1105 lines
54 KiB
Plaintext
1105 lines
54 KiB
Plaintext
******************************************************************
|
|
////////////// ////////////// //////////////
|
|
/// /// ///
|
|
/////// /////// ///////
|
|
/// /// ///
|
|
////////////// /// ///
|
|
******************************************************************
|
|
EFFector Online Volume 6 No. 1 9/17/1993 editors@eff.org
|
|
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
|
|
1098 lines
|
|
-==--==--==-<>-==--==--==-
|
|
In This Issue:
|
|
Clipper Escrow Agents Chosen
|
|
Barlow's "A Plain Text on Crypto Policy"
|
|
Crypto Conference in Austin
|
|
Virginians Against Censorship
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
****************************
|
|
Clipper Escrow Agents Chosen
|
|
****************************
|
|
|
|
In the next several days, the Administration will announce it has
|
|
chosen at least one escrow agency and has developed procedures for
|
|
accessing escrow keys pursuant to warrant. Here is an account of an
|
|
Administration hill staff briefing on September 16, 1993, and the draft
|
|
procedures for law enforcement, foreign intelligence, and state and local
|
|
law enforcement wiretapping. We are looking for comments and analysis.
|
|
Please circulate widely.
|
|
|
|
Jerry Berman, EFF.
|
|
|
|
==================
|
|
|
|
RE: Clipper Escrow Agent Briefing for Congressional Staff
|
|
|
|
Yesterday, September 15, 1993, a briefing was held for
|
|
congressional staff regarding the status of the Clipper project. The lead
|
|
briefers for the Administration were Mark Richard, Deputy Assistant
|
|
Attorney General, Criminal Division, DOJ; Jim Kallstrom, FBI; Geoff
|
|
Greiveldinger, Special Counsel, Narcotic and Dangerous Drug Section, DOJ;
|
|
and John Podesta. Also present were Mary Lawton, Counsel for Intelligence
|
|
Policy and Review, DOJ; Mike Waguespack, NSC; and Dwight Price, National
|
|
District Attorneys Association.
|
|
|
|
The Administration has tentatively settled on NIST and a yet to be
|
|
determined non-law enforcement component of the Department of the
|
|
Treasury as the "escrow agents." The Administration will finalize the choices
|
|
in the next few days, according to John Podesta. The Attorney General will
|
|
make an announcement, in what form has not been determined, but it will
|
|
probably not be a Federal Register notice. The Attorney General will
|
|
announce that she has adopted, and the escrows have agreed to follow, the
|
|
attached procedures.
|
|
|
|
The system will work as follows:
|
|
|
|
(1) A black box (actually a PC) in the possession of a law enforcement
|
|
agency will be able to read the Law Enforcement Access Field in a Clipper
|
|
encrypted data stream and extract the identification number specific to the
|
|
Clipper chip being used by the intercept target. Cost of the black box yet
|
|
undetermined. How many will be purchased by law enforcement yet
|
|
undetermined, although if use of Clipper becomes common, the black boxes
|
|
will be in great demand, by federal as well as state and local agencies.
|
|
They will be available only to law enforcement, with yet to be specified
|
|
controls on their sale. Each black box will have a unique identifier.
|
|
|
|
(2) The law enforcement agency will fax the device ID number to
|
|
each of the escrow agents, along with a certification that the agency has
|
|
authority to conduct the intercept, the ID number of the intercepting
|
|
agency's black box, and the time period for which the intercept is
|
|
authorized (in the case of Title III's, up to thirty days, with
|
|
extensions).
|
|
|
|
(3) The escrow agents will transmit the key components by encrypted
|
|
link directly into the black box of the requesting law enforcement agency.
|
|
The key components will only work with that particular black box, and will
|
|
only work for the stated duration of the intercept. If the intercept is
|
|
extended, the law enforcement agency will have to send a new request to
|
|
the escrow agents to extend the life of the key components. The escrow
|
|
agents will maintain logs of the requests. Greiveldinger stressed that the
|
|
system is "replete with recordation of the transactions that will occur."
|
|
The escrow agents also have a responsibility for maintaining the integrity
|
|
of the chip manufacturing process.
|
|
|
|
In opening remarks describing the need for the Clipper escrow
|
|
system, Kallstrom had stressed that the AT&T product posed a unique threat
|
|
in terms of voice quality, affordability, portability and strength of the
|
|
encryption. The Administration rejects the argument that voice encryption
|
|
is readily available. The AT&T product, which isn't available yet, is
|
|
unique, and competing products, the Administration argues, are yet further
|
|
in the future.
|
|
|
|
The next voice encryption product in the pipeline is Motorola's,
|
|
and Motorola has expressed interest in using Clipper in its product. The
|
|
Administration argued that the need for compatibility would drive a
|
|
significant share of the market to Clipper or Capstone-based products.
|
|
Escrow coverage will not be complete, but the bad guys are careless and are
|
|
expected to use Clipper products.
|
|
|
|
The key criterion used in selecting the escrow agents was whether
|
|
the agency had experience in and an infrastructure for handling sensitive
|
|
information. The Administration did not want to use a law enforcement or
|
|
national security component, for credibility reasons. It did not want to
|
|
use private entities based on concerns about longevity and not wanting
|
|
security to be governed by the need to make a profit. The briefers
|
|
admitted that the proposed system is not really an escrow. The agencies
|
|
holding the key components will not have any duties or responsibilities to
|
|
the Clipper users. The escrows' obligation will be to the government, and
|
|
they will be liable to Clipper users only under the Bivens doctrine, where
|
|
any failure must be shown to be wilful.
|
|
|
|
Both John Podesta and Mark Richard stated that there is no plan on
|
|
or over the horizon to outlaw non-escrowed encryption.
|
|
|
|
John and Mark said that the international aspects of the
|
|
escrow/encryption issue are the thorniest to deal with, and there are no
|
|
answers yet. Clipper products would be exportable with a license, although
|
|
other countries may try to keep them out. (Nobody asked questions about
|
|
changes in the rules governing export of non-Clipper encryption.) Other
|
|
nations would not participate in the escrow system, nor, presumably, would
|
|
they be allowed to buy the black boxes. E.G., if the British intercepted an
|
|
IRA communication that appeared to be encrypted with Clipper, and came to
|
|
the FBI for help, the anticipated escrow system would not allow the FBI to
|
|
get the key from the escrow agents.
|
|
|
|
==================PROPOSED PROCEDURES
|
|
|
|
AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY
|
|
COMPONENTS IN CONJUNCTION WITH INTERCEPTS PURSUANT TO TITLE III
|
|
|
|
The following are the procedures for the release of escrowed key
|
|
components in conjunction with lawfully authorized interception of
|
|
communications encrypted with a key-escrow encryption method. These
|
|
procedures cover all electronic surveillance conducted pursuant to Title
|
|
III of the omnibus Crime Control and Safe Streets Act of 1968, as amended
|
|
(Title III), Title 18, United States Code, Section 2510 et seq.
