Copy Link
Add to Bookmark
Report

EFFector Online Volume 3 Number 01

eZine's profile picture
Published in 
EFFector
 · 5 years ago

  

########## ########## ########## | RAPID GROWTH OF ONLINE SERVICES
########## ########## ########## | ONE BBSCON /EFF LIBRARY/ USENET
#### #### #### |
######## ######## ######## | JOHN PERRY BARLOW ON
######## ######## ######## | THE NSA, THE FBI, ENCRYPTION,
#### #### #### | AND WIRE-TAPPING
########## #### #### |
########## #### #### | THE TAO TE CHIP
=====================================================================
EFFector Online JULY 29, 1992 Issue 3.1 / Part 1
A Publication of the Electronic Frontier Foundation
ISSN 1062-9424
=====================================================================

ONLINE SERVICES EXPERIENCE SOLID GROWTH OVER PAST 5 YEARS
WITH MORE FORECAST FOR THE NEAR FUTURE

A new study released by SIMBA Information, a research group based in
Wilton, Connecticut, says sales by online services increased by 61.1
percent in the last five years. The trend will continue over the next five
years, says SIMBA, with a projected increase of 48%.

By 1996, the online information market should be worth about $14.2 billion
annually. Business uses will consume the lion's share of this market by a
factor of 24 to 1. Regardless of this, the services used by consumers were
the fastest growing segment of the market in the 1990-1991 period. This
growth in consumer use is expected to increase by 145 percent over the next
five years.

The report, "Online Services: 1992 Review, Trends, and Forecast" was
written for SIMBA by analyst Chris Elwell.

Other items in the report of interest: Subscribers to online services
numbered 5.4 million at the end of 1991, an increase of 18% over 1990.
Leading online services (CompuServe, Genie, Prodigy, etc.) reported an
aggregate sales growth of nearly 7% in 1991 from 1990 levels.

Some of the more notable conclusions of this report are:
#North American-based online services account for 57% of
worldwide sales,with rapid growth in the near term.
#More than half of the growth in online subscribers in 1991
was accounted for by Prodigy.
#One out of every five home computers has a modem.
#As the Regional Bell companies enter the online services
arena, the initial focal point of their efforts will be
online directory publishing.
#Even though the report gives detailed profiles of 35 major
players, it notes that most online services and database
publishers are relatively small operations.

-==--==--==-<>-==--==--==-

EFF to Crash The ONE BBSCON

August 13-16, Stouffer Concourse Hotel, Denver Colorado.

The ONE BBSCON is the major BBS conference of the year, hosting seminars in
such topics as How to make your BBS profitable; What is Internet?; FidoNet,
RelayNet, INet, et. al.; Graphics over a Modem; Learn from the Winners; as
well hosting an exhibition attended by vendors of BBS-related products.

And EFF will be there with a booth as well. We'll be doing the usual
booth-related activities such as handing out literature and selling
t-shirts; however, we're more interested in talking with the members of the
BBS community and learning what it needs from EFF. Along with seminars on
BBSs and the Law, EFF staff counsel Shari Steele will be presenting a talk
on the EFF at which we will be looking for feedback. If you'll be
attending, do stop by either the booth or the seminar and tell us what you
think.

For more information on ONE BBSCON, contact
ONE, Inc.
4255 S. Buckley Road
Suite 308
Aurora, Colorado 80013
(303)693-5252
Note: There is no email address. Leaves room for improvement.

-==--==--==-<>-==--==--==-

UPDATE ON THE EFF LIBRARY

The EFF Library was set up over a year ago when it became clear that,
regardless of the digital revolution, we were being overwhelmed by a wave
of hard copy. At that time, we had a backlog of around 1,000 documents,
books and magazines concerning issues relevant to the Electronic Frontier.
We engaged a professional librarian, Hae Young Wang, to bring order to
chaos, and to provide us with a method that would enable us to file and
retrieve material necessary to the work of the foundation.

Today, the EFF library in Cambridge houses over 2,300 items. The holdings
cover journal articles, newspaper articles, conference proceedings, court
documents, legislation, magazines, books, and brochures. The subject areas
include such things as information infrastructure, computers and civil
liberties, intellectual property and copyrights, and EFF archives.

The Library also maintains over 130 subscriptions to magazines and
newsletters.

In addition, the EFF library maintains, classifies and indexes EFF's
anonymous ftp archive files. These files, which are accessible to everyone
with Internet access, have recently been re-organized into what we hope is a
more user-friendly and informative manner. In the EFF ftp directory, you
can find documents about the EFF, back issues of its online newsletter,
notes on eff-issues, historical items, legal issues, current legislation,
local chapters, and a host of other material germane to the Electronic
Frontier.

