From 602b2346eec1f911b475b5e5a8e31e38a2ca71aa Mon Sep 17 00:00:00 2001
From: Dr Washington Sanchez <washington.sanchez@gmail.com>
Date: Sat, 19 Apr 2014 11:57:12 +1000
Subject: [PATCH] Create 09-Policy.md

Chapter 09 unformatted
---
 09-Policy/09-Policy.md | 1381 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 1381 insertions(+)
 create mode 100644 09-Policy/09-Policy.md

diff --git a/09-Policy/09-Policy.md b/09-Policy/09-Policy.md
new file mode 100644
index 0000000..b5bbb4b
--- /dev/null
+++ b/09-Policy/09-Policy.md
@@ -0,0 +1,1381 @@
+9. Policy: Clipper,Key Escrow, and Digital Telephony
+  
+  9.1. copyright
+            THE  CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
+            1994-09-10, Copyright Timothy C. May. All rights reserved.
+            See the detailed disclaimer. Use short sections under "fair
+            use" provisions, with appropriate credit, but don't put your
+            name on my words.
+  
+  9.2. SUMMARY: Policy: Clipper,Key Escrow, and Digital Telephony
+    9.2.1. Main Points
+           - Clipper has been a main unifying force, as 80% of all
+              Americans, and 95% of all computer types, are opposed.
+           - "Big Brother Inside"
+    9.2.2. Connections to Other Sections
+           - the main connections are _legal_
+           - some possible implications for limits on crypto
+    9.2.3. Where to Find Additional Information
+           - There have been hundreds of articles on Clipper, in nearly
+              all popular magazines. Many of these were sent to the
+              Cypherpunks  list and may be available in the archives. (I
+              have at least 80 MB of Cypherpunks list stuff, a lot of it
+              newspaper and magazine articles on Clipper!)
+           + more Clipper information can be found at:
+             - "A good source is the Wired Online Clipper Archive. Send
+                e-mail to info-rama@wired.com. with no subject and the
+                words 'get help' and 'get clipper/index' in the body of
+                the message." [students@unsw.EDU.AU, alt.privacy.clipper,
+                1994-09-01]
+    9.2.4. Miscellaneous Comments
+           - As with a couple of other sections, I won't try to be as
+              complete as some might desire. Just too many thousands of
+              pages of stuff to consider.
+  
+  9.3. Introduction
+    9.3.1. What is Clipper?
+           - government holds the skeleton keys
+           - analogies to other systems
+    9.3.2. Why do most Cypherpunks oppose Clipper?
+           - fear of restrictions on crypto, derailing so many wonderful
+              possibilities
+    9.3.3. Why does Clipper rate its own section?
+           - The announcement of the "Escrowed Encryption Standard,"
+              EES, on April 16, 1993, was a galvanizing event for
+              Cypherpunks and for a large segment of the U. S.
+              population. The EES was announced originally as "Clipper,"
+              despite the use of the name Clipper by two major products
+              (the Intergraph CPU and a dBase software tool), and the
+              government backed off on the name. Too late, though, as the
+              name "Clipper" had become indelibly linked to this whole
+              proposal.
+    9.3.4. "Is stopping Clipper the main goal of Cypherpunks?"
+           - It certainly seems so at times, as Clipper has dominated
+              the topics since the Clipper announcement in April, 1993.
+           + it has become so, with monkeywrenching efforts in several
+              areas
+             - lobbying and education against it (though informal, such
+                lobbying has been successful...look at NYT article)
+             - "Big Brother Inside" and t-shirts
+             - technical monkeywrenching (Matt Blaze...hesitate to claim
+                any credit, but he has been on our list, attended a
+                meeting, etc.)
+           - Although it may seem so, Clipper is just one
+              aspect...step...initiative.
+           - Developing new software tools, writing code, deploying
+              remailers and digital cash are long-range projects of great
+              importance.
+           - The Clipper key escrow proposal came along (4-93) at an
+              opportune time for Cypherpunks and became a major focus.
+              Emergency meetings, analyses, etc.
+  
+  9.4. Crypto Policy Issues
+    9.4.1. Peter Denning on crypto policy:
+           + provided by Pat Farrell, 1994-08-20; Denning comments are
+              1992-01-22, presented at Computers, Freedom, and Privacy 2.
+              Peter D. uses the metaphor of a "clearing,"as in a forest,
+              for the place where people meet to trade, interact, etc.
+              What others call markets, agoras, or just "cyberspace."
+             - "Information technology in producing a clearing in which
+                individuals and corporations are key players besides
+                government. Any attempt by government to control the flow
+                of information over networks will be ignored or met with
+                outright hostility.  There is no practical way that
+                government can control information except information
+                directly involved in the business of governing.  It
+                should not try." [Peter Denning, PUBLIC POLICY FOR THE
+                21ST CENTURY, DRAFT 1/22/92]
+           - No word on how this view squares with his wife's control
+              freak views.
+    9.4.2. Will government and NSA in particular attempt to acquire some
+            kind of control over crypto companies?
+           + speculations, apparently unfounded, that RSA Data Security
+              is influenced by NSA wishes
+             - weaknesses in the DES keys picked?
+           - and companies may be dramatically influenced by contracts
+              (and the witholding of them)
+    9.4.3. NIST and DSS
+    9.4.4. Export restrictions, Munitions List, ITAR
+    9.4.5. old crypto machines sold to Third World governments, cheaply
+           - perhaps they think they can make some changes and outsmart
+              the NSA (which probably has rigged it so any changes are
+              detectable and can be factored in)
+           - and just knowing the type of machine is a huge advantage
+    9.4.6. 4/28/97   The first of several P-K and RSA patents expires
+           + U.S. Patent Number: 4200770
+             - Title: Cryptographic Apparatus and Method
+             - Inventors: Hellman, Diffie, Merkle
+             - Assignee: Stanford University
+             - Filed: September 6, 1977
+             - Granted: April 29, 1980
+             - [Expires: April 28, 1997]
+           + remember that any one of these several patents held by
+              Public Key Partners (Stanford and M.I.T., with RSA Data
+              Security the chief dispenser of licenses) can block an
+              effort to bypass the others
+             - though this may get fought out in court
+    9.4.7. encryption will be needed inside computer systems
+           - for operating system protection
+           - for autonomous agents (active agents)
+           - for electronic money
+  
+  9.5. Motivations for Crypto Laws
+    9.5.1. "What are the law enforcement and FBI worries?"
+           - "FBI Director Louis Freeh is worried. The bad guys are
+              beginning to see the light, and it is digital. ... Freeh
+              fears some pretty nasty folks have discovered they can
+              commit highway robbery and more, without even leaving home.
+              Worse, to Freeh and other top cops, by using some pretty
+              basic technologies, savvy criminals can do their crimes
+              without worrying about doing time.
+              
+              "Some crooks, spies, drug traffickers, terrorists and
+              frauds already use the tools of the information age to
+              outfox law enforcement officers. Hackers use PBXs to hide
+              their tracks as they rip off phone companies and poke
+              around in other people's files. Reprogrammed cellular
+              phones give cops fits." [LAN Magazine,"Is it 1984?," by Ted
+              Bunker, August 1994]
+           - Their fears have some validity...in the same way that the
+              rulers in Gutenberg's time could have some concerns about
+              the implications of books (breaking of guilds, spread of
+              national secrets, pornography, atheism, etc.).
+    9.5.2. "What motivated Clipper? What did the Feds hope to gain?"
+           - ostensibly to stop terrorists (only the unsophisticated
+              ones, if alternatives are allowed)
+           - to force a standard on average Americans
+           - possibly to limit crypto development
+           + Phil Karn provides an interesting motivation for Clipper:
+              "Key escrow exists only because the NSA doesn't want to
+              risk blame if some terrorist or drug dealer were to use an
+              unescrowed NSA-produced .....The fact that a terrorist or
+              drug dealer can easily go elsewhere and obtain other strong
+              or stronger algorithms without key escrow is irrelevant.
