Download raw source

Delivered-To: john.podesta@gmail.com Received: by 10.25.88.78 with SMTP id m75csp388929lfb; Wed, 17 Feb 2016 20:34:01 -0800 (PST) X-Received: by 10.140.232.15 with SMTP id d15mr6969817qhc.87.1455770041732; Wed, 17 Feb 2016 20:34:01 -0800 (PST) Return-Path: <zoe106@yahoo.com> Received: from nm21.bullet.mail.bf1.yahoo.com (nm21.bullet.mail.bf1.yahoo.com. [98.139.212.180]) by mx.google.com with ESMTPS id x69si5466443qha.127.2016.02.17.20.34.01 for <john.podesta@gmail.com> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 17 Feb 2016 20:34:01 -0800 (PST) Received-SPF: pass (google.com: domain of zoe106@yahoo.com designates 98.139.212.180 as permitted sender) client-ip=98.139.212.180; Authentication-Results: mx.google.com; spf=pass (google.com: domain of zoe106@yahoo.com designates 98.139.212.180 as permitted sender) smtp.mailfrom=zoe106@yahoo.com; dkim=pass header.i=@yahoo.com; dmarc=pass (p=REJECT dis=NONE) header.from=yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1455770041; bh=SPSAYDExlFDLi2EBovVNZAAIFNzLPf1K0XTxFtJZZtY=; h=Subject:From:In-Reply-To:Date:References:To:From:Subject; b=NF4hbrtDt8IvieuaBm5fOCPZIBWJStWRDAVUnCIwSiPjY/brcj4Z/ba/dvU+8XhA0TpQVtAhEsUdE3jV5EFcykQ/x0BqJisNCZdPxnVv836b+jvAWOB3y2DOFYyzslo3VnIybSpfceH+CSAIkiR/lAyhbHWSlqPaCtv3GTEtv+CfGjAJC36BiJQ5HlQaCSm94FgEyh4BiD83cPBDoEdCh96Y9VxA3XPtxbIg038/j5MOoCnWQP2IU8/IBI4bhjvw8RsYbdeK1ZOc8OwyigH2/xXmvuY2Pit6s4sRkFV6nIZ07sTCBcxVMyzMMsDL3L0dxeiJHmeGVMJsVlgznv/D7g== Received: from [98.139.215.143] by nm21.bullet.mail.bf1.yahoo.com with NNFMP; 18 Feb 2016 04:34:01 -0000 Received: from [98.139.213.15] by tm14.bullet.mail.bf1.yahoo.com with NNFMP; 18 Feb 2016 04:34:01 -0000 Received: from [127.0.0.1] by smtp115.mail.bf1.yahoo.com with NNFMP; 18 Feb 2016 04:34:01 -0000 X-Yahoo-Newman-Id: 136495.59051.bm@smtp115.mail.bf1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: sq1dedIVM1myXAuzOxdIuOCU28yKcZDWtV2.JmrCWMrNwxH C__aP2Dr1Vf6dgRyIVtgHfVyar7zJDr6jTUiaqStUTDwvcl6KE8_39dz5V0c 5kVaOjOkHeVs0o1l612CkFkk3FufRsZItI_L6Kjvl080bgMFKqKypP4CKVc0 SYqzdpjeyxC0IzQVuA0TAKvjJ4JKSVHVjzsi1FxJ8OJdmYXQXML4VLX8x2AZ TsUDs_qZlMY3Osh682ThP82FJrkJoZ4n2xqAN5DOlSbdYGVv1Z2T7UK5Praj ORpCIDSPVhehb49G2h4PeDHZ8qxleX8Fv8pD5LxIDxT8d0j_tzVblP0nLUqo yes_6FniisNaEufbzWu_smVvQBhEjkzF7cRw_L0qgFj6e8U5uRUivjAfERzD m2lP0MjhAyaGiaXwFNeaVinfVmsamCbnREK88di9OK46Jz.u2l6hbg5ynvoW ed_L8rxfLNow_V5JQorPH0uXBJ.g3CymiR_0T4_L3gYFSSBUvz1ac7n3oA.W xJpAtgOFx7IhhYXLc7bwqHS4w X-Yahoo-SMTP: JMdQkaOswBCqRQgRRkSJloL6nQ-- Content-Type: multipart/alternative; boundary=Apple-Mail-82BC3567-725B-4678-84B3-A8C27E67D801 Mime-Version: 1.0 (1.0) Subject: Re: Encryption From: Zoe <zoe106@yahoo.com> X-Mailer: iPad Mail (13D15) In-Reply-To: <CAE6FiQ-e_Oor0sOftA+vHUieXxb2orK0AJKdM_DPwpH2W6K+wg@mail.gmail.com> Date: Wed, 17 Feb 2016 20:33:58 -0800 Content-Transfer-Encoding: 7bit Message-Id: <B1F07F1A-4239-4F3A-A6A1-673FB37A7B18@yahoo.com> References: <B9C9C965-1509-4A8F-A807-EBEB9DB89BD5@yahoo.com> <C2EF26F6-E02F-4E8E-8740-F6828D4A52BA@yahoo.com> <CAE6FiQ-e_Oor0sOftA+vHUieXxb2orK0AJKdM_DPwpH2W6K+wg@mail.gmail.com> To: John Podesta <john.podesta@gmail.com> --Apple-Mail-82BC3567-725B-4678-84B3-A8C27E67D801 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Don't embrace fbi, correct. Opportunity to show tech cred missed by ducking,= but that is better than crashing into fbi stupidity. Does sanders have a clu= e? I know that he personally has no idea but what is #feelthebern saying? =46rom Mobile > On Feb 17, 2016, at 7:52 PM, John Podesta <john.podesta@gmail.com> wrote: >=20 > I think we are inclined to stay out of this and push it back to Companies a= nd USG to dialogue and resolve. Won't embrace FBI. Thoughts? >=20 > On Wednesday, February 17, 2016, Zoe Lofgren <zoe106@yahoo.com> wrote: >>> Dear John: Here is the statement I wrote. Hope it helps.=20 >>>=20 >>>=20 >>>> The order that Apple create a new operating system with a back door, us= ing the 18th Century =E2=80=9CAll Writs Act=E2=80=9D, is an astonishing over= reach of authority by the Federal government. >>>>=20 >>>> Apple, as other technology companies, complies with lawful orders and w= arrants. But they are unable to deliver to the government what they do not h= ave, in this case a key to break into their operating system in the manner t= he FBI desires. It is astonishing that a court would consider it lawful to o= rder that a private american company be commandeered for the creation of a n= ew operating system in response.