home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Apr 06, 1994 Volume 6 : Issue 30
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (He's Baaaack)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.30 (Apr 06, 1994)
- File 1--"Who Holds the Keys?" (CFP '94 Transcript)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- nic.funet.fi
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 27 Mar 1994 22:09:47 -0800
- From: fen@IMAGINE.COMEDIA.COM(Fen Labalme)
- Subject: File 1--"Who Holds the Keys?" (CFP '94 Transcript)
-
- ((MODERATORS' NOTE: Over the next few weeks, we'll try to include
- occasional summaries or transcripts of CPSR '94 sessions as they
- become available))
-
- Transcript of
-
- DATA ENCRYPTION: WHO HOLDS THE KEYS? (Panel)
- at the Fourth Conference on Computers, Freedom and Privacy
-
- Chicago, Illinois, March 24, 1994
-
- This is a verbatim transcript of the session on "Data Encryption;
- Who Holds the Keys?" held at the Fourth Conference on Computers,
- Freedom and Privacy in Chicago on March 24, 1994. The
- transcription was done by an independent local transcription
- agency. Light editing was done by CFP volunteers to resolve items
- the agency could not be expected to have knowledge of (for example,
- "technical" terms like "PGP"). "Did X *really* say U?" questions
- can always be resolved by listening to the audiotape available as
- tape JM414 from Teach'Em, 160 East Illinois St, Chicago, IL 60611,
- 1-800-225-3775, for $10 + $1 ($2 outside US) shipping and handling
- + 8.75% sales tax.
-
- =================================================================
-
- Welcome to this program from the John
- Marshall Law School's fourth conference on computers, freedom and
- privacy entitled, "Cyberspace Superhighways: Access, Ethics &
- Control", held March 23rd through the 26th, 1994 at the Chicago
- Palmer House Hilton.
- On this cassette you will hear Data
- Encrytion -- who holds the keys? Now to our program.
-
- BOB SMITH Willis Ware originally had been
- slated to being moderator for this panel and Willis had a problem
- and could not be with us and Robert Ellis Smith has agreed to fill
- in and use his technology background to fill in for Willis. It
- will take just a minute while we disengage from the T.V. hookup and
- get back to the modern overhead projector.
- My name is Bob Smith. I publish
- privacy journal and actually I am moderating because Dave Banisar
- did not want to be moderator. We will hear from the three
- panelists with about three ten-minute presentations and then we
- will open it up to questions.
- The three ground rules for this
- session: First, there will be no expansions of the metaphor of
- highways. We will not talk about highway metaphors for the next
- hour. Secondly, we will not accept as a defense that this issue is
- too sensitive or too complicated for us to understand and that we
- have to trust the government. And thirdly, a rule that I hope you
- will make work. If you hear a point of jargon or a point of
- technology that you don't understand, explanation -- not policy
- disputes but if there is something you don't understand feel free
- to raise your hand as a point of order. And if you can say it in
- ten words or less like, I don't understand, we'll get you an
- answer.
- I think Senator Leahy provided a good
- primer for cryptography and so I won't bother with that and we'll
- get right into the nuts and bolts of this issue.
- Our speakers are George Davida, who
- is with the University of Wisconsin in Milwaukee and has been
- involved in cryptography research for many years and was one of the
- first academicians to feel the heavy hand of government in the
- 1980's in its effort to try to curtail research into cryptography.
- That appears to be happening again in the 1990's so perhaps
- Professor Davida can tell us something about his experiences
- earlier on that same front.
- Our second speaker will be Stuart
- Baker, who is General Counsel of the National Security Agency. He
- was a lawyer in private practice in Washington before joining NSA
- and one of the things he promised to do is to tell us exactly what
- NSA does and is because a lot of people don't know. It is
- different from the National Security Council by the way.
- Thirdly, our third speaker will be
- David Banisar who is the Computer Professionals for Social
- Responsibility office in Washington. He is trained as a lawyer and
- has a background in computer science and has some strong feelings
- about the cryptography debate.
- We will now move to Professor Davida.
- PROFESSOR DAVIDA I would like to talk about two issues
- that concern me and I believe a number of people here. By the way,
- I brought some copies of my paper in case you need one today. And
- if I don't have enough you can always write to me at that address.
- And I am also willing to put that on FTP for those of you who are
- on Internet and you can pick up a poster file and print it if you
- so wish.
- As Robert said, in 1978 I had an
- interesting experience with NFA. I was doing research at the time
- in cryptograhy and one day I received a secrecy order by mail. It
- was more or less like a postcard telling me that under the penalty
- of three years in jail and $10,000 fine I am to talk to no one
- about what I had done in that paper without reference to any
- classified material.
- At first my graduate student and I
- laughed until we found out that it was deadly serious. We talked
- to the Chancelor about it and he said, no way because in Wisconsin
- there is a strong position of academic freedom and we are not
- allowed actually to conduct research that's secret. So we decided
- to resist the order and after a number of conversations between the
- Chancelor and someone you might have heard about recently again,
- Admiral Bobby Inman, and the then Commerce Secretary Juanita Kreps,
- the order was lifted. But not before Admiral Inman tried to
- convince the Chancelor that he should acquiesce to the order and
- allow us to stay, but I am happy to say that the Chancelor said
- that we could not put up with the order.