While the ftp files are open to all, the EFF Library can now serve only the
staff here and in Washington. We hope to be able to provide service to EFF
members and the general public in the future, as funding and staffing
allow.

In the meantime, we have recently acquired new scanning software which we
hope will reduce the work involved in moving hard-copy information into
digital form. With this in place we will be adding items to the anonymous
ftp archive at an increased rate throughout the rest of the summer.

Recent additions to the EFF ftp files are:
The EFF Open Platform Proposal. This is the full text of the
EFF's plan to create a national public network through the
deployment of ISDN technology.
(pub/EFF/papers/open-platform-proposal)

Howard Rhinegold's "A Slice of Life in My Virtual Community".
This meditation on what it means to be online in 1992 was
first serialized in EFFector Online.
(pub/EFF/papers/cyber/life-in-virtual-community)

Senator Al Gore's High-Tech Bill (S.2937) as introduced on July
1, 1992. This bill provides funding to both NSF and NASA to
develop technology for "digital libraries", huge data bases
that store text, imagery, video, and sound and are accessible
over computer networks like NSFNET. The bill also funds
development of prototype "digital libraries" around the
country. This is the full-text of this bill along with the
press release from Gore's office announcing the bill.
(pub/EFF/legislation/gore-bill-1992)

An information packet on the GPO/WINDO legislation before congress
as S.2813/H.R. 2772. This discusses the function of the proposed
"gateway" for online public access to government databases. From
the Taxpayers Assets Project.
(pub/EFF/legislation/gpo-windo-info)

These files are also available through WAIS as eff-documents.src. WAIS
clients are available for the Mac, PC, NeXT, X11, and GNU Emacs
environments via anonymous ftp from think.com. A "guest" WAIS client is
available by telnetting to quake.think.com and logging in as 'wais'.

To retrieve these files via email, send mail to archive-server@eff.org,
containing (in the body of the message) the command

send eff <path from pub/EFF>

So to get the Gore bill, you would send

send eff legislation/gore-bill-1992

If you have any trouble obtaining these documents, send email to
ftphelp@eff.org.

-==--==--==-<>-==--==--==-

UNCLEAR ON USENET INTERNET?

Veteran members of the Internet know, through osmosis, the difference
between Internet and Usenet. Still, newcomers are often confused since the
two seem to be, at times, used interchangeably. To provide for an ultimate
answer, we turned to Chris Davis (ckd), star sysadmin at eff.org. He said:

"The definitive answer is long and mostly uninteresting except to
pedants like me :).

"The Internet is that collection of connected TCP/IP networks. Roughly
speaking, if you can connect directly to 'nic.ddn.mil' with telnet, you're
on the Internet. You may be able to get Internet mail without being on the
Internet proper (say, if you're on America Online).

"USENET is that set of machines and people who interchange USENET
messages. A large number of USENET sites are on the Internet, and many
Internet sites get USENET. Many USENET sites are NOT on the Internet,
however, getting their news via dialup lines, satellite receivers, magnetic
tape shipments (no kidding), and the like. Roughly speaking, you're on
USENET if you get the 'news.announce.important' newsgroup.

"They are related in that they are partially congruent and often
confused with each other :) but they are not the same network."

-==--==--==-<>-==--==--==-

Decrypting the Puzzle Palace
by
John Perry Barlow
barlow@eff.org

"A little sunlight is the best disinfectant."
--Justice Louis Brandeis

Over a year ago, in a condition of giddier innocence than I enjoy today, I
wrote the following about the discovery of Cyberspace:

"Imagine discovering a continent so vast that it may have no other side.
Imagine a new world with more resources than all our future greed might
exhaust, more opportunities than there will ever be entrepreneurs enough to
exploit, and a peculiar kind of real estate which expands with
development."

One less felicitous feature of this terrain which I hadn't noticed then is
what seems to be a long-encamped and immense army of occupation.

This army represents interests which are difficult to define, guards the
area against unidentified enemies, meticulously observes almost every
activity undertaken there, and continuously prevents most who inhabit its
domain from drawing any blinds against such observation.

It marshals at least 40,000 troops, owns the most advanced computing
resources in the world, and uses funds the dispersal of which does not fall
under any democratic review.

Imagining this force won't require from you the inventive powers of a
William Gibson. The American Occupation Army of Cyberspace exists. Its
name is the National Security Agency.

It may be argued that this peculiar institution inhibits free trade, has
directly damaged American competitiveness, and poses a threat to liberty
anywhere people communicate with electrons. It's principal function, as
miff colleague John Gilmore puts it, is "wire-tapping the world," which it
is free to do without a warrant from any judge.

