home *** CD-ROM | disk | FTP | other *** search
Text File | 1995-01-03 | 47.8 KB | 1,142 lines |
-
-
- Archive-name: net-privacy/part2
- Last-modified: 1994/5/7
- Version: 3.0
-
-
- IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
- ================================================
-
- (c) Copyright 1994 L. Detweiler. Not for commercial use except by
- permission from author, otherwise may be freely copied. Not to be
- altered. Please credit if quoted.
-
- SUMMARY
- =======
-
- Information on email and account privacy, anonymous mailing and
- posting, encryption, and other privacy and rights issues associated
- with use of the Internet and global networks in general.
-
- (Search for <#.#> for exact section. Search for '_' (underline) for
- next section.)
-
- PART 2
- ====== (this file)
-
- Issues
- ------
-
- <4.1> What is the Electronic Frontier Foundation (EFF)?
- <4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
- <4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
- <4.4> What is Integrated Services Digital Network (ISDN)?
- <4.5> What is the National Research and Education Network (NREN)?
- <4.6> What is the FBI's proposed Digital Telephony Act?
- <4.7> What is U.S. policy on freedom/restriction of strong encryption?
- <4.8> What other U.S. legislation is related to privacy?
- <4.9> What are references on rights in cyberspace?
- <4.10> What is the Computers and Academic Freedom (CAF) archive?
-
- Clipper
- -------
-
- <5.1> What is the Clipper Chip Initiative?
- <5.2> How does Clipper blunt `cryptography's dual-edge sword'?
- <5.3> Why are technical details of the Clipper chip being kept secret?
- <5.4> Who was consulted in the development of the Clipper chip?
- <5.5> How is commerical use/export of Clipper chips regulated?
- <5.6> What are references on the Clipper Chip?
- <5.7> What are compliments/criticisms of the Clipper chip?
- <5.8> What are compliments/criticisms of the Clipper Initiative?
- <5.9> What are compliments/criticisms of the Clipper announcement?
- <5.10> Where does Clipper fit in U.S. cryptographic technology policy?
-
-
- ISSUES
- ======
-
- _____
- <4.1> What is the Electronic Frontier Foundation (EFF)?
-
- From ftp.eff.org:/pub/EFF/mission_statement:
-
- > A new world is arising in the vast web of digital, electronic
- > media which connect us. Computer-based communication media like
- > electronic mail and computer conferencing are becoming the basis
- > of new forms of community. These communities without a single,
- > fixed geographical location comprise the first settlements on an
- > electronic frontier.
- >
- > While well-established legal principles and cultural norms give
- > structure and coherence to uses of conventional media like
- > newspapers, books, and telephones, the new digital media do not
- > so easily fit into existing frameworks. Conflicts come about as
- > the law struggles to define its application in a context where
- > fundamental notions of speech, property, and place take
- > profoundly new forms. People sense both the promise and the
- > threat inherent in new computer and communications technologies,
- > even as they struggle to master or simply cope with them in the
- > workplace and the home.
- >
- > The Electronic Frontier Foundation has been established to help
- > civilize the electronic frontier; to make it truly useful and
- > beneficial not just to a technical elite, but to everyone; and to
- > do this in a way which is in keeping with our society's highest
- > traditions of the free and open flow of information and
- > communication.
-
- EFF was started by the multimillionaire Mitchell Kapor, founder of
- Lotus software, and John Barlow, lyricist for the Grateful Dead
- rock band. A highly publicized endeavor of the organization
- involved the legal defense of Steve Jackson Games after an FBI
- raid and an accompanying civil suit (see section on ``Steve
- Jackson Games''). The foundation publishes EFF News (EFFector
- Online) electronically, send requests to effnews-request@eff.org.
-
- In a letter to Mitchell Kapor from the Chairman of the Subcommittee
- with primary jurisdiction over telecommunications policy dated
- November 5, 1991, Representative Edward J. Markey complemented
- Mitchell Kapor on his ``insights on the development of a national
- public information infrastructure'' which ``were appreciated greatly
- by myself and the Members of the Subcommittee'' (complete text in
- ftp.eff.com:/pub/pub-infra/1991-12):
-
- > ...we need to pursue policies that encourage the Bell companies to
- > work with other sectors of the communications industry to create
- > a consumer-oriented, public information network. Please let me or
- > my staff know what policies you and others in the computer
- > industry believe would best serve the public interest in creating
- > a reasonably priced, widely available network in which
- > competition is open and innovation rewarded. I also want to
- > learn what lessons from the computer industry over the past ten
- > to fifteen years should apply to the current debate on
- > structuring the information and communications networks of the
- > future....I ask your help in gaining input from the computer
- > industry so that the Subcommittee can shape policies that will
- > bring this spirit of innovation and entrepreneurship to the
- > information services industry.
-
- ftp.eff.org
- ===========
-
- /pub/eff/about-eff
- ---
- A file of basic information about EFF including goals, mission,
- achievements, and current projects. Contains a membership form.
-
- /pub/eff/mission-statement
- ---
- EFF mission statement.
-
- /pub/eff/historical/founding-announcement
- ---
- EFF founding press release.
-
- /pub/eff/historical/eff-history
- ---
- John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July
- 10, 1990). How EFF was conceived and founded, major legal cases,
- and the organizational directions.
-
- /pub/eff/historical/legal-case-summary
- ---
- EFF legal case summary.
