From: tcmay@netcom.com (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: a31566057eb62355a07186948da6db6854faf34b5d2f6ba5aaad0ceb734167e8
Message ID: <9212121749.AA20077@netcom2.netcom.com>
Reply To: N/A
UTC Datetime: 1992-12-12 17:50:58 UTC
Raw Date: Sat, 12 Dec 92 09:50:58 PST
From: tcmay@netcom.com (Timothy C. May)
Date: Sat, 12 Dec 92 09:50:58 PST
To: cypherpunks@toad.com
Subject: (fwd) EFFector Online 4.00
Message-ID: <9212121749.AA20077@netcom2.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
Organization: Netcom - Online Communication Services (408 241-9760 guest)
Cypherpunks,
Here's the latest EFFector Online, which happens to have stuff about two of
us, John Gilmore and me, and which mentions Tom Jennings! No
mention of our little group, yet, but I expect we can't hide for long.
--Tim May
From: rita@eff.org (Rita Marie Rouvalis)
Subject: EFFector Online 4.00
Followup-To: comp.org.eff.talk
Originator: rita@eff.org
Keywords: crypto, nsa, pioneer wards
Organization: Electronic Frontier Foundation
Date: Fri, 11 Dec 1992 20:00:04 GMT
########## ########## ########## |
########## ########## ########## | GILMORE VS. THE NSA
#### #### #### |
######## ######## ######## |
######## ######## ######## | THE CRYPTO ANARCHIST MANIFESTO
#### #### #### |
########## #### #### | 2nd PIONEER AWARDS DEADLINE LOOMS
########## #### #### |
=====================================================================
EFFector Online December 11, 1992 Issue 4.00
A Publication of the Electronic Frontier Foundation
ISSN 1062-9424
=====================================================================
ACCESSING THE NSA
JOHN GILMORE FILES SUIT WITH THE NATIONAL SECURITY AGENCY
At the beginning of July 1992, John Gilmore filed a FOIA request
with NSA asking for access to parts of cryptologic treatises
written by NSA personnel: Military Cryptanalysis, Parts III
and IV, by William Friedman (WF-3/4); and Military
Cryptanalytics, Parts III-VI, by William Friedman and
Lambros Callimahos (LC3-6).
Parts I and II of each of these treatises had already been
declassified and published. At the time of the request, it
was not definitely known whether the parts requested by
Gilmore had been re-classified.
Under the FOIA, agencies are required to communicate
responses to requesters within statutorily prescribed time
periods. Failure to comply with the time limits for response
constitutes a denial of the request, giving the requester the
right to appeal.
When NSA violated the first applicable time period,
Gilmore filed an administrative appeal with the NSA's FOIA
appeals authority. There is also a time limit for response
to such appeals. After this time limit passed without a
response from the NSA's appeals authority, Gilmore filed
a complaint in federal court in the Northern District of
California on Sept. 4, 1992, as permitted by the FOIA.
Gilmore's complaint alleged three claims: First, that the
NSA improperly withheld these documents from him, and
had no legal basis for withholding; second, that the NSA's
failure to comply with the FOIA time limits constituted a
form of improper withholding; and third, that the NSA in
general engages in an illegal pattern or practice of routinely
violating the FOIA time limits, which should be declared
illegal and enjoined.
In the period between the initial FOIA request to NSA, and
the filing of the complaint in federal court, Gilmore obtained
copies of two of the withheld documents: Military
Cryptanalysis Parts III and IV, by Friedman. These copies
were discovered in libraries accessible to the general
public and were provided by these libraries without any
kind of restriction. Gilmore intended to get expert opinion
on the national security risk posed by disclosure of these
documents. He also reasoned that their very availability
in such libraries demonstrated that there could be no legal
basis for withholding them from a FOIA requester.
At the time the documents were obtained, Gilmore had not
received any indication from NSA that the documents were
classified. It was therefore possible that the documents
were not, in fact, classified. In addition, FOIA requests for
documents generally trigger agency declassification review.
Thus, even if the documents were in fact classified at the
time of the request, it was possible that NSA would decide
that they should no longer be classified, and release them
to Gilmore.
After the complaint was filed, Gilmore not only served the
complaint upon NSA, he also served a number of discovery
requests upon NSA, seeking to discover information about
both the history of these documents and about NSA's FOIA
processing procedures.
In early October, after NSA had received the complaint and
the discovery requests, NSA finally sent its responses to
the FOIA request. NSA informed Gilmore that the documents
were not going to be released to him. NSA said that it had
located WF-3/4 and LC-3, but that LC-4/5/6 had never been
completed because of the death of Lambros Callimahos.
