1994-The-Cyphernomicon/10-Legal-Issues/10-Legal-Issues.md

1670 lines
96 KiB
Markdown
Raw Normal View History

10. Legal Issues
10.1. copyright
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
1994-09-10, Copyright Timothy C. May. All rights reserved.
See the detailed disclaimer. Use short sections under "fair
use" provisions, with appropriate credit, but don't put your
name on my words.
10.2. SUMMARY: Legal Issues
10.2.1. Main Points
10.2.2. Connections to Other Sections
- Sad to say, but legal considerations impinge on nearly
every aspect of crypto
10.2.3. Where to Find Additional Information
10.2.4. Miscellaneous Comments
- "I'm a scientist, Jim, not an attorney." Hence, take my
legal comments here with a grain of salt, representing only
hints of the truth as I picked them up from the discussions
on the various forums and lists.
10.3. Basic Legality of Encryption
10.3.1. "Is this stuff legal or illegal?"
- Certainly the _talking_ about it is mostly legal, at least
in the U.S. and at the time of this writing. In other
countries, you prison term may vary.
+ The actions resulting from crypto, and crypto anarchy, may
well be illegal. Such is often the case when technology is
applied without any particular regard for what the laws say
is permitted. (Pandora's Box and all that.)
- Cypherpunks really don't care much about such ephemera as
the "laws" of some geographic region. Cypherpunks make
their own laws.
+ There are two broad ways of getting things done:
- First, looking at the law and regulations and finding
ways to exploit them. This is the tack favored by
lawyers, of whic$are many in this country.
- Second, "just do it." In areas where the law hasn't
caught up, this can mean unconstrained technological
developement. Good examples are the computer and chip
business, where issues of legality rarely arose (except
in the usual areas of contract enforcement, etc.). More
recently the chip business has discovered lawyering, with
a vengeance.
- In other areas, where the law is centrally involved,
"just do it" can mean many technical violations of the
law. Examples: personal service jobs (maids and
babysitters), contracting jobs without licenses,
permissions, etc., and so on. Often these are "illegal
markets," putatively.
- And bear in mind that the legal system can be used to
hassle people, to pressure them to "plead out" to some
charges, to back off, etc. (In the firearms business, the
pressures and threats are also used to cause some
manufacturers, like Ruger, to back off on a radical pro-gun
stance, so as to be granted favors and milder treatment.
Pressure on crypto-producing companies are probably very
similar. Play ball, or we'll run you over in the parking
lot.)
10.3.2. "Why is the legal status of crypto so murky?"
- First, it may be murkier to me than it it to actual lawyers
like Mike Godwin and Michael Froomkin, both of whom have
been on our list at times. (Though my impression from
talking to Godwin is that many or even most of these issues
have not been addressed in the courts, let alone resolved
definitively.)
- Second, crypto issues have not generally reached the
courts, reflecting the nascent status of most of the things
talked about it here. Things as "trivial" as digital
signatures and digital timestamping have yet to be
challenged in courts, or declared illegal, or anything
similar that might produce a precedent-setting ruling. (Stu
Haber agrees that such tests are lacking.)
- Finally, the issues are deep ones, going to the heart of
issues of self-incrimination (disclosure of keys,
contempt), of intellectual property and export laws (want
to jail someone for talking about prime numbers?), and the
incredibly byzantine world of money and financial
instruments.
- A legal study of crypto--which I hear Professor Froomkin is
doing--could be very important.
10.3.3. "Has the basic legality of crypto and laws about crypto been
tested?"
- As usual, a U.S. focus here. I know little of the situation
in non-U.S. countries (and in many of them the law is
whatever the rulers say it is).
- And I'm not a lawyer.
+ Some facts:
- no direct Constitutional statement about privacy (though
many feel it is implied)
- crypto was not a major issue (espionage was, and was
dealt with harshly, but encrypting things was not a
problem per se)
+ only in the recent past has it become important...and it
will become much more so
- as criminals encrypt, as terrorists encrypt
- as tax is avoided via the techniques described here
- collusion of business ("crypto interlocking
directorates," price signalling)
- black markets, information markets
+ Lawrence Tribe..new amendment
- scary, as it may place limits.... (but unlikely to
happen)
+ Crypto in Court
- mostly untested
- can keys be compelled?
- Expect some important cases in the next several years
10.3.4. "Can authorities force the disclosure of a key?"
+ Mike Godwin, legal counsel for the EFF, has been asked this
queston _many_ times:
- "Note that a court could cite you for contempt for not
complying with a subpoena duces tecum (a subpoena
requiring you to produce objects or documents) if you
fail to turn over subpoenaed backups....To be honest, I
don't think *any* security measure is adequate against a
government that's determined to overreach its authority
and its citizens' rights, but crypto comes close." [Mike
Godwin, 1993-06-14]
+ Torture is out (in many countries, but not all). Truth
serum, etc., ditto.
- "Rubber hose cryptography"
+ Constitutional issues
- self-incrimination
+ on the "Yes" side:
+ is same, some say, as forcing combination to a safe
containing information or stolen goods
- but some say-and a court may have ruled on this-that
the safe can always be cut open and so the issue is
mostly moot
- while forcing key disclosure is compelled testimony
- and one can always claim to have forgotten the key
- i.e., what happens when a suspect simply clams up?
- but authorities can routinely demand cooperation in
investigations, can seize records, etc.
+ on the "No" side:
- can't force a suspect to talk, whether about where he hid
the loot or where his kidnap victim is hidden
- practically speaking, someone under indictment cannot be
forced to reveal Swiss bank accounts....this would seem
to be directly analogous to a cryptographic key
- thus, the key to open an account would seem to be the
same thing
- a memorized key cannot be forced, says someone with EFF
or CPSR
+ "Safe" analogy
+ You have a safe, you won' tell the combination
- you just refuse
- you claim to have forgotten it
- you really don't know it
- cops can cut the safe open, so compelling a combination
is not needed
- "interefering with an investigation"
- on balance, it seems clear that the disclosure of
cryptographic keys cannot be forced (though the practical
penalty for nondisclosure could be severe)
+ Courts
+ compelled testimony is certainly common
- if one is not charged, one cannot take the 5th (may be
some wrinkles here)
- contempt
+ What won't immunize disclosure:
+ clever jokes about "I am guilty of money laundering"
- can it be used?
- does judge declaring immunity apply in this case?
- Eric Hughes has pointed out that the form of the
statement is key: "My key is: "I am a murderer."" is
not a legal admission of anything.
- (There may be some subtleties where the key does contain
important evidence--perhaps the location of a buried body-
-but I think these issues are relatively minor.)
- but this has not really been tested, so far as I know
- and many people say that such cooperation can be
demanded...
- Contempt, claims of forgetting
10.3.5. Forgetting passwords, and testimony
+ This is another area of intense speculation:
- "I forgot. So sue me."
- "I forgot. It was just a temporary file I was working on,
and I just can't remember the password I picked." (A less
in-your-face approach.)
+ "I refuse to give my password on the grounds that it may
tend to incriminate me."
+ Canonical example: "My password is: 'I sell illegal
drugs.'"
- Eric Hughes has pointed out this is not a real
admission of guilt, just a syntactic form, so it is
nonsense to claim that it is incriminating. I agree.
I don't know if any court tests have confirmed this.
+ Sandy Sandfort theorizes that this example might work, or
at least lead to an interesting legal dilemma:
- "As an example, your passphrase could be:
I shot a cop in the back and buried his body
under
the porch at 123 Main St., anywhere USA. The gun
is
wrapped in an oily cloth in my mother's attic.
"I decline to answer on the grounds that my passphrase is
a statement which may tend to incriminate me. I will
only give my passphrase if I am given immunity from
prosecution for the actions to which it alludes."
"Too cute, I know, but who knows, it might work." [S.S.,
1994-0727]
10.3.6. "What about disavowal of keys? Of digital signatures? Of
contracts?
- In the short term, the courts are relatively silent, as few
of these issues have reached the courts. Things like
signatures and contract breaches would likely be handled as
they currently are (that is, the judge would look at the
circumstances, etc.)
+ Clearly this is a major concern. There are two main avenues
of dealing with this"
- The "purist" approach. You *are* your key. Caveat emptor.
Guard your keys. If your signature is used, you are
responsible. (People can lessen their exposure by using
protocols that limit risk, analogous to the way ATM
systems only allow, say, $200 a day to be withdrawn.)
- The legal system can be used (maybe) to deal with these
issues. Maybe. Little of this has been tested in courts.
Conventional methods of verifying forged signatures will
not work. Contract law with digital signatures will be a
new area.
