home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-08-04 | 21.6 KB | 513 lines | [TEXT/EDIT] |
- ########## ########## ########## |
- ########## ########## ########## | GILMORE VS. THE NSA
- #### #### #### |
- ######## ######## ######## |
- ######## ######## ######## | THE CRYPTO ANARCHIST MANIFESTO
- #### #### #### |
- ########## #### #### | 2nd PIONEER AWARDS DEADLINE LOOMS
- ########## #### #### |
- =====================================================================
- EFFector Online December 11, 1992 Issue 4.00
- A Publication of the Electronic Frontier Foundation
- ISSN 1062-9424
- =====================================================================
-
-
- ACCESSING THE NSA
- JOHN GILMORE FILES SUIT WITH THE NATIONAL SECURITY AGENCY
-
-
- At the beginning of July 1992, John Gilmore filed a FOIA request
- with NSA asking for access to parts of cryptologic treatises
- written by NSA personnel: Military Cryptanalysis, Parts III
- and IV, by William Friedman (WF-3/4); and Military
- Cryptanalytics, Parts III-VI, by William Friedman and
- Lambros Callimahos (LC3-6).
-
- Parts I and II of each of these treatises had already been
- declassified and published. At the time of the request, it
- was not definitely known whether the parts requested by
- Gilmore had been re-classified.
-
- Under the FOIA, agencies are required to communicate
- responses to requesters within statutorily prescribed time
- periods. Failure to comply with the time limits for response
- constitutes a denial of the request, giving the requester the
- right to appeal.
-
- When NSA violated the first applicable time period,
- Gilmore filed an administrative appeal with the NSA's FOIA
- appeals authority. There is also a time limit for response
- to such appeals. After this time limit passed without a
- response from the NSA's appeals authority, Gilmore filed
- a complaint in federal court in the Northern District of
- California on Sept. 4, 1992, as permitted by the FOIA.
-
- Gilmore's complaint alleged three claims: First, that the
- NSA improperly withheld these documents from him, and
- had no legal basis for withholding; second, that the NSA's
- failure to comply with the FOIA time limits constituted a
- form of improper withholding; and third, that the NSA in
- general engages in an illegal pattern or practice of routinely
- violating the FOIA time limits, which should be declared
- illegal and enjoined.
-
- In the period between the initial FOIA request to NSA, and
- the filing of the complaint in federal court, Gilmore obtained
- copies of two of the withheld documents: Military
- Cryptanalysis Parts III and IV, by Friedman. These copies
- were discovered in libraries accessible to the general
- public and were provided by these libraries without any
- kind of restriction. Gilmore intended to get expert opinion
- on the national security risk posed by disclosure of these
- documents. He also reasoned that their very availability
- in such libraries demonstrated that there could be no legal
- basis for withholding them from a FOIA requester.
-
- At the time the documents were obtained, Gilmore had not
- received any indication from NSA that the documents were
- classified. It was therefore possible that the documents
- were not, in fact, classified. In addition, FOIA requests for
- documents generally trigger agency declassification review.
- Thus, even if the documents were in fact classified at the
- time of the request, it was possible that NSA would decide
- that they should no longer be classified, and release them
- to Gilmore.
-
- After the complaint was filed, Gilmore not only served the
- complaint upon NSA, he also served a number of discovery
- requests upon NSA, seeking to discover information about
- both the history of these documents and about NSA's FOIA
- processing procedures.
-
- In early October, after NSA had received the complaint and
- the discovery requests, NSA finally sent its responses to
- the FOIA request. NSA informed Gilmore that the documents
- were not going to be released to him. NSA said that it had
- located WF-3/4 and LC-3, but that LC-4/5/6 had never been
- completed because of the death of Lambros Callimahos.
-
- First, NSA asserted that the three documents which did
- exist were classified. WF-3/4 were classified CONFIDENTIAL,
- the lowest level of classification under Executive Order
- 12,356 governing classified information. LC-3 was
- classified SECRET, the middle level of classification.
-
- Under the FOIA, an agency may withhold documents if they
- are properly classified for reasons of national security.
-
- Second, NSA asserted that the documents could also be
- withheld under a different exemption in the FOIA. Under the
- (b)(3) exemption, documents may be withheld if there exists
- a statute which authorizes an agency to withhold them. NSA
- pointed to several statutes which arguably covered this
- material. One of these statutes, 18 U.S.C. Section 798,
- makes it a federal crime knowingly to disclose classified
- cryptologic or communications intelligence information to
- unauthorized persons.
