From: Black Unicorn <unicorn@schloss.li>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: 55509c3fa4fb802ab59d830490870ed3955abdcb989943ad219e0b431582a63e
Message ID: <Pine.SUN.3.94.961019135625.19884J-100000@polaris>
Reply To: N/A
UTC Datetime: 1996-10-19 21:42:09 UTC
Raw Date: Sat, 19 Oct 1996 14:42:09 -0700 (PDT)
From: Black Unicorn <unicorn@schloss.li>
Date: Sat, 19 Oct 1996 14:42:09 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: ABA Conference on Law Enfrocement and Intelligence - Debrief
Message-ID: <Pine.SUN.3.94.961019135625.19884J-100000@polaris>
MIME-Version: 1.0
Content-Type: text/plain
As I got sidetracked and it has been awhile, I am reposting the entire
summary along with the second half, which I just finished.
Typos are all mine.
:
The American Bar Association Standing Committee on Law and
National Security - Law Enforcement and Intelligence Conference -
Debrief
The ABA's Standing Committee on Law and National Security is one
of the more successful Committees to come out of the ABA. It's
conferences and early morning breakfast briefings and lectures
are attended by some of the leading experts in the fields of
National Security, Law Enforcement, and Intelligence and no small
number of the beltway power elite.
I'm not sure if many people outside the legal community
understand the degree to which attorney's have impacted and
thrived in both the law enforcement and the intelligence
communities. In fact many, if not most, CIA case officers and
station chiefs, as well as field operatives, are attorneys or
have law degrees. Other intelligence organizations are no
different. It should come as little surprise then if a committee
of the ABA should happen to attract a surprising amount of
intelligence professionals.
This conference was no exception. Spooks, Feds, Legislators, and
even a few Kooks were in attendance. Members of the British,
American, Canadian, and German intelligence communities were in
attendance. A colleague and I attended the majority of the
conference and except where noted the reflections below are a
summary of our collective notes and thoughts on the subject
matter discussed. I'm taking a broad view of relevance to
cypherpunks, but I will omit that which seems clearly not of
direct or somewhat indirect interest.
Part One:
A Changed World for Law Enforcement and Intelligence in the 21st
Century
Thursday, September 19
7:45 AM Registration and Continental Breakfast
8:15 AM Welcome Remarks
Paul Schott Stevens
Chair
ABA Standing Committee on Law and National Security
8:30 AM I. An Overview of a Changing World.
*The Traditional Relationship of Law Enforcement, Foreign
Intelligence and National Security (1945-1995):
*How Have Other nations Balanced Legal and National Security
Requirements and Responded to a Changed World.
*The Changed Threats to U.S. National Security- New Problems and
Priorities
Elizabeth R. Rindskopf
Bryan Cave
Former General Counsel, Central Intelligence Agency
Member, Standing Committee on Law and National Security
Ms. Rindskopf outlined the three classic "periods" of
intelligence community and mission development in U.S. history
and set the stage for the discussions to follow.
Interesting subjects she did touch on included section 715 of the
Senate intelligence bill. The section allows the law enforcement
community to request assistance from foreign intelligence in
collection efforts on foreigners outside of the United States.
The BNC and BCCI scandals were discussed as a backdrop of the
hazards of law enforcement and intelligence separation.
Zoe Baird
Senior Vice President and General Counsel
Atena Life and Casualty Company
Member, Standing Committee on Law and National Security.
Ms. Baird discussed the dangers presented by globalization and
new technologies. She highlighted the point that crime
globalization often follows corporate globalization and the
manner in which a single individual's ability to cause harm has
increased in scope (The NYNEX Hack). Also interesting was her
discussion of the manner in which the more organized elements of
criminal activity worked to take advantage of the very open
society in the United States (Fund raising, publications,
anonymous communications).
Those activities once merely violations of criminal law are, she
argued, now increasingly national security concerns and that
national security events impact elections in very dramatic and
direct ways (Atlanta and Israel bombings as examples).
Crime, she pointed out, gets about an 80% response in the polls,
where as "National Security and Foreign Policy" get perhaps a 3%
response. Merging these elements together serves an
administration. She also pointed out the trend toward making
these issues generally more accessible to the public.
(Specifically by use of language. "Transnational threats"- which
was a term of art for non-state terrorism and organized crime-
becomes "Global Crime" or "Global Lawlessness."
Ms. Baird ended by asking how the firewalls between Law
Enforcement and Intelligence could be rebuilt with these new
considerations in mind.
