home *** CD-ROM | disk | FTP | other *** search
- Dear Media, the same folks who brought you the gun control laws you love so
- much, are now after YOU!
-
- NOW will believe that the pro 2nd Amendment people are NOT paranoid?
-
- The following was posted on a BBS:
-
- Quote:
-
- This thread is copied from "sci.crypt" on Usenet. -Bruce
-
- >From: schuman@sgi.com (Aaron Schuman)
- Newsgroups: sci.crypt
- Subject: Congress to order crypto trapdoors?
- Date: 11 Apr 91 23:30:28 GMT
- Organization: Silicon Graphics 415-335-1901
- Lines: 83
-
- The United States Senate is considering a bill that would require
- manufacturers of cryptographic equipment to introduce a trap door, and
- to make that trap door accessible to law enforcement officials.
-
- If you feel, as I do, that the risk of abuse far outweighs the potential
- benefits, please write to Senators Joseph Biden and Dennis DeConcini,
- and to the Senators that represent your state, asking that they propose
- a friendly amendment to their bill removing this requirement.
-
- I don't have exact addresses for Senators Biden and DeConcini, and I
- hope someone will post them here, but the Washington DC post office can
- deliver letters addressed to
-
- Senator Joseph Biden Senator Dennis DeConcini
- United States Senate and United States Senate
- Washington, DC Washington, DC
-
-
- RISKS-LIST: RISKS-FORUM Digest Wednesday 10 April 1991 Volume 11 : Issue 43
-
- ------------------------------
-
- Date: Wed, 10 Apr 91 17:23 EDT
- >From: WHMurray@DOCKMASTER.NCSC.MIL
- Subject: U.S. Senate 266, Section 2201 (cryptographics)
-
- Senate 266 introduced by Mr. Biden (for himself and Mr. DeConcini)
- contains the following section:
-
- SEC. 2201. COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW ENFORCEMENT
-
- It is the sense of Congress that providers of electronic communications
- services and manufacturers of electronic communications service
- equipment shall ensure that communications systems permit the government
- to obtain the plain text contents of voice, data, and other
- communications when appropriately authorized by law.
-
- ------------------------------
-
- The referenced language requires that manufacturers build trap-doors
- into all cryptographic equipment and that providers of cconfidential
- channels reserve to themselves, their agents, and assigns the ability to
- read all traffic.
-
- Are there readers of this list that believe that it is possible for
- manufacturers of crypto gear to include such a mechanism and also to
- reserve its use to those "appropriately authorized by law" to employ it?
-
- Are there readers of this list who believe that providers of electronic
- communications services can reserve to themselves the ability to read
- all the traffic and still keep the traffic "confidential" in any
- meaningful sense?
-
- Is there anybody out there who would buy crypto gear or confidential
- services from vendors who were subject to such a law?
-
- David Kahn asserts that the sovereign always attempts to reserve the use
- of cryptography to himself. Nonetheless, if this language were to be
- enacted into law, it would represent a major departure. An earlier
- Senate went to great pains to assure itself that there were no trapdoors
- in the DES. Mr. Biden and Mr. DeConcini want to mandate them. The
- historical justification of such reservation has been "national
- security;" just when that justification begins to wane, Mr. Biden wants
- to use "law enforcement." Both justifications rest upon appeals to fear.
-
- In the United States the people, not the Congress, are sovereign; it
- should not be illegal for the people to have access tto communications
- that the government cannot read. We should be free from unreasonable
- search and seizure; we should be free from self-incrimination. The
- government already has powerful tools of investigation at its disposal;
- it has demonstrated precious little restraint in their use.
-
- Any assertion that all use of any such trap-doors would be only "when
- appropriately authorized by law" is absurd on its face. It is not
- humanly possible to construct a mechanism that could meet that
- requirement; any such mechanism would be subject to abuse.
-
- I suggest that you begin to stock up on crypto gear while you can still
- get it. Watch the progress of this law carefully. Begin to identify
- vendors across the pond.
-
- William Hugh Murray, Executive Consultant, Information System Security 21
- Locust Avenue, Suite 2D, New Canaan, Connecticut 06840 203 966 4769
-
-
- Article 3419 of sci.crypt:
- >From: karn@epic.bellcore.com (Phil R. Karn)
- Newsgroups: sci.crypt,alt.privacy
- Subject: Re: Congress Mandates Backdoors
- Date: 15 Apr 91 23:51:07 GMT
- Organization: Packet Communications Research Group (Bellcore)
- Lines: 261
-
- Since I was looking for any excuse to procrastinate on my taxes this
- past weekend, I composed this letter to Senators Biden and DeConcini.