-
-
- _____
- <4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
-
- The Computer Professionals for Social Responsibility have been
- working to protect and promote electronic civil liberties issues
- since ~1982. The group has three offices (Palo Alto, Cambridge,
- Washington, DC) and 20 chapters. It is involved in litigation
- against the FBI, The NSA, NIST, the Secret Service and other other
- U.S. government agencies to declassify and provide documentation
- on issues such as Operation Sundevil, the FBI wiretap proposal,
- NSA's interference in crypography, the breakup of the 2600 raid in
- Arlington, Va in Nov 1992. Members speak frequently in front on
- Congress, state legislators and public utility commissions to
- testify on privacy, information policy, computer security, and
- caller identification.
-
- CPSR has created an extensive Internet Privacy library available
- via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising
- the largest collection of privacy documents on the internet. For
- more information, anonymous FTP cpsr.org:/cpsr/.
-
-
- (Thanks to Dave Banisar <banisar@washofc.cpsr.org> for contributions
- here.)
-
- _____
- <4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
-
- In the early 1990's a fear spread among U.S. law enforcement
- agencies on the illicit activities of `hackers' and
- `phreakers' involved in such activities as computer tampering
- via modem, credit card fraud, and long-distance call
- thievery. (Descriptions of real `hacking' exploits can be
- found in the book Cyberpunk by J. Markoff and K. Hafner.)
- See ftp.eff.org:/pub/SJG/General_Information/EFFector1.04:
-
- > `Operation Sundevil,' the Phoenix-inspired crackdown of May
- > 8,1990, concentrated on telephone code-fraud and credit-card
- > abuse, and followed this seizure plan with some success.
- > [Bulletin Board Systems] went down all over America, terrifying
- > the underground and swiftly depriving them of at least some of
- > their criminal instruments. It also saddled analysts with some
- > 24,000 floppy disks, and confronted harried Justice Department
- > prosecutors with the daunting challenge of a gigantic nationwide
- > hacker show-trial involving highly technical issues in dozens of
- > jurisdictions.
-
- Massive `show-trials' never materialized, although isolated
- instances of prosecution were pursued. The movement reached a
- crescendo in Texas with the highly publicized case of illegal
- search and seizure involving the Steve Jackson Games company of
- Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST
- by Bruce Sterling <bruces@well.sf.ca.us> in Fantasy and Science
- Fiction Magazine:
-
- > In an early morning raid with an unlawful and unconstitutional
- > warrant, agents of the Secret Service conducted a search of the
- > SJG office. When they left they took a manuscript being prepared
- > for publication, private electronic mail, and several computers,
- > including the hardware and software of the SJG Computer Bulletin
- > Board System. Yet Jackson and his business were not only
- > innocent of any crime, but never suspects in the first place.
- > The raid had been staged on the unfounded suspicion that
- > somewhere in Jackson's office there `might be' a document
- > compromising the security of the 911 telephone system.
-
- (A detailed and vivid account of the seizure is documented in the
- book ``The Hacker Crackdown'' by Bruce Sterling.) FBI agents
- involved in the seizure were named in a civil suit filed on behalf
- of Steve Jackson Games by The Electronic Frontier Foundation. See
- information on EFF below. From an article by Joe Abernathy in the
- Houston Chronicle ~Feb 1, 1993:
-
- > AUSTIN -- An electronic civil rights case against the Secret
- > Service closed Thursday with a clear statement by federal
- > District Judge Sam Sparks that the Service failed to conduct a
- > proper investigation in a notorious computer crime crackdown,
- > and went too far in retaining custody of seized equipment.
- >
- > Secret Service Special Agent Timothy Foley of Chicago, who was in
- > charge of three Austin computer search-and-seizures on March 1,
- > 1990, that led to the lawsuit, stoically endured Spark's rebuke
- > over the Service's poor investigation and abusive computer
- > seizure policies. While the Service has seized dozens of
- > computers since the crackdown began in 1990, this is the first
- > case to challenge the practice.
- >
- > Sparks grew visibly angry when it was established that the Austin
- > science fiction magazine and game book publisher was never
- > suspected of a crime, and that agents did not do even marginal
- > research to establish a criminal connection between the firm and
- > the suspected illegal activities of an employee, or to determine
- > that the company was a publisher. Indeed, agents testified that
- > they were not even trained in the Privacy Protection Act at the
- > special Secret Service school on computer crime.
- >
- > "How long would it have taken you, Mr. Foley, to find out what
- > Steve Jackson Games did, what it was?" asked Sparks. "An hour?
- >
- > "Was there any reason why, on March 2, you could not return to
- > Steve Jackson Games a copy, in floppy disk form, of everything
- > taken?
- >
- > "Did you read the article in Business Week magazine where it had
- > a picture of Steve Jackson -- a law-abiding, tax-paying citizen
- > -- saying he was a computer crime suspect?
- >
- > "Did it ever occur to you, Mr. Foley, that seizing this material
- > could harm Steve Jackson economically?"
- >
- > Foley replied, "No, sir," but the judge offered his own answer.
- >
- > "You actually did, you just had no idea anybody would actually go
- > out and hire a lawyer and sue you."
- >
- > More than $200,000 has been spent by the Electronic Frontier
- > Foundation in bringing the case to trial. The EFF was founded by
- > Mitchell Kapor amid a civil liberties movement sparked in large
- > part by the Secret Service computer crime crackdown.