It is legally constrained from domestic surveillance, but precious few
people are in a good position to watch what, how, or whom the NSA watches.
And those who are tend to be temperamentally sympathetic to its objectives
and methods. They like power, and power understands the importance of
keeping it own secrets and learning everyone else's.

Whether it is meticulously ignoring every American byte or not, the NSA is
certainly pursuing policies which will render our domestic affairs
transparent to anyone who can afford big digital hardware. Such policies
could have profound consequences on our liberty and privacy.

More to point, the role of the NSA in the area of domestic privacy needs to
be assessed in the light of other recent federal initiatives which seem
directly aimed at permanently denying privacy to the inhabitants of
Cyberspace, whether foreign or American.

Finally it seems a highly opportune time, directly following our
disorienting victory in the Cold War, to ask if the threats from which the
NSA purportedly protects us from are as significant as the hazards its
activities present.

Like most Americans I'd never given much thought to the NSA until recently.
(Indeed its very existence was a secret for much of my life. Beltway types
used to joke that NSA stood for "No Such Agency.")

I vaguely knew that it was another of the 12 or so shadowy federal spook
houses which were erected shortly after the Iron Curtain with the purpose
of stopping its further advance. It derives entirely from a memorandum sent
by Harry Truman on October 24, 1952 to Secretary of State Dean Acheson and
Defense Secretary Robert Lovatt. This memo, the official secrecy of which
remained unpenetrated for almost 40 years, created the NSA, placed it under
the authority of the Secretary of Defense, and charged it with monitoring
and decoding any signal transmission relevant to the security of the United
States.

Even after I started noticing the NSA, my natural immunity to paranoia
combined with a general belief in the incompetence of all bureaucracies...
especially those whose inefficiencies are unmolested by public scrutiny...
to mute any sense of alarm. But this was before I began to understand the
subterranean battles raging over data encryption and the NSA's role in
them. Lately, I'm less sanguine.

Encryption may be the only reliable method for conveying privacy to the
inherently public domain of Cyberspace. I certainly trust it more than
privacy protection laws. Relying on government to protect your privacy is
like asking a peeping tom to install your window blinds.

In fact, we already have a strong-sounding federal law protecting our
electronic privacy, the Electronic Communications Privacy Act or ECPA. But
this law has not particular effective in those areas were electronic
eavesdropping is technically easy. This is especially true in the area of
cellular phone conversations, which, under the current analog transmission
standard, are easily accessible to anyone from the FBI to you.

The degree of law enforcement apprehension over secure cellular encryption
provides mute evidence of how seriously they've been taking ECPA. They are
moving on a variety of fronts to see that robust electronic privacy
protection systems don't become generally available to the public. Indeed,
the current administration may be so determined to achieve this end that
they may be willing to paralyze progress in America's most promising
technologies rather than yield on it.

Push is coming to shove in two areas of communications technology: digital
transmission of heretofore analog signals and the encryption of transmitted
data.

As the communications service providers move to packet switching, fiber
optic transmission lines, digital wireless, ISDN and other advanced
techniques, what have been discrete channels of continuous electrical
impulses, voices audible to anyone with alligator clips on the right wires,
are now becoming chaotic blasts of data packets, readily intelligible only
to the sender and receiver. This development effectively forecloses
traditional wire-tapping techniques, even as it provides new and different
opportunities for electronic surveillance.

It is in the latter area where the NSA knows its stuff. A fair percentage
of the digital signals dispatched on planet Earth must pass at some point
through the NSA's big sieve in Fort Meade, Maryland, 12 underground acres
of the heaviest hardware in the computing world. There, unless these
packets are also encrypted with a particularly knotty algorithm, sorting
them back into their original continuity is not so difficult.

Last spring, alarmed at a future in which it would have to sort through an
endless fruit salad of encrypted bits, the FBI persuaded Senator Joseph
Biden to include language in Senate Bill 266 which would have directed
providers of electronic communications services and devices (such as
digital cellular phone systems or other multiplexed communications
channels) to implement only such encryption methods as would assure
governmental ability to extract from the data stream the plain text of any
voice or data communications in which it took a legal interest. It was if
the government had responded to a technological leap in lock design by
requiring building contractors to supply it with skeleton keys to every
door in America.

The provision raised wide-spread concern in the computer community, which
was better equipped to understand its implications than the general public,
and in August of last year, the Electronic Frontier Foundation, in
cooperation with Computer Professionals for Social Responsibility and other
industry groups, successfully lobbied to have it removed from the bill.

Our celebration was restrained. We knew we hadn't seen the last of it. For
one thing, the movement to digital communications does create some serious
obstacles to traditional wire-tapping procedures. I fully expected that law
enforcement would be back with new proposals, which I hoped might be ones
we could support. But what I didn't understand then, and am only now
beginning to appreciate, was the extent to which this issue had already
been engaged by the NSA in the obscure area of export controls over data
encryption algorithms.

