1996 Congressional Hearings
Intelligence and Security

Testimony of
Jerry Berman, Executive Director
Center for Democracy and Technology
on
How Current U.S. Encryption Policy Fails
to Meet the Needs of American Internet Users
Before the
Senate Committee on Commerce, Science and Transportation
Subcommittee on Science, Technology, and Space
June 26, 1996
I. Introduction and Overview
A. Overview: Encryption Policy in the Internet AgeII. Communications Privacy in the Age of the Internet: Public Policy Principles
B. Internet User Involvement is Crucial
A. The Internet Is Not Like The Telephone SystemIII. The Need for Locks and Keys on the GII: Users Need Encryption
Case Study: Application of wiretapping to the virtual corporation challenges Fourth Amendment principlesB. The Internet Is A Global Medium: Decentralized User Solutions Are Preferable To Centralized Government Mandates
C. On the Internet, the Bill of Rights is a Local Ordinance
IV. "Naked To Mine Enemy" -- The Failure of Administration Encryption Policy: Users' Needs Go Unmet
V. Putting the Administration's Arguments in a Box: Law Enforcement Has Not Made It's Case
VI. Conclusion
Footnotes
How Current U.S. Encryption Policy Fails to Meet the Needs of American
Internet Users
I. Introduction and Overview
Good morning, my name is Jerry Berman,
Executive Director of the Center for Democracy and Technology (CDT). The
Center is pleased to have this opportunity to testify today. CDT is an
independent, non-profit public interest policy organization in Washington,
D.C. The Center's mission is to develop and implement public policies to
protect and advance individual liberties and democratic values in new digital
communications media. The Center achieves its goals through policy
development, public education, and coalition building. CDT also coordinates
the Digital Privacy and Security Working Group (DPSWG), an ad hoc coalition
of more than 50 computer, communications, associations, and public interest
organizations working on communications privacy issues. In the past, CDT and
members of the Working Group have strongly opposed the Administration's
Clipper Chip proposals.A. Overview: Encryption Policy in the Internet Age
With the recent Federal court ruling in Philadelphia enjoining the Communications Decency Act, the remaining major legal obstacle to the development of electronic commerce is outdated U.S. encryption policies. The Administration's cryptography policy, based upon a narrow national security perspective that ignores the privacy needs of individual users, cannot form the sound basis for a secure communications infrastructure. A cryptography policy without explicit privacy protections will never gain the trust of users or be embraced by the international marketplace.
In the two years since the Senate last held hearings on encryption policy, the looming crisis in privacy and security has become more urgent, yet remains unresolved:
-
The Internet Perspective -- U.S. encryption policy has
failed to account for the emergence of the Internet as a model for
communications:
- The Internet is not like the telephone system --
The Internet encompasses a range of social functions far beyond simple
two-way voice communication. These broad activities demand a heightened
capacity for users to protect their security and privacy online. The
traditional approach to wiretapping cannot simply be exported to this
new medium.
- The Internet is a global, decentralized medium --
Efforts to impose unilateral national policies -- such as export
controls or key escrow proposals -- are unlikely to be accepted widely.
Decentralized user choice solutions to privacy problems are preferable
to and more effective than centralized government mandates.
- On the Internet, the Bill of Rights is a local
ordinance -- Constitutional guarantees offer no protection to
U.S. citizens whose communications regularly cross national borders.
Policies should be designed to protect Americans outside of the shelter
of U.S. law.
- The Internet is not like the telephone system --
The Internet encompasses a range of social functions far beyond simple
two-way voice communication. These broad activities demand a heightened
capacity for users to protect their security and privacy online. The
traditional approach to wiretapping cannot simply be exported to this
new medium.
- Current encryption policy fails to meet users' needs
-- Widely available strong encryption is essential if users are to ever
trust their private and sensitive information to the Global Information
Infrastructure (GII). Yet export controls and other policies have kept good
encryption tools out of the hands of everyday users and capped security at
a 40-bit key length that many experts judge to be "inadequate
protection."1
- Administration encryption policy remains hostage to a law enforcement and national security rationale that is outdated and unsubstantiated -- National security arguments have been undermined by the increasing availability of strong encryption outside of the United States. The law enforcement problem posed by encryption is real, but narrowly focused around real-time surveillance of electronic communications. The massive invasions of privacy and the high cost of the Administration's export controls and key escrow policies cannot be justified on these narrow and eroding grounds.