- Shortly thereafter a group was formed
- by the American Council on Education called Public Cryptography
- Study Group, not to be confused with Public Key Cryptosystems. And
- it is interesting that this group considered model legislation for
- censorship at first. I objected to it rather vigorously and when
- the press began to get involved in covering the meetings, they then
- approved what they called voluntary prior restraint. I again
- dissented from that report and the rest, as they say, is history.
- Many people have asked, "why do you
- oppose restaints?" Very simply, that privacy is just too important
- to leave it just to agencies like NSA. I also felt that the ACE
- recommendations were dangerous because they were later going to be
- looked at as some kind of admission by allegedly knowledgeable
- people that cryptography is an evil tool that will only be used by
- terrorists and drug dealers. And it is interesting that Senator
- Leahy himself refers to the struggle of the law enforcement with
- crimes -- and I assume he is talking about drug dealers and what
- have you. But someone should point out to him that they are not
- using cryptography today so I don't know what the struggle is all
- about. They may be struggling against criminals -- not because of
- cryptography but simply because a crime is just a major problem.
- I would also like to tell them that I don't think that the
- intelligence agencies struggle when it comes to tapping ordinary
- law abiding citizens. They do very well, thank you.
- I also think that the realities are
- very different because cryptography is extremely important for two
- very critical applications. Now so far you mostly hear about one
- of them which is privacy. But the other application that also
- needs privacy work on is authenticity, or identification. These
- are two extremely critical applications of cryptography. And what
- is interesting is that the current proposals -- again, you only
- hear about one of them -- actually constitute a double whammy --
- because there are two proposals that are being put forth today.
- You only hear about Clipper but what you do not hear about as much
- is the other twin monster that which is the digital signature
- standard. Basically what they are trying to do with this -- with
- Clipper you lack privacy and with DSS you essentially lack the
- signature, the identification schemes -- the two most important
- operations/applications of cryptography.
- So what will essentially happen is
- that not only can you invade privacy with digital signatures which
- will be essentially the new way of identifying yourselves to an
- awful lot of systems and executables. They will actually be able
- to deny your very existence if those systems are allowed to be only
- government issued because it will be impossible in the systems of
- the future not to use something like digital identification/
- digital authentication schemes because there are no other effective
- means. You all know about the silly paper systems we use for
- identifications, and even high school students know how to fake
- ID's to drink. So we will be moving toward digital signatures and
- if there is only one digital signature it's essentially a proposal
- to have just one government Bic pen. That is what they would like
- us to have. One pen to sign our names with and sign our checks
- with and authenticate ourselves with.
- Now again, as I said, privacy is one
- application and I have raised a number of objections to it because
- it has been again portrayed as a tool of crime and criminals and
- drug dealers. But they are not the only ones who will be using
- cryptography and more importantly, if we continue this policy they
- will be the only ones who will have good security because we will
- not have any security as to privacy. And as that saying
- goes "if you outlaw privacy, only outlaws will have privacy". It
- is very strange. I find myself wanting to go and join
- organizations like the NRA all of a sudden. I really do.
- There is also an interesting sort of
- deception here going on with this so called escrow system. The
- problem is that, how in the hell can you escrow privacy. Go look
- at the definition of escrow -- it says that something of value held
- in trust is given back. Can you give back privacy? That is
- impossible. So I think that the very title of that is deceptive.
-
- Then I was amused, as some of you
- might have been, with all the stories about bugging to look up a
- recent case of my friend Bobby Inman again, standing in front of
- television cameras saying that William Safire and Senator Dole were
- conspiring to get him with the President. And the question is,
- where is he getting this kind of data? Presumably he must because
- he spent his whole life, by the way, being very careful about what
- to say. You know, I can't imagine he is saying that without having
- something to back up with what he was claiming. So when we talk
- about bugging, just what do they do with all that data? Well, I
- think you have seen an example of what possibly may have been dealt
- with -- data that is intercepted.
- Again, authenticity is another area
- that I think people should pay attention to. The second most
- important application of the use of identification, digital
- signatures for proving who you are and yet again they are proposing
- just one single big pen. I think that these two proposals jointly
- amount to what I consider a digital dragnet. Thank you.
- STUART BAKER: I have a friend who gives speeches a
- lot and he likes to begin all his speeches by referring to country
- and western songs that sum up the theme of his talk. When he talks
- about U.S./Japan trade relations, he always starts out by referring
- to that classic "you got the gold mine, I got the shaft." And I
- thought about what David would have given as the country and
- western song that I should probably sing here and I think in
- relation to the Clipper Chip it would probably be "How can I miss
- you if you won't go away?"
- There is a reason why the Clipper
- Chip won't go away and what I thought I would try to do very
- quickly because I only have ten minutes before the lynching begins
- is talk about why Key Escrow hasn't gone away by talking about some
- of the myths that are pretty prevalent about Key Escrow. I am not
- going to call it Clipper because there are a lot of products called
- Clipper. This is the internal name, not something that was used
- for the public. I don't object to people calling it Clipper but
- there probably are people who have Clipper products who would
- prefer that it not be called that.
- Let me see if I can put the first one
- up. [OH slide: Myth #1: Key escrow encryption will create a brave
- new world of government, intrusion into the privacy of Americans.]
- I think this is pretty -- probably the classic opening statement
- about Clipper. That this is the beginning of some kind of brave
- new world in which everybody's privacy is at risk in a substantial
- new way. There is a lot of emotion behind that argument but not a
- lot of fact, because if you ask yourself if everybody in the United
- States used key escrow encryption and only key escrow encryption,
- which is not what the Administration has proposed by any means,
- what would the world look like? Well, the world would look like
- the world we live in today. It would be possible for the
- government to intercept communications subject to a variety of
- legal rules that make it very dangerous to go outside those rules.