+              The NSA simply doesn't care as long as *they* can't be
+              blamed for whatever happens. Classic CYA, nothing
+              more.....A similar analysis applies to the export control
+              regulations regarding cryptography." [Phil Karn, 1994-08-
+              31]
+             - Bill Sommerfeld notes: "If this is indeed the case, Matt
+                Blaze's results should be particularly devastating to
+                them." [B.S., 1994-09-01]
+    9.5.3. Steve Witham has an interesting take on why folks like
+            Dorothy Denning and Donn Parker support key escrow so
+            ardently:
+           - "Maybe people like Dot and Don think of government as a
+              systems-administration sort of job.  So here they are,
+              security experts advising the sys admins on things like...
+              
+              setting permissions
+              allocating quotas
+              registering users and giving them passwords.....
+              deciding what utilities are and aren't available
+              deciding what software the users need, and installing it
+                       (grudgingly, based on who's yelling the loudest)
+              setting up connections to other machines
+              deciding who's allowed to log in from "foreign hosts"
+              getting mail set up and running
+              buying new hardware from vendors
+              specifying the hardware to the vendors
+              ...
+              
+              "These are the things computer security experts advise on.
+              Maybe hammer experts see things as nails.
+              
+              "Only a country is not a host system owned and administered
+              by the government, and citizens are not guests or users."
+              [Steve Witham, Government by Sysadmin, 1994-03-23]
+              
+    9.5.4. Who would want to use key escrow?
+    9.5.5. "Will strong crypto really thwart government plans?"
+           - Yes, it will give citizens the basic capabilities that
+              foreign governments have had for many years
+           + Despite talk about codebreakes and the expertise of the
+              NSA, the plain fact is that no major Soviet ciphers have
+              been broken for many years
+             + recall the comment that NSA has not really broken any
+                Soviet systems in many years
+               - except for the cases, a la the Walker case, where
+                  plaintext versions are gotten, i.e., where human
+                  screwups occurred
+           - the image in so many novels of massive computers breaking
+              codes is absurd: modern ciphers will not be broken (but the
+              primitive ciphers used by so many Third World nations and
+              their embassies will continue to be child's play, even for
+              high school science fair projects...could be a good idea
+              for a small scene, about a BCC student who has his project
+              pulled)
+    9.5.6. "Why does the government want short keys?"
+           - Commercial products have often been broken by hackers. The
+              NSA actually has a charter to help businesses protect their
+              secrets; just not so strongly that the crypto is
+              unbreakable by them. (This of course has been part of the
+              tension between the two sides of the NSA for the past
+              couple of decades.)
+           + So why does the government want crippled key lengths?
+             - "The question is: how do you thwart hackers while
+                permitting NSA access? The obvious answer is strong
+                algorithm(s) and relatively truncated keys." [Grady Ward,
+                sci.crypt, 1994-08-15]
+  
+  9.6. Current Crypto Laws
+    9.6.1. "Has crypto been restricted in countries other than the
+            U.S.?"
+           - Many countries have restrictions on civilian/private use of
+              crypto. Some even insist that corporations either send all
+              transmissions in the clear, or that keys be provided to the
+              government. The Phillipines, for example. And certainly
+              regimes in the Communists Bloc, or what's left of it, will
+              likely have various laws restricting crypto. Possibly
+              draconian laws....in many cultures, use of crypto is
+              tantamount to espionage.
+  
+  9.7. Crypto Laws Outside the U.S.
+    9.7.1. "International Escrow, and Other Nation's Crypto Policies?"
+           - The focus throughout this document on U.S. policy should
+              not lull non-Americans into complacency. Many nations
+              already have more Draconian policies on the private use of
+              encryption than the U.S. is even contemplating
+              (publically). France outlaws private crypto, though
+              enforcement is said to be problematic (but I would not want
+              the DGSE to be on my tail, that's for sure). Third World
+              countries often have bans on crypto, and mere possession of
+              random-looking bits may mean a spying conviction and a trip
+              to the gallows.
+           + There are also several reports that European nations are
+              preparing to fall in line behind the U.S. on key escrow
+             - Norway
+             - Netherlands
+             - Britain
+           + A conference in D.C. in 6/94, attended by Whit Diffie (and
+              reported on to us at the 6/94 CP meeting) had internation
+              escrow arrangements as a topic, with the crypto policy
+              makers of NIST and NSA describing various options
+             - bad news, because it could allow bilateral treaties to
+                supercede basic rights
+             - could be plan for getting key escrow made mandatory
+             + there are also practical issues
+               + who can decode international communications?
+                 - do we really want the French reading Intel's
+                    communications? (recall Matra-Harris)
+               - satellites? (like Iridium)
+               - what of multi-national messages, such as an encrypted
+                  message posted to a message pool on the Internet...is
+                  it to be escrowed with each of 100 nations?
+    9.7.2. "Will foreign countries use a U.S.-based key escrow system?"
+           - Lots of pressure. Lots of evidence of compliance.
+    9.7.3. "Is Europe Considering Key Escrow?"
+           - Yes, in spades. Lots of signs of this, with reports coming
+              in from residents of Europe and elsewhere. The Europeans
+              tend to be a bit more quiet in matters of public policy (at
+              least in some areas).
+           - "The current issue of `Communications Week International'
+              informs us that the European Union's Senior Officials Group
+              for Security of Information Systems has been considering
+              plans for standardising key escrow in Europe.
+              
+              "Agreement had been held up by arguments over who should
+              hold the keys. France and Holland wanted to follow the
+              NSA's lead and have national governments assume this role;
+              other players wanted user organisations to do this." [
+              rja14@cl.cam.ac.uk (Ross Anderson), sci.crypt, Key Escrow
+              in Europe too, 1994-06-29]
+    9.7.4. "What laws do various countries have on encryption and the
+            use of encryption for international traffic?"
+           + "Has France really banned encryption?"
+             - There are recurring reports that France does not allow
+                unfettered use of encryption.
+             - Hard to say. Laws on the books. But no indications that
+                the many French users of PGP, say, are being prosecuted.
+             - a nation whose leader, Francois Mitterand, was a Nazi
+                collaborationist, working with Petain and the Vichy
+                government (Klaus Barbie involved)
+           + Some Specific Countries
+             - (need more info here)
+             + Germany
+               - BND cooperates with U.S.
+             - Netherlands
+             - Russia
+           + Information
+             - "Check out the ftp site at csrc.ncsl.nist.gov for a
+                document named something like "laws.wp"  (There are
+                several of these, in various formats.)  This  contains a
+                survey of the positions of various countries, done for
+                NIST by a couple of people at Georgetown or George
+                Washington or some such university." [Philip Fites,
+                alt.security.pgp, 1994-07-03]
+    9.7.5. France planning Big Brother smart card?
+           - "PARIS, FRANCE, 1994 MAR 4 (NB) -- The French government
+              has confirmed its plans to replace citizen's paper-based ID
+              cards with credit card-sized "smart card" ID cards.
+              .....
+              "The cards contain details of recent transactions, as well
+              as act  as an "electronic purse" for smaller value
+              transactions using a personal identification number (PIN)
+              as authorization. "Purse transactions" are usually separate
+              from the card credit/debit system, and, when the purse is
+              empty, it can be reloaded from the card at a suitable ATM
+              or retailer terminal."  (Steve Gold/19940304)" [this was
+              forwarded to me for posting]
+    9.7.6. PTTs, local rules about modem use
+    9.7.7. "What are the European laws on "Data Privacy" and why are
+            they such a terrible idea?"
+           - Various European countries have passed laws about the
+              compiling of computerized records on people without their
+              explicit permission. This applies to nearly all
+              computerized records--mailing lists, dossiers, credit
+              records, employee files, etc.--though some exceptions exist
+              and, in general, companies can find ways to compile records
+              and remain within the law.
