896 lines
44 KiB
Plaintext
896 lines
44 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun July 5, 1992 Volume 4 : Issue 29
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Copy Editor: Etaion Shrdlu, Jr.
|
||
Firstbooksisoutmeister: B. Kehoe
|
||
Ex-Arcmeister: Bob Kusumoto
|
||
Koalameister: Dan Carosone
|
||
|
||
CONTENTS, #4.29 (July 5, 1992)
|
||
File 1--May '92 Version of FBI Digital Telephony Proposal
|
||
File 2--Chronicle Crypto Article
|
||
File 3--Conference Contributions to Neidorf Defense Fund
|
||
File 4--Govt & Corp Sysops Monitoring Users & Email
|
||
File 5--Call for papers : Digitisation
|
||
|
||
Back issues of CuD can be found in the Usenet alt.society.cu-digest
|
||
news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT
|
||
libraries, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp
|
||
from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 22 Jun 1992 21:10:20 EDT
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: File 1--May '92 Version of FBI Digital Telephony Proposal
|
||
|
||
The following is the latest version of the FBI Digital Telephony
|
||
Proposal, introduced in May 1992. This version removes the previous
|
||
language that authorized the FCC to set standards and now places it
|
||
solely in the hands of the Attorney General. Fines are $10,000/day for
|
||
non compliance with services within the public switched network having
|
||
18 months to comply and services outside having three years. The
|
||
proposal now mandates that the capability for remote government
|
||
wiretapping must be included into the system.
|
||
|
||
This proposal clearly enhances the ability of the FBI to monitor
|
||
communications. It takes the unprecedented step of placing control over
|
||
certification of telecommunications equipment in the hands of the
|
||
Attorney General and requires that the equipment be constructed to allow
|
||
government have the ability to monitor communications from a
|
||
"government monitoring facility remote from the target facility." All
|
||
telecommunications users should be concerned by the privacy and
|
||
security implications of creating systems that have holes for the
|
||
government or any other knowledgeable user to plug into.
|
||
|
||
%%
|
||
David Banisar
|
||
CPSR Washington Office
|
||
banisar@washofc.cpsr.org
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
102nd Congress
|
||
2nd Session
|
||
|
||
|
||
S. _____
|
||
[H.R. _____]
|
||
|
||
IN THE SENATE
|
||
[IN THE HOUSE OF REPRESENTATIVES]
|
||
|
||
|
||
M. ________________ introduced the following bill; which was
|
||
referred to the Committee on__________________
|
||
|
||
|
||
A BILL
|
||
|
||
|
||
To ensure the continuing access of law enforcement to the content of wire
|
||
and electronic communications when authorized by law and for other
|
||
purposes.
|
||
|
||
|
||
Be it enacted by the Senate and the House of Representatives of the United
|
||
States of America in Congress assembled,
|
||
|
||
|
||
SEC. 1. FINDINGS AND PURPOSES.
|
||
(a) The Congress finds:
|
||
(1) that telecommunications systems and networks are often
|
||
used in the furtherance of criminal activities including organized
|
||
crime, racketeering, extortion, kidnapping, espionage, terrorism, and
|
||
trafficking in illegal drugs;
|
||
(2) that recent and continuing advances in telecommunications
|
||
technology, and the introduction of new technologies and transmission
|
||
modes by the telecommunications industry, have made it increasingly
|
||
difficult for government agencies to implement lawful orders or
|
||
authorizations to intercept wire and electronic communications and thus
|
||
threaten the ability of such agencies effectively to enforce the laws and
|
||
protect the national security; and
|
||
(3) that without the assistance and cooperation of providers of
|
||
electronic communication services and private branch exchange operators,
|
||
the introduction of new technologies and transmission modes into
|
||
telecommunications systems without consideration and accommodation
|
||
of the need of government agencies lawfully to intercept wire and
|
||
electronic communications would impede the ability of such agencies
|
||
effectively to carry out their responsibilities.
|
||
(b) The purposes of this Act are to clarify the responsibilities of
|
||
providers of electronic communication services and private branch
|
||
exchange operators to provide such assistance as necessary to ensure the
|
||
ability of government agencies to implement lawful court orders or
|
||
authorizations to intercept wire and electronic communications. SEC. 2.
|
||
(a) Providers of electronic communication services and private branch
|
||
exchange operators shall provide within the United States capability and
|
||
capacity for the government to intercept wire and electronic
|
||
communications when authorized by law:
|
||
(1) concurrent with the transmission of the communication to
|
||
the recipient of the communication;
|
||
(2) in the signal form representing the content of the
|
||
communication between the subject of the intercept and any individual
|
||
with whom the subject is communicating, exclusive of any other signal
|
||
representing the content of the communication between any other
|
||
subscribers or users of the electronic communication services provider or
|
||
private branch exchange operator, and including information on the
|
||
individual calls (including origin, destination and other call set-up
|
||
information), and services, systems, and features used by the subject of the
|
||
interception;
|
||
(3) notwithstanding the mobility of the subject of the intercept or
|
||
the use by the subject of the intercept of any features of the
|
||
telecommunication system, including, but not limited to, speed- dialing or
|
||
call forwarding features;
|
||
(4) at a government monitoring facility remote from the target
|
||
facility and remote from the system of the electronic communication
|
||
services provider or private branch exchange operator;
|
||
(5) without detection by the subject of the intercept or any
|
||
subscriber; and
|
||
(6) without degradation of any subscribers telecommunications
|
||
service.