- And, in fact, it would be a more private world because other people
- without authority would not be able to intercept and decrypt those
- communications. That is important because, in fact, there is
- somebody proposing a brave new world here and it is the people who
- want people to go away and to have unreadable encryption installed
- on all of the communications networks in the United States. That's
- a new world and that is a world we don't understand. We don't live
- in it today.
- We don't know what it is going to be
- like if criminals or terrorists or other people who are hostile to
- society can use that sanctuary to communicate. We don't know what
- it is like but it probably won't be as pleasant in terms of freedom
- from crime and terror as the world we live today, which is not
- exactly a comforting thought. It won't be a world in which the
- government can do more than they do today. So if you ask yourself
- well, how bad is it today, that's as bad as it can get under
- Clipper.
- [OH Slide: Myth #2L Unbreakable
- encryption is the key to our future liberty]
- Now the response to that, that you
- hear from people, well, yeah but what if the Republicans get
- elected? What if the Administration changes? This is a guarantee.
- I don't want to have to rely on laws and procedures and escrow
- agents. I don't trust the escrow agents, I don't trust the courts,
- I don't trust the government, I don't trust anybody. I want to
- trust my machine.
- Now that is not an uncommon way of
- thinking in the parts of this community. I said to somebody once,
- this is the revenge of people who couldn't go to Woodstock because
- they had too much trig homework. It's a kind of romanticism about
- privacy and the kind of, you know, "you won't get my crypto key
- until you pry it from my dead cold fingers" kind of stuff. I have
- to say, you know, I kind of find it endearing.
- The problem with it is that the
- beneficiaries of that sort of romanticism are going to be
- predators. PGP, you know, it is out there to protect freedom
- fighters in Latvia or something. But the fact is, the only use
- that has come to the attention of law enforcement agencies is a guy
- who was using PGP so the police could not tell what little boys he
- had seduced over the net. Now that's what people will use this for
- -- not the only thing people will use it for but they will use it
- for that and by insisting on having a claim to privacy that is
- beyond social regulation we are creating a world in which people
- like that will flourish and be able to do more than they can do
- today.
- [OH Slide: Myth #3: Encryption is the
- key to preserving privacy in a digital world]
- I'll move quickly. There is another
- argument that I think is less romantic and that is the notion that
- technically, because we are all going to be networked, we are all
- going to be using wireless stuff -- we need encryption for privacy.
- I am not going to say that does not fit but it is a little
- oversold. Actually, I agreed with Professor Davida. Much of the
- privacy problems that we see in an electronic world are not because
- people are intercepting our communications, they're because we are
- giving it away. But what we don't like is that there are people
- now in a position that collate it all from public stuff that we
- willingly gave up. Well, you know, we gave this information to get
- a loan from one bank and before we know it, you know, our ex-
- spouse's lawyer has got it. That's a problem, but encryption won't
- solve it because you are going to have to give that information up
- if you want the benefit that the bank has.
- Similarly the most important use for
- the protection for privacy, protection for data, is authentication
- -- digital signatures as opposed to privacy. I won't say that
- encrypting data for privacy purposes is irrelevant but it is
- probably not the most important way of guaranteeing privacy in an
- electronic age.
- [OH Slide: Myth #4: Key Escrow won't
- work. Crooks won't use it if it's voluntary. There must be a
- secret plan to make key escrow encryption mandatory]
- This will be familiar. You shouldn't
- over estimate the I.Q. of crooks. When I was first starting out as
- a lawyer I was in Portland, Maine and a guy walked into a downtown
- bank and he said, he handed a note to the teller, it said, "Give me
- all your money; I don't have a gun but I know where I can get one."
- I'm sure if you sent him out to buy encryption he for sure would
- buy the Clipper Chip.
- I think this misstates the problem.
- The notion that what the government is trying to do is to put in
- everybody's hands this kind of encryption in the hopes that crooks
- will be fooled into using it I think is to misstate the nature of
- the concern. The concern is not so much what happens today when
- people go in and buy voice scramblers; it is the prospect that in
- five years or eight years or ten years every phone you buy that
- costs $75 or more will have an encrypt button on it that will
- interoperate with every other phone in the country and suddently we
- will discover that our entire communications network, sophisticated
- as it is, is being used in ways that are profoundly anti-social.
- That's the real concern, I think, that Clipper addresses. If we
- are going to have a standardized form of encryption that is going
- to change the world we should think seriously about what we are
- going to do when it is misused.
- [OH Slide: Myth #5: Industry must be
- left alone for competitiveness reasons]
- Are we interfering with the free
- market? Are we affecting the competitiveness of U.S. industry
- here? First, Clipper is an option. It is out there. People can
- use it. They can make it. They can not use it. And they can not
- make it. It's simply an additional option on the market. There
- may well be people who want this.
- I am a lawyer. I think in terms of
- who is liable if something goes wrong. And I think that if it's
- your business, and you are thinking about buying encryption and the
- possibility that your employees will misuse it to rip-off your
- customers, you ask yourself, well who is going to be liable if that
- happens? You might think, "Geez, maybe I don't want to be in a
- position where I can't actually make sure the police can come in
- and check to see if people are misusing this encryption where I
- have reason to believe that they are."
