[4693] in cryptography@c2.net mail archive
Just what is the "offense" of encryption?
daemon@ATHENA.MIT.EDU (Ernest Hua)
Thu May 13 12:56:03 1999
From: "Ernest Hua" <hua@teralogic-inc.com>
To: <letters@sjmercury.com>
Cc: <hua@teralogic-inc.com>
Date: Wed, 12 May 1999 15:29:40 -0700
This is a multi-part message in MIME format.
------=_NextPart_000_0066_01BE9C8C.4071B1E0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
> From: http://www.sjmercury.com/breaking/docs/081732.htm
>
> SENATE PANEL OKS MONEY FOR HIGH-TECH
> CRIME FIGHTERS
>
> [SNIP]
>
> The bill deals with several
> technology-related offenses such as
> encryption, use and possession of
> devices that can intercept cable TV
> signals, phone slamming and spreading
> computer viruses.
Would the author, anyone at the
S.J. Mercury or at the Department of
Justice care to explain just what
exactly is the the "offense" of
encryption?
May I remind you, and anyone else
willing to blindly accept government
press releases and "leaks", that
encryption is not only completely legal,
but absolutely vital to the health and
stability of the information age.
It is only scare mongering agencies like
the National Security Agency and the
F.B.I. that are trying to prevent
everyone from protecting their privacy
because they would lose their God-like
omniscient powers if they cannot
randomly wire tap anyone they wish.
If it weren't for these organizations'
subversive behavior, our critical
infrastructure would be well protected,
and we would not be spending billions of
dollars and several major government
agencies and committees trying to fix
our vulnerabilities.
Let's face it, it never pays to listen
to a spy agency on how to protect our
electronic infrastructure.
--------
Ernest Hua, TeraLogic Inc, Mountain View, CA
hua@teralogic-inc.com, (650) 526-6064
------=_NextPart_000_0066_01BE9C8C.4071B1E0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=3Dtext/html;charset=3Diso-8859-1 =
http-equiv=3DContent-Type>
<META content=3D'"MSHTML 4.72.3612.1706"' name=3DGENERATOR>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT color=3D#000000 size=3D2>> From: <A=20
href=3D"http://www.sjmercury.com/breaking/docs/081732.htm">http://www.sjm=
ercury.com/breaking/docs/081732.htm</A><BR>><BR>>=20
SENATE PANEL OKS MONEY FOR HIGH-TECH<BR>> CRIME =
FIGHTERS<BR>><BR>>=20
[SNIP]<BR>><BR>> The bill deals with several<BR>> =
technology-related=20
offenses such as<BR>> encryption, use and possession of<BR>> =
devices that=20
can intercept cable TV<BR>> signals, phone slamming and =
spreading<BR>>=20
computer viruses.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>Would the author, anyone at =
the<BR>S.J. Mercury=20
or at the Department of<BR>Justice care to explain just what<BR>exactly =
is the=20
the "offense" of<BR>encryption?</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>May I remind you, and anyone =
else<BR>willing to=20
blindly accept government<BR>press releases and "leaks",=20
that<BR>encryption is not only completely legal,<BR>but absolutely vital =
to the=20
health and<BR>stability of the information age.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>It is only scare mongering agencies =
like<BR>the=20
National Security Agency and the<BR>F.B.I. that are trying to=20
prevent<BR>everyone from protecting their privacy<BR>because they would =
lose=20
their God-like<BR>omniscient powers if they cannot<BR>randomly wire tap =
anyone=20
they wish.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>If it weren't for these=20
organizations'<BR>subversive behavior, our critical<BR>infrastructure =
would be=20
well protected,<BR>and we would not be spending billions of<BR>dollars =
and=20
several major government<BR>agencies and committees trying to fix<BR>our =
vulnerabilities.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>Let's face it, it never pays to =
listen<BR>to a=20
spy agency on how to protect our<BR>electronic =
infrastructure.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>--------<BR>Ernest Hua, TeraLogic =
Inc, Mountain=20
View, CA<BR><A =
href=3D"mailto:hua@teralogic-inc.com">hua@teralogic-inc.com</A>,=20
(650) 526-6064<BR></FONT></DIV></BODY></HTML>
------=_NextPart_000_0066_01BE9C8C.4071B1E0--