy...
    2. Dr. Richard Kimble
    1. Hemos and CmdrTaco (*they* killed Kenny!)

    Hmmm... all that, and I didn't even *mention* Bill Gates!
  • by Anonymous Coward
    The fundamentals of this law are good. Actually, this is probably the only acceptable middle ground about encryption. You can use whatever encryption you want as long you can provide the clear text to law enforcement official, given they have the proper warrant for that. There is the important point. No eavesdropping, no sweeping monitoring for pseudo national security enforcement. After all, police cannot search your homeplace just like that, but they can do it with a warrant, issued by a judge, isn't it?

    But, sure, the current wording is really stupid and this letter does a great job to prove it. The obligation should apply exclusively to the messages / documents YOU encrypt. And penalties should be enforced only for voluntary destruction of key/clear text. What can you do if your hard drive crash ? And anyway, for the "no disclose" part of the law, even in UK, you cannot be denied a legal counsel at anytime in a procedure. So, this law is already dead.

    Good idea, but redo your homework, Mr Straw
  • by Anonymous Coward
    Although not very practical, this law could be dealt with perfectly by using a one time pad. One time pads are unique in that they perfectly secure if used properly. A message is combined with a true (not pseudorandom) random key that's as long as the message itself. This key is only used once. What makes it secure, is for a given cyphertext, any number of plaintext messages may encrypt to that cyphertext. So, when asked to supply law enforcement with the key, merely supply them a pad that decrypts the message to non-incriminating information. Problem solved.

    A.C.

  • by Anonymous Coward on Tuesday September 28, 1999 @09:49AM (#1652939)
    I have huge files containing random data on my hard drive. They are the output of several RNGs I am doing statistical analyses on. Of course, one of the files MIGHT be an encrypted filesystem. So when MI6 kicks down the door and demands the "key" to decode the random data that they think is hidden information, what will happen? Floggings day and night until I "talk"? Jail time for "not cooperating"? But it's just random data! Really! But since I cannot "prove" this in any way (they can't "prove" me guilty either so there's no crime, but I am ruled in contempt of court and jailed on that. Oh Loverly!
  • by Anonymous Coward on Tuesday September 28, 1999 @09:59AM (#1652940)
    One could make a strong arguement that the forcing one to divulge crypto keys IS a violation of the fifth amendment. In the US you have the right to not give ANY information that can incriminate you in a criminal case. You can not be compelled to testify against yourself. If a key is considered information, you can't be forced to give information that can incriminate you. Period. When you get arrested in the US you must be read your Miranda rights. The first of whice is "You have the right to remail silent." That means shut the fsck up! If you're innocent, they have to find evidence that proves otherwise. You have NO obligation to give it to them. The prosecution can't subpoena you to testify at your own trial. They can hit you with warrants and subpoenas all day long. You don't have to give them squat. If you have a padlock on your shed (yes the one with the bodies) they can't force you to give them the combination. They have to either hire a locksmith to get it or break in. They can legally break into that shed. Just as they can legally attempt to brute force your crypto. >>Sure the cops should be able to gather evidence, but they should have a warrant first. (The easy of getting a warrant is another issue, that deals with judical oversight (or lack there of).) The warrant would only give them the permission to legally attempt to crack your crypto. Nothing more, anything else would be unconstitutional. >>Personally I have no problem with the cops forcing me to decrypt a message. Then you don't get it. You can't be compelled to give ANY information that you don't want to. >>I don't like it, but it's no different than forcing me to unlock a safe. In the US you don't have to unlock your safe in a criminal matter. They can break it open, but you can't be forced to open it. They can brute force crack your crypto, but you don't have to give them anything. Know your rights under the US constitution, or kiss them goodbye. Anonymous because on this one I want to post AND moderate.
  • I always knew Mr. Bean was a scumbag.

    - A.P.
    --


    "One World, one Web, one Program" - Microsoft promotional ad

  • If I keep all my encrypted files on my ISP and access them remotely (though ssh), am I in possession of them?

  • Thesaurus.com [thesaurus.com]. Also, see Dictionary.com [dictionary.com].

    --
  • I suppose the whole "Miranda rights" thing is used to be sure you don't "accidentally" testify against yourself, so I may not be entirely accurate when I say "witness" has been interpreted to mean a court testimonial, but the rest of my argument still stands.
  • Huh? Again, this has nothing to do with testifying against yourself. Allow me to quote from the 5th amendment directly, since you seem to have never actually read it:
    http://www.constitution.org/ [constitution.org]

    No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use without just compensation.

    "To be a witness against himself" has always been interpreted by the courts to mean a testimony in a court of law.

    Cops aren't *asking* you anything but administering a breathalizer test. You aren't *giving* them information by allowing it. You are simply allowing them to *collect* information, similar to when a cop searches you for weapons.

    Constitutionally, this is *perfectly* legal. If you have any doubt about this, please by all means consult a lawyer. If ANY law in your area is unconstitutional, it's your OBLIGATION as a citizen to have this law contested and repealed.

    Every time I hear somebody say "this is yet another example of laws passed that are unconstitutional," I just get this knot in my stomach. If your local legislature is busy passing laws that are *actually* unconstitutional, your local government has some serious problems and needs to be fixed or overthrown ASAP. (I recommend the former.)

  • Exactly, but this isn't a US law. I was making the comparison to show why it wouldn't qualify for 5th amendment US protections. Citizens in the UK have no such protections (well, not like ours is set up at least).

    A law like this would not be passable in the US without suitable alterations.
  • I disagree. There's a very definite, legally acknowledged difference between a potentially self-incriminating statement or testimonial and allowing/forbidding an officer to investigate.

    It's like a cop saying, "Hmm, that person lying in front of you appears to have been stabbed. Oh, my, is that a knife you're hiding behind your back? May I see it please?" You can't simply plead the 5th (or the 4th) and refuse to turn the knife over.

    I'd suggest you consult a lawyer if any of this is unclear to you. He can probably better explain it than I can.
  • In cases like these, a breathalizer isn't considered an "unreasonable" search. Like I suggested elsewhere, you should probably ask a lawyer about all of this. He can probably explain these things better than I can.
  • IANAL, but after studying some of these URL's you gave me, I've come to the conclusion that these people aren't lawyers either.

