From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: f9dea1f84b603b1c4c46b91c21c308478580828003737cdbb874650ce635b7db
Message ID: <1.5.4.32.19961216125254.0067e118@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-12-16 12:56:26 UTC
Raw Date: Mon, 16 Dec 1996 04:56:26 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Mon, 16 Dec 1996 04:56:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: NYT: Faulty Crypto Policy
Message-ID: <1.5.4.32.19961216125254.0067e118@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The New York Times, December 16, 1996, p. A14.
Another Faulty Encryption Policy [Editorial]
The Clinton Administration has issued its third plan in as
many years to keep powerful encryption programs for
telephone and computer messages out of the hands of
international terrorists and criminals. But this latest
plan to control the export of encryption software, like the
two before it, is unworkable and risks trampling on privacy
rights and harming American software firms.
Encryption in the hands of criminals unquestionably makes
law enforcement hard. But the greatest use of encryption is
by banks and other legal businesses that need to transmit
confidential data without fear of interception. In
legitimate hands, encryption helps to prevent crime.
The Administration first sought to steer all Americans
toward an encryption standard that Washington would design,
thus preserving the Government's ability to tap phone
calls. But after sharp criticism of Government snooping,
the Administration retreated to a policy, still rejected by
most privacy advocates and software firms, aimed at exports
of encryption programs. The newly released regulations,
which were supposed to implement the October policy, in
fact make a flawed policy even worse.
The one consistent thread through the Administration's
plans is commitment to an encryption standard that uses
mathematical "passwords" to scramble messages. The
Government would then have the technical capacity to
recover passwords, upon court order, and unscramble the
phone or computer message.
But the new policy will not succeed abroad. The
Administration insists it needs not only to unscramble
stored computer files but also to tap phone and computer
messages, without the caller's knowledge, as they are
transmitted. That would in effect require the foreign
purchaser of American software to deposit its passwords
with a reputable outside party -- a government agency, a
bank or the computer firm from which it bought the software
-- which would relinquish them upon court order and without
notifying the user. What foreign company or individual will
purchase software that is prey to undisclosed Government
snooping when they can, buy equally powerful encryption
from foreign firms that offer no such path for
eavesdropping?
The plan runs into other insolvable problems. It does not
propose prohibiting powerful encryption software for
domestic purchase, where such programs are constitutionally
protected and already in wide use. Thus anyone could, with
a few key strokes, send the domestically available programs
over the Internet to Europe and beyond.
The Administration also fears that software firms will
write their programs so that the powerful domestic versions
communicate readily with the easier-to-tap export products.
If so, the technical result would be that criminals here
and abroad could communicate out of reach of Government
wiretaps. The Administration proposes to solve that problem
by prohibiting software firms from providing easy
communication between their domestic and export products.
But that would make American export encryption programs
unsellable abroad.
A panel of the National Research Council recommended that
Washington drop export restrictions on encryption software
already available abroad, beef up the F.B.I.'s ability to
crack private encryption codes and support private efforts
to develop high quality encryption to stop illegal
eavesdropping. Those steps will improve communications
security and will not put Government law officers in
corporate boardrooms, open E-mail to instant wiretaps or
send foreign customers toward European and Asian software
firms.
[End]
Return to December 1996
Return to “John Young <jya@pipeline.com>”
1996-12-16 (Mon, 16 Dec 1996 04:56:26 -0800 (PST)) - NYT: Faulty Crypto Policy - John Young <jya@pipeline.com>