- The problem of *repudiation* or *disavowal* was recognized
early on in cryptologic circles. Alice is confronted with a
digital signature, or whatever. She says; "But I didn't
sign that" or "Oh, that's my old key--it's obsolete" or "My
sysadmin must have snooped through my files," or "I guess
those key escrow guys are at it again."
- I think that only the purist stance will hold water in the
long run.(A hint of this: untraceable cash means, for most
transactions of interest with digital cash, that once the
crypto stuff has been handled, whether the sig was stolen
or not is moot, because the money is gone...no court can
rule that the sig was invalid and then retrieve the cash!)
10.3.7. "What are some arguments for the freedom to encrypt?"
- bans are hard to enforce, requiring extensive police
intrusions
- private letters, diaries, conversations
- in U.S., various provisions
- anonymity is often needed
10.3.8. Restrictions on anonymity
- "identity escrow" is what Eric Hughes calls it
- linits on mail drops, on anonymous accounts, and--perhaps
ultimately--on cash purchases of any and all goods
10.3.9. "Are bulletin boards and Internet providers "common carriers"
or not?"
- Not clear. BBS operators are clearly held more liable for
content than the phone company is, for example.
10.3.10. Too much cleverness is passing for law
- Many schemes to bypass tax laws, regulations, etc., are, as
the British like to say, "too cute by half." For example,
claims that the dollar is defined as 1/35th of an ounce of
gold and that the modern dollar is only 1/10th of this. Or
that Ohio failed to properly enter the Union, and hence all
laws passed afterward are invalid. The same could be said
of schemes to deploy digital cash be claiming that ordinary
laws do not apply. Well, those who try such schemes often
find out otherwise, sometimes in prison. Tread carefully.
10.3.11. "Is it legal to advocate the overthrow of governments or the
breaking of laws?"
- Although many Cypherpunks are not radicals, many others of
us are, and we often advocate "collapse of governments" and
other such things as money laundering schemes, tax evasion,
new methods for espionage, information markets, data
havens, etc. This rasises obvious concerns about legality.
- First off, I have to speak mainly of U.S. issues...the laws
of Russia or Japan or whatever may be completely different.
Sorry for the U.S.-centric focus of this FAQ, but that's
the way it is. The Net started here, and still is
dominantly here, and the laws of the U.S. are being
propagated around the world as part of the New World Order
and the collapse of the other superpower.
- Is it legal to advocate the replacement of a government? In
the U.S., it's the basic political process (though cynics
might argue that both parties represent the same governing
philosophy). Advocating the *violent overthrow* of the U.S.
government is apparently illegal, though I lack a cite on
this.
+ Is it legal to advocate illegal acts in general? Certainly
much of free speech is precisely this: arguing for drug
use, for boycotts, etc.
+ The EFF gopher site has this on "Advocating Lawbreaking,
Brandenburg v. Ohio. ":
- "In the 1969 case of Brandenburg v. Ohio, the Supreme
Court struck down the conviction of a Ku Klux Klan
member under a criminal syndicalism law and established
a new standard: Speech may not be suppressed or
punished unless it is intended to produce 'imminent
lawless action' and it is 'likely to produce such
action.' Otherwise, the First Amendment protects even
speech that advocates violence. The Brandenburg test is
the law today. "
10.4. Can Crypto be Banned?
10.4.1. "Why won't government simply _ban such encryption methods?"
+ This has always been the Number One Issue!
- raised by Stiegler, Drexler, Salin, and several others
(and in fact raised by some as an objection to my even
discussing these issues, namely, that action may then be
taken to head off the world I describe)
+ Types of Bans on Encryption and Secrecy
- Ban on Private Use of Encryption
- Ban on Store-and-Forward Nodes
- Ban on Tokens and ZKIPS Authentication
- Requirement for public disclosure of all transactions
+ Recent news (3-6-92, same day as Michaelangelo and
Lawnmower Man) that government is proposing a surcharge
on telcos and long distance services to pay for new
equipment needed to tap phones!
- S.266 and related bills
- this was argued in terms of stopping drug dealers and
other criminals
- but how does the government intend to deal with the
various forms fo end-user encryption or "confusion"
(the confusion that will come from compression,
packetizing, simple file encryption, etc.)
+ Types of Arguments Against Such Bans
- The "Constitutional Rights" Arguments
+ The "It's Too Late" Arguments
- PCs are already widely scattered, running dozens of
compression and encryption programs...it is far too
late to insist on "in the clear" broadcasts, whatever
those may be (is program code distinguishable from
encrypted messages? No.)
- encrypted faxes, modem scramblers (albeit with some
restrictions)
- wireless LANs, packets, radio, IR, compressed text and
images, etc....all will defeat any efforts short of
police state intervention (which may still happen)
+ The "Feud Within the NSA" Arguments
- COMSEC vs. PROD
+ Will affect the privacy rights of corporations
- and there is much evidence that corporations are in
fact being spied upon, by foreign governments, by the
NSA, etc.
+ They Will Try to Ban Such Encryption Techniques
+ Stings (perhaps using viruses and logic bombs)
- or "barium," to trace the code
+ Legal liability for companies that allow employees to use
such methods
- perhaps even in their own time, via the assumption that
employees who use illegal software methods in their own
time are perhaps couriers or agents for their
corporations (a tenuous point)
10.4.2. The long-range impossibility of banning crypto
- stego
- direct broadcast to overhead satellites
- samizdat
- compression, algorithms, ....all made plaintext hard to
find
10.4.3. Banning crypto is comparable to
+ banning ski masks because criminals can hide their identity
- Note: yes, there are laws about "going masked for the
purpose of being masked," or somesuch
+ insisting that all speech be in languages understandable by
eavesdroppers
- (I don't mean "official languages" for dealing with the
Feds, or what employers may reasonably insist on)
- outlawing curtains, or at least requiring that "Clipper
curtains" be bought (curtains which are transparent at
wavelengths the governments of the world can use)
- position escrow, via electronic bracelets like criminals
wear
- restrictions on books that possibly help criminals
- banning body armor (proposed in several communities)
- banning radar detectors
- (Note that these bans become more "reasonable" when the
items like body armor and radar detectos are reached, at
least to many people. Not to me, of course.)
10.4.4. So Won't Governments Stop These Systems?
- Citing national security, protection of private property,
common decency, etc.
+ Legal Measures
- Bans on ownership and operation of "anonymous" systems
+ Restrictions on cryptographic algorithms
- RSA patent may be a start
+ RICO, civil suits, money-laundering laws
- FINCEN, Financial Crimes Information Center
- IRS, Justice, NSA, FBI, DIA, CIA
- attempts to force other countries to comply with U.S.
banking laws
10.4.5. Scenario for a ban on encryption
- "Paranoia is cryptography's occupational hazard." [Eric
Hughes, 1994-05-14]
+ There are many scenarios. Here is a graphic one from Sandy
Sandfort:
- "Remember the instructions for cooking a live frog. The
government does not intend to stop until they have
effectively eliminated your privacy.
STEP 1: Clipper becomes the de facto encryption
standard.
STEP 2: When Cypherpunks and other "criminals" eschew
Clipper in favor of trusted strong crypto, the government
is "forced" to ban non-escrowed encryption systems.
(Gotta catch those pedophiles, drug dealers and
terrorists, after all.)
STEP 3: When Cypherpunks and other criminals use
superencryption with Clipper or spoof LEAFs, the
government will regretably be forced to engage in random
message monitoring to detect these illegal techniques.
Each of these steps will be taken because we wouldn't
passively accept such things as unrestricted wiretaps and
reasonable precautions like
digital telephony. It will portrayed as our fault.
Count on it." [Sandy Sandfort, 6-14-94]
10.4.6. Can the flow of bits be stopped? Is the genie really out of
the bottle?
- Note that Carl Ellison has long argued that the genie was
never _in_ the bottle, at least not in the U.S. in non-
wartime situations (use of cryptography, especially in
communications, in wartime obviously raises eyebrows)
10.5. Legal Issues with PGP
7.12.1. "What is RSA Data Security Inc.'s position on PGP?"
I. They were strongly opposed to early versions
II. objections
- infringes on PKP patents (claimed infringements, not
tested in court, though)
- breaks the tight control previously seen
- brings unwanted attention to public key approaches (I
think PGP also helped RSA and RSADSI)
- bad blood between Zimmermann and Bidzos
III. objections
- infringes on PKP patents (claimed infringements, not
tested in court, though)
- breaks the tight control previously seen
- brings unwanted attention to public key approaches (I
think PGP also helped RSA and RSADSI)
- bad blood between Zimmermann and Bidzos
IV. Talk of lawsuits, actions, etc.
V. The 2.6 MIT accomodation may have lessened the tension;
purely speculative
7.12.2. "Is PGP legal or illegal"?