Encryption algorithms, despite their purely defensive characteristics, have
been regarded by the government of this country as weapons of war for many
years. If they are to be employed for privacy (as opposed to
authentication) and they are any good at all, their export is licensed
under State Department's International Traffic in Arms Regulations or ITAR.

The encryption watchdog is the NSA. It has been enforcing a policy, neither
debated nor even admitted to, which holds that if a device or program
contains an encryption scheme which the NSA can't break fairly easily, it
will not be licensed for international sale.

Aside for marveling at the silliness of trying to embargo algorithms, a
practice about as practicable as restricting the export of wind, I didn't
pay much attention to the implications of NSA encryption policies until
February of this year. It was then that I learned about the deliberations
of an obscure group of cellular industry representatives called the Ad Hoc
Authentication Task Force, TR45.3 and of the influence which the NSA has
apparently exercised over their findings.

In the stately fashion characteristic of standard-setting bodies, this
group has been working for several years on a standard for digital cellular
transmission, authentication, and privacy protection to be known by the
characteristically whimsical telco moniker IS-54B.

In February they met near Giants Stadium in East Rutherford, NJ. At that
meeting, they recommended, and agreed not to publish, an encryption scheme
for American-made digital cellular systems which many sophisticated
observers believe to be intentionally vulnerable. It was further thought
by many observers that this "dumbing down" had been done indirect
cooperation with the NSA.

Given the secret nature of the new algorithm, its actual merits were
difficult to assess. But many cryptologists believe there is enough in the
published portions of the standard to confirm that it isn't any good.

One cryptographic expert, one of two I spoke with who asked not to be
identified lest the NSA take reprisals against his company, said:

"The voice privacy scheme, as opposed to the authentication scheme, is
pitifully easy to break. It involves the generation of two "voice privacy
masks" each 260 bits long. They are generated as a byproduct of the
authentication algorithm and remain fixed for the duration of a call. The
voice privacy masks are exclusive_ORed with each frame of data from the
vocoder at the transmitter. The receiver XORs the same mask with the
incoming data frame to recover the original plain text. Anyone familiar
with the fundamentals of cryptanalysis can easily see how weak this scheme
is."

And indeed, Whitfield Diffie, co-inventor of Public Key cryptography and
arguably the dean of this obscure field, told me this about the fixed
masks:

"Given that description of the encryption process, there is no need for the
opponents to know how the masks were generated. Routine cryptanalytic
operations will quickly determine the masks and remove them.''

Some on committee claimed that possible NSA refusal of export licensing had
no bearing on the algorithm they chose. But their decision not to publish
the entire method and expose it to cryptanalytical abuse (not to mention
ANSI certification) was accompanied by the following convoluted
justification:

"It is the belief of the majority of the Ad Hoc Group, based on our current
understanding of the export requirements, that a published algorithm would
facilitate the cracking of the algorithm to the extent that its fundamental
purpose is defeated or compromised."(Italics added.)

Now this is a weird paragraph any way you parse it, but its most singular
quality is the sudden, incongruous appearance of export requirements in a
paragraph otherwise devoted to algorithmic integrity. In fact, this
paragraph is itself code, the plain text of which goes something like this:
"We're adopting this algorithm because, if we don't, the NSA will slam an
export embargo on all domestically manufactured digital cellular phones."

Obviously, the cellular phone systems manufacturers and providers are not
going to produce one model for overseas sale and another for domestic
production. Thus, a primary effect of NSA-driven efforts to deny some
unnamed foreign enemy secure cellular communications is on domestic
security. The wireless channels available to private Americans will be
cloaked in a mathematical veil so thin that, as one crypto-expert put it,
"Any county sheriff with the right PC-based black box will be able to
monitor your cellular conversations."

When I heard him say that, it suddenly became clear to me that, whether
consciously undertaken with that goal or not, the most important result of
the NSA's encryption embargoes has been the future convenience of domestic
law enforcement. Thanks to NSA export policies, they will be assured that,
as more Americans protect their privacy with encryption, it will be of a
sort easily penetrated by authority.

I find it increasingly hard to imagine this is not their real objective as
well. Surely, they must be aware of how ineffectual their efforts have been
in keeping good encryption out of inimical military possession. An
algorithm is somewhat less easily stopped at the border than, say, a
nuclear reactor. As William Neukom, head of Microsoft Legal puts it, "The
notion that you can control this technology is comical."

I became further persuaded that this was the case upon hearing, from a
couple of sources, that the Russians have been using the possibly
uncrackable (and American) RSA algorithm in their missile launch codes for
the last ten years and that, for as little as five bucks, one can get a
software package called Crypto II on the streets of Saint Petersburg which
includes both RSA and DES encryption systems.