|
||
(b) Providers of electronic communication services within the
|
||
public switched network, including local exchange carriers, cellular
|
||
service providers, and interexchange carriers, shall comply with
|
||
subsection (a) of this section within eighteen months from the date of
|
||
enactment of this subsection.
|
||
(c) Providers of electronic communication services outside of the
|
||
public switched network, including private branch exchange operators,
|
||
shall comply with subsection (a) of this section within three years from
|
||
the date of enactment of the subsection.
|
||
(d) The Attorney General, after consultation with the
|
||
Department of Commerce, the Small Business Administration and Federal
|
||
Communications Commission, as appropriate, may except from the
|
||
application of subsections (a), (b) and (c) of this section classes
|
||
and types of providers of electronic communication services and
|
||
private branch exchange operators. The Attorney General may waive the
|
||
application of subsections (a), (b) and (c) of this section at the
|
||
request of any provider of electronic communication services or
|
||
private branch exchange operator.
|
||
(e) The Attorney General shall have exclusive authority to
|
||
enforce the provisions of subsections (a), (b) and (c) of this section. The
|
||
Attorney General may apply to the appropriate United States District Court
|
||
for an order restraining or enjoining any violation of subsection (a),
|
||
(b) or (c) of this section. The District Court shall have
|
||
jurisdiction to restrain and enjoin violations of subsections (a) of
|
||
this section. (f) Any person who willfully violates any provision
|
||
of subsection (a) of this section shall be subject to a civil penalty
|
||
of $10,000 per day for each day in violation. The Attorney General
|
||
may file a civil action in the appropriate United States District
|
||
Court to collect, and the United States District Courts shall have
|
||
jurisdiction to impose, such fines.
|
||
(g) Definitions--As used in subsections (a) through (f) of this
|
||
section--
|
||
(1) provider of electronic communication service or private
|
||
branch exchange operator means any service or operator which provides
|
||
to users thereof the ability to send or receive wire or electronic
|
||
communication, as those terms are defined in subsections 2510(1) and
|
||
2510(12) of Title 18, United States code, respectively, but does not include
|
||
the government of the United States or any agency thereof;
|
||
(2) communication means any wire or electronic
|
||
communication, as defined in subsections 2510(1) and 2510(12), of Title 18,
|
||
United States Code;
|
||
(3) intercept shall have the same meaning as set forth in section
|
||
2510(4) of Title 18, United States Code; and
|
||
(4) government' means the Government of the United States
|
||
and any agency or instrumentality thereof, any state or political
|
||
subdivision thereof, the District of Columbia, and any commonwealth,
|
||
territory or possession of the United States.
|
||
|
||
|
||
DIGITAL TELEPHONY AND INTERCEPTION BY CRIMINAL LAW
|
||
ENFORCEMENT AGENCIES
|
||
|
||
The telecommunications systems and networks are often used to
|
||
further criminal activities including white collar and organized
|
||
crime, racketeering, extortion, kidnapping, espionage, terrorism, and
|
||
trafficking in illegal drugs. Accordingly, for many years, one of the
|
||
most important tools in the investigation of crime for Federal and
|
||
State criminal law enforcement agencies has been the court authorized
|
||
interception of communications. As illustrated below, the majority of
|
||
original authorizations to intercept wire or electronic communications
|
||
are conducted by State criminal law enforcement agencies.
|
||
|
||
Interception Applications Authorized
|
||
State Federal Total
|
||
1984 512 289 801
|
||
1985 541 243 784
|
||
1986 504 250 754
|
||
1987 437 236 673
|
||
1988 445 293 738
|
||
1989 453 310 763
|
||
1990 548 324 872
|
||
Total 3,440 1,945 5,385
|
||
|
||
Approximately, 3/8 of authorized interceptions were conducted by Federal
|
||
agencies, while 5/8 of the authorized interceptions were conducted by State
|
||
criminal law enforcement agencies.1
|
||
|
||
The recent and continuing advances in
|
||
telecommunications technology, and the introduction of new technologies
|
||
by the telecommunications industry, have made it increasingly difficult
|
||
for government agencies to implement lawful orders or authorizations to
|
||
intercept wire and electronic communications, as well as to implement
|
||
pen register and trap-and-trace court orders or authorizations. These new
|
||
technologies inadvertently undermine the ability of criminal law
|
||
enforcement agencies to enforce effectively the criminal laws and protect
|
||
the national security. Without the assistance and cooperation of the
|
||
telecommunications industry, these new technologies will impede the
|
||
ability of the telecommunications industry, these new technologies will
|
||
impede the ability of the government to enforce the criminal law.