    I can't even hazard a guess why this is necessary, but I imagine it has something to do with the local government's ability to govern its citizens. By surrendering absolute ownership (you still maintain ownership in "cooperation" with the state, as I understand it), this gives the state the ability to do things like impound your car if you break laws, etc. But along that line of thought it would then be illegal for the state I'm in now to impound my car, since it's still registered in my last state of residence. So again, I'm not quite certain what all of this means.

    It would be nice to get a lawyer's take on the matter.

    In any event, all of the URL's you quoted deal with vehicle registration and the certificate of title, not driver's licenses or "invisible contracts". The third URL simply quoted a bunch of text from various decisions without giving any sort of background on the cases. For all you know these cases could be about bus terminals and airports barring a person from travelling without sufficient reason, which naturally would be illegal. (I just happen to notice that a couple of the defendants were names like Dulles (the airport?).)

    In addition, International Driver's Licenses are only valid in member countries EXCEPT the country of origin. Thus, feel free to get an IDL, but it won't do anything for you while you're in the States.
  • by Fastolfe ( 1470 ) on Tuesday September 28, 1999 @09:44AM (#1652950)
    You're not testifying. You're permitting law enforcement access to information. In the US, refusing would be equivalent to not allowing law enforcement access to your home, in spite of the court order/search warrant.

    This has nothing at all to do with 5th amendment protections against self-incrimination.
  • You're right about FUBAR except for the R -- I believe it stands for Recognition, not Relief. FUBAR = Fucked Up Beyond All Recognition.
    -----
    New E-mail address! If I'm in your address book, please update it.
  • Ever since it was decided that being compelled to give blood/saliva/urine/etc. is not a violation of a person's 5th ammendment rights, I have been worried that the right to not self-incriminate is on its way out (along with the rest of the Constitution).

  • Just another example where the canadians seem to be exceptionally sensible. Know of anyone who needs an experienced UNIX geek there?
  • Geesh. What is it with me and homophones lately. Ugg. "Are writes".



    Shoulda hit that preview button.
  • You're right. And as a libertarian, I know better.

    Man, I really should have hit the preview button on that comment.
  • Oh. Don't get me wrong -- I fully recognize that sometimes are writes are written in dry sand on a windy day.

    I just think its a hell of a lot better to have enumerated, hard to modify rights than to have the kind of wishy-washy mishmash that the British have. My impression is that Parliament could turn GB into a totalitarian state tomorrow and that nobody could do anything to stop them legally.

    I think that is the peculiar genius of the american constituion: checks and balances, combined with two layers of law (i.e. statutory law and constiutional law). One is easy to change, and so we can adapt. The constitution is very difficult to change -- it is the bedrock of our society.

    What scares me is the courts: they have grown more and more liberal. If they go south, then we may as well kiss the constitution goodbye.
  • Geesh. What is it with me and homophones lately. Ugg. "Are writes".

    Shoulda hit that preview button.
  • by Amphigory ( 2375 ) on Tuesday September 28, 1999 @09:20AM (#1652958) Homepage
    That's what I love about the British -- on average, they are much better spoken and written than those of us on the western side of the Atlantic. They also have a gift for poetic understatement that is probably one of the funniest things on the planet.

    But I wouldn't want to live there. In the US, I could challenge such a bill on a number of constitutional grounds. I could claim that it violated due process, unreasonable search and ceisure, freedom of speech, and unnenumerated rights such as privacy. It wouldn't last six months (much like the late CDA did not). However, my understanding is that in Britain their are no such consitutional protections -- don't I remember hearing that they don't even have a formal consitution?

    On /., a lot of people criticize the US. And that's a good thing: there are many areas where the US deserves to be criticized. But let's not forget that in some areas at least we are far ahead of the competition.

  • No, the UK does not have a freedom of information act. The government promised one when it was the opposition, but AFAIK the current proposals are so watered down as to be effectively useless.
  • If you loose the key - you're foo bar'ed.

    I'm really having a hard time understanding the point of this law: If I'm a terrorist, am I likely to be coerced by two years jailtime into revealing a key that will decode messages that will land me in jail for life? Terrorists may be stupid, but I doubt that they are THAT stupid.

    On the other hand, if this were rigorously enforced, you could (anonymously of course) send people you dislike a random block of data and tip off the police that they have encrypted messages pertaining to a crime....
  • by kraut ( 2788 ) on Tuesday September 28, 1999 @09:16AM (#1652961)
    Basically this relates to tipping off people about communication interception being illegal. I.e. if the police demand that you decrypt the email I have been sending you, you can't tell me (or anyone else) about it - otherwise it's straight to jail without passing go.

    In itself that is fair enough - after all you don't want to allow one of the proverbial peadophiles/drug traffickers/international terrorists to tip off their colleagues. What is insidiuous is that the government under the current proposals will not be required to reveal the interception / decryption request even after the fact - not even in summary form. In other words, the government can claim that this law is very effective in preventing crime without ever having to prove it ...

    I don't usually subscribe to conspiracy theories, but this is beginning to suck. But at least we still have the European Court of Human Rights to fall back on.
  • I can just see it now. This bill passes in Parliment. Some terrorist organization decides to do some digging and gets a list of every wired citizen in the UK. Said terrorist organization sends an email with a PGP encrypted text to each wired citizen and then throws away the key. Every wired citizen is then a criminal and must be prosecuted. If the police do their job and the courts to their job, every wired citizen in the UK goes to jail for a number of years, and a big sucking sound is heard where a large part of the UK's work force used to be... What a moronic piece of work... If the police and courts don't do their jobs, the UK government is seen as hypocritical or negligent for not enforcing the rule of law, which is the foundation of a civilization and nation.
  • A really incredibly well done article. The photo essay was wonderful, I laughed so hard... Hopefully further articles/letters like this will help convince governments to adopt logical legislation about internet and cryptography legislation. Very nicely done, Stand.