+           - The rules are open to debate, and the casual individual who
+              cannot afford lawyers and advisors, is likely to be
+              breaking the laws repeatedly. For example, storing the
+              posts of people on the Cypherpunks list in any system
+              retrievable by name would violate Britain's Data Privacy
+              laws. That almost no such case would ever result in a
+              prosecution (for practical reasons) does not mean the laws
+              are acceptable.
+           - To many, these laws are a "good idea." But the laws miss
+              the main point, give a false sense of security (as the real
+              dossier-compilers are easily able to obtain exemptions, or
+              are government agencies themselves), and interfere in what
+              people do with information that properly and legally comes
+              there way. (Be on the alert for "civil rights" groups like
+              the ACLU and EFF to push for such data privacy laws. The
+              irony of Kapor's connection to Lotus and the failed
+              "Marketplace" CD-ROM product cannot be ignored.)
+           - Creating a law which bans the keeping of certain kinds of
+              records is an invitation to having "data inspectors"
+              rummaging through one's files. Or some kind of spot checks,
+              or even software key escrow.
+           - (Strong crypto makes these laws tough to enforce. Either
+              the laws go, or the counties with such laws will then have
+              to limit strong crypto....not that that will help in the
+              long run.)
+           - The same points apply to well-meaning proposals to make
+              employer monitoring of employees illegal. It sounds like a
+              privacy-enhancing idea, but it tramples upon the rights of
+              the employer to ensure that work is being done, to
+              basically run his business as he sees fit, etc. If I hire a
+              programmer and he's using my resources, my network
+              connections, to run an illegal operation, he exposes my
+              company to damages, and of course he isn't doing the job I
+              paid him to do. If the law forbids me to monitor this
+              situation, or at least to randomly check, then he can
+              exploit this law to his advantage and to my disadvantage.
+              (Again, the dangers of rigid laws, nonmarket
+              solutions,(lied game theory.)
+    9.7.8. on the situation in Australia
+           + Matthew Gream [M.Gream@uts.edu.au] informed us that the
+              export situation in Oz is just as best as in the U.S. [1994-
+              09-06] (as if we didn't know...much as we all like to dump
+              on Amerika for its fascist laws, it's clear that nearly all
+              countries are taking their New World Order Marching Orders
+              from the U.S., and that many of them have even more
+              repressive crypto laws alredy in place...they just don't
+              get the discussion the U.S. gets, for apparent reasons)
+             - "Well, fuck that for thinking I was living under a less
+                restrictive regime -- and I can say goodbye to an
+                international market for my software.]
+             - (I left his blunt language as is, for impact.)
+    9.7.9. "For those interested, NIST have a short document for FTP,
+            'Identification & Analysis of Foreign Laws & Regulations
+            Pertaining to the Use of Commercial Encryption Products for
+            Voice & Data Communications'. Dated Jan 1994." [Owen Lewis,
+            Re: France Bans Encryption, alt.security.pgp, 1994-07-07]
+  
+  9.8. Digital Telephony
+    9.8.1. "What is Digital Telephony?"
+           - The Digital Telephony Bill, first proposed under Bush and
+              again by Clinton, is in many ways much worse than Clipper.
+              It has gotten less attention, for various reasons.
+           - For one thing,  it is seen as an extension by some of
+              existing wiretap capabilities. And, it is fairly abstract,
+              happening behind the doors of telephone company switches.
+           - The implications are severe: mandatory wiretap and pen
+              register (who is calling whom) capaibilities, civil
+              penalties of up to $10,000 a day for insufficient
+              compliance, mandatory assistance must be provided, etc.
+           - If it is passed, it could dictate future technology. Telcos
+              who install it will make sure that upstart technologies
+              (e.g., Cypherpunks who find ways to ship voice over
+              computer lines) are also forced to "play by the same
+              rules." Being required to install government-accessible tap
+              points even in small systems would of course effectively
+              destroy them.
+           - On the other hand, it is getting harder and harder to make
+              Digital Telephony workable, even by mandate. As Jim
+              Kallstrom of the FBI puts it:  ""Today will be the cheapest
+              day on which Congress could fix this thing," Kallstrom
+              said. "Two years from now, it will be geometrically more
+              expensive.""  [LAN Magazine,"Is it 1984?," by Ted Bunker,
+              August 1994]
+           - This gives us a goal to shoot for: sabotage the latest
+              attempt to get Digital Telephony passed into law and it may
+              make it too intractable to *ever* be passed.
+           + "Today will be the cheapest day on which
+             - Congress could fix this thing," Kallstrom said. "Two
+                years from now,
+             - it will be geometrically more expensive."
+           - The message is clear: delay Digital Telephony. Sabotage it
+              in the court of public opinion, spread the word, make it
+              flop. (Reread your "Art of War" for Sun Tsu's tips on
+              fighting your enemy.)
+           -
+    9.8.2. "What are the dangers of the Digital Telephony Bill?"
+           - It makes wiretapping invisible to the tappee.
+           + If passed into law, it makes central office wiretapping
+              trivial, automatic.
+             - "What should worry people is what isn't in the news (and
+                probably never will until it's already embedded in comm
+                systems). A true 'Clipper' will allow remote tapping on
+                demand. This is very easily done to all-digital
+                communications systems. If you understand network routers
+                and protocol it's easy to envision how simple it would be
+                to 're-route' a copy of a target comm to where ever you
+                want it to go..."  [domonkos@access.digex.net (andy
+                domonkos), comp.org.eff.talk, 1994-06-29]
+    9.8.3. "What is the Digital Telephony proposal/bill?
+           - proposed a few years ago...said to be inspiration for PGP
+           - reintroduced Feb 4, 1994
+           - earlier versrion:
+           + "1)  DIGITAL TELEPHONY PROPOSAL
+             - "To ensure law enforcement's continued ability to conduct
+                court-
+             - authorized taps, the administration, at the request of
+                the
+             - Dept. of Justice and the FBI, proposed ditigal telephony
+             - legislation.  The version submitted to Congress in Sept.
+                1992
+             - would require providers of electronic communication
+                services
+             - and private branch exchange (PBX) operators to ensure
+                that the
+             - government's ability to lawfully intercept communications
+                is not
+             - curtailed or prevented entirely by the introduction of
+                advanced
+             - technology."
+  
+  9.9. Clipper, Escrowed Encyption Standard
+    9.9.1. The Clipper Proposal
+           - A bombshell was dropped on April 16, 1993. A few of us saw
+              it coming, as we'd been debating...
+    9.9.2. "How long has the government been planning key escrow?"
+           - since about 1989
+           - ironically, we got about six months advance warning
+           - my own "A Trial Balloon to Ban Encryption" alerted the
+              world to the thinking of D. Denning....she denies having
+              known about key escorw until the day before it was
+              announced, which I find implausible (not calling her a
+              liar, but...)
+           + Phil Karn had this to say to Professor Dorothy Denning,
+              several weeks prior to the Clipper announcement:
+             - "The private use of strong cryptography provides, for the
+                very first time, a truly effective safeguard against this
+                sort of government abuse. And that's why it must continue
+                to be free and unregulated.
+             - "I should credit you for doing us all a very important
+                service by raising this issue. Nothing could have lit a
+                bigger fire under those of us who strongly believe in a
+                citizens' right to use cryptography than your proposals
+                to ban or regulate it.  There are many of us out here who
+                share this belief *and* have the technical skills to turn
+                it into practice. And I promise you that we will fight
+                for this belief to the bitter end, if necessary." [Phil
+                Karn, 1993-03-23]
+             -
+             -
+    9.9.3. Technically, the "Escrowed Encryption Standard," or EES. But
+            early everyone still calls it "Clipper, " even if NSA
+            belatedly realized Intergraph's won product has been called
+            this for many years, a la the Fairchild processor chip of the
+            same name. And the database product of the same name. I
+            pointed this out within minutes of hearing about this on
+            April 16th, 1993, and posted a comment to this effect on
+            sci.crypt. How clueless can they be to not have seen in many
+            months of work what many of us saw within seconds?