Nevertheless, the NSA has been willing to cost American business a lot of
revenue rather than allow domestic products with strong encryption into the
global market.

While it's impossible to set a credible figure on what that loss might add
up to, it's high. Jim Bidzos, whose RSA Data Security licenses RSA, points
to one major Swiss bid in which a hundred million dollar contract for
financial computer terminals went to a European vendor after American
companies were prohibited by the NSA from exporting a truly secure network.

The list of export software containing intentionally broken encryption is
also long. Lotus Notes ships in two versions. Don't count on much
protection from the encryption in the export version. Both Microsoft and
Novell have been thwarted in their efforts to include RSA in their
international networking software, despite frequent publication of the
entire RSA algorithm in technical publications all over the world.

With hardware, the job has been easier. NSA levied against the inclusion of
a DES chip in the AS/390 series IBM mainframes in late 1990 despite the
fact that, by this time, DES was in widespread use around the world,
including semi-official adoption by our official enemy, the USSR.

I now realize that Soviets have not been the NSA's main concern at any time
lately. Naively hoping that, with the collapse of the Evil Empire, the NSA
might be out of work, I then learned that, given their own vigorous crypto
systems and their long use of some embargoed products, the Russians could
not have been the threat from whom this forbidden knowledge was to be kept.
Who has the enemy been then? I started to ask around.

Cited again and again as the real object of the embargoes were Third-World
countries. terrorists and... criminals. Criminals, most generally
drug-flavored, kept coming up, and nobody seemed terribly concerned that
some of their operations might be located in areas supposedly off-limits to
NSA scrutiny.

Presumably the NSA is restricted from conducting American surveillance by
both the Foreign Intelligence Surveillance Act of 1978 (FISA) and a series
of presidential directives, beginning with one issued by President Ford
following Richard Nixon's bold misuse of the NSA, in which he explicitly
directed the NSA to conduct widespread domestic surveillance of political
dissidents and drug users.

But whether or not FISA has actually limited the NSA's abilities to conduct
domestic surveillance seemed less relevant the more I thought about it. A
better question to ask was, "Who is best served by the NSA's encryption
export policies?" The answer is clear: domestic law enforcement. Was this
the result of some spook plot between NSA and, say, the Department of
Justice? Not necessarily.

Certainly in the case of the digital cellular standard, cultural congruity
between foreign intelligence, domestic law enforcement, and what somebody
referred to as "spook wannabes on the TR45.3 committee" might have a lot
more to do with the its eventual flavor than any actual whisperings along
the Potomac.

[continued in Effector Online 3.1 Part 2]

EFFector Online JULY 22, 1992 Issue 3.1 / end of Part 1
=====================================================================
EFFector Online JULY 29, 1992 Issue 3.1 / Part 2
A Publication of the Electronic Frontier Foundation
ISSN 1062-9424
=====================================================================

[Decrypting the Puzzle Palace by John Perry Barlow - continued - ]

Unable to get anyone presently employed by the NSA to comment on this or
any other matter and with little opportunity to assess the NSA's
congeniality toward domestic law enforcement from the inside, I
approached a couple of old hands for a highly distilled sample of
intelligence culture.

I called Admirals Stansfield Turner and Bobby Ray Inman. Not only had their
Carter administration positions as, respectively, CIA and NSA Directors,
endowed them with considerable experience in such matters, both are
generally regarded to be somewhat more sensitive to the limits of
democratic power than their successors. None of whom seemed likely to
return my calls anyway.

My phone conversations with Turner and Inman were amiable enough, but they
didn't ease my gathering sense that the NSA takes an active interest in
areas which are supposedly beyond its authorized field of scrutiny.

Turner started out by saying he was in no position to confirm or deny any
suspicions about direct NSA-FBI cooperation on encryption, but he didn't
think I was being exactly irrational in raising the question. In fact, he
genially encouraged me to investigate the matter further.

He also said that while a sub rosa arrangement between the NSA and the
Department of Justice to compromise domestic encryption would be
"injudicious," he could think of no law, including FISA (which he helped
design), which would prevent it.

Most alarmingly, this gentleman who has written eloquently on the hazards
of surveillance in a democracy did not seem terribly concerned that our
digital shelters are being rendered permanently translucent by and to the
government.

He said, "A threat could develop...terrorism, narcotics, whatever...where
the public would be pleased that all electronic traffic was open to
decryption. You can't legislate something which forecloses the possibility
of meeting that kind of emergency."

Admiral Inman had even more enthusiasm for assertive governmental
supervision. Although he admitted no real knowledge of the events behind
the new cellular encryption standard, he wasn't the least disturbed to hear
that it might be flawed.