    -David Ziegler
    -dziegler@hotmail.com
  • [about the United Kingdom]
    We are subjects, not citizens.

    AFAIK most people living in the UK are British citizens. A subject is someone governed by Britain, but not entitled to a UK passport. This mostly means people in the leftover bits of Empire which are too tiny to govern themselves. I believe there are moves to grant these people citizenship, or at least the right to live in the UK.

  • In the US, I could challenge such a bill on a number of constitutional grounds. I could claim that it violated due process, unreasonable search and ceisure, freedom of speech, and unnenumerated rights such as privacy. It wouldn't last six months (much like the late CDA did not). However, my understanding is that in Britain their are no such consitutional protections -- don't I remember hearing that they don't even have a formal consitution?

    The British constitution isn't written down in one place as a big document. It's an accumulated mess of laws, conventions, legal precedents and so on. I am not a lawyer, but I'd guess that a judge might decide that a prosecution brought under the Bill was not valid, because of the principle of 'innocent until proven guilty'. This is just a guess of course, and if Parliament wanted to pass a law stating explicitly that everyone is guilty until proven innocent, they could do so.

    There is the European Convention on Human Rights, which is due to be incorporated into British law. Until then, cases get taken to the European Court of Human Rights (I think) who will rule on things, which requires (in practice, if not legally) the law to be changed. For example, the recent ruling [bbc.co.uk] over homosexuals in the armed forces.

  • There is something very satisfying about this. This is an excellent, textbook quality example of how to make one's point on the net. That the issue is important is just gravy.

    Warmest Congratulations to the parties responsible.

  • "Of course not.. It was Al Gore. ;)"

    Some would claim it was Bill Gates.

    Actually, it was both.

    The explanation of how it is possible that they both invented the same Internet independently of each other is a complex one the relies on several principles of Quantum Mechanics, a rare alignment of two distant stars and our planet, and the religious theories of a race of hyper-intelligent mice living in a space station orbiting Venus.

    But trust me, it's the truth. :)
  • I may be talking out of an unnamed oriface here, but the fifth amendment doesn't apply if you're asked to provide information which incriminates someone else...i.e., the person could be required to hand over info which incriminates Mr. Clinton, but not info which incriminates herself. At least, that's how I understand it. Plus I think that the case you are talking about was a grand jury investigation, which has somewhat different structure than a regular court.
  • I don't know about the UK laws and bylaws, but the US constitution specifically forbids self-incrimination -> ie. you can't be forced to testify against yourself. Obviously handing over your crypto keys would constitute self-incrimination and thus falls under 5th amendment protection.

    Does the UK not have similar protections for it's citizens?

    --

  • To quote a famous American, that the crown in England is less tyrannical than that in Turkey is due to the constitution of her people, not that of her government. I think the value of written contitutions is overdone. Look at South America, then look at Britain, and tell me where you'd rather live.

    Britain is a constitutional monarchy because in effect the monarch has no power to raise money without parliament, so in fact it is parliament that has the power. That goes back to James I (of England, VI of Scotland).

    Having said that, I agree with you that the way Britain is run could use a little modernisation, and that writing down how its meant to work would be quite useful, and I'm right with you on the ECHR, except that reform of the Law Lords really needs to be tackled first.
  • Careful with this strategy. In addition to losing your license, you will get all the benefits of Probation, where you get to go to jail if you ever
    test positive for marijuana, for instance. And Insurance? Probably won't be able to get it, or
    you'll need a special expensive kind. And the thing that floors me, in Texas anyway, is that it's a severe impediment to renting an apartment.
    No apartment on the Texas Apt Assn. will approve your lease if you've had a DWI or drug possession
    *arrest*. Not a *conviction*, mind you. An *arrest*. I think I'm more afraid of the corporate entity than I am the government.
  • Speaking of Net Dot Activism:

    There are plenty of things (e.g.: this, the 3-lines-of-Perl RSA sig, the publication in exportable book form of the PGP source code) that fall somewhere between protest action and Gedankenexperiment.

    There should be a catchy generic name for these sorts of hijinks. Anyone care to step up?
  • Not necessarily - the file would have to be big enough to contain the porn pictures, the issues of Phrack _and_ the 'other information'; all they would have to do would be to recompress the porn and phrack and get a smaller file size and they could show by implication that there is more to the original file than meets the eye. It's enough to cast 'reasonable doubt' on a case. The only way out of this would be to invent a compression algorithm that wastes space, but who'd use that? Personally I want my Zip files to be as small as possible and I see no reason to adopt a deliberately lossy format just to protect criminals. Or am I looking at this the wrong way? Should I adopt a deliberately lossy format to protect my freedom? This in itself suggests I have something to hide.
  • So the original message was how to bankrupt Threadneedle's Old Lady? It gets encrypted with one-way encryption - hey presto, end of message. May as well have shredded the original document.
  • Imprisonment for not retrieving the key is where American and UK law start to diverge. INAL, but I belive the governement can still imprison you under some sort of conspiracy law...

    Wouldn't this fall under some sort of 'obstruction of justice' type law?

  • e-terrorism is an IBM e-business.

    Humor alert. Attempts to paradory IBM's "e-whateverthefuck" campaign.
  • Has anyone developed an encryption scheme where you can decrypt your file with either of several keys, and each key will decrypt the file to a different plaintext file?

    Then, when the police come knocking, demanding that you turn over the key, you can give them the decoy key, which will decrypt the file to something innocuous. (a letter to your Mom, maybe)

    Then the police move on, thinking there is nothing there, and stop harrassing you, and your "real" message is forever safe. Problem solved?
  • Not exactly. To go back to shed example it would be as if the shed were impenetrable. The police have no way in without your cooperation. Without access to the shed they have no proof and would have to let you go. This law would extend the warrant to allow the police to throw you in jail if they DON'T find anything.

    An example of possible abuse would be if you just happened to have a shed with a good lock. The police note this and come around demanding to see inside. You procede to tell them to fsck off. They throw you in jail for 2 years, no questions asked. If you try to complain, make that 5 more years.