- Second, and this is a point that gets
- lost a lot: this is a standard for what the government is going to
- buy because nobody in this room has to buy this thing. Now the
- complaint is kind of remarkable from all the stand-on-your-own-two-
- feet, free-market, nobody-tells-me-what-to-do, organizations that
- we hear from. The fact is, that this is just what the government
- is going to buy, and the people who are complaining that they don't
- want to make it, or don't want to buy it, don't have to. What they
- are really saying is, we would like the government to go on testing
- equipment, telling us what the best stuff is so we can then go out
- and sell it without doing our own research, doing our own
- debugging, our own checks on this technology. I think if you think
- of it from the government's point of view you see why we don't want
- to do that. We probably -- there are very few institutions other
- than government that are willing to devote both the kind of energy
- and resources that it takes to eliminate the last few bugs in
- encryption software or machinery. To go through and find every
- possible attack and think about how to prevent it -- somebody once
- said, the airport guy talking about encryption he said, well, I'll
- take it if it is invisible, doesn't have any effect on the pilot,
- and adds lift to my airplane. There is an attitude about
- encryption that I think most of you have probably encountered in
- the commercial world is, "Yeah, I want it if it is free." But
- there is very little demonstrated inclination on the part of
- industry to spend a lot of its own money to develop independent
- encryption. And the fact is that a lot of the encryption that is
- out there today was designed with government money, or endorsed by
- government standards or otherwise supported by government
- fortresses. But if the government is going to create encryption
- and create markets and run the cost down, then we ought to be
- designing and buying encryption that we are willing to see migrate
- into the private sector without destroying the ability of law
- enforcement to deal with it.
- And, I guess, the last point, people
- who don't want to sell to the government can make anything they
- want. People are willing to put their own money into designing
- encryption can do it. This is just what the governments fund.
- AUDIENCE COMMENT: But you can't take it overseas. What
- the government buys is (inaudible) technical for overseas.
- BAKER: This is also something that we hear
- a lot about and I'll deal with it quickly.
- [OH Slide: Myth #6: NSA is a spy
- agency. It has no business worrying about domestic encryption
- policy]
- Yeah, the NSA does indeed gather
- signal intelligence in foreign countries. But we have a second
- issue. Not only do we try to break people's codes but we make
- codes for the federal government. That means we have as a
- significant mission trying to design secure communications here
- that the government is going to use. And we face the very real
- concern that I described earlier, that if we design something and
- it's good and it's terrific stuff and the price goes down because
- the government has bought a lot of it, then other people are going
- to use it. It may end up becoming the most common encryption in
- the country. If that happens and people like this pedophile out in
- California start using it, we have some responsibility for that and
- therefore we have some responsibility to design and use encryption,
- that (if it does migrate to the private sector) does not put law
- enforcement out of business.
- [OH Slide: Myth #7: The entire
- initiative was done in secret. There was no opportunity for
- industry or the public to be heard.]
- This is my last one. Again, this was
- true, I think or at least it was a reasonable thing to say in April
- of '93 when the Clipper Chip first showed up in people's
- newspapers. But since then the Administration has done an enormous
- amount of public outreach listening to a variety of groups -- EFF,
- CPSR, industry groups, holding hearings, organizing task forces to
- listen to people. It is not that they weren't heard -- what I
- expect people to say is, yes but you still didn't listen. We said
- we don't like it. How come you still did it?
- I think that the answer to that is
- you have to ask yourself, what is the alternative that people will
- propose. It is not enough in my view to simply say "Get rid of it.
- What we want is unreadable encryption so that we have a guarantee
- of privacy against some government that hasn't come to our country
- in 15 years or a hundred years or two hundred years, and in the
- same guarantee that criminals and other people who don't have
- society's interest at heart will have a kind of electronic
- sanctuary." That is not a very satisfying answer for people who
- have to uphold the law as well as try to get the national
- information infrastructure off the ground.
- Thanks.
- DAVE BANISAR: Well, first I'd like to say I'm not
- sure what song you were referring to in your country and western
- description, but I think if I had to choose a country and western
- song it would probably be "Take This Job and Shove It."
- Moving onto the high road from now,
- I think what we have here is a really fundamental change in the way
- the communication system is being looked at in the future.
- Currently we have a situation where if somebody decides they need
- a wiretap, which is an issue I'll get to in a minute, whether it is
- useful or not, they go and they do an affirmative action. And the
- communication system is essentially set up to communicate. I use
- it to call.
- These two proposals, digital
- telephony which we haven't talked about here too much and Clipper,
- change that around. They change it into a fundamental purpose for
- the communication sytem now is going to be, let's make it available
- for surveillance. Essentially, we are designing pretapped
- telephones and then we have to work on the assumption that at only
- authorized periods will they not turn those on. This is a
- fundamental change. It treats now every person as a criminal. We
- are looking at them going -- well, I think that every person in
- this room is a criminal so I will build the tap into their phone.
- Perhaps next they will be building microphones into everybody's
- desk chairs and only turning them on when they need them. Frankly,
- in reality I don't know if the law enforcement has really made the
- case for wire tapping. Just last week they busted the entire
- Philadelphia mob. They got it by putting a microphone in the
- lawyer's office. This book here, GangLand, it is all about how
- they got Gotti. They put microphones on the street to get Gotti.
