From: Black Unicorn <unicorn@access.digex.net>
To: cypherpunks@toad.com
Message Hash: d5eab0a6e28a9c951f2363e74f4f35406bd74af0c7bea3aaa0d4d4474e6d8c6b
Message ID: <199403130732.AA28139@access1.digex.net>
Reply To: N/A
UTC Datetime: 1994-03-13 07:32:41 UTC
Raw Date: Sat, 12 Mar 94 23:32:41 PST
From: Black Unicorn <unicorn@access.digex.net>
Date: Sat, 12 Mar 94 23:32:41 PST
To: cypherpunks@toad.com
Subject: DT '94, Clipper, New Property... (long)
Message-ID: <199403130732.AA28139@access1.digex.net>
MIME-Version: 1.0
Content-Type: text/plain
Some months ago I published a small work on the list calling for
property rights to be assigned to privacy. There was some
interest, but for some reason I chose to explore the subject
even further.
I prefer to release the work through the list, and I would appreciate
it if no one distributed it any further without consulting me.
Consider this a mailing among friends. Look over the work, let
me know if you like it, or better yet send me some hate mail,
just as long as you get stirred up.
The work below is quite long, and some may find that the message
is cut off after the 650 mark.
If so, and if anyone really wants to read the end by the time
they get to the break, let me know and I will repost with breaks.
Should there be enough interest, I will put the work up
for ftp somewhere.
-----BEGIN PGP SIGNED MESSAGE-----
Reliance on The New Property
and the
Questions of Electronic Privacy and Centralized Power
in an
Atmosphere of Federal Enforcement Empowerment.
- - a legal and philosophical notation -
March , 1994
Expansion Generally:
The United States of America is characterized of late by a culture of
centralization. Increasingly, whether a result of media, advances in
infrastructure, sociological factors, or technology in general, the
Federal Government has become the problem solving and allocative
entity of choice and often the entity of first resort. Causation
explanations for the expansion are numerous but, it is the advancing
technology model of explanation for expanding federal power that
presents the most illustrative backdrop by which to examine centralist
trends. This is not because advancing technology suggests an
unforeseen departure from the principals embodied in the Constitution
of the United States by the "Founding Fathers," (although this
supposition in itself has a distinct appeal) but rather because it
exposes the double standard that permits the increase of federal power
without parallel increases in individualist protections. Technology
is a common explanation for the need for greater regulation, but
rarely accepted as a legitimate argument in reference to individualist
rights, privacy being a key example. This is not, of course, to
suggest that the advance of technology is the best, most accurate or
only legitimate explanation. Clearly other examples exist and
moreover, are equally or more persuasive than the technology model I
intend to explore, but the common theme is generally applicable to all
the models I have examined.
The advance of technology takes on a much more devious meaning when
compared to the concepts of property outlined in Reich's "New
Property" theories. In 1964, Reich began to publicly question the
effect of government expansion and the increasing reliance of the
citizenry on government largess, over traditional property. Reich
reasoned that government largess required the application of property
protections.
The difficulty in accepting Reich's "New Property" paradigm and using
the model to justify a regulated state with new legal protections are
its basic assumptions that:
(1) Government is always best suited to serve as the basic controller
and decision maker for questions of distributional efficiency.
(2) The growth of government largess and regulation is inevitable.
(3) The growth of government largess and regulation is desirable, even
with the proper protections.
(4) The expansion of property protection to government largess and the
new property will effectively curb government abuses.
After critical analysis of some or all of these assumptions, the new
property concept becomes much more workable and, apart from the
author's apparent intent, a valuable conceptual tool in the argument
against centralizing regulation.
As the types of governmental entitlements treated as new property
increase in number and scope which is, in Reich's opinion unavoidable,
the citizenry must depend on government to assure, protect and insure
property rights of such a local and individualized character so as to
be incompatible with a majoritarian representative form of decision
making. Clearly individualistic concepts like privacy, freedom of
contract, and freedom of speech will fall victim to the shortfalls in
representation throughout the political process when issues like
security and distributive regulation are the other factors on the
balance. Additionally, and much more sinister is the use of
government largess to affect behavior with the threat of its
withdrawal. Often this has the effect of denying otherwise
enforceable constitutional protections. History demonstrates that the
judicial branch is generally unwilling or unable to police the
continual expansion of federal power, or forbid the use of largess
withdrawal coercion, and has been so situated since the late 1930's.
Simple failure of process is clearly a necessary evil in cases where
resort to the federal system is more efficient in accomplishing
allocation of resources. (Federal infrastructure projects,
interstates for one example.) It is also clearly important not to
rule out regulation and oversight as a tool to rectify legitimate
market failures. It is important to recognize here, that the standard
must be one of careful discretion focused on the proper definition of
a market failure, and consistent guidelines for regulation for which I
will turn to Stewart, Krier, and Manell.