    Not the greatest system. Unfortunately executing search warrants on encrypted files is a very real problem, there has to be an answer but this isn't it.
  • Nope, sorry, that doesn't hold true necesarily. It is not clear yet whether private keys fall under 5th amendment (to politicians at least, it seems crystal clear to me).
  • Anonymous Coward Writes:The philosopher Austin wrote a very nice book ( How to do things with words) about precisely these sorts of "powerful" words, which he calls "speech acts" though in practice they may be written or spoken. It is certainly interesting to consider when and how digital communication may constitute new forms of speech act. Has anyone seen anything written on this?


    Insightful and well-read for an AC! Yes, in fact, I was referring to Austin and Searle and a few others in my treatment of the post on Word Power. And I've written a small paper [utexas.edu] on how action words work on-line, and my thesis [utexas.edu] has a chapter or two on it.

  • This reminds me of a /. post from earlier this year about the problems with distributing some highly revered religious texts (The Torah, IIRC) over the Net, in that copies cannot be destroyed without the appropriate ceremoney, etc.

    The power of words and information is becoming increasingly tangible--here with this letter to Mr. Straw, with the Torah, and in similar things, like signs that say "Warning: Narrow Bridge" which perform actions of warning by sitting there looking yellow.

    Expect some changes in general thought about words being 'just words' in everyday parlance. It's already in philosophy and has been most of the century.
  • Yep, we're going from an age where everything must be encrypted, to an age where everything must be steganographically encrypted.

    But steganography requires noise to hide in. Here I was, all happy that higher bandwidths, larger storage devices, etc. are becoming cheaper and more available, and now I realize that I'm going to have to use ten times as much of it, just to break even.

    It kinda reminds me of the CPU advances vs bloatware situation. People are able to opt out of that by not using bloatware, and thereby ride the hardware technology wave. But will not using stegano really be an option?


    ---
    Have a Sloppy day!
  • by th0m ( 16656 )
    excellent stuff. stand.co.uk is doing an absolutely fantastic job of what could potentially be rather lame and fruitless Net Dot Activism.

    where would we be without danny o'brien, eh? erm, probably doing more work on friday afternoons. that's where.
    ----

  • for('activism','terrorism','protest','action','pol itihack'){$a =$_;for('cyber','e-','i-','net.','meta'){print;pri nt$a."\n"}}
    ----
  • Well wait... that wasn't the scenario. Perhaps you did nothing wrong at all, and there is nothing in the encrypted message itself that would be 'self incriminating'. There is secret information in the file, and the authorities want the information in order to pursue someone else, not you.

    You couldn't claim 5th amendment protection if the information they are after isn't about you to begin with.

    Which leaves us back at the beginning, you are in violation of the law simply for failing to surrender the key.


    -Helping Satan Daily, in small amounts
    Satan's Little Helper
  • My passport says im a British Citizen, they got rid of the 'British Subject' bit sometime in the 80s

    Also loving being British
  • Actually, this campaign season appears to be an unusually good one in that both major parties have candidates that are reasonably intelligent, thoughtful, and independant-minded. I'd be happy if either of them got nominated (McCain or Bradley), even though I don't agree with them in all cases. I'd be ecstatic if by some stroke of magic _both_ of them got nominated.
  • by aphrael ( 20058 ) on Tuesday September 28, 1999 @09:12AM (#1652989) Homepage
    Depending on how "possession" is defined, it would seem that this bill essentially requires providers of hosting space for web pages to have access to the private keys of any encrypted data that they are hosting.

    Not a good thing for the relationship between web hosting companies and their customers, I would imagine.
  • The government doesn't need to charge you with conspiracy. They have a nifty system in place already if you don't cooperate. They just charge you with contempt of court and throw you in jail for an indefinite amount of time. It happend to one of Clinton's supporters in the Whitewater investigation. She (I forget her name) refused to turn over some documents and was in jail for a number of years.
  • The 2600 article is in V15 #3, Fall 1998, by "Phunda Mental", pp 20-22. It points to the following references on the web:

    A Ron Rivest paper [mit.edu]

    and a postscript document on deniable encryption by Canetti, Dwork, Noir and Ostrovsky. [mit.edu]

    Happy hacking!

  • by brad.hill ( 21936 ) on Tuesday September 28, 1999 @11:35AM (#1652992)
    You could probably look it up in the library. I found some abstracts on AltaVista by Ran Canetti, Cynthia Dwork, Moni Naor and Rafi Ostrovsky.

    There was also a short piece on it in 2600 a few issues back, I think in enough detail to implement it if you know basic crypto programming. I think it mentioned some prototypical crypto-stego filesystems already available that use this idea.

    IIRC, you divide the cyphertext into blocks, which are either chaff or real data. You use the key to scan along, decoding blocks until you get a decrypt that checks out, and then that block has some of the data and the key to the next valid block. Thus, depending on what key you start with, you can pull out any one of many embedded plaintexts. You can set the ratio of chaffing to be whatever you want, but it generally needs to be pretty high for it to be truly effective. I think, for example, that if you wanted a secure 2 GB filesystem, you'd want an 8 GB disk, with 2 GB of filesystem, 2 GB of alternate plaintext and 4 GB of random chaff. Not very effective or fast, but when you need to be secure...

  • by brad.hill ( 21936 ) on Tuesday September 28, 1999 @10:01AM (#1652993)
    There are systems out there that use "deniable encryption". They chaff the data to a high degree, and allow you to encrypt multiple messages within the same cyphertext using multiple keys.

    So if Mr. Fed demands a key, you give him one, and it pulls a couple of porn pictures and some old issues of Phrack out of the cyphertext. You gave him a key, it produced plaintext from a cypertext- get out of jail free.

    That there's another key that decrypts entirely other information from the file is impossible to prove, due to the chaffing.

    Any sensible criminal would just use this type of encryption.

  • That wouldn't work. It would be basically the same thing as having a key ring full of keys, and you don't know which key goes to which body-stuffed shed. The police would just demand the key ring and do the search themselves.

    This wouldn't provide any security if you made the key ring larger (ie, a portion of the keyspace), either. If you can access your data without knowing the key, you can bet the police can.