-
- The trial is now recognized as a legal precedent explicitly
- guaranteeing protection of electronically stored information under
- the Privacy Protection Act, and safeguarding bulletin boards and
- electronic mail by federal wiretap laws limiting government
- surveillance powers. See the Wall Street Journal, 3/18/93, p. B1,
- ``Ruling Gives Privacy a High-Tech Edge''
-
-
- ftp.eff.org
- ===========
-
- /pub/cud/papers/sundevil
- ---
- A collection of information on Operation SunDevil by the Epic
- nonprofit publishing project. Everything you wanted to know but
- could never find.
-
- /pub/cud/papers/sj-resp
- ---
- Steve Jackson's response to the charges against him.
-
-
- _____
- <4.4> What is Integrated Services Digital Network (ISDN)?
-
- ISDN is a high-speed data communications standard that utilizes
- existing copper telephone lines, and is a possible inexpensive and
- intermediate alternative to laying fiber optic cable for phone
- networks. The speeds involved may be sufficient for audio and
- video transmission applications. G. V. der Leun in the file
- ftp.eff.org: /pub/pub-infra/1991-11:
-
- > Telecommunications in the United States is at a crossroads. With
- > the Regional Bell Operating Companies now free to provide
- > content, the shape of the information networking is about to be
- > irrevocably altered. But will that network be the open,
- > accessible, affordable network that the American public needs?
- > You can help decide this question.
- >
- > The Electronic Frontier Foundation recently presented a plan to
- > Congress calling for the immediate deployment of a national
- > network based on existing ISDN technology, accessible to anyone
- > with a telephone connection, and priced like local voice service.
- > We believe deployment of such a platform will spur the
- > development of innovative new information services, and maximize
- > freedom, competitiveness, and civil liberties throughout the
- > nation.
- >
- > The EFF is testifying before Congress and the FCC; making
- > presentations to public utility commisions from Massachusetts to
- > California; and meeting with representatives from telephone
- > companies, publishers, consumer advocates, and other stakeholders
- > in the telecommunications policy debate.
- >
- > The EFF believes that participants on the Internet, as pioneers on
- > the electronic frontier, need to have their voices heard at this
- > critical moment.
-
- To automatically receive a description of the platform and details,
- send mail to archive-server@eff.org, with the following line:
-
- send documents open-platform-overview
-
- or send mail to eff@eff.org. See also the Introduction to the EFF
- Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02.
-
-
- References
- ==========
-
- ``Digital Data On Demand.'' MacWorld, 2/82 (page 224).
- ---
- 56Kbps vs. ISDN services and products. See comments by J. Powers
- in ftp.eff.org:pub/pub-infra/1992-02.
-
- ``Telephone Service That Rings of the Future.'' By Joshua Quittner.
- Newsday, Tue, Jan 7 1992.
- ---
- Implications of ISDN for the masses, written in popular science
- style. John Perry Barlow (cofounder EFF). Regional telephone
- companies (Ohio Bell). ISDN as ``Technological Rorschach Test.''
- Anecdotes about McDonald's, Barbara Bush teleconferencing. See
- complete text in ftp.eff.org:/pub/pub-infra/1992-01.
-
- ftp.eff.org:/pub/pub-infra/
- ---
- Files 1991-11 through 1992-05 containing email from the EFF public
- infrastructure group organized by month. Opinions and facts on
- the pros and cons of ISDN, Integrated Services Digital Network.
- Uses of ISDN (phone video, audio, etc.) Japanese model.
- Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical
- specifications of ISDN, implementation details, cost issues,
- political obstacles, (RBOC, Regional Bell Operating Companies or
- `Baby Bells', e.g. NET, New England Telephone). Influencing
- development of future networks (e.g. ISDN and NREN, National
- Research and Education Network), encouraging competition (cable
- TV systems). Press releases and news articles. Letter from Rep.
- E. J. Markey to M. Kapor.
-
- _____
- <4.5> What is the National Research and Education Network (NREN)?
-
- The Nation Research and Education Network was introduced in
- legislation cosponsored by Sen. A. Gore to promote high-speed data
- network infrastructure augmenting the internet with up to 50 times
- faster transmission rates. The bill passed the House on November
- 20, 1991, the Senate on November 22, 1991, and was signed by the
- President on December 9, 1991.
-
- ftp.eff.org
- ===========
-
- /pub/EFF/legislation/nren-bill-text
- ---
- The complete text of the House-Senate compromise version of S.
- 272, the High-Performance Computing Act.
-
- /pub/internet-info/gore.bill
- ---
- 102nd congress 1st Session. Text of high performance computing
- bill cosponsored by Sen. A. Gore.
-
-
- /pub/EFF/legislation/gore-infrastructure-bill
- ---
- The text of S.2937, the Information Infrastructure and Technology
- Act of 1992 introduced by Senator Gore to expand Federal efforts
- to develop technologies for applications of high-performance
- computing and high-speed networking, and to provide for a
- coordinated Federal program to accelerate development and
- deployment of an advanced information infrastructure.
-
- U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK
- By John Markoff, N.Y. Times (~18 Dec 91).
- ---
- President Bush's legislation for natiowide computer data
- `superhighway.' IBM-MCI venture as monopoly destructive to fair
- competition and innovation? National Science Foundation NSFnet.
- complete text in /pub/pub-infra/1991-12.
-
- Commentary
- ==========
-
- /pub/academic/statements/nren.privacy.cpsr
- ---
- ``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc
- Rotenberg, Washington Director Computer Professionals for Social
- Responsibility (CPSR).