However tolerable the legal process failures may be, an expansion that
actively permits and creates largess to be used in coercion is never
acceptable. The difficulties begin when centralist regulation is
applied to a market in such a way to either:
(1) Extend the paternalistic hand of governmental entitlement over
newly fabricated individual rights under the pretense of protecting
them while at the same time appropriating actual individualistic
concepts. (I label these Creationist Entitlements)
or:
(2) Engulf existing and legitimate individualistic concepts with
regulation and then dismissing their loss as an unfortunate casualty
of securing protections which are hardly entitlements at all.
(Illusionist Entitlements)
[The health care legislation is a good example of a creationist
entitlement. A troubled industry is made the focus for scrutiny, a
national crisis is declared, and every citizen becomes "entitled" to
costless health insurance. The absolute right to insurance has been
"created." Surely a desirable outcome, but deceptive none the less in
that insurance was never considered, by any stretch of the
imagination, an individualist right. The net result is the absorption
of privacy, freedom of contract concerns, and the reliance on
government to insure the citizenry. All these are substituted for the
newly created "right" to health insurance and are thus casualties of a
creationist entitlement. National security, on the other hand,
presents itself as an illusionist entitlement. Violent crime has
gripped the national agenda. A crime crisis is declared, and federal
law enforcement power is expanded. The civil liberties swallowed up
in the process are the casualties of an illusionist entitlement.]
The source of justification for such regulation is almost always that
a "national crisis" must be solved. The associated externalities,
which are almost never shown to result from the lack of regulation are
pointed to as creating the need for market preserving regulation. As
a result, essential property or personal rights are effectively
engulfed in the public sphere, a realm with no interest, and in many
instances possessing a negative incentive, in preserving them. The
balance that has historically depended on representation to counter
the disregard for the individual inherent in the collective is thus
bypassed by appointing a trustee with a glaring conflict of interest.
In addition the Judicial branch, affords little or no protection.
Clearly the distinct difference between individually secured rights
and government entitlements, is that the latter are easily taken away
by a variety of means not limited to underfunding, lack of resource
allocation, coercive largess application, or simple incompetence in
administration.
The most concerning potential expansions in federal power to date are
looming on the horizon. The Digital Telephony and Communications
Privacy Improvement Act of 1994, and the Clipper or Key Escrow
Proposals together utilize the complexities of what Wilson terms
"client politics" and entitlement manipulation to expand the scope of
federal law enforcement power, and by extension federal power
generally, to an alarming breadth by capitalizing on the current
national crisis externality, crime. These proposals in effect make
whatever rights to privacy existed within the context of
communication, government entitlements. The advances in encryption
technology that returned the potential for self secured privacy are
effectively eliminated under the nexus of the pending legislation. In
return for the high price paid, (Constitutional Amendments I, II, IV,
V, X and the oft quoted, rarely guarded right to privacy) the
citizenry is presented with a government backed insurance against
crime. An illusory entitlement to the benefit of new federal laws and
increased funding for enforcement. An entitlement likely to be lost
in its effect by nation wide dilution, mismanagement, abuse and
incompetence while at the same time empowering the federal mechanism
by curtailing what defenses the citizenry retain. There are strong
indications that the new bills will create large regimes of government
largess coercion, not withstanding the coercive effects of the Key
Escrow plan admitted to by the administration.
Expansion of Federal Power Generally:
In a series of cases including, _Panama Refining Co. v. Ryan_, 293
U.S. 388 (1935); _Railroad Retirement Board v. Alton Railroad_, 295
U.S. 330 (1935); _A.L.A. Schechter Poultry Corp. v. United States_,
295 U.S. 495 (1935), and _Carter v. Carter Coal Co._, 298 U.S. 238
(1936), the United States Supreme Court struck down key segments of
legislation in Franklin D. Roosevelt's New Deal Programs. Much of the
legislation was considered to have infringed upon traditional notions
of private property, and it is thus understandable that the programs,
which had lost favor in the years following the President's election,
were vigorously challenged. President Roosevelt's re-election and the
court's refusal to adopt the legislation led to proposed changes in
the structure of the Supreme Court. Under the pretext that the
Justices were too old to fully complete their duties, the President
proposed that new Justices be appointed for each Justice then on the
bench over the age of seventy. As there were six justices then over
seventy, the total number of Supreme Court Justices might well be
fifteen today were it not for the timely retirement of Justice Van
Devanter and the switch opinion of formerly anti-New Deal Justice
Roberts in _West Coast Hotel Co. v. Parrish_, 300 U.S. 379 (1937).
(The move was commonly referred to as "the switch in time that saved
Nine.") In addition, the court modifying bill's key sponsor, Senator
Robinson fell to a fatal heart attack. See generally, Stone, et al.,
Constitutional Law (1991 2d ed.). See also, Leuchtenberg, The Origins
of Franklin D. Roosevelt's Court-Packing Plan, 1966 Sup. Ct. Rev. 347.