|
||
Accordingly, the purpose of this bill is to clarify the existing
|
||
responsibilities of electronic communication services providers and private
|
||
branch exchange operators, as established, for example, in 18 U.S.C. ____
|
||
2518(4), 3124(A), (B), to provide such assistance as necessary to ensure the
|
||
ability of government agencies to implement lawful orders or
|
||
authorizations to intercept communications.
|
||
|
||
Over the past twenty-five years, the working relationship between
|
||
the criminal law enforcement community, particularly the Federal
|
||
Bureau of Investigation as the federal governments primary criminal
|
||
law enforcement agency, and the telecommunications industry, in
|
||
response to the appropriate court orders or authorizations, has
|
||
provided government agencies with timely access to the signals
|
||
containing the content of communications covered by the court orders
|
||
or authorizations. As a general proposition, this has involved
|
||
providing the means to acquire the communication as it occurs between
|
||
two individual telephone users at a remote location, not dissimilar to
|
||
a call in which the two originating parties do not know that a third
|
||
party is listening, and in which the third party (the criminal law
|
||
enforcement agency) records the authorized and relevant calls.
|
||
|
||
Historically, and with relatively few exceptions, the
|
||
telecommunications industry has provided the criminal law enforcement
|
||
community with the ability to monitor and record calls:
|
||
|
||
1. at the same time as the call is transmitted to the recipient;
|
||
|
||
2. in the same form as the content of the call was transmitted
|
||
through the network, notwithstanding the use by the target of custom
|
||
features of the network;
|
||
|
||
3. whether stationary or mobile;
|
||
|
||
4. at the government monitoring facility;
|
||
|
||
5. without detection by the target or other subscribers; and
|
||
without degrading any subscribers service.
|
||
|
||
However, the introduction of new technology has begun to erode the
|
||
ability of the government to fully effectuate interceptions, pen
|
||
registers and trap-and-race court orders or authorizations that are
|
||
critical to detecting and prosecuting criminals. As technology has
|
||
developed, the telecommunications industry has not always ensured the
|
||
continued ability to provide the same services to the criminal law
|
||
enforcement community. The telecommunications industrys introduction
|
||
of certain types of new technology poses real problems for effective
|
||
criminal law enforcement. Legislation is necessary to ensure that the
|
||
government will be provided with this capability and capacity in the
|
||
future by all providers and operators and to maintain a level playing
|
||
field among competitive providers and operators in the
|
||
telecommunications industry.
|
||
|
||
There have been instances in which court orders authorizing the
|
||
interception of communications have not been fulfilled because of
|
||
technical limitations within particular telecommunications networks.
|
||
For example, as early as 1986, limited capabilities became apparent in
|
||
at least one network which will only be corrected later in 1992. This
|
||
technical deficiency in a new technology forced criminal law
|
||
enforcement agencies to prioritize certain interceptions to the
|
||
exclusion of other court orders. Accordingly, for approximately six
|
||
years, there have been court orders that have not been sought by the
|
||
criminal law enforcement community or executed by the
|
||
telecommunications industry and, as a consequence, important criminal
|
||
investigations have not been brought to fruition or have been less
|
||
than efficiently concluded. This is one classic example of new
|
||
technology affecting adversely the criminal law enforcement community:
|
||
a microcosm of what may be expected on a nationwide basis without
|
||
enactment of this legislation.
|
||
|
||
Section 1 of the bill states Congressional findings and purpose.
|
||
|
||
Section 2 is divided into seven subsections. Subsection (a)
|
||
establishes as a matter of law the responsibility of electronic
|
||
communication services providers and private branch exchange operators
|
||
to continue to provide, within the United States, the capability and
|
||
capacity for criminal law enforcement agencies to intercept wire and
|
||
electronic communications when authorized by law. These subsections
|
||
delineate the existing attributes of wire or electronic communication
|
||
interception.
|
||
|
||
1. Concurrent with Transmission. The application for a court order
|
||
to intercept telecommunications conversations or data transmissions is
|
||
rarely a leisurely process. For example, on the Federal side, the
|
||
development of the required affidavits, submission to the Criminal
|
||
Division of the Department of Justice for approval, transmission of
|
||
approval to the Assistant United States Attorney, the appearance of
|
||
the Assistant before a judge to request the order and the delivery of
|
||
the judges order to the appropriate telecommunications company is
|
||
frequently completed in a very short time. However, crime waits for
|
||
no one and the system for approval of interceptions must and does
|
||
conform with the realities of the activity that is sought to be
|
||
investigated and, if appropriate, prosecuted as criminal offenses.
|
||
Since time is of the essence, current law requires that service
|
||
providers and operators provide the government forthwith all
|
||
information, facilities and technical assistance necessary to
|
||
accomplish its mission. It is critical that the telecommunications
|
||
industry respond quickly to execute the court order or authorization.
|
||
The ultimate problem of timeliness, however, is the real-time
|
||
monitoring of the intercepted communications. As serious and
|
||
potentially life- threatening criminal conduct is detected, it may be
|
||
necessary to move quickly to protect innocent victims from that
|
||
conduct. Accordingly, real-time monitoring is critical.