- The FBI comes and they give us the four cases. They have the El-
- Rukh people here in Chicago which I believe was more like a scam to
- get some money out of the Libyan government. They have one
- pedophile, they have a couple of drug dealers and so on and they
- keep doing this.
- I don't think they really made the
- case. There's only in reality 800 or so wire taps a year. They
- are only a part of the deal. A lot of busts, especially from
- Mafia, are done with inside people with microphones, with a lot of
- other technologies out there. The FBI has spent billions of
- dollars in the last ten years modernizing. They have an amazing
- computer system now, amazing DNA systems, amazing everything. They
- are not behind the scenes anymore, or behind the ball anymore.
- To give you a new example: There were
- approximately a couple thousand arrests in 1992 that they say were
- attributable to electronic surveillance and that includes bugs. So
- it is hard to say how many of those were actually wire taps. In
- 1992 there were 14 million arrests in the United States. That's an
- awful lot of arrests and an awful small number of those had to do
- with electronic surveillance. Are we willing to revise our entire
- communication system just for that very small number? It is a
- question that needs to be asked.
- Now we have a problem. I wish we
- could wave my magic wand here and solve the problem. [Takes out
- wand] You know, this is the magic wand that I can say crypto be
- gone, or crypto be strong. I don't know. It's not working. Oh
- well. So I have a couple solutions or a couple suggestions as they
- may be.
- First is to withdraw the Clipper
- proposal. It's a bad idea. Nobody wants it. Of the CNN/Time
- Magazine poll 80% of the American public didn't want it. Industry
- doesn't want it. Fifty-thousand people signed our CPSR Clipper
- petition asking for its withdrawal. I haven't seen anybody in the
- world who wants this thing -- well, save two, but I won't mention
- them.
- What should be done is to restart the
- process. Back in 1989 NIST was basically ordered to start a new
- process to return to make a new version of DES, or to replace DES
- with something else. And they had a good idea. They wanted it to
- be an open process. They wanted to look around, talk to people
- like they did back with DES and they eventually got that from IBM.
- They wanted a public algorithm that did both security and
- authenticity. They wanted it available in hardware and software.
- They wanted it to be a good strong standard for everybody. This
- hasn't happened.
- You know, withdraw the Clipper
- proposal and start the process over. There's lots of people in
- this room even who could come up with something very good but the
- fact is that we have not been allowed to do it. We had, I guess,
- nine or ten months after Clipper came out which had been designed
- in secret for the last five years. In that time nobody has come
- out and supported the thing and lots of people have had better
- ideas. But they came back a couple weeks ago and came out with the
- exact same proposal with one or two typos replaced. But that's
- about it.
- The second thing we need to do is
- revise the law. We need to do this since NIST is the agency that
- is supposed to be in charge of this. We should make NIST subject
- to the same kind of rules that every other government agency has to
- go by. Why should NIST have lower standards to develop these
- crypto things which will affect all of our privacy than the FCC
- does when they hand out a radio license; when the Environmental
- Protection Agency does when they determine how much toxic waste we
- can survive in? The basis for this, for any of you that are
- lawyers in the room, is known as the Administrative Procedures Act.
- It is very well established, it has been around 40 years. Every
- other government agency, every other public government agency uses
- it already and it works well. The things that go under this
- rulemaking is that it is open. It is done in the open. There's no
- communications behind the scenes. It's all done in the public eye.
- The decision -- when they finally make a decision -- is based on
- the public record. It is not based on something on a classified
- study. And it is appealable. If we think that we've been screwed
- we can appeal.
- Finally, as we heard three or four
- times today, we need an independent privacy commission. Simply
- speaking, there is nobody in this government -- in the U.S.
- government -- who is responsible for privacy. To look around and
- say, wait a second, this isn't working. I mean, what kind of
- government do we have that comes up with something on surveillance
- and calls it the "Communication Privacy Improvement Act"? What we
- need is a government agency that can look around and give an
- independent assessment on what's going on. And it can't be shunted
- aside or ignored or anything like that. We have to realize, and I
- apologize for breaking Bob's ground rules, that we're building the
- national information infrastructure without any guard rails. And
- we need to think about it and get back.
- Thank you.
- BOB SMITH: Questions, short and sweet. We have
- limited time.
- CHARLES MARSON Charles Marson, lawyer of San
- Francisco. I would like to ask a question of the General Counsel.
- I have to say, this may be my one lifetime opportunity.
- A lot of the Administration's case
- for the Clipper depends on a reliance and a level of comfort with
- present law. We are always told present law covers these things we
- are not extending anything. Present law requires your agency, sir,
- to apply to the foreign intelligence court for a warrant. CBS News
- issued a report last month that said that -- I think it was 4,500
- applications had been made to that court -- all appointed by Chief
- Justice Renquist, and 4,500 have been granted. That is to say not
- one has been denied. Now in terms of our comfort level with
- present law will you tell us why it is that we should not conclude
- that this court is nothing but a Fourth Amendment fig leaf and that
- your agency is in fact free to tap anybody it wants.
- STU BAKER There's an interesting element -- I
- think you have to understand bureaucratic behavior in part here.
- CHARLES MARSON My fear is that I do, sir.
- [Laughter] A real tap whomever you please.
- STU BAKER Let's bear in mind, these are all
- Article III judges. I actually don't know that the figures you
- gave are right. But these are Article III judges from all over the
- country. They are used to seeing law enforcement wire taps and to
- reviewing them carefully. Their whole life is sticking to the law.
