18 September 1999
From: staym@accessdata.com Date: Fri, 17 Sep 1999 14:26:57 -0600 To: Greg Broiles <gbroiles@netbox.com> Cc: Russell Nelson <nelson@crynwr.com>, cryptography@c2.net, cypherpunks@cyberpass.net Subject: Re: Why did White House change its mind on crypto? Our company works with the FBI a lot. We provide the software they actually use to recover passwords. The majority of software out there uses access-denial: the encryption / ofuscation doesn't depend on the password. But to be acceptable in court, you have to prove that you didn't change a single bit of evidence. That's why all our software recovers passwords instead of simply removing the protection. If the [CESA] law passes, we'll probably end up providing them with trojan horses & stuff. Basically, they're going to be glorified keyboard sniffers, because the courts (no matter what the law says--they get to interpret the law) aren't going to accept that a message wasn't faked unless the prosecutor can prove that it is the decryption of a ciphertext. To do that, all they need is a password that works, so that's what they'll focus on capturing. -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:staym@accessdata.com
Date: Fri, 17 Sep 1999 10:37:36 -0700 From: Greg Broiles <gbroiles@netbox.com> To: Russell Nelson <nelson@crynwr.com> Cc: cryptography@c2.net, cypherpunks@cyberpass.net Subject: Re: Why did White House change its mind on crypto? On Fri, Sep 17, 1999 at 11:05:37AM -0400, Russell Nelson wrote: > What's the difference between that, and someone claiming that a > certain piece of text decrypts to a sinister message? > > Seems to me like the best defense against that is mass-market crypto. > Because if the TLA claims that something decrypts to something, and I > can use the mass-market crypto to have it decrypt to something else, > the TLA has a credibility problem. > > Or is this not why you're scared? What scares me is the possibility that there won't even be an argument about whether or not a particular clump of ciphertext decodes to a particular bit of plaintext because I don't think it'll be possible to cross-examine prosecution witnesses about the way that they came into possession of what's purported to be plaintext. They won't need to say how they came into possession of the plaintext, because that would reveal their methods - if you know what ciphertext they used (especially if you're seeing it as an email message (perhaps with Received lines intact), or as the output of tcpdump) you probably know how it was intercepted, and that's something they want to keep secret. The scenario I'm concerned about is a simple swearing/credibility contest - the prosecution witness asserts that the defendant was the author of a particular (plaintext) communication which is either a crime, or admits to committing a crime. The defense can now choose between offering no response, or having the defendant deny authoring the communication (under oath, waiving their right against self-incrimination, including related to collateral matters). The defense won't have a meaningful opporunity to question the technical correctness nor the constitutional/legal appropriateness of the access to the text, because it's not possible to meaningfully explore those issues without revealing the government's methods. It's difficult to imagine that the Clinton administration, in light of recent weeks' revelation about misconduct, hidden information, and perjury which occurred regarding the conduct of federal law enforcement officers at Waco, is proposing new legislation which limits instead of expanding access to information about law enforcement techniques and behavior. It's likely that a number of criminal convictions were obtained against the survivors of the burned church building because of the information which was hidden from the defense and the jury by prosecutors and law enforcement agencies. That information is now coming to light as a consequence of a later, civil suit regarding the burning .. but would we ever have learned it if a statute prohibiting disclosure of law enforcement methods were in effect? The current CESA draft only applies to law enforcement methods used to gain access to electronic information - but if the public swallows that bitter pill, we should expect it to spread to a general prohibition about questioning the tactics of the government in all venues. -- Greg Broiles gbroiles@netbox.com
Date: Fri, 17 Sep 1999 09:18:24 -0400 To: politech@vorlon.mit.edu From: Declan McCullagh <declan@well.com> Subject: FC: Why did White House change its mind on crypto? Here's an answer... http://www.wired.com/news/news/politics/story/21810.html Decoding the Crypto Policy Change by Declan McCullagh (declan@well.com) 3:00 a.m. 17.Sep.99.PDT Why did the Clinton administration cave on crypto? What caused the nation's top generals and cops to back down this week after spending the better part of a decade warning Congress of the dangers of privacy-protecting encryption products? Why would attorney general Janet Reno inexplicably change her mind and embrace overseas sales of encryption when as recently as July she warned Congress of the "rising threat from the criminal community of commercially available encryption?" It can't simply be that tech firms were pressing forward this fall with a House floor vote to relax export rules. National security and law enforcement backers in the Senate could easily filibuster the measure. Besides, Clinton had threatened to veto it. It could be the presidential ambitions of Vice President Gore, who just happened to be in Silicon Valley around the time of the White House press conference Thursday. Still, while tech CEOs can get angry over the antediluvian crypto regulations Gore has supported, they regard Y2K liability and Internet taxation as more important issues. Another answer might lie in a little-noticed section of the legislation the White House has sent to Congress. It says that during civil cases or criminal prosecutions, the Feds can use decrypted evidence in court without revealing how they descrambled it. [...] -------------------------------------------------------------------------- POLITECH -- the moderated mailing list of politics and technology To subscribe: send a message to majordomo@vorlon.mit.edu with this text: subscribe politech More information is at http://www.well.com/~declan/politech/ --------------------------------------------------------------------------