1997-06-25 - NYT article on Kerrey bill (LONG)

Header Data

From: Ariel Glenn <ariel@watsun.cc.columbia.edu>
To: cypherpunks@cyberpass.net
Message Hash: 8d69e560447d60dad8f527bc9cbdbd0609ba2dd78c6c723dba586e42057a2f3c
Message ID: <199706251343.JAA24112@stealth.cc.columbia.edu>
Reply To: N/A
UTC Datetime: 1997-06-25 13:57:57 UTC
Raw Date: Wed, 25 Jun 1997 21:57:57 +0800

Raw message

From: Ariel Glenn <ariel@watsun.cc.columbia.edu>
Date: Wed, 25 Jun 1997 21:57:57 +0800
To: cypherpunks@cyberpass.net
Subject: NYT article on Kerrey bill (LONG)
Message-ID: <199706251343.JAA24112@stealth.cc.columbia.edu>
MIME-Version: 1.0
Content-Type: text/plain



Encryption Bill Would Restrain
Next Generation of the Internet

By PETER WAYNER

The users of the next generation of the Internet will be forced to 
turn over the keys to their
encrypted computer data to government authorities if a bill currently
before the Senate passes. 

Senator Bob Kerrey, the Nebraska Democrat who cosponsored the
measure, said in an interview Monday that the bill would require that
the authorities be able to recover such keys in the next generation
network, called Internet 2, an advanced, high-speed research project
that is being carried out in more than 100 universities across the
country. 

The bill does not mention Internet 2 specifically but simply refers to
data traveling on all networks created "with the use of Federal funds
for transaction of government business." Users of the current Internet would 
have the freedom to
choose whether to notify the authorities of the keys. 

Key recovery is a controversial proposal aimed at giving fast 
access to encrypted data to the
branches of the government responsible for law enforcement and national 
defense. These branches
worry that widely deployed, easy-to-use encryption technology will make it 
simple for criminals
and terrorists to cloak their communications and make it impossible for the 
police to use
surveillance to gather evidence. 

Others, including computer scientists, civil libertarians
and even some law enforcement officials, worry that
such a proposal would concentrate too much power in
the key recovery centers and that this makes the nation
vulnerable to both attack by terrorists and abuse by
those entrusted with the power. 

A government-approved key-recovery system, as
imagined by the bill, would be created by an organization
that would store the keys to unlock the data encrypted
by members of the organization. It could be either a
corporation, a university or a group of private citizens. 

The key recovery official for the organization, known as the "agent," 
would be responsible for
decrypting the data and providing a "plaintext" version to the police in 
response to a subpoena, a
court order, a warrant or a letter from an attorney general. The bill would 
remove the civil and
criminal liability from the agents for responding to such queries but would 
impose penalties of up to
$100,000 on those who fail to comply. 

The bill, called the Kerrey/McCain act after its sponsors, Kerrey and
John McCain, the Arizona Republican who is chairman of the
Commerce Committee, is officially known as the Secure Public
Networks Act. It would require all new federally financed networks
or computer systems to use government-approved key-recovery
technology. 

The Internet 2 is a cooperative effort involving 109 universities to
build a demonstration version of a very-high-speed Internet in order
to aid scientific research and to push the state of network technology.
Its current embodiment is financed by a mixture of grants from the
National Science Foundation and President Clinton's Next
Generation Internet initiative. 

The greatest problem facing the users of Internet 2 and other future
federally financed networks will be defining where the government
control begins and where it ends. In the interview, Kerrey admitted
that this was a challenging problem and said that the government
must be flexible in determining the answer. His legislation would
create an Information Security Board that would ultimately be
responsible for tuning the application of the law. 

"The law is written so we can get regular look-backs and decide
what's not working," he said. "We know the current law isn't right.
So let's change the law and get some good flexibility." 

The current law controls only the export of encryption technology.
People in the United States have been free to use encryption to
protect their secrets since before the days of the American
Revolution. Thomas Jefferson, for instance, dabbled in cryptography
and even personally specified the encryption system to be used by
Lewis and Clark in their expedition. 

For this reason, Senator Kerrey expects that people will challenge
the constitutionality of his bill, but he says that his office is working
hard to ensure that they get the bill right the first time. 

The law could run afoul of the First Amendment to the Constitution,
which prohibits the "abridging of the freedom of speech." Requiring
people to speak in a form that is understandable by the government
in order to participate in government-financed network might be
considered an abridgment. 

Donald Haines, legislative counsel of the American Civil Liberties Union 
said, "It's like asking:
'Can you make it illegal to commit a crime in French?' " 

A more likely challenge may come from the Second, Fourth and Fifth 
Amendments. The United
States government has treated encryption technology as munitions in order to 
control its export.
The Second Amendment, however, guarantees the right to "keep and bear arms." 