    I think this is a really good hack on the part of STAND. In fact, I think that if the law is enacted people all across the UK should commit their favorite crime, encrypt a confession, and send it to their MP.

    Getting around laws like these with technological hacks (ie, chaff-n-winnow) is the wrong attitude to adapt. We should be fighting these laws instead of finding ways around them.
  • To answer two questions:

    > don't I remember hearing that they don't even have a formal consitution?

    No we don't, and some of us are quite annoyed about it!

    You may hear the UK described as constitutional monarchy - this dates from (I think) when William of Orange was installed as King; the 'constitution' said "You can be King, but these are the limits on your powers" In other words, the only constitution in Britain is to do with the Crown, not the people.

    We are subjects, not citizens.

    Secondly...

    > In the US, I could challenge such a bill on a number of
    > constitutional grounds. I could claim that it violated due process, unreasonable search and
    > ceisure, freedom of speech, and unnenumerated rights such as privacy.
    Britain should be in a better position in this regard shortly, when the European Convention on Human Rights is incorporated into our legal system (can't remember when exactly... beginning of next year?)

    But that's jam tomorrow - better not to pass such crap encryption legislation in the first place.
    --

  • What scares me is the courts: they have grown more and more liberal. If they go south, then we may as well kiss the constitution goodbye.

    More and more liberal? Geez. Without going off on a rant, I'd like to point out that throughout American history, many self-described liberals have been the fiercest guardians of Constitutional rights. Without getting into an argument on political terminology, might I suggest that it may be more appropriate to say that courts may have grown more and more disrespectful of constitutional law (or alternatively, civil rights) rather than just saying they're becoming "liberal" (as there's a significant difference between the two).
  • Your brain. Lovely little thing, isn't it? You have every expectation that the thoughts contained therein are yours alone, and you don't have to account for your thoughts to anyone, only your actions. Thoughts hurt no one by themselves.

    Your hard drive. When you can't readily remember everything, you use your handy dandy computer to store it. At this point you have various expectations of privacy, but chances are anyone encountering a file that is encrypted will realize that it isn't for them to see.

    Freedom of thought is an individual right, and it is no one's business but the thinkee what is being thought about. But like the schoolyard bully, the powers that be do not wish to be humbled by anything beyond their purview. Encryption is just one of the many tools available to the individual to protect this absolute right against oppressive forces, whether or not they operate under the banner of law.
  • *BZZZT* sorry. Here have some Rice-a-Roni (The San Fransico Treat).

    (I already stated this a previous post, but let's recap)

    Say you kill your wife and kids and stash their dismembered corpses in The Shed Out Back. Since you don't want Lil' Jimmy to come by and open the shed and be covered by an avalanche of dismembered arms and legs, you put a lock on the shed door. (One of those REALLY good locks. Like a Kryptonite-Master super lock. (Takes 6 years to break through with a hacksaw and you can put a bullet through it, without breaking.)

    The neighbors get noisey (afterall they're neighbors) and eventually call the police syaing your wife and children have been missing ever since that night of screaming, gunshots, and buzzsaws. So the cops drop by with a search warrant and say, "Hey, open up the shed." and you say, "Fuck you pig! If I did that I'd be self-incriminating me!" Then the courts hold you in contempt until you comply, or the cops finish sawing the lock off in 6 years, whichever breaks first.

  • Yes, the act of not cooperating would be obstruction of justice/contempt.

    The conspiracy charge was only hypothetical if the Government decided, "Aw hell. We can't get him with on this with out the evidence. Let's see what we can charge him with....how about conspiracy?"

    Of course it's MUCH more likely that they'd just let you rot in jail until you gave in. (Whether you're in jail for 20 years for contempt of court, or 20 years for the actual crime, it doesn't much matter to the Government. (Of course if you do cave in 20 years, they'll be more than happy to keep you in the can for 20 more years because of the original crime.)
  • The problem is that any mechanism that allows the cops to intercept your communications and use them against you as part of a valid law enforcement effort may also be used by non-police.

    That's not exactly true. I can't tap phone calls.

    What's to stop me from alleging that a business communication from one of my competitors contains evidence of illegal activity, then bribing the law enforcement officials to disclose the contents to me, thus gaining a competitive advantage?

    That is HIGHLY illegal, and anti-corruption laws already exist to keep you from attempting to do this, and for the police from fullfilling your request.

    Would Nixon have needed to send burgulars into the Watergate Hotel if he could simply tell the NSA to retreive the DNC's keys from key escrow, and intercept all their communications?

    Again, that's corruption, and abuse of power. Anyway the whole point of the burgulry was to hide the fact that the Whitehouse was involved.
  • by coaxial ( 28297 ) on Tuesday September 28, 1999 @09:30AM (#1653001) Homepage
    First off, I'm an American, so I don't know jack about the civil rights one has in the UK. I do know this, they're not enumerated and can be withdrawn by an act of parlament. (Just one of the many grievences that led to the American Revolution.)

    Since I've already admitted that I'm not qualified to speak about British law, let's suppose that this law was passed in the United States. (Which isn't unlikely.) This law would be perfectly legal. When the government suppeanas information from you via a search warrant, you have to give it.

    Turning over a crypto-key is no different than turning over the key to you shed where you stashed the dismembered corpses of your wife and children. (Claiming privacy for stashing a body doesn't cut it, and it doesn't for encrypting a document either.) It doesn't violate the 5th amendment (Freedom from self-incrimination, for all our non-American friends) because it's evidence gathering, not testamony.

    Imprisonment for not retrieving the key is where American and UK law start to diverge. INAL, but I belive the governement can still imprison you under some sort of conspiracy law, but I'm not sure. (I really don't know alot about conspiracy law, except that they only have to prove intent, which has a very low threshhold. Also they don't need physical evidence, (thus the "Conspiracty to ______" charge rather than for "_______ing".)

    I understand law enforcement's predicament when it comes to crypto, but it's no different than any other civil-rights vs. law-enforcement issue. Basically the crypto-issue reduces down to Search. Sure having cops rabndomly raid someone's home will prevent crime, but is it to much of a price to pay? Sure key-escrow/recovery will allow the cops to evesdrop on you and the criminals, but is it too much of a price to pay?