|
|
|
|
1) In each case there shall be a legal authorization for the
|
|
interception of wire and/or electronic communications.
|
|
|
|
2) All electronic surveillance court orders under Title III shall
|
|
contain provisions authorizing after-the-fact minimization, pursuant to 18
|
|
U.S.C. 2518(5), permitting the interception and retention of coded
|
|
communications, including encrypted communications.
|
|
|
|
3) In the event that federal law enforcement agents discover during
|
|
the course of any lawfully authorized interception that communications
|
|
encrypted with a key escrow encryption method are being utilized, they may
|
|
obtain a certification from the investigative agency conducting the
|
|
investigation, or the Attorney General of the United States or designee
|
|
thereof. Such certification shall
|
|
|
|
(a) identify the law enforcement agency or other authority conducting the
|
|
interception and the person providing the certification; (b) certify that
|
|
necessary legal authorization has been obtained to conduct electronic
|
|
surveillance regarding these communications; (c) specify the termination
|
|
date of the period for which interception has been authorized; (d) identify
|
|
by docket number or other suitable method of specification the source of
|
|
the authorization; (e) certify that communications covered by that
|
|
authorization are being encrypted with a key-escrow encryption method; (f)
|
|
specify the identifier (ID) number of the key escrow encryption chip
|
|
providing such encryption; and(g) specify the serial (ID) number of the
|
|
key-escrow decryption device that will be used by the law enforcement
|
|
agency or other authority for decryption of the intercepted communications.
|
|
|
|
4) The agency conducting the interception shall submit this
|
|
certification to each of the designated key component escrow agents. If the
|
|
certification has been provided by an investigative agency, as soon
|
|
thereafter as practicable, an attorney associated with the United States
|
|
Attorney's Office supervising the investigation shall provide each of the
|
|
key component escrow agents with written confirmation of the certification.
|
|
|
|
5) Upon receiving the certification from the requesting investigative
|
|
agency, each key component escrow agent shall release the necessary key
|
|
component to the requesting agency. The key components shall be provided
|
|
in a manner that assures they cannot be used other than in conjunction with
|
|
the lawfully authorized electronic surveillance for which they were
|
|
requested.
|
|
|
|
6) Each of the key component escrow agents shall retain a copy of the
|
|
certification of the requesting agency, as well as the subsequent
|
|
confirmation of the United States Attorney's office. In addition, the
|
|
requesting agency shall retain a copy of the certification and provide
|
|
copies to the following:
|
|
|
|
(a) the United States Attorney's office supervising the investigation, and
|
|
(b) the Department of Justice, Office of Enforcement operations .
|
|
|
|
7) Upon, or prior to, completion of the electronic surveillance phase of
|
|
the investigation, the ability of the requesting agency to decrypt
|
|
intercepted communications shall terminate, and the requesting agency may
|
|
not retain the key components.
|
|
|
|
These procedures do not create, and are not intended to create, any
|
|
substantive rights for individuals intercepted through electronic
|
|
surveillance, and noncompliance with these procedures shall not provide the
|
|
basis for any motion to suppress or other objection to the introduction of
|
|
electronic surveillance evidence lawfully acquired.
|
|
|
|
AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY
|
|
COMPONENTS IN CONJUNCTION WITH INTERCEPTS PURSUANT TO FISA
|
|
|
|
The following are the procedures for the release of escrowed key
|
|
components in conjunction with lawfully authorized interception of
|
|
communications encrypted with a key-escrow encryption method. These
|
|
procedures cover all electronic surveillance conducted pursuant to the
|
|
Foreign Intelligence Surveillance Act (FISA), Pub. L. 9S-511, which appears
|
|
at Title 50, U.S. Code, Section 1801 et seq.
|
|
|
|
1) In each case there shall be a legal authorization for the
|
|
interception of wire and/or electronic communications.
|
|
|
|
2) In the event that federal authorities discover during the course of
|
|
any lawfully authorized interception that communications encrypted with a
|
|
key-escrow encryption method are being utilized, they may obtain a
|
|
certification from an agency authorized to participate in the conduct of
|
|
the interception, or from the Attorney General of the United States or
|
|
designee thereof. Such certification shall
|
|
|
|
(a) identify the agency participating in the conduct of the interception
|
|
and the person providing the certification; (b) certify that necessary
|
|
legal authorization has been obtained to conduct electronic surveillance
|
|
regarding these communications; (c) specify the termination date of the
|
|
period for which interception has been authorized; (d) identify by docket
|
|
number or other suitable method of specification the source of the
|
|
authorization; (e) certify that communications covered by that
|
|
authorization are being encrypted with a key-escrow encryption method; (f)
|
|
specify the identifier (ID) number of the key escrow encryption chip
|
|
providing such encryption; and(g) specify the serial (ID) number of the
|
|
key-escrow decryption device that will be used by the agency participating
|
|
in the conduct of the interception for decryption of the intercepted
|
|
communications.
|
|
|
|
4) This certification shall be submitted to each of the designated key
|
|
component escrow agents. If the certification has been provided by an
|
|
agency authorized to participate in the conduct of the interception, as
|
|
soon thereafter as practicable, an attorney associated with the Department
|
|
of Justice, office of Intelligence Policy and Review, shall provide each of
|
|
the key component escrow agents with written confirmation of the
|
|
certification.
|
|
|
|
5) Upon receiving the certification, each key component escrow agent
|
|
shall release the necessary key component to the agency participating in
|
|
the conduct of the interception. The key components shall be provided in a
|
|
manner that assures they cannot be used other than in conjunction with the
|
|
lawfully authorized electronic surveillance for which they were requested.
|
|
|
|
6) Each of the key component escrow agents shall retain a copy of the
|
|
certification, as well as the subsequent written confirmation of the
|
|
Department of Justice, Office of Intelligence Policy and Review.
|
|
|
|
7) Upon, or prior to, completion of the electronic surveillance phase
|
|
of the investigation, the ability of the agency participating in the
|
|
conduct of the interception to decrypt intercepted communications shall
|
|
terminate, and such agency may not retain the key components.
|
|
|
|
These procedures do not create, and are not intended to create, any
|
|
substantive rights for individuals intercepted through electronic
|
|
surveillance, and noncompliance with these procedures shall not provide the
|
|
basis for any motion to suppress or other objection to the introduction of
|
|
electronic surveillance evidence lawfully acquired.
