Hi Ted,
At 15:58 25-11-2013, Ted Lemon wrote:
(1) I'm not trying to impugn the good work that 
was done in securing the root key.   It was good 
work, and I think it was very cool.   I am just 
asking if, despite that good work, an NSL could 
get around it.   It's a fair question.   The 
answer may be "no," or "not without it becoming 
public," or "with great difficulty."   I doubt 
it's "easily."   But it's worth asking.   When 
you did the root signing, we were certainly 
thinking about this threat model, but it was a 
bit more academic then than it is now.   I think 
we still had some illusions that the U.S. 
government at least would choose a more 
constrained attack than taking the key to 
everything; we now know that the government 
feels no such burden of restraint?they 
apparently feel that they can be trusted with 
that key, and we should be willing to provide it.
In my opinion the question was a valid one.  It 
is not clear though.  I agree with Joe that it 
sounds like a question for ICANN.
I asked some questions about the DPS 
previously.  One of the questions was about 
coercion.  I was okay with the response I received at that time.
Regards,
S. Moonesamy