First, NSA asserted that the three documents which did
exist were classified. WF-3/4 were classified CONFIDENTIAL,
the lowest level of classification under Executive Order
12,356 governing classified information. LC-3 was
classified SECRET, the middle level of classification.
Under the FOIA, an agency may withhold documents if they
are properly classified for reasons of national security.
Second, NSA asserted that the documents could also be
withheld under a different exemption in the FOIA. Under the
(b)(3) exemption, documents may be withheld if there exists
a statute which authorizes an agency to withhold them. NSA
pointed to several statutes which arguably covered this
material. One of these statutes, 18 U.S.C. Section 798,
makes it a federal crime knowingly to disclose classified
cryptologic or communications intelligence information to
unauthorized persons.
At this point, it became clear to Gilmore that there was a
problem. He now knew for a fact that the documents he had
were classified (WF-3/4) and that it would be a crime for
him to disseminate them. He could no longer continue with
his plan of showing them to other persons for fear of
criminal prosecution. He also feared that should NSA ever
discover that he possessed them, he would be subjected to
search and seizure and the copies confiscated. (Note that
although the First Amendment Privacy Protection Act
generally protects the press against search and seizure
for materials intended for publication where the crime
involves mere possession or dissemination of information,
it does not apply to any materials covered by the espionage
statutes, of which 18 U.S.C. Section 798 is one.)
NSA did not, however, know that he had them. Gilmore
decided that the best course of action was to submit copies
of WF-3/4 to the federal district court under seal. By so
doing, he would ensure that at least these copies would be
kept out of the NSA's hands, since it was unlikely that a federal
judge would relinquish possession of documents material to
pending litigation. Thus, on November 12, Gilmore made an
ex parte application to file these documents under seal with
Judge Thelton Henderson, the federal judge hearing his case.
Gilmore also concurrently filed a motion for leave to amend
his original complaint in order to address the constitutional
and other issues arising from his possession of the documents
and the criminality of disseminating documents found in
libraries open to the general public.
It is important to realize that the criminal statute at issue
here does not recognize improper classification as a defense.
Under existing law, the government need only show that the
documents were classified by the government, and that they
are cryptologic- or communications-intelligence-related. It
remains unclear precisely what the specific requirement
under the statute is, i.e., whether "knowingly" means actual
knowledge of classification, or merely some reason to know.
(That same day, NSA filed two motions of its own:
a motion for a protective order blocking Gilmore's discovery
requests, and a motion for summary judgment asking the
court to dispose of the case on the ground that NSA was
entitled to judgment as a matter of law. In support of its
summary judgment motion, NSA filed a sworn declaration
by Michael Smith, Chief of Policy, explaining why the
documents should be withheld, and why NSA's FOIA
processing procedures were not illegal.)
NSA was served with papers indicating that WF-3/4 had been
received by the district court. This was the first time that
NSA knew that Gilmore possessed the documents. They
reacted strongly. John Martin, the Justice Department lawyer
representing NSA, asked that Gilmore surrender his copies to
NSA, saying that NSA was very upset and might send its own
agents or FBI agents to get the copies from Gilmore. He also
wanted to know where Gilmore got them. Martin also suggested
that Gilmore might be criminally liable under the espionage
statutes relating to possession of national defense information.
NSA regained its composure the next day, realizing that it
did not know exactly what Gilmore had. Although NSA had
been served with papers indicating what Gilmore had done,
Gilmore had not sent them copies of the documents. Thus
they could not know for sure whether the documents he had
were the ones they considered classified. Gilmore agreed to
send copies of his copies to NSA for their review, after
which NSA would decide what to do.
During this period, tension was high. Gilmore considered
filing an ex parte motion for a temporary restraining order
against NSA and the U.S. Attorney General to prevent them
from both moving against him personally and against any
copies of the documents presently on library shelves. This
motion was drafted but never filed.
On the day before Thanksgiving, NSA announced that WF-3/4
would be declassified, and effectively renounced any claim
that it could withhold them from the public. NSA gave no
official reason for its action.
NSA is currently reviewing the third document, LC-3, to
see how much of it can be released now that WF-3/4 have
been declassified. (NSA had asserted in its summary judgment
papers that LC-3 was based on WF-3/4.) NSA's review is to
be completed by January 15, 1993, at which time it will
release an edited version of LC-3 to Gilmore.
