From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: 8cbdf49ef044a15635b8dcec6aba847e98077f90271020dab3f4eb8cb48eb5ab
Message ID: <ae0fb0c404021004f1ef@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1996-07-15 23:12:39 UTC
Raw Date: Tue, 16 Jul 1996 07:12:39 +0800
From: tcmay@got.net (Timothy C. May)
Date: Tue, 16 Jul 1996 07:12:39 +0800
To: cypherpunks@toad.com
Subject: Global Government Access to Keys (GGAK)
Message-ID: <ae0fb0c404021004f1ef@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain
At 6:37 AM 7/15/96, Bill Frantz wrote:
>At 2:05 PM 7/13/96 +0000, Deranged Mutant wrote:
>>Or what if some terrorist was using keys escrowed in a country that
>>sponsered terrorist acts?
>
>Deranged Mutant is absolutely right. There are about 150 (or so)
>governments in the world. When people talk about making keys available to
>government (or law enforcement), always ask, "Which governments can access
>these keys?" If I were a non-French corporation, I would feel distinctly
>nervous if the answer included France. (There are a number of other
>countries where the security services have also been suspected of engaging
>in industrial espionage.)
There are some interesting "public relations" stunts we can use to
undermine support for the concept of GAK:
* Announce in corporate press releases (for some Cypherpunkish company?)
that "As per the laws of the Libyan Arab Jamahiriya, we have provided Col.
Qaddaffi's Office of People's Security with our encryption keys for all
communications passing into, out of, or over Libyan soil."
(This would likely horrify the U.S. security establishment, were it to be
actually true. But it is of course essentially symmetrical with the fear
those in Germany, India, Iraq, etc. would have if told to deposit copies of
their keys with the U.S. National Security Agency or any other "trusted
third party" mandated.)
(I can't resist another aside. Sorry. In addition to the abuse of the
English language with using "escrow" in this warped sense, we now have
"trusted third party" used in a warped sense. "We're not saying _you_ trust
them, we're saying the NSA trusts them.")
* "The U.S. has designated J. P. Morgan and Company as a Designated Trusted
Authority for the deposit of encryption keys for Jewish persons wishing to
communicate in primarily Islamic countries."
(Making the point that any international key escrow scheme which complies
with various nation's laws must collide with American values about such
things. In many Arab countries, Jews are restricted in various ways. Do we
want the government of the U.S. participating in such restrictions? And
what about the Arab boycott? It may be in decline now, but not with all
countries.)
* "The United States Office of Communications Security has turned over to
the government of Singapore a list of all persons suspected of
circumventing Singaporan law regarding encryption."
(ObNazi Reference: One can imagine how a GAK program would've worked during
the Third Reich. Not only would communications have been read, regardless
of the supposed legal protections, but GAK would have been used to compile
contact lists of people to be rounded up. Sort of the way the U.S.
government violated the laws about the U.S. Census to illegally use census
records to locate "Japs" for assignment to concentration camps.)
And so forth, concentrating on the essentially intractable problem of how
to "escrow" keys with foreign governments imimical to Western values.
(The crypto literature, esp. the Proceedings of the Crypto Conference,
circa the mid-80s, refers to this as the "rogue government" problem, esp.
with regard to the issuance of false "is-a-person" credentials. That is,
suppose a Global Identification Infrastructure (GII) is implemented,
consistent with Global Government Access to Keys (GGAK). What about some
countries, whether they be the Free Republic of Libertaria or the Libyan
Arab Jamahiriya, who either refuse to play along or who subvert the system
with false information? What if the United States itself issues false
identities to its secret agents, its informants, and its 60,000+ people in
the so-called Witness Security program?)
There are other aspects of GAK which also collide with basic values. For
example, consider several classes of communications we consider
"privileged":
-- attorney-client discussions, in person or over phone lines.
-- doctor-patient discussions
-- psychiatrist--patient discussions
-- priest--penitent confessions
Are the computer communications (likely in the future to increase, even if
not common now) of these groups to be GAKked? Even with "safeguards," the
priest--penitent relationship will be forever compromised, with neither
side knowing whether some secret policemen is listening.
These are not new issues; we talked about them several years ago. But now
that GAK is being discussed again....
--Tim May
Boycott "Big Brother Inside" software!
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
Return to July 1996
Return to “tcmay@got.net (Timothy C. May)”
1996-07-15 (Tue, 16 Jul 1996 07:12:39 +0800) - Global Government Access to Keys (GGAK) - tcmay@got.net (Timothy C. May)