7.12.3. "Is there still a conflict between RSADSI and PRZ?"
- Apparently not. The MIT 2.6 negotiations seem to have
buried all such rancor. At least officially. I hear there's
still animosity, but it's no longer at the surface. (And
RSADSI is now facing lawsuits and patent suits.)
10.6. Legal Issues with Remailers
8.9.1. What's the legal status of remailers?
- There are no laws against it at this time.
- No laws saying people have to put return addresses on
messages, on phone calls (pay phones are still legal), etc.
- And the laws pertaining to not having to produce identity
(the "flier" case, where leaflet distributors did not have
to produce ID) would seem to apply to this form of
communication.
+ However, remailers may come under fire:
+ Sysops, MIT case
- potentially serious for remailers if the case is
decided such that the sysop's creation of group that
was conducive to criminal pirating was itself a
crime...that could make all involved in remailers
culpable
8.9.2. "Can remailer logs be subpoenaed?"
- Count on it happening, perhaps very soon. The FBI has been
subpoenaing e-mail archives for a Netcom customer (Lewis De
Payne), probably because they think the e-mail will lead
them to the location of uber-hacker Kevin Mitnick. Had the
parties used remailers, I'm fairly sure we'd be seeing
similar subpoenas for the remailer logs.
- There's no exemption for remailers that I know of!
+ The solutions are obvious, though:
- use many remailers, to make subpoenaing back through the
chain very laborious, very expensive, and likely to fail
(if even one party won't cooperate, or is outside the
court's jurisdiction, etc.)
- offshore, multi-jurisdictional remailers (seleted by the
user)
- no remailer logs kept...destroy them (no law currently
says anybody has to keep e-mail records! This may
change....)
- "forward secrecy," a la Diffie-Hellman forward secrecy
8.9.3. How will remailers be harassed, attacked, and challenged?
8.9.4. "Can pressure be put on remailer operators to reveal traffic
logs and thereby allow tracing of messages?"
+ For human-operated systems which have logs, sure. This is
why we want several things in remailers:
* no logs of messages
* many remailers
* multiple legal jurisdictions, e.g., offshore remailers
(the more the better)
* hardware implementations which execute instructions
flawlessly (Chaum's digital mix)
8.9.5. Calls for limits on anonymity
+ Kids and the net will cause many to call for limits on
nets, on anonymity, etc.
- "But there's a dark side to this exciting phenomenon, one
that's too rarely understood by computer novices.
Because they
offer instant access to others, and considerable
anonymity to
participants, the services make it possible for people -
especially computer-literate kids - to find themselves in
unpleasant, sexually explicit social situations.... And
I've gradually
come to adopt the view, which will be controversial among
many online
users, that the use of nicknames and other forms of
anonymity
must be eliminated or severly curbed to force people
online into
at least as much accountability for their words and
actions as
exists in real social encounters." [Walter S. Mossberg,
Wall Street Journal, 6/30/94, provided by Brad Dolan]
- Eli Brandt came up with a good response to this: "The
sound-bite response to this: do you want your child's
name, home address, and phone number available to all
those lurking pedophiles worldwide? Responsible parents
encourage their children to use remailers."
- Supreme Court said that identity of handbill distributors
need not be disclosed, and pseudonyms in general has a long
and noble tradition
- BBS operators have First Amendment protections (e.g..
registration requirements would be tossed out, exactly as
if registration of newspapers were to be attempted)
8.9.6. Remailers and Choice of Jurisdictions
- The intended target of a remailed message, and the subject
material, may well influence the set of remailers used,
especially for the very important "last remailer' (Note: it
should never be necessary to tell remailers if they are
first, last, or others, but the last remailer may in fact
be able to tell he's the last...if the message is in
plaintext to the recipient, with no additional remailer
commands embedded, for example.)
- A message involving child pornography might have a remailer
site located in a state like Denmark, where child porn laws
are less restrictive. And a message critical of Islam might
not be best sent through a final remailer in Teheran. Eric
Hughes has dubbed this "regulatory arbitrage," and to
various extents it is already common practice.
- Of course, the sender picks the remailer chain, so these
common sense notions may not be followed. Nothing is
perfect, and customs will evolve. I can imagine schemes
developing for choosing customers--a remailer might not
accept as a customer certain abusers, based on digital
pseudonyms < hairy).
8.9.7. Possible legal steps to limit the use of remailers and
anonymous systems
- hold the remailer liable for content, i.e., no common
carrier status
- insert provisions into the various "anti-hacking" laws to
criminalize anonymous posts
8.9.8. Crypto and remailers can be used to protect groups from "deep
pockets" lawsuits
- products (esp. software) can be sold "as is," or with
contracts backed up by escrow services (code kept in an
escrow repository, or money kept there to back up
committments)
+ jurisdictions, legal and tax, cannot do "reach backs" which
expose the groups to more than they agreed to
- as is so often the case with corporations in the real
world, which are taxed and fined for various purposes
(asbestos, etc.)
- (For those who panic at the thought of this, the remedy for
the cautious will be to arrange contracts with the right
entities...probably paying more for less product.)
8.9.9. Could anonymous remailers be used to entrap people, or to
gather information for investigations?
- First, there are so few current remailers that this is
unlikely. Julf seems a non-narc type, and he is located in
Finland. The Cypherpunks remailers are mostly run by folks
like us, for now.
- However, such stings and set-ups have been used in the past
by narcs and "red squads." Expect the worse from Mr.
Policeman. Now that evil hackers are identified as hazards,
expect moves in this direction. "Cryps" are obviously
"crack" dealers.
- But use of encryption, which CP remailers support (Julf's
does not), makes this essentially moot.
10.7. Legal Issues with Escrowed Encryption and Clipper
9.17.1. As John Gilmore put it in a guest editorial in the "San
Francisco Examiner," "...we want the public to see a serious
debate about why the Constitution should be burned in order
to save the country." [J.G., 1994-06-26, quoted by S.
Sandfort]
9.17.2. "I don't see how Clipper gives the government any powers or
capabilities it doesn't already have. Comments?"
9.17.3. Is Clipper really voluntary?
9.17.4. If Clipper is voluntary, who will use it?
9.17.5. Restrictions on Civilian Use of Crypto
9.17.6. "Has crypto been restricted in the U.S.?"
9.17.7. "What legal steps are being taken?"
- Zimmermann
- ITAR
9.17.8. reports that Department of Justice has a compliance
enforcement role in the EES [heard by someone from Dorothy
Denning, 1994-07], probably involving checking the law
enforcement agencies...
9.17.9. Status
+ "Will government agencies use Clipper?"
- Ah, the embarrassing question. They claim they will, but
there are also reports that sensitive agencies will not
use it, that Clipper is too insecure for them (key
lenght, compromise of escrow data, etc.). There may also
be different procedures (all agencies are equal, but some
are more equal than others).
- Clipper is rated for unclassified use, so this rules out
many agencies and many uses. An interesting double
standard.
+ "Is the Administration backing away from Clipper?"
+ industry opposition surprised them
- groups last summer, Citicorp, etc.
- public opinion
- editorial remarks
- so they may be preparing alternative
- and Gilmore's FOIA, Blaze's attack, the Denning
nonreview, the secrecy of the algortithm
+ will not work
- spies won't use it, child pornographers probably won't
use it (if alternatives exist, which may be the whole
point)
- terrorists won't use it
- Is Clipper in trouble?
9.17.10. "Will Clipper be voluntary?"
- Many supporters of Clipper have cited the voluntary nature
of Clipper--as expressed in some policy statements--and
have used this to counter criticism.
+ However, even if truly voluntary, some issues
+ improper role for government to try to create a
commercial standard
- though the NIST role can be used to counter this point,
partly
- government can and does make it tough for competitors
- export controls (statements by officials on this exist)
+ Cites for voluntary status:
- original statement says it will be voluntary
- (need to get some statements here)
+ Cites for eventual mandatory status:
- "Without this initiative, the government will eventually
become helpless to defend the nation." [Louis Freeh,
director of the FBI, various sources]
- Steven Walker of Trusted Information Systems is one of
many who think so: "Based on his analysis, Walker added,
"I'm convinced that five years from now they'll say 'This
isn't working,' so we'll have to change the rules." Then,
he predicted, Clipper will be made mandatory for all
encoded communications." [
+ Parallels to other voluntary programs
- taxes
10.8. Legal Issues with Digital Cash
10.8.1. "What's the legal status of digital cash?"