-
- At this point, it became clear to Gilmore that there was a
- problem. He now knew for a fact that the documents he had
- were classified (WF-3/4) and that it would be a crime for
- him to disseminate them. He could no longer continue with
- his plan of showing them to other persons for fear of
- criminal prosecution. He also feared that should NSA ever
- discover that he possessed them, he would be subjected to
- search and seizure and the copies confiscated. (Note that
- although the First Amendment Privacy Protection Act
- generally protects the press against search and seizure
- for materials intended for publication where the crime
- involves mere possession or dissemination of information,
- it does not apply to any materials covered by the espionage
- statutes, of which 18 U.S.C. Section 798 is one.)
-
- NSA did not, however, know that he had them. Gilmore
- decided that the best course of action was to submit copies
- of WF-3/4 to the federal district court under seal. By so
- doing, he would ensure that at least these copies would be
- kept out of the NSA's hands, since it was unlikely that a federal
- judge would relinquish possession of documents material to
- pending litigation. Thus, on November 12, Gilmore made an
- ex parte application to file these documents under seal with
- Judge Thelton Henderson, the federal judge hearing his case.
- Gilmore also concurrently filed a motion for leave to amend
- his original complaint in order to address the constitutional
- and other issues arising from his possession of the documents
- and the criminality of disseminating documents found in
- libraries open to the general public.
-
- It is important to realize that the criminal statute at issue
- here does not recognize improper classification as a defense.
- Under existing law, the government need only show that the
- documents were classified by the government, and that they
- are cryptologic- or communications-intelligence-related. It
- remains unclear precisely what the specific requirement
- under the statute is, i.e., whether "knowingly" means actual
- knowledge of classification, or merely some reason to know.
-
- (That same day, NSA filed two motions of its own:
- a motion for a protective order blocking Gilmore's discovery
- requests, and a motion for summary judgment asking the
- court to dispose of the case on the ground that NSA was
- entitled to judgment as a matter of law. In support of its
- summary judgment motion, NSA filed a sworn declaration
- by Michael Smith, Chief of Policy, explaining why the
- documents should be withheld, and why NSA's FOIA
- processing procedures were not illegal.)
-
- NSA was served with papers indicating that WF-3/4 had been
- received by the district court. This was the first time that
- NSA knew that Gilmore possessed the documents. They
- reacted strongly. John Martin, the Justice Department lawyer
- representing NSA, asked that Gilmore surrender his copies to
- NSA, saying that NSA was very upset and might send its own
- agents or FBI agents to get the copies from Gilmore. He also
- wanted to know where Gilmore got them. Martin also suggested
- that Gilmore might be criminally liable under the espionage
- statutes relating to possession of national defense information.
-
- NSA regained its composure the next day, realizing that it
- did not know exactly what Gilmore had. Although NSA had
- been served with papers indicating what Gilmore had done,
- Gilmore had not sent them copies of the documents. Thus
- they could not know for sure whether the documents he had
- were the ones they considered classified. Gilmore agreed to
- send copies of his copies to NSA for their review, after
- which NSA would decide what to do.
-
- During this period, tension was high. Gilmore considered
- filing an ex parte motion for a temporary restraining order
- against NSA and the U.S. Attorney General to prevent them
- >from both moving against him personally and against any
- copies of the documents presently on library shelves. This
- motion was drafted but never filed.
-
- On the day before Thanksgiving, NSA announced that WF-3/4
- would be declassified, and effectively renounced any claim
- that it could withhold them from the public. NSA gave no
- official reason for its action.
-
- NSA is currently reviewing the third document, LC-3, to
- see how much of it can be released now that WF-3/4 have
- been declassified. (NSA had asserted in its summary judgment
- papers that LC-3 was based on WF-3/4.) NSA's review is to
- be completed by January 15, 1993, at which time it will
- release an edited version of LC-3 to Gilmore.
-
- It is anticipated that this edited version of LC-3 will be
- analyzed by Gilmore and his experts, and that Gilmore and
- NSA will engage in settlement negotiations to determine
- whether NSA has satisfied Gilmore's request. The
- settlement discussions will also include Gilmore's claims
- regarding NSA's FOIA processing procedures.
-
- The parties have stipulated that if no settlement is reached
- the litigation will proceed. A status conference has been
- set for February 9. NSA will, if necessary, file an amended
- motion for summary judgment by February 12. Following
- opposition and reply briefs, the hearing on all motions will
- take place on March 22.
-
- [John Gilmore is a member of the EFF Board of Directors. He can
- reached as gnu@cygnus.com. Gilmore's lawyer, Lee Tien, can
- be reached as tien@toad.com.]
-
-
- -==--==--==-<>-==--==--==-
-
-
- THE CRYPTO ANARCHIST MANIFESTO
-
- by
- Timothy C. May
- (tcmay@netcom.com)
-
-
- A specter is haunting the modern world, the specter of crypto
- anarchy.
-
- Computer technology is on the verge of providing the ability for
- individuals and groups to communicate and interact with each other
- in a totally anonymous manner. Two persons may exchange
- messages, conduct business, and negotiate electronic contracts
- without ever knowing the True Name, or legal identity, of the other.
