home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!peora!tarpit!tous!bilver!jwt!hrick
- From: bbs-hrick@jwt.UUCP (Rick Harrison)
- Subject: Re: A new encryption problem?
- Reply-To: bbs-hrick@jwt.UUCP
- Organization: The Matrix
- Date: Fri, 13 Nov 1992 07:26:59 GMT
- Message-ID: <oJ36TB1w164w@jwt.UUCP>
- References: <1060.517.uupcb@grapevine.lrk.ar.us>
- Sender: bbs@jwt.UUCP
- Lines: 20
-
- jim.wenzel@grapevine.lrk.ar.us (Jim Wenzel) writes:
-
- > However, recently (yesterday) I had the opportunity to speak with a
- > law enforcement official who had quite a different view.
- > He was calling from California in order to pick up the pgp program
- > from us. Seems that they are on the case of a molestor who encrypted
- > his information using PGP. If they can't crack it the molestor will
- > more than likely walk due to lack of evidence. This has caused me
-
- Not everyone who is accused is guilty. If the police couldn't
- find sufficient evidence elsewhere -- the testimony of victims,
- child pornography in the suspect's house, etc -- why would they
- or you expect there to be evidence in his computer? If you
- robbed a bank, molested a child, or committed some other crime,
- would you rush home, boot your computer and type in a detailed
- description of what you had just done?!?! Please, examine the
- underlying assumptions which you are harboring.
-
- ===
- Rick Harrison
-