From: Voters Telecommunications Watch <shabbir@vtw.org>
To: cypherpunks@toad.com
Message Hash: e47c31f9283e7080c530f7cf3c61eda821c019b5321ef44d6fc6b9043b963778
Message ID: <199610022232.SAA06896@panix3.panix.com>
Reply To: N/A
UTC Datetime: 1996-10-03 06:12:39 UTC
Raw Date: Thu, 3 Oct 1996 14:12:39 +0800
From: Voters Telecommunications Watch <shabbir@vtw.org>
Date: Thu, 3 Oct 1996 14:12:39 +0800
To: cypherpunks@toad.com
Subject: INFO: White House Clipper 3.1.1 plan unveiled; continues to ignore privacy concerns
Message-ID: <199610022232.SAA06896@panix3.panix.com>
MIME-Version: 1.0
Content-Type: text/plain
=============================================================================
____ _ _ _
/ ___|_ __ _ _ _ __ | |_ ___ | \ | | _____ _____
| | | '__| | | | '_ \| __/ _ \ _____| \| |/ _ \ \ /\ / / __|
| |___| | | |_| | |_) | || (_) |_____| |\ | __/\ V V /\__ \
\____|_| \__, | .__/ \__\___/ |_| \_|\___| \_/\_/ |___/
|___/|_|
WHITE HOUSE RELEASES CLIPPER 3.1.1 PLAN; SAME OLD STORY
EXCLUDES CONGRESS; PROPOSAL DRIVEN BY LAW ENFORCEMENT
NO CONCERNS FOR PRIVACY OF INTERNET USERS
http://www.crypto.com/
Date: October 2, 1996
URL:http://www.crypto.com/ crypto-news@panix.com
If you redistribute this, please do so in its entirety,
with the banner intact.
-----------------------------------------------------------------------------
Table of Contents
Introduction
White House announces new encryption proposal
Text of White House announcement
Response from Senator Patrick Leahy (D-VT)
Response from Senator Conrad Burns (R-MT)
How to receive crypto-news
Press contacts
-----------------------------------------------------------------------------
INTRODUCTION
Interested in spreading the word in Congress about privacy rights and
encryption? Want to help Congress fight the White House's poorly
crafted, dictatorial, encryption policies?
WWW.Crypto.Com has opened up a new service, "Adopt Your Legislator",
which allows you to add your name to a targeted list for contacting
your legislators.
Whenever your legislator is teetering on an issue related to privacy or
encryption, we'll notify you directly for a focused call-in/write-in
campaign.
It's fast, it's easy, it's like having your own personal activist. Sign
up at http://www.crypto.com/ or through one of the many fine organizations
below that have links to the adoption pages:
Electronic Frontier Foundation (http://www.eff.org/)
Center for Democracy and Technology (http://www.cdt.org/)
Voters Telecommunications Watch (http://www.vtw.org/)
Look for the "My Lock, My Key" icon and follow it to help fight the
new Clipper 3.1.1 proposal and fight for your privacy!
-----------------------------------------------------------------------------
WHITE HOUSE ANNOUNCES NEW ENCRYPTION PROPOSAL
The White House announced their new encryption proposal yesterday. There are
several main points that have come out now, or will appear soon:
-jurisdictional move from State to Commerce for export applications
with a Department of Justice role
-temporary increase of key lengths to 56 bits, provided future key
escrow functionality is promised,
-joint effort with companies such as IBM to produce key escrow
products,
-increased purchasing of key recovery products by Federal agencies
to stimulate the creation of a key escrow industry, and
-legislation to legitimize the key escrow recovery market.
There are absolutely no plans to permanently increase the key length of
unescrowed encryption products. Companies who do not have an escrow plan
in place by the end of the two year temporary increase will lose their
export status.
This proposal has a number of significant problems, including:
DOMINATED AND DRIVEN BY LAW ENFORCEMENT INTERESTS
This Clipper proposal, like the three previous ones, has been driven
entirely by the concerns of law enforcement. This should come as no surprise
to even the most optimistic industry or public interest advocates.