- --Phil
-
-
-
- 25-B Hillcrest Rd
- Warren, NJ 07059-5304
- April 13, 1991
-
-
-
-
- Senator Dennis DeConcini
- United States Senate
- Washington, DC 20510
-
- Dear Senator DeConcini:
-
-
- Yesterday I read a most disturbing computer network article
- about a piece of legislation you are proposing that
- apparently attempts to regulate the use of cryptography to
- protect the secrecy of private communications. I refer to
- this excerpt:
-
- Senate 266 introduced by Mr. Biden (for himself and Mr.
- DeConcini) contains the following section:
-
- SEC. 2201. COOPERATION OF TELECOMMUNICATIONS PROVIDERS
- WITH LAW ENFORCEMENT
-
- It is the sense of Congress that providers of elec-
- tronic communications services and manufacturers of
- electronic communications service equipment shall
- ensure that communications systems permit the govern-
- ment to obtain the plain text contents of voice, data,
- and other communications when appropriately authorized
- by law.
-
- The author of the article continues:
-
- The referenced language requires that manufacturers
- build trap-doors into all cryptographic equipment and
- that providers of confidential channels reserve to
- themselves, their agents, and assigns the ability to
- read all traffic.
-
- I would like to know if this is indeed the intent of your
- legislation. If so, it will be the most futile exercise of
- authority since King Canute set up his throne on the beach,
- ordered the sea to withdraw and probably got his feet wet
- for his trouble.
-
- I would like the opportunity to explain.
-
- First of all, this legislation will not serve its ostensible
- purpose (facilitating a legitimate police investigation
- involving encrypted communications or stored data). Quite
-
-
-
- April 15, 1991
-
-
-
-
-
- - 2 -
-
-
- simply, cryptography exists; it cannot be uninvented. And
- with today's powerful, inexpensive and readily available
- computer technology, anyone - law-abiding citizen or crimi-
- nal - can apply a little technical knowledge and build and
- operate his own cryptographic communications system.
-
- You see, with the right software, even the simplest personal
- computer becomes an excellent cipher machine - and the
- software is readily and widely available. I know of perhaps
- six public-domain programs that do the National Bureau of
- Standards' Data Encryption Standard (DES); I wrote one of
- them. DES software is also available in several publicly
- available books and magazines and from several commercial
- suppliers. Even without all this software, an interested
- programmer can find the complete specifications for DES in
- any of several dozen textbooks on cryptography - not to men-
- tion the official Federal standards themselves.
-
- And DES is not the only cryptographic algorithm available to
- the public. Because of concerns about possible weaknesses in
- the DES (including unproven allegations that the National
- Security Agency introduced a "trap door" into the design),
- research into stronger alternatives has been brisk. New
- algorithms appear all the time, and they come from cryptolo-
- gists all over the world. The NSA has abandoned its attempts
- to control the publication of private cryptographic research
- because it is clearly protected by the First Amendment.
-
- It is precisely because computers are so easily turned into
- cipher machines that your reference to "providers of elec-
- tronic communications services" is so pointless. A smart
- criminal won't trust anyone with his plain text that he
- doesn't have to - especially not a communications provider
- subject to subpoena. He'll encrypt on an end-to-end basis
- with his own computers, his own cryptographic software and
- with cryptographic keys known only to him (and protected by
- his Fifth Amendment right against self-incrimination). Com-
- munications service providers won't have the opportunity to
- turn plain text over to law enforcement because they'll
- never see it.
-
- You also refer to "manufacturers of electronic communica-
- tions service equipment," which I assume means "manufactur-
- ers of cryptographic hardware." But this would be equally
- ineffective: no criminal would use a ready-made cipher
- machine with a "trap door" built into it when he can so
- easily turn his own personal computer into a cipher machine
- without a trap door, and at much lower cost. Indeed, spe-
- cialized cryptographic hardware has only one real advantage
- over cryptographic software running on general purpose com-
- puters: the hardware is generally more tamper-resistant.
- This is usually important only in highly sensitive applica-
- tions such as banking, where one does not want to trust
- one's employees too much. It is irrelevant where the owner
-
-
-
- April 15, 1991
-
-
-
-
-
- - 3 -
-
-
- and user of the computer, the person being protected by
- cryptography and the person who knows the key are all the
- same.
