[2664] in cryptography@c2.net mail archive
Ashcroft-Leahy adds CALEA provisions
daemon@ATHENA.MIT.EDU (Will Rodger)
Tue May 12 11:49:25 1998
Date: Tue, 12 May 1998 10:16:45 -0400
To: cryptography@c2.net
From: Will Rodger <rodger@worldnet.att.net>
--=====_Eudora-PGP-Plugin19794==_
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Crypto just took another twist in the Senate - call it a CALEA detour.
My story is based on the final version of the bill.
Senate bill would lift bans on overseas crypto
By Will Rodger
Inter@ctive Week Online
May 11, 1998 6:20 PM PDT
After years of trying to get some form of legislation passed, a group of
pro-Internet U.S. senators will introduce Tuesday yet another attempt to
lift federal export controls on privacy protecting, data scrambling software.
"There's no mistake about it. This is strong privacy medicine," said Alan
Davidson, an attorney and policy specialist with the Center for Democracy
and Technology. "It makes more encryption accessible to more people and
that's exactly what we need."
David Sobel, policy counsel at the Electronic Privacy Center, said the bill
offered encouragement to pro-privacy forces. "There will finally be a
vehicle in the Senate which is pro-encryption," he said. Even so, "the
sections that are nods to law enforcement are problems."
Like bills before it, the "E-Privacy Act" sponsored by Vermont Democrat
Sen. Patrick Leahy and Missouri Republican Sen. John Ashcroft would lift
export controls on encryption technology to countries where encryption of
similar strength was available. The bill also adds several new twists to
the crypto debate by joining to it a parallel battle over wiretaps in the
Federal Communications Commission.
'Back doors' banned
The two senators are expected to join with the industry-funded Americans
for Computer Privacy to announce the bill at an 11:30 ET press conference
Tuesday.
A copy of the Ashcroft-Leahy proposal obtained by Inter@ctive Week bans
attempts to require encryption "back doors" for law enforcement
domestically and abroad. It would also lift export controls to all
countries where similar products are available except for a handful or
"rogue" nations like Libya and Iran
Encryption technology uses simple mathematics to do extraordinary things.
In short, it encodes messages so thoroughly that credit cards, love letters
even massive bank transfers are safe from prying eyes online. As such, the
technology is irreplaceable to efforts to doing business online and,
proponents say, already ubiquitous worldwide.
Nonetheless, that same power can shield phone calls, e-mail and other
digital communications from police wiretaps. As a result, law enforcement
and intelligence specialists want its uncontrolled spread stopped.. If not
stopped in its tracks, they say, the spread of strong crypto will lead to a
reign of terror from mad bombers, drug dealers and the like. FBI Director
Louis Freeh, in fact, has made repeated calls for a prohibition on all
encryption which does not include "back doors" for police to unscramble
messages through a still unspecified legal process.
Probable cause required
Under the bill police would also have to show courts probable cause before
demanding that cell phone companies let them track cell phone users'
whereabouts through their networks. Such data can now be garnered with no
more than a US attorney's signature.
The bill also requires increased legal thresholds for police who request
that phone companies trace incoming and outgoing phone calls from
customers' lines.
Both issues are at the center of a three-year dispute over implementation
of the 1995 Communications Assistance to Law Enforcement Act. Police say
they need the law and the $500 million in funding it provides to preserve
their ability to conduct wiretaps in increasingly computerized phone
networks. Phone companies and privacy advocates, by contrast, say the law
would drastically expand wiretap capabilities.
For all the controls on police, they do get something out of the bill.
Among other things, the legislation would impose five- and 10-year prison
sentences on criminals who use encryption to commit crimes, as well as
establish a "Net center" which could be used to teach police how to try to
crack weaker forms of encryption -- a goal arguably at odds with a bill
meant to constrain potential police abuses.
Not going away
Though it's anyone's guess whether the bill has a better chance than its
predecessors, activists said the bill represents their best hope in a
chamber that has been loathe to move on an issue that has divided privacy
advocates and computer companies from law enforcement like no other.
"These guys aren't going away," Davidson said.
Will Rodger Voice: +1 202-408-7027
Washington Bureau Chief Fax: +1 202-789-2036
Inter@ctive Week http://www.interactiveweek.com
A Ziff-Davis Publication http://www.zdnn.com
PGP 5.0: 584D FD11 3035 0EC2 B35C AB16 D660 293F C7BE 3F62
--=====_Eudora-PGP-Plugin19794==_
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
MessageID: TPvep59h2XrmYAtXo8SlXJUUoMYlV8Nz
iQA/AwUBNVhZ0tZgKT/Hvj9iEQLzKACfXBYJ7k7yrFeqw+RxYTuSoF5W+p0AniXn
NuQ5DQNgD8xYslJkF1DsHgUR
=WUzo
-----END PGP SIGNATURE-----
--=====_Eudora-PGP-Plugin19794==_--