As Senator Leahy (D-VT) says in his statement below:
Internet users themselves -- not the FBI, not the NSA, not
any government regulator -- should decide what encryption method
best serves their needs.
JUSTICE ROLE IN EXPORT APPLICATIONS A BLATANT ATTEMPT AT DOMESTIC CONTROL
OF CRYPTOGRAPHY
By allowing Justice a seat at the table in approving export applications,
the Clinton Administration has clearly demonstrated that they wish to
control the domestic cryptography market. Justice will certainly veto
the export applications of any products which they are not able to
break either by brute force or without key escrow. This will probably
end up being an even worse route for companies wishing to export
products.
TEMPORARY INCREASE IN KEY LENGTH IS NOT SUFFICIENT
The original Clipper proposal would have allowed encryption with
80 bits keys. Clipper II bandied about the number 64 as the acceptable
level of encryption. With Clipper 3.1.1, that amount has been reduced to
56 bits for the next two years. This is clearly too little too late.
CONGRESS WAS NOT CONSULTED
Congress has clearly stated their intentions with regards to the White
House policy, and this year will certainly not be the end of their
involvement in the issue. Senator Burns (R-MT) summarizes it well:
This debate is not over by any stretch of the imagination. The
administration has prevented Congress from weighing in on this issue just
as support was building for a legislative solution. I intend to move
forward with pro-encryption legislation in the next Congress.
You can continue to follow this issue at http://www.crypto.com/ !
-----------------------------------------------------------------------------
TEXT OF WHITE HOUSE ANNOUNCEMENT
THE WHITE HOUSE
Office of the Vice President
FOR IMMEDIATE RELEASE
CONTACT: 456-7035
TUESDAY, October 1, 1996
STATEMENT OF THE VICE PRESIDENT
President Clinton and I are committed to promoting the growth of electronic
commerce and robust, secure communications worldwide while protecting the
public safety and national security. To that end, this Administration is
consulting with Congress, the information technology industry, state and
local law enforcement officials, and foreign governments on a major
initiative to liberalize export controls for commercial encryption
products.
The Administration's initiative will make it easier for Americans to use
stronger encryption products -- whether at home or abroad -- to protect
their privacy, intellectual property and other valuable information. It
will support the growth of electronic commerce, increase the security of
the global information, and sustain the economic competitiveness of U.S.
encryption product manufacturers during the transition to a key management
infrastructure.
Under this initiative, the export of 56-bit key length encryption products
will be permitted under a general license after one-time review, and
contingent upon industry commitments to build and market future products
that support key recovery. This policy will apply to hardware and software
products. The relaxation of controls will last up to two years.
The Administration's initiative recognizes that an industry-led technology
strategy will expedite market acceptance of key recovery, and that the
ultimate solution must be market-driven.
Exporters of 56-bit DES or equivalent encryption products would make
commitments to develop and sell products that support the key recovery
system that I announced in July. That vision presumes that a trusted party
(in some cases internal to the user's organization) would recover the
user's confidentiality key for the user or for law enforcement officials
acting under proper authority. Access to keys would be provided in
accordance with destination country policies and bilateral understandings.
No key length limits or algorithm restrictions will apply to exported key
recovery products.
Domestic use of key recovery will be voluntary, and any American will
remain free to use any encryption system domestically.
The temporary relaxation of controls is one part of a broader encryption
policy initiative designed to promote electronic information security and
public safety. For export control purposes, commercial encryption products
will no longer be treated as munitions. After consultation with Congress,
jurisdiction for commercial encryption controls will be transferred from
the State Department to the Commerce Department. The Administration also
will seek legislation to facilitate commercial key recovery, including
providing penalties for improper release of keys, and protecting key
recovery agents against liability when they properly release a key.