- It hasn't been tested, like a lot of crypto protocols. It
may be many years before these systems are tested.
10.8.2. "Is there a tie between digital cash and money laundering?"
- There doesn't have to be, but many of us believe the
widespread deployment of digital, untraceable cash will
make possible new approaches
- Hence the importance of digital cash for crypto anarchy and
related ideas.
- (In case it isn't obvious, I consider money-laundering a
non-crime.)
10.8.3. "Is it true the government of the U.S. can limit funds
transfers outside the U.S.?"
- Many issues here. Certainly some laws exist. Certainly
people are prosecuted every day for violating currency
export laws. Many avenues exist.
- "LEGALITY - There isn't and will never be a law restricting
the sending of funds outside the United States. How do I
know? Simple. As a country dependant on international
trade (billions of dollars a year and counting), the
American economy would be destroyed." [David Johnson,
privacy@well.sf.ca.us, "Offshore Banking & Privacy,"
alt.privacy, 1994-07-05]
10.8.4. "Are "alternative currencies" allowed in the U.S.? And what's
the implication for digital cash of various forms?
- Tokens, coupons, gift certificates are allowed, but face
various regulations. Casino chips were once treated as
cash, but are now more regulated (inter-casino conversion
is no longer allowed).
- Any attempt to use such coupons as an alternative currency
face obstacles. The coupons may be allowed, but heavily
regulated (reporting requirements, etc.).
- Perry Metzger notes, bearer bonds are now illegal in the
U.S. (a bearer bond represented cash, in that no name was
attached to the bond--the "bearer" could sell it for cash
or redeem it...worked great for transporting large amounts
of cash in compact form).
+ Note: Duncan Frissell claims that bearer bonds are _not_
illegal.
- "Under the Tax Equity and Fiscal Responsibility Act of
1982 (TEFRA), any interest payments made on *new* issues
of domestic bearer bonds are not deductible as an
ordinary and necessary business expense so none have been
issued since then. At the same time, the Feds
administratively stopped issuing treasury securities in
bearer form. Old issues of government and corporate debt
in bearer form still exist and will exist and trade for
30 or more years after 1982. Additionally, US residents
can legally buy foreign bearer securities." [Duncan
Frissell, 1994-08-10]
- Someone else has a slightly different view: "The last US
Bearer Bond issues mature in 1997. I also believe that to
collect interest, and to redeem the bond at maturity, you
must give your name and tax-id number to the paying
agent. (I can check with the department here that handles
it if anyone is interested in the pertinent OCC regs that
apply)" [prig0011@gold.tc.umn.edu, 1994-08-10]
- I cite this gory detail to give readers some idea about
how much confusion there is about these subjects. The
usual advice is to "seek competent counsel," but in fact
most lawyers have no clear ideas about the optimum
strategies, and the run-of-the-mill advisor may mislead
one dangerously. Tread carefully.
- This has implications for digital cash, of course.
10.8.5. "Why might digital cash and related techologies take hold
early in illegal markets? That is, will the Mob be an early
adopter?"
- untraceability needed
- and reputations matter to them
- they've shown in the past that they will try new
approaches, a la the money movements of the drug cartels,
novel methods for security, etc.
10.8.6. "Electronic cash...will it have to comply with laws, and
how?"
- Concerns will be raised about the anonymity aspects, the
usefulness for evading taxes and reporting requirements,
etc.
- a messy issue, sure to be debated and legislated about for
many years
+ split the cash into many pieces...is this "structuring"? is
it legal?
- some rules indicate the structuring per se is not
illegal, only tax evasion or currency control evasion
- what then of systems which _automatically_, as a basic
feature, split the cash up into multiple pieces and move
them?
10.8.7. Currency controls, flight capital regulations, boycotts,
asset seizures, etc.
- all are pressures to find alternate ways for capital to
flow
- all add to the lack of confidence, which, paradoxically to
lawmakers, makes capital flight all the more likely
10.8.8. "Will banking regulators allow digital cash?"
- Not easily, that's for sure. The maze of regulations,
restrictions, tax laws, and legal rulings is daunting. Eric
Hughes spent a lot of time reading up on the laws regarding
banks, commercial paper, taxes, etc., and concluded much
the same. I'm not saying it's impossible--indeed, I believe
it will someday happen, in some form--but the obstacles are
formidable.
+ Some issues:
+ Will such an operation be allowed to be centered or based
in the U.S.?
- What states? What laws? Bank vs. Savings and Loan vs.
Credit Union vs. Securities Broker vs. something else?
+ Will customers be able to access such entities offshore,
outside the U.S.?
- strong crypto makes communication possible, but it may
be difficult, not part of the business fabric, etc.
(and hence not so useful--if one has to send PGP-
encrypted instructions to one's banker, and can't use
the clearing infrastructure....)
+ Tax collection, money-laundering laws, disclosure laws,
"know your customer" laws....all are areas where a
"digital bank" could be shut down forthwith. Any bank not
filling out the proper forms (including mandatory
reporting of transactions of certain amounts and types,
and the Social Security/Taxpayer Number of customers)
faces huge fines, penalties, and regulatory sanctions.
- and the existing players in the banking and securities
business will not sit idly by while newcomers enter
their market; they will seek to force newcomers to jump
through the same hoops they had to (studies indicate
large corporations actually _like_ red tape, as it
helps them relative to smaller companies)
- Concluson: Digital banks will not be "launched" without a
*lot* of work by lawyers, accountants, tax experts,
lobbyists, etc. "Lemonade stand digital banks" (TM) will
not survive for long. Kids, don't try this at home!
- (Many new industries we are familiar with--software,
microcomputers--had very little regulation, rightly so. But
the effect is that many of us are unprepared to understand
the massive amount of red tape which businesses in other
areas, notably banking, face.)
10.8.9. Legal obstacles to digital money. If governments don't want
anonymous cash, they can make things tough.
+ As both Perry Metzger and Eric Hughes have said many times,
regulations can make life very difficult. Compliance with
laws is a major cost of doing business.
- ~"The cost of compliance in a typical USA bank is 14% of
operating costs."~ [Eric Hughes, citing an "American
Banker" article, 1994-08-30]
+ The maze of regulations is navigable by larger
institutions, with staffs of lawyers, accountants, tax
specialists, etc., but is essentially beyond the
capabilities of very small institutions, at least in the
U.S.
- this may or may not remain the case, as computers
proliferate. A "bank-in-a-box" program might help. My
suspicion is that a certain size of staff is needed just
to handle the face-to-face meetings and hoop-jumping.
+ "New World Order"
- U.S. urging other countries to "play ball" on banking
secrecy, on tax evasion extradition, on immigration, etc.
- this is closing off the former loopholes and escape
hatches that allowed people to escape repressive
taxation...the implications for digital money banks are
unclear, but worrisome.
10.9. Legality of Digital Banks and Digital Cash?
10.9.1. In terms of banking laws, cash reporting regulations, money
laundering statutes, and the welter of laws connected with
financial transactions of all sorts, the Cypherpunks themes
and ideas are basically _illegal_. Illegal in the sense that
anyone trying to set up his own bank, or alternative currency
system, or the like would be shut down quickly. As an
informal, unnoticed _experiment_, such things are reasonably
safe...until they get noticed.
10.9.2. The operative word here is "launch," in my opinion. The
"launch" of the BankAmericard (now VISA) in the 1960s was not
done lightly or casually...it required armies of lawyers,
accountants, and other bureacrats to make the launch both
legal and successful. The mere 'idea" of a credit card was
not enough...that was essentially the easiest part of it all.
(Anyone contemplating the launch of a digital cash system
would do well to study BankAmericard as an example...and
several other examples also.)
10.9.3. The same will be true of any digital cash or similar system
which intends to operate more or less openly, to interface
with existing financial institutions, and which is not
explicity intended to be a Cypherpunkish underground
activity.
10.10. Export of Crypto, ITAR, and Similar Laws
10.10.1. "What are the laws and regulations about export of crypto,
and where can I find more information?"
- "The short answer is that the Department of State, Office
of Defense Trade Controls (DOS/DTC) and the National
Security Administration (NSA) won't allow unrestricted
export (like is being done with WinCrypt) for any
encryption program that the NSA can't crack with less than
a certain amount (that they are loathe to reveal) of
effort. For the long answer, see
ftp://ftp.csn.net/cryptusa.txt.gz and/or call DOS/DTC at
703-875-7041." [Michael Paul Johnson, sci.crypt, 1994-07-
08]
10.10.2. "Is it illegal to send encrypted stuff out of the U.S.?"
