1997-09-20 - US Crypto Laws cripple Euros

Header Data

From: Robert Hettinga <rah@shipwright.com>
To: cypherpunks@toad.com
Message Hash: ffb72114c2736ffd9ea6a991581d1eb7e9b4b3974de01d1c684ed01873a00dc9
Message ID: <v03110706b049eba06d9e@[139.167.130.248]>
Reply To: N/A
UTC Datetime: 1997-09-20 21:26:47 UTC
Raw Date: Sun, 21 Sep 1997 05:26:47 +0800

Raw message

From: Robert Hettinga <rah@shipwright.com>
Date: Sun, 21 Sep 1997 05:26:47 +0800
To: cypherpunks@toad.com
Subject: US Crypto Laws cripple Euros
Message-ID: <v03110706b049eba06d9e@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


X-Authentication-Warning: fma66.fma.com: majordomo set sender to
owner-espam@lists.espace.net using -f
X-Orig-From: rah-web <rah@shipwright.com>
X-e$pam-source: Various
X-Sender: rah@pop.sneaker.net
Mime-Version: 1.0
Date: Sat, 20 Sep 1997 14:15:15 -0400
To: espam@intertrader.com
From: Robert Hettinga <rah@shipwright.com>
Subject: US Crypto Laws cripple Euros
X-MIME-Autoconverted: from 8bit to quoted-printable by lbo.leftbank.com id
OAA08597
Sender: owner-espam@lists.espace.net
Precedence: bulk
Reply-To: e$@thumper.vmeng.com
X-MIME-Autoconverted: from quoted-printable to 8bit by pop.sneaker.net id
QAA18355

---------------------------------------------------------------------
This mail is brought to you by the e$pam mailing list
---------------------------------------------------------------------

From: rah-web <rah@shipwright.com>
Reply-To: rah@shipwright.com
MIME-Version: 1.0
To: Robert Hettinga <rah@shipwright.com>
Subject: US Crypto Laws cripple Euros

http://www.techweb.com:80/wire/news/1997/09/0917crylaws.html

 Content-Type: text/plain; charset=us-ascii; name="0917crylaws.html"
 Content-Disposition: inline; filename="0917crylaws.html"
 X-MIME-Autoconverted: from 8bit to quoted-printable by lbo.leftbank.com i d
 LAA08231

 [Image]  [Image][IBM VisualAge for Java. Voted Best of Show Select at
 Windows NT Intranet Solutions Conference.]
 [CMPnet] [Image]

 [Image]
 [Image]
 [TechWeb]

 Search Archives:


  Advanced Search

  Sections
  News
  Finance
  Tips & Tools
  Product
 Reviews
  ActiveX/Java
  Careers
  Events
 Directory
  Opinion
  Humor

  Support
  Encyclopedia
  Information
  Feedback
  E-mail
 Newsletters

   Sponsored by:


  Featured Sites
  Net Newsmakers

  NetGuide
  Shareware
  Games
  Horoscopes

 [CMPnet Resources]
  Home
  Site Map
  Search
  Ad Info
  Sponsor Index

 [Click here to visit Network Computing's Interactive Report Card]

                  [Image]
                  [Image]
                  [Image]
                  [TechWire]
                     TechWire     All
                       Home     Stories Features Internet VideosCommunicat ions
                   TechInvestor
                       Home      Apple  Hardware Software Chips  Internati onal

