1995-09-25 - Golden Coy Freeh

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 4504a782f96549596cf75e487ef0afd5ce3eb7a160ae4a2e84e5dbc8e9379922
Message ID: <199509251253.IAA07006@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-09-25 17:11:04 UTC
Raw Date: Mon, 25 Sep 95 10:11:04 PDT

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 25 Sep 95 10:11:04 PDT
To: cypherpunks@toad.com
Subject: Golden Coy Freeh
Message-ID: <199509251253.IAA07006@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   The New York Times, January 25, 1995, p. D5.

   The F.B.I. Sting Operation on Child Pornography Raises
   Questions About Cryptography

   By Peter H. Lewis


   Federal agents swooped down on more than 125 homes and
   offices across the United States on Sept. 13, seizing
   computers and diskettes from people suspected of
   trafficking in child pornography over the America Online
   network. But to date, the number of arrests in the sting
   operation remains at 15.

   More arrests are expected, but why haven't more occurred?

   Last week, Louis J. Freeh, the director of the F.B.I.,
   offered an oblique explanation for the seemingly low
   initial success rate.

   At least some of the suspected child pornographers had used
   data encryption software, Mr. Freeh said Thursday in
   remarks at an International Cryptography Institute
   conference in Washington. In other words, they had
   scrambled their computer files so that only someone with
   the password -- or with proper code-breaking skills --
   could view the contents.

   Mr. Freeh wisely did not say whether the F.B.I. agents were
   able to decipher the encrypted files seized in the
   investigation. It would be foolhardy, from a
   law-enforcement perspective, to tip one's hand.

   If the head of the F.B.I. acknowledged that his agency was
   powerless to crack a cryptography program like Pretty Good
   Privacy, the stampede for that software on the Internet
   would make the run on Windows 95 look puny.

   From a political perspective, Mr. Freeh's coyness is shrewd
   as well. By making even a subtle suggestion that some child
   pornographers may walk free because of unbreakable
   cryptography, he gains more leverage in seeking
   Government-mandated controls over the use of encryption
   technology.

   Mr. Freeh said that encryption was a "public safety" issue,
   and he said law-enforcement agencies around the world "will
   not tolerate" the use of private data encryption to impede
   investigations. He said encryption had also been
   encountered in the Philippines in a plot to blow up an
   American jet and to assassinate Pope John Paul lI (in that
   case, at least, one can presume the code was cracked.)

   It seems worthwhile to point out that even if the suspects
   in the child pornography sting, called Operation Innocent
   Images, used cryptography, that did not provide evidence
   that they were doing something illegal. Our legal system is
   predicated on the belief that one is innocent unless proved
   guilty, and there is no exception clause for technology.

   "Fortunately we are not yet at the point where the mere use
   of encryption overcomes the presumption of innocence," said
   David Sobel, staff counsel for the Electronic Privacy
   Information Center in Washington.

   Another point to remember is that the F.B.I. identified
   more than 100 suspects, and gathered sufficient information
   to warrant raids, using existing laws and enforcement
   techniques. On the other hand, there is no denying that
   child pornographers use data encryption to keep co-workers,
   family members and police from discovering their secrets.

   "We are involved in a couple of jobs every week resolving
   some kind of a child pornography investigation," said Eric
   K. Thompson, president of Access Data Inc. of Orem, Utah,
   a private company that specializes in cracking encrypted
   files for corporations and Government agencies.

   The Government's elite codebreakers at the National
   Security Administration are prohibited by law from using
   their talents against American citizens. The F.B.I. has its
   own code-breaking experts, but it routinely calls on
   independent experts like Access Data to help on some cases.

   After eight years of breaking into encrypted files, ranging
   from situations involving secretaries who simply forgot
   their passwords for important memos to cases involving
   corporate computer systems that were encrypted by
   disgruntled employees, Mr. Thompson has concluded:
   "Basically, the criminal element is becoming more computer
   literate, and they are discovering encryption. Files are
   becoming more difficult to break."

   Dorothy Denning, an expert in cryptography and a professor
   of computer science at Georgetown University in Washington,
   said she recognized the importance of encryption for
   businesses seeking to protect information. At the same
   time, she said, she also recognized the problems that
   law-enforcement agencies face because of cryptography.

   "So many people had been saying people in law enforcement
   weren't having this problem, and I didn't believe that,"
   Dr. Denning said. So in May, she said, she spent two days
   calling sources at law-enforcement organizations. "I came
   up with over 20 cases -- child pornography, terrorism,
   murder, embezzlement fraud, tax protesters, export
   violations -- and, in some cases, they were able to crack
   it, and others they couldn't," she said.

   What can be done? The Administration's plan is to seek
   voluntary compliance with a "key escrow" plan, which would
   enable citizens to use strong, private cryptography as long
   as a copy of the software "key" were made available to law
   enforcement officials.

   Last week, Mr. Freeh stressed that he preferred a voluntary
   approach. But "if consensus is impossible" on the
   encryption issue, he said, the F.B.I. might consider other
   approaches.

   The debate is certain to heat up as more information about
   Operation Innocent Images becomes known. There are no
   comforting answers, only an echo of advice from a time
   predating the Internet: There is no solution. Seek it
   wisely.

   [End]













Thread