B. Internet User Involvement is Crucial
CDT is pleased to be here as part of these important Congressional efforts to address the crisis that exists today in U.S. encryption policy. The Center wishes to express its thanks to you, Mr. Chairman, to Senator Pressler, Senator Wyden, and the other sponsors of S.1726 for your work in support of Internet privacy and security, and to Senator Leahy, who has been a long-time supporter of efforts to ease encryption controls.
We are particularly concerned that the voice of Internet users be heard in this forum. We are pleased to have been a part of the Committee's efforts to solicit input from everyday computer users for this hearing, via the World Wide Web. We are also pleased to be working with HotWired and Digex to make this the first Senate hearing ever simulcast live over the Internet -- making these proceedings accessible to millions worldwide. We commend the Committee for reaching out to the growing community of computer users who care deeply about this issue.
II. Communications Privacy in the Age of the Internet: Public Policy Principles
For years encryption policy has been driven, substantially unchallenged, by the needs of the national security establishment. With the arrival of the personal computer and the Internet, that narrow focus is plainly no longer acceptable. The policies that may have been appropriate for the Age of the Mainframe Computer will not meet the needs of individuals and society in the Age of the Internet. We suggest that any policy that addresses privacy and security on the Internet should do so in light of the following policy principles:- The Internet is not like the telephone system.
- The Internet is a global medium: Decentralized user choices are preferable to centralized government mandates.
- On the Internet, the Bill of Rights is a local ordinance.2
A. The Internet Is Not Like The Telephone System
"The Internet is therefore a unique and wholly new medium of worldwide human communication." Court's Findings of Fact, ¶81, ALA v. Dept. of Justice3If there is one truth that policymakers have learned about the Internet in the last year, it is that the Internet is not just another telephone system. Current encryption policy is justified, in part, by law enforcement arguments that they must continue to conduct electronic surveillance in the same manner as they are able to on the telephone network. But efforts to simplisticly apply assumptions about wiretapping from the telephone system to the Internet risk grave threats to individual privacy. In a similar vein, congressional attempts in the Communications Decency Act to impose content-based restrictions on speech from the phone system onto the Internet have recently been harshly rebuffed by the Federal courts.4
From a constitutional privacy perspective, the single most significant difference between the Internet and traditional telephone service is the vast array of uses that the Internet currently serves, as well the even larger range of new applications bound to come in the future. The Internet is not simply a new-fangled digital telephone. Rather, Internet services will likely facilitate the following important social functions now or in the near future:
- wallet
- first class mail envelope
- carrier of credit card transaction
- face-to-face contact with a bank or a merchant
- public library
- neighborhood bookstore
- movie theater
- doctor's office
- town square, coffee shop, union hall, political clubhouse, or community center where we discuss politics
- local art museum
- romantic night spot for intimate conversations
The privacy protections embodied in the U.S. law today are the product of a long and thorough debate in which the concerns of law enforcement were aired and carefully weighed against the rights of citizens. Congress should not allow law enforcement concerns to unravel this delicate balance by imposing the wiretapping paradigm on this new medium without careful deliberation.
Case Study: Application of wiretapping to the virtual corporation
challenges Fourth Amendment principles
Wiretapping and other electronic surveillance has always been recognized as
an exception to the fundamental Fourth Amendment prohibition against secret
searches. Even with a valid search warrant, law enforcement agents must
"knock and announce" their intent to search a premises before proceeding.
Failure to do so violates the Fourth Amendment. Until now, the law of search
and seizure has made a sharp distinction between, on the one hand, seizures
of papers and other items in a person's physical possession, and on the other
hand, wiretapping of communications. Seizure of papers or personal effects
must be conducted with the owner's knowledge, upon presentation of a search
warrant. Only in the exceptional case of wiretapping -- and with the
heightened procedural and substantive requirements that accompany a wiretap
request -- may a person's privacy be invaded by law enforcement without
simultaneously informing that person.
In the era where people work for "virtual corporations" and conduct personal
and political lives in "cyberspace," the distinction between communication of
information and storage of information is increasingly vague. The
organization in which one works may constitute a single virtual space, but be
physically dispersed. The papers and files of the organization or individual
may be moved within the organization by means of telecommunications
technology. Instantaneous access to encryption keys, without prior notice to
the communicating parties, thus present a much broader intrusion. Such access
may well constitute a secret search, if the target is a virtual corporation
or an individual whose "papers" are physically dispersed.