I considered her a balanced cynic. She managed to get across
some very realpolitik notions without much murmuring from the
(limited) civil libertarian crowd.
David Bickford
Former Legal Adviser to the British Intelligence Services (MI5-
MI6)
Mr. Bickford has in past served as a conduit between British
Intelligence services and the United States. He is well known
and respected among the American and European Intelligence
communities. Knowing Mr. Bickford I can also say that he pays a
great deal of attention to who his audience is and speaks to
their interests with disarming accuracy. His discussion is
important because it is a good insight into what the policy
makers in the United States are looking at.
He began by highlighting the new international nature of crime.
No longer is it confined to power blocs. "Multi-jurisdictional
illegality" is increasingly a concern. New highspeed
communications channels are a contributor and organized crime
groups are possessed of extremely advanced administration
abilities. They are leaner and meaner because they use
computers, encryption, communications, and use up less resources
in administration. The ability to make the organization smaller
also makes it harder to penetrate. In this environment,
international cooperation is essential. He called for more
active and expansive extraterritorial jurisdiction for certain
crimes, and lamented his own country's lack of enthusiasm for
this concept though they are slowly "coming around."
His solutions included the labeling of organizations, even when
they are not geographically based, as "illegal international
organizations" and using all means to combat them. He envisions
a wide cooperation by the G7 to accomplish this, leaving such
organizations with no safe haven. Sanctions regimes formerly
employed only as against "rogue states" and countries in disfavor
should be employed to destroy these illegal international
organizations wherever they are. He indicated that the other G7
states should build on the recent Clinton Executive Order which
seizes the assets of such organizations which may be located in
the jurisdictions of the G7. He called for measures to deny
these assets access to the major securities and international
finance markets and proposed that only organizations like the NSA
could confront and complete these tasks. Intelligence, he
argued, is the only organization that can keep up with
international crime and as a result there should be developed
court processes to introduce intelligence into criminal cases
while protecting the more sensitive information (sources and
methods) as irrelevant. "Evil men" have taken an "early lead."
$500 billion a year comes out of the United States alone in money
laundering. 400 billion in assets is attributed to drug cartels,
80% of which are Cali Cartel assets. There are over 250
international Russian criminal organizations currently operating.
Mr. Phillip Heymann
James Barr Ames Professor and Director,
Center for Criminal Justice
Harvard Law School
Member: Standing Committee on Law and National Security
[Didn't find his comments particularly relevant]
II. Political Challenges in the World Environment
*Breakup of the U.S.S.R.
*Loss of National Sovereignty and Control by Nation States
*Erosion of National Legal Systems
Military Threats at the Subnational Level:
The Terrorism Dilemma
(This looked very much like the section given to the Soviet
Analysts, who no longer have much of a job to do).
Mr. Morton H. Halperin
Senior Fellow
Council on Foreign Relations
Former Special Assistant to the President and
Senior Director for Democracy, National Security Council
[Canceled]
Mr. Peter Rodman
Director, National Security Programs
Nixon Center for Peace and Freedom
and Former Deputy Assistant to the President for National
Security Affairs
Mr. Rodman discussed the new "trans-national areas." Terrorism,
corruption, economic and criminal activity. He discussed the
side effects of collapsing empires (the rise of organized crime
to enforce property and contract rights that cannot be enforced
by the government, the shift of power to the local from the
regional and executive areas) and discussed, in this context, the
importance of avoiding petty squabbles over issues like trade and
the like because they threaten the more important strategic
cooperation that will be necessary to battle global and
transnational criminal activity.
Ms. Jessica E. Stern
Consultant
Lawrence Livermore National Laboraory and
Former Director, Russian, Uklrainian and Eursian Affairs,
National Security Council
Ms. Stern discussed the severe proliferation problems presented
by a weak Russia, particularly the weakening of MPCA (Material
Protection Control and Accounting).
11:15 AM III. Technical and Practical Changes in the Relevant
World Environment
*Global Technologies Emerge
*"Equal Access" to Advanced Technology by State and Private
Actors
* Change in Size, Type and Location of National Security Threats:
Challenge for Modern Intelligence and Law Enforcement
Stewart Baker
Steptoe and Johnson
Former General Counsel, National Security Agency
Member, Standing Committee on Law and National Security
Mr. Baker's remarks were brief, but he discussed the evening of
the odds with respect to government and private organizations
caused by technology.