And, despite the fact that his responsibilities as NSA Director had been
restricted to foreign intelligence, he seemed a lot more comfortable
talking about threats on the home front.

"The Department of Justice," he began, "has a very legitimate worry. The
major weapon against white collar crime has been the court-ordered wiretap.
If the criminal elements go to using a high quality cipher, the principal
defense against narcotics traffic is gone." This didn't sound like a guy
who, were he still head of NSA, would rebuff FBI attempts to get a little
help from his agency.

He brushed off my concerns about the weakness of the cellular encryption
standard. "If all you're seeking is personal privacy, you can get that with
a very minimal amount of encipherment."

Well, I wondered, Privacy from whom?

And he seemed to regard real, virile encryption to be something rather like
a Saturday Night Special. "My answer," he said, "would be legislation
which would make it a criminal offense to use encrypted communication to
conceal criminal activity."

Wouldn't that render all encrypted traffic automatically suspect? I asked.

"Well, he said, "you could have a registry of institutions which can
legally use ciphers. If you get somebody using one who isn't registered,
then you go after him."

You can have my encryption algorithm, I thought to myself, when you pry my
cold dead fingers from its private key.

It wasn't a big sample, but it was enough to gain a better appreciation of
the cultural climate of the intelligence community. And these guys are the
liberals. What legal efficiencies might their Republican successors be
willing to employ to protect the American Way?

Without the comfortably familiar presence of the Soviets to hate and fear,
we can expect to see a sharp increase in over-rated bogeymen and virtual
states of emergency. This is already well under way. I think we can expect
our drifting and confused hardliners to burn the Reichstag repeatedly until
they have managed to extract from our induced alarm the sort of government
which makes them feel safe.

This process has been under way for some time. One sees it in the war on
terrorism, against which pursuit "no liberty is absolute," as Admiral
Turner put it. This, despite the fact that, during last year for which I
have a solid figure, 1987, only 7 Americans succumbed to terrorism.

You can also see it clearly under way in the War on Some Drugs. The Fourth
Amendment to the Constitution has largely disappeared in this civil war.
And among the people I spoke with, it seemed a common canon that drugs (by
which one does not mean Jim Beam, Marlboros, Folger's, or Halcion) were a
sufficient evil to merit the government's holding any more keys it felt the
need for.

One individual close to the committee said that at least some of the
aforementioned "spook wannabes" on the committee were "interested in weak
cellular encryption because they considered warrants not to be "practical"
when it came to pursuing drug dealers and other criminals using cellular
phones."

In a miscellaneously fearful America, where the people cry for shorter
chains and smaller cages, such privileges as secure personal communications
are increasingly regarded as expendable luxuries. As Whitfield Diffie put
it, "From the consistent way in which Americans seem to put security ahead
of freedom, I rather fear that most of them would prefer that all
electronic traffic was open to government decryption right now if they had
given it any thought."

In any event, while I found no proof of an NSA-FBI conspiracy to gut the
American cellular phone encryption standard, it seemed clear to me that
none was needed. The same results can be delivered by a cultural
"auto-conspiracy" between like-minded hardliners and cellular companies who
will care about privacy only when their customers do.

You don't have to be a hand-wringing libertarian like me to worry about the
domestic consequences of the NSA's encryption embargoes. They are also, as
stated previously, bad for business, unless, of course, the business of
America is no longer business but, as sometimes seems the case these days,
crime control.

As Ron Rivest (the "R" in RSA) said to me, "We have the largest information
based economy in the world. We have lots of reasons for wanting to protect
information, and weakening our encryption systems for the convenience of
law enforcement doesn't serve the national interest."

But by early March, it had become clear that this supposedly business-
oriented administration had made a clear choice to favor cops over commerce
even if the costs to the American economy were to become extremely high.

A sense of White House seriousness in this regard could be taken from their
response to the first serious effort by Congress to bring the NSA to task
for its encryption embargoes. Rep. Mel Levine (D-Calif.) proposed an
amendment to the Export Administration Act to transfer mass market software
controls to the Commerce Department, which would relax the rules. The
administration responded by saying that they would veto the entire bill if
the Levine amendment remained attached to it.

Even though it appeared the NSA had little to fear from Congress, the
Levine amendment may have been part of what placed the agency in a
bargaining mood for the first time. They entered into discussions with the
Software Publishers Association who, acting primarily on behalf of
Microsoft and Lotus, got to them to agree "in principle" to a streamlined
process for export licensing of encryption which might provide for more
robust standards than have been allowed previously.

