Letter protesting proposed FBI Digital Telephony bill

 Date:       Wed, 23 Sep 92 09:03:23 EST

Errors-To:  Comp-privacy Error Handler <comp-privacy-request@PICA.ARMY.MIL>

From:       Computer Privacy Digest Moderator  <comp-privacy@PICA.ARMY.MIL>

To:         Comp-privacy@PICA.ARMY.MIL

Subject:    Computer Privacy Digest V1#081


Computer Privacy Digest Wed, 23 Sep 92              Volume 1 : Issue: 081


Today's Topics: Moderator: Dennis G. Rears


                  submission for comp.society.privacy


   The Computer Privacy Digest is a forum for discussion on the

  effect of technology on privacy.  The digest is moderated and

  gatewayed into the USENET newsgroup comp.society.privacy

  (Moderated).  Submissions should be sent to

  comp-privacy@pica.army.mil and administrative requests to

  comp-privacy-request@pica.army.mil.

   Back issues are available via anonymous ftp on ftp.pica.army.mil

  [129.139.160.200].

----------------------------------------------------------------------


Subject: submission for comp.society.privacy

Date: Fri, 18 Sep 92 01:27:42 -0700

From: Joseph Truitt <sgi.com!biocad!valis.biocad.com!joseph@PICA.ARMY.MIL>


Subject: Letter protesting proposed FBI Digital Telephony bill


[This message posted to usenet groups alt.privacy,

alt.society.civil-liberty, comp.society.cu-digest, comp.society.privacy,

comp.dcom.telecom, comp.org.eff.talk, and sci.crypt.  I apologize if you

see this more than once; I do not have a means to reliably cross-post.  If

you make public comments about this message, please add these newsgroups to

the Followup-To: header, if you consider it appropriate, and have the means

to do so.  Thanks.]


By now, you have probably heard of the proposed FBI Digital Telephony bill,

a sweeping piece of legislation that would grant the Justice Department

many new technical and executive capabilities for tapping into any wire or

fiber optic data stream.  This is my open letter to the following

congressmen regarding the proposal.  I encourage you to write and send a

letter, as well.  Permission is granted to freely redistribute this

article [wholly intact, preferably].


The Honorable Sen. Ernest Hollings, Chairman

Senate Commerce Committee

U.S. Senate

Washington, DC 22101


The Honorable Don Edwards, Chairman,

Subcommittee on Constitutional Rights

House Judiciary Committee

U.S. House of Representatives

Washington, DC 20515


The Honorable Jack Brooks, Chairman,

House Judiciary Committee

U.S. House of Representatives

Washington, DC 20515


Chairman, Senate Communication Subcommittee

U.S. Senate

Washington, DC 22101


Chairman, House Telecommunication Subcommittee

U.S. House of Representatives

Washington, DC 20515


Chairman of the FCC

1919 M Street N.W.

Washington, DC 20554


References: May 1992 Digital Telephony proposal (I will gladly send you a

            copy, if you don't already have one).


            FBI Congressional Affairs office, 202/324-3000


            "Decrypting the Puzzle Palace"

            EFFector Online, July 29, 1992

            Electronic Foundier Foundation


            "FBI Seeks Right to Tap All Net Services"

            ComputerWorld, June 8, 1992 - Vol. XXVI, No. 23


            "Tap Dance"

            Scientific American, June, 1992


            "Promising Technology Alarms Government"

            Houston Chronicle, June 21, 1992


            Editorial

            NewsBytes, July 13, 1992


By Joseph Truitt on 92/09/17.


- ----- begin letter -----


September 17, 1992


Dear Sir,


I am writing you an open letter in regard to the FBI Digital Telephony

proposal, in the hopes that it can be heavily revised before being

introduced as a bill.  While I can appreciate the FBI's concern about

staying abreast of communication technology advances, I must take issue

with the implications of the sweeping proposal.  I believe it has the

potential to create some serious problems (especially in combination with

future legislation to limit or standardize encryption algorithms):


  * Allows the government to be too much like "Big Brother"--to very

    conveniently monitor [from comfortable central offices] all types of

    wired communications from virtually any source.


  * Violates the right for businesses and individuals to employ a secure

    communications channel, if they so desire.


  * Discourages development of better communications technology.


  * Puts domestic communication equipment makers at a disadvantage in the

    international market.


  * Invites abuse of executive branch power.


  * Promotes a black market of illegally obtained information.



To expound on these points, I wish to respond in some detail to several

quoted portions of the latest draft of the proposal I have available,

introduced in May, 1992:


     A BILL


     To ensure the continuing access of law enforcement to the content of

     wire and electronic communications when authorized by law and for

     other purposes.


May I inquire as to these "other purposes"?


     (1)(b) The purposes of this Act are to clarify the responsibilities 

     of providers of electronic communication services and private branch 

     exchange operators to provide such assistance as necessary to ensure 

     the ability of government agencies to implement lawful court orders or 

     authorizations to intercept wire and electronic communications. 


