Newsgroups: talk.politics.misc
Path: cantaloupe.srv.cs.cmu.edu!magnesium.club.cc.cmu.edu!news.sei.cmu.edu!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!darwin.sura.net!martha.utcc.utk.edu!TITANIC.CE.UTK.EDU!VEAL
From: VEAL@utkvm1.utk.edu (David Veal)
Subject: Re: CLINTON: Press release on "Clipper Chip" encryption initiative
Message-ID: <VEAL.753.735329315@utkvm1.utk.edu>
Lines: 51
Sender: usenet@martha.utcc.utk.edu (USENET News System)
Organization: University of Tennessee Division of Continuing Education
References: <1qvnmkINNoc6@life.ai.mit.edu>
Date: Tue, 20 Apr 1993 18:08:35 GMT

In article <1qvnmkINNoc6@life.ai.mit.edu> Clinton-HQ@Campaign92.Org (The White House) writes:
>
>                 STATEMENT BY THE PRESS SECRETARY
>
>[...]
>
>The initiative will involve the creation of new products to 
>accelerate the development and use of advanced and secure 
>telecommunications networks and wireless communications links.
>
>[...]
>
>A state-of-the-art microcircuit called the "Clipper Chip" has 
>been developed by government engineers.  The chip represents a 
>new approach to encryption technology.  It can be used in new, 
>relatively inexpensive encryption devices that can be attached to 
>an ordinary telephone.  It scrambles telephone communications 
>using an encryption algorithm that is more powerful than many in 
>commercial use today.
>
>This new technology will help companies protect proprietary 
>information, protect the privacy of personal phone conversations 
>and prevent unauthorized release of data transmitted 
>electronically.  At the same time this technology preserves the 
>ability of federal, state and local law enforcement agencies to 
>intercept lawfully the phone conversations of criminals. 

       While also allowing law enforcement agencies to intercept phone
conversations of criminals *and* non-criminals unlawfully.  ("No, Rev.
King, we aren't spying on you.")

       I wonder how long it will take for "the wrong people" to put their
hands on the equipment necessary to read this stuff.  It'll probably
be as safe as weapons locked safely in evidence rooms.

>"keys," numbers that will be needed by authorized government 
>agencies to decode messages encoded by the device.  When the 
>device is manufactured, the two keys will be deposited separately 
>in two "key-escrow" data bases that will be established by the 
>Attorney General.  Access to these keys will be limited to 
>government officials with legal authorization to conduct a 
>wiretap.

       And people to whom they sell them to.  All it takes is corrupting
the right guy.  No, that never happens.

------------------------------------------------------------------------
David Veal Univ. of Tenn. Div. of Cont. Education Info. Services Group
PA146008@utkvm1.utk.edu - "I still remember the way you laughed, the day
your pushed me down the elevator shaft;  I'm beginning to think you don't
love me anymore." - "Weird Al"