But the negotiations between the NSA and the SPA were being conducted
behind closed doors, with the NSA-imposed understanding that any agreement
they reached would be set forth only in a "confidential" letter to
Congress. As in the case of the digital cellular standard, this would
eliminate the public scrutiny by cryptography researchers which anneals
genuinely hardened encryption.

Furthermore, some cryptographers worried that the encryption key lengths to
which the SPA appeared willing to restrict its member publishers might be
too short to provide much defense against the sorts of brute-force
decryption assaults which advances in processor technology will yield in
the fairly near future. And brute force has always been the NSA's strong
suit.

Whether accurate or not, the impression engendered by the style of the
NSA-SPA negotiations was not one of unassailable confidence. The lack of it
will operate to the continued advantage of foreign manufacturers in an era
when more and more institutions are going to be concerned about the privacy
of their digital communications.

But the economic damage which the NSA-SPA agreement might cause would be
minor compared to what would result from a startling new federal
initiative, the Department of Justice's proposed legislation on digital
telephony. If you're wondering what happened to the snooping provisions
which were in Senate Bill 266, look no further. They're back. And they're
bigger and bolder than ever.

They are contained in a sweeping proposal which have been made by the
Justice Department to the Senate Commerce Committee for legislation which
would "require providers of electronic communications services and private
branch exchanges to ensure that the Government's ability to lawfully
intercept communications is unimpeded by the introduction of advanced
digital telecommunications technology or any other telecommunications
technology."

Amazingly enough, this really means what it says: before any advance in
telecommunications technology can be deployed, the service providers and
manufacturers must assure the cops that they can tap into it. In other
words, development in digital communications technology must come to a
screeching halt until Justice can be assured that it will be able to grab
and examine data packets with the same facility they have long enjoyed with
analog wire-tapping.

It gets worse. The initiative also provides that, if requested by the
Attorney General, "any Commission proceeding concerning regulations,
standards or registrations issued or to be issued under authority of this
section shall be closed to the public." This essentially places the
Attorney General in a position to shut down any telecommunications advance
without benefit of public hearing.

When I first heard of the digital telephony proposal, I assumed it was a
kind of bargaining chip. I couldn't imagine it was serious. But it now
appears they are going to the mattresses on this one.

Taken together with NSA's continued assertion of its authority over
encryption, a pattern becomes clear. The government of the United States is
so determined to maintain law enforcement's traditional wire-tapping
abilities in the digital age that it is willing to fundamentally cripple
the American economy to do so. This may sound hyperbolic, but I believe it
is not.

The greatest technology advantage this country presently enjoys is in the
areas of software and telecommunications. Furthermore, thanks in large part
to the Internet, much of America is already wired for bytes, as significant
an economic edge in the Information Age as the existence of a railroad
system was for England one hundred fifty years ago.

If we continue to permit the NSA to cripple our software and further convey
to the Department of Justice the right to stop development the Net without
public input, we are sacrificing both our economic future and our
liberties. And all in the name of combating terrorism and drugs.

This has now gone far enough. I have always been inclined to view the
American government as pretty benign as such creatures go. I am generally
the least paranoid person I know, but there is something scary about a
government which cares more about putting its nose in your business than it
does about keeping that business healthy.

As I write this, a new ad hoc working group on digital privacy, coordinated
by the Electronic Frontier Foundation, is scrambling to meet the challenge.
The group includes representatives from organizations like AT&T, the
Regional Bells, IBM, Microsoft, the Electronic Mail Association and about
thirty other companies and public interest groups.

Under the direction of Jerry Berman, EFF's Washington office director, and
John Podesta, a capable lobbyist and privacy specialist who helped draft
the ECPA, this group intends to stop the provisions in digital telephony
proposal from entering the statute books.

We also intend to work with federal law enforcement officials to address
their legitimate concerns. We don't dispute their need to conduct some
electronic surveillance, but we believe this can be assured by more
restrained methods than they're proposing.

We are also preparing a thorough examination of the NSA's encryption export
policies and looking into the constitutional implications of those
policies. Rather than negotiating behind closed doors, as the SPA has been
attempting to do, America's digital industries have a strong self-interest
in banding together to bring the NSA's procedures and objectives into the
sunlight of public discussion.

Finally, we are hoping to open a dialog with the NSA. We need to develop a
better understanding of their perception of the world and its threats. Who
are they guarding us against and how does encryption fit into that
endeavor? Despite our opposition to their policies on encryption export, we
assume that NSA operations have some merit. But we would like to be able to
rationally balance the merits against the costs.

We strongly encourage any organization which might have a stake in the
future of digital communication to become involved. Letters expressing your
concern may be addressed to: Sen. Ernest Hollings, Chairman, Senate
Commerce Committee, U.S. Senate, Washington, DC and to Don Edwards,
Chairman, Subcommitee on Constitutional Rights, House Judiciary Committee.
(I would appreciate hearing those concerns myself. Feel free to copy me
with those letters at my physical address, c/o P.O. Box 1009, Pinedale, WY
82941 or in Cyberspace, barlow@eff.org.)