|
|
|
|
AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY
|
|
COMPONENTS IN CONJUCTION WITH INTERCEPTS PURSUANT TO STATE
|
|
STATUTES
|
|
|
|
Key component escrow agents may only release escrowed key components to
|
|
law enforcement or prosecutorial authorities for use in conjunction with
|
|
lawfully authorized interception of communications encrypted with a key
|
|
escrow encryption method. These procedures apply to the release of key
|
|
components to State and local law enforcement or prosecutorial authorities
|
|
for use in conjunction with interceptions conducted pursuant to relevant
|
|
State statutes authorizing electronic surveillance, and Title III of the
|
|
omnibus Crime Control and Safe Streets Act of 1968, as amended, Title 18,
|
|
United States Code, Section 2510 et seq.
|
|
|
|
1) The State or local law enforcement or prosecutorial authority must
|
|
be conducting an interception of wire and/or electronic communications
|
|
pursuant to lawful authorization.
|
|
|
|
2) Requests for release of escrowed key components must be submitted
|
|
to the key component escrow agents by the principal prosecuting attorney of
|
|
the State, or of a political subdivision thereof, responsible for the
|
|
lawfully authorized electronic surveillance.
|
|
|
|
3) The principal prosecuting attorney of such State or political
|
|
subdivision of such State shall submit with the request for escrowed key
|
|
components a certification that shall
|
|
|
|
(a) identify the law enforcement agency or other authority conducting the
|
|
interception and the prosecuting attorney responsible therefore; (b)
|
|
certify that necessary legal authorization for interception has been
|
|
obtained to conduct electronic surveillance regarding these communications;
|
|
(c) specify the termination date of the period for which interception has
|
|
been authorized (d) identify by docket number or other suitable method of
|
|
specification the source of the authorization; (e) certify that
|
|
communications covered by that authorization are being encrypted with a
|
|
key-escrow encryption method; (f) specify the identifier (ID) number of the
|
|
key escrow chip providing such encryption; and (g) specify the serial (ID)
|
|
number of the key-escrow decryption device that will be used by the law
|
|
enforcement agency or other authority for decryption the intercepted
|
|
communications.
|
|
|
|
4) Such certification must be submitted by the principal prosecuting
|
|
attorney of that State or political subdivision to each of the designated
|
|
key component escrow agents.
|
|
|
|
5) Upon receiving the certification from the principal prosecuting
|
|
attorney of the State or political subdivision, each key component escrow
|
|
agent shall release the necessary key component to the intercepting State
|
|
or local law enforcement agency or other authority. The key components
|
|
shall be provided in a manner that assures they cannot be used other than
|
|
in conjunction with the lawfully authorized electronic surveillance for
|
|
which they were requested.
|
|
|
|
6) Each of the key component escrow agents shall retain a copy of the
|
|
certification of the principal prosecuting attorney of the State or
|
|
political subdivision. In addition, such prosecuting attorney shall provide
|
|
a copy of the certification to the Department of Justice.
|
|
|
|
7) The U.S. Department of Justice may, to assure conformance with
|
|
these procedures, make inquiry of the certifying prosecuting attorney
|
|
regarding, inter alia, the genuineness of the certification and
|
|
confirmation of the existence of lawful authorization to conduct the
|
|
relevant electronic surveillance. The inquiry of the U.S. Department of
|
|
Justice will not involve intrusion into matters that must, under relevant
|
|
statute, be kept from public disclosure.
|
|
|
|
8) Upon, or prior to, completion of the electronic surveillance phase of
|
|
the investigation, the ability of the intercepting law enforcement agency
|
|
or other authority to decrypt intercepted communications shall terminate,
|
|
and the intercepting law enforcement agency or other authority may not
|
|
retain the key components.
|
|
|
|
These procedures do not create, and are not intended to create, any
|
|
substantive rights for individuals intercepted through electronic
|
|
surveillance, and noncompliance with these procedures shall not provide the
|
|
basis for any motion to suppress or other objection to the introduction of
|
|
electronic surveillance evidence lawfully acquired.
|
|
|
|
*****************************
|
|
A Plain Text on Crypto Policy
|
|
*****************************
|
|
For the October, 1993 Electronic Frontier column
|
|
in Communications of the ACM
|
|
by
|
|
John Perry Barlow
|
|
|
|
The field of cryptography, for centuries accustomed to hermetic isolation
|
|
within a culture as obscure as its own puzzles, is going public. People who
|
|
thought algorithms were maybe something you needed to dig rap music are
|
|
suddenly taking an active interest in the black arts of crypto.
|
|
|
|
We have the FBI and NSA to thank for this. The FBI was first to arouse
|
|
public concerns about the future of digital privacy with its injection of
|
|
language year before last into a major Senate anti-crime bill (SB 266)
|
|
which would have registered the congressional intent that all providers of
|
|
digitized communications should provide law enforcement with analog access
|
|
to voice and data transmissions of their subscribers.
|
|
|
|
When this was quietly yanked in committee, they returned with a proposed
|
|
bill called Digital Telephony. If passed, it would have essentially called
|
|
a halt to most American progress in telecommunications until they could be
|
|
assured of their continued ability to wiretap. Strange but true.
|
|
|
|
They were never able to find anyone in Congress technologically backward
|
|
enough to introduce this oddity for them, but they did elevate public
|
|
awareness of the issues considerably.
|
|
|
|
The National Security Agency, for all its (unknown but huge) budget, staff,
|
|
and MIPS, has about as much real world political experience as the Order of
|
|
Trappists and has demonstrated in its management of cryptology export
|
|
policies the maddening counter-productivity that is the usual companion of
|
|
inexperience.
|
|
|
|
The joint bunglings of these two agencies were starting to infuriate a lot
|
|
of people and institutions who are rarely troubled by Large Governmental
|
|
Foolishness in the Service of Paranoia. Along with all the usual paranoids,
|
|
of course.
|
|
|
|
Then from the NSA's caverns in Fort Meade, Maryland there slouched a chip
|
|
called Clipper.
|
|
|
|
For those of you who just tuned in (or who tuned out early), the Clipper
|
|
Chip...now called Skipjack owing to a trademark conflict...is a hardware
|
|
encryption device that NSA designed under Reagan-Bush. In April it was
|
|
unveiled by the Clinton Administration and proposed for both governmental
|
|
and public use. Installed in phones or other telecommunications tools, it
|
|
would turn any conversation into gibberish for all but the speaker and his
|
|
intended listener, using a secret military algorithm.
|
|
|
|
Clipper/Skipjack is unique, and controversial, in that it also allows the
|
|
agents of government to listen under certain circumstances. Each chip
|
|
contains a key that is split into two parts immediately following
|
|
manufacture. Each half is then placed in the custody of some trusted
|
|
institution or "escrow agent."