The pro-New Deal decision that followed opened the door for federal
expansion under the crack in the law left by the New Court's reading
of The Commerce Clause of Article I, section 8 of the United States
Constitution. See, e.g., _National Labor Relations Board v. Jones &
Laughlin Steel Corp._, 301 U.S. 1 (1937). By 1942, The Commerce
Clause was construed so widely by The Court that it reached even
private functions so intimate as to include the growth of wheat on
private property for self consumption. _Wickard v. Filburn_, 317 U.S.
111 (1942) (Farmer's growth of wheat on private property for own
consumption held as affecting commerce and thus within the reach of
congressional regulation under The Commerce Clause). The result was
to allow nearly any activity to potentially affect interstate commerce
when taken in its aggregate. Combined with Justice Stone's outright
dismissal of the Tenth Amendment, the power afforded Congress no
longer had any practical limits. _United States v. Darby_, 312 U.S.
100 (1941). Describing the rapid growth of Federal power from _Darby_
to date might in itself fill a textbook. Let it suffice then to
comment that much of the civil rights legislation of the 1960's found
its authority in The Commerce Clause and more on point, that no
statute that finds its base for authority in The Commerce Clause has
been struck down on those grounds since _Wickard_. The other powers
granted Congress are no less encompassing than the Commerce Clause
itself.
Federal Power and Centralist Regulation:
The expansion in federal power has produced an explosion of federal
regulation since the first organized attempts to institutionalize
regulation in the post depression years. Federal regulation and the
wide reading of the Commerce Clause gives states an incentive to buy
into, and regulate industries otherwise served by the private sector.
This is because the "Dormant Commerce Clause" can be circumvented when
states participate in the markets they wish to regulate. This is the
"Market Participant" doctrine. See _Hughes v. Alexandria Scrap
Corp._, 426 U.S. 794 (1976); _Reeves, Inc. v. Stake_, 447 U.S. 429
(1980); _White v. Massachusetts Council of Construction Employers,
Inc._, 460 U.S. 204 (1983). But see _South-Central Timber Development
v. Wunnicke_, 467 U.S. 82 (1984). The Dormant Commerce Clause refers
to those markets upon which Congress has not yet imposed regulating
legislation. Often States are prohibited from regulating these
markets under the rational that Congress has the enumerated power to
"...regulate Commerce with foreign Nations and among the several
States...." U.S. Const. art. I, section 8, cl. 3, and therefore
states have given the right to regulate to Congress. _City of
Philadelphia v. New Jersey_, 437 U.S. 617 (1978). The exception to
the grasp of the Dormant Commerce Clause encourages states to buy into
the market and be free of congressional restrictions on interstate
discrimination and restrictions on protectionist state regulations.
Note however that states can easily accomplish the same regulation by
harsh subsidies in markets they participate in. As a result it is as
if there existed no deterrent to state regulation at all. "Under
existing precedent, the State could accomplish [the] same result
[regulation of the industry] in any number of ways.... It seems to me
unduly formalistic to conclude that the one path chosen by the State
as best suited to promote its concerns is the path forbidden it by the
Commerce Clause." _South-Central Timber Development v. Wunnicke_, 467
U.S. 82 (1984) (Justice Rehnquist dissenting).
The net result is to encourage "spin off regulation" by the states,
and as a result of the buy up of industry required, an increase in
government largess and government holdings. (Particularly now that
all production from the state interests in the industry is regulated
by the issuance of government contracts to manufactures. Government
contracts being a privilege, and not a right, withholding them is not
subject to tradition constitutional protections.) See, e.g., Charles
A. Reich, The New Property, 73 Yale L.J. 733,762 n.5 (1964).
Federal legislators then typically respond to the protectionist
regulations of states by preempting state practices with federal
regulation. This is "double spin off regulation."
Spin off regulation and double spin off regulation is not the only
cycle of federal growth that feeds off it self to inflate federal
power and holdings. The cycle of government largess is equally if not
more dramatically vicious. Government largess is used to compel
behavior, which in turn creates more government largess. Thus,
stifling taxes are imposed, a tax break is given to businesses who
comply with regulation, control of these businesses becomes a power in
itself which can be used as largess over the employees and downstream
of the market. More complicated and devious models are easy to
imagine.
The New Property, coercion, regulation, and the individual.