- CHARLES MARSON If they said yes all the time, who
- cares?
- STU BAKER Well, I -- let me offer an
- alternative explanation for the record of the courts and the agency
- in terms of FISA applications. And that is this. No one wants to
- be the first general counsel whose application is turned down.
- Nobody wants to get creative about what you can do and what you
- can't do. And so the effect of putting into judicial review is not
- so much that it is going to lead to judges rejecting a lot of stuff
- as much as it will make the agency make sure that before it takes
- something to the court, it is absolutely confident it has a case
- that it can make, that the judge will accept as fitting within the
- standards set by the statute. It's for the same reason that
- prosecutors don't like to bring cases that they don't think they
- can win. People do not like to try and fail and they consequently
- are very careful about what they put forward. I think that in fact
- is a more creditable explanation of the figures that you gave if
- they are right than the explanation you gave which is that judges
- don't care what the law is. I don't think that's true.
- SPEAKER Could we move on to the next
- question, thank you.
- PHIL ZIMMERMANN That explanation reminds me of the
- Doonsberry cartoon about grade inflation where some students sued
- for not getting an "A" in this course and in the courtroom they
- said that this university gave an "A" to all students. How is it
- possible that the entire graduating class had an "A" average of 4.0
- and they said, well, you know, it's just a great class. So I guess
- all those guys that applied for the wiretap orders through that
- judge, all those judges, absolutely all of them did everything
- right. It's sort of a grade inflation for wire tap requests.
- One thing that bothers me about this
- process of Clipper ....
- MODERATOR Your name please.
- PHIL ZIMMERMANN I'm sorry. I'm Phil Zimmerman. I am
- the author of PGP [applause]. I'm sorry, I didn't hear the part
- about what is your name.
- It seems to me that this Clipper
- process has some kind of secret game plan that the government is
- following through that we only find out about each step of it as it
- unfolds. I saw on the net some news about some representative of
- the U.S. government going -- it might have been from NSA -- talking
- to people in Europe, other countries in Europe, about them getting
- their own Clipper systems. Well, that seems like a public policy
- thing that we should have been discussing openly here before
- sending somebody over there to quietly do horizontal escalation and
- get this Clipper thing glued in worldwide, planetwide before ....
- thus making it harder to reverse later.
- MODERATOR Could you phrase the question? The
- line behind is getting restless.
- ZIMMERMANN Okay, okay.
- I think that this kind of secretive
- agenda is not being treated like other public policy issues like
- health care and things like that that are openly debated. It's
- like we are being treated like an enemy foreign population to be
- manipulated cynically. And so I would like somebody to respond to
- that, whoever wants to respond to that -- why can't we be treated
- like ...
- MODERATOR Let's hear the response.
- ZIMMERMANN Okay.
- STU BAKER There isn't a secret plan.
- AUDIENCE (Negative response from the
- audience.)
- STU BAKER But, all right, there will be --
- we're not the only place that's worried about law enforcement and
- criminal misuse of the communications system. Every country in the
- world is going to be concerned about that -- it is no surprise.
- Today France says we will tell you what you can use, what you can
- export, what you import. Singapore, we've had lots of companies
- say we're concerned about that.
- ZIMMERMANN Singapore -- it's illegal to not
- flush the toilet in Singapore. I didn't make that up, that's true.
- It's possible to construct a society -- a crime-free society -- but
- who wants to live in a society like that? We might be heading
- toward Singapore. I'm glad you said Singapore -- I couldn't have
- paid you money to say that -- I'm glad you said Singapore.
- STU BAKER But look, Italy has just banned forms
- of encryption on the phone system. The significance I think of the
- Singapore example is that we shouldn't expect that as Asians get
- richer they are going to say, oh well, let's adopt American views
- about privacy. What's important about that, I think, is the view
- that we get from a lot of people whose life has been open systems
- and will have seen that standards are the key to new technological
- advances, believe that if they could standarize encryption and sell
- it everywhere in the world, it would sweep the world and whoever
- had the best product would win. I think that reckons without the
- law enforcement concerns that you will see in every country. And
- you are already beginning to see other countries say we are not
- going to tolerate unreadable encryption of all sorts proliforating
- throughout our communications network. You are going to see more
- of that. Not less. It won't happen here but it will happen in
- other countries.
- AUDIENCE Yes, worldwide.
- MODERATOR Can we move onto the next question?
- And we probably have time for only two more.
- BLAKE SOBILOFF My name is Blake Sobiloff and I'm
- with ACM SIGCAS and I'm trying to figure out some sort of
- philosophical presupposition that you have -- the kind that frames
- your approach to your objections to anti-Clipper individuals.
- BAKER Most of the anti-Clipper individuals
- I really like actually.
- BLAKE SOBILOFF Okay, well, their position. Would it
- be fair to characterize your position as one that assumes that a
- desire for an unimpeachable privancy can be fairly well equated
- with the desire to engage in lawless acts?
- BAKER No, I think that's completely wrong.
- The problem is that guaranteeing privacy to everybody is going to
- guarantee it to some people who will misuse that kind of
- technological sanctuary.
- AUDIENCE (Negative response.)
- BAKER All right, okay. Well, to continue
- the poor song metaphor, if anyone is familiar with the Spin Doctors
- rock group. Let me say that you are a fantastic Spin Doctor and I
- do admire you for that but I'll keep my pocket full of kryptonite.
- Thanks.
- QUESTION Can I make a comment on that.
- BAKER Yes.
- QUESTION I think it is important to say
- something about who asked NSA to be the guarantor of privacy.
- Asking NSA to guarantee privacy is sort of like asking Playboy to
- guard chastity belts.
- BAKER I tried to address that briefly. Our
- job is in fact to guarantee the privacy of U.S. government
- communications when they're talking about whether to go to war, for
- example. That's one of the things we do and it is one of our two
- principle missions. We do guarantee privacy. Now I understand the
- reaction but we do have a job to create encryption and to make it
- as good as we possibly can.
- AUDIENCE Not for my privacy.
- BAKER My concern is that what we design is
- very likely to be -- to find itself migrating into private sector
- and if we design it in a way that is going to put law enforcement
- out of business we haven't acted responsibly.
- MODERATOR Next question.
- HERB LIN My name is Herb Lin. I'm with the
- National Academy of Sciences regarding the need for an independent
- look at it. The U.S. Congress has asked the Academy to undertake
- an independent assessment of national cryptography policy.
- Descriptions of that study are out on the giveaway desk. I'll be
- glad to talk to anybody about it.
- MODERATOR Thank you. We've got one more.
- (Unknown) My name is Barbolin (?) from GRC (?).
- I have a question concerning the algorithm that is used in the
- Clipper Chip, Skipjack. That algorithm is not being made public
- and yet one of the very basis of scientific research is that the
- work should be published and then reviewed by the community and
- approved as the state-of-the-art develops. Yet it seems that the
- NSA reluctant to do that. There is a certain amount of conjecture
- that in fact the algorithm contains a deliberately encoded weakness
- that will allow the NSA, without access to the escrow keys, to be
- able to intercept communication in their mission to monitor on-
- shore and off-shore communications. There's a number of us in the
- scientific community that are greatly concerned that that algorithm
- is not being made public. I would like the counsel from NSA to
- address that with a simple yes or no answer. Is that a problem?
- And then I would like our university professor to comment on his
- opinion in this matter.
- BAKER I'll answer it yes or no if you'll
- tell me exactly the question.
- UNKNOWN Does it or does it not contain a
- weakness that allows you to intercept the communications without
- access to the escrow keys.
- BAKER No.
- MODERATOR I'm sorry, that has to be the last
- question. We will conclude. I'm sorry, we have to stick to the
- schedule. [Negative audience response.]
- We'll conclude with another country song which is ....
- GEORGE TRUBOW, CONF. CHAIR Let me explain to you what our
- problem is. During the reception this room is going to be cleared
- and turned into the dining room for our meal this evening and so
- the hotel has a schedule; and if you want to give up the evening
- reception and meal we could do that but that's why we've got to
- close out. You want to go for a little longer. Okay, how about
- this for a promise, we'll quit at six (pm) which will give us
- another seven minutes. All right.
- PROFESSOR DAVIDA I will comment just very briefly about
- this issue of standards and algorithms.
- I've worked for almost 20 years in
- organizations like IEEE(?) Computer Society and we have addressed
- issues like standards. It is important to understand what a
- standard is. Standards' purposes are primarily to promote trust in
- commerce and the products that you are actually engaging in, buying
- or using. DES and other encryption standards deviate from that
- substantially. These are not standards that set a boxing or weight
- standard, or a packaging standard, which is what most electronic
- standards and computer standards tend to be like. For example,
- there is no standard that says you must use the Intel 8085 or
- whatever. There is no standard that says you must use a particular
- chip. The standards pertain to buses, number of bytes and what
- have you. DES and other standards like that force us to adopt
- something which is basically monopolistic. It is specific
- algorithm. So there are some fundamental faults with it. But as
- for trusting algorithm that somebody else designed, I stand by my
- previous comment.
- MODERATOR Thank you.
- MIKE GODWIN I'm Mike Godwin with the Electronic
- Frontier Foundation and I have a question, as you can image for the
- General Counsel of the NSA.
- You said in myth number four that we can
- anticipate -- and in fact NSA did anticipate that these
- technologies would become available in five to ten years. People
- would go buy telephones, have an encryption button and be able to
- use this technology -- I think I am quoting you accurately -- in
- profoundly anti-social ways. Isn't it true that many otherwise
- acceptable technologies can be used by individuals in profoundly
- anti-social ways including, say the printing press. Isn't it in
- fact true that in a democratic society we make a decision to
- empower individuals knowing upfront and openly that we do so taking
- risk about society. Isn't that in fact the case in this country?
- BAKER Yes. And first I should say, Mike, I
- haven't met you but I've read your stuff and actually, is David
- Sternlight here too?
- Sure you take risks and you have to look
- at each technology as it comes. Let's take a look at cars. Cars
- have advantages and risks and how do we deal with that. We put
- license plates on every car and everybody has to have a license
- plate on their car even if they think it violates their First
- Amendment Rights to do it.
- MIKE GODWIN In fact, automobiles are a little bit
- different because we do have explicit Constitutional guarantees
- with regard to communications. We have implicit and explicit
- guarantees as regard to privacy and it is a little bit different
- from driving your Ford.
- BAKER Well, actually there is a Constitutional
- right to travel.
- MIKE GODWIN There is a Constitutional right to travel,
- that's correct. But we are talking -- it's still a false analogy.
- This is a central right. You know, Hugo Black said that there is
- a reason for the First Amendment to be a First Amendment.