|
|
|
|
If, at some subsequent time, some government agency desires to legally
|
|
listen in on the owner of the communications device in which the chip has
|
|
been placed, it would present evidence of "lawful authority" to the escrow
|
|
holders. They will reveal the key pairs, the agency will join them, and
|
|
begin listening to the subject's unencrypted conversations.
|
|
|
|
(Apparently there are other agencies besides law enforcement who can
|
|
legally listen to electronic communications. The government has evaded
|
|
questions about exactly who will have access to these keys, or for that
|
|
matter, what, besides an judicial warrant, constitutes the "lawful
|
|
authority" to which they continually refer.)
|
|
|
|
Clipper/Skipjack was not well received. The blizzard of anguished ASCII it
|
|
summoned forth on the Net has been so endlessly voluble and so painstaking
|
|
in its "How-many-Cray-Years-can-dance-on-the-head-of-a-Clipper-Chip"
|
|
technical detail that I would guess all but the real cypherpunks are by now
|
|
data-shocked into listlessness and confusion.
|
|
|
|
Indeed, I suspect that even many readers of this publication...a group with
|
|
prodigious capacity for assimilating the arid and obscure...are starting to
|
|
long for the days when their knowledge of cryptography and the public
|
|
policies surrounding it was limited enough to be coherent.
|
|
|
|
So I almost hesitate to bring the subject up. Yet somewhere amid this
|
|
racket, decisions are being made that will profoundly affect your future
|
|
ability to communicate without fear. Those who would sacrifice your liberty
|
|
for their illusions of public safety are being afforded some refuge by the
|
|
very din of opposition.
|
|
|
|
In the hope of restoring both light and heat to the debate, I'm going to
|
|
summarize previous episodes, state a few conclusions I've drawn about the
|
|
current techno-political terrain, and recommend positions you might
|
|
When I first heard about Clipper/Skipjack, I thought it might not be such a
|
|
bad idea. This false conclusion was partly due to the reality distorting
|
|
character of the location...I was about fifty feet away from the Oval
|
|
Office at the time...but it also seemed like one plausible approach to what
|
|
may be the bright future of crime in the Virtual Age.
|
|
|
|
I mean, I can see what the Guardian Class is worried about. The greater
|
|
part of business is already being transacted in Cyberspace. Most of the
|
|
money is there. At the moment, however, most of the monetary bits in there
|
|
are being accounted for. Accounting is digital, but cash is not.
|
|
|
|
It is imaginable that, with the widespread use of digital cash and
|
|
encrypted monetary exchange on the Global Net, economies the size of
|
|
America's could appear as nothing but oceans of alphabet soup. Money
|
|
laundering would no longer be necessary. The payment of taxes might
|
|
become more or less voluntary. A lot of weird things would happen after
|
|
that...
|
|
|
|
I'm pretty comfortable with chaos, but this is not a future I greet without
|
|
reservation.
|
|
|
|
So, while I'm not entirely persuaded that we need to give up our future
|
|
privacy to protect ourselves from drug dealers, terrorists, child
|
|
molesters, and un-named military opponents (the Four Horsemen of Fear
|
|
customarily invoked by our protectors), I can imagine bogeymen whose
|
|
traffic I'd want visible to authority.
|
|
|
|
Trouble is, the more one learns about Clipper/Skipjack, the less persuaded
|
|
he is that it would do much to bring many actual Bad Guys under scrutiny.
|
|
|
|
As proposed, it would be a voluntary standard, spread mainly by the market
|
|
forces that would arise after the government bought a few tons of these
|
|
chips for their own "sensitive but unclassified" communications systems. No
|
|
one would be driven to use it by anything but convenience. In fact, no one
|
|
with any brains would use it if he were trying to get away with anything.
|
|
|
|
In fact, the man who claims to have designed Clipper's basic specs, Acting
|
|
NIST Director Ray Kammer, recently said, "It's obvious that anyone who
|
|
uses Clipper for the conduct of organized crime is dumb." No kidding. At
|
|
least so long as it's voluntary.
|
|
|
|
Under sober review, there mounted an incredibly long list of reasons to
|
|
think Clipper/Skipjack might not be a fully-baked idea. In May, after a
|
|
month of study, the Digital Privacy and Security Working Group, a coalition
|
|
of some 40 companies and organizations chaired by the Electronic Frontier
|
|
Foundation (EFF), sent the White House 118 extremely tough questions
|
|
regarding Clipper, any five of which should have been sufficient to put the
|
|
kibosh on it.
|
|
|
|
The members of this group were not a bunch of hysterics. It includes DEC,
|
|
Hewlett-Packard, IBM, Sun, MCI, Microsoft, Apple, and AT&T (which was
|
|
also, interestingly enough, the first company to commit to putting
|
|
Clipper/Skipjack in its own products).
|
|
|
|
Among the more troubling of their questions:
|
|
|
|
o Who would the escrow agents be?
|
|
|
|
o What are Clipper's likely economic impacts, especially in regard to
|
|
export of American digital products?
|
|
|
|
o Why is its encryption algorithm secret and why should the public
|
|
have confidence in a government-derived algorithm that can't be privately
|
|
tested?
|
|
|
|
o Why is Clipper/Skipjack being ram-rodded into adoption as a
|
|
government standard before completion of an over-all review of U.S.
|
|
policies on cryptography?
|
|
|
|
|
|
o Why are the NSA, FBI, and NIST stone-walling Freedom of Information
|
|
inquiries about Clipper/Skipjack? (In fact, NSA's response has been,
|
|
essentially, "So? Sue us.")
|
|
|
|
o Assuming Clipper/Skipjack becomes a standard, what happens if the
|
|
escrow depositories are compromised?
|
|
|
|
o Wouldn't these depositories also become targets of opportunity for
|
|
any criminal or terrorist organization that wanted to disrupt US. law
|
|
enforcement?
|
|
|
|
o Since the chip transmits its serial number at the beginning of each
|
|
connection, why wouldn't it render its owner's activities highly visible
|
|
through traffic analysis (for which government needs no warrant)?
|
|
|
|
o Why would a foreign customer buy a device that exposed his
|
|
conversations to examination by the government of the United States?
|
|
|
|
o Does the deployment and use of the chip possibly violate the 1st,
|
|
4th, and 5th Amendments to the U.S. Constitution?
|
|
|
|
o In its discussions of Clipper/Skipjack, the government often uses
|
|
the phrase "lawfully authorized electronic surveillance." What, exactly, do
|
|
they mean by this?
|
|
|
|
o Is it appropriate to insert classified technology into either the
|
|
public communications network or into the general suite of public
|
|
technology standards?