Reich characterized the increasing reliance of the citizenry on
government as a source of wealth as "The New Feudalism." The chief
characteristic, and the most convincing in my opinion, that Reich
points to is the fact that wealth distributed by the government is
conditional and subject to the state. Charles H. Reich, The New
Property 73 Yale L.J. 733, 768 n.5 (1964). Reich points to 8 key
factors in comparing the use of government largess to traditional
understandings of feudalism:
(1) Increasingly we turn over wealth and rights to government, which
reallocates and redistributes them in the many forms of largess; (2)
there is a merging of public and private, in which lines of private
ownership are blurred; (3) the administration of the system has given
rise to special laws and special tribunals, outside the ordinary
structure of government, (4) the right to possess and use government
largess is bound up with the recipient's legal status; the status is
both the basis for receiving largess and a consequence of receiving
it; hence the new wealth is not readily transferable; (5) individuals
hold the wealth conditionally rather than absolutely; the conditions
are usually obligations owed to the government or to the public, and
may include the obligation of loyalty to the government; the
obligations may be changed or increased at the will of the state; (6)
for breach of condition the wealth may be forfeited or escheated back
to the government; (7) the sovereign power is shared with large
private interests; (8) the object of the whole system is to enforce
"the public interest" - the interest of the state or society or the
lord paramount - by means of the distribution and use of wealth in
such a way as to create and maintain dependence. Id. at 770.
Consider by way of illustrations some of Reich's examples, which I
find quite elegant and persuasive. In 1964 the New York Taxi
medallion [the license required by the city to operate a taxi] was "a
piece of tin worth 300 times its weight in gold." Id. at 735 n.7.
Television channels, which are issued at no cost, can be sold at
extraordinary sums. Id. at 735.
Clearly the ability to deprive citizens of wealth without traditional
notions of process is power. The words of Justice Stone illustrate
the scope of the congressional spending power and the refusal of the
courts to recognize traditional protections : "Threat of loss and not
the hope of gain, is the essence of economic coercion." _United
States v. Butler_, 297 U.S. 1 (1936) To resort to the mundane (in
concept and in source), "He who can destroy a thing, controls a
thing." and "...the power to tax is the power to destroy...."
_McCuloch v. Maryland_, 17 U.S. (4 Wheat.) 316 (1819). The wider the
dependence on government wealth, the wider the power of government.
Reich asks the most relevant question in light of government largess
coercion. If, or when, the primary property is in the form of
governmental distributed wealth, what constraints against the
government will be available to the citizenry?
Where I depart from Reich is the manner in which to assure individual
protections in light of the rise of new property. Reich argues that
additional protections are required, perhaps protections that would
extend the constitutional umbrella over the new property or government
largess. Charles A. Reich, The New Property After 25 Years, 24 U.S.F.
L. Rev. 223, 241 (1990). This approach clearly presents the
politically difficult problem of granting property rights to all
government largess, including such largess as welfare and insurance.
In addition, it exposes government largess to the same problem present
in all rights not individually secured, namely dependence on
government as an enforcement body for rights that often conflict with
the general interest of the sovereign. The complexity of allowing
government to regulate a market or individualist right and then
assigning a governmental oversight authority to prevent government
abuse is a wasteful and unpolished solution that merely presents more
opportunity for loss in the form of failure of process, abuse or
inefficiency.
Instead the conceptually simpler approach is to prevent the expansion
of federal power into individualist constructs to begin with.
The General Effect of Technology on Federal Power:
Technology has three basic effects on Federal Power.
(1) Technological advances expand existing power.
Technology, especially data processing technology, considerably
increases the effect of existing power by reducing the cost of
information collection, organization, and compilation.
Consider the Social Security Number. Clearly, on the eve of its
adoption, the Social Security Number was not conceived as an identity
measure. Regardless, the number proved exceptionally fitted to
identification uses simply by its nature. Each person (theoretically)
has but one. No two are alike, and almost every citizen has one by
nature of economic coercion (its requirement to file tax return
information for one). On its face the number seems benign, but
coupled with computing power and the ability to quickly collect, sort
and exchange data, the Social Security number has become a powerful
tracking tool. In addition, the continued reliance on the number as a
secure and accurate identifier creates a dangerous potential for
abuse. Technically confidential tax return information is available
for the asking provided one has the subject's name, and Social
Security Number.
It is a simple matter today to track the movements of a citizen by the
combined information available from parking tickets, passport records,
moving violations, credit card receipts, and telephone records. The
travel document that was once a mere request by the government of the
United States that the bearer be treated as an American citizen,
Comment, Passport Refusal for Political Reasons: Constitutional Issues
and Judicial Review, 61 Yale L.J. 171 (1952), is today considered
mandatory for travel outside the United States, and bears a bar code.
Customs officials are today armed with computer terminals and bar code
readers. Driver's licenses, also basically mandatory, are
increasingly growing magnetic strips and digitized databases of photos
and even fingerprints are seeing increased use. Parking enforcement
officials travel about in mini-vans with portable terminals connected
by radio link to the Vehicle Registry database prepared to seize any
vehicle that might draw a red flag. Many agencies are entirely
impotent without the technology appearing as recently as the 1960's.
How would the Security and Exchange Commission conduct enforcement
without sophisticated data processing equipment today?
Data processing technology is not, however, the only impacting
advance. What would become of Federal Communication Commission
enforcement power without advanced monitoring equipment?
(2) Technology justifies new federally empowering legislation.
There are few major regulations that seek to address electronic
privacy, restrict federal or local power, which justify themselves on
advancing technology grounds. The best examples of such legislation
in the public sector, The Right to Financial Privacy Act of 1978, Pub.