It is anticipated that this edited version of LC-3 will be
analyzed by Gilmore and his experts, and that Gilmore and
NSA will engage in settlement negotiations to determine
whether NSA has satisfied Gilmore's request. The
settlement discussions will also include Gilmore's claims
regarding NSA's FOIA processing procedures.
The parties have stipulated that if no settlement is reached
the litigation will proceed. A status conference has been
set for February 9. NSA will, if necessary, file an amended
motion for summary judgment by February 12. Following
opposition and reply briefs, the hearing on all motions will
take place on March 22.
[John Gilmore is a member of the EFF Board of Directors. He can
reached as gnu@cygnus.com. Gilmore's lawyer, Lee Tien, can
be reached as tien@toad.com.]
-==--==--==-<>-==--==--==-
THE CRYPTO ANARCHIST MANIFESTO
by
Timothy C. May
(tcmay@netcom.com)
A specter is haunting the modern world, the specter of crypto
anarchy.
Computer technology is on the verge of providing the ability for
individuals and groups to communicate and interact with each other
in a totally anonymous manner. Two persons may exchange
messages, conduct business, and negotiate electronic contracts
without ever knowing the True Name, or legal identity, of the other.
Interactions over networks will be untraceable, via extensive re-
routing of encrypted packets and tamper-proof boxes which
implement cryptographic protocols with nearly perfect assurance
against any tampering. Reputations will be of central importance, far
more important in dealings than even the credit ratings of today.
These developments will alter completely the nature of government
regulation, the ability to tax and control economic interactions, the
ability to keep information secret, and will even alter the nature of
trust and reputation.
The technology for this revolution--and it surely will be both a social
and economic revolution--has existed in theory for the past decade.
The methods are based upon public-key encryption, zero-knowledge
interactive proof systems, and various software protocols for
interaction, authentication, and verification. The focus has until now
been on academic conferences in Europe and the U.S., conferences
monitored closely by the National Security Agency. But only recently
have computer networks and personal computers attained sufficient
speed to make the ideas practically realizable. And the next ten
years will bring enough additional speed to make the ideas
economically feasible and essentially unstoppable. High-speed
networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band
transmitters, multi-MIPS personal computers, and encryption chips
now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this
technology, citing national security concerns, use of the technology
by drug dealers and tax evaders, and fears of societal disintegration.
Many of these concerns will be valid; crypto anarchy will allow
national secrets to be traded freely and will allow illicit and stolen
materials to be traded. An anonymous computerized market will
even make possible abhorrent markets for assassinations and
extortion. Various criminal and foreign elements will be active users
of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of
medieval guilds and the social power structure, so too will
cryptologic methods fundamentally alter the nature of corporations
and of government interference in economic transactions. Combined
with emerging information markets, crypto anarchy will create a
liquid market for any and all material which can be put into words
and pictures. And just as a seemingly minor invention like barbed
wire made possible the fencing-off of vast ranches and farms, thus
altering forever the concepts of land and property rights in the
frontier West, so too will the seemingly minor discovery out of an
arcane branch of mathematics come to be the wire clippers which
dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!
-==--==--==-<>-==--==--==-
Date: Wed, 02 Dec 92 21:31:47 -0800
From: haynes@cats.UCSC.EDU (Jim Haynes)
Newsgroups: comp.dcom.telecom
Subject: Historical Note on Telecom Privacy
Apropos of all the talk on FBI wiretapping, cellular eavesdropping,
etc., I found this passage in "Old Wires and New Waves"; Alvin F.
Harlow; 1936. He's writing about unscrupulous telegraph operators in
the early days. They would use information in telegrams for personal
gain, or delay messages or news for personal gain, or sell news
reports to non-subscribers of the press association.
"Pennsylvania passed a law in 1851, making telegrams secret,
to prevent betrayal of private affairs by operators. When,
therefore, an operator was called into court in Philadelphia
a little later, and ordered to produce certain telegrams which
would prove an act of fraud, he refused to do so, saying that
the state law forbade it. The circuit court, shocked at this
development, proceeded to override the law, saying:
It must be apparent that, if we adopt this construction
of the law, the telegraph may be used with the most
absolute security for purposes destructive to the
well-being of society - a state of things rendering
its absolute usefulness at least questionable. The
correspondence of the traitor, the murderer, the robber
and the swindler, by means of which their crimes and
frauds could be the more readily accomplished and
their detection and punishment avoided, would become
things so sacred that they never could be accessible to
the public justice, however deep might be the public interest
involved in their production.
The judge therefore ordered the operator to produce the telegrams."