|
||
|
||
2. Isolated Signal and Services Used. Nearly all of the
|
||
communications network is partially Ranalogs at this time. In
|
||
conducting an interception, for example, of a telephone conversation,
|
||
the government is allowed to monitor and record criminal conversation
|
||
such as a conspiracy, minimizing the acquisition of non-criminal or
|
||
innocent conversation. When an electronic communication services
|
||
provider or private branch exchange operator introduces a new
|
||
technology--such as a digital signal--the communications are converted
|
||
into a different and more efficient form for transmission, but a more
|
||
difficult form to monitor during interception. The bill requires only
|
||
that the provider or operator isolate and provide access to the
|
||
electronic signal that represents the content of the communications of
|
||
the target of the intercept2 from the stream of electronic signals
|
||
representing other communications. This provision seeks to ensure
|
||
that, in the new electronic environment in which signals are mixed for
|
||
transmission and separated at another switch for distribution, the
|
||
government does not receive the communications of any individual other
|
||
than the individuals using the targets communications point of origin
|
||
and receipt; the government must remain subject to the minimization
|
||
standards of 18 U.S.C. __ 2518(5).
|
||
|
||
This provision also makes it clear that an electronic communication
|
||
services provider or private branch exchange operator is not required
|
||
to provide for reconversion of the isolated communication to analog or
|
||
other form. The government expects that this process will be
|
||
accomplished by the government.
|
||
|
||
3. Mobility and Features. Increasingly, criminal acts are being
|
||
conducted or discussed over cellular telephones or by using special
|
||
telecommunications features. As this mobility is introduced, the
|
||
electronic communication services providers and private branch
|
||
exchange operators would be required to assure the capability and
|
||
capacity for criminal law enforcement agencies to continue lawful
|
||
interception.
|
||
|
||
Further, this subsection makes it clear that features used by the
|
||
target do not defeat the court order or authorization. For example,
|
||
communications which have been addressed to the telephone number of
|
||
the target, but which may have been programmed through a
|
||
call-forwarding feature to another, otherwise innocent, telephone
|
||
number, must be captured and made available to criminal law
|
||
enforcement authorities pursuant to court order or authorization.
|
||
This requirement will obviate the need for applications for authority
|
||
to monitor otherwise innocent telephone numbers that receive, only
|
||
intermittently, calls forwarded by the target. The effect of this
|
||
provision is to further minimize monitoring of calls of innocent
|
||
parties. Similarly, certain speed dialing features that mask the
|
||
telephone number called by the target must be identified for criminal
|
||
law enforcement investigation. The ability to consistently determine
|
||
the destination of calls is critical to minimizing the monitoring of
|
||
innocent calls.
|
||
|
||
4. Government Monitoring Facility. Government agencies do not
|
||
normally request the use of telecommunications industry physical
|
||
facilities to conduct authorized interceptions nor is it encourage by
|
||
the industry. Normally, the government leases a line from the
|
||
electronic communication services providers or private branch
|
||
exchange operators switch to another location owned or operated by the
|
||
government. This minimizes the cost and intrusiveness of
|
||
interceptions, which benefits the service provider or operator, as
|
||
well as the government. Accordingly, the ability to monitor
|
||
intercepted communications remotely is critical.
|
||
|
||
5. Without Detection. One of the reasons that governments operate
|
||
their own facilities is to reduce the risk of detection of the
|
||
interception, which would render the interception worthless. At the
|
||
present time, the existence of an interception is unknown to any
|
||
subscriber and is not detectable by the target, notwithstanding
|
||
folklore and spy novels. This provision merely ensures that the
|
||
secrecy of effective interceptions will be maintained.
|
||
|
||
6. Without Degradation. Maintaining the quality of the telephone
|
||
network is in the interest of the government, the industry and the
|
||
public. Presently, the existence of an interception has no effect on
|
||
the quality of the service provided by any network to the target or
|
||
any subscriber. This provision ensures that the quality of the
|
||
network will continue to be uncompromised. Absent the assistance
|
||
delineated by this legislation, the execution of court orders and
|
||
authorizations by the government could well disrupt service of the
|
||
newer technological systems, a result that this legislation seeks to
|
||
avoid.
|
||
|
||
Subsection (b) provides that electronic communication services
|
||
providers and private branch exchange operators with the public
|
||
switched networkS must be in compliance with the minimum intercept
|
||
attributes within eighteen months after enactment. Thereafter, new
|
||
technologies must continue to meet these minimum attributes.
|
||
|
||
Subsection (c) provides that electronic communication service
|
||
providers and private branch exchange operators that are not within
|
||
the public switched networkS must be in compliance with the minimum
|
||
intercept attributes within eighteen months after enactment.
|
||
Thereafter, new technologies must continue to meet these minimum
|
||
attributes.
|
||
|
||
Subsection (d) provides that the Attorney General may grant
|
||
exceptions to the affirmative requirements of subsection (a), as well
|
||
as the implementation deadlines of subsections (b) and (c). In
|
||
considering any request for exception, the Attorney General will
|
||
consult with Federal Communications Commission, the Small Business
|
||
Administration and the Department of Commerce, as appropriate.
