mirror of
https://github.com/nhammer514/textfiles-politics.git
synced 2024-12-18 20:24:24 -05:00
280 lines
14 KiB
Plaintext
280 lines
14 KiB
Plaintext
|
Article 5363 of alt.security.pgp:
|
|||
|
Newsgroups: alt.security.pgp
|
|||
|
Path: cnsnews!boulder!agate!howland.reston.ans.net!vixen.cso.uiuc.edu!uwm.edu!linac!uchinews!gargoyle!hugh
|
|||
|
From: hugh@gargoyle.uchicago.edu (Hugh Miller)
|
|||
|
Subject: Phil Zimmermann Congressional Testimony
|
|||
|
Message-ID: <hugh.750627595@gargoyle>
|
|||
|
Sender: news@uchinews.uchicago.edu (News System)
|
|||
|
Organization: University of Chicago -- Academic & Public Computing
|
|||
|
Date: Thu, 14 Oct 1993 19:39:55 GMT
|
|||
|
Lines: 271
|
|||
|
|
|||
|
|
|||
|
Testimony of Philip Zimmermann to
|
|||
|
Subcommittee for Economic Policy, Trade, and the Environment
|
|||
|
US House of Representatives
|
|||
|
12 Oct 1993
|
|||
|
|
|||
|
|
|||
|
Mr. Chairman and members of the committee, my name is Philip
|
|||
|
Zimmermann, and I am a software engineer who specializes in
|
|||
|
cryptography and data security. I'm here to talk to you today about
|
|||
|
the need to change US export control policy for cryptographic
|
|||
|
software. I want to thank you for the opportunity to be here and
|
|||
|
commend you for your attention to this important issue.
|
|||
|
|
|||
|
I am the author of PGP (Pretty Good Privacy), a public-key encryption
|
|||
|
software package for the protection of electronic mail. Since PGP
|
|||
|
was published domestically as freeware in June of 1991, it has spread
|
|||
|
organically all over the world and has since become the de facto
|
|||
|
worldwide standard for encryption of E-mail. The US Customs Service
|
|||
|
is investigating how PGP spread outside the US. Because I am a
|
|||
|
target of this ongoing criminal investigation, my lawyer has advised
|
|||
|
me not to answer any questions related to the investigation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I. The information age is here.
|
|||
|
|
|||
|
Computers were developed in secret back in World War II mainly to
|
|||
|
break codes. Ordinary people did not have access to computers,
|
|||
|
because they were few in number and too expensive. Some people
|
|||
|
postulated that there would never be a need for more than half a
|
|||
|
dozen computers in the country. Governments formed their attitudes
|
|||
|
toward cryptographic technology during this period. And these
|
|||
|
attitudes persist today. Why would ordinary people need to have
|
|||
|
access to good cryptography?
|
|||
|
|
|||
|
Another problem with cryptography in those days was that
|
|||
|
cryptographic keys had to be distributed over secure channels so that
|
|||
|
both parties could send encrypted traffic over insecure channels.
|
|||
|
Governments solved that problem by dispatching key couriers with
|
|||
|
satchels handcuffed to their wrists. Governments could afford to
|
|||
|
send guys like these to their embassies overseas. But the great
|
|||
|
masses of ordinary people would never have access to practical
|
|||
|
cryptography if keys had to be distributed this way. No matter how
|
|||
|
cheap and powerful personal computers might someday become, you just
|
|||
|
can't send the keys electronically without the risk of interception.
|
|||
|
This widened the feasibility gap between Government and personal
|
|||
|
access to cryptography.
|
|||
|
|
|||
|
Today, we live in a new world that has had two major breakthroughs
|
|||
|
that have an impact on this state of affairs. The first is the
|
|||
|
coming of the personal computer and the information age. The second
|
|||
|
breakthrough is public-key cryptography.
|
|||
|
|
|||
|
With the first breakthrough comes cheap ubiquitous personal
|
|||
|
computers, modems, FAX machines, the Internet, E-mail, digital
|
|||
|
cellular phones, personal digital assistants (PDAs), wireless digital
|
|||
|
networks, ISDN, cable TV, and the data superhighway. This
|
|||
|
information revolution is catalyzing the emergence of a global
|
|||
|
economy.
|
|||
|
|
|||
|
But this renaissance in electronic digital communication brings with
|
|||
|
it a disturbing erosion of our privacy. In the past, if the
|
|||
|
Government wanted to violate the privacy of ordinary citizens, it had
|
|||
|
to expend a certain amount of effort to intercept and steam open and
|
|||
|
read paper mail, and listen to and possibly transcribe spoken
|
|||
|
telephone conversation. This is analogous to catching fish with a
|
|||
|
hook and a line, one fish at a time. Fortunately for freedom and
|
|||
|
|