- This has come up several times, with folks claiming they've
heard this.
- In times of war, real war, sending encrypted messages may
indeed be suspect, perhaps even illegal.
- But the U.S. currently has no such laws, and many of us
send lots of encrypted stuff outside the U.S. To remailers,
to friends, etc.
- Encrypted files are often tough to distinguish from
ordinary compressed files (high entropy), so law
enforcement would have a hard time.
- However, other countries may have different laws.
10.10.3. "What's the situation about export of crypto?"
+ There's been much debate about this, with the case of Phil
Zimmermann possibly being an important test case, should
charges be filed.
- as of 1994-09, the Grand Jury in San Jose has not said
anything (it's been about 7-9 months since they started
on this issue)
- Dan Bernstein has argued that ITAR covers nearly all
aspects of exporting crypto material, including codes,
documentation, and even "knowledge." (Controversially, it
may be in violation of ITAR for knowledgeable crypto people
to even leave the country with the intention of developing
crypto tools overseas.)
- The various distributions of PGP that have occurred via
anonymous ftp sources don't imply that ITAR is not being
enforced, or won't be in the future.
10.10.4. Why and How Crypto is Not the Same as Armaments
- the gun comparison has advantages and disadvantages
- "right to keep and bear arms"
- but then this opens the door wide to restrictions,
regulations, comparisons of crypto to nuclear weapons, etc.
-
+ "Crypto is not capable of killing people directly. Crypto
consists
- entirely of information (speech, if you must) that cannot
be
- interdicted. Crypto has civilian use.
- -
- <Robert Krawitz <rlk@think.com>, 4-11-94, sci.crypt>
10.10.5. "What's ITAR and what does it cover?"
+ ITAR, the International Trafficking in Arms Regulations, is
the defining set of rules for export of munitions--and
crypto is treated as munitions.
- regulations for interpreting export laws
+ NSA may have doubts that ITAR would hold up in court
- Some might argue that this contravenes the Constitution,
and hence would fail in court. Again, there have been few
if any solid tests of ITAR in court, and some indications
that NSA lawyers are reluctant to see it tested, fearing
it would not pass muster.
- doubts about legality (Carl Nicolai saw papers, since
confirmed in a FOIA)
- Brooks statement
- Cantwell Bill
- not fully tested in court
+ reports of NSA worries that it wouldn't hold up in court if
ever challenged
- Carl Nicolai, later FOIA results, conversations with Phil
+ Legal Actions Surrounding ITAR
- The ITAR laws may be used to fight hackers and
Cypherpunks...the outcome of the Zimmermann indictment
will be an important sign.
+ What ITAR covers
- "ITAR 121.8(f): ``Software includes but is not limited to
the system functional design, logic flow, algorithms,
application programs, operating systems and support
software for design, implementation, test, operation,
diagnosis and repair.'' [quoted by Dan Bernstein,
talk.politics.crypto, 1994-07-14]
- joke by Bidzos about registering as an international arms
dealer
+ ITAR and code (can code be published on the Net?)
- "Why does ITAR matter?"
- Phil Karn is involved with this, as are several others
here
+ Dan Bernstein has some strongly held views, based on his
long history of fighting the ITAR
- "Let's assume that the algorithm is capable of
maintaining secrecy of information, and that it is not
restricted to decryption, banking, analog scrambling,
special smart cards, user authentication, data
authentication, data compression, or virus protection.
"The algorithm is then in USML Category XIII(b)(1).
"It is thus a defense article. ITAR 120.6. " [Dan
Bernstein, posting code to sci.crypt,
talk.politics.crypto, 1994-08-22]
- "Sending a defense article out of the United States in
any manner (except as knowledge in your head) is
export. ITAR 120.17(1).
"So posting the algorithm constitutes export. There are
other forms of export, but I won't go into them here.
"The algorithm itself, without any source code, is
software." [Dan Bernstein, posting code to sci.crypt,
talk.politics.crypto, 1994-08-22]
- "The statute is the Arms Export Control Act; the
regulations are the
International Traffic in Arms Regulations. For precise
references, see
my ``International Traffic in Arms Regulations: A
Publisher's Guide.''" [Dan Bernstein, posting code to
sci.crypt, talk.politics.crypto, 1994-08-22]
+ "Posting code is fine. We do it all the time; we have
the right to do it; no one seems to be trying to stop us
from doing it." [Bryan G. Olson, posting code to
sci.crypt, talk.politics.crypto, 1994-08-20]
- Bernstein agrees that few busts have occurred, but
warns: "Thousands of people have distributed crypto in
violation of ITAR; only two, to my knowledge, have been
convicted. On the other hand, the guv'mint is rapidly
catching up with reality, and the Phil Zimmermann case
may be the start of a serious crackdown." [Dan
Bernstein, posting code to sci.crypt,
talk.politics.crypto, 1994-08-22]
- The common view that academic freedom means one is OK is
probably not true.
+ Hal Finney neatly summarized the debate between Bernstein
and Olsen:
- "1) No one has ever been prosecuted for posting code on
sci.crypt. The Zimmermann case, if anything ever comes
of it, was not about posting code on Usenet, AFAIK.
"2) No relevant government official has publically
expressed an opinion on whether posting code on
sci.crypt would be legal. The conversations Dan
Bernstein posted dealt with his requests for permission
to export his algorithm, not to post code on sci.crypt.
"3) We don't know whether anyone will ever be
prosecuted for posting code on sci.crypt, and we don't
know what the outcome of any such prosecution would
be." [Hal Finney, talk.politics.crypto, 1994-008-30]
10.10.6. "Can ITAR and other export laws be bypassed or skirted by
doing development offshore and then _importing_ strong crypto
into the U.S.?"
- IBM is reportedly doing just this: developing strong crypto
products for OS/2 at its overseas labs, thus skirting the
export laws (which have weakened the keys to some of their
network security products to the 40 bits that are allowed).
+ Some problems:
- can't send docs and knowhow to offshore facilities (some
obvious enforcement problems, but this is how the law
reads)
- may not even be able to transfer knowledgeable people to
offshore facilities, if the chief intent is to then have
them develop crypto products offshore (some deep
Constitutional issues, I would think...some shades of how
the U.S.S.R. justified denying departure visas for
"needed" workers)
- As with so many cases invovling crypto, there are no
defining legal cases that I am aware of.
10.11. Regulatory Arbitrage
10.11.1. Jurisdictions with more favorable laws will see claimants
going there.
10.11.2. Similar to "capital flight" and "people voting with their
feet."
10.11.3. Is the flip side of "jurisdiction shopping." wherein
prosecutors shop around for a jurisdiction that will be
likelier to convict. (As with the Amateur Action BBS case,
tried in Memphis, Tennessee, not in California.)
10.12. Crypto and Pornography
10.12.1. There's been a lot of media attention given to this,
especially pedophilia (pedophilia is not the same thing as
porn, of course, but the two are often discussed in articles
about the Net). As Rishab Ghosh put it: "I think the
pedophilic possibilities of the Internet capture the
imaginations of the media -- their deepest desires, perhaps."
[R.G., 1994-07-01]
10.12.2. The fact is, the two are made for each other. The
untraceability of remailers, the unbreakability of strong
crypto if the files are intercepted by law enforcement, and
the ability to pay anonymously, all mean the early users of
commercial remailers will likely be these folks.
10.12.3. Avoid embarrassing stings! Keep your job at the elementary
school! Get re-elected to the church council!
10.12.4. pedophilia, bestiality, etc. (morphed images)
10.12.5. Amateur Action BBS operator interested in crypto....a little
bit too late
10.12.6. There are new prospects for delivery of messages as part of
stings or entrapment attacks, where the bits decrypt into
incriminating evidence when the right key is used. (XOR of
course)
10.12.7. Just as the law enforcement folks are claiming, strong crypto
and remailers will make new kinds of porn networks. The nexus
or source will not be known, and the customers will not be
known.
- (An interesting strategy: claim customers unknown, and
their local laws. Make the "pickup" the customer's
responsibility (perhaps via agents).
10.13. Usenet, Libel, Local Laws, Jurisdictions, etc.
10.13.1. (Of peripheral importance to crypto themes, but important for
issues of coming legislation about the Net, attempts to
"regain control," etc. And a bit of a jumble of ideas, too.)
10.13.2. Many countries, many laws. Much of Usenet traffic presumably
violates various laws in Iran, China, France, Zaire, and the
U.S., to name f ew places which have laws about what thoughts
can be expressed.
10.13.3. Will this ever result in attempts to shut down Usenet, or at
least the feeds into various countries?