L. No. 95-630, sections 1100-122, 92 Stat. 3697 (codified throughout
12, 31 U.S.C.), The Fair Credit Reporting Act, 15 U.S.C. section 1681
(1988), The Family Educational Rights and Privacy Act, 20 U.S.C.
section 1232g(b)(2)(A)-(B)(1988), are sectorized approaches to
legislation and offer little if any resort to civil actions. The
private sector versions of these acts, The Fair Credit Billing Act, 15
U.S.C. section 1666 (1988), The Fair Debt Collections Practices Act,
Id. section 1692, and The Electronic Fund Transfer Act, Id. section
1693, fall far below the pace set by Omnibus legislative efforts in
Europe and both the public and private legislation is lacking in its
implementation. See Peter Mei, The E.C. Proposed Data Protection Law
25 Law & Pol'y Int'l Bus. 305 n.1 (Fall 1993).
Despite the fact that it is seldom if ever used as a justification for
legislation to protect the individual, often it is the case that new
centralizing regulatory legislation is called for to "cope with recent
advances in technology." More interesting still is the propensity to
create regulations in the form of "living documents" that usually
include a clause to "provide a flexible response to changes in
technology." Often the result is to create legislation that possesses
no theoretical limit to its scope or enforcement power in seeking to
advance the stated purposes. Export regulation can often be so
characterized. Some prime examples of technologically justified
legislation include: The National Competitiveness Technology Transfer
Act of 1989, Pub. L. No. 101-189; Reproductive Technology Legislation,
Pub. L. No. 102-493; Genetic Technology Acts, 15 C.F.R. 295.1; and
numerous export regulations e.g., 22 U.S.C. 2751. Often these
legislative efforts grant powers much beyond that needed to enforce
the stated goal, or beyond that which could be justified by the
advance of technology alone. (See, e.g., 50 U.S.C. Appx.) (Supposed
export justification accomplishes many forms of "fringe benefit
regulation.").
The New Property and Technology:
Technology gives government great power. Government has the power to
gather information, to coerce through largess manipulation, to compile
records, and to make resistance to policy difficult. At the same
time, government uses technology, both directly and as a justifying
rational for increased regulation and federal empowerment. The
increase in government power, and especially the creation of new types
of government largess (Guaranteed Internet Access, Federal Computer
Educational Assistance Programs, Universal Health Care) is a threat to
individualism in the Unites States. Certainly Charles Reich's
concepts of government coercion only gain credibility and ominous
implications when the raw power of government augmented with
technology is factored in. If indeed we have "no principal that
forbids organized society from making use of our dependency to achieve
goals of social control," The New Property After 25 years, supra, at
224, then we must either develop such a principal as Reich suggests,
Id. at 225, or resist the continual growth of federal power.
Considering the current judicial disposition to allow government
coercion by the threat of largess withholding, See, e.g., _Steward
Machine Co. v. Davis_, 301 U.S. 548 (1937) (Federal tax imposed on
employers. Employers who participated in state unemployment funds
received 90% refund. Statute upheld and held not to constitute
coercion.), it is highly unlikely that largess will see the
constitutional protections Reich seeks. Indeed restrictions of these
largess coercions, an important legislative tool for federal
empowerment, might well invalidate every major regulatory program
instituted since the New Deal legislation.
Assuming such protections were possible to implement, an assumption
that ignores the time, legal, philosophical and momentum restraints,
it is difficult to assert that constitutional protections overseen by
government would not be watered down by a "balancing" test, or the
lack of sufficient redress for the victim of coercion. Reich's model
of restricting government with a governmental regime intended to
protect citizens from government is simply clumsy.
Instead it is today within the power of the citizenry to protect
itself from many forms of government largess coercion and control.
Consider encryption as an example. Encryption is empowering. With
encryption, and specifically public key encryption, the individual
thwarts millions of dollars in governmental surveillance development.
(The author assumes a basis knowledge of public key encryption on the
part of the reader.) If theories are correct, and in the battle
between cipher and cryptoanalysis the cipher always wins, the prospect
for government control is unusually poor. Consider the crossbow as an
analogy. The crossbow was an advance in technology that allowed the
common man without training to unhorse and usually kill a mounted,
armored knight at range. Chuck Hammill, Address at the Future of
Freedom Conference (Nov. 1987). The threat to the balance of power
prodded the church and the monarchs to take all steps available to
eradicate the use of crossbows; excommunication and death for example.
Id. Of course, it was never wrong for the knights to use crossbows
against heathens.
Today, the advent of public key cryptography threatens government's
control over the transfer of information. It is no surprise then that
government is desperately trying to maintain a grip over the
technology that threatens to be available to everyman. Witness the
attempt to legislate the information highway, the Digital Telephony
Bill, the Clipper Key Escrow proposal. If these technologies, digital
communications, Internet access and encryption, cannot be directly
banned or restricted because of constitutional restraints, they can
certainly be converted to government largess without constitutional
issue. The new feudal, federal system has seen a crossbow in the
making, and it seems that the knights want exclusive use rights.
