From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@toad.com
Message Hash: ffb72114c2736ffd9ea6a991581d1eb7e9b4b3974de01d1c684ed01873a00dc9
Message ID: <v03110706b049eba06d9e@[139.167.130.248]>
Reply To: N/A
UTC Datetime: 1997-09-20 21:26:47 UTC
Raw Date: Sun, 21 Sep 1997 05:26:47 +0800
From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 21 Sep 1997 05:26:47 +0800
To: cypherpunks@toad.com
Subject: US Crypto Laws cripple Euros
Message-ID: <v03110706b049eba06d9e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
--- begin forwarded text
X-Authentication-Warning: fma66.fma.com: majordomo set sender to
owner-espam@lists.espace.net using -f
X-Orig-From: rah-web <rah@shipwright.com>
X-e$pam-source: Various
X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Sat, 20 Sep 1997 14:15:15 -0400
To: espam@intertrader.com
From: Robert Hettinga <rah@shipwright.com>
Subject: US Crypto Laws cripple Euros
X-MIME-Autoconverted: from 8bit to quoted-printable by lbo.leftbank.com id
OAA08597
Sender: owner-espam@lists.espace.net
Precedence: bulk
Reply-To: e$@thumper.vmeng.com
X-MIME-Autoconverted: from quoted-printable to 8bit by pop.sneaker.net id
QAA18355
---------------------------------------------------------------------
This mail is brought to you by the e$pam mailing list
---------------------------------------------------------------------
From: rah-web <rah@shipwright.com>
Reply-To: rah@shipwright.com
MIME-Version: 1.0
To: Robert Hettinga <rah@shipwright.com>
Subject: US Crypto Laws cripple Euros
http://www.techweb.com:80/wire/news/1997/09/0917crylaws.html
Content-Type: text/plain; charset=us-ascii; name="0917crylaws.html"
Content-Disposition: inline; filename="0917crylaws.html"
X-MIME-Autoconverted: from 8bit to quoted-printable by lbo.leftbank.com i d
LAA08231
[Image] [Image][IBM VisualAge for Java. Voted Best of Show Select at
Windows NT Intranet Solutions Conference.]
[CMPnet] [Image]
[Image]
[Image]
[TechWeb]
Search Archives:
Advanced Search
Sections
News
Finance
Tips & Tools
Product
Reviews
ActiveX/Java
Careers
Events
Directory
Opinion
Humor
Support
Encyclopedia
Information
Feedback
E-mail
Newsletters
Sponsored by:
Featured Sites
Net Newsmakers
NetGuide
Shareware
Games
Horoscopes
[CMPnet Resources]
Home
Site Map
Search
Ad Info
Sponsor Index
[Click here to visit Network Computing's Interactive Report Card]
[Image]
[Image]
[Image]
[TechWire]
TechWire All
Home Stories Features Internet VideosCommunicat ions
TechInvestor
Home Apple Hardware Software Chips Internati onal
U.S. Crypto Laws Cripple Euros, Expert Says
(09/17/97; 5:00 p.m. EDT)
By Douglas Hayward, TechWire
[Image]
CAMBRIDGE, England -- The U.S. government's Related
strategy of monitoring the computer networks Stories:
of hostile governments is damaging the
communications infrastructure of its allies, The
a leading encryption expert said. Governmen t
Eyes
The American enthusiasm for using Encryptio n
"information warfare" strategies has resulted
in a weakening of the U.K. and European Capitol H ill
civilian communications, said Ross Anderson, Girds For Key
an academic at Cambridge University, at the Clashes O ver
International Symposium on Economic Crime Encryptio n
held in Cambridge, England, on Tuesday.
Computer
Information warfare -- the act of monitoring Industry
or sabotaging an enemy's communications and Riled Up Over
computing infrastructure -- gained widespread FBI Chief 's
attention during the Gulf War when the U.S. Suggestio n
military hacked its way into Iraqi
communication networks. FBI Insis ts
On Crypto
Anderson was a co-author of a highly critical Access
report published in May that attacked the
Clinton administration's encryption export Criminal
control policies. The report, written by a Informati on
group of encryption experts, said an attempt On The Wi res
to prevent users from getting access to
uncontrolled encryption products would result [*] = L ink to
in substantial sacrifices in security and
cost. our
tech
The Clinton encyclope dia
-------------------administration, advised for more
"We have to by the U.S. National info.
question the Security Agency (NSA), [Image]
wisdom of wants to be able to
introducing continue monitoring the
weaknesses into communications of
our national potentially hostile
infrastructures." countries or groups. To
-- Ross Anderson do this, it wants to
Cambridge prevent these groups from
University using unbreakable
-------------------encryption programs.
This policy, dubbed Offensive, means the U.S.
government insists on maintaining strict
controls over the export and use of
encryption to ensure that hostile governments
and groups don't get access to strong [[Image]
encryption tools.
But this NSA-backed policy on restricting the
spread of strong encryption software has held
back the development of secure commercial and
governmental communications networks in
Europe, Anderson said.
Civilian communications networks whose
security has been weakened as a result of
U.S. policy include the Europewide Global
System for Mobile Communications telephone
networks, commercial banking networks, and
television broadcasting.
"We have to question the wisdom of
introducing weaknesses into our national
infrastructures," Anderson said. Europeans
are going to have to take more control over
industrial aspects of encryption, he said,
and develop policies with less input from the
people in the Pentagon.
"In the long term, the United Kingdom and its
European partners have to start thinking
carefully about the defensive vs. offensive
aspects of this business, Anderson said. "The
time is right for a fundamental realignment
of resources in this field."
Restrictions on encryption use mean the
British Patent Office has to use a weak form
of encryption when communicating with its
counterparts overseas, Anderson said. "They
use the size of keys I give to my students to
break as exercises," Anderson said.
The result is that highly confidential
information, including very valuable details
of intellectual property, can be intercepted
and decoded, he said. [TW]
Search Archives
[Image]
C M P n e t S P E C I A L R E P O R T S
· Upgrading your operating system is nerve-wracking, [Ima ge]
but we all have to face the possibility sooner or
later.
· What are key Microsoft execs and product managers saying
[Image] [about IE 4?
· Keep your laptop safe with this state-of-the-art safety
feature.
· What's wrong with a Java network computer? Java.
[Image] · There's more to remote access than modem banks.
[CMPnet] [Image] [Click here to visit Seagate Software.]
[Image]
---------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk info@hyperion.co.uk
---------------------------------------------------------------------
Like e$? Help pay for it! See <http://www.shipwright.com/beg.html>
Or, for e$/e$pam sponsorship, <mailto:rah@shipwright.com>
---------------------------------------------------------------------
--- end forwarded text
-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Return to September 1997
Return to “Robert Hettinga <rah@shipwright.com>”
1997-09-20 (Sun, 21 Sep 1997 05:26:47 +0800) - US Crypto Laws cripple Euros - Robert Hettinga <rah@shipwright.com>