As I announced in July, the Administration will continue to expand the
purchase of key recovery products for U.S. government use, promote key
recovery arrangements in bilateral and multilateral discussions, develop
federal cryptographic and key recovery standards, and stimulate the
development of innovative key recovery products and services.
Under the relaxation, six-month general export licenses will be issued
after one-time review, contingent on commitments from exporters to explicit
benchmarks and milestones for developing and incorporating key recovery
features into their products and services, and for building the supporting
infrastructure internationally. Initial approval will be contingent on
firms providing a plan for implementing key recovery. The plan will
explain in detail the steps the applicant will take to develop, produce,
distribute, and/or market encryption products with key recovery features.
The specific commitments will depend on the applicant's line of business.
The government will renew the licenses for additional six-month periods if
milestones are met. Two years from now, the export of 56-bit products that
do not support key recovery will no longer be permitted. Currently
exportable 40-bit mass market software products will continue to be
exportable. We will continue to support financial institutions in their
efforts to assure the recovery of encrypted financial information. Longer
key lengths will continue to be approved for products dedicated to the
support of financial applications.
The Administration will use a formal mechanism to provide industry, users,
state and local law enforcement, and other private sector representatives
with the opportunity to advise on the future of key recovery. Topics will
include:
. evaluating the developing global key recovery architecture
. assessing lessons-learned from key recovery implementation
. advising on technical confidence issues vis-a-vis access to
and release of keys
. addressing interoperability and standards issues
. identifying other technical, policy, and program issues
for governmental action.
The Administration's initiative is broadly consistent with the recent
recommendations of the National Research Council. It also addresses many
of the objectives of pending Congressional legislation.
-----------------------------------------------------------------------------
RESPONSE FROM SENATOR PATRICK LEAHY (D-VT)
STATEMENT OF SENATOR LEAHY ON THE
ADMINISTRATION'S NEW ENCRYPTION INITIATIVE
October 1, 1996
The timing of the Administration's announcement on encryption,
within hours of the Congress' likely adjournment, is unfortunate.
The Administration needs to work with Congress to develop a
consensus on a national encryption policy that takes account of
the privacy, law enforcement and competitiveness concerns of our
Nation's citizens and businesses.
Taking unilateral steps will not resolve this issue, but
instead could delay building the consensus we so urgently need.
This issue simply cannot by resolved by Executive fiat.
While technology should not dictate policy, particularly when
our public safety and national security interests are at issue,
any policy we adopt must protect our privacy. As the
Administration and industry rush to find an alternative to
unbreakable encryption, they should take heed that any solution
which fails to protect the Fourth Amendment and privacy rights of
our citizens will be unacceptable.
That is why, with bipartisan support, Senator Burns and I
introduced legislation in March that set out privacy safeguards
to protect the decoding keys to encrypted communications and
stringent legal procedures for law enforcement agencies to get
access to those keys.
In this plan, the Administration is directing the resources of
our high-tech industry to develop breakable, rather than
unbreakable, encryption. But no one is yet clear about who will
be legally allowed to break into encrypted messages, and under
what circumstances. These are questions that have to be answered
not only with our own government but also with foreign
governments. The weakest link in a key recovery system may be
the country with the weakest privacy protections. Internet users,
who can send messages around the globe seamlessly, do not want
the privacy of their encrypted communications to be at the mercy
of a country that ignores the Fourth Amendment principles we
enjoy here.
These are significant privacy and security concerns not
answered by the Administration's plan.
Even without reading the fine print, the general outline of
the Administration's plan smacks of the government trying to
control the marketplace for high-tech products. Only those
companies that agree to turn over their business plans to the
government and show that they are developing key recovery
systems, will be rewarded with permission to sell abroad products
with DES encryption, which is the global encryption standard.
Conditioning foreign sales of products with DES on development
of key recovery systems puts enormous pressure on our computer
industry to move forward with key recovery, whether their
customers want it or not.
Internet users themselves -- not the FBI, not the NSA, not
any government regulator -- should decide what encryption method
best serves their needs. Then the marketplace will be able to
respond. The Administration is putting the proverbial cart before
the horse, by putting law enforcement interests ahead of every
one elses.