|
|
|
|
And so on and so forth. As I say, it was a very long list. On July 29,
|
|
John D. Podesta, Assistant to the President and White House Staff Secretary
|
|
(and, interestingly enough, a former legal consultant to EFF and Co-Chair
|
|
of the Digital Privacy Working Group), responded to these questions. He
|
|
actually answered few of them.
|
|
|
|
Still un-named, undescribed, and increasingly unimaginable were the escrow
|
|
agents. Questions about the inviolability of the depositories were met with
|
|
something like, "Don't worry, they'll be secure. Trust us."
|
|
|
|
There seemed a lot of that in Podesta's responses. While the government had
|
|
convened a panel of learned cryptologists to examine the classified
|
|
Skipjack algorithm, it had failed to inspire much confidence among the
|
|
crypto establishment, most of whom were still disinclined to trust anything
|
|
they couldn't whack at themselves. At the least, most people felt a proper
|
|
examination would take longer than the month or so the panel got. After
|
|
all, it took fifteen years to find a hairline fissure in DES .
|
|
|
|
But neither Podesta nor any other official explained why it had seemed
|
|
necessary to use a classified military algorithm for civilian purposes. Nor
|
|
were the potential economic impacts addressed. Nor were the concerns about
|
|
traffic analysis laid to rest.
|
|
|
|
But as Thomas Pynchon once wrote, "If they can get you asking the wrong
|
|
questions, they don't have to worry about the answers." Neither asked nor
|
|
answered in all of this was the one question that kept coming back to me:
|
|
Was this trip really necessary?
|
|
|
|
For all the debate over the details, few on either side seemed to be
|
|
approaching the matter from first principles. Were the enshrined
|
|
threats...drug dealers, terrorists, child molesters, and foreign
|
|
enemies...sufficiently and presently imperiling to justify fundamentally
|
|
compromising all future transmitted privacy?
|
|
|
|
I mean...speaking personally now...it seems to me that America's greatest
|
|
health risks derive from the drugs that are legal, a position the
|
|
statistics overwhelmingly support. And then there's terrorism, to which we
|
|
lost a total of two Americans in 1992, even with the World Trade Center
|
|
bombing, only 6 in 1993. I honestly can't imagine an organized ring of
|
|
child molesters, but I suppose one or two might be out there. And the last
|
|
time we got into a shooting match with another nation, we beat them by a
|
|
kill ratio of about 2300 to 1.
|
|
|
|
Even if these are real threats, was enhanced wire-tap the best way to
|
|
combat them? Apparently, it hasn't been in the past. Over the last ten
|
|
years the average total nation-wide number of admissible state and federal
|
|
wire-taps has numbered less than 800. Wire-tap is not at present a major
|
|
enforcement tool, and is far less efficient than the informants, witnesses,
|
|
physical evidence, and good old fashioned detective work they usually rely
|
|
on.
|
|
|
|
(It's worth noting that the World Trade Center bombing case unraveled, not
|
|
through wire-taps, but with the discovery of the axle serial number on the
|
|
van which held the explosives.)
|
|
|
|
Despite all these questions, both unasked and unanswered, Clipper continues
|
|
(at the time of this writing) to sail briskly toward standardhood, the full
|
|
wind of government bearing her along.
|
|
|
|
On July 30, NIST issued a request for public comments on its proposal to
|
|
establish Clipper/Skipjack as a Federal Information Processing Standard
|
|
(FIPS). All comments are due by September 28, and the government seems
|
|
unwilling to delay the process despite the lack of an overall guiding
|
|
policy on crypto. Worse, they are putting a hard sell on Clipper/Skipjack
|
|
without a clue as to who might be escrow holders upon whose political
|
|
acceptability the entire scheme hinges.
|
|
|
|
Nor have they addressed the central question: why would a criminal use a
|
|
key escrow device unless he were either very stupid...in which case he'd be
|
|
easily caught anyway...or simply had no choice.
|
|
|
|
All this leads me to an uncharacteristically paranoid conclusion:
|
|
|
|
The Government May Mandate Key Escrow Encryption and Outlaw Other
|
|
Forms.
|
|
|
|
It is increasingly hard for me to imagine any other purpose for the
|
|
Clipper/Skipjack operetta if not to prepare the way for the restriction of
|
|
all private cryptographic uses to a key escrow system. If I were going to
|
|
move the American people into a condition where they might accept
|
|
restrictions on their encryption, I would first engineer the wide-spread
|
|
deployment of a key escrow system on a voluntary basis, wait for some
|
|
blind sheik to slip a bomb plot around it and then say, "Sorry, folks this
|
|
ain't
|
|
enough, it's got to be universal."
|
|
|
|
Otherwise, why bother? Even its most ardent proponents admit that no
|
|
intelligent criminal would trust his communications to a key escrow device.
|
|
On the other hand, if nearly all encrypted traffic were Skipjack-flavored,
|
|
any transmission encoded by some other algorithm would stick out like a
|
|
licorice Dot.
|
|
|
|
In fact, the assumption that Cyberspace will roar one day with Skipjack
|
|
babble lies behind the stated reason for the secrecy for the algorithm. In
|
|
their Interim Report, the Skipjack review panel puts it this way:
|
|
|
|
Disclosure of the algorithm would permit the construction of devices that
|
|
fail to properly implement the LEAF [or Law Enforcement Access Field],
|
|
while still interoperating with legitimate SKIPJACK devices. Such devices
|
|
would provide high quality cryptographic security without preserving the
|
|
law enforcement access capability that distinguishes this cryptographic
|
|
initiative.
|
|
|
|
In other words, they don't want devices or software out there that might
|
|
use the Skipjack algorithm without depositing a key with the escrow
|
|
holders. (By the way, this claim is open to question. Publishing Skipjack
|
|
would not necessarily endow anyone with the ability to build an
|
|
interoperable chip.)
|
|
|
|
Then there was the conversation I had with a highly-placed official of the
|
|
National Security Council in which he mused that the French had, after all,
|
|
outlawed the private use of cryptography, so it weren't as though it
|
|
couldn't be done. (He didn't suggest that we should also emulate France's
|
|
policy of conducting espionage on other countries' industries, though
|
|
wide-spread international use of Clipper/Skipjack would certainly enhance
|
|
our ability to do so.)
|
|
|
|
Be that as it may, France doesn't have a Bill of Rights to violate, which
|
|
it seems to me that restriction of cryptography in America would do on
|
|
several counts.
|
|
|
|
Mandated encryption standards would fly against the First Amendment,
|
|
which surely protects the manner of our speech as clearly as it protects the
|
|
content. Whole languages (most of them patois) have arisen on this planet
|
|
for the purpose of making the speaker unintelligible to authority. I know
|
|
of no instance where, even in the oppressive colonies where such languages
|
|
were formed, that the slave-owners banned their use.