|
||
Accordingly, the Attorney General has the authority to except, for
|
||
example, whole classes, categories or types of private branch exchange
|
||
operators where no serious criminal law enforcement problems are
|
||
likely to arise, such as hospital telephone systems.
|
||
|
||
This subsection also permits the Attorney General to waive the
|
||
requirements of subsections (a), (b) and (c) on application by an
|
||
electronic communication services provider or private branch exchange
|
||
operator. Accordingly, if a particular company can not comply with
|
||
one or more of the requirements of subsection (a), or needs time
|
||
additional to that permitted under subsections (b) or (c), the
|
||
Attorney General may grant an appropriate waiver.
|
||
|
||
Subsection (e) provides that the Attorney General has exclusive
|
||
authority to enforce the provisions of the bill. While a number of
|
||
States have authority to seek and execute interception orders, they
|
||
will be required to seek the assistance of the Attorney General if
|
||
enforcement of this legislation is required. This section also
|
||
provides for injunctive relief from violations of the provisions of
|
||
the bill.
|
||
|
||
Subsection (f) provides for enforcement of the provisions of the bill
|
||
through imposition of civil fines against any company that is not
|
||
excepted from the provisions of the bill, does not acquire a waiver of
|
||
the provisions of the bill, and fails to meet the requirements of
|
||
subsection (a) after the effective dates set out in subsection (b) or
|
||
(c), as appropriate. A fine of up to $10,000 per day for each day in
|
||
violation may be levied; for most companies in the telecommunications
|
||
industry this amount is sufficient to ensure that compliance will be
|
||
forthcoming. Although this provision is not expected to be used, it
|
||
is critical to ensure that compliance with the provisions of the bill
|
||
will occur after the effective dates of the requirements of subsection
|
||
(a).
|
||
|
||
Subsection (g) carries forward a number of definitions from the
|
||
current provisions for the interception of wire or electronic
|
||
communications under Ritle III.S The definition of government that
|
||
is currently in use includes all States, territories and possessions
|
||
of the United States, as well as the United States, is made applicable
|
||
to the bill.
|
||
|
||
[Footnotes]
|
||
1 Interceptions for foreign intelligence and counterintelligence
|
||
purposes are not counted within the figures used here, but would likewise
|
||
benefit from enactment of the legislation.
|
||
|
||
2 Whether the content is voice, facsimile, imagery (e.g. video), computer
|
||
data, signalling information, or other forms of communication, does not
|
||
matter; all forms of communication are intercepted.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 24 Jun 92 18:02:18 CDT
|
||
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
|
||
Subject: File 2--Chronicle Crypto Article
|
||
|
||
This cryptography article appeared Sunday, June 21. It is being
|
||
forwarded to Risks as a way of giving back something to the many
|
||
thoughtful participants here who helped give shape to the questions
|
||
and the article.
|
||
|
||
In a companion submission, I include the scanned text of the NSA's
|
||
13-page response to my interview request, which appears to be the most
|
||
substantial response they've provided to date. I would like to invite
|
||
feedback and discussion on the article and the NSA document. Please
|
||
send comments to edtjda@chron.com
|
||
|
||
"PROMISING TECHNOLOGY ALARMS GOVERNMENT"
|
||
"Use of super-secret codes would block legal phone taps
|
||
in FBI's crime work"
|
||
|
||
|
||
By JOE ABERNATHY
|
||
Copyright 1992, Houston Chronicle
|
||
|
||
Government police and spy agencies are trying to thwart new
|
||
technology that allows conversations the feds can't tap.
|
||
|
||
A form of cryptography _ the science of writing and deciphering
|
||
codes _ this technology holds the promise of guaranteeing true privacy
|
||
for transactions and communications.
|
||
|
||
But an array of federal agencies is seeking to either outlaw or
|
||
severely restrict its use, pointing out the potency of truly secret
|
||
communications as a criminal tool.
|
||
|
||
"Cryptography offers or appears to offer something that is
|
||
unprecedented,'' said Whitfield Diffie, who with a Stanford University
|
||
colleague devised public key cryptography,'' an easily used
|
||
cryptography that is at the center of the fight. "It looks as though
|
||
an individual might be able to protect information in such a way that
|
||
the concerted efforts of society are not going to be able to get at
|
||
it.
|
||
|
||
"No safe you can procure has that property; the strongest safes
|
||
won't stand an hour against oxygen lances. But cryptography may be
|
||
different. I kind of understand why the police don't like it.''
|
||
|
||
The National Security Agency, whose mission is to conduct espionage
|
||
against foreign governments and diplomats, sets policy for the
|
||
government on matters regarding cryptography.
|
||
|
||
But the FBI is taking the most visible role. It is backing
|
||
legislation that would address police fears by simply outlawing any
|
||
use of secure cryptography in electronic communications.
|
||
|
||
The ban would apply to cellular phones, computer networks, and the
|
||
newer standard telephone equipment _ already in place in parts of
|
||
Houston's phone system and expected to gain wider use nationwide.
|
||
|
||
"Law enforcement needs to keep up with technology,'' said Steve
|
||
Markardt, a spokesman for the FBI in Washington. "Basically what
|
||
we're trying to do is just keep the status quo. We're not asking for
|
||
anything more intrusive than we already have.''
