From: Matt Thomlinson <phantom@u.washington.edu>
To: cypherpunks@toad.com
Message Hash: 8d2f458743c0447da6138ead4bbe80d1ad67fc57c9ed7a4092a1d4656899f382
Message ID: <Pine.3.89.9403270327.A7890-0100000@stein1.u.washington.edu>
Reply To: N/A
UTC Datetime: 1994-03-27 10:04:16 UTC
Raw Date: Sun, 27 Mar 94 02:04:16 PST
From: Matt Thomlinson <phantom@u.washington.edu>
Date: Sun, 27 Mar 94 02:04:16 PST
To: cypherpunks@toad.com
Subject: NewMedia article, April 1994
Message-ID: <Pine.3.89.9403270327.A7890-0100000@stein1.u.washington.edu>
MIME-Version: 1.0
Content-Type: text/plain
Just got this in the mail, and flipping through it I saw a decent article
(with quotes from our own prolific Tim May!). Any mistakes are probably
OCR errors -- it's 3am and time to go to bed. _You_ proof it!
Privacy in the Digital Age
by Curtis Lang
NewMedia, April 1994
Welcome to the digital frontier, where network by network, metaphor by
metaphor, a splendid, global, multimedia palace is being built through
trial and error. You won't need to take a long and winding road to this
frontier, though, it's coming soon to your home. You'll know it has arrived
when you can read messages on your telephone, have a dialogue with your
television and watch beautiful movies on your PC.
AT&T has already established a giant encampment on this digital frontier,
and it is now concentrating on building a virtual community. In
advertisements, the company paints seductive pictures of fully wired--and
wireless--consumers interacting in the cyberspace equivalent of
Hemingway's dean, well-lighted place. A happy couple in a jumbo kitchen
uses a computerized telephone to take and receive electronic messages and
make reservations for the ball game. A nomadic businessman in an airport
shuttle bus tells his PDA how much he's willing to spend on a used car for
his son, what makes he prefers and the maximum acceptable mileage. He
sends his PDA on a shopping trip around the region with a single touch. It
all sounds thrilling--empowering for consumers and businesses alike. But
in the 21st-century world of interactive television, broadband Internet
access and ubiquitous multipurpose communications gizmos, every
message you send and each dollar you spend could be an unbidden
messenger as well. Electronic traces of your passage will remain in data
banks of cable, telephone and on-line service providers. And the
government wants to install a trap door in software and hardware used to
encrypt messages and data from medical smart cards, IRS records, digital
cash transfers and plain old e-mail. These databases will be digital gold in
the world of direct marketing, where vendors and advertisers will tailor
special offers to individuals based upon this information and deliver
coupons that will issue from your smart cable TV set-top box What's to
prevent unscrupulous third parties--or underpaid government workers with
access to the software trap door--from obtaining information that could be
used to harm consumers? Not much, judging from stories like that of
black-data buccaneer Al Schweitzer, who bought and sold confidential
government files for a living (see "Penetrating Uncle Sam's Data," page
68). Unless government agencies, infrastructure suppliers, software
wizards and producers of programming can guarantee privacy in the
rapidly expanding web of cyberspace, it may be impossible for the trust
upon which a virtual community depends to develop sufficiently to make
the grand digital experiment a success. Without this assurance there will
be no secure business communications, and the kind of transactional data
that is currently gathered by insurance firms, credit companies and banks
might fall into the hands of anyone with the skills to track it across the
global network Security of transactions over cable networks is already a
concern to American consumers, according to surveys by Viacom Cable
and others. And the lack of secure transaction methods may already be
hampering buying and selling via modem. Consumer's unwillingness to
put it on their Visa when traveling in cyberspace has slowed public
acceptance of such services as American Airlines' Easy Sabre ticket
service, available on Prodigy, America Online and other on-line services.
Consumers, like businesses, are eager to take advantage of the digital
highway, but they are leery of financial data and other sensitive
information falling into the wrong hands.
ENCRYPTION MAY BE THE KEY
When you make a phone call or send a letter, you can be fairly certain that
the contents of your communications will remain private. Such trust
makes our postal and phone systems possible. AT&T hopes to give
customers that same sense of security about wireless communications. It is
the first company to implement General Magic's new Telescript
communications software in its PersonaLink Services, which will be the
foundation for AT&T's multimedia web of services that include smart
messaging, electronic shopping and custom news delivery. "Telescript. .is
a technology which creates something called agent-based
communication," explained Marc Porat, chairman and CEO of General
Magic, at a winter conference on electronic consumer appliances in New
York Such software agents will be able to travel throughout wired and
wireless networks searching for information, like-minded individuals or
bargain prices on PCs. Agents will act as your virtual doorman, your
e-mail bozo filter, tossing mail on subjects you nix into the trash. "General
Magic is a really good idea," contends Jerry Michalski of the industry
newsletter, Release l.a "You can create a little agent that .[will] go out
there and look for things for you. Let's say you're a stamp collector--it can
look for a particular kind of stamp, or a bubble-gum card or whatever, and
maybe even buy the thing for you automatically. Now, gosh, you're
putting that up on AT&T's network. They could find out within very small
fractions of activity what you're doing, what your preferences are, what
kind of agents you've decided to broadcast into the world. So you're only
going to do that if you have some kind of confidence that they're not
going to misuse that information." To that end, AT&T and General Magic
intend to set up "trusted spaces," secure virtual meeting rooms where your
agent can meet with another agent, representing a vendor or an individual,
and communicate, shop, cut deals or consummate business transactions
free from prying software. But what about the security of these networks?