+    9.9.4. Need for Clipper
+    9.9.5. Further "justifications" for key escrow
+           + anonymous consultations that require revealing of
+              identities
+             - suicide crisis intervention
+             - confessions of abuse, crimes, etc. (Tarasoff law)
+           - corporate records that Feds want to look at
+           + Some legitimate needs for escrowed crypto
+             - for corporations, to bypass the passwords of departed,
+                fired, deceased employees,
+    9.9.6. Why did the government develop Clipper?
+    9.9.7. "Who are the designated escrow agents?"
+           - Commerce (NIST) and Treasury (Secret Service).
+    9.9.8. Whit Diffie
+           - Miles Schmid was architect
+           + international key escrow
+             - Denning tried to defend it....
+    9.9.9. What are related programs?
+   9.9.10. "Where do the names "Clipper" and "Skipjack" come from?
+           - First, the NSA and NIST screwed up big time by choosing the
+              name "Clipper," which has long been the name of the 32-bit
+              RISC processor (one of the first) from Fairchild, later
+              sold to Intergraph. It is also the name of a database
+              compiler. Most of us saw this immediately.
+           -
+           + Clippers are boats, so are skipjacks ("A small sailboat
+              having a
+             - bottom shaped like a flat V and vertical sides" Am
+                Heritage. 3rd).
+             - Suggests a nautical theme, which fits with the
+                Cheseapeake environs of
+             - the Agency (and small boats have traditionally been a way
+                for the
+             + Agencies to dispose of suspected traitors and spies).
+               -
+             - However, Capstone is not a boat, nor is Tessera, so the
+                trend fails.
+ 
+ 9.10. Technical Details of Clipper, Skipjack, Tessera, and EES
+   9.10.1. Clipper chip fabrication details
+           + ARM6 core being used
+             - but also rumors of MIPS core in Tessera
+           - MIPS core reportedly being designed into future versions
+           - National also built (and may operate) a secure wafer fab
+              line for NSA, reportedly located on the grounds of Ft.
+              Meade--though I can't confirm the location or just what
+              National's current involvement still is. May only be for
+              medium-density chips, such as key material (built under
+              secure conditions).
+   9.10.2. "Why is the Clipper algorithm classified?"
+           - to prevent non-escrow versions, which could still use the
+              (presumably strong) algorithm and hardware but not be
+              escrowed
+           - cryptanalysis is always easier if the algorithms are known
+              :-}
+           - general government secrecy
+           - backdoors?
+   9.10.3. If Clipper is flawed (the Blaze LEAF Blower), how can it
+            still be useful to the NSA?
+           - by undermining commercial alternatives through subsidized
+              costs (which I don't think will happen, given the terrible
+              PR Clipper has gotten)
+           - mandated by law or export rules
+           - and the Blaze attack is--at present--not easy to use (and
+              anyone able to use it is likely to be sophisticated enough
+              to use preencryption anyway)
+   9.10.4. What about weaknesses of Clipper?
+           - In the views of many, a flawed approach. That is, arguing
+              about wrinkles plays into the hands of the Feds.
+   9.10.5. "What are some of the weaknesses in Clipper?"
+           - the basic idea of key escrow is an infringement on liberty
+           + access to the keys
+             - "
+             + "There's a big door in the side with a
+               - big neon sign saying "Cops and other Authorized People
+                  Only";
+               - the trapdoor is the fact that anybody with a fax
+                  machine can make
+               - themselves and "Authorized Person" badge and walk in.
+                  <Bill Stewart, bill.stewart@pleasantonca.ncr.com, 4-15-
+                  94, sci.crypt>
+           - possible back doors in the Skipjace algorithm
+           + generation of the escrow keys
+             -
+             + "There's another trapdoor, which is that if you can
+                predict the escrow
+               - keys by stealing the parameters used by the Key
+                  Generation Bureau to
+               - set them, you don't need to get the escrow keys from
+                  the keymasters,
+               - you can gen them yourselves. " <Bill Stewart,
+                  bill.stewart@pleasantonca.ncr.com, 4-15-94, sci.crypt>
+   9.10.6. Mykotronx
+           - MYK-78e chip, delays, VTI, fuses
+           - National Semiconductor is working with Mykotronx on a
+              faster implementation of the
+              Clipper/Capstone/Skipjack/whatever system. (May or may not
+              be connected directly with the iPower product line.  Also,
+              the MIPS processor core may be used, instead of the ARM
+              core, which is said to be too slow.)
+   9.10.7. Attacks on EES
+           - sabotaging the escrow data base
+           + stealing it, thus causing a collapse in confidence
+             - Perry Metzger's proposal
+           - FUD
+   9.10.8. Why is the algorithm secret?
+   9.10.9. Skipjack is 80 bits, which is 24 bits longer than the 56 bits
+            of DES. so
+  9.10.10. "What are the implications of the bug in Tessera found by
+            Matt Blaze?"
+           - Technically, Blaze's work was done on a Tessera card, which
+              implements the Skipjace algorithm. The Clipper phone system
+              may be slightly different and details may vary; the Blaze
+              attack may not even work, at least not practically.
+           - " The announcement last month was about a discovery that,
+              with a half-hour or so of time on an average PC, a user
+              could forge a bogus LEAF (the data used by the government
+              to access the back door into Clipper encryption). With such
+              a bogus LEAF, the Clipper chip on the other end would
+              accept and decrypt the communication, but the back door
+              would not work for the government." [ Steve Brinich,
+              alt.privacy.clipper, 1994-07-04]
+           - "The "final" pre-print version (dated August 20, 1994) of
+              my paper, "Protocol Failure in the Escrowed Encryption
+              Standard" is now available.  You can get it in PostScript
+              form via anonymous ftp from research.att.com in the file
+              /dist/mab/eesproto.ps .  This version replaces the
+              preliminary draft (June 3) version that previously occupied
+              the same file.  Most of the substance is identical,
+              although few sections are expanded and a few minor errors
+              are now corrected." [Matt Blaze, 1994-09-04]
+ 
+ 9.11. Products, Versions -- Tessera, Skipjack, etc.
+   9.11.1. "What are the various versions and products associated with
+            EES?"
+           - Clipper, the MYK-78 chip.
+           - Skipjack.
+           + Tessera. The PCMCIA card version of the Escrowed Encryption
+              Standard.
+             - the version Matt Blaze found a way to blow the LEAF
+             - National Semiconductor "iPower" card may or may not
+                support Tessera (conflicting reports).
+   9.11.2. AT&T Surety Communications
+           - NSA may have pressured them not to release DES-based
+              products
+   9.11.3. Tessera cards
+           - iPower
+           - Specifications for the Tessera card interface can be found
+              in several places, including " csrc.ncsl.nist.gov"--see the
+              file  cryptcal.txt [David Koontz, 1994-08-08].
+ 
+ 9.12. Current Status of EES, Clipper, etc.
+   9.12.1. "Did the Administration really back off on Clipper? I heard
+            that Al Gore wrote a letter to Rep. Cantwell, backing off."
+           - No, though Clipper has lost steam (corporations weren't
+              interested in buying Clipper phones, and AT&T was very late
+              in getting "Surety" phones out).
+           - The Gore announcement may actually indicate a shift in
+              emphasis to "software key escrow" (my best guess).