|
||
|
||
He said the FBI uses electronic eavesdropping only on complex
|
||
investigations involving counterterrorism, foreign intelligence,
|
||
organized crime, and drugs. "In many of those,'' he said, we would not
|
||
be able to succeed without the ability to lawfully intercept.''
|
||
|
||
The State and Commerce departments are limiting cryptography's
|
||
spread through the use of export reviews, although many of these
|
||
reviews actually are conducted by the NSA. The National Institute of
|
||
Standards and Technol ogy, meanwhile, is attempting to impose a
|
||
government cryptographic standard that critics charge is flawed, al
|
||
though the NSA defends the standard as adequate for its intended,
|
||
limited use.
|
||
|
||
"It's clear that the government is unilaterally trying to implement
|
||
a policy that it's developed,'' said Jim Bidzos, president of RSA Data
|
||
Security, which holds a key cryptography patent. "Whose policy is it,
|
||
and whose interest does it serve? Don't we have a right to know what
|
||
policy they're pursuing?''
|
||
|
||
Bidzos and a growing industry action group charge that the policy
|
||
is crippling American business at a critical moment.
|
||
|
||
The White House, Commerce Department, and NIST refused to comment.
|
||
|
||
The NSA, however, agreed to answer questions posed in writing by
|
||
the Houston Chronicle. Its purpose in granting the rare, if limited,
|
||
access, a spokesman said, was "to give a true reflection'' of the
|
||
policy being implemented by the agency.
|
||
|
||
"Our feeling is that cryptography is like nitroglycerin: Use it
|
||
sparingly then put it back under trusted care,'' the spokesman said.
|
||
|
||
Companies ranging from telephone service providers to computer
|
||
manufacturers and bankers are poised to introduce new services and
|
||
products including cryptography. Users of electronic mail and
|
||
computer networks can expect to see cryptography-based privacy
|
||
enhancements later this year.
|
||
|
||
The technology could allow electronic voting, electronic cash
|
||
transactions, and a range of geographically separated _ but secure _
|
||
business and social interactions. Not since the days before the
|
||
telephone could the individual claim such a level of privacy.
|
||
|
||
But law enforcement and intelligence interests fear a world in
|
||
which it would be impossible to execute a wiretap or conduct
|
||
espionage.
|
||
|
||
"Secure cryptography widely available outside the United States
|
||
clearly has an impact on national security,'' said the NSA in its
|
||
13-page response to the Chronicle. "Secure cryptography within the
|
||
United States may impact law enforcement interests.''
|
||
|
||
Although Congress is now evaluating the dispute, a call by a
|
||
congressional advisory panel for an open public policy debate has not
|
||
yet been heeded, or even acknowledged, by the administration.
|
||
|
||
The FBI nearly won the fight before anyone knew that war had been
|
||
declared. Its proposal to outlaw electronic cryptography was slipped
|
||
into another bill as an amendment and nearly became law by default
|
||
last year before civil liberties watchdogs exposed the move.
|
||
|
||
"It's kind of scary really, the FBI proposal being considered as
|
||
an amendment by just a few people in the Commerce Committee without
|
||
really understanding the basis for it,'' said a congressional source,
|
||
who requested anonymity. "For them, I'm sure it seemed innocuous, but
|
||
what it represented was a fairly profound public policy position
|
||
giving the government rights to basically spy on anybody and prevent
|
||
people from stopping privacy infringements.''
|
||
|
||
This year, the FBI proposal is back in bolder, stand-alone
|
||
legislation that has created a battle line with law enforcement on
|
||
one side and the technology industry and privacy advocates on the
|
||
other.
|
||
|
||
"It says right on its face that they want a remote government
|
||
monitoring facility'' through which agents in Virginia, for instance,
|
||
could just flip a switch to tap a conversation in Houston, said Dave
|
||
Banisar of the Washing ton office of Computer Professionals for Social
|
||
Responsibility.
|
||
|
||
Though the bill would not change existing legal restraints on
|
||
phone-tapping, it would significantly decrease the practical
|
||
difficulty of tapping phones _ an ominous development to those who
|
||
fear official assaults on personal and corporate privacy.
|
||
|
||
And the proposed ban would defuse emerging technical protection
|
||
against those assaults.
|
||
|
||
CPSR, the point group for many issues addressing the way computers
|
||
affect peoples' lives, is helping lend focus to a cryptographic
|
||
counterinsurgency that has slowly grown in recent months to include
|
||
such heavyweights as AT&T, DEC, GTE, IBM, Lotus, Microsoft,
|
||
Southwestern Bell, and other computer and communications companies.
|
||
|
||
The proposed law would ban the use of secure cryptogra phy on any
|
||
message handled by a computerized communications network. It would
|
||
further force service providers to build access points into their
|
||
equipment through which the FBI _ and conceivably, any police officer
|
||
at any level _ could eavesdrop on any conversation without ever
|
||
leaving the comfort of headquarters.
|
||
|
||
"It's an open-ended and very broad set of provisions that says the
|
||
FBI can demand that standards be set that industry has to follow to
|
||
ensure that (the FBI) gets access,'' said a congressional source.