B. The Internet Is A Global Medium: Decentralized User Solutions
Are Preferable To Centralized Government Mandates
On of the Internet's great strengths is the ease with which it spans the
globe: information flows as effortlessly from New York to Nairobi as from
Washington, DC to West Virginia. Moreover, a communication from New York to
Nairobi might travel through the United Kingdom and four countries one day,
but through France and five other countries the next day. For this reason,
national controls are unlikely to work in a global medium like the Internet.
Privacy solutions should not rely on centralized policies and control, but
instead should be oriented towards the user and robust enough to exist in the
highly decentralized environment that characterizes the Internet.
The rapid pace of Internet development has occurred with some important
government support, but entirely without the interference of the traditional
regulatory process. The flexibility of the Internet community in developing
new solutions to meet user needs has been nothing short of astonishing. Yet
the one area in which the innovative energy of the Internet has been most
stifled has been in the area of security and privacy. Just as we cannot
expect the United States government to have anticipated the architecture of
the World Wide Web, so it is foolhardy to expect that the national security
establishment of the United States can anticipate and provide for the
security needs of all Internet users. S.1726 properly gets the government out
of the business of controlling this vital part of the emerging information
infrastructure.
C. On the Internet, the Bill of Rights is a Local
Ordinance
Both data security solutions against private intrusion and privacy
protections against unwarranted government surveillance must be suited to the
global nature of the Net. Good data security demands strong encryption to
foil threats wherever they are in the world. And good data security and
privacy policies must recognize that the Bill of Rights in the United States
Constitution is nothing more than a local law.
United States Constitutional protections against unreasonable search and
seizure offer little protection to U.S. citizens whose Internet
communications regularly cross borders. Foreign governments and others can
intercept these messages without the knowledge of the senders, and beyond the
ability of the United States government to protect the privacy rights of its
citizens. For similar reasons, the key escrow agents called for in recent
Administration policy proposals would create an enormous new vulnerability
for Internet users -- both from private data intruders and from governments
which may not have adequate law enforcement safeguards or may not accord the
same privacy protections to United States citizens.
The global nature of the Internet thus demands that users have access to the
highest quality encryption technology. We strongly agree with the many
individuals, fellow privacy advocates, and industry leaders who praise
S.1726's effort to lift export controls and allow the market to provide the
security and privacy that global Internet users need.
III. The Need for Locks and Keys on the GII: Users Need Encryption
"On balance, the advantages of more widespread use of cryptography outweigh the disadvantages."5The use of encryption is an inevitable and essential part of life online. As the National Research Council found in its long-awaited encryption White Paper, not only do users need encryption, but it is actually in America's national interest to promote the widespread use of good cryptography.6
A secure, private, and trusted Global Information Infrastructure (GII) is essential to promote economic growth and meet the needs of Information Age society. Developing that secure and trusted GII requires strong, flexible, widely-available cryptography. Individuals need to have confidence in the GII to realize the full democratic potential of free association and personal communications. Competitive businesses need to protect proprietary information as it flows across insecure global communications networks.
In recent months the public has been made increasingly aware of the dangers of computer crime and the vulnerability of current cryptography implementations. Rapid advances in the speed and sophistication of hardware and software have laid siege to the 40-bit key systems currently approved for export, as well as the popular 56-bit DES algorithm.7 If we are to maintain the trust of the public and realize the full potential of the GII, individual users will need widely available good encryption to protect themselves online:
- Individuals need encryption in order to trust the GII with confidential
data such as financial transactions, medical records, or private
communications.
- Businesses need encryption to provide individuals with privacy
protection and to protect proprietary information as it flows across
vulnerable global networks. Moreover, businesses need good encryption to
protect the growing stores of personal information that they accumulate
about individuals -- such as medical, insurance, credit, or financial
records.8
- Government users need encryption. Government itself needs good
encryption to protect sensitive military, law enforcement, financial, or
private citizen information.9
- America needs encryption to promote national security and prevent crime. The widespread use of strong encryption is widely considered one of our best defenses in the battle to protect America's information infrastructure from information warfare and other security threats. It is ironic that the very players within the Administration who should be promoting the use of encryption to promote national security and prevent crime online are actively working to stop it. FBI Director Louis Freeh testified in the Senate this Spring about the massive losses attributed to industrial espionage in this country, estimated in the hundreds of billions of dollars. CIA Director John Deutch has testified just yesterday about the increasing vulnerability of our financial, utility, government, and telecommunications information infrastructure to "information terrorists" and other bad actors. Yet the lack of strong encryption use today has left computer users vulnerable to the prying eyes of hackers, corporate competitors, and even foreign governments.10
In this context, the sole focus on national security needs embodied in the Administration's cryptography policies is unlikely to meet the needs of GII users. By maintaining 40-bit key length restrictions on exports, these policies leaves users hamstrung with insecure systems. By proposing unattractive interoperability restrictions and minimal privacy protections for key escrow systems, these policies discourage the deployment of secure systems in U.S. products. Rather than being seamlessly incorporated into popular products, secure communications will remain out of reach for less sophisticated GII users. The resulting loss of security will have a chilling effect on the development of electronic commerce and the information infrastructure as the privacy and security needs of users are not met.