-
- This brings me to the second fundamental flaw in your pro-
- posed legislation. Even if "trap doors" were installed in
- cryptographic equipment of the type used by banks (among
- others), how could their use be limited to persons "duly
- authorized by law"? Experience has shown electronic vandals
- (popularly known as "hackers" or "phone phreaks") to be
- highly adept at discovering and exploiting hidden security
- weaknesses in computer and communication systems. What is to
- prevent such persons from discovering and exploiting
- weaknesses deliberately introduced in response to your
- legislation?
-
- They certainly wouldn't remain secret for long. Every modern
- cipher is designed to rely entirely on the secrecy of the
- key for its security. The design of the cipher itself must
- be assumed to be completely public, because eventually it
- will be. (This philosophy is captured in a popular computer
- science saying: "Security through obscurity doesn't work.")
-
- Indeed, what procedures could guarantee that "trap doors"
- would not be abused by law enforcement or other government
- personnel not properly authorized by court order? The rise
- of computer technology has opened up many opportunities for
- invasion of privacy and the abuse of government power. It is
- only fitting that the same technology in the hands of indi-
- viduals can also put some real teeth into the guarantees of
- the Fourth and Fifth Amendments.
-
- The government is simply going to have to get used to its
- citizens using cryptography that it cannot break. The police
- may have to give up on wiretaps and information seizures and
- resort to the more traditional (and less invasive and less
- easily abused) ways of conducting investigations, such as
- informants and grants of immunity for testimony. They may
- even have to give up entirely on enforcing certain laws,
- e.g., those prohibiting the mere possession of information.
- Perhaps the government can then redirect its resources
- toward enforcing laws that make more sense.
-
- A popular metaphor states that the computer is an extension
- of the human mind. With cryptography, this metaphor becomes
- reality in one important way - a user can make the informa-
- tion stored in a computer or transmitted over a phone line
- just as private as the information in his own mind. And I
- wouldn't have it any other way in a free society.
-
- Senator, I urge you to abandon this ill-advised proposal. At
- best, it will be ignored. At its worst, it would decrease
- security for law-abiding citizens while doing nothing to
- help bring clever criminals to justice.
-
- Sincerely yours,
-
- Philip R. Karn, Jr.
-
-
- Article 3420 of sci.crypt:
- >From: gwyn@smoke.brl.mil (Doug Gwyn)
- Newsgroups: sci.crypt
- Subject: Re: Senate Bill 266 would require trapdoors in encryption gear
- Date: 16 Apr 91 03:05:59 GMT
- Organization: U.S. Army Ballistic Research Laboratory, APG, MD.
- Lines: 23
-
- In article <17056@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
- >"If privacy is outlawed, only outlaws will have privacy"...
-
- Absolutely -- this hits the nail right on the head. Just as gun control
- activists, who inspired the slogan on which the above was based, can
- achieve at best the disarming of law-abiding citizens, leaving them no
- defense against potential assault by those who ignore such laws, other
- than to die or to break the law themselves.
-
- The right to privacy unfortunately was not considered sufficiently
- questionable by the framers of the US Constitution to require explicit
- mention in the Constitution (as was done for the right to keep and bear
- arms); it was among those rights that the 10th Amendment reserved to the
- people.
-
- I am all for catching genuine criminals, i.e. those who injure others
- deliberately. However, I am not willing to have perfectly reasonable
- activities on my part be declared "criminal" by the legal system as part
- of misguided attempts to "do something" about crime. Having recently
- sat in on several court proceedings, I can attest to the fact that there
- are a lot of fundamental problems with the entire US system of justice
- that should be addressed if crime is truly to be controlled.
-
- Article 3422 of sci.crypt:
- >From: gwyn@smoke.brl.mil (Doug Gwyn)
- Newsgroups: sci.crypt
- Subject: Re: Congress Mandates Backdoors
- Date: 16 Apr 91 02:54:47 GMT
- Organization: U.S. Army Ballistic Research Laboratory, APG, MD.
- Lines: 12
-
- -COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW ENFORCEMENT
- -It is the sense of Congress that providers of electronic
- -communications services and manufacturers of electronic communications
- -service equipment shall ensure that communications systems permit the
- -government to obtain the plain text contents of voice, data, and other
- -communications when appropriately authorized by law.
-
- "Damn, I wish I were The Man!" (with apologies to Cindy Lee Berryhill).
-
- With representatives like these, our remaining freedoms are not long
- for the world.
-
- Unquote