    It's a classic predicament, and there isn't an easy answer. A long time ago, society decided "No, you can't let the cops barge in and search. They need warrant to do that." Later society decided, "No, you can't just let the cops evesdrop on phone conversations, they need a warrant to do that." Sure the cops should be able to gather evidence, but they should have a warrant first. (The easy of getting a warrant is another issue, that deals with judical oversight (or lack there of).)

    Personally I have no problem with the cops forcing me to decrypt a message. I don't like it, but it's no different than forcing me to unlock a safe. (However. I would kind of like to see the FBI crack the crypto.) I also feel the US crypto-export laws should be repealed, because they're completly ineffective against curbing the spread of strong crypto, and only serves to hold back the software industry and e-commerce.

    --
    The following was just random line noise.
  • I would respond, but I'm not running windoze and therefore don't have easy access to my thesaurus, but I think the phrase you're looking for is "work-around". Or something like that... :)
  • by PigleT ( 28894 ) on Tuesday September 28, 1999 @09:24AM (#1653003) Homepage
    There are several interesting clauses in it, to my eyes, to be found at http://www.dti.gov.uk/cii/el ec/ecbill_part_III.htm [dti.gov.uk] onwards.
    In particular, I notice sections 10 (2) where (a) and (b) might give grounds for defence / opting-out, but "require" towards the end stamps on our freedom & privacy.
    (3) (b) seems to allow for any means the requirer sees fit - I wonder what happens if they choose PGP-signed mail?

    (11)(2) and (3) appear to leave a loop-hole; if you're required to release information believed to be held under a key system, might you only have to release "useful information" ('in an intelligible form'), not necessarily the *actual* information you've encrypted.

    Big deal? Why've I gone to the trouble of looking all this up?
    Because while it will only apply if the police demand it, which will probably only happen if they suspect you of something, the problem is that if we don't *exert* the basic human right to *privacy*, then someone will trample all over it later and you'll wake up powerless to fix things.
  • ... putting it right next to the "spelling" and "grammar" check buttons. :^)
    Bob knows we need it!



  • I'm fairly anti-republican, but I admit to having respect for Fred Thompson. He was put in charge of investigating campaign contributions to the democrats and seeing if there was any hanky-panky. The problem came when he said he was going to be evenhanded and look at the republican campaign finance records. You should have heard the massive protests the Republicans put up when they heard he wanted to look in their cookie jars.
  • I could challenge such a bill on a number of constitutional grounds. I could claim that it violated due process, unreasonable search and ceisure, freedom of speech, and unnenumerated rights such as privacy. It wouldn't last six months

    Start getting ready with this challenge, since the terms of this bill are nearly identical to those proposed for US law in the SAFE Act [loc.gov].

    It requires that you must provide keys when demanded by law enforcement, provided they get a search warrant within 90 days (but only if they use it in court), and that you not tell anyone that you have decrypted anything.

  • Ottawa appears to be a computer industry hotbed (eg. Ottawa Linux Symposium). A lot of tech companies are there, including IBM.

    Here's a good site (remember that US$1 = CAN$1.50):

    http://www.canadasearch.com/jobsearch/emp loy.htm

    Personally, I like the Halifax area. They have a great music scene and people are actually nice. It's not too expensive to live there, either.
  • Just because government calls it something new doesn't mean it is. Words have meaning independent of their official use in propaganda. I suspect your relation to your government is fundamentally the same relationship it would've been before they "got rid of the 'British Subject' bit" and you're only fooling yourself to think otherwise.
  • (Yes, I'm American)
    I would suspect not, at least not officially. I am a citizen of a constitutional government of constitutionally limited powers. He is the subject of an omnipotent and unbridled parliamentary government. There are things that my governmetn cannot constitutionally do to me (like strip me of my citizenship, see Trop v. Dulles). His government is completely sovereign over every aspect of his life and his affairs with others. There is still officially a monarch at the head of his government, and that monarch has a non-zero amount of actual power.

    These are very different relationships.
  • The consensus seems to be that digital representations of the words are not actually the words in the same way that analog ink-based writings are the actual words. Your point remains valid, though.
  • I've been supporting Stand for a few months now. It's fairly painless work - just add a few lines to your webpage. They guess we'll have to send a letter to our MPs when the time comes, but that hasn't happened yet.

    There are already a lot of MPs "adopted" into the scheme, so when the time for action does come, it should guarantee that a lot of politicians at least hear about the situation.
  • This is not legal advice... But I don't think you have to give them the combination to your shed here either. The difference is it may be in your best interest to give them the shed combination even if your are guilty. On the other hand you probably are better off fighting a 'obstruction of justice' case than a full criminal charge if the evidence they need to convict you is in the email. With the shed your not going to stop them from getting the information and the last thing you need is another charge but with the email they may not be able to get the critical info if you don't help them.
  • Actually, In both states I have lived in you can refuse the tests. The state then has a _MUCH_ weaker case. If you refuse the test then it is an instant suspension of your license for 6 months (if I remember correctly.) The bottom line is if you are going to fail the test then don't take it!!! The evidence then becomes stuff like 'the officer found empty bottles in the back of your car and smelled alcohol on your breath after pulling you over for driving funny' which is much easier to avoid (put the bottles in the trash and eat a lot of really strong breath mints). Of course if you refuse the test then you automatically get a night or two in jail along with your suspension, which you would get if you failed too.


    This isn't legal advice either and may vary in other states.
  • IANAL and I know absolutely nothing about British, European or Internation law, but a little searching turned up this. http://www.stand.org.uk/index-update2. php3#top [stand.org.uk]

    Part III Investigation of Protected Electronic Data

    The spooks' charter. Here any policeman could show up with some encrypted data and an order to provide the decryption key. If you refuse you go to jail for 2 years. Usually they won't need a judicial warrant; sometimes they won't need any sort of warrant at all, just their say-so.

    The problem is that if you don't actually have they key it is up to you to prove that. If you deleted it, or if you never actually had it, you're in trouble. If the authorities reckon you've got it stashed on a floppy buried in the flowerbeds at Hyde Park Corner, go directly to jail, do not pass Go, do not collect £200.