What implications would truly anonymous transactions, digital cash
have on the current tax collection structure of the United States?
The registration of automobiles? Firearms? What impact might truly
untraceable and secure communications across an unsecured
channel*[reword]? The current technologies threaten to break the
current trend of federal empowerment, and worse for the centralists,
reverse it.
The (Il)legitimacy of Pending Legislation:
(1) The Digital Telephony and Communications Privacy Improvement Act
of 1994:
The Digital Telephony and Communications Privacy Improvement Act
expands federal power by placing a positive burden on the common
carrier to provide law enforcement with communications intercept and
"call setup information" and imposes penalties upon common carriers
who do not comply. The Digital Telephony and Communications Privacy
Improvement Act of 1994, section 2. See also, Mike Godwin, Section-
by-Section Analysis of the 1994 Draft of the Digital Telephony
Legislation (1994). Godwin suggests that the new burdens on common
carriers are imposed because 18 U.S.C. 2518(4) is not commonly read to
impose such a burden, and thus common carriers are often reluctant to
provide the kind of solutions to intercept problems law enforcement
would like. Mike Godwin, Section-by-Section Analysis of the 1994
Draft of the Digital Telephony Legislation (1994). The specific
provision provides "Common carriers shall be required to provide
forthwith, pursuant to court order or lawful authorization, the
following capabilities and capacities in order to permit the
government to conduct electronic surveillance and pen register and
trap and trace investigations effectively." Digital Telephony Bill,
section 3 (amending 18 U.S.C. 109, section 2237(a)). The draft goes
on to provide for simultaneous interception of communications and call
setup information. Digital Telephony Bill, section 3 (amending 18
U.S.C. 109, section 2237(a)(1)). The intercepted information then
must be forwarded to a facility of the government's choice. Digital
Telephony Bill, section 3 (amending 18 U.S.C. 109, section
2237(a)(4)). Penalties for failure to comply are set at $10,000 per
day and subjects offending common carriers to F.C.C. sanctions or
fines. Digital Telephony Bill, section 3 (amending 18 U.S.C. 109,
section 2237(f)). Enforcement power is given to the United States
Attorney General or at the Attorney General's request, the Federal
Communications Commission. Digital Telephony Bill, section 3
(amending 18 U.S.C. 109, section 2237(e)).
Apparently the Digital Telephony Bill does expand federal enforcement
power significantly by giving new powers to the Attorney General,
placing new burdens on common carriers, and assigning new fines for
non-compliance. In addition, the bill would make interception a much
easier task for federal and local law enforcement, both of which
benefit from provisions of the Digital Telephony Bill. As the
technical nuances of forwarding intercept information to the
government "location" are not addressed, one wonders if government
officials can access any intercept and call setup information they
wish, or if they must request the information from the common carrier,
presenting evidence of their lawful authority in the process, and have
it forwarded.
The reference to common carriers raises the question, will these
include "public access" internet providers. Note that the Digital
Telephony Bill adopts the definition of common carrier in 47 U.S.C.
153(h):
"Common carrier" or "carrier" means any person engaged as a common
carrier for hire, in interstate or foreign communication by wire or
radio or in interstate or foreign radio transmission of energy. 47
U.S.C. 153(h)(1993).
In addition, it is possible that such providers might fall under the
"common carrier support services" provider provision of the Digital
Telephony Bill. Digital Telephony Bill, section 2. Mr. Godwin
suggests this might impose obligations upon local telephone service
providers to acquire "transactional information" from Internet
providers when e-mail is sent. Mike Godwin, Section-by-Section
Analysis of the 1994 Draft of the Digital Telephony Legislation
(1994). The implications for anonymous mail in this instance would be
dire.
Of particular interest is the focus on "pen register" and "call setup"
information. Pen register and call setup information has a much lower
standard of protection than the actual communication. _Smith v.
Maryland_, 442 U.S. 735 (1979)(Installing pen register without warrant
did not violate suspects fourth amendment rights). See also,
_California v. Greenwood_, 486 U.S. 35 (1988)(Information voluntarily
turned over to third parties, including call setup information, not
protected by fourth amendment). See also, 18 U.S.C. 3123 (1988). The
net effect of this section of the Digital Telephony Bill would be to
make such virtually unprotected information trivial to collect.
Although the proposed legislation may or may not technically expand
authority it most certainly does give law enforcement huge increases
in capabilities, especially in data collection.
(2) The Escrowed Encryption Standard:
On April 16, 1993 the administration announced the Escrowed Encryption
Standard initiative. The proposal allegedly seeks to address and
reconcile the conflict between privacy of citizens and the intrusive
needs of law enforcement. In effect the initiative proposes a
standard public key encryption algorithm for voice and data
communications. The algorithm is implemented in hardware, the
"Clipper" chip, that will be installed in a variety of communications
devices. The keys required to decrypt the communications between the
devices are segmented and "escrowed" between two agencies. The
cooperation of both agencies is required in releasing the key segments
to allow wiretapping of any individual device using the Clipper chip.