+           - Our own Michael Froomkin, a lawyer, writes:  "The letter is
+              a nullity.  It almost quotes from testimony given a year
+              earlier by NIST to Congress.  Get a copy of Senator Leahy's
+              reaction off the eff www  server.  He saw it for the empty
+              thing it is....Nothing has changed except Cantwell dropped
+              her bill for nothing." [A.Michael Froomkin,
+              alt.privacy.clipper, 1994-09-05]
+ 
+ 9.13. National Information Infrastructure, Digital Superhighway
+   9.13.1. Hype on the Information Superhighway
+           - It's against the law to talk abou the Information
+              Superhighway without using at least one of the overworked
+              metaphors: road kill, toll boths, passing lanes, shoulders,
+              on-ramps, off-ramps, speeding, I-way, Infobahn, etc.
+           - Most of what is now floating around the suddenly-trendy
+              idea of the Digital Superduperway is little more than hype.
+              And mad metaphors. Misplaced zeal, confusing tangential
+              developments with real progress. Much like libertarians
+              assuming the space program is something they should somehow
+              be working on.
+           - For example, the much-hyped "Pizza Hut" on the Net (home
+              pizza pages, I guess). It is already being dubbed "the
+              first case of true Internet commerce." Yeah, like the Coke
+              machines on the Net so many years ago were examples of
+              Internet commerce. Pure hype. Madison Avenue nonsense. Good
+              for our tabloid generation.
+   9.13.2. "Why is the National Information Infrastructure a bad idea?"
+           - NII = Information Superhighway = Infobahn = Iway = a dozen
+              other supposedly clever and punning names
+           + Al Gore's proposal:
+             - links hospitals, schools, government
+             + hard to imagine that the free-wheeling anarchy of the
+                Internet would persist..more likely implications:
+               - "is-a-person" credentials, that is, proof of identity,
+                  and hence tracking, of all interactions
+               - the medical and psychiatric records would be part of
+                  this (psychiatrists are leery of this, but they may
+                  have no choice but to comply under the National Health
+                  Care plans being debated)
+           + There are other bad aspects:
+             - government control, government inefficiency, government
+                snooping
+             - distortion of markets ("universal access')
+             - restriction of innovation
+             - is not needed...other networks are doing perfectly well,
+                and will be placed where they are needed and will be
+                locally paid for
+   9.13.3. NII, Video Dialtone
+           + "Dialtone"
+             - phone companies offer an in-out connection, and charge
+                for the connection, making no rulings on content (related
+                to the "Common Carrier" status)
+             + for video-cable, I don't believe there is an analogous
+                set-up being looked at
+               + cable t.v.
+                 - Carl Kadie's comments to Sternlight
+   9.13.4. The prospects and dangers of Net subsidies
+           - "universal access," esp. if same happens in health care
+           - those that pay make the rules
+           + but such access will have strings attached
+             - limits on crypto
+             -
+           - universal access also invites more spamming, a la the
+              "Freenet" spams, in which folks keep getting validated as
+              new users: any universal access system that is not pay-as-
+              you-go will be sensitive to this *or* will result in calls
+              for universal ID system (is-a-person credentialling)
+   9.13.5. NII, Superhighway, I-way
+           - crypto policy
+           - regulation, licensing
+ 
+ 9.14. Government Interest in Gaining Control of Cyberspace
+   9.14.1. Besides Clipper, Digital Telephony, and the National
+            Information Infrastructure, the government is interested in
+            other areas, such as e-mail delivery (US Postal Service
+            proposal) and maintenance of network systems in general.
+   9.14.2. Digital Telephony, ATM networks, and deals being cut
+           - Rumblings of deals being cut
+           -  a new draft is out [John Gilmore, 1994-08-03]
+           - Encryption with hardware at full ATM speeds
+           - and SONET networks (experimental, Bay Area?)
+   9.14.3. The USPS plans for mail, authentication, effects on
+            competition, etc.
+           + This could have a devastating effect on e-mail and on
+              cyberspace in general, especially if it is tied in to other
+              government proposals in an attempt to gain control of
+              cyberspace.
+             - Digital Telelphony, Clipper, pornography laws and age
+                enforcement (the Amateur Action case), etc.
+           + "Does the USPS really have a monopoly on first class mail?"
+             - and on "routes"?
+             - "The friendly PO has recently been visiting the mail
+                rooms of 2) The friendly PO has recently been visiting
+                the mail rooms of corporations in the Bay Area, opening
+                FedX, etc. packages (not protected by the privacy laws of
+                the PO's first class mail), and fining companies ($10,000
+                per violation, as I recall), for sending non-time-
+                sensitive documents via FedX when they could have been
+                sent via first-class mail." [Lew Glendenning, USPS
+                digital signature annoucement, sci.crypt, 1994-08-23] (A
+                citation or a news story would make this more credible,
+                but I've heard of similar spot checks.)
+           - The problems with government agencies competing are well-
+              known. First, they often have shoddy service..civil service
+              jobs, unfireable workers, etc. Second, they often cannot be
+              sued for nonperformance. Third, they often have government-
+              granted monopolies.
+           + The USPS proposal may be an opening shot in an attempt to
+              gain control of electronic mail...it never had control of e-
+              mail, but its monopoly on first-class mail may be argued by
+              them to extend to cyberspace.
+             - Note: FedEx and the other package and overnight letter
+                carriers face various restrictions on their service; for
+                example, they cannot offer "routes" and the economies
+                that would result in.
+             - A USPS takeover of the e-mail business would mean an end
+                to many Cypherpunks objectives, including remailers,
+                digital postage, etc.
+             - The challenge will be to get these systems deployed as
+                quickly as possible, to make any takeover by the USPS all
+                the more difficult.
+ 
+ 9.15. Software Key Escrow
+   9.15.1. (This section needs a lot more)
+   9.15.2. things are happening fast....
+   9.15.3. TIS, Carl Ellison, Karlsruhe
+   9.15.4. objections to key escrow
+           - "Holding deposits in real estate transactions is a classic
+              example. Built-in wiretaps are *not* escrow, unless the
+              government is a party to your contract.  As somebody on the
+              list once said, just because the Mafia call themselves
+              "businessmen" doesn't make them legitimate; calling
+              extorted wiretaps "escrow" doesn't make them a service.
+              
+              "The government has no business making me get their
+              permission to talk to anybody about anything in any
+              language I choose, and they have no business insisting I
+              buy "communication protection service" from some of their
+              friends to do it, any more than the aforenamed
+              "businessmen" have any business insisting I buy "fire
+              insurance" from *them*." [Bill Stewart, 1994-07-24]
+   9.15.5. Micali's "Fair Escrow"
+           - various efforts underway
+           - need section here
+           - Note: participants at Karlsruhe Conference report that a
+              German group may have published on software key escrow
+              years before Micali filed his patent (reports that NSA
+              officials were "happy")
+ 
+ 9.16. Politics, Opposition
+   9.16.1. "What should Cypherpunks say about Clipper?"
+           - A vast amount has been written, on this list and in dozens
+              of other forums.
+           - Eric Hughes put it nicely a while back:
+           - "The hypothetical backdoor in clipper is a charlatan's
+              issue by comparison, as is discussion of how to make a key
+              escrow system
+              'work.'  Do not be suckered into talking about an issue
+              that is not
+              important.  If someone want to talk about potential back
+              doors, refuse to speculate.  The existence of a front door
+              (key escrow) make back door issues pale in comparison.
+              
+              "If someone wants to talk about how key escrow works,
+              refuse to
+              elaborate.  Saying that this particular key escrow system
+              is bad has a large measure of complicity in saying that
+              escrow systems in general are OK.  Always argue that this
+              particular key escrow system is bad because it is a key
+              escrow system, not because it has procedural flaws.
+              
+              "This right issue is that the government has no right to my
+              private communications.  Every other issue is the wrong
+              issue and detracts from this central one.  If we defeat one
+              particular system without defeating all other possible such
+              systems at the same time, we have not won at all; we have
+              delayed the time of reckoning." [ Eric Hughes, Work the
+              work!, 1993-06-01]
+   9.16.2. What do most Americans think about Clipper and privacy?"