But that is not the only catch in the Administration's plan.
Permission to export DES will end in two years. Allowing American
companies to sell DES overseas is a step long overdue. Given the
fact that a Japanese company is already selling "triple DES", one
might say this step is too little, too late. Threatening to pull
the plug on DES in two years, when this genie is already out of
the bottle, does not promote our high-tech industries overseas.
Does this mean that U.S. companies selling sophisticated computer
systems with DES encryption overseas must warn their customers
that the supply may end in two years? Customers both here and
abroad want stable suppliers, not those jerked around by their
government.
The most effective way to protect the privacy and security of
our on-line communications is to use encryption technology. Every
American should be concerned about our country's policy on
encryption since the resolution of this debate will affect
privacy, jobs and the competitiveness of our high-tech
industries.
-----------------------------------------------------------------------------
RESPONSE FROM SENATOR CONRAD BURNS (R-MT)
For immediate release: Contact: Matt Raymond
Tuesday, October 1, 1996 (202) 224-8150
Randall Popelka
(202) 224-6137
Burns Cautious on Encryption Plan
Oversight Vowed for Plan That "Raises More Questions Than It Answers"
WASHINGTON, D.C. _ Montana Senator Conrad Burns today reacted
cautiously to plans by the Clinton administration to loosen restrictions
on exports of stronger encryption for computer software and hardware. He
also criticized the White House for its failure to negotiate on the
cornerstone of its proposals: that companies must agree to "escrow" their
decryption keys.
"I have no doubt that it was the pressure of Congress, high-tech
companies and privacy advocates that dragged the White House kicking and
screaming into agreeing that export restrictions should be eased," said
Burns, chief sponsor of the Pro-CODE bill, which would loosen
restrictions on encryption exports and prohibit government-mandated key
escrow. "However, I can't say I'm pleased with a process that has all
but excluded Congress and the public from the discussion.
"The administration's insistence on key escrow as a condition of
lifting these restrictions has never been negotiable. Meanwhile, what
choice do these companies have but to yield as their global
competitiveness withers on the vine?
"This plan raises even more questions than it answers, such as,
what about the widespread availability of much stronger encryption than
that which is allowed by the White House? How do we deal with rapid
changes in technology that will inevitably render the 56-bit limit
obsolete? The devil is definitely in the details.
"This debate is not over by any stretch of the imagination. The
administration has prevented Congress from weighing in on this issue just
as support was building for a legislative solution. I intend to move
forward with pro-encryption legislation in the next Congress.
"I will also push for vigorous oversight of the administration's
plan in the Commerce Committee." The Senate Commerce Committee, of which
Burns is a member, has jurisdiction over the Commerce Department. The
administration has stated its intent to transfer export licensing
authority over encryption from the State Department to the Commerce
Department.
-----------------------------------------------------------------------------
HOW TO RECEIVE CRYPTO-NEWS
To subscribe to crypto-news, sign up from our WWW page (http://www.crypto.com)
or send mail to majordomo@panix.com with "subscribe crypto-news" in the body
of the message. To unsubscribe, send a letter to majordomo@panix.com with
"unsubscribe crypto-news" in the body.
-----------------------------------------------------------------------------
PRESS CONTACT INFORMATION
Press inquiries on Crypto-News should be directed to
Shabbir J. Safdar (VTW) at +1.718.596.2851 or shabbir@vtw.org
Jonah Seiger (CDT) at +1.202.637.9800 or jseiger@cdt.org
-----------------------------------------------------------------------------
End crypto-news
=============================================================================
Return to October 1996
Return to “Voters Telecommunications Watch <shabbir@vtw.org>”
1996-10-03 (Thu, 3 Oct 1996 14:12:39 +0800) - INFO: White House Clipper 3.1.1 plan unveiled; continues to ignore privacy concerns - Voters Telecommunications Watch <shabbir@vtw.org>