    How can you prove you don't have something? Try slapping your forehead in a manner likely to convince the judge.

    The other new power here is that the authorities can order you to keep the disclosure of your key a secret. If you tell anyone at all you'll be going down for up to 5 years for "tipping off". Not only is this disasterous for information security, but it even stops you complaining about unfair treatment. Toddle off to court to demand judicial review of the order to disclose and all you'll get from the Judge is an extended stay in Her Majesty's finest accomodation because telling the judge is illegal!. There is a tame Tribunal to hear complaints and cover them up; you aren't even entitled to legal representation at it.

    STAND says, poetically: How does Part III breach the Human Rights Act, let me count the ways... Unfair offences, reversal of burden of proof, defences that are logically impossible to prove, a wholly inadequate complaints procedure with no appeals, unneccesarily broad powers, potential to force you to incriminate yourself, the list goes on.

    The police need something to help them to decrypt data in certain circumstances (and not in others). Part III is not it. Parliament should delete this Part and try to come up with something better when it replays the Interception of Communications Act next year. If it doesn't throw this Part out, the European Court of Human Rights will.


    Sounds to me like they do have some sort of legal leg to stand on. (With the European Court of Human Rights?)
  • The letter is absolutely excellent reading, but I'm wondering about the first sentence of the sixth paragraph:

    "If the police ask you keep the demand to hand
    over the key secret, telling anyone would
    render you liable to 5 years in jail."

    Perhaps somebody on the other side of the Pond could clear something up for this rebellious colonist. :-) What's to keep /every/ such key request from being "secret"? Is there provision in the bill such that certain extra circumstances must prevail in order for the demand itself to not be publicized?

  • It would seem that to enforce a law like this, law enforcement would have to first prove you were in fact in possession of encrypted data.

    It's not too difficult to create a PGP like utility, that produced files without headers, consisting of a single, inscrutable globs of zero entropy data.

    Such a file might bear a striking resemblence to ones used in the random number generation experiments, data compression tests, and background radiation measurements we will all be conducting real soon now...:)
  • Agreed that this is a beautifully thought out protest.

    Your tone about how great rights are in the US strikes me as a bit complacent however. British rights against governmental intrusion, and the poor defence of free speech are poor, rooted in an odd view that these aren't really matters of government at all. However the British track record on rspecting the paper rights that exist are better guaranteed than in the US. Also the US has extraordinary archaicisms existing (and occassionally enforced) at the state level. Check out the ACLU website and weep. I would say that overall, Germans have better rights in practice than Americans. [aclu.org]

    Lastly, the merits of of a formal constitution are easily overrated. Russians had excellent constitutional rights in th 1930s, and they weren't worth an awful lot.
  • Yeah, you're right of course, and I was kidding. An analogy I heard once went something like this:
    Son: "Father, what is the difference between Deomcrats and Republicans?"
    Father: "They are alike in many ways. Both are like fat slobs gorging themselves at a lavish banquet."
    Son: "Then what makes them different?"
    Father: "The Democrats make a point of throwing scraps to the peasants at the door."
    And even that is simplistic and inaccurate, but it always cracked me up all the same.

    Oh well. At least there's Ralph Nader and the Green party. And Michael Moore, if he could ever be drafted to run for office.

    Actually, here's a suggestion, kids -- support third party candidates, whatever your political slant is. If everyone went by the best candidate, and not the one more likely to keep you placated given the choice between options A and B, maybe we'd end up with a smarter, more dynamic government, where boneheaded laws like this wouldn't be so likely.

    Interesting idea, no?



  • I found the Citizenship & Immigration website. Here is the link [ci.gc.ca] to some useful info.

    The way I read it, you are assessed an elligibility score. You need a total of 70 (out of 100 possible) points, if you are fluent in both French & English, you get 15 points, if you are fluent in one of them, 9 points. Contact C&I for details about how the points are assessed, but it looks as though it is relatively easy to qualify, especially if you are young, have a degree (or other post-secondary training) or job experience in the computer field.

    Hope that helps (and wasn't getting to far off topic)

    Dana
  • by DanaL ( 66515 ) on Tuesday September 28, 1999 @09:49AM (#1653036)
    Time and time again, I get to think, "Yay, I live in Canada". Here is an excerpt from John Manley (Canada's Industry Minister) outlining his governments crypto policy:


    The policy allows Canadians to develop, import and use whatever cryptography
    products they wish and does not impose mandatory key recovery requirements or
    a licensing regime. "This policy is good for the Canadian economy," said Minister
    Manley. "It supports the increased use of electronic commerce products and
    services in Canada, as well as the export of Canadian information technologies to
    other countries."


    Wow! A consumer/industry friendly approach! The full article is here [ic.gc.ca]

    Dana
  • The REASON its legal is because your driver's license is a contract. You might want to research "invisible contracts."

    You CAN drive without a license. Search for "the right to travel." Here are some links to get you started:
    http://teaminfinity.com/~ralph/dl.html
    http://205.218.170.194/www.svpvril.com/vehicle.h tml
    http://www.lvdi.net/~willys/travel.htm

    Also, check out "Manufacturer's Statement of Origin." Specifically, why does the DMV want you to submit one, and they give you a "title" back?
    i.e.
    http://www.geocities.com/CapitolHill/Senate/4417 /vehiclecertorig.html

    If you don't want to be harrassed you can get an International Driver's Permit.

    Cheers
  • The SAFE act does update U.S. law in its application to technology. In effect, an encrypted (locked) file containing, for example, a list of drug distributors compiled by the local drug lab, will be treated the same as a locked closet or safe containing that same information. A search warrant is still required.

    The prohibition on telling anyone is the same as in any other criminal investigation, it does not simply apply to encryption. You are generally guilty of interfering with a criminal investigation if you go telling people (your "known associates") that the FBI searched your house. The courts have rarely applied this to talking to a reporter or any other figure as long as it is clear that the subject was not trying to interfere with an investigation.