The theory is that the encryption algorithm will provide security for
the public from unauthorized eavesdroppers, while allowing law
enforcement access to the encrypted communications. The program is
described as "Voluntary." See generally, Statement of the White House
Press Secretary, April 16, 1993.
The Escrowed Encryption Standard is justified by the reliance of law
enforcement, and particularly federal law enforcement, on interception
of telephone communications in the battle against drugs and terrorism.
The Effects of Legislation:
Security and privacy are often considered mutually exclusive in their
nature. One cannot serve both masters without duplicity.
In this respect, the Escrowed Encryption Standard , which is presented
as a compromise between the two, is a paradox. Clearly the EES is not
at all interested in privacy for citizens. If indeed strong
cryptography is such a threat to law enforcement, its availability can
only be privacy enhancing in reference to whatever other listeners
might seek to overhear. If law enforcement, especially in light of
the scope of federal power, does not have the resources to penetrate
the currently available strong encryption methods, then EES is not
required for privacy. Indeed the EES initiative merely limits privacy
to a manageable level under the guise of a government entitlement to
privacy. The government here has created an illusionist entitlement
to privacy, and given it to the citizenry hobbled, while with the
other hand taking what tools were present for the citizens to see to
their own privacy in electronic communications.
The concept of "standing" illustrates the enhanced privacy available
to citizens in the context of one constitutional right, the Fourth
Amendment to the Constitution of the United States. The Fourth
Amendment is protected by a doctrine called the exclusionary rule.
Law enforcement is deterred from violating the Fourth Amendment by the
exclusion of such evidence as is illegally obtained from admission at
trial. _Mapp v. Ohio_, 367 U.S. 643 (1961). In order to exert this
redress, a complaining party is required to have "standing." Simply
put, it must be your constitutional rights that have been violated in
order to obtain any redress. Were a third party to be searched
without the process of a warrant, there would be little redress except
for resort to a civil suit, few of which are successful and fewer of
which are profitable. _Zurcher v. Stanford Daily_, 436 U.S. 547
(1978). Encryption fills the standing gap. Instead of relying on
inefficient process to insure individual privacy in communication, it
is now possible for the individual to secure such privacy and
protection provided by the amendment but not enforced by the
exclusionary rule or civil procedure.
If strong encryption presents no threat to law enforcement other than
as a cost in time and resources, then it is clear that the scope of
domestic monitoring is beyond that which is authorized by court order.
According to filings for the year of 1992 state and local authorities
performed 846 "intercepts" averaging $46,492 per intercept. Donald P.
Delaney, Dorothy E. Denning, Wiretap Laws and Procedures, Sept. 23,
1993. Intercepts under the Foreign Intelligence Surveillance Act of
1978 numbered 484 for 1992, costs are unreported. Id. See also, The
Foreign Intelligence Surveillance Act of 1978 50 U.S.C. sections 1801-
1811.
Non-FISA intercepts totaled in cost for the year of 1992 near 40
million dollars by these figures. If the implementation of EES is
merely a cost cutting measure, and the costs are associated with the
economics of decryption of suspect's intercepts using strong
encryption, an assertion that lacks any basis, then the EES proposal
must total in costs less than 40 million per year and the sum of the
FISA intercepts assuming each of these was an interception of
encrypted material. If the EES proposal exceeds the cost of these
intercepts, we must assume that either:
(1) The plan is not economically sound.
(2) There are more domestic intercepts than are reported as
legitimate.
It might be added that EES will not itself reduce the cost of actual
interception from the common carrier, while Digital Telephony might.
This may explain the similar timing of the initiatives as an attempt
to coordinate a cohesive data policy.
In addition, encryption technology is a growing and thriving market.
The market for security software, fueled by virus and general security
interests has attracted many competitors and several contributors in
the public domain who have helped to prop up the quality of commercial
software. The fact that a market has evolved even in the face of
harsh export restrictions suggests that a free marketplace would be a
significant force. Clearly regulation is not proper here where: (1)
There has been a fairly liquid exchange and availability to consumers
of information in the marketplace. (2) There are no restricted
commodities (within the United States). (3) There are large numbers
of buyers and sellers in the market. (4) There are no localized
externalities. Stewart, Krier and Manell, Environmental Law and
Policy (3d ed. 1990). In this case the market is restricted by a
supposed externality of "national security."