-
- /pub/internet-info/cisler.nren
- ---
- The National Research and Education Network: Two meetings Steve
- Cisler, Senior Scientist Apple Computer Library December 17, 1990
- Summary of meetings exploring educational issues of NREN by
- diverse members of academia and industry.
-
- /pub/internet-info/privatized.nren
- ---
- Feb. 14 1991 essay by M. Kapor advocating advantages of a private
- National Public Network, and specific recommendations for open
- NREN policies encouraging competition.
-
-
- /pub/eff/papers/netproposition
- ---
- An FYI about the proposed NREN setup.
-
- _____
- <4.6> What is the FBI's proposed Digital Telephony Act?
-
- ``Providers of electronic communication services and private branch
- exchange operators shall provide within the United States
- capability and capacity for the government to intercept wire and
- electronic communications when authorized by law...''
-
- From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by
- S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22:
-
- > In a move that worried privacy experts, software manufacturers and
- > telephone companies, the FBI proposed legislation to amend the
- > Communications Act of 1934 to make it easier for the Bureau to
- > perform electronic wiretapping. The proposed legislation,
- > entitled 'Digital Telephony,' would have required communications
- > service providers and hardware manufacturers to make their
- > systems 'tappable' by providing 'back doors' through which law
- > enforcement officers could intercept communications. Furthermore,
- > this capability would have been provided undetectably, while the
- > communications was in progress, exclusive of any communications
- > between other parties, regardless of the mobility of the target
- > of the FBI's investigation, and without degradation of service.
- >
- > ...under the proposal, the Department of Justice (DOJ) can keep
- > communications products off the market if it determines that
- > these products do not meet the DOJ's own ... guidelines. This
- > [could] result in increased costs and reduced competitiveness for
- > service providers and equipment manufacturers, since they will be
- > unlikely to add any features that may result in a DOJ rejection
- > of their entire product. ...the FBI proposal suggests that the
- > cost of this wiretapping 'service' to the Bureau would have to be
- > borne by the service provider itself...
- >
- > The Electronic Frontier Foundation organized a broad coalition of
- > public interest and industry groups, from Computer Professionals
- > for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun
- > Microsystems, to oppose the legislation. A white paper produced
- > by the EFF and ratified by the coalition, entitled, `An Analysis
- > of the FBI Digital Telephony Proposal,' was widely distributed
- > throughout the Congress. ... The Justice Department lobbied hard
- > in the final days to get Congress to take up the bill before
- > Congress adjourned, but the bill never ... found a Congressional
- > sponsor (and was therefore never officially introduced). The FBI
- > [may] reintroduce "Digital Telephony" when the 103rd Congress
- > convenes in January.
-
- ftp.eff.org
- ===========
-
- /pub/eff/legislation/fbi-wiretap-bill
- /pub/EFF/legislation/new-fbi-wiretap-bill
- ---
- A bill to ensure the continuing access of law enforcement to the
- content of wire and electronic communications when authorized by
- law and for other purposes. Version 2 of the bill after FBI
- changes in response to public response.
-
- /pub/cud/law/hr3515
- ---
- House of Rep bill 3515, Telecommunications Law.
-
- Commentary
- ==========
-
- /pub/eff/papers/eff-fbi-analysis
- ---
- The EFF-sponsored analysis of the FBI's Digital Telephony proposal.
-
- /pub/eff/papers/ecpa.layman
- ---
- The Electronic Communications Privacy Act of 1986: A Layman's View.
-
- /pub/eff/papers/nightline-wire
- ---
- Transcript of ABC's Nightline of May 22, 1992, on the FBI,
- Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc
- Rotenberg of the CPSR and William Sessions, Director of the FBI.
-
- /pub/eff/papers/edwards_letter
- ---
- A letter from the Director of the Secret Service to US Rep. Don
- Edwards, D-California, in response to questions raised by
- Edwards' Subcommittee. This copy came from Computer Professionals
- for Social Responsibility in Washington, D.C.
-
- /pub/eff/papers/fbi.systems
- ---
- A description of how information is stored on the FBI's computer
- systems.
-
-
- _____
- <4.7> What is U.S. policy on freedom/restriction of strong encryption?
-
-
- The Clipper announcement says ``we [the Clinton Administration]
- understand the importance of encryption technology in
- telecommunications and computing'' and specifically addresses the
- question, ``would the Administration be willing to use legal
- remedies to restrict access to more powerful encryption devices?''
- It states that ``The U.S. [is not] saying that `every American, as
- a matter of right, is entitled to an unbreakable commercial
- encryption product' '' although currently ``the Administration is
- not saying, `since [strong] encryption threatens the public safety
- and effective law enforcement, we will prohibit it outright' as
- some countries have effectively done.'' However, currently no
- U.S. laws regulate domestic cryptography use, although the U.S.
- International Traffic in Arms Regulations classify cryptographic
- devices as `munitions' and regulate export.
-
-
- _____
- <4.8> What other U.S. legislation is related to privacy?
-
- ftp.eff.org
- ===========
-
- /pub/cud/law/<state>
- ---
- State computer crime laws:
- AL, AK, AZ, CA, CO, CT, DE, FL, GA,
- HI, IA, ID, IL, IN, MD, MN, NC, NJ,
- NM, NY, OR, TX, VT, VA, WA, WI, WV.