|
||
"Those are all code words for if they can't break in, they're going to
|
||
make (cryptography) illegal.
|
||
|
||
"This is one of the biggest domestic policy issues facing the
|
||
country. If you make the wrong decisions, it's going to have a
|
||
profound effect on privacy and security.''
|
||
|
||
The matter is being considered by the House Judiciary Committee,
|
||
chaired by Rep. Jack Brooks, D-Texas, who is writing a revision to the
|
||
Computer Security Act of 1987, the government's first pass at secure
|
||
computing.
|
||
|
||
The recent hearings on the matter produced a notable irony, when
|
||
FBI Director William Sessions was forced to justify his stance against
|
||
cryptography after giving opening remarks in which he called for
|
||
stepped-up action to combat a rising tide of industrial espionage.
|
||
Secure cryptography was designed to address such concerns.
|
||
|
||
The emergence of the international marketplace is shaping much of
|
||
the debate on cryptography. American firms say they can't compete
|
||
under current policy, and that in fact, overseas firms are allowed to
|
||
sell technology in America that American firms cannot export.
|
||
|
||
"We have decided to do all further cryptographic development
|
||
overseas,'' said Fred B. Cohen, a noted computer scientist. "This is
|
||
because if we do it here, it's against the law to export it, but if we
|
||
do it there, we can still import it and sell it here. What this seems
|
||
to say is that they can have it, but I can't sell it to them _ or in
|
||
other words _ they get the money from our research.''
|
||
|
||
A spokeswoman for the the Software Publishers Association said
|
||
that such export controls will cost $3-$5 billion in direct revenue if
|
||
left in place over the next five years. She noted the Commerce
|
||
Department estimate that each $1 billion in direct revenue supports
|
||
20,000 jobs.
|
||
|
||
The NSA denied any role in limiting the power of cryptographic
|
||
schemes used by the domestic public, and said it approves 90 percent
|
||
of cryptographic products referred to NSA by the Department of State
|
||
for export licenses. The Commerce Department conducts its own reviews.
|
||
|
||
But the agency conceded that its export approval figures refer only
|
||
to products that use cryptology to authenticate a communication _ the
|
||
electronic form of a signed business document _ rather than to provide
|
||
privacy.
|
||
|
||
The NSA, a Defense Department agency created by order of President
|
||
Harry Truman to intercept and decode foreign communications, employs
|
||
an army of 40,000 code-breakers. All of its work is done in secret,
|
||
and it seldom responds to questions about its activities, so a large
|
||
reserve of distrust exists in the technology community.
|
||
|
||
NSA funding is drawn from the so-called "black budget,'' which the
|
||
Defense Budget Project, a watchdog group, estimates at $16.3 billion
|
||
for 1993.
|
||
|
||
While the agency has always focused primarily on foreign espionage,
|
||
its massive eavesdropping operation often pulls in innocent Americans,
|
||
according to James Bamford, author of "The Puzzle Palace," a book
|
||
focusing on the NSA's activities. Significant invasions of privacy
|
||
occurred in the 1960s and 1970s, Bamford said.
|
||
|
||
Much more recently, several computer network managers have
|
||
acknowledged privately to the Chronicle that NSA has been given access
|
||
to data transmitted on their networks _ without the knowledge of
|
||
network users who may view the communications as private electronic
|
||
mail.
|
||
|
||
Electronic cryptology could block such interceptions of material
|
||
circulating on regional networks or on Internet _ the massive
|
||
international computer link.
|
||
|
||
While proponents of the new technology concede the need for
|
||
effective law enforcement, some question whether the espionage needs
|
||
of the post-Cold War world justify the government's push to limit
|
||
these electronic safeguards on privacy.
|
||
|
||
"The real challenge is to get the people who can show harm to our
|
||
national security by freeing up this technology to speak up and tell
|
||
us what this harm is,'' said John Gillmore, one of the founders of Sun
|
||
Microsystems.
|
||
|
||
"When the privacy of millions of people who have cellular
|
||
telephones, when the integrity of our computer networks and our PCs
|
||
against viruses are up for grabs here, I think the battleground is
|
||
going to be counting up the harm and in the public policy debate
|
||
trying to strike a balance.''
|
||
|
||
But Vinton Cerf, one of the leading figures of the Internet
|
||
community, urged that those criticizing national policy maintain
|
||
perspective.
|
||
|
||
"I want to ask you all to think a little bit before you totally
|
||
damn parts of the United States government,'' he said. "Before you
|
||
decide that some of the policies that in fact go against our grain and
|
||
our natural desire for openness, before you decide those are
|
||
completely wrong and unacceptable, I hope you'll give a little thought
|
||
to the people who go out there and defend us in secret and do so at
|
||
great risk.''