-==--==--==-<>-==--==--==-
THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
CALL FOR NOMINATIONS
Deadline: December 31,1992
In every field of human endeavor,there are those dedicated to expanding
knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this,the Electronic Frontier
Foundation has established the Pioneer Awards for deserving individuals
and organizations.
The Pioneer Awards are international and nominations are open to all.
In March of 1992, the first EFF Pioneer Awards were given in Washington
D.C. The winners were: Douglas C. Engelbart of Fremont, California;
Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom
Jennings of San Francisco, California; and Andrzej Smereczynski of
Warsaw, Poland.
The Second Annual Pioneer Awards will be given in San Francisco,
California at the 3rd Conference on Computers, Freedom, and Privacy
in March of 1993.
All valid nominations will be reviewed by a panel of impartial judges
chosen for their knowledge of computer-based communications and the
technical, legal, and social issues involved in networking.
There are no specific categories for the Pioneer Awards, but the
following guidelines apply:
1) The nominees must have made a substantial contribution to the
health, growth, accessibility, or freedom of computer-based
communications.
2) The contribution may be technical, social, economic or cultural.
3) Nominations may be of individuals, systems, or organizations in
the private or public sectors.
4) Nominations are open to all, and you may nominate more than one
recipient. You may nominate yourself or your organization.
5) All nominations, to be valid, must contain your reasons, however
brief, on why you are nominating the individual or organization,
along with a means of contacting the nominee, and your own contact
number. No anonymous nominations will be allowed.
6) Every person or organization, with the single exception of EFF
staff members, are eligible for Pioneer Awards.
7) Persons or representatives of organizations receiving a Pioneer
Award will be invited to attend the ceremony at the Foundation's
expense.
You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to
pioneer@eff.org
You may mail them to us at:
Pioneer Awards, EFF,
155 Second Street
Cambridge MA 02141.
You may FAX them to us at:
+1 617 864 0866
Just tell us the name of the nominee, the phone number or email address
at which the nominee can be reached, and, most important, why you feel
the nominee deserves the award. You may attach supporting
documentation. Please include your own name, address, and phone number.
We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,
The Electronic Frontier Foundation
-------EFF Pioneer Awards Nomination Form------
Please return to the Electronic Frontier Foundation
via email to: pioneer@eff.org
via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;
via FAX to +1 617 864 0866
Nominee:
Title:
Company/Organization:
Contact number or email address:
Reason for nomination:
Your name and contact information:
Extra documentation attached:
DEADLINE: ALL NOMINATIONS MUST BE RECEIVE BY THE ELECTRONIC FRONTIER
FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., DECEMBER 31,1992.
-==--==--==-<>-==--==--==-
MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities. But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.
Our memberships are $20.00 per year for students, $40.00 per year for
regular members. You may, of course, donate more if you wish.
Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list. We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.
---------------- EFF MEMBERSHIP FORM ---------------
Mail to: The Electronic Frontier Foundation, Inc.
155 Second St. #40
Cambridge, MA 02141
I wish to become a member of the EFF I enclose:$__________
$20.00 (student or low income membership)
$40.00 (regular membership)
$100.00(Corporate or company membership.
This allows any organization to
become a member of EFF. It allows
such an organization, if it wishes
to designate up to five individuals
within the organization as members.)
I enclose an additional donation of $
Name:
Organization:
Address:
City or Town:
State: Zip: Phone:( ) (optional)
FAX:( ) (optional)
Email address:
I enclose a check [ ] .
Please charge my membership in the amount of $
to my Mastercard [ ] Visa [ ] American Express [ ]
Number:
Expiration date:
Signature:
Date:
I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate [ ] .
Initials:
Your membership/donation is fully tax deductible.
=====================================================================
EFFector Online is published by
The Electronic Frontier Foundation
155 Second Street, Cambridge MA 02141
Phone: +1 617 864 0665 FAX: +1 617 864 0866
Internet Address: eff@eff.org
Reproduction of this publication in electronic media is encouraged.
Signed articles do not necessarily represent the view of the EFF.
To reproduce signed articles individually, please contact the authors
for their express permission.
=====================================================================
This newsletter is printed on 100% recycled electrons.
--
Rita Rouvalis Electronic Frontier Foundation
rita@eff.org eff@eff.org
CIS:70007,5621 (617)864-0665
--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^756839 | PGP Public Key: by arrangement.
Return to December 1992
Return to “tcmay@netcom.com (Timothy C. May)”
1992-12-12 (Sat, 12 Dec 92 09:50:58 PST) - (fwd) EFFector Online 4.00 - tcmay@netcom.com (Timothy C. May)