The Fourth Amendment guarantees "the right of the people to be secure in 
their persons, houses,
papers and effects, against unreasonable searches and seizures." It is not 
clear how a court would
view the requirement that a citizen disclose his or her encryption key to a
key-recovery agent in
order to participate in the next generation of the Internet. 

On one hand, the agent would act as an intermediary who would only disclose 
the data to the
government in response to a valid request. On the other, the requirement for 
disclosure before any
warrant is issued might be seen as a violation of the Fifth Amendment, which 
prohibits the
possibility that someone "be compelled in any criminal case to be a witness 
against himself." 

More obscure challenges may emerge from the Ninth and Tenth Amendments. The 
Tenth
Amendment reserves "powers not delegated to the United States by the 
Constitution" to either the
individual states or the people. 

Representative Bob Goodlatte, a Virginia Republican
and a sponsor of competing legislation in the House,
asserts that Kerrey's bill is unconstitutional and that it
amounts to a "dramatic erosion of the people's rights" to
allow access to someone's data without the oversight of
a court. He points out that Kerrey bill would allow
foreign governments to request access to anyone's files
in the United States through the office of the Attorney
General. 

To a large extent, the constitutional question may depend upon just how 
voluntary the
key-recovery process turns out to be. The current draft of the bill contains 
language that explicitly
guarantees that participation in the program is voluntary, but it then 
enumerates all the conditions
under which federal financing will make it mandatory. 

The first to feel the requirements will be universities and colleges, because 
they rely heavily on
government financing. Kerrey said he remained willing to consider any 
language that would help
give the universities the flexibility they need to continue to do research 
effectively, but added that
he remained committed to pushing key-recovery technology. 

Some members of the university community expressed doubt that any compromise 
would be
possible. Gregory A. Jackson, the associate provost of the University of 
Chicago and a member of
the Internet 2 steering committee, said that the record-keeping burden would 
be onerous and that
the gains would be to slim when measured against the cost. 

"I can understand the FBI's point," Jackson said. "There are times when we 
want access to some
communications on campus and we can't get it." 

In his work at the University of Chicago and in his previous job at the 
Massachusetts Institute of
Technology, Jackson said, he was often called on to deal with disciplinary 
problems involving
misuse of the campus networks. "We had to use different leverage over people 
on campus," he
said. "Ultimately, the FBI is probably going to reach the same conclusion." 

Besides, Jackson said, it is virtually impossible even to define what 
encryption is. While the law
requires that the key-recovery agents deliver "plaintext," it is impossible 
to control how people
speak or what data they exchange. 

He went on to predict that the Internet 2 project would find a way to migrate 
into a completely
private entity if it became necessary to avoid government regulation. 

"Even the most optimistic estimates of what the federal contribution will be 
are still a small fraction
of the costs of Internet 2," he said. "It's serious money, and its important 
for making it go forward
quickly, but it's not the lion's share." 

George Cybenko, a professor at Dartmouth, said that his use of the Internet 2 
could drop to simple
e-mail and Web browsing because of the overhead imposed by keeping track of 
the keys. 

"If someone shows up and says, 'This packet came out of your office at 4 p.m. 
What does it mean?'
it will be a nightmare," Cybenko said. 

Many of the new uses of the Internet involve packing new and different forms 
of communication into
complicated data structures. Determining the difference between data that are 
encrypted and data
that are merely unconventional is difficult and could lead to problems. 

Some Internet correspondents have predicted that the FBI will be able to find 
a Senator to add an
amendment to Kerrey's bill to make key recovery mandatory for all Americans. 
Kerrey himself
suggested that this amendment may be offered by the Judiciary committee or on 
the floor of the
Senate in coming weeks. 

On Wednesday, the Senate Judiciary committee will begin holding meetings to 
investigate the
technology. Some expect that the committee chairman, Senator Orrin Hatch, 
Republican of Utah,
will offer his own version of the legislation. 

In the House, however, a different story continues to unfold. Goodlatte has
sponsored his SAFE
legislation (Security and Freedom through Encryption) that would relax export 
controls and not
require key-recovery provisions for anyone. His bill would deal with the 
problem of criminals hiding
their actions by extending the sentences of anyone who uses encryption in 
furtherance of a felony. 

His legislation has enjoyed wide, bipartisan support. Cosponsors range from 
conservative
Republicans like Tom DeLay of Texas, to liberal Democrats like Maxine Waters 
of California. 

In the last two days, six more members of the House have signed on as 
co-sponsors, bringing the total to 131. 

Copyright 1997 The New York Times Company 

-----

Ariel Glenn / AcIS R&D / Columbia University
ariel@columbia.edu
#include <stddisclaimer.h>






Thread