-
- /pub/cud/law/<country>
- ---
- Current computer crime laws for: The United States (federal
- code), Canada, Ghana, and Great Britain.
-
- /pub/cud/law/bill.s.618
- ---
- Senate bill 618, addressing registration of encryption keys with
- the government.
-
- /pub/cud/law/improve
- ---
- Improvement of Information Access bill.
-
- /pub/cud/law/monitoring
- ---
- Senate bill 516; concerning abuses of electronic monitoring in the
- workplace.
-
- /pub/cud/law/us.e-privacy
- ---
- Title 18, relating to computer crime & email privacy.
-
- /pub/academic/law/privacy.electronic.bill
- ---
- The text of Simon's electronic privacy bill, S. 516. ``To prevent
- potential abuses of electronic monitoring in the workplace.''
-
- _____
- <4.9> What are references on rights in cyberspace?
-
- ftp.eff.org
- ===========
-
- /pub/cud/papers/const.in.cyberspace
- ---
- Laurence Tribe's keynote address at the first Conference on
- Computers, Freedom, & Privacy. `The Constitution in Cyberspace'
-
- /pub/cud/papers/denning
- ---
- Paper presented to 13th Nat'l Comp Security Conf ``Concerning
- Hackers Who Break into Computer Systems'' by Dorothy E Denning.
-
- /pub/cud/papers/privacy
- ---
- ``Computer Privacy vs First and Fourth Amendment Rights'' by
- Michael S. Borella
-
- /pub/cud/papers/rights-of-expr
- ---
- Rights of Expression in Cyberspace by R. E. Baird
-
- /pub/academic/eff.rights
- ---
- Bill of Rights' meaning in the Electronic Frontier.
-
- _____
- <4.10> What is the Computers and Academic Freedom (CAF) archive?
-
- The CAF Archive is an electronic library of information about
- computers and academic freedom. run by the Computers and Academic
- Freedom group on the Electronic Frontier Foundation FTP site.
-
- > If you have gopher, the archive is browsable with the command:
- > gopher -p academic gopher.eff.org
- >
- > It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in
- > directory `pub/academic'. It is also available via email. For
- > information on email access send email to archive-server@eff.org.
- > In the body of your note include the lines `help' and `index'.
- >
- > For more information, to make contributions, or to report typos
- > contact J.S. Greenfield (greeny@eff.org).
-
- ftp.eff.org
- ===========
-
- /pub/academic/statements/caf-statement
- ---
- Codifies the application of academic freedom to academic
- computers, reflecting seven months of on-line discussion about
- computers and academic freedom. Covers free expression, due
- process, privacy, and user participation.
-
- /pub/academic/books
- ---
- Directory of book references related to Computers and Academic
- Freedom or mentioned in the CAF discussion. The file books/README
- is a bibliography.
-
- /pub/academic/faq/archive
- ---
- List of files available on the Computers and Academic Freedom
- archive.
-
- /pub/academic/news
- ---
- Directory of all issues of the Computers and Academic Freedom
- News. A full list of abstracts is available in file `abstracts'.
- The special best-of-the-month issues are named with their month,
- for example, `June'.
-
-
- CLIPPER
- =======
-
- _____
- <5.1> What is the Clipper Chip Initiative?
-
-
- On April 16, 1993 the Clinton Administration announced the Clipper
- Chip Directive in a saturated publicity effort (including postings
- to Usenet newsgroups by NIST) that introduced the technology and
- `proposal' that had been developed in strict secrecy prior to that
- date. The `initiative' introduced the Clipper Chip, a high-speed
- and `high-security' encryption device with applications in
- telephones and other network devices, and the government commitment
- to installing it in future select government telephones with
- potentially much more widespread penetration (e.g. NREN, commercial
- telephones, computers, etc.). The voluntary program seeks to unite
- the federal government and private industry ``to improve the
- security and privacy of telephone communications while meeting the
- legitimate needs of law enforcement'' by use of the chip. Critical
- aspects of the directive:
-
- - ``A state-of-the-art microcircuit called the `Clipper Chip' has
- been developed by government engineers'', for use in phones with
- more power than many commercial encryption devices currently
- available. ``The key escrow mechanism will provide Americans with
- an encryption product that is more secure, more convenient, and
- less expensive than others readily available today.''
-
- - The technology seeks to ``help companies protect proprietary
- information, protect the privacy of personal phone conversations
- and prevent unauthorized release of data transmitted
- electronically'' while preserving ``the ability of federal, state
- and local law enforcement agencies to intercept lawfully the
- phone conversations of criminals''.
-
- - ``A "key-escrow" system will be established to ensure that the
- "Clipper Chip" is used to protect the privacy of law-abiding
- Americans.'' Keys are released from the escrow agencies to
- ``government officials with legal authorization to conduct a
- wiretap.''
-
- - ``The two key-escrow data banks will be run by two independent
- entities. At this point, the Department of Justice and the
- Administration have yet to determine which agencies will oversee
- the key-escrow data banks.''
-
- - ``The Attorney General will soon purchase several thousand of the
- new devices.'' to ``demonstrate the effectiveness of this new
- technology.''
-
- - `Clipper Chip' technology provides law enforcement with ``no new
- authorities to access the content of the private conversations of
- Americans''.
-
- - The Clipper decision was developed and sanctioned by The National
- Security Council, the Justice Department, the Commerce
- Department, and ``other key agencies''. ``This approach has
- been endorsed by the President, the Vice President, and
- appropriate Cabinet officials.''