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 26 Jun 92 09:10:40 EDT
|
||
From: Kim Clancy <clancy@CSRC.NCSL.NIST.GOV>
|
||
Subject: File 3--Conference Contributions to Neidorf Defense FUnd
|
||
|
||
Somebody Watching? Somebody Listening?
|
||
*** Special Announcement ***
|
||
|
||
KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92
|
||
Washington, DC
|
||
|
||
The Fourth Annual International Surveillance and Countersurveillance
|
||
Conference and Exposition focusing on Information Security and
|
||
Investigations Technology will take place at the Sheraton Premiere in
|
||
Tysons Corner (Vienna), Virginia on August 4-7.
|
||
|
||
The seminars are on August 7th and include Craig Neidorf (aka Knight
|
||
Lightning) presenting and discussing the following:
|
||
|
||
- Are law enforcement and computer security officials focusing their
|
||
attention on where the real crimes are being committed?
|
||
|
||
- Should security holes and other bugs be made known to the public?
|
||
|
||
- Is information property and if so, what is it worth?
|
||
|
||
Experience the case that changed the way computer crime is
|
||
investigated and prosecuted by taking a look at one of America's
|
||
most talked about computer crime prosecutions: United States v.
|
||
Neidorf (1990).
|
||
|
||
Exonerated former defendant Craig Neidorf will discuss the
|
||
computer "hacker" underground, Phrack newsletter, computer
|
||
security, and how it all came into play during his 7 month
|
||
victimization by some of our nation's largest telephone companies
|
||
and an overly ambitious and malicious federal prosecutor.
|
||
Neidorf will speak about his trial in 1990 and how the court
|
||
dealt with complex issues of First Amendment rights, intellectual
|
||
property, and criminal justice.
|
||
|
||
Security professionals, government employees, and all other interested
|
||
parties are invited to attend. For more information please contact:
|
||
|
||
American Technology Associates, Inc.
|
||
P.O. Box 20254
|
||
Washington, DC 20041
|
||
(202)331-1125 Voice
|
||
(703)318-8223 FAX
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 21 Jun 92 17:46:26 PDT
|
||
From: jwarren@AUTODESK.COM(Jim Warren)
|
||
Subject: File 4--Govt & Corp Sysops Monitoring Users & Email
|
||
|
||
Last month, I gave a morning talk to an all-day meeting of an
|
||
organization of systems administrators of mini-class, mostly-shared
|
||
systems -- most of them employed by Fortune 500 companies and
|
||
government agencies.
|
||
|
||
Initially titled, "Dodging Pitfalls in the Electronic Frontier," by
|
||
mutual agreement with the organizers, we re-titled it, "Government
|
||
Impacts on Privacy and Security." However, it was the same talk. :-)
|
||
It was based on information and perspectives aired during recent
|
||
California Senate Judiciary privacy hearings, and those presented at
|
||
the 1991 and 1992 conferences on Computers, Freedom & Privacy. (I
|
||
organized and chaired the first CFP and co-authored its transcripts,
|
||
available from the IEEE Computer Society Press, 714-821-8380, Order
|
||
#2565.)
|
||
|
||
The talk was long; the audience attentive; the questions and
|
||
discussion extensive. The attendees were clearly and actively
|
||
interested in the issues. At one point, I asked "How many have *NOT*
|
||
been asked by their management or superiors to monitor their users
|
||
and/or examine or monitor users' email."
|
||
|
||
Only about 20% held up their hands -- even though I emphasized that I
|
||
was phrasing the question in a way that those who would be proud to
|
||
hold up their hands, could to do so.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 30 Jun 1992 17:56:35 EDT
|
||
From: "PETER B. WHITE" <pbwhite@LATROBE.EDU.AU>
|
||
Subject: File 5--Call for papers : Digitisation
|
||
|
||
SPECIAL ISSUE
|
||
|
||
MEDIA INFORMATION AUSTRALIA
|
||
|
||
SOCIAL IMPLICATIONS OF DIGITISATION
|
||
|
||
MEDIA INFORMATION AUSTRALIA will be publishing a special issue
|
||
devoted to the social implications of digitisation in February
|
||
1993. Issues to be considered include the social, economic and
|
||
political implications of digitisation for:
|
||
|
||
- electronic communities
|
||
- journalism, publishing and broadcasting
|
||
- telecommunications
|
||
- privacy and free speech
|
||
- work practices
|
||
- gender relations
|
||
- international communications
|
||
- leisure, education and training
|
||
|
||
MEDIA INFORMATION AUSTRALIA, founded by the late Professor
|
||
Henry Mayer, is a peer-reviewed journal with an international
|
||
orientation, in its sixteenth year of publication. It is
|
||
published by the Australian Film Television and Radio School.
|
||
|
||
Potential contributors should send abstracts of no more than
|
||
300 words by July 15, 1992, Commissioned papers of 3000-5000
|
||
words will be due by October 1, 1992 and they will be peer-
|
||
reviewed in the normal way.
|
||
|
||
Please send abstracts to the Issue Editor :
|
||
|
||
Dr Peter B. White,
|
||
Media Centre,
|
||
La Trobe University,
|
||
Bundoora, Victoria 3083, Australia or
|
||
|
||
EMAIL: PBWHITE@LATROBE.EDU.AU
|
||
|
||
FAX: + 61 3 817 5875.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.29
|
||
************************************
|
||
|
||
|
||
|