10.13.4. On the subject of Usenet possibly being shut-down in the U.K.
(a recent rumor, unsubstantiated), this comment: " What you
have to grasp is that USENET type networks and the whole
structure of the law on publshing are fundamentally
incompatiable. With USENT anyone can untracably distribute
pornographic, libelous, blasphemous, copyright or even
officially secret information. Now, which do you think HMG
and, for that matter, the overwhealming majority of oridnary
people in this country think is most important. USENET or
those laws?" [Malcolm McMahon, malcolm@geog.leeds.ac.uk,
comp.org.eff.talk, 1994--08-26]
10.13.5. Will it succeed? Not completely, as e-mail, gopher, the Web,
etc., still offers access. But the effects could reach most
casual users, and certainly affect the structure as we know
it today.
10.13.6. Will crypto help? Not directly--see above.
10.14. Emergency Regulations
10.14.1. Emergency Orders
- various NSDDs and the like
- "Seven Days in May" scenario
10.14.2. Legal, secrecy orders
- George Davida, U. oif Wisconsin, received letter in 1978
threatening a $10K per day fine
- Carl Nicolai, PhasorPhone
- The NSA has confirmed that parts of the EES are patented,
in secrecy, and that the patents will be made public and
then used to stop competitors should the algorithm become
known.
10.14.3. Can the FCC-type Requirements for "In the clear" broadcasting
(or keys supplied to Feds) be a basis for similar legislation
of private networks and private use of encryption?
- this would seem to be impractical, given the growth of
cellular phones, wireless LANs, etc....can't very well
mandate that corporations broadcast their internal
communications in the clear!
- compression, packet-switching, and all kinds of other
"distortions" of the data...requiring transmissions to be
readable by government agencies would require providing the
government with maps (of where the packets are going), with
specific decompression algorithms, etc....very impractical
10.15. Patents and Copyrights
10.15.1. The web of patents
- what happens is that everyone doing anything substantive
spends much of his time and money seeking patents
- patents are essential bargaining chips in dealing with
others
- e.g., DSS, Schnorr, RSADSI, etc.
- e.g., Stefan Brands is seeking patents
- Cylink suing...
10.15.2. Role of RSA, Patents, etc.
+ Bidzos: "If you make money off RSA, we make money" is the
simple rule
- but of course it goes beyond this, as even "free" uses
may have to pay
- Overlapping patents being used (apparently) to extent the
life of the portfolio
+ 4/28/97 The first of several P-K and RSA patents expires
+ U.S. Patent Number: 4200770
- Title: Cryptographic Apparatus and Method
- Inventors: Hellman, Diffie, Merkle
- Assignee: Stanford University
- Filed: September 6, 1977
- Granted: April 29, 1980
- [Expires: April 28, 1997]
+ remember that any one of these several patents held by
Public Key Partners (Stanford and M.I.T., with RSA Data
Security the chief dispenser of licenses) can block an
effort to bypass the others
- though this may get fought out in court
+ 8/18/97 The second of several P-K and RSA patents expires
+ U.S. Patent Number: 4218582
- Title: Public Key Cryptographic Apparatus and Method
- Inventors: Hellman, Merkle
- Assignee: The Board of Trustees of the Leland Stanford
Junior University
- Filed: October 6, 1977
- Granted: August 19, 1980
- [Expires: August 18, 1997]
- this may be disputed because it describe algortihms in
broad terms and used the knapsack algorithm as the chief
example
+ 9/19/00 The main RSA patent expires
+ U.S. Patent Number: 4405829
- Title: Cryptographic Communications System and Method
- Inventors: Rivest, Shamir, Adleman
- Assignee: Massachusetts Institute of Technology
- Filed: December 14, 1977
- Granted: September 20, 1983
- [Expires: September 19, 2000]
10.15.3. Lawsuits against RSA patents
+ several are brewing
- Cylink is suing (strange rumors that NSA was involved)
- Roger Schlafly
10.15.4. "What about the lawsuit filed by Cylink against RSA Data
Security Inc.?"
- Very curious, considering they are both part of Public Key
Partners, the consortium of Stanford, MIT, Cylink, and RSA
Data Security Inc. (RSADSI)
- the suit was filed in the summer of 1994
+ One odd rumor I heard, from a reputable source, was that
the NSA had asked PKP to do something (?) and that Cylink
had agreed, but RSADSI had refused, helping to push the
suit along
- any links with the death threats against Bidzos?
10.15.5. "Can the patent system be used to block government use of
patents for purposes we don't like?"
- Comes up especially in the context of S. Micali's patent on
escrow techniques
- "Wouldn't matter. The government can't be enjoined from
using a patent. The federal government, in the final
analysis, can use any patent they want, without permission,
and the only recourse of the patent owner is to sue for
royalties in the Court of Claims." [Bill Larkins,
talk.politics.crypto, 1994-07-14]
10.16. Practical Issues
10.16.1. "What if I tell the authorities I Forgot My Password?"
- (or key, or passphrase...you get the idea)
- This comes up repeatedly, but the answer remains murky
10.16.2. Civil vs. Criminal
+ "This is a civil mattep, and the pights of ppivaay one haq
in cpiminal mattepq
- tend to vaniqh in aivil litigation. The paptieq to a
lawquit hate
- tpemeldouq powepq to dopae the othep qide to peteal
ildopmatiol peletalt
- to the aaqe, <@pad Templetol, 4-1-94, aomp,opg,edd,tal
10.16.3. the law is essentially what the courts say it is
10.17. Free Speech is Under Assault
10.17.1. Censorship comes in many forms. Tort law, threats of grant or
contract removal, all are limiting speech. (More reasons for
anonymous speech, of course.)
10.17.2. Discussions of cryptography could be targets of future
crackdowns. Sedition laws, conspiracy laws, RICO, etc. How
long before speaking on these matters earns a warning letter
from your university or your company? (It's the "big stick"
of ultimate government action that spurs these university and
company policies. Apple fears being shut down for having
"involvement" with a terrorist plot, Emory University fears
being sued for millions of dollars for "conspiring" to
degrade wimmin of color, etc.)
How long before "rec.guns" is no longer carried at many
sites, as they fear having their universities or companies
linked to discussions of "assault weapons" and "cop-killer
bullets"? Prediction: Many companies and universities, under
pressure from the Feds, will block groups in which encrypted
files are posted. After all, if one encrypts, one must have
something to hide, and that could expose the university to
legal action from some group that feels aggrieved.
10.17.3. Free speech is under assault across the country. The tort
system is being abused to stifle dissenting views (and lest
you think I am only a capitalist, only a free marketeer, the
use of "SLAPP suits"--"Strategic Lawsuits Against Public
Participation"--by corporations or real estate developers to
threaten those who dare to publicly speak against their
projects is a travesty, a travesty that the courts have only
recently begun to correct).
We are becoming a nation of sheep, fearing the midnight raid,
the knock on the door. We fear that if we tell a joke,
someone will glare at us and threaten to sue us _and_ our
company! And so companies are adopting "speech codes" and
other such baggage of the Orwell's totalitarian state.
Political correctness is extending its tendrils into nearly
every aspect of life in America.
10.18. Systems, Access, and the Law
10.18.1. Legal issues regarding access to systems
+ Concerns:
- access by minors to sexually explicit material
+ access from regions where access "should not be
permitted"
- export of crypto, for example
- the Memphis access to California BBS
+ Current approach: taking the promise of the accessor
- "I will not export this outside the U.S. or Canada."
- "I am of legal age to access this material."
+ Possible future approaches:
+ Callbacks, to ensure accessor is from region stated
- easy enough to bypass with cut-outs and remailers
+ "Credentials"
- a la the US Postal Service's proposed ID card (and
others)
+ cryptographically authenticated credentials
- Chaum's credentials system (certainly better than
many non-privacy-preserving credentials systems)
10.18.2. "What is a "common carrier" and how does a service become
one?"
- (This topic has significance for crypto and remailers, vis
a vis whether remailers are to be treated as common
carriers.)
- Common carriers are what the phone and package delivery
services are. They are not held liable for the contents of
phone calls, for the contents of packages (drugs,
pornography, etc.), or for illegal acts connected with
their services. One of the deals is that common carriers
not examine the insides of packages. Common carriers
essentially agree to take all traffic that pays the fee and
not to discriminate based on content. Thus, a phone service
will not ask what the subject of a call is to be, or listen
in, to decide whether to make the connection.
- Some say that to be a common carrier requires a willingness
to work with law enforcement. That is, Federal Express is
not responsible for contents of packages, but they have to
cooperate in reasonable ways with law enforcement to open
or track suspicious packages. Anybody have a cite for this?