IV. "Naked To Mine Enemy"11 -- The Failure of Administration Encryption Policy: Users' Needs Go Unmet
"Current national policy is not adequate to support the information security requirements of an information society."12Current Administration encryption policy has failed to meet the needs of computer users. Export controls and other government policies keep good encryption out of the hands of users. These policies act to coerce the domestic market for encryption. The 40-bit key length encryption available under these policies is widely viewed by experts as inadequate. Worse, the export controls are intrusive and ineffective at meeting their stated national security goals. U.S. encryption policy is in a state of crisis, with users unable to get the privacy because of unsupportable national security and law enforcement rationale. Moreover, the Administration's Clipper Chip and subsequent policy proposals have barely acknowledged privacy concerns in any meaningful way, and have been greeted with distaste and scorn by the marketplace and the public.
Current Administration policy restricts the export of "strong" encryption hardware or software products with keys greater than 40 bits long (the length of the "keys" indicates the security of a system). Many experts believe that 40 bit security is woefully inadequate.13 Export controls actually keep domestic users from getting good encryption. Most U.S. software and hardware companies have been held hostage as they try to make their domestic products interoperable with and subject to the same restrictions as their exportable products. The result is a government policy that hurts American businesses and individuals:
- It hurts individuals by not allowing them to choose
the encryption systems that best meet their security needs. A recent study
by a panel of renowned cryptographers found that the systems currently
exportable under government policies "offer virtually no protection from
brute-force attacks."14
- It hurts U.S. industry by not allowing companies to
provide secure products in the face of strong foreign competitors who are
not restricted by export controls. A recent report by the CEOs of 13 large
American technology companies concluded that the American computer industry
could lose up to $60 billion annually by the year 2000 due to these export
controls.15
- It doesn't even meet the needs of national security. The Software Publishers Association has documented hundreds of foreign encryption products already widely available abroad. Criminals, terrorists, and foreign governments will always have access to good encryption; it is law-abiding citizens who sacrifice their privacy under current law.
V. Putting the Administration's Arguments in a Box: Law Enforcement Has Not Made It's Case
Law enforcement has been unable to justify massive losses of privacy it proposes in return for minor gains in surveillance capabilities. The law enforcement problem posed by encryption is real, but narrowly focused around real-time surveillance of electronic communications. The massive invasion of privacy and high cost of the Administration export controls and key escrow cannot be justified by the law enforcement's last, hopeless grasp to expand their capabilities is an area where those capabilities are already largely gone.Law enforcement faces a real, but narrowly focused, problem with encryption. The vast majority of encrypted information will be accessible to law enforcement by legal process. Stored information, corporate and business information, and even much electronic communication will be largely available to law enforcement through similar legal process available today (See Figure 1 below):
- Stored business information -- Stored corporate records and business
information, encrypted for security and privacy purposes, represents a
large part of the use of encryption and will be almost completely
accessible to law enforcement using the same sorts of court orders,
warrants, and even subpoena processes that are available today to access
similar unencrypted data.
- Stored information by individuals -- Will be similarly available by
legal process, just as it is today. In certain narrow circumstances, access
to encrypted information may be thwarted by assertion of a Fifth Amendment
privilege against self-incrimination.
-
Business communications -- Business communications will be largely
accessible to law enforcement. Today, electronic communications almost
always become stored information at one end or the other, and often both,
and often as plaintext. (For example, consider the instructive example of
the archived email in the Bush Administration). Such stored information
will be readily available to law enforcement as noted above. Thus, most
communications will be accessible --
- As data stored, often in plaintext, by communicating parties and
available via court order;
- Through stored decryption keys available via court order; or
- Through other kinds of authorized surveillance.