Admiral William O.. Studeman
United States Navy (retired)
Former Acting Director of Central Intelligence
Admiral Studeman discussed "Information Warfare," pointing out
specifically that advanced societies were more vulnerable because
of their financial, banking and revenue system's dependence on
computer. Power, air traffic control, public safety and media
were also mentioned in passing.
Admiral Studeman went on to call for more intense secrecy in law
enforcement (not intelligence) as to collection methods and new
technology. He called passionately for funding for the DigiTel
program as well as a "key escrow" policy.
Anthony Oettiger
Chairman, Program on Information Resources Policy
Harvard University
Mr. Oettinger was perhaps the only moderate speaker in the
conference. He discussed Executive Order 13010 (establishing the
Critical Infrastructure Protection organization) and called for
more private sector input in policy making (Banks, markets,
businesses want to make their own security arrangements, and are
not very interested in paying much attention to the suits at
their door who claim 'Hi, we're from the government, we are here
to help.'
He pointed out the difference between the movements in Airline
Security (which is drifting from privately maintained, to
publicly maintained) and Internet security (which is doing the
reverse).
He called for reasoned response to the new threats which did not
commit expensive intelligence and law enforcement resources to
combat the single hacker. Proper threat assessing is important,
and intelligence should be used to pinpoint the weak points.
Walter Pincus
National Security Affairs Reporter
The Washington Post
Mr. Pincus asked if (a lovely analogy to chicken little and
osterages with their heads in the sand). His most interesting
remarks regarded the wisdom of dedicating such substantial
resources to repell non-strategic efforts to disrupt networks.
(Hackers, lone gunmen, etc.) He questioned. Doesn't, afterall,
a strategic attack require much more preperation? Should we
really allow the personality of e.g., Louis Freeh, who has the
capital dazzled from his glow, to direct these resources?
12:30 PM Luncheon
John Deutche
Director, Central Intelligence Agency
[Cancelled in the wake of the investigation into alleged CIA drug
connections in California]
Part Two:
The Implications of a Changed World for a Set of Critical
Decisions
2:00 PM IV. Protections Against New High Tech Dangers; Problems
of Encryption, Information Warfare and Computer Theft
Stewart Baker:
Mr. Baker, considering what his position once was, was surprisingly
mellow. There wasn't much warning for law enforcement, he commented.
Cryptography lends itself to criminal activity and subversive warfare.
It's hard to reherse attacks because you have to do it on real live
systems.
For defenses, he suggests the following:
1. Monitor and protect government systems.
2. Launch attacks, both on our systems and on others. (!)
3. Take note that attacks on private systems are the most worrisome.
(Financial institutions, exchanges, utilities)
There is a manifest mistrust between government and private sector
business. Private parties are unlikely to accept help from government.
The liklihood of government systems being adopted is slim.
Banks, for example, make high security expenditures and the choice of
system is best left up to them. (!)
There are, however, market failures in the private sector.
1. No one in the private sector bothers to protect against a simutanious
attack on power and telephone service. This is HIGHLY unlikely to happen
by chance, but by design it is almost certain to happen in an attack.
2. Reporting of incidents. Incidents are rarely if ever reported by
private sector interests. (Flight of funds on reporting, bank runs, lost
of customers all make reporting incidents difficult to justify).
Collection or REQUIRED disclosure, Mr. Baker argues, is required.
3. Some minimum recovery mechanism is required. There is no independent
information system for private sector interests because there is very
little financial incentive to build one. How will the civilian system be
recovered after an attack?
Lee Bollinger
Provost
Dartmouth College
Mr. Bollinger discussed 1st Amendment issues. He had, however, a strange
take on the way they should be broken down. Namely:
Pro Crypto: ITAR as prior restraint. Yes the 1st Amendment is painful
sometimes. So what? This is the cost of a freedom of speech culture.
Anti Crypto: This is a foreign affaris matter. Courts are not fit to make
analysis here. This is not the pentagon. It is "Technical" data and
therefore outside 1st Amendment scope.
Kate Martin
Director, Center for National Security Studies.
The Center for National Security Studies used to be a section of the
ACLU, but has since broken off and gone its own way.
Ms. Martin pointed out that the FBI shouldn't WANT to get involved in the
sources and methods problems that taking intelligence information would
present. The confrontation clause will present problems for the FBI if it
gets information which fall under intelligence "Sources and methods" and
then tries to use it in court. (Greymail - Where the defense calls for
sensitive records necessary to the defense and if they get a ruling in
favor of the discovery, the government either has to make national
security documents public or drop the charges).