-
-
- _____
- <5.2> How does Clipper blunt `cryptography's dual-edge sword'?
-
-
- The Clipper wiretapping initiative refers to `tension between
- economic vitality and the real challenges of protecting Americans'
- and `previous policies [that] have pitted government against
- industry and the rights of privacy against law enforcement.' The
- Clipper Initiative attempts to find a compromise in encryption's
- ``dual-edge sword'' wherein it ``helps to protect the privacy of
- individuals and industry, but it also can shield criminals and
- terrorists.'' ``The Administration is committed to policies that
- protect all Americans' right to privacy while also protecting them
- from those who break the law.''
-
- The statement notes that sophisticated encryption technology is
- increasingly being used by Americans to ``protect business secrets
- and the unauthorized release of personal information'' but also
- ``by terrorists, drug dealers, and other criminals.'' and declares
- that ``We need the "Clipper Chip" and other approaches that can
- both provide law-abiding citizens with access to the encryption
- they need and prevent criminals from using it to hide their illegal
- activities.''
-
- Regarding privacy via encryption vs. wiretapping, the Clipper
- announces: ``There is a false `tension' created in the assessment
- that this issue is an "either-or" proposition. Rather, both
- concerns can be, and in fact are, harmoniously balanced through a
- reasoned, balanced approach such as is proposed with the "Clipper
- Chip" and similar encryption techniques.''
-
-
- _____
- <5.3> Why are technical details of the Clipper chip being kept secret?
-
-
- - The algorithm will ``remain classified'' to ``protect the
- security of the key escrow system.''
- - ``Respected experts from outside the government will be offered
- access to the confidential details of the algorithm to assess its
- capabilities and publicly report their findings.''
- - ``We are willing to invite an independent panel of cryptography
- experts to evaluate the algorithm to assure all potential users
- that there are no unrecognized vulnerabilities.''
-
- _____
- <5.4> Who was consulted in the development of the Clipper chip?
-
-
- - ``The President has directed early and frequent consultations
- with affected industries, the Congress and groups that advocate
- the privacy rights of individuals.''
-
- - ``We have briefed members of Congress and industry leaders on the
- decisions related to this initiative'' and ``expect those
- discussions to intensify''.
-
-
- _____
- <5.5> How is commerical use/export of Clipper chips regulated?
-
-
- - ``Q. How do I buy one of these encryption devices? A. We expect
- several manufacturers to consider incorporating the "Clipper
- Chip" into their devices.''
-
- - ``The government designed and developed the key access encryption
- microcircuits, but ... product manufacturers ... [buy] the
- microcircuits from the chip manufacturer [Mykotronx] that
- produces them.''
-
- - The chip's (unspecified) `programming function' ``could be
- licensed to other vendors in the future.'' Also, ``We plan to
- review the possibility of permitting wider exportability of these
- products.''
-
- - ``Case-by-case review for each export is required to ensure
- appropriate use of these devices'' fitting in with the existing
- program for review of ``other encryption devices.'' ``We expect
- export licenses will be granted on a case-by-case basis for U.S.
- companies.
-
- _____
- <5.6> What are references on the Clipper Chip?
-
- - ``Government picks affordable chip to scramble phone calls.'' By
- Frank J. Murray. The Washington Times, April 17, 1993 Saturday,
- Final Edition.
-
- > President Clinton gave a major boost yesterday to one telephone-
- > scrambler technology in a decision its delighted manufacture
- > likens to the choice of VHS over Beta for videotape machines.
- >
- > An administration official said the consideration will be given
- > to banning more sophisticated systems investigators cannot
- > crack, thereby creating a balance between banning private
- > encryption and declaring a public right to unbreakably coded
- > coversations.
-
- - ``Computer Group, Libertarians Question Clinton Phone Privacy
- Stance.'' By Rory J. O'Connor, San Jose Mercury News, Calif.
- Knight-Ridder/Tribune Business News, ~Apr. 17 1993.
-
- > SAN JOSE, Calif.--Apr. 17--Civil libertarians and a major
- > computer industry group raised concerns Friday about how much
- > protection a Clinton administration plan would afford private
- > electronic communications, from cellular telephone calls to
- > computer data.
- >
- > "I don't want to sound too stridently opposed to this," said Ken
- > Wasch, executive director of the Software Publishers
- > Association (SPA) in Washington. "But...we feel blindsided."
- >
- > American Telephone & Telegraph Co. announced Friday it would
- > adapt the $1,200 product, called the Telephone Security Device,
- > to use the Clipper Chip by the end of this fiscal quarter. AT&T
- > makes a related device, which encrypts voice and computer data
- > transmissions, that could be converted to the Clipper
- > technology, said spokesman Bill Jones.
- >
- > VLSI, which invented a manufacturing method the company said
- > makes it difficult to "reverse engineer" the chip or discern
- > the encryption scheme, expects to make $50 million in the next
- > three years selling the device, said Jeff Hendy, director of
- > new product marketing for the company.
-
- - ``New Scrambler Designed to Protect Privacy, But Allow Police
- Monitoring.'' By Christopher Drew, Chicago Tribune.
- Knight-Ridder/Tribune Business News, ~Apr. 19, 1993.
-
- > WASHINGTON--Apr. 19--As a step toward the development of vast
- > new data "superhighways," the federal government has designed a
- > powerful device that would protect the privacy of electronic
- > communications by encoding them but still allow police to
- > eavesdrop.