The contention that law enforcement and counterintelligence activities
will fall apart without the unhindered ability to wiretap is without
merit. Supporters of the EES proposal are utilizing a logical fallacy
in pointing to the number of convictions obtained by the use of
wiretaps as evidence of EES's merits. Indeed law enforcement has
relied heavily on their ability to wiretap with basic impunity. The
abuses that do come to light surely indicate that more lie
undiscovered below the surface of investigatory processes. The
assertion that law enforcement cannot properly adjust their methods to
rely instead on physical microphones and non-intercept type
surveillance is a mere front to preserve the current regime; one of
rubber stamp approval and lowered standards of "cause." Law
enforcement has found in the ability to wiretap an easy circumvention
of the Fourth Amendment because courts have indicated that the key
legal principal (the manifestation of an expectation of privacy) is
lower in telephone conversations than in the home. How is it that
when the citizenry attempts to exert an increased shield of privacy
over telephone and electronic conversations by not turning them over
to the third party (common carrier) in intelligible form the
government seeks to make this impossible? _Smith v. Maryland_, 442
U.S. 735 (1979)(An individual has no legitimate expectation of privacy
in the numbers dialed on his telephone because he voluntarily conveys
those numbers to the telephone company...) See also, _California v.
Greenwood_, 486 U.S. 35 (1988). _Katz v. United States_, 389 U.S. 347
(1967)(What a person knowingly exposes to the public, even in his own
home or office, is not a subject of Fourth Amendment protection).
What evil is there in individuals filling the gap that fails to
enforce higher protections on our phone and electronic conversations,
which incidentally, we rely on today much more than in years past.
That the government has an affirmative right to be allowed access to
the raw conversation is perhaps understandable. That the government
has a right to be provided with a plain meaning translation of what
they intercept is not. Even the provisions in the Digital Telephony
Bill recognize that the government will not place a duty of
translation on the common carrier. The Digital Telephony and
Communications
Privacy Improvement Act of 1994, section 3(i)(5) (Amending 18 U.S.C.
109 section 2237). Why then is it obvious that this burden should be
placed on the citizen? At the very least, the increased expectation
of privacy manifest in the attempt to encrypt conversations, even
under the EES initiative, should entitle the parties to greater
protections of process under the Fourth and Fourteenth Amendments,
_Katz_ and _Greenwood_.
The EES program is presented as a voluntary program. Unfortunately
the government's definition of voluntary falls short. In the case of
the EES program, government is trying to establish a de facto standard
by requiring all government communications to be made with the new
technology. The result is the threat of withholding the government
largess of government contracts to the companies that rely on such
contracts for their existence. The companies in turn, in the interest
of economy, will request that other associations outside of a
government context be made with the new technology. Coupled with
import/export policies that make competing technologies highly
unprofitable to market, the level of coercion is obvious.
In order for the EES program to accomplish its goals in relation to
crime and the use of strong encryption to deter law enforcement
interference, other technologies must not be readily available in the
United States. Clearly any group of criminals that might wish to use
strong encryption would not adopt a standard labeled at the outset as
penetrated by the government. It is hard to take the government's
assertion that the program will be voluntary at face value in light of
these analysis.
The dangers of allowing government to make privacy a collective good
distributed, and incidentally seized, by government itself, which is
essentially what the EES and Digital Telephony Bill proposals do,
should be self apparent. There is little or no reason to believe that
this form of government largess will be treated any different as far
as coercion by threat of withdrawal is concerned. Coupled together,
the ability to eavesdrop on citizenry and cripple a blossoming ability
for the individual to secure his or her own privacy, the government
has not only eliminated the most significant potential advance in
individual and private property, but also gained a good deal of
capability in preparing future regulation. Digital cash, which
without EES would be potentially untraceable and anonymous, will be
tracked as easily or easier in the new regime than the hard currency
of today and yesterday. A governmental control of the information
structure through subsidy will impose government requirements for
disclosure on what would otherwise be private carriers with no such
requirements. If these concepts are available to reasoned analysis,
they have likely occurred to the administration. Clearly anonymous
digital cash and completely untraceable transactions, at little or no
cost, are not in the administrations best interest. This suggests
that the Digital Telephony, National Information Infrastructure and
EES proposals are about, and have always been about, much more than
law enforcement, assured access and privacy, but also continued
control, regulation, and the status quo.
unicorn@access.digex.net
-----BEGIN PGP SIGNATURE-----
Version: 2.3
iQCVAgUBLYK97xibHbaiMfO5AQGHXwP/ZBVQYOaf63HtFU5FJuRnUj8AyHWRB5Bt
/MH0yanuV3+LkaalDXzTt3j/f7gFi5AEJK62CdOMU/T+nMfNg2QGjVTeYY1t9c09
d/NyddXgICd7uEtddced5+jvsMoVwSeDoGn4RLV8hokOvEiLXn9ifcloAnZ55epU
FOR//d3uU9Y=
=UsvS
-----END PGP SIGNATURE-----
Return to March 1994
Return to “Black Unicorn <unicorn@access.digex.net>”
1994-03-13 (Sat, 12 Mar 94 23:32:41 PST) - DT ‘94, Clipper, New Property… (long) - Black Unicorn <unicorn@access.digex.net>