She also pointed out that in the current draft of the anti-terrorist bill,
the FBI can "task" the CIA to make collections abroad. The CIA could then
break into a foreign residence, and look for evidence, find evidence
implicating a previously unknown American citizen in e.g., drug smuggling.
The FBI could prosecute the evidence, which was obtained without warrant
and would constitute illegal search in the United States, and the U.S.
Citizen would have, under current 4th amendment standards, NO STANDING to
move for exclusion of the evidence found by the CIA.
Howard Shapiro
General Counsel
Federal Bureau of Investigation
Mr. Shapiro was quite slippery. He spent most of his time dodging Ms.
Martin's barbs by indicating that the FBI tended to err in favor of
applying the constitution even in extraterratorial cases (Achille(?) Laro,
where the terrorists were read their rights even though outside of U.S.
Territorial Jursidiction) and the the FBI would respect limits even if not
required to. Rather weak argument, quite well presented.
Suzanne Spaulding
General Counsel
U.S. Senate Select Committee on Intelligence
[Not Present - Ms. Spaulding was doing markup on the new Intel Bill (Since
signed) at the time, though she arrived later]
4:45 Adjournment
6:30 Reception and Dinner
Speaker Ernest R. May
Charles Warren Professor of History
The John F. Kennedy School of Government
Harvard University
[My associate and I were forced to miss this session]
Friday, September 20, 1996
8:00 AM Continental Breakfast
8:30 Overview
Philip B. Heymann
8:40 VI. New Uses for Intelligence as a Necessary Arm of U.S. Policy
Presentation:
R. James Woolsey
Shea & Gardner
Former Director of Central Intelligence
Mr. Woolsey made some very interesting comments. He called rather
passionately for "Key Escrow," more potent funding for "DigiTel" but also
suggested that perhaps the dictator that was using modern encryption
"might not be hiding as much as he thinks he is."
10:15 AM VII. Law Enforcement and Intelligence
* Can Intelligence Technical Capabilities Better Support Law Enforcement
Objectives: What are the Legal and Practical Limits?
* Should Covert Action and Technical Intelligence Gathering be Available
to Law Enforcement?
* Rethinking Jurisdicitonal Lines, Roles and Responsibilites: Are New
Structures Required?
* The Law Enforcement and Intelligence Relationship; Past, Present and
Future.
* Can Common Standards be Achieved for Collection and Oversight?
Moderator: The Honorable John H. Shenefield
Morgan, Lewis & Bockius
(Introductions and short statements only)
Presentations:
Mark M. Richard
Deputy Assistant Attorney General
Criminal Division
U.S. Department of Justice
Mostly discussion of anti-drug efforts but a few interesting comments:
Internet banking is on the radar screen and there may soon be an
entirely seperate department of DoJ which addresses internet banking
crime. DoJ is clearly leading the effort here. Intelligence agencies
less so.
Jeffrey H. Smith
General Counsel
Central Intelligence Agency
(Soon to return to Arnold and Porter)
A few rather vague quesitons came up about anonymous transactions and
internet came up. The Attorney general "is putting together structures to
attack that." Rather ominous.
Michael A. Vatis
Associate Deputy Attorney General
Office of the Deputy Attorney General
U.S. Department of Justice
Vatis is a young shining star in Justice, a Gorelick protege and likely to
be the most dangerous individual to cypherpunks in the coming years if he
stays with justice. Vatis understands remailers, encryption, PGP, even
mentioned "mixmaster" and so forth specificlly. He is sly, knows just
when to shut up and is probably the front man on the DoJ attempt to attack
remailers and anonymous communications in general. He is a real problem
for cypherpunks and the party is clearly over.
Jonathan M. Winer
Deputy Assistant Secretary of State for International Narcotics and Law
Enforcement Affaris
Winer's points of interest to the list were money laundering related. The
tactic, he indicated, is to get foreign governments to adopt legislation
to make money launderers move elsewhere. (The carrot and the stick
approach is used). He did acknowledge the need for money laundering in
the intelligence community, and urged, vaguely, for cooperation as money
launding regulation "is an increasingly important priority."
He discussed, vaguely, the CIA "tasking" issues brough up by Ms. Martin.
11:45 AM Luncheon
Speaker:
Jamie S. Gorelick
Deputy Attorney General of the United States
Ms. Gorelick most tooted everyone's horn for the increasing cooperation
that between the various communities.
-end-
--
I hate lightning - finger for public key - Vote Monarchist
unicorn@schloss.li
Return to October 1996
Return to “Black Unicorn <unicorn@schloss.li>”