- >
- > "'A.k.a. Big Brother,' that's what I call it," said Stephen
- > Bryen, a former Pentagon official who runs a company developing
- > a rival encryption system.
- >
- > Bryen said it was "very disturbing" that the government has gone
- > so far with the previously classified project "without
- > consulting with experts in the industry" whose investments
- > could be wiped out.
- >
- > To spur the venture, the Justice Department will soon purchase
- > several thousand of the devices. Military and spy agencies also
- > are expected to use them.
-
- - ``US reveals computer chip for scrambling telephones.'' By John
- Mintz. Washington Post, April, 17 1993.
-
- > WASHINGTON -- The White House yesterday announced its new plan
- > to prevent criminals, terrorists, and industrial spies from
- > decoding communications over telephones, fax machines, and
- > computers while ensuring the government's ability to eavesdrop.
- >
- > The official White House announcement yesterday was the
- > endorsement of the Clipper Chip, developed by NSA, as the
- > government standard for encryption devices.
-
- - ``Clinton security plan hints of Big Brother: Clipper Chip would
- let governemnt eavesdrop on encrypted voice and data
- communications.'' By Ellen Messmer. Network World, April 19,
- 1993.
-
- > But government officials had a difficult time last week
- > rebutting the question why any criminal would use a Clipper
- > Chip-based product when the person knows the government could
- > listen in, particularly since there are a host of other
- > encryption products available on the market that are, in
- > theory, unbreakable codes.
- >
- > "A criminal probably wouldn't use it," said Mike Agee, marketing
- > manager for secure products at AT&T, adding that the Clipper
- > Chip is for the rest of the world.
-
- For additional details, call Mat Heyman, National Institute of
- Standards and Technology, (301) 975-2758.
-
-
- _____
- <5.7> What are compliments/criticisms of the Clipper chip?
-
- Compliments
- ----------
-
- - Chip may protect the law abiding citizen's privacy from the casual
- snooper.
- - Potentially sophisticated and superior algorithm endorsed by the
- NSA.
- - May establish a new standard whereby companies may be able to
- come up with competing pin-compatible chips.
- - Potential for encrypting `on top' of the Clipper algorithm.
- - May allow diverse law enforcement agency's to retain wiretapping
- ability without serious or impossible obstacles.
- - May enable broad new traffic analysis by law enforcement agencies.
-
- Criticisms
- ----------
-
- - Algorithm designed exclusively by the NSA with biased interests.
- - Possibly unsophisticated, inferior, or more costly in comparison
- with current or emerging technology.
- - Compromised keys retroactively weaken all communication ever sent
- over the device.
- - Key generation techniques are `baroque activities in a vault':
- suspicious and unrealistic-sounding.
- - Impossible to ensure secrecy of a chip in the face of today's
- technology and inevitable intense independent inquiry and
- scrutiny, and dependence on it weakens security.
- - No specific assurance that key generation is impartial and safe.
- - Secrecy of the algorithm prevents serious inquiry and sabotages
- trust in the algorithm. No guarantee against `back door'.
-
-
- _____
- <5.8> What are compliments/criticisms of the Clipper Initiative?
-
- Compliments
- -----------
-
- - Brings privacy and encryption issues into the limelight.
- - Sharpens the public debate on the role, extent, and legitimacy of
- wiretapping practices.
- - Exposes previously concealed high-level agenda in U.S. government
- to manage cryptographic technology.
- - Potential new option for individuals and companies interested in
- protecting privacy.
- - Suggests Clinton administration has strong interest in technology,
- reaching compromises, and encouraging competitiveness.
-
- Criticisms
- ----------
-
- - Evasion of critical aspects (such as key agencies) and
- preoccupation with others (references to criminals) ``begs the
- question'' of inherent public desireability and support of plan.
- - Legality within framework of paramount constitutional guarantees
- on freedom of speech and freedom from unreasonable search and
- seizure wholly unaddressed.
- - Unilaterally imposed, i.e. no involvement from the parties it
- purports to represent.
- - Funded with taxpayer money with no meaningful public oversight and
- scrutiny.
- - Represents a fundamental switch in the government's role in
- wiretapping from passive to active.
- - Potentially criminals won't use the technology and will easily
- evade it, while law-abiding citizens will be inconvenienced
- and/or sacrifice rights.
- - Does not protect the individual from corrupt government officials.
- - Secrecy of the algorithm may amount to `security through
- obscurity,' i.e. the algorithm security may rely on aspects of
- chip operation staying confidential and undiscovered.
- - Government appears to be colluding with private companies and
- using leverage to intentionally create a monopoly.
- - Possibility of taxpayer funds effectively subsidizing chip sales
- not addressed.
- - Secrecy of the chip design prevents inquiries into its precise
- security.
- - ``government engineers'' in competition with private industries,
- with special favoritism in policies of the Clinton
- administration.
- - may require new vast and superfluous government bureacracies.
-
-
- _____
- <5.9> What are compliments/criticisms of the Clipper announcement?
-
-
- Compliments
- -----------
-
- - Shows unequivocal commitment to wiretapping drug dealers,
- criminals, and terrorists.
- - Publicizes previously secret development and processes regarding
- Clipper in particular and cryptography in general.
- - Well publicized within some circles. Usenet press release
- unprecedented and sophisticated.
- - Shows Clinton administration commitment to developing national
- policies on `information infrastructure' and the intrinsic role
- of encryption technology.
