mirror of
https://github.com/nhammer514/textfiles-politics.git
synced 2024-12-30 09:46:18 -05:00
280 lines
14 KiB
Plaintext
280 lines
14 KiB
Plaintext
Article 5363 of alt.security.pgp:
|
||
Newsgroups: alt.security.pgp
|
||
Path: cnsnews!boulder!agate!howland.reston.ans.net!vixen.cso.uiuc.edu!uwm.edu!linac!uchinews!gargoyle!hugh
|
||
From: hugh@gargoyle.uchicago.edu (Hugh Miller)
|
||
Subject: Phil Zimmermann Congressional Testimony
|
||
Message-ID: <hugh.750627595@gargoyle>
|
||
Sender: news@uchinews.uchicago.edu (News System)
|
||
Organization: University of Chicago -- Academic & Public Computing
|
||
Date: Thu, 14 Oct 1993 19:39:55 GMT
|
||
Lines: 271
|
||
|
||
|
||
Testimony of Philip Zimmermann to
|
||
Subcommittee for Economic Policy, Trade, and the Environment
|
||
US House of Representatives
|
||
12 Oct 1993
|
||
|
||
|
||
Mr. Chairman and members of the committee, my name is Philip
|
||
Zimmermann, and I am a software engineer who specializes in
|
||
cryptography and data security. I'm here to talk to you today about
|
||
the need to change US export control policy for cryptographic
|
||
software. I want to thank you for the opportunity to be here and
|
||
commend you for your attention to this important issue.
|
||
|
||
I am the author of PGP (Pretty Good Privacy), a public-key encryption
|
||
software package for the protection of electronic mail. Since PGP
|
||
was published domestically as freeware in June of 1991, it has spread
|
||
organically all over the world and has since become the de facto
|
||
worldwide standard for encryption of E-mail. The US Customs Service
|
||
is investigating how PGP spread outside the US. Because I am a
|
||
target of this ongoing criminal investigation, my lawyer has advised
|
||
me not to answer any questions related to the investigation.
|
||
|
||
|
||
|
||
I. The information age is here.
|
||
|
||
Computers were developed in secret back in World War II mainly to
|
||
break codes. Ordinary people did not have access to computers,
|
||
because they were few in number and too expensive. Some people
|
||
postulated that there would never be a need for more than half a
|
||
dozen computers in the country. Governments formed their attitudes
|
||
toward cryptographic technology during this period. And these
|
||
attitudes persist today. Why would ordinary people need to have
|
||
access to good cryptography?
|
||
|
||
Another problem with cryptography in those days was that
|
||
cryptographic keys had to be distributed over secure channels so that
|
||
both parties could send encrypted traffic over insecure channels.
|
||
Governments solved that problem by dispatching key couriers with
|
||
satchels handcuffed to their wrists. Governments could afford to
|
||
send guys like these to their embassies overseas. But the great
|
||
masses of ordinary people would never have access to practical
|
||
cryptography if keys had to be distributed this way. No matter how
|
||
cheap and powerful personal computers might someday become, you just
|
||
can't send the keys electronically without the risk of interception.
|
||
This widened the feasibility gap between Government and personal
|
||
access to cryptography.
|
||
|
||
Today, we live in a new world that has had two major breakthroughs
|
||
that have an impact on this state of affairs. The first is the
|
||
coming of the personal computer and the information age. The second
|
||
breakthrough is public-key cryptography.
|
||
|
||
With the first breakthrough comes cheap ubiquitous personal
|
||
computers, modems, FAX machines, the Internet, E-mail, digital
|
||
cellular phones, personal digital assistants (PDAs), wireless digital
|
||
networks, ISDN, cable TV, and the data superhighway. This
|
||
information revolution is catalyzing the emergence of a global
|
||
economy.
|
||
|
||
But this renaissance in electronic digital communication brings with
|
||
it a disturbing erosion of our privacy. In the past, if the
|
||
Government wanted to violate the privacy of ordinary citizens, it had
|
||
to expend a certain amount of effort to intercept and steam open and
|
||
read paper mail, and listen to and possibly transcribe spoken
|
||
telephone conversation. This is analogous to catching fish with a
|
||
hook and a line, one fish at a time. Fortunately for freedom and
|
||
|