|
|
|
|
Furthermore, the encryption software itself is written expression, upon
|
|
which no ban may be constitutionally imposed. (What, you might ask then,
|
|
about the constitutionality of restrictions on algorithm export. I'd say
|
|
they're being allowed only because no one ever got around to testing from
|
|
that angle.)
|
|
|
|
The First Amendment also protects freedom of association. On several
|
|
different occasions, most notably NAACP v. Alabama ex rel. Patterson and
|
|
Talley vs. California, the courts have ruled that requiring the disclosure
|
|
of either an organization's membership or the identity of an individual
|
|
could lead to reprisals, thereby suppressing both association and speech.
|
|
Certainly in a place like Cyberspace where everyone is so generally
|
|
"visible," no truly private "assembly" can take place without some
|
|
technical means of hiding the participants.
|
|
|
|
It also looks to me as if the forced imposition of a key escrow system
|
|
might violate the Fourth and Fifth Amendments.
|
|
|
|
The Fourth Amendment prohibits secret searches. Even with a warrant,
|
|
agents of the government must announce themselves before entering and
|
|
may not seize property without informing the owner. Wire-taps inhabit a
|
|
gray-ish area of the law in that they permit the secret "seizure" of an actual
|
|
conversation by those actively eavesdropping on it. The law does not permit
|
|
the subsequent secret seizure of a record of that conversation. Given the
|
|
nature of electronic communications, an encryption key opens not only the
|
|
phone line but the filing cabinet.
|
|
|
|
Finally, the Fifth Amendment protects individuals from being forced to
|
|
reveal self-incriminating evidence. While no court has ever ruled on the
|
|
matter vis a vis encryption keys, there seems something involuntarily
|
|
self-incriminating about being forced to give up your secrets in advance.
|
|
Which is, essentially, what mandatory key escrow would require you to do.
|
|
|
|
For all these protections, I keep thinking it would be nice to have a
|
|
constitution like the one just adopted by our largest possible enemy,
|
|
Russia. As I understand it, this document explicitly forbids governmental
|
|
restrictions on the use of cryptography.
|
|
|
|
For the moment, we have to take our comfort in the fact that our
|
|
government...or at least the parts of it that state their
|
|
intentions...avows both publicly and privately that it has no intention to
|
|
impose key escrow cryptography as a mandatory standard. It would be, to
|
|
use Podesta's mild word, "imprudent."
|
|
|
|
But it's not Podesta or anyone else in the current White House who worries
|
|
me. Despite their claims to the contrary, I'm not convinced they like
|
|
Clipper any better than I do. In fact, one of them...not Podesta...called
|
|
Clipper "our Bay of Pigs," referring to the ill-fated Cuban invasion cooked
|
|
up by the CIA under Eisenhower and executed (badly) by a reluctant
|
|
Kennedy Administration. The comparison may not be invidious.
|
|
|
|
It's the people I can't see who worry me. These are the people who actually
|
|
developed Clipper/Skipjack and its classified algorithm, the people who,
|
|
through export controls, have kept American cryptography largely to
|
|
themselves, the people who are establishing in secret what the public can
|
|
or cannot employ to protect its own secrets. They are invisible and silent
|
|
to all the citizens they purportedly serve save those who sit the
|
|
Congressional intelligence committees.
|
|
|
|
In secret, they are making for us what may be the most important choice
|
|
that has ever faced American democracy, that is, whether our descendants
|
|
will lead their private lives with unprecedented mobility and safety from
|
|
coercion, or whether every move they make, geographic, economic, or
|
|
amorous, will be visible to anyone who possesses whatever may then
|
|
constitute "lawful authority."
|
|
|
|
|
|
Who Are the Lawful Authorities?
|
|
|
|
Over a year ago, when I first fell down the rabbit hole into Cryptoland, I
|
|
wrote a Communications column called Decrypting the Puzzle Palace. In it, I
|
|
advanced what I then thought a slightly paranoid thesis, suggesting that
|
|
the NSA-guided embargoes on robust encryption software had been driven
|
|
not by their stated justification (keeping good cryptography out of the
|
|
possession of foreign military adversaries) but rather restricting its use
|
|
by domestic civilians.
|
|
|
|
In the course of writing that piece, I spoke to a number of officials,
|
|
including former CIA Director Stansfield Turner and former NSA Director
|
|
Bobby Ray Inman, who assured me that using a military organization to
|
|
shape domestic policy would be "injudicious" (as Turner put it), but no one
|
|
could think of any law or regulation that might specifically prohibit the NSA
|
|
from serving the goals of the Department of Justice.
|
|
|
|
But since then I've learned a lot about the hazy Post-Reagan/Bush lines
|
|
between law enforcement and intelligence. They started redrawing the map
|
|
of authority early in their administration with Executive Order 12333, issued
|
|
on December 4, 1981. (Federal Register #: 46 FR 59941)
|
|
|
|
This sweeping decree defines the duties and limitations of the various
|
|
intelligence organizations of the United States and contains the following
|
|
language:
|
|
|
|
1.4 The Intelligence Community. The agencies within the Intelligence
|
|
Community shall...conduct intelligence activities necessary for the...
|
|
protection of the national security of the United States, including:
|
|
...
|
|
(c) Collection of information concerning, and the conduct of activities to
|
|
protect against, intelligence activities directed against the United
|
|
States, international terrorist and international narcotics activities, and
|
|
other hostile activities directed against the United States by foreign
|
|
powers, organizations, persons, and their agents; (Italics Added)
|
|
|
|
|
|
Further, in Section 2.6, Assistance to Law Enforcement Authorities,
|
|
agencies within the Intelligence Community are
|
|
|
|
authorized to...participate in law enforcement activities to investigate or
|
|
prevent clandestine intelligence activities by foreign powers, or
|
|
international terrorist or narcotics activities.
|
|
|
|
In other words, the intelligence community was specifically charged with
|
|
investigative responsibility for international criminal activities in the
|
|
areas of drugs and terrorism.
|
|
|
|
Furthermore, within certain fairly loose guidelines, intelligence
|
|
organizations are "authorized to collect, retain or disseminate information
|
|
concerning United States persons" that may include "incidentally obtained
|
|
information that may indicate involvement in activities that may violate
|
|
federal, state, local or foreign laws."
|
|
|
|
Given that the NSA monitors a significant portion of all the electronic
|
|
communications between the United States and other countries, the
|
|
opportunities for "incidentally obtaining" information that might
|
|
incriminate Americans inside America are great.