+           - insights into what we face
+           + "In a Time/CNN poll of 1,000 Americans conducted last week
+              by Yankelovich
+             - Partners, two-thirds said it was more important to
+                protect the privacy of phone
+             - calls than to preserve the ability of police to conduct
+                wiretaps.
+             - When informed about the Clipper Chip, 80% said they
+                opposed it."
+             - Philip Elmer-Dewitt, "Who Should Keep the Keys", Time,
+                Mar. 4, 1994
+   9.16.3. Does anyone actually support Clipper?
+           + There are actually legitimate uses for forms of escrow:
+             - corporations
+             - other partnerships
+   9.16.4. "Who is opposed to Clipper?"
+           - Association for Computing Machinery (ACM). "The USACM urges
+              the Administration at this point to withdraw the Clipper
+              Chip proposal and to begin an open and public review of
+              encryption policy.  The escrowed encryption initiative
+              raises vital issues of privacy, law enforcement,
+              competitiveness and scientific innovation that must be
+              openly discussed." [US ACM, DC Office" <usacm_dc@acm.org>,
+              USACM Calls for Clipper Withdrawal, press release, 1994-06-
+              30]
+   9.16.5. "What's so bad about key escrow?"
+           + If it's truly voluntary, there can be a valid use for this.
+             + Are trapdoors justified in some cases?
+               + Corporations that wish to recover encrypted data
+                 + several scenarios
+                   - employee encrypts important files, then dies or is
+                      otherwise unavailable
+                   + employee leaves company before decrypting all files
+                     - some may be archived and not needed to be opened
+                        for many years
+                   - employee may demand "ransom" (closely related to
+                      virus extortion cases)
+                   - files are found but the original encryptor is
+                      unknown
+               + Likely situation is that encryption algorithms will be
+                  mandated by corporation, with a "master key" kept
+                  available
+                 - like a trapdoor
+                 - the existence of the master key may not even be
+                    publicized within the company (to head off concerns
+                    about security, abuses, etc.)
+               + Government is trying to get trapdoors put in
+                 - S.266, which failed ultimately (but not before
+                    creating a ruckus)
+           + If the government requires it...
+             - Key escrow means the government can be inside your home
+                without you even knowing it
+           - and key escrow is not really escrow...what does one get
+              back from the "escrow" service?
+   9.16.6. Why governments should not have keys
+           - can then set people up by faking messages, by planting
+              evidence
+           - can spy on targets for their own purposes (which history
+              tells us can include bribery, corporate espionage, drug-
+              running, assassinations, and all manner of illegal and
+              sleazy activities)
+           - can sabotage contracts, deals, etc.
+           - would give them access to internal corporate communications
+           - undermines the whole validity of such contracts, and of
+              cryptographic standards of identity (shakes confidence)
+           - giving the King or the State the power to impersonate
+              another is a gross injustice
+           - imagine the government of Iran having a backdoor to read
+              the secret journals of its subjects!
+           - 4th Amendment
+           - attorney-client privilege (with trapdoors, no way to know
+              that government has not breached confidentiality)
+   9.16.7. "How might the Clipper chip be foiled or defeated?"
+           - Politically, market-wise, and technical
+           - If deployed, that is
+           + Ways to Defeat Clipper
+             - preencryption or superencryption
+             - LEAF blower
+             - plug-compatible, reverse-engineered chip
+             - sabotage
+             - undermining confidence
+             - Sun Tzu
+   9.16.8. How can Clipper be defeated, politically?
+   9.16.9. How can Clipper be defeated, in the market?
+  9.16.10. How can Clipper be defeated, technologically?
+  9.16.11. Questions
+           + Clipper issues and questions
+             - a vast number of questions, comments, challenges,
+                tidbits, details, issues
+             - entire newsgroups devoted to this
+           + "What criminal or terrrorist will be smart enough to use
+              encryption but dumb enough to use Clipper?"
+             - This is one of the Great Unanswered Questions. Clipper's
+                supporter's are mum on this one. Suggesting....
+           + "Why not encrypt data before using the Clipper/EES?"
+             - "Why can't you just encrypt data before the clipper chip?
+                
+                Two answers:
+                
+                1) the people you want to communicate with won't have
+                hardware to
+                   decrypt your data, statistically speaking.  The beauty
+                of clipper
+                   from the NSA point of view is that they are leveraging
+                the
+                   installed base (they hope) of telephones and making it
+                impossible
+                   (again, statistically) for a large fraction of the
+                traffic to be
+                   untappable.
+                
+                2) They won't license bad people like you to make
+                equipment like the
+                   system you describe.  I'll wager that the chip
+                distribution will be
+                   done in a way to prevent significant numbers of such
+                systems from
+                   being built, assuring that (1) remains true." [Tom
+                Knight, sci.crypt, 6-5-93]
+                
+             -
+           + What are the implications of mandatory key escrow?
+             + "escrow" is misleading...
+               - wrong use of the term
+               - implies a voluntary, and returnable, situation
+           + "If key escrow is "voluntary," what's the big deal?"
+             - Taxes are supposedly "voluntary," too.
+             - A wise man prepares for what is _possible_ and even
+                _likely_, not just what is announced as part of public
+                policy; policies can and do change. There is plenty of
+                precedent for a "voluntary" system being made mandatory.
+             - The form of the Clipper/EES system suggests eventual
+                mandatory status; the form of such a ban is debatable.
+           + "What is 'superencipherment,' and can it be used to defeat
+              Clipper?"
+             - preencrypting
+             - could be viewed as a non-English language
+             + how could Clipper chip know about it (entropy measures?)
+               - far-fetched
+             - wouldn't solve traffic anal. problem
+           - What's the connection between Clipper and export laws?
+           + "Doesn't this make the Clipper database a ripe target?"
+             - for subversion, sabotage, espionage, theft
+             - presumably backups will be kept, and _these_ will also be
+                targets
+           + "Is Clipper just for voice encryption?"
+             - Clipper is a data encryption chip, with the digital data
+                supplied by an ADC located outside the chip. In
+                principle, it could thus be used for data encryption in
+                general.
+             - In practice, the name Clipper is generally associated
+                with telephone use, while "Capstone" is the data standard
+                (some differences, too). The "Skipjack" algorithm is used
+                in several of these proposed systems (Tessera, also).
+  9.16.12. "Why is Clipper worse than what we have now?"
+           + John Gilmore answered this question in a nice essay. I'm
+              including the whole thing, including a digression into
+              cellular telephones, because it gives some insight--and
+              names some names of NSA liars--into how NSA and NIST have
+              used their powers to thwart true security.
+             - "It's worse because the market keeps moving toward
+                providing real encryption.
+                
+                "If Clipper succeeds, it will be by displacing real
+                secure encryption. If real secure encryption makes it
+                into mass market communications products, Clipper will
+                have failed.  The whole point is not to get a few
+                Clippers used by cops; the point is to make it a
+                worldwide standard, rather than having 3-key triple-DES
+                with RSA and Diffie-Hellman become the worldwide
+                standard.
+                
+                "We'd have decent encryption in digital cellular phones
+                *now*, except for the active intervention of Jerry
+                Rainville of NSA, who `hosted' a meeting of the standards
+                committee inside Ft. Meade, lied to them about export
+                control to keep committee documents limited to a small
+                group, and got a willing dupe from Motorola, Louis
+                Finkelstein, to propose an encryption scheme a child
+                could break.  The IS-54 standard for digital cellular
+                doesn't describe the encryption scheme -- it's described
+                in a separate document, which ordinary people can't get,
+                even though it's part of the official accredited
+                standard.  (Guess who accredits standards bodies though -
+                - that's right, the once pure NIST.)