- Interactions over networks will be untraceable, via extensive re-
- routing of encrypted packets and tamper-proof boxes which
- implement cryptographic protocols with nearly perfect assurance
- against any tampering. Reputations will be of central importance, far
- more important in dealings than even the credit ratings of today.
- These developments will alter completely the nature of government
- regulation, the ability to tax and control economic interactions, the
- ability to keep information secret, and will even alter the nature of
- trust and reputation.
-
- The technology for this revolution--and it surely will be both a social
- and economic revolution--has existed in theory for the past decade.
- The methods are based upon public-key encryption, zero-knowledge
- interactive proof systems, and various software protocols for
- interaction, authentication, and verification. The focus has until now
- been on academic conferences in Europe and the U.S., conferences
- monitored closely by the National Security Agency. But only recently
- have computer networks and personal computers attained sufficient
- speed to make the ideas practically realizable. And the next ten
- years will bring enough additional speed to make the ideas
- economically feasible and essentially unstoppable. High-speed
- networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band
- transmitters, multi-MIPS personal computers, and encryption chips
- now under development will be some of the enabling technologies.
-
- The State will of course try to slow or halt the spread of this
- technology, citing national security concerns, use of the technology
- by drug dealers and tax evaders, and fears of societal disintegration.
- Many of these concerns will be valid; crypto anarchy will allow
- national secrets to be traded freely and will allow illicit and stolen
- materials to be traded. An anonymous computerized market will
- even make possible abhorrent markets for assassinations and
- extortion. Various criminal and foreign elements will be active users
- of CryptoNet. But this will not halt the spread of crypto anarchy.
-
- Just as the technology of printing altered and reduced the power of
- medieval guilds and the social power structure, so too will
- cryptologic methods fundamentally alter the nature of corporations
- and of government interference in economic transactions. Combined
- with emerging information markets, crypto anarchy will create a
- liquid market for any and all material which can be put into words
- and pictures. And just as a seemingly minor invention like barbed
- wire made possible the fencing-off of vast ranches and farms, thus
- altering forever the concepts of land and property rights in the
- frontier West, so too will the seemingly minor discovery out of an
- arcane branch of mathematics come to be the wire clippers which
- dismantle the barbed wire around intellectual property.
-
- Arise, you have nothing to lose but your barbed wire fences!
-
-
- -==--==--==-<>-==--==--==-
-
-
- Date: Wed, 02 Dec 92 21:31:47 -0800
- From: haynes@cats.UCSC.EDU (Jim Haynes)
- Newsgroups: comp.dcom.telecom
- Subject: Historical Note on Telecom Privacy
-
- Apropos of all the talk on FBI wiretapping, cellular eavesdropping,
- etc., I found this passage in "Old Wires and New Waves"; Alvin F.
- Harlow; 1936. He's writing about unscrupulous telegraph operators in
- the early days. They would use information in telegrams for personal
- gain, or delay messages or news for personal gain, or sell news
- reports to non-subscribers of the press association.
-
- "Pennsylvania passed a law in 1851, making telegrams secret,
- to prevent betrayal of private affairs by operators. When,
- therefore, an operator was called into court in Philadelphia
- a little later, and ordered to produce certain telegrams which
- would prove an act of fraud, he refused to do so, saying that
- the state law forbade it. The circuit court, shocked at this
- development, proceeded to override the law, saying:
-
- It must be apparent that, if we adopt this construction
- of the law, the telegraph may be used with the most
- absolute security for purposes destructive to the
- well-being of society - a state of things rendering
- its absolute usefulness at least questionable. The
- correspondence of the traitor, the murderer, the robber
- and the swindler, by means of which their crimes and
- frauds could be the more readily accomplished and
- their detection and punishment avoided, would become
- things so sacred that they never could be accessible to
- the public justice, however deep might be the public interest
- involved in their production.
-
- The judge therefore ordered the operator to produce the telegrams."
-
-
- -==--==--==-<>-==--==--==-
-
-
- THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
- CALL FOR NOMINATIONS
- Deadline: December 31,1992
-
- In every field of human endeavor,there are those dedicated to expanding
- knowledge,freedom,efficiency and utility. Along the electronic frontier,
- this is especially true. To recognize this,the Electronic Frontier
- Foundation has established the Pioneer Awards for deserving individuals
- and organizations.
-
- The Pioneer Awards are international and nominations are open to all.
-
- In March of 1992, the first EFF Pioneer Awards were given in Washington
- D.C. The winners were: Douglas C. Engelbart of Fremont, California;
- Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom
- Jennings of San Francisco, California; and Andrzej Smereczynski of
- Warsaw, Poland.
-
- The Second Annual Pioneer Awards will be given in San Francisco,
- California at the 3rd Conference on Computers, Freedom, and Privacy
- in March of 1993.