Is it true?
- Common carrier status is also cited for bookstores, which
are not presumed to have read each and every one of the
books they sell...so if somebody blows their hand off in a
an experiment, the bookstore is not liable. (The
author/publisher may be, but that's aänt issue.)
- How does one become a common carrier? Not clear. One view
is that a service should "behave like" a common carrier and
then hope and pray that a court sees it that way.
+ Are computer services common carriers? A topic of great
interest.
- "According to a discussion I had with Dave Lawrence
(postmaster at UUNET, as well as moderator of
news.admin.newgroups), UUNET is registered with the FCC
as an "Enhanced Service Provider," which, according to
Dave, amounts to similar protection as "Common Carrier."
("Common Carrier" seems to not be appropriate yet, since
Congress is so behind the tech curve)." [L. Todd Masco,
1994-08-11]
- As for remailer networks being treated as common carriers,
totally unclear at this time. Certainly the fact that
packets are fully encrypted and unreadabel goes to part of
the issue about agreeing not to screen.
+ More on the common carrier debate:
- "Ah, the eternal Common Carrier debate. The answer is
the same as the last few times. "Common Carrier" status
has little to do with exemption from liability. It has
most to do with being unable to reject passengers, goods,
or phone calls......Plenty of non-common carrier entities
are immune from prosecution for ideas that they
unkowingly communicate -- bookstores for example (unless
they are *knowingly* porno bookstores in the wrong
jurisdiction)....Compuserve was held not liable for an
(alleged) libel by one of its sysops. Not because of
common carrier but because they had no knowledge or
control....Remailers have no knowledge or control hence
no scienter (guilty knowledge) hence no liability as a
matter of law---not a jury question BTW." [Duncan
Frissell, 1994-08-11]
10.19. Credentials
10.19.1. "Are credentials needed? Will digital methods be used?"
10.19.2. I take a radical view. Ask yourself why credentials are
_ever_ needed. Maybe for driving a car, and the like, but in
those cases anonymity is not needed, as the person is in the
car, etc.
Credentials for drinking age? Why? Let the parents enforce
this, as the argument goes about watching sex and violence on
t.v. (If one accepts the logic of requiring bars to enforce
children's behavior, then one is on a slippery slope toward
requiring television set makers to check smartcards of
viewers, or of requiring a license to access the Internet,
etc.)
In almost no cases do I see the need to carry "papers" with
me. Maybe a driver's license, like I said. In other areas,
why?
10.19.3. So Cypherpunks probably should not spend too much time
worrying about how permission slips and "hall passes" will be
handled. Little need for them.
10.19.4. "What about credentials for specific job performance, or for
establishing time-based contracts?"
- Credentials that prove one has completed certain classes,
or reached certain skill levels, etc.?
- In transactions where "future performance" is needed, as in
a contract to have a house built, or to do some similar
job, then of course the idea of on-line or immediate
clearing is bogus...like paying a stranger a sum of money
on his promise that he'll be back the next day to start
building you a house.
Parties to such long-term, non-locally-cleared cases may
contract with an escrow agent, as I described above. This
is like the "privately-produced law" we've discussed so
many times. The essence: voluntary arrangements.
Maybe proofs of identity will be needed, or asked for,
maybe not. But these are not the essence of the deal.
10.20. Escrow Agents
10.20.1. (the main discussion of this is under Crypto Anarchy)
10.20.2. Escrow Agents as a way to deal with contract renegging
- On-line clearing has the possible danger implicit in all
trades that Alice will hand over the money, Bob will verify
that it has cleared into hisaccount (in older terms, Bob
would await word that his Swiss bank account has just been
credited), and then Bob will fail to complete his end of
the bargain. If the transaction is truly anonymous, over
computer lines, then of course Bob just hangs up his modem
and the connection is broken. This situation is as old as
time, and has always involved protcols in which trust,
repeat business, etc., are factors. Or escrow agents.
- Long before the "key escrow" of Clipper, true escrow was
planned. Escrow as in escrow agents. Or bonding agents.
- Alice and Bob want to conduct a transaction. Neither trusts
the other;
indeed, they are unknown to each other. In steps "Esther's
Escrow Service." She is _also utraceable_, but has
established a digitally-signed presence and a good
reputation for fairness. Her business is in being an escrow
agent, like a bonding agency, not in "burning" either
party. (The math of this is interesting: as long as the
profits to be gained from any small set of transactions is
less than her "reputation capital," it is in her interest
to forego the profits from burning and be honest. It is
also possible to arrange that Esther cannot profit from
burning either Alice or Bob or both of them, e.g., by
suitably encrypting the escrowed stuff.)
- Alice can put her part of the transaction into escrow with
Esther, Bob can do the same, and then Esther can release
the items to the parties when conditions are met, when both
parties agree, when adjudication of some sort occurs, etc.
(There a dozen issues here, of course, about how disputes
are settled, about how parties satisfy themselves that
Esther has the items she says she has, etc.)
10.21. Loose Ends
10.21.1. Legality of trying to break crypto systems
+ "What's the legality of breaking cyphers?"
- Suppose I find some random-looking bits and find a way to
apparently decrease their entropy, perhaps turning them
into the HBO or Playboy channel? What crime have I
committed?
- "Theft of services" is what they'll get me for. Merely
listening to broadcasts can now be a crime (cellular,
police channels, satellite broadcasts). In my view, a
chilling developemt, for practical reasons (enforcement
means invasive monitoring) and for basic common sense
ethics reasons: how can listening to what lands on your
property be illegal?
- This also opens the door for laws banning listening to
certain "outlaw" or "unlicensed" braodcast stations.
Shades of the Iron Curtain. (I'm not talking about FCC
licensing, per se.)
+ "Could it ever be illegal to try to break an encryption
scheme, even if the actual underlying data is not
"stolen"?"
+ Criminalizing *tools* rather than actions
- The U.S. is moving in the direction of making mere
possession of certain tools and methods illegal, rather
than criminalizing actual actions. This has been the
case--or so I hear, though I can't cite actual laws--
with "burglar tools." (Some dispute this, pointing to
the sale of lockpicks, books on locksmithing, etc.
Still, see what happens if you try to publish a
detailed book on how to counterfeit currency.)
- Black's law term for this?
+ To some extent, it already is. Video encryption is this
way. So is cellular.
- attendees returning from a Bahamas conference on pirate
video methods (guess why it was in the Bahamas) had
their papers and demo materials seized by Customs
- Counterfeiting is, I think, in this situation, too.
Merely exploring certain aspects is verboten. (I don't
claim that all aspects are, of course.)
- Interception of broadcast signals may be illegal--
satellite or cellular phone traffic (and Digital
Telephony Act may further make such intercepts illegal
and punishable in draconian ways)
+ Outlawing of the breaking of encryption, a la the
broadcast/scanner laws
- (This came up in a thread with Steve Bellovin)
+ Aspects
+ PPL side...hard to convince a PPL agent to "enforce"
this
- but market sanctions against those who publically use
the information are of course possible, just as with
those who overhear conversations and then gossip
widely (whereas the act of overhearing is hardly a
crime)
- statutory enforcement leads to complacency, to below-
par security
+ is an unwelcome expansion of power of state to enforce
laws against decryption of numbers
- and may lead to overall restrictions on crypto use
10.21.2. wais, gopher, WWW, and implications
- borders more transparent...not clear _where_ searches are
taking place, files being transferrred, etc. (well, it is
deterministic, so some agent or program presumably knows,
but it's likely that humans don't)
10.21.3. "Why are so many prominent Cypherpunks interested in the
law?"
- Beats me. Nothing is more stultfyingly boring to me than
the cruft and "found items" nature of the law.
- However,, for a certain breed of hacker, law hacking is the
ultimate challenge. And it's important for some Cypherpunks
goals.
10.21.4. "How will crypto be fought?"
- The usual suspects: porn, pedophilia, terrorists, tax
evaders, spies
+ Claims that "national security" is at stake
- As someone has said, "National security is the root
password to the Constitution"
+ claims of discrimination
- as but one example, crypto allows offshore bank accounts,
a la carte insurance, etc...these are all things that
will shake the social welfare systems of many nations
10.21.5. Stego may also be useful in providing board operators with
"plausible deniabillity"--they can claim ignorance of the LSB
contents (I'm not saying this will stand up in court very
well, but any port in a storm, especially port 25).
10.21.6. Can a message be proved to be encrypted, and with what key?
10.21.7. Legality of digital signatures and timestamps?
- Stu Haber confirms that this has not been tested, no
precedents set
10.21.8. A legal issue about proving encryption exists
- The XOR point. Any message can be turned into any other
message, with the proper XOR intermediate message.