+                
+                "The reason it's secret is because it's so obviously
+                weak.  The system generates a 160-bit "key" and then
+                simply XORs it against each block of the compressed
+                speech.  Take any ten or twenty blocks and recover the
+                key by XORing frequent speech patterns (like silence, or
+                the letter "A") against pieces of the blocks to produce
+                guesses at the key.  You try each guess on a few blocks,
+                and the likelihood of producing something that decodes
+                like speech in all the blocks is small enough that you'll
+                know when your guess is the real key.
+                
+                "NSA is continuing to muck around in the Digital Cellular
+                standards committee (TR 45.3) this year too.  I encourage
+                anyone who's interested to join the committee, perhaps as
+                an observer.  Contact the Telecommunications Industry
+                Association in DC and sign up.  Like any standards
+                committee, it's open to the public and meets in various
+                places around the country.  I'll lend you a lawyer if
+                you're a foreign national, since the committee may still
+                believe that they must exclude foreign nationals from
+                public discussions of cryptography.  Somehow the crypto
+                conferences have no trouble with this; I think it's
+                called the First Amendment.  NSA knows the law here --
+                indeed it enforces it via the State Dept -- but lied to
+                the committee." [John Gilmore, "Why is clipper worse than
+                "no encryption like we have," comp.org.eff.talk, 1994-04-
+                27]
+  9.16.13. on trusting the government
+           - "WHAT AM THE MORAL OF THE STORY, UNCLE REMUS?....When the
+              government makes any announcement (ESPECIALLY a denial),
+              you should figure out what the government is trying to get
+              you to do--and do the opposite.  Contrarianism with a
+              vengance.  Of all the advice I've  offered on the
+              Cypherpunks Channel, this is absolutely the most certain."
+              [Sandy Sandfort, 1994-07-17]
+           - if the Founders of the U.S. could see the corrupt,
+              socialist state this nation has degenerated to, they'd be
+              breaking into missile silos and stealing nukes to use
+              against the central power base.
+           + can the government be trusted to run the key escrow system?
+             - "I just heard on the news that 1300 IRS employees have
+                been disciplined for unauthorized accesses to
+                electronically filed income tax returns.  ..I'm sure they
+                will do much better, though, when the FBI runs the phone
+                system, the Post Office controls digital identity and
+                Hillary takes care of our health." [Sandy Sandfort, 1994-
+                07-19]
+             - This is just one of many such examples: Watergate ("I am
+                not a crook!"), Iran-Contra, arms deals, cocaine
+                shipments by the CIA, Teapot Dome, graft, payoffs,
+                bribes, assassinations, Yankee-Cowboy War, Bohemian
+                Grove, Casolaro, more killings, invasions, wars. The
+                government that is too chicken to ever admit it lost a
+                war, and conspicuously avoids diplomatic contact with
+                enemies it failed to vanquish (Vietnam, North Korea,
+                Cuba, etc.), while quickly becoming sugar daddy to the
+                countries it did vanquish...the U.S. appears to be
+                lacking in practicality. (Me, I consider it wrong for
+                anyone to tell me I can't trade with folks in another
+                country, whether it's Haiti, South Africa, Cuba, Korea,
+                whatever. Crypto anarchy means we'll have _some_ of the
+                ways of bypassing these laws, of making our own moral
+                decisions without regard to the prevailing popular
+                sentiment of the countries in which we live at the
+                moment.)
+ 
+ 9.17. Legal Issues with Escrowed Encryption and Clipper
+   9.17.1. As John Gilmore put it in a guest editorial in the "San
+            Francisco Examiner," "...we want the public to see a serious
+            debate about why the Constitution should be burned in order
+            to save the country." [J.G., 1994-06-26, quoted by S.
+            Sandfort]
+   9.17.2. "I don't see how Clipper gives the government any powers or
+            capabilities it doesn't already have.  Comments?"
+   9.17.3. Is Clipper really voluntary?
+   9.17.4. If Clipper is voluntary, who will use it?
+   9.17.5. Restrictions on Civilian Use of Crypto
+   9.17.6. "Has crypto been restricted in the U.S.?"
+   9.17.7. "What legal steps are being taken?"
+           - Zimmermann
+           - ITAR
+   9.17.8. reports that Department of Justice has a compliance
+            enforcement role in the EES [heard by someone from Dorothy
+            Denning, 1994-07], probably involving checking the law
+            enforcement agencies...
+   9.17.9. Status
+           +  "Will government agencies use Clipper?"
+             - Ah, the embarrassing question. They claim they will, but
+                there are also reports that sensitive agencies will not
+                use it, that Clipper is too insecure for them (key
+                lenght, compromise of escrow data, etc.). There may also
+                be different procedures (all agencies are equal, but some
+                are more equal than others).
+             - Clipper is rated for unclassified use, so this rules out
+                many agencies and many uses. An interesting double
+                standard.
+           + "Is the Administration backing away from Clipper?"
+             + industry opposition surprised them
+               - groups last summer, Citicorp, etc.
+             - public opinion
+             - editorial remarks
+             - so they may be preparing alternative
+             - and Gilmore's FOIA, Blaze's attack, the Denning
+                nonreview, the secrecy of the algortithm
+           + will not work
+             - spies won't use it, child pornographers probably won't
+                use it (if alternatives exist, which may be the whole
+                point)
+             - terrorists won't use it
+           - Is Clipper in trouble?
+  9.17.10. "Will Clipper be voluntary?"
+           - Many supporters of Clipper have cited the voluntary nature
+              of Clipper--as expressed in some policy statements--and
+              have used this to counter criticism.
+           + However, even if truly voluntary, some issues
+             + improper role for government to try to create a
+                commercial standard
+               - though the NIST role can be used to counter this point,
+                  partly
+             - government can and does make it tough for competitors
+             - export controls (statements by officials on this exist)
+           + Cites for voluntary status:
+             - original statement says it will be voluntary
+             - (need to get some statements here)
+           + Cites for eventual mandatory status:
+             - "Without this initiative, the government will eventually
+                become helpless to defend the nation." [Louis Freeh,
+                director of the FBI, various sources]
+             - Steven Walker of Trusted Information Systems is one of
+                many who think so: "Based on his analysis, Walker added,
+                "I'm convinced that five years from now they'll say 'This
+                isn't working,' so we'll have to change the rules." Then,
+                he predicted, Clipper will be made mandatory for all
+                encoded communications." [
+           + Parallels to other voluntary programs
+             - taxes
+ 
+ 9.18. Concerns
+   9.18.1. Constitutional Issues
+           - 4th Amend
+           - privacy of attorney-client, etc.
+           + Feds can get access without public hearings, records
+             - secret intelligence courts
+             -
+             + "It is uncontested (so far as I have read) that under
+                certain circum-
+               - stances, the Federal intelligence community wil be
+                  permitted to
+               - obtain Clipper keys without any court order on public
+                  record.  Only
+               - internal, classified proceedings will protect our
+                  privacy." <Steve Waldman, steve@vesheu.sar.usf.edu,
+                  sci.crypt, 4-13-94>
+   9.18.2. "What are some dangers of Clipper, if it is widely adopted?"
+           + sender/receiver ID are accessible without going to the key
+              escrow
+             - this makes traffic analysis, contact lists, easy to
+                generate
+           + distortions of markets ("chilling effects") as a plan by
+              government
+             - make alternatives expensive, hard to export, grounds for
+                suspicion
+             - use of ITAR to thwart alternatives (would be helped if
+                Cantwell bill to liberalize export controls on
+                cryptography  (HR 3627) passes)
+             + VHDL implementations possible
+               - speculates Lew Glendenning, sci.crypt, 4-13-94
+               - and recall MIPS connection (be careful here)
+   9.18.3. Market Isssues
+   9.18.4. "What are the weaknesses in Clipper?"