     Footnote 2. Whether the content is voice, facsimile, imagery (e.g.

     video), computer data, signalling information, or other forms of

     communication, does not matter; all forms of communication are

     intercepted.


Shortly after the introduction of the May draft of the DT proposal, William

A. Bayse, head of the FBI's technical services division, confirmed that the

FBI wants real-time remote access to all data, fax, voice and video traffic

in the U.S.  I contend that this is more than a mere clarification of the

telecom common carrier's responsibility to assist law enforcement (Omnibus

Crime and Safe Streets Act of 1968), as the proposal indicates.  It is

ominous and unreasonably intrusive.


     (a) Providers of electronic communication services and private branch

     exchange operators shall provide within the United States capability

     and capacity for the government to intercept wire and electronic

     communications when authorized by law:


     (1) concurrent with the transmission of the communication to the

     recipient of the communication;


     (2) in the signal form representing the content of the communication

     between the subject of the intercept and any individual with whom the

     subject is communicating, exclusive of any other signal representing

     the content of the communication between any other subscribers or

     users of the electronic communication services provider or private

     branch exchange operator, and including information on the individual

     calls (including origin, destination and other call set-up

     information), and services, systems, and features used by the subject

     of the interception;


     (3) notwithstanding the mobility of the subject of the intercept or

     the use by the subject of the intercept of any features of the

     telecommunication system, including, but not limited to, speed-

     dialing or call forwarding features;


     (4) at a government monitoring facility remote from the target

     facility and remote from the system of the electronic communication

     services provider or private branch exchange operator;


     (5) without detection by the subject of the intercept or any

     subscriber


     (6) without degradation of any subscriber's telecommunications

     service.


Telecommunication systems are the highway for information exchange between

computers around the world.  Modifying U.S. telecommunication systems to

comply with item (4), in combination with the other items (and parallel

government efforts to cripple legal encryption schemes, such as a narrowly

defeated FBI rider to Senate Bill 266--sure to be followed by other

attempts) would create grave security and privacy risks for any business or

individual subscriber to those systems, not to mention the international

computer users whose telecom traffic--such as private electronic mail--is

unwittingly routed through the U.S.


Given a fertile environment for growth, cyberspace (partial definition: an

immersive, interactive communication environment facilitated by computers)

might soon be where a majority of commercial and private transactions will

occur.  A person sitting in New York can already meet and discuss business

with another person sitting in San Francisco, in one virtual living room.

However, since electronic codes describing these meetings/transactions must

travel over wire or optics, exciting advances in sensitive business

communications (for highly dynamic cooperation and strategic maneuvers)

would most likely be thwarted by fear that competitors or other enemies

might wrongfully gain access to that communication via the new remote wire

taps.


Why should businesses be paranoid about such eavesdropping?  Because a hole

for the FBI to plug into would also be available for any other

knowledgeable user to plug into.  Remote monitoring of all wires would

require an extensive system of hardware and/or software tapping devices

that could be activated by remote commands.  Frank Dzubeck, president of

Communications Network Architects, Inc. in Washington, D.C. believes that

[for the telephone common carrier portion of the electronic network], in

essence, the FBI wants to hook up a leased line from its remote monitoring

post to a spare port on the telephone company's switch or the LAN's router

or smart hub.  Like it or not, such "back doors" _would_ be discovered, and

exploited by people outside of law enforcement--and outside of the

U.S.--regardless of threatening fines and prison terms.  High tech

espionage, extortion, and blackmail would explode with such convenient,

uniform information taps available.  It is not feasible to create remote

monitoring devices for FBI use that cannot be widely abused by other

agencies or individuals.


The 4th Amendment to the Bill of Rights does not just bar the government

from unreasonable searches.  I believe that it also implies that the

government should avoid creating an environment that encourages citizens to

search each other without permission, and that the citizens have a right to

privately communicate (so as to avoid "unreasonable searches" of their

ideas).


Imagine the implications if a bill were introduced to instruct the U.S.

Post Office and all cargo carriers to provide devices to remotely inspect

the contents of all letters and parcels at the leisure of law enforcement

officials.  Without fail, this hypothetical device would soon arrive in the

hands of people outside of law enforcement, and it would be immediately

duplicated and sold underground.


A bill might as well be introduced to force everyone to pay for and install

remotely activated and government monitored "secure" video cameras in their

offices and living rooms.  This analogy may sound extreme, but it is valid,

given the end-user financial burden from this proposal, the proliferation

of computer-facilitated conference meetings, and the sundry attempts by the

FBI and NSA to disallow serious encryption algorithm development and use in

the U.S.


Encryption restrictions are inextricably linked with digital wire tapping,

because the sender must have total control of either the format or the

distribution of his/her communications in order to have reasonable

electronic privacy.  If both format and distribution are

controlled/compromised by others (like the government), then the foundation

of electronic privacy crumbles.