|
|
|
|
Furthermore, over the course of the Reagan/Bush administration, the job of
|
|
fighting the War on Some Drugs gradually spread to every element of the
|
|
Executive Branch.
|
|
|
|
Even the Department of Energy is now involved. At an Intelligence
|
|
Community conference last winter I heard a proud speech from a DOE official
|
|
in which he talked about how some of the bomb-designing supercomputers
|
|
at Los Alamos had been turned to the peaceful purpose of sifting through
|
|
huge piles of openly available data...newspapers, courthouse records, etc....in
|
|
|
|
search of patterns that would expose drug users and traffickers. They are
|
|
selling their results to a variety of "lawful authorities," ranging from the
|
|
Southern Command of the U.S. Army to the Panamanian Defense Forces to
|
|
various County Sheriff's Departments.
|
|
|
|
"Fine," you might say, "Drug use is a epidemic that merits any cure." But I
|
|
would be surprised if there's anyone who will read this sentence who has
|
|
broken no laws whatever. And it's anybody's guess what evidence of other
|
|
unlawful activities might be "incidentally obtained" by such a wide net as
|
|
DOE is flinging.
|
|
|
|
The central focus that drugs and terrorism have assumed within the
|
|
intelligence agencies was underscored for me by a recent tour of the
|
|
central operations room at the CIA. There, in the nerve center of American
|
|
intelligence, were desks for Asia, Europe, North America, Africa and
|
|
"Middle East/Terrorism," and "South America/Narcotics." These bogeymen
|
|
are now the size of continents on the governmental map of peril.
|
|
|
|
Given this perception of its duties, the NSA's strict opposition to the
|
|
export of strong cryptographic engines, hard or soft, starts to make more
|
|
sense. They are not, as I'd feared, so clue-impaired as to think their
|
|
embargoes are denying any other nation access to good cryptography.
|
|
(According to an internal Department of Defense analysis of crypto policy,
|
|
it recently took 3 minutes and 14 seconds to locate a source code version
|
|
of DES on the Internet.)
|
|
|
|
Nor do they really believe these policies are enhancing national security
|
|
in the traditional, military sense of the word, where the U.S. is, in any
|
|
case, already absurdly over-matched to any national adversary, as was
|
|
proven during the Gulf War.
|
|
|
|
It's the enemies they can't bomb who have them worried, and they are
|
|
certainly correct in thinking that the communications of drug traffickers
|
|
and whatever few terrorists as may actually exist are more open to their
|
|
perusal than would be the case in a world where even your grandmother's
|
|
phone conversations were encrypted.
|
|
|
|
And Clipper or no Clipper, such a world would be closer at hand if
|
|
manufacturers hadn't known than any device that embodies good encryption
|
|
would not be fit for export.
|
|
|
|
But with Clipper/Skipjack, there is a lot that the combined forces of
|
|
government will be able to do to monitor all aspects of your behavior
|
|
without getting a warrant. Between the monitoring capacities of the NSA,
|
|
the great data-sieves of the Department of Energy, and the fact that, in
|
|
use, each chip would continually broadcast the whereabouts of its owner,
|
|
the government would soon be able to isolate just about every perpetrator
|
|
among us.
|
|
|
|
I assume you're neither a drug-user nor a terrorist, but are you ready for
|
|
this? Is your nose that clean? Can it be prudent to give the government
|
|
this kind of corrupting power?
|
|
|
|
I don't think so, but this is what will happen if we continue to allow the
|
|
secret elements of government to shape domestic policy as though the only
|
|
American goals that mattered were stopping terrorism (which seems pretty
|
|
well stopped already) and winning the War on Some Drugs (which no
|
|
amount of force will ever completely win).
|
|
|
|
Unfortunately, we are not able to discuss priorities with the people who
|
|
are setting them, nor do they seem particularly amenable to any form of
|
|
authority. In a recent discussion with a White House official, I asked for
|
|
his help in getting the NSA to come out of its bunker and engage in direct
|
|
and open discussions about crypto embargoes, key escrow, the Skipjack
|
|
algorithm, and the other matters of public interest.
|
|
|
|
"I'll see what we can do," he said.
|
|
|
|
"But you guys are the government," I protested. "Surely they'll do as you
|
|
tell them."
|
|
|
|
"I'll see what we can do," he repeated, offering little optimism.
|
|
|
|
That was months ago. In the meantime, the NSA has not only remained
|
|
utterly unforthcoming in public discussions of crypto policy, they have
|
|
unlawfully refused to comply with any Freedom of Information Act requests
|
|
for documents in this area.
|
|
|
|
It is time for the public to reassert control over their own government. It
|
|
is time to demand that public policy be made in public by officials with
|
|
names, faces, and personal accountability.
|
|
|
|
When and if we are able to actually discuss crypto policy with the people
|
|
who are setting it, I have a list of objectives that I hope many of you
|
|
will share. There are as follows:
|
|
|
|
1. There should no law restricting any use of cryptography by private
|
|
citizens.
|
|
|
|
2. There should be no restriction on the export of cryptographic
|
|
algorithms or any other instruments of cryptography.
|
|
|
|
3. Secret agencies should not be allowed to drive public policies.
|
|
|
|
4. The taxpayer's investment in encryption technology and related
|
|
mathematical research should be made available for public and scientific
|
|
use.
|
|
5. The government should encourage the deployment of wide-spread
|
|
encryption.
|
|
|
|
6. While key escrow systems may have purposes, none should be
|
|
implemented that places the keys in the hands of government.
|
|
|
|
7. Any encryption standard to be implemented by the government should
|
|
developed in an open and public fashion and should not employ a secret
|
|
algorithm.
|
|
|
|
And last, or perhaps, first...
|
|
|
|
8. There should be no broadening of governmental access to private
|
|
communications and records unless there is a public consensus that the
|
|
risks to safety outweigh the risks to liberty and will be effectively
|
|
addressed by these means.
|
|
|
|
If you support these principles, or even if you don't, I hope you will
|
|
participate in making this a public process. And there are a number of
|
|
actions you can take in that regard.
|
|
|
|
The National Institute of Standards and Technology (NIST) has issued a
|
|
request for public comments on its proposal to establish the "Skipjack"
|
|
key-escrow system as a Federal Information Processing Standard. You've
|
|
got until September 28 to tell them what you think of that. Comments on the
|
|
NIST proposal should be sent to:
|
|
|
|
Director, Computer Systems Laboratory
|
|
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
|
Technology Building, Room B-154
|
|
National Institute of Standards and Technology
|
|
Gaithersburg, MD 20899
|
|
|
|
If you belong to or work for an organization, you can encourage that
|
|
organization to join the Digital Privacy Working Group. To do so they
|
|
should contact EFF's Washington office at:
|
|
|
|
Electronic Frontier Foundation
|
|
1001 G Street, NW
|
|
Suite 950 East
|
|
Washington, DC 20001
|
|
202/347-5400
|
|
Fax 202/393-5509
|
|
eff@eff.org
|
|
|
|
I also encourage individuals interested in these issues to either join EFF,
|
|
Computer Professionals for Social Responsibility, or one of the related
|
|
local organizations which have sprung up around the country. For the
|
|
addresses of a group in your area, contact EFF.