+           + Carl Ellison analyzed it this way:
+             - "It amuses the gallows-humor bone in me to see people
+                busily debating the quality of Skipjack as an algorithm
+                and the quality of the review of its strength.
+                
+                Someone proposes to dangle you over the Grand Canyon
+                using
+                
+                        sewing thread
+                tied to
+                        steel chain
+                tied to
+                        knitting yarn
+                
+                and you're debating whether the steel chain has been X-
+                rayed properly to see if there are flaws in the metal.
+                
+                "Key generation, chip fabrication, court orders,
+                distribution of keys once acquired from escrow agencies
+                and safety of keys within escrow agencies are some of the
+                real weaknesses.  Once those are as strong as my use of
+                1024-bit RSA and truly random session keys in keeping
+                keys on the two sides of a conversation with no one in
+                the middle able to get the key, then we need to look at
+                the steel chain in the middle: Skipjack itself."  [Carl
+                Ellison, 1993-08-02]
+             + Date: Mon, 2 Aug 93 17:29:54 EDT
+                From: cme@ellisun.sw.stratus.com (Carl Ellison)
+                To: cypherpunks@toad.com
+                Subject: cross-post
+                Status: OR
+                
+                Path: transfer.stratus.com!ellisun.sw.stratus.com!cme
+                From: cme@ellisun.sw.stratus.com (Carl Ellison)
+                Newsgroups: sci.crypt
+                Subject: Skipjack review as a side-track
+                Date: 2 Aug 1993 21:25:11 GMT
+                Organization: Stratus Computer, Marlboro MA
+                Lines: 28
+                Message-ID: <23k0nn$8gk@transfer.stratus.com>
+                NNTP-Posting-Host: ellisun.sw.stratus.com
+                
+                
+                It amuses the gallows-humor bone in me to see people
+                busily debating the
+                quality of Skipjack as an algorithm and the quality of
+                the review of its
+                strength.
+                
+                Someone proposes to dangle you over the Grand Canyon
+                using
+                
+                        sewing thread
+                tied to
+                        steel chain
+                tied to
+                        knitting yarn
+                
+                and you're debating whether the steel chain has been X-
+                rayed properly
+                to see if there are flaws in the metal.
+                
+                Key generation, chip fabrication, court orders,
+                distribution of keys once
+                acquired from escrow agencies and safety of keys within
+                escrow agencies are
+                some of the real weaknesses.  Once those are as strong as
+                my use of
+                1024-bit RSA and truly random session keys in keeping
+                keys on the two sides
+                of a conversation with no one in the middle able to get
+                the key, then we
+                need to look at the steel chain in the middle: Skipjack
+                itself.
+                
+               - "Key generation, chip fabrication, court orders,
+                  distribution of keys once acquired from escrow agencies
+                  and safety of keys within escrow agencies are some of
+                  the real weaknesses.  Once those are as strong as my
+                  use of 1024-bit RSA and truly random session keys in
+                  keeping keys on the two sides of a conversation with no
+                  one in the middle able to get the key, then we need to
+                  look at the steel chain in the middle: Skipjack
+                  itself."
+   9.18.5. What it Means for the Future
+   9.18.6. Skipjack
+   9.18.7. National security exceptions
+           - grep Gilmore's FOIA for mention that national security
+              people will have direct access and that this will not be
+              mentioned to the public
+           + "The "National Security" exception built into the Clipper
+              proposal
+             - leaves an extraordinarily weak link in the chain of
+                procedures designed
+             - to protect user privacy.  To place awesome powers of
+                surveillance
+             - technologically within the reach of a few, hoping that so
+                weak a chain
+             - will bind them, would amount to dangerous folly.  It
+                flies in the face
+             - of history. <Steve Waldman, steve@vesheu.sar.usf.edu, 4-
+                14-94, talk.politics.crypto>
+   9.18.8. In my view, any focus on the details of Clipper instead of
+            the overall concept of key escrow plays into their hands.
+            This is not to say that the work of Blaze and others is
+            misguided....in fact, it's very fine work. But a general
+            focus on the _details_ of Skipjack does nothing to allay my
+            concerns about the _principle_ of government-mandated crypto.
+            
+            If it were "house key escrow" and there were missing details
+            about the number of teeth allowed on the keys, would be then
+            all breathe a sigh of relief if the details of the teeth were
+            clarified? Of course not. Me, I will never use a key escrow
+            system, even if a blue ribbon panel of hackers and
+            Cypherpunks studies the design and declares it to be
+            cryptographically sound.
+   9.18.9. Concern about Clipper
+           - allows past communications to be read
+           + authorities could--maybe--read a lot of stuff, even
+              illegally, then use this for other investigations (the old
+              "we had an anonymous tip" ploy)
+             - "The problem with Clipper is that it provides police
+                agencies with dramatically enhanced target acquistion.
+                There is nothing to prevent NSA, ATF, FBI (or the Special
+                Projects division of the Justice Department) from
+                reviewing all internet traffic, as long as they are
+                willing to forsake using it in a criminal prosecution."
+                [dgard@netcom.com, alt.privacy.clipper, 1994-07-05]
+  9.18.10. Some wags have suggested that the new escrow agencies be
+            chosen from groups like Amnesty International and the ACLU.
+            Most of us are opposed to the "very idea" of key escrow
+            (think of being told to escrow family photos, diaries, or
+            house keys) and hence even these kinds of skeptical groups
+            are unacceptable as escrow agents.
+ 
+ 9.19. Loose Ends
+   9.19.1. "Are trapdoors--or some form of escrowed encryption--
+            justified in some cases?"
+           + Sure. There are various reasons why individuals, companies,
+              etc. may want to use crypto protocols that allow them to
+              decrypt even if they've lost their key, perhaps by going to
+              their lawyer and getting the sealed envelope they left with
+              him, etc.
+             - or using a form of "software key escrow" that allows them
+                access
+           + Corporations that wish to recover encrypted data
+             + several scenarios
+               - employee encrypts important files, then dies or is
+                  otherwise unavailable
+               + employee leaves company before decrypting all files
+                 - some may be archived and not needed to be opened for
+                    many years
+               - employee may demand "ransom" (closely related to virus
+                  extortion cases)
+               - files are found but the original encryptor is unknown
+           + Likely situation is that encryption algorithms will be
+              mandated by corporation, with a "master key" kept available
+             - like a trapdoor
+             - the existence of the master key may not even be
+                publicized within the company (to head off concerns about
+                security, abuses, etc.)
+           - The mandatory use of key escrow, a la a mandatory Clipper
+              system, or the system many of us believe is being developed
+              for software key escrow (SKE, also called "GAK," for
+              "government access to keys, by Carl Ellison) is completely
+              different, and is unacceptable. (Clipper is discussed in
+              many places here.)
+   9.19.2. DSS
+           + Continuing confusion over patents, standards, licensing,
+              etc.
+             - "FIPS186 is DSS. NIST is of the opinion that DSS does not
+                violate PKP's patents. PKP (or at least Jim Bidzos) takes
+                the position that it does. But for various reasons, PKP
+                won't sue the government. But Bidzos threatens to sue
+                private parties who infringe. Stay tuned...." [Steve
+                Wildstrom, sci.crypt, 1994-08-19]
+             - even Taher ElGamal believes it's a weak standard
+           - subliminal channels issues
+   9.19.3. The U.S. is often hypocritical about basic rights
+           - plans to "disarm" the Haitians, as we did to the Somalians
+              (which made those we disarmed even more vulnerable to the
+              local warlords)
+           - government officials are proposing to "silence" a radio
+              station in Ruanda they feel is sending out the wrong
+              message! (Heard on "McNeil-Lehrer News Hour," 1994-07-21]
+   9.19.4. "is-a-person" and RSA-style credentials
+           + a dangerous idea, that government will insist that keys be
+              linked to persons, with only one per person
+             - this is a flaw in AOCE system
+             - many apps need new keys generated many times