If your organization is interested in becoming part of the digital privacy
working group, please contact EFF's Washington office at: 666 Pennsylvania
Avenue SE, Suite 303, Washington, DC 20003, 202/544- 9237, FAX:
202/547-5481. EFF also encourages individuals interested in these issues to
join the organization. Contact us at: Electronic Frontier Foundation, 155
Second Street, Cambridge, MA 02141,617/864- 0665, eff-request@eff.org.

The legal right to express oneself is meaningless if there is no secure
medium through which that expression may travel. By the same token, the
right to hold certain unpopular opinions is forfeit unless one can discuss
those opinions with others of like mind without the government listening in.

Even if you trust the current American government, as I am still largely
inclined to, there is a kind of corrupting power in the ability to create
public policy in secret while assuring that the public will have little
secrecy of its own.

In its secrecy and technological might, the NSA already occupies a very
powerful position. And conveying to the Department of Justice what amounts
to licensing authority for all communications technology would give it a
control of information distribution rarely asserted over English-speaking
people since Oliver Cromwell's Star Chamber Proceedings.

Are there threats, foreign or domestic, which are sufficiently grave to
merit the conveyance of such vast legal and technological might? And even
if the NSA and FBI may be trusted with such power today, will they always
be trustworthy? Will we be able to do anything about it if they aren't?

Senator Frank Church said of NSA technology in 1975 words which are more
urgent today:

"That capability at any time could be turned around on the American people
and no American would have any privacy left. There would be no place to
hide. If this government ever became a tyranny, the technological capacity
that the intelligence community has given the government could enable it to
impose total tyranny. There would be no way to fight back, because the most
careful effort to combine together in resistance to the government, no
matter how privately it was done, is within the reach of the government to
know. Such is the capacity of this technology."

San Francisco, California
May, 1992

Reprinted from Communications of the ACM, June 1992
by permission of the author

-==--==--==-<>-==--==--==-

from THE TAO TE CHIP
by Jeffrey Sorrenson
sorensen@ecse.rpi.edu
(with help from Steven Mitchell and Lao Tzu)

2

When users see one GUI as beautiful,
other user interfaces become ugly.
When users see some programs as winners,
other programs become lossage.

Pointers and NULLs reference each other.
High level and assembler depend on each other.
Double and float cast to each other.
High-endian and low-endian define each other.
While and until follow each other.

Therefore the Guru
programs without doing anything
and teaches without saying anything.
Warnings arise and he lets them come;
processes are swapped and he lets them go.
He has but doesn't possess,
acts but doesn't expect.
When his work is done, he deletes it.
That is why it lasts forever.

80

If a system is administered wisely,
its users will be content.
They enjoy hacking their code
and don't waste time implementing
labor-saving shell scripts.
Since they dearly love their accounts,
they aren't interested in other machines.
There may be telnet, rlogin, and ftp,
but these don't access any hosts.
There may be an arsenal of cracks and malware,
but nobody ever uses them.
People enjoy reading their mail,
take pleasure in being with their newsgroups,
spend weekends working at their terminals,
delight in the doings at the site.
And even though the next system is so close
that users can hear its key clicks and biff beeps,
they are content to die of old age
without ever having gone to see it.

-==--==--==-<>-==--==--==-

MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
have an electronic address that can be reached through the Net), and
special releases and other notices on our activities. But because we
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members. You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list. We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
155 Second St. #31
Cambridge, MA 02141

I wish to become a member of the EFF I enclose:$__________
$20.00 (student or low income membership)
$40.00 (regular membership)
$100.00(Corporate or company membership.
This allows any organization to
become a member of EFF. It allows
such an organization, if it wishes
to designate up to five individuals
within the organization as members.)

| I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:( )_____________(optional)

FAX:( )____________________(optional)

Email address: ______________________________

I enclose a check [ ] .
Please charge my membership in the amount of $_____________
to my Mastercard [ ] Visa [ ] American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate [ ] .
Initials:___________________________

Your membership/donation is fully tax deductible.
=====================================================================
EFFector Online is published by
The Electronic Frontier Foundation
155 Second Street, Cambridge MA 02141
Phone: +1 617 864 0665 FAX: +1 617 864 0866
Internet Address: eff@eff.org
Reproduction of this publication in electronic media is encouraged
To reproduce signed articles individually,
please contact the authors for their express permission.
=====================================================================
This newsletter is printed on 100% recycled electrons.

Downloaded From P-80 International Information Systems 304-744-2253

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT