John Armitage on Sat, 18 Sep 1999 05:17:06 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> FW: Decoding the Crypto Policy Change


-----Original Message-----
From: Cyber Society [mailto:CyberSociety-owner@listbot.com] 
Sent: Friday, September 17, 1999 2:42 PM
To: Cyber Society
Subject: Decoding the Crypto Policy Change


Cyber Society - http://www.unn.ac.uk/cybersociety

Decoding the Crypto Policy Change
by Declan McCullagh 

3:00 a.m.  17.Sep.99.PDT
Why did the Clinton administration cave on crypto? What caused the
nation's top generals and cops to back down this week after spending the
better part of a decade warning Congress of the dangers of
privacy-protecting encryption products? 

Why would attorney general Janet Reno inexplicably change her mind and
embrace overseas sales of encryption when as recently as July she warned
Congress of the "rising threat from the criminal community of commercially
available encryption?" 

It can't simply be that tech firms were pressing forward this fall with a
House floor vote to relax export rules. National security and law
enforcement backers in the Senate could easily filibuster the measure.
Besides, Clinton had threatened to veto it. 

It could be the presidential ambitions of Vice President Gore, who just
happened to be in Silicon Valley around the time of the White House press
conference Thursday. Still, while tech CEOs can get angry over the
antediluvian crypto regulations Gore has supported, they regard Y2K
liability and Internet taxation as more important issues. 

Another answer might lie in a little-noticed section of the legislation
the White House has sent to Congress. It says that during civil cases or
criminal prosecutions, the Feds can use decrypted evidence in court
without revealing how they descrambled it. 

"The court shall enter such orders and take such other action as may be
necessary and appropriate to preserve the confidentiality of the technique
used by the governmental entity," Section 2716 of the proposed Cyberspace
Electronic Security Act says. 

There are a few explanations. The most obvious one goes as follows:
Encryption programs, like other software, can be buggy. The US National
Security Agency and other supersecret federal codebreakers have the
billion-dollar budgets and hyper-smart analysts needed to unearth the bugs
that lurking in commercial products. (As recent events have shown,
Microsoft Windows and Hotmail have as many security holes as a sieve after
an encounter with a 12-gauge shotgun.) 

If the Clinton crypto proposal became law, the codebreakers' knowledge
could be used to decipher communications or introduce decrypted messages
during a trial. 
"Most crypto products are insecure. They have bugs. They have them all the
time. The NSA and the FBI will be working even harder to find them," says
John Gilmore, a veteran programmer and board member of the Electronic
Frontier Foundation. 

Providing additional evidence for that view are Reno's comments on
Thursday. When asked why she signed onto a deal that didn't seem to
provide many obvious benefits to law enforcement, she had a ready
response. 

"[The bill covers] the protection of methods used so that ... we will not
have to reveal them in one matter and be prevented, therefore, from using
them in the next matter that comes along," the attorney general said. 

Funding for codebreaking and uncovering security holes also gets a boost.
The White House has recommended US$80 million be allocated to an FBI
technical center that it says will let police respond "to the increasing
use of encryption by criminals." 

Anther reason for the sea change on crypto is decidedly more
conspiratorial. But it has backers among civil libertarians and a former
NSA analyst who told Wired News the explanation was "likely." 

It says that since the feds will continue to have control of legal
encryption exports, and since they can stall a license application for
years and cost a company millions in lost sales, the US government has a
sizeable amount of leverage. The Commerce Department and NSA could simply
pressure a firm to insert flaws into its encryption products with a back
door for someone who knows how to pick the lock. 

Under the current and proposed new regulations, the NSA conducts a
technical analysis of the product a company wishes to export. According to
cryptographers who have experienced the process, it usually takes a few
months and involves face-to-face meetings with NSA officials. 

"This may be a recipe for government-industry collusion, to build back
doors into encryption products," says David Sobel, general counsel for the
Electronic Privacy Information Center and a veteran litigator. 

Sobel points to another part of the proposed law to bolster his claim: It
says any such information that a company whispers to the Feds will remain
secret. 

That section "generally prohibits the government from disclosing trade
secrets disclosed to it [by a company] to assist it in obtaining access to
information protected by encryption," according to a summary prepared by
the administration. 
Is there precedent? You bet. Just this month, a debate flared over whether
or not Microsoft put a back door in Windows granting the NSA secret access
to computers that run the operating system. 

While that widespread speculation has not been confirmed, other NSA back
doors have been. 

In the 1982 book The Puzzle Palace, author James Bamford showed how the
agency's predecessor in 1945 coerced Western Union, RCA, and ITT
Communications to turn over telegraph traffic to the feds. 

"Cooperation may be expected for the complete intercept coverage of this
material," an internal agency memo said. ITT and RCA gave the government
full access, while Western Union limited the number of messages it handed
over. The arrangement, according to Bamford, lasted at least two decades. 

In 1995, The Baltimore Sun reported that for decades NSA had rigged the
encryption products of Crypto AG, a Swiss firm, so US eavesdroppers could
easily break their codes. 

The six-part story, based on interviews with former employees and company
documents, said Crypto AG sold its security products to some 120
countries, including prime US intelligence targets such as Iran, Iraq,
Libya, and Yugoslavia. Crypto AG disputed the allegation. 

"It's a popular practice. It has long historical roots," says EFF's
Gilmore. "There's a very long history of [the NSA] going quietly to some
ex-military guy who happens to run the company and say, 'You could do your
country a big favor if...'" 

Could the security flaw be detected? Probably not, said Gilmore, who
during a previous job paid a programmer to spend months disassembling
parts of Adobe's PostScript interpreter. "Reverse engineering is real
work. The average company would rather pay an engineer to build a product
rather than tear apart a competitors'." 

Source: Wired News.



#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime@bbs.thing.net