=20 >>>>=20 >>>> The issue of mandating back doors in encryption has been a topic of vig= orous discussion in the Congress. The emerging consensus has been that crea= ting back doors for the use of law enforcement, important as law enforcement= is, would endanger Americans by weakening security generally. These weakne= sses will inevitably be exploited by criminal hackers or foreign opponents. = That a single magistrate should substitute her judgment for that of the dul= y elected President and Congress that was already thoroughly engaged in the s= ubject is wrong as a matter of policy and of law. =20 >>>>=20 >>>> Finally, should this order not be overturned, technology companies will= have no choice but to further deploy robust encryption that would prevent t= heir engineers from creating any system that would effectively open up previ= ously deployed security measures. >>>>=20 >>>> I urge the judicial branch to swiftly overturn this misguided ruing and= further urge the Director of the FBI to refrain from seeking public policy d= ecisions from the courts that are properly decided by the Legislative branch= of government. >>>=20 >>>=20 >>>=20 >>=20 --Apple-Mail-82BC3567-725B-4678-84B3-A8C27E67D801 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable <html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D= utf-8"></head><body dir=3D"auto"><div>Don't embrace fbi, correct. Opportunit= y to show tech cred missed by ducking,but that is better than crashing into f= bi stupidity. Does sanders have a clue? I know that he personally has= no idea but what is #feelthebern saying?<br><br>=46rom Mobile</div><div><br= >On Feb 17, 2016, at 7:52 PM, John Podesta <<a href=3D"mailto:john.podest= a@gmail.com">john.podesta@gmail.com</a>> wrote:<br><br></div><blockquote t= ype=3D"cite"><div>I think we are inclined to stay out of this and push it ba= ck to Companies and USG to dialogue and resolve. Won't embrace FBI. Thoughts= ?<br><br>On Wednesday, February 17, 2016, Zoe Lofgren <<a href=3D"mailto:= zoe106@yahoo.com">zoe106@yahoo.com</a>> wrote:<br><blockquote class=3D"gm= ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef= t:1ex"><div style=3D"word-wrap:break-word"><div><blockquote type=3D"cite"><d= iv style=3D"word-wrap:break-word">Dear John: Here is the statement I w= rote. Hope it helps. <br><div><br></div><div><br><blockquote type= =3D"cite"><div><div style=3D"margin:0px;font-size:11px">The order that Apple= create a new operating system with a back door, using the 18th Century =E2=80= =9CAll Writs Act=E2=80=9D, is an astonishing overreach of authority by the Fe= deral government.</div><div style=3D"margin:0px;font-size:11px;min-height:13= px"><br></div><div style=3D"margin:0px;font-size:11px">Apple, as other techn= ology companies, complies with lawful orders and warrants. But they ar= e unable to deliver to the government what they do not have, in this case a k= ey to break into their operating system in the manner the FBI desires. = It is astonishing that a court would consider it lawful to order that a pri= vate american company be commandeered for the creation of a new operat= ing system in response. </div><div style=3D"margin:0px;font-size:11px;m= in-height:13px"><br></div><div style=3D"margin:0px;font-size:11px">The issue= of mandating back doors in encryption has been a topic of vigorous discussi= on in the Congress. The emerging consensus has been that creating back= doors for the use of law enforcement, important as law enforcement is, woul= d endanger Americans by weakening security generally. These weaknesses= will inevitably be exploited by criminal hackers or foreign opponents. = ; That a single magistrate should substitute her judgment for that of the du= ly elected President and Congress that was already thoroughly engaged in the= subject is wrong as a matter of policy and of law. </div><div style=3D= "margin:0px;font-size:11px;min-height:13px"><br></div><div style=3D"margin:0= px;font-size:11px">Finally, should this order not be overturned, technology c= ompanies will have no choice but to further deploy robust encryption that wo= uld prevent their engineers from creating any system that would effectively o= pen up previously deployed security measures.</div><div style=3D"margin:0px;= font-size:11px;min-height:13px"><br></div> <span style=3D"font-size:11px">I urge the judicial branch to swiftly overtur= n this misguided ruing and further urge the Director of the FBI to refrain f= rom seeking public policy decisions from the courts that are properly decide= d by the Legislative branch of government.</span></div></blockquote><div><br= ></div><br></div><br></div></blockquote></div><br></div></blockquote> </div></blockquote></body></html>= --Apple-Mail-82BC3567-725B-4678-84B3-A8C27E67D801--