- - Masterpiece of propaganda for study by future generations.
-
- Criticisms
- ----------
-
- - States that Clipper is better than many encryption technologies
- available today but does not indicate that many are recognized to
- be weak and new and more powerful technologies are already under
- development.
- - Vague on critical aspects such as who the key escrow agencies are.
- - Appears to assume that Americans wish to preserve wiretapping
- capabilities by law enforcement agencies in the face of new
- unbreakable encryption technologies.
- - Specifically does not commit to freedom of encryption and hints
- that failure of Clipper-style approaches may lead to restrictions
- on strong cryptography.
- - Gives the impression that Congress and private industry was
- involved when their participation is minimal to nonexistent.
- - Authoritarian, dictatorial, and Orwellian undertones.
- - Evades mention of the NSA's specific involvement.
- - Refers to the chip as `state of the art' without evidence.
- - Refers to ``drug dealers, criminals, and terrorists'' with terms
- such as `alleged,' `suspected,' `reputed,' and `accused'
- conspicuously absent.
- - Does not specifically commit to unrestrained public policy review
- and appears to evade it.
- - Evades mention of the history of the plan and erroneously implies
- that Clinton administration involvement is primary.
-
-
- _____
- <5.10> Where does Clipper fit in U.S. cryptographic technology policy?
-
-
- The Clipper chip is part of a large-scale plan that involves ``the
- creation of new products to accelerate the development and use of
- advanced and secure telecommunications networks and wireless
- communications links'' utilizing the chip.
-
- - ``we [of the Clinton Administration] understand the importance of
- encryption technology in telecommunications and computing and are
- committed to working with industry and public-interest groups to
- find innovative ways to protect Americans' privacy, help
- businesses to compete, and ensure that law enforcement agencies
- have the tools they need to fight crime and terrorism.''
-
- - ``The President has directed government agencies to develop a
- comprehensive policy on encryption'' and ``explore new approaches
- like the key-escrow system'' which ``is just one piece of what
- must be the comprehensive approach to encryption technology,
- which the Administration is developing.''
-
- - The `broad policy review' will also address the role of
- cryptography in ``the development of a National Information
- Infrastructure or `information superhighways''' and consider
- ``the need of U.S. companies to manufacture and export high
- technology products.''
-
- - ``The Federal Government must act quickly to develop consistent,
- comprehensive policies regarding its use'' and ``as we carry out
- our review of encryption policy'' the ``on-going discussions with
- Congress and industry on encryption issues'' are expected to
- ``intensify.''
-
- * * *
-
- SEE ALSO
- ========
-
- Part 1
- ------ (previous file)
-
- <1.1> What is `identity' on the internet?
- <1.2> Why is identity (un)important on the internet?
- <1.3> How does my email address (not) identify me and my background?
- <1.4> How can I find out more about somebody from their email address?
- <1.5> Why is identification (un)stable on the internet?
- <1.6> What is the future of identification on the internet?
-
- <2.1> What is `privacy' on the internet?
- <2.2> Why is privacy (un)important on the internet?
- <2.3> How (in)secure are internet networks?
- <2.4> How (in)secure is my account?
- <2.5> How (in)secure are my files and directories?
- <2.6> How (in)secure is X Windows?
- <2.7> How (in)secure is my email?
- <2.8> How am I (not) liable for my email and postings?
- <2.9> How do I provide more/less information to others on my identity?
- <2.10> Who is my sysadmin? What does s/he know about me?
- <2.11> Why is privacy (un)stable on the internet?
- <2.12> What is the future of privacy on the internet?
-
- <3.1> What is `anonymity' on the internet?
- <3.2> Why is `anonymity' (un)important on the internet?
- <3.3> How can anonymity be protected on the internet?
- <3.4> What is `anonymous mail'?
- <3.5> What is `anonymous posting'?
- <3.6> Why is anonymity (un)stable on the internet?
- <3.7> What is the future of anonymity on the internet?
-
- Part 3
- ------ (next file)
-
- <6.1> What UNIX programs are related to privacy?
- <6.2> How can I learn about or use cryptography?
- <6.3> What is the cypherpunks mailing list?
- <6.4> What are some privacy-related newsgroups? FAQs?
- <6.5> What is internet Privacy Enhanced Mail (PEM)?
- <6.6> What are other Request For Comments (RFCs) related to privacy?
- <6.7> How can I run an anonymous remailer?
- <6.8> What are references on privacy in email?
- <6.9> What are some email, Usenet, and internet use policies?
-
- <7.1> What is ``digital cash''?
- <7.2> What is a ``hacker'' or ``cracker''?
- <7.3> What is a ``cypherpunk''?
- <7.4> What is `steganography' and anonymous pools?
- <7.5> What is `security through obscurity'?
- <7.6> What are `identity daemons'?
- <7.7> What standards are needed to guard electronic privacy?
-
- <8.1> What is the background behind the Internet?
- <8.2> How is Internet `anarchy' like the English language?
- <8.3> Most Wanted list
- <8.4> Change history
-
- * * *
-
- This is Part 2 of the Privacy & Anonymity FAQ, obtained via anonymous
- FTP to pit-manager@mit.edu:/pub/usenet/news.answers/net-privacy/ or
- newsgroups news.answers, sci.answers, alt.answers every 21 days.
- Written by L. Detweiler <ld231782@longs.lance.colostate.edu>.
- All rights reserved.
-
-