    If the cops come to your house looking for someone, and you call that person after they leave and advise them to flee, your are guilty of obstructing justice, even if that person is later found innocent. This is the same idea.

    That all being said. This is a ridiculous law, like many English laws regarding individual rights. They may have lit the first candle of some of these concepts in the modern era, but they have pathetic protections in the areas of Speech, Press, arrest and detention, civil procedure, and state security. That a society with such strong traditions fails so significantly in practice should give some insight to the origins of restrictive democracy in other homogenous countries (Singapore, Greece)
  • by Logos ( 80812 ) on Tuesday September 28, 1999 @10:48AM (#1653043)

    One bright spot here. I am a US citizen, and while I am disturbed by the almost daily threats to privacy and other civil rights in this country, what struck me while reading this is the resonance between the British citizens' problems and our own with similar attempts.

    If nothing else, we at least are truly starting to talk about issues in this world without regard to traditional borders. It is becoming more of an attack on OUR rights, as opposed to their rights. Once people are the same side of the fence, they work together. What affects the rights of people "over there" affects people everywhere. With forums like this, the position of the world's repressionists is becoming more difficult. We must continue to think in terms of we, regardless of outdated borders and outdated ways of viewing people that many of us have grown up being taught (by our societies, families, churches, etc.). The purpose of free speach has always been to keep unpopular (to the gov't or to the people) opinions flowing so we don't stagnate in our thinking.

    Hurrah for Stand, for doing something. As long as we keep discussing and acting on these attempts to limit freedom, those who are afraid of everyone having the same freedom they have, will be unable to succeed. The more we incorporate the people of the world into the "we" of our mindsets, the more we move toward the world we all want.

  • by Ledge Kindred ( 82988 ) on Tuesday September 28, 1999 @09:02AM (#1653047)
    Why do I have the feeling that the only thing this will accomplish is to have the politicians put a clause in stating that any persons currently holding law enforcement and/or political offices are exempt from prosecution because of this law...

    Does the UK have anything akin to the U.S. "Freedom of Information Act?" I wonder if an entire Gov't agency could get into trouble for having information that's encrypted that the public should have access to but won't give up the decryption key?

    -=-=-=-=-

  • I don't think McCain is all that bad, so far. I, like many others, have suffered under the delusion that one party is liberal, and the other is conservative, when they are really just two like-minded groups fighting over the same piece of pie. ;)

  • I'd much prefer those offerings than that of Mr. "I invented the Internet.. Who's this Tim Berners-Lee guy?" or Mr. "My father was a loser who couldn't get a second term even though Clinton did but you'll vote me in because he's my father anyway".. Ugh. I might actually vote if McCain and Bradley get nominated. ;)

  • Damn straight. Companies like Nortel kind of scare me, though. I always did like Canada's less restrictive laws. Yet another reason why I want to move there. However, I'm a bit annoyed at the law that prevents one from becoming a permanent resident (barring special exceptions) unless you know conversational French. Seems like that would only make sense in Quebec (and who the hell wants to live there..? *ducks and covers*).. The only thing knowing French in Canada will save you from is Canadians who like to say "cute" things about Americans that they can't understand.. ;) Of course, if you do know French, you get to read everything.. twice.. (yes, this all assumes one knows English.. but then, you kind of have to in order to be reading this, right?)

  • I looked into it a while back, and though IANAL, it seemed to me that you had to be one of a few things: 1) a business person looking for new business oppurtunities (who doesn't want to boost their economy?) 2) someone with job skills immediately transferable to the Canadian job market (and who spoke enough conversational English /and/ French to get by) 3) someone fleeing their country due to some kind of prosecution (often religious or political) 4) if you have a relative in Canada who agrees to sign some stuff and "be responsible" for your financial well-being for up to 10 years.. The last of those 4 (presented in incorrect order, I believe) being the easiest.. If you have a relative in Canada. ;) Being your average person who wants to immigrate (sense 2) is, naturally, the most difficult way to get in.

    Of course, if you only wanted short term residency, the options opened up quite a bit. Like if you wanted to go to school there. However, you got the boot as soon as you left school and there were some /harsh/ restrictions on what kind of jobs you could get (that is, only those revolving around your major ;).

    If what I used to know now stands incorrect, that would certainly be exciting (I understand those laws are updated every 6 months to a year or so).. It would certainly open up my options as far as moving somewhere more hospitable is concerned.

  • Of course not.. It was Al Gore. ;)

    No, the chances of getting a straight answer out of me on this thread are decidedly not good. Why? Because it's funny. So laugh. :)

  • by Kitsune Sushi ( 87987 ) on Tuesday September 28, 1999 @08:58AM (#1653058)

    "This is why such sober organisations as British Telecom, Hewlett Packard and Microsoft have publicly criticised the Bill at each stage of its development."

    Microsoft doing some good in the world besides giving us the WAV format? Nifty. I'm still not sure I would refer to them as "sober" (they seem to prefer free beer to free speech.. most of the time, anyway ;).

  • I understand law enforcement's predicament when it comes to crypto, but it's no different than any other civil-rights vs. law-enforcement issue. Basically the crypto-issue reduces down to Search. Sure having cops rabndomly raid someone's home will prevent crime, but is it to much of a price to pay? Sure key-escrow/recovery will allow the cops to evesdrop on you and the criminals, but is it too much of a price to pay?

    The problem is that any mechanism that allows the cops to intercept your communications and use them against you as part of a valid law enforcement effort may also be used by non-police. What's to stop me from alleging that a business communication from one of my competitors contains evidence of illegal activity, then bribing the law enforcement officials to disclose the contents to me, thus gaining a competitive advantage? Would Nixon have needed to send burgulars into the Watergate Hotel if he could simply tell the NSA to retreive the DNC's keys from key escrow, and intercept all their communications?

    The problem here is that the massive potential for abuse here far outweighs the legitimate law enforcement needs. Besides which, if your want to see what is in an email you can always simply get a warrant and record the keystrokes as they are typed in, negating the need for anyone disclosing the key.

Arithmetic is being able to count up to twenty without taking off your shoes. -- Mickey Mouse

Working...