|
|
|
|
|
|
New York City, New York
|
|
Monday, September 6, 1993
|
|
|
|
|
|
***************************
|
|
Crypto Conference in Austin
|
|
***************************
|
|
|
|
EFF / EFF-Austin Cryptography Conference
|
|
September 22, 1993 - Ramada Inn North, Austin
|
|
9220 N. IH-35 at Rundberg
|
|
|
|
Introductory Remarks: 1 to 1:30 p.m.
|
|
Steve Jackson - Welcome.
|
|
Bruce Sterling - Keynote Address.
|
|
|
|
Panel #1: 1:45 to 3:00. POLICY.
|
|
Mitch Kapor
|
|
Jerry Berman
|
|
Dave Farber
|
|
|
|
Panel #2: 3:15 to 4:30. LAW ENFORCEMENT.
|
|
Esther Dyson
|
|
Mike Godwin
|
|
FBI Representative (invited but not confirmed)
|
|
(Possibly others tba)
|
|
|
|
Panel #3: 4:45 to 6:00. CYPHERPUNKS.
|
|
John Perry Barlow
|
|
Eric Hughes
|
|
John Gilmore
|
|
(Possibly others tba)
|
|
|
|
Dinner Break: 6 to 8 p.m. Everyone is on their own. The hotel
|
|
restaurant will offer a buffet, or you can order from the
|
|
menu, or there is other good dining nearby.
|
|
|
|
Reception: 8-10 p.m. - cash bar, everyone is invited.
|
|
|
|
|
|
*****************************
|
|
Virginians Against Censorship
|
|
*****************************
|
|
|
|
P.O. BOX 64608 - VIRGINIA BEACH, VA 23467 (804) 499-3303
|
|
|
|
In a revolution as significant as that of the printing press, computers are
|
|
changing the way we communicate and store knowledge. Gutenberg's
|
|
invention led to our Constitutional protection of Freedom of the Press. Will
|
|
this protection be extended to speech in the form of electrons?
|
|
|
|
In order to give citizens an opportunity to examine the issues, Virginians
|
|
Against Censorship will hold a free informational program, The First
|
|
Amendment in Cyberspace, on Thursday, September 30, 1993, at 7:00pm in
|
|
meeting room B of the Virginia Beach Central Library, 4100 Virginia Beach
|
|
Blvd.
|
|
|
|
Everyone is invited to hear Shari Steele, Director of Legal Services for
|
|
the Electronic Frontier Foundation describe threats to civil liberties in
|
|
cyberspace: seizure of a publishing company's computers because an
|
|
employee was suspected of hacking; seizure and erasure of email messages
|
|
from and to people who were suspected of nothing at all; arrest and trial
|
|
of a teenage electronic magazine publisher because information in an
|
|
article had originally been hacked; refusal of the government to permit
|
|
development of encryption software that would allow individual citizens to
|
|
protect their privacy. Law enforcement excesses don't mean there's no need
|
|
for law on the electronic frontier, but that law must be created and
|
|
monitored by informed citizens.
|
|
|
|
To register for this program, call 804/431-3071 between 9:00am and
|
|
5:00pm.
|
|
For more information, call Carolyn Caywood at 804/460-7518.
|
|
Internet: ccaywood@wyvern.wyvern.com
|
|
|
|
|
|
=============================================================
|
|
|
|
EFFector Online is published biweekly by:
|
|
|
|
Electronic Frontier Foundation
|
|
1001 G Street, N.W., Suite 950 East
|
|
Washington, DC 20001 USA
|
|
Phone: +1 202 347 5400 FAX: +1 202 393 5509
|
|
Internet Address: eff@eff.org
|
|
|
|
Coordination, production and shipping by Shari Steele,
|
|
Director of Legal Services & Community Outreach (ssteele@eff.org)
|
|
|
|
Reproduction of this publication in electronic media is encouraged. Signed
|
|
articles do not necessarily represent the view of the EFF. To reproduce
|
|
signed articles individually, please contact the authors for their express
|
|
permission.
|
|
|
|
*This newsletter is printed on 100% recycled electrons.*
|
|
=============================================================
|
|
|
|
MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
|
|
|
|
In order to continue the work already begun and to expand our efforts and
|
|
activities into other realms of the electronic frontier, we need the
|
|
financial support of individuals and organizations.
|
|
|
|
If you support our goals and our work, you can show that support by
|
|
becoming a member now. Members receive our bi-weekly electronic
|
|
newsletter, EFFector Online (if you have an electronic address that can be
|
|
reached through the Net), and special releases and other notices on our
|
|
activities. But because we believe that support should be freely given, you
|
|
can receive these things even if you do not elect to become a member.
|
|
|
|
Your membership/donation is fully tax deductible.
|
|
|
|
Our memberships are $20.00 per year for students and $40.00 per year for
|
|
regular members. You may, of course, donate more if you wish.
|
|
|
|
=============================================================
|
|
Mail to:
|
|
Membership Coordinator
|
|
Electronic Frontier Foundation
|
|
1001 G Street, N.W.
|
|
Suite 950 East
|
|
Washington, DC 20001 USA
|
|
|
|
Membership rates:
|
|
$20.00 (student or low income membership)
|
|
$40.00 (regular membership)
|
|
|
|
|
|
[ ] I wish to become a member of the EFF. I enclose: $_______
|
|
[ ] I wish to renew my membership in the EFF. I enclose: $_______
|
|
[ ] I enclose an additional donation of $_______
|
|
|
|
Name:
|
|
|
|
Organization:
|
|
|
|
Address:
|
|
|
|
City or Town:
|
|
|
|
State: Zip: Phone: ( ) (optional)
|
|
|
|
FAX: ( ) (optional)
|
|
|
|
E-mail address:
|
|
|
|
I enclose a check [ ].
|
|
Please charge my membership in the amount of $
|
|
to my Mastercard [ ] Visa [ ] American Express [ ]
|
|
|
|
Number:
|
|
|
|
Expiration date:
|
|
|
|
Signature: ______________________________________________
|
|
|
|
Date:
|
|
|
|
I hereby grant permission to the EFF to share my name with
|
|
other nonprofit groups from time to time as it deems
|
|
appropriate. Initials:______________________
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|