And how will you know the identity of the entity lurking behind the vir-
tual agent that your virtual agent is schmoozing up in supposedly secure
cyberspace? "Most wireless communications systems are security
nightmares," says Jim Bidzos, president of RSA Data Security Inc., a
giant in the global cryptography business. "They have no real encryption,
no authentication.... General Magic realized that for a lot of people,
wireless services of any kind simply can't be trusted. So they built RSA
encryption and authentication services right into the foundation of
Telescript and Magic Cap [the interface for General Magic's PDA]."
A DIFFERENT VIEW
Advocates of civil liberties such as the cypherpunks, the grassroots
encryption experts who have developed widely distributed personal
encryption shareware for e-mail, worry that even in such a
security-conscious system, the government will find a way to snoop. They
see alternatives to AT&T's vision of tomorrow. "The issue of digital
money is going to be key," argues Tim May, "so that people can buy
access codes." May, formerly a physicist with Intel and one of the most
visible cypherpunks, envisions a future in which digital cash is used for
most transactions. In such a system encryption schemes would be floating
through the computer community that could make most financial
transactions virtually untraceable. "Imagine a satellite dish on your roof,"
he continues. "You decide to buy an X-rated movie, and you don't want
records kept of that on your monthly bill. [There will be] mechanisms by
which you can buy 'coupons' that are usable on a one-time basis to decrypt
a packet, and the vendor of the service--say, the seller of the X-rated
movie--has no idea that you, in particular, are decrypting his packet. I
think that'll be essential."
DO YOU TRUST UNCLE SAM?
After months of review, during which a torrent of digital complaints
flooded the White House from multinational corporations, the Software
Publishers Association, cypherpunks and civil libertarians, President
Clinton announced that he wants the National Security Agency (NSA) to
implement secret standards for encryption to be used in computerized
communications systems to facilitate e-mail surveillance. The
Computer Security Act of 1987 mandated that the National Institute of
Standards and Technology (NIST), a civilian agency, develop appropriate
standards for digital communications networks. At the time it was clear
that there would be a need for digital envelopes (cryptography), digital
signatures and other technologies to provide security and enable legally
enforceable digital transactions on the Internet, and eventually across
fiber-optic cables and wireless systems connected to telephones,
computers, TVs and PDAs. However, during the Bush administration, a
series of executive orders placed authority for developing those standards
in the hands of the NSA, America's largest and most secretive spy
organization, which has a checkered history that includes large-scale
illegal surveillance of Americans. Thus it was no surprise that the agency's
proposal to provide digital encryption systems focused on easy wiretap
surveillance rather than privacy, security and other civilian needs. The
NSA produced a 64-bit encryption algorithm, classified "Secret" and
called Skipjack The NSA declined to make the algorithm public,
prompting concern that, given the NSA's track record, there might be a
"trap door" in Skipjack that would allow secret surveillance of all
Skpjack-encoded messages. In April 1993, the White House outlined
plans for a microcircuit called the Clipper chip, which would scramble
telephone conversations. Each chip, encoded with Skipjack, would
generate an encryption session key, a chip unique key and a chip family
key, all of which are sent to the receiver. The White House asks users to
register their chip unique key with the government, which will then split
each key into two parts and "escrow" the parts with two different
agencies, so that law enforcement agencies can unscramble suspects'
messages.
SURVEILLANCE ON THE UPSWING
The White House claims that the system would be used by government
officials with legal authorization to conduct wiretaps and thus represents
no intensification of government surveillance. But in NIST's letter inviting
five hand-picked cryptography experts to do a quick survey of Skipjack,
the agency says that key components will be made available "only to
authorized government officials under proper legal authorizations, usually
a court order." They said usually, not always. The distinction was not
accidental. For the last several years, the FBI has been increasing its
surveillance of all Americans at a dizzying pace as part of a
mind-boggling expansion of its powers and activities. This includes
increased access to computerized data on Americans, which now often no
longer requires a court order to be accessed. The Bush average of 332
wiretap applications per year was double that of the Reagan
administration, and state agencies' wiretaps also increased during the Bush
years. Despite the rapid increase of such requests, wiretaps are far from
widespread, and according to the June 1993 issue of the Privacy Journal,
the FBI has publicized no instances in which its investigations were
hampered because a suspect had used encrypted e-mail or other digital
security devices. The Clinton administration asked for an amendment to
the Fair Credit Reporting Act that would allow the FBI to obtain credit
information, without a court order, by issuing a "national security letter."