Implications for stego as well as for legal proof
(difficulty of). As bits leave no fingerprints, the mere
presence of a particular XOR pad on a defendant's disk is
no proof that he put it there...the cops could have planted
the incriminating key, which turns "gi6E2lf7DX01jT$" into
"Dope is ready." (I see issues of "chain of evidence"
becoming even more critical, perhaps with use of
independent "timestamping authorities" to make hashes of
seized evidence--hashes in the cryptographic sense and not
hashes in the usual police sense.)
10.21.9. "What are the dangers of standardization and official
sanctioning?"
- The U.S. has had a disturbing tendency to standardize on
some technology and then punish deviations from the
standard. Examples: telephones, cable (franchises granted,
competitors excluded)
- Franchises, standards...
+ My concern: Digital money will be blessed...home banking,
Microsoft, other banks, etc. The Treasury folks will sign
on, etc.
- Competitors will have a hard time, as government throws
roadblocks in front of them, as the U.S. makes
international deals with other countries, etc.
10.21.10. Restrictions on voice encryption?
+ may arise for an ironic reason: people can use Net
connections to talk worldwide for $1 an hour or less,
rather than $1 a minute; this may cause telcos to clamor
for restrictions
- enforcing these restrictions then becomes problematic,
unless channel is monitored
- and if encrypted...
10.21.11. Fuzziness of laws
- It may seem surprising that a nation so enmeshed in
complicated legalese as the U.S., with more lawyers per
capita than any other large nation and with a legal code
that consists of hundreds of thousands of pages of
regulations and interpretations, is actually a nation with
a legal code that is hard to pin down.
- Any system with formal, rigid rules can be "gamed against"
be an adversary. The lawmakers know this, and so the laws
are kept fuzzy enough to thwart mechanistic gaming; this
doesn't stop there from being an army of lawyers (in fact,
it guarantees it). Some would say that the laws are kept
fuzzy to increase the power of lawmakers and regulators.
- "Bank regulations in this country are kept deliberately
somewhat vague. The regulator's word is the deciding
principle, not a detailed interpretation of statute. The
lines are fuzzy, and because they are fuzzy, the banks
don't press on them nearly as hard as when there's clear
statutory language available to be interpreted in a court.
"The uncertainty in the regulatory environment _increases_
the hold the regulators have over the banks. And the
regulators are known for being decidedly finicky. Their
decisions are largely not subject to appeal (except for the
flagrant stuff, which the regulators are smart enough not
to do too often), and there's no protection against cross-
linking issues. If a bank does something untoward in, say,
mortgage banking, they may find, say, their interstate
branching possibilities seem suddenly much dimmer.
"The Dept. of Treasury doesn't want untraceable
transactions." [Eric Hughes, Cypherpunks list, 1994-8-03]
- Attempts to sneak around the laws, especially in the
context of alternative currencies, Perry Metzger notes:
"They are simply trying to stop you from playing games. The
law isn't like geometry -- there aren't axioms and rules
for deriving one thing from another. The general principle
is that they want to track all your transactions, and if
you make it difficult they will either use existing law to
jail you, or will produce a new law to try to do the same."
[Perry Metzger, 1994-08-10]
- This fuzziness and regulatory discretion is closely related
to those wacky schemes to avoid taxes by claiming , for
example, that the "dollar" is defined as 1/35th of an ounce
of gold (and that hence one's earnings in "real dollars"
are a tiny fraction of the ostensible earnings), that Ohio
did not legally enter the Union and thus the income tax was
never properly ratified,, etc. Lots of these theories have
been tested--and rejected. I mention this because some
Cypherpunks show signs of thinking "digital cash" offers
similar opportunities. (And I expect to see similar scams.)
- (A related example. Can one's accumulation of money be
taken out of the country? Depending on who you ask, "it
depends." Taking it out in your suitcase rasises all kind
of possibilies of seizure (violation of currency export
laws, money laundering, etc.). Wiring it out may invoke
FinCEN triggers. The IRS may claim it is "capital flight"
to avoid taxes--which it may well be. Basically, your own
money is no longer yours. There may be ways to do this--I
hope so--but the point remains that the rules are fuzzy,
and the discretionary powers to seize assets are great.
Seek competent counsel, and then pray.)
10.21.12. role of Uniform Commercial Code (UCC)
- not discussed in crypto circles much, but the "rules of the
road"
- in many way, an implementation of anarcho-capitalism, in
that the UCC is a descendant (modulo some details) of the
"Law Merchant" that handled relations between sovereign
powers, trade at sea, etc.
- things like electronic funds transfere, checks, liablities
for forged sigs, etc.
- I expect eventual UCC involvement in digital money schemes
10.21.13. "What about the rush to legislate, to pass laws about
cyberspace, the information superduperhighway, etc.?
+ The U.S. Congress feels it has to "do something" about
things that many of us feel don't need regulation or "help"
from Congress.
- crypto legislation
- set-top boxes, cable access, National Information
Infrastructure (Cable Version)
- information access, parental lock-outs, violence ratings,
sexually explicit materials, etc.
- Related to the "do something!" mentality on National Health
Care, guns, violence, etc.
- Why not just not do anything?
+ Scary possibilities being talked about:
+ giving television sets unique IDs ("V chips") with cable
access through these chips
- tying national ID cards to these, e.g., Joe Citizen, of
Provo, Utah, would be "allowed" to view an NC-17
violence-rated program
- This would be disastrous: records, surveillance,
dossiers, permission, centralization
- The "how can we fix it?" mindset is very damaging. Many
things just cannot be "fixed" by central planners....look
at economies for an example. The same is usually true of
technologies.
10.21.14. on use of offshore escrow agents as protection against
seizures
- contempt laws come into play, but the idea is to make
yourself powerless to alter the situation, and hence not
willfully disobeying the court
+ Can also tell offshore agents what to do with files, and
when to release them
- Eric Hughes proposes: "One solution to this is to give
the passphrase (or other access information) to someone
who won't give it back to you if you are under duress,
investigation, court order, etc. One would desire that
this entity be in a jurisdiction other than where an
investigation might happen." [E.H., 1994-07-26]
- Sandy Sandfort adds: "Prior to seizure/theft, you would
make an arrangement with an offshore "escrow agent."
After seizure you would send your computer the
instruction that says, "encrypt my disk with the escrow
agents public key." After that, only the escrow agent
could decrypt your disk. Of course, the escrow agent
would only do that when conditions you had stipulated
were in effect." [S. S., 1994-07-27]
- related to data havens and offshore credit/P.I. havens
10.21.15. Can the FCC-type Requirements for "In the clear" broadcasting
(or keys supplied to Feds) be a basis for similar legislation
of private networks and private use of encryption?
- this would seem to be impractical, given the growth of
cellular phones, wireless LANs, etc....can't very well
mandate that corporations broadcast their internal
communications in the clear!
- compression, packet-switching, and all kinds of other
"distortions" of the data...requiring transmissions to be
readable by government agencies would require providing the
government with maps (of where the packets are going), with
specific decompression algorithms, etc....very impractical
10.21.16. Things that could trigger a privacy flap or limitations on
crypto
- Anonymously publishing adoption records [suggested by Brian
Williams, 1994-08-22]
- nuclear weapons secrets (true secrets, not just the
titillating stuff that any bright physics student can
cobble together)
- repugant markets (assassinations, organ selling, etc.)
10.21.17. Pressures on civilians not to reveal crypto knowledge
+ Example: mobile phone crypto standards.
- "This was the official line until a few months ago - that
A5 was strong and A5X a weakened export
version....However, once we got hold of A5 we found that
it was not particularly strong there is an easy 2^40
attack. The government's line then changed to `you
mustn't discuss this in public because it would harm
British export sales'....Perhaps it was all a ploy to get
Saddam to buy A5 chips off some disreputable arms dealer
type. [Ross Anderson, "mobil phone in europe <gms-
standard>, a precedence?," sci.crypt, 1994-08-15]
- Now this example comes from Britain, where the
intelligence community has always had more lattitude than
in the U.S. (an Official Secrets Act, limits on the
press, no pesky Constitution to get in the way, and even
more of an old boy's network than we have in the U.S.
mil-industrial complex).
- And the threat by NSA officials to have Jim Bidzos, the
president of RSA Data Security, Inc., killed if he didn't
play ball. {"The Keys to the Kingdom," San Jose Mercury
News]
10.21.18. "identity escrow", Eric Hughes, for restrictions on e-mail
accounts and electronic PO boxes (has been talked about,
apparently...no details)