-
- All valid nominations will be reviewed by a panel of impartial judges
- chosen for their knowledge of computer-based communications and the
- technical, legal, and social issues involved in networking.
-
- There are no specific categories for the Pioneer Awards, but the
- following guidelines apply:
-
- 1) The nominees must have made a substantial contribution to the
- health, growth, accessibility, or freedom of computer-based
- communications.
-
- 2) The contribution may be technical, social, economic or cultural.
-
- 3) Nominations may be of individuals, systems, or organizations in
- the private or public sectors.
-
- 4) Nominations are open to all, and you may nominate more than one
- recipient. You may nominate yourself or your organization.
-
- 5) All nominations, to be valid, must contain your reasons, however
- brief, on why you are nominating the individual or organization,
- along with a means of contacting the nominee, and your own contact
- number. No anonymous nominations will be allowed.
-
- 6) Every person or organization, with the single exception of EFF
- staff members, are eligible for Pioneer Awards.
-
- 7) Persons or representatives of organizations receiving a Pioneer
- Award will be invited to attend the ceremony at the Foundation's
- expense.
-
- You may nominate as many as you wish, but please use one form per
- nomination. You may return the forms to us via email to
-
- pioneer@eff.org
-
- You may mail them to us at:
- Pioneer Awards, EFF,
- 155 Second Street
- Cambridge MA 02141.
-
- You may FAX them to us at:
- +1 617 864 0866
-
- Just tell us the name of the nominee, the phone number or email address
- at which the nominee can be reached, and, most important, why you feel
- the nominee deserves the award. You may attach supporting
- documentation. Please include your own name, address, and phone number.
-
- We're looking for the Pioneers of the Electronic Frontier that have made
- and are making a difference. Thanks for helping us find them,
-
- The Electronic Frontier Foundation
-
- -------EFF Pioneer Awards Nomination Form------
-
- Please return to the Electronic Frontier Foundation
- via email to: pioneer@eff.org
- via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;
- via FAX to +1 617 864 0866
-
-
- Nominee:
-
- Title:
-
- Company/Organization:
-
- Contact number or email address:
-
- Reason for nomination:
-
- Your name and contact information:
-
- Extra documentation attached:
-
- DEADLINE: ALL NOMINATIONS MUST BE RECEIVE BY THE ELECTRONIC FRONTIER
- FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., DECEMBER 31,1992.
-
-
- -==--==--==-<>-==--==--==-
-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
-
- If you support our goals and our work, you can show that support by
- becoming a member now. Members receive our bi-weekly electronic
- newsletter, EFFector Online, the @eff.org newsletter
- and special releases and other notices on our activities. But because
- we believe that support should be freely given, you can receive these
- things even if you do not elect to become a member.
-
- Our memberships are $20.00 per year for students, $40.00 per year for
- regular members. You may, of course, donate more if you wish.
-
- Our privacy policy: The Electronic Frontier Foundation will never, under
- any circumstances, sell any part of its membership list. We will, from
- time to time, share this list with other non-profit organizations whose
- work we determine to be in line with our goals. If you do not grant
- explicit permission, we assume that you do not wish your membership
- disclosed to any group for any reason.
-
- ---------------- EFF MEMBERSHIP FORM ---------------
-
- Mail to: The Electronic Frontier Foundation, Inc.
- 155 Second St. #40
- Cambridge, MA 02141
-
- I wish to become a member of the EFF I enclose:$__________
- $20.00 (student or low income membership)
- $40.00 (regular membership)
- $100.00(Corporate or company membership.
- This allows any organization to
- become a member of EFF. It allows
- such an organization, if it wishes
- to designate up to five individuals
- within the organization as members.)
-
- I enclose an additional donation of $
-
- Name:
-
- Organization:
-
- Address:
-
- City or Town:
-
- State: Zip: Phone:( ) (optional)
-
- FAX:( ) (optional)
-
- Email address:
-
- I enclose a check [ ] .
- Please charge my membership in the amount of $
- to my Mastercard [ ] Visa [ ] American Express [ ]
-
- Number:
-
- Expiration date:
-
- Signature:
-
- Date:
-
- I hereby grant permission to the EFF to share my name with
- other non-profit groups from time to time as it deems
- appropriate [ ] .
- Initials:
-
- Your membership/donation is fully tax deductible.
- =====================================================================
- EFFector Online is published by
- The Electronic Frontier Foundation
- 155 Second Street, Cambridge MA 02141
- Phone: +1 617 864 0665 FAX: +1 617 864 0866
- Internet Address: eff@eff.org
- Reproduction of this publication in electronic media is encouraged.
- Signed articles do not necessarily represent the view of the EFF.
- To reproduce signed articles individually, please contact the authors
- for their express permission.
- =====================================================================
- This newsletter is printed on 100% recycled electrons.
-