- BAKER This is why I never get on the net with
- you, Mike.
- MIKE GODWIN So I take it you've answered my question.
- The reason -- the thing that really troubled me about your comments
- is that you did talk about France and Italy and Singapore and it
- seems to me worth pointing out that the theory of government that
- we have in this country is a little bit different from the theory
- of government in France, Italy and Singapore. (Applause)
- BAKER Absolutely. I don't think that we will
- ever have the same view of government that any of those places
- have.
- MIKE GODWIN I'm confident.
- BAKER And I think the short answer is, yes, as
- each technology comes along we have to evaluate the risks and the
- rewards that come with it and try to figure out the way to get as
- much good from it and as little bad from it. And the response is
- going to be very variable depending on the technology. But you
- can't set up a principle that says we will always do whatever seems
- like the best technology today without regard for the social
- consequences. We don't do that with guns, we don't do that with
- cars, we don't do that with any kind of technology.
- MODERATOR Can we go on to another question?
- JOHN BRIMACOMBE Hi, my name is John Brimacombe I'm a
- European scientist and user of cryptography. I'd like to go
- through something very quickly here. First, you know, people know
- about cryptography in Europe. We know about all the algorithms.
- Secondly, you know, scientists in Europe don't have brains so
- defective that we can't implement them. And there is going to be
- a big market for this sort of stuff out there in the world. Now,
- we can do that work, we are doing that work, we like doing that
- work. You are cutting yourselves off. My question is, why are you
- screwing yourselves this way? My worry looking at your nice
- salesmen of your shiny Clipper Chip coming to sell it to all my CEC
- people. I'm worrying that you see this problem. You see
- yourselves being put out of the market by these nice Europeans.
- They say, okay, let's go and screw their market up to a Clipper.
- MODERATOR No response?
- BAKER No, I liked the speech.
- MATT BLAZE Matt Blaze from Bell Labs. I have a
- question that was originally for Senator Leahy but it could be
- equally well directed to the NSA Counsel. Do you see any risks in
- terms of risk assessment of the Clipper proposal to the fact that
- the escrow procedures exist entirely within the purview of the
- Executive Branch, the Attorney General in particular, and can be
- changed essentially at will entirely within a single branch of
- government?
- BAKER I think that's a reasonable concern.
- One of the interesting things is that we designed it so you decide
- who you trust and that's where the keys go as a society. And we
- didn't have much input into who holds the keys. This is almost a
- litmus test though. It is kind of interesting when you ask, well
- who do you trust, exactly? And often the answer is "Well, just not
- those guys." And it is much harder when you ask the question,
- "Well who would you trust?" I think Jerry Berman was quoted as
- saying I don't care if it is Mother Theresa and the Pope who holds
- the keys. There certainly are people who feel that way. There is
- a lot of talk about whether, you know, should you have private
- sector entities hold the keys and I have to say that one doesn't
- ...
- MODERATOR I have to say through the escrow agency.
- The procedures are written and under the authority of the --
- entirely within the Attorney General.
- BAKER The procedures don't change the fact
- that we are all governed by laws that are already on the books that
- make it a felony to do stuff without authority. And so the
- procedures for withdrawing key are written down as Executive Branch
- rules but the legal framework for that is set by Congress or by the
- Fourth Amendment as a matter of fact.
- EFREM LIPKIN I'm Efrem Lipkin that works in
- community and I guess I'm a fossil from the '60's. My parents had
- to deal with HUAC. I had the utterly surreal experience -- I was
- in the Civil Rights Movement -- I had this surreal experience of
- apparently a government agent tried to plant a copy of the Daily
- Worker on me. And so my question is really for CPSR. Why, I
- understand why the NSA says we don't have to worry about this
- government. We haven't had any trouble with it recently. But why
- doesn't CPSR point out all of the trouble we have had and how the
- protection -- the privacy protection we want and that we
- historically needed -- is from the government.
- BANISAR Well, obviously, you haven't been
- reading a whole lot of my press releases. We've been pointing out
- a lot of the abuses and problems that have been going on. We have
- also some deep concerns to pour off here a little bit about the
- escrow procedures. At the end of each escrow procedure it mentions
- that they are not enforceable so if they are violated it wouldn't
- matter because this evidence can't be suppressed. Frankly -- I
- guess somebody asked me today -- Mike Nelson from OSTP apparently
- now is talking about putting the escrow key holders outside the
- government. I frankly think that it wouldn't make a whole world of
- difference whether Mother Theresa and the Pope held the keys then
- if they are not enforceable.
- MODERATOR Thank you, thanks to all the panelists for
- coming. We'll conclude with another country song, "I've Enjoyed
- About as Much of This as I Can Stand."
- Just a moment please, there is a
- related announcement on an equally high note I want to read this to
- you and to my colleague here. To a dedicated advocate, gifted
- journalist, generous friend and true champion of freedom, Robert
- Ellis Smith. publisher, Privancy Journal, in recognition of 20
- years in service to the cause of privacy protection. With warm
- regards from friends and colleagues in celebrating the 20th year of
- the publication of this fine journal.
- ROBERT ELLIS SMITH I have a few words I would like to
- say.
-
- END OF TAPE
-
- ===================================================================
- There endeth the transcript - CFP'94 Volunteers.
-
- ------------------------------
-
- End of Computer Underground Digest #6.30
- ************************************
-
-
-