The rationale is that although the FBI has access to your bank records, it
will not know which banks' records to obtain without ready access to your
credit reports, as David MacMichael reports in the National Security
Alumni Association Magazine, Unclassified (October/November 1993).
OPERATION ROOT CANAL
Meanwhile, the FBI continues to move forward with "Operation Root
Canal," also known as the 1992 Digital Telephony Proposal, which
encourages service and equipment providers to design their computerized
systems in such a way that the government can easily "obtain the plain
text contents of voice, data and other communications," according to FBI
memoranda obtained by the nonprofit Computer Professionals for Social
Responsibility (CPSR) from the Commerce Department in November of
last year. The threat of the Digital Telephony Proposal to
telecommunications companies is very real. CPSR reported that Rep. Jack
Brooks, a Texas Democrat, said that Root Canal "could obstruct or distort
telecommunications technology development by limiting fiber optic
transmission, ISDN, digital cellular services and other technologies until
they are modified...and could impair the security of business
communications. .could facilitate not only lawful government
interception, but unlawful interception by others [and] could impose on
industries' ability to offer new services and technologies." And the NSA,
which oversees export-control regulations of weapons of war--including
encryption products--has signaled its intent to prevent grassroots
cryptography from enlisting enough users to constitute a de facto standard.
Recently Phil Zimmerman, the creator of Pretty Good Privacy, a popular
and widely available piece of encryption shareware, was busted for
export-control violations (see "Penetrating Uncle Sam's Data," below).
After all, if everyone has access to encryption techniques, when law
enforcement agencies decrypt the Skipper algorithm on someone's
intercepted message, they'll find a secondary layer of encryption that
could be more difficult to crack That would render Skipjack pointless;
some Clinton critics worry that the logical outcome of Skipjack
implementation will be the criminalization of other forms of encryption.
Never mind the implications for secure business communications. With a
government-imposed Skpjack standard, the feds would be able to do
something they have never been able to do before--easily conduct mass
surveillance.
THE RIGHT TO PRIVACY
"No right of private conversation was enumerated in the Constitution,"
said Sun Microsystems' Whitfield Diffie, one of the pioneers of modern
civilian encryption, in June 1993 testimony before the House
Subcommittee on Telecommunications and Finance. "I don't suppose it
occurred to anyone at the time that it could be prevented. Now, however,
we are on the verge of a world in which electronic communication is both
so good and so inexpensive that intimate business and personal
relationships will flourish between parties who can, at most, occasionally
afford the luxury of traveling to visit each other. If we do not accept the
right of these people to protect the privacy of their communication, we
take a long step in the direction of a world in which privacy will belong
only to the rich."Canada and most European countries regulate public and
private data collection. By contrast, direct marketers and credit and
insurance companies in the United States are able to obtain large amounts
of data about the buying habits and lifestyles of most citizens. U.S. Law
provides no redress for the individual who complains of privacy
violations, other than the right to sue the violator. That great amounts of
information are being gathered about each of us is hardly news. And the
evidence that privacy has become a commodity has been accumulating for
years. Want an unlisted number? You pay for it. Want to restrict direct
marketers' ability to target you over cable TV? You may pay again. "If
you don't want to be intruded on at home, don't have a home phone,"
advises Esther Dyson, a policy consultant on all things digital for the
Clinton administration. "Which is what I do. If you really are worried
about this, take action. That's very difficult on a lot of things, but people
sort of act like they're helpless, and they're not." Or, in the immortal
words of Count Niccolo Machiavelli, counselor of princes: "Only those
means of security are good, are certain, are lasting, that depend on
yourself and your own vigor." We have seen the future, where everyone
plays James Bond in the palatial network that composes tomorrow's
worldwide digital web. In such a world, the Count could become a best-
selling author again.
Matt Thomlinson Say no to the Wiretap Chip!
University of Washington, Seattle, Washington.
Internet: phantom@u.washington.edu phone: (206) 548-9804
PGP 2.2 key available via email or finger phantom@hardy.u.washington.edu
Return to March 1994
Return to “Matt Thomlinson <phantom@u.washington.edu>”
1994-03-27 (Sun, 27 Mar 94 02:04:16 PST) - NewMedia article, April 1994 - Matt Thomlinson <phantom@u.washington.edu>