- As data stored, often in plaintext, by communicating parties and
available via court order;
- Individual communications -- Similarly to business communications, the bulk of individual communications will be accessible to law enforcement through legal process in some manner. Fifth Amendment privileges for individuals may protect some of these communications.
The widespread use of compression algorithms, a vast array of text, audio, and video applications, and even 40-bit encryption have already made real-time electronic interception dramatically more difficult. The widespread use of strong encryption by our more sophisticated national enemies makes many of those interceptions impossible. The days of a vast positive signals intelligence operation are numbered, with or without U.S. export controls. We must find ways to help law enforcement and national security to adjust to this new world, without limiting effective privacy for individuals and businesses on the GII.
Moreover, the information economy presents new and powerful tools and opportunities for law enforcement. Online interaction leaves a detailed trail of electronic transactions, credit card purchases, online communications, and Web-based clickstream data presenting new traffic analysis opportunities. This information offers law enforcement unprecedented new tools to obtain evidence of criminal activity. The balance of power in an online world is tilting further towards law enforcement and away from individual liberty. Encryption may represent one of the rare opportunities to reclaim individual liberty in the face of the steady erosion of privacy and individual autonomy brought on by technology and the Information Age.
The federal government is granted the ability to monitor a specific telephone line. It has never been prospectively guaranteed the ability to intercept all communications of all individuals, and understand them. Wiretap targets have always been able to use other phones, or speak in unintelligible code. More importantly, the ability to hear a specific phone conversation is not nearly as invasive as the ability to intercept, without notice or consent, the full panoply of life online including health records, financial transactions, online entertainment, intimate letters and conversations. Law enforcement has been unable to justify this new, unwarranted expansion of surveillance capabilities sought through the control of encryption technologies.
Figure 1 -- Defining the Law Enforcement Problem: Access to Information Online
Stored Data | Communications | |
---|---|---|
Business Information |
1. Available via court order just like unencrypted information. Keys for encrypted information are similarly available via court order. |
3. Largely available:
|
Individual Information |
2. Available via court order in most cases, just as unencrypted
information. In some situations, access to encryption keys may be protected by fifth Amendment privileges. |
4. Largely available:
|
VI. Conclusion
Current U.S. encryption policy fails to recognize the needs of users and the changes brought on by the Internet Age. The Internet is not like a phone system, so the extension of wiretapping authority to the Internet is inappropriate. The Internet is a global medium, so centralized control schemes like current U.S. encryption policy are likely to be ineffective. And the Internet makes U.S. Constitutional protections a local ordinance, so U.S. encryption policy should seek to guarantee the privacy and liberty of Americans in their communications outside of the United States.In the current policy standoff between eroding law enforcement arguments and the emerging and acute privacy and security needs of the Information Age, Congressional action is needed. Only Congress is in the position today to change U.S. encryption policy and get Americans the privacy and security tools they need. The private sector cannot do it. The Administration will not do it. The courts may do it, but not without a protracted struggle. Congress must act. CDT supports the legislative approaches embodied in S.1726, S.1587, and H.R. 3011. The Congress should act to immediately liberalize export controls and provide Americans on the Internet with the strong security and privacy they so badly need.
Footnotes
1 Matt Blaze, et al., Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security: A Report by an ad hoc group of cryptographers and computer scientists, at 7 (1996) (hereinafter, "The Cryptographers' Report").2 John Perry Barlow is often attributed with the phrase, "In cyberspace, the First Amendment is a local ordinance."
3 No. 96-1458 (E.D.Pa. 1996).
4 See ALA v. Dept. of Justice, No. 96-1458 (E.D.Pa. 1996).
5 National Research Council, Cryptography's Role in Securing the Information Society, at 8-6. (Hereinafter, "NRC Report".)
6 NRC Report Summary at 12, 13.
7 The Cryptographers' Report, at 5.
8 NRC Report Summary at 1.
9 Id. at 1
10 Id. at 8
11 "Had I but serv'd my God with half the zeal / I serv'd my king, he would not in mine age / Have left me naked to mine enemies." William Shakespeare, Henry VIII, act 3, sc. 2.
12 NRC Report at 8-7
13 Cryptographer's Report at 5.
14 Id. at 5. See also NRC Summary at 2.
15 NRC Summary at 13.
16 See NRC Report.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|