                  U.S. Crypto Laws Cripple Euros, Expert Says
                  (09/17/97; 5:00 p.m. EDT)
                  By Douglas Hayward, TechWire
                  [Image]
                  CAMBRIDGE, England -- The U.S. government's    Related
                  strategy of monitoring the computer networks   Stories:
                  of hostile governments is damaging the
                  communications infrastructure of its allies,   The
                  a leading encryption expert said.              Governmen t
                                                                 Eyes
                  The American enthusiasm for using              Encryptio n
                  "information warfare" strategies has resulted
                  in a weakening of the U.K. and European        Capitol H ill
                  civilian communications, said Ross Anderson,   Girds For  Key
                  an academic at Cambridge University, at the    Clashes O ver
                  International Symposium on Economic Crime      Encryptio n
                  held in Cambridge, England, on Tuesday.
                                                                 Computer
                  Information warfare -- the act of monitoring   Industry
                  or sabotaging an enemy's communications and    Riled Up  Over
                  computing infrastructure -- gained widespread  FBI Chief 's
                  attention during the Gulf War when the U.S.    Suggestio n
                  military hacked its way into Iraqi
                  communication networks.                        FBI Insis ts
                                                                 On Crypto
                  Anderson was a co-author of a highly critical  Access
                  report published in May that attacked the
                  Clinton administration's encryption export     Criminal
                  control policies. The report, written by a     Informati on
                  group of encryption experts, said an attempt   On The Wi res
                  to prevent users from getting access to
                  uncontrolled encryption products would result  [*] = L ink to
                  in substantial sacrifices in security and
                  cost.                                          our
                                                                 tech
                                       The Clinton               encyclope dia
                    -------------------administration, advised   for more
                    "We have to        by the U.S. National      info.
                    question the       Security Agency (NSA),    [Image]
                    wisdom of          wants to be able to
                    introducing        continue monitoring the
                    weaknesses into    communications of
                    our national       potentially hostile
                    infrastructures."  countries or groups. To
                    -- Ross Anderson   do this, it wants to
                    Cambridge          prevent these groups from
                    University         using unbreakable
                    -------------------encryption programs.

                  This policy, dubbed Offensive, means the U.S.
                  government insists on maintaining strict
                  controls over the export and use of
                  encryption to ensure that hostile governments
                  and groups don't get access to strong         [[Image]
                  encryption tools.

                  But this NSA-backed policy on restricting the
                  spread of strong encryption software has held
                  back the development of secure commercial and
                  governmental communications networks in
                  Europe, Anderson said.

                  Civilian communications networks whose
                  security has been weakened as a result of
                  U.S. policy include the Europewide Global
                  System for Mobile Communications telephone
                  networks, commercial banking networks, and
                  television broadcasting.

                  "We have to question the wisdom of
                  introducing weaknesses into our national
                  infrastructures," Anderson said. Europeans
                  are going to have to take more control over
                  industrial aspects of encryption, he said,
                  and develop policies with less input from the
                  people in the Pentagon.

                  "In the long term, the United Kingdom and its
                  European partners have to start thinking
                  carefully about the defensive vs. offensive
                  aspects of this business, Anderson said. "The
                  time is right for a fundamental realignment
                  of resources in this field."

                  Restrictions on encryption use mean the
                  British Patent Office has to use a weak form
                  of encryption when communicating with its
                  counterparts overseas, Anderson said. "They
                  use the size of keys I give to my students to
                  break as exercises," Anderson said.

                  The result is that highly confidential
                  information, including very valuable details
                  of intellectual property, can be intercepted
                  and decoded, he said. [TW]

                                 Search Archives



                  [Image]

                       C M P n e t   S P E C I A L   R E P O R T S
              · Upgrading your operating system is nerve-wracking,  [Ima ge]
              but we all have to face the possibility sooner or
              later.
              · What are key Microsoft execs and product managers saying
 [Image]     [about IE 4?
              · Keep your laptop safe with this state-of-the-art safety
              feature.
              · What's wrong with a Java network computer? Java.

    [Image]   · There's more to remote access than modem banks.
   [CMPnet]  [Image] [Click here to visit Seagate Software.]
 [Image]


---------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk                    info@hyperion.co.uk
---------------------------------------------------------------------
Like e$? Help pay for it!  See <http://www.shipwright.com/beg.html>
Or, for e$/e$pam sponsorship, <mailto:rah@shipwright.com>
---------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah@shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







Thread