Under the guise of regulating international export of encryption

technology, the recent State Department / Commerce Department / NSA

attempts to legislate inferior encryption standards into wireless

communications are just a short step away from similar standards for wired

communication.  One individual close to the TR45.3 committee reviewing the

standards said that at least some of the members were "interested in weak

cellular encryption because they considered warrants not to be 'practical'

when it came to pursuing drug dealers and other criminals using cellular

phones."  That attitude does not align with the "minimization" principle of

the Omnibus Crime and Safe Streets Act that is touted as the foundation for

the new Digital Telephony proposal (to require a warrant for every search,

and to avoid monitoring parties that are not listed in that warrant).  The

cellular encryption standard pushed by the NSA is so weak that anyone with

the right PC-based black box would be able to monitor so-called "secure"

cellular conversations in their area.  I posit that, given the proposed

remote taps, wired communications would suffer a similar indignity,

especially as wire tap activation/decryption codes filtered into the hands

of non-law-enforcement people.


Such a built-in weakness to communications privacy would not only

discourage healthy, competitive growth of companies producing tangible

goods and services, but also threaten cutting-edge information-based

companies, such as the American Information Exchange (AMIX) in Palo Alto,

CA.  It does not seem wise to introduce more stumbling blocks into the path

of the already ponderous U.S. business economy.  Information _is_ the

future of business--and the secure exchange of information must be

encouraged, rather than discouraged, if the U.S. wants to participate in

the astounding growth that can be facilitated by computers.  Ron Rivest

(the "R" in RSA, a popular and relatively secure encryption scheme) said,

"We have the largest information based economy in the world.  We have lots

of reasons for wanting to protect information, and weakening our encryption

systems for the convenience of law enforcement doesn't serve the national

interest."


     (e) The Attorney General shall have exclusive authority to enforce

     the provisions of subsections (a), (b) and (c) of this section.  The

     Attorney General may apply to the appropriate United States District

     Court for an order restraining or enjoining any violation of

     subsection (a), (b) or (c) of this section.  The District Court

     shall have jurisdiction to restrain and enjoin violations of

     subsections (a) of this section.


     <from a previous draft>

     (h) Notwithstanding section 552b of Title 5, United States Code or any

     other provision of law, the Attorney General or his designee may

     direct that any Commission proceeding concerning regulations,

     standards or registrations issued or to be issued under the authority

     of this section shall be closed to the public.


What is the purpose of this unprecedented step of placing control over

certification of telecommunications equipment in the hands of the Attorney

General?  Why shouldn't the Federal Communications Commission (FCC) remain

in control of such certification, as opposed to becoming a rubber stamp?

And why should we place the Attorney General in a position to shut down any

telecommunications advance without benefit of a public hearing?


     (f) Any person who willfully violates any provision of subsection

     (a) of this section shall be subject to a civil penalty of $10,000

     per day for each day in violation.  The Attorney General may file a

     civil action in the appropriate United States District Court to

     collect, and the United States District Courts shall have

     jurisdiction to impose, such fines.


     (g) Definitions--As used in subsections (a) through (f) of this

     section--

     (1) 'provider of electronic communication service' or 'private

     branch exchange operator' means any service or operator which

     provides to users thereof the ability to send or receive wire or

     electronic communication,


The proposal does not limit itself to new network connections--it also

applies to all existing connections.  Can our nation's struggling

businesses afford to upgrade their computer and PBX networks to be easily,

remotely tappable?  I think not.  Can they afford the resulting $10,000/day

fine as soon as the FBI discovers the omission?  Not likely.  The

substantial expense of upgrading equipment would immediately be passed

along to the the subscribers.  What an insult--to be forced to pay for the

privilege of being tapped!


In short, the Digital Telephony proposal would encourage abuse of executive

branch power.  It has the potential to inhibit technological innovation in

communications equipment, systems, and services.  It could indirectly place

certain designs, manufacturers, or types of service at an advantage or a

disadvantage, and it places no statutory safeguards against being quietly

exploited in this way by someone with favored access to the Attorney

General or to the FCC.


What specific changes do I request on the Digital Telephony proposal?


1. Limit the type of data lines that can be tapped to PBX and

common-carrier phone lines, so as to not impede the development of other

computer communications technology.  This would be be in line with a

"clarification" of the Omnibus Crime and Safe Streets Act.


2. Eliminate the "remote access" capability.  Instead of forcing telecom

providers to install ubiquitous tapping hardware and/or software equipment

that can be accessed via privileged leased telephone lines, have them

publish clear documentation completely describing the protocols used on

their wires and optics.  The FBI should contract some domestic electronic

companies to design, build, maintain, and periodically upgrade a reasonable

number of data channel isolation / storage devices that could be

temporarily connected on a per-warrant basis to the phone lines, trunks, or

hubs that serve the suspects in question.  Since the domestic

telecommunication companies would not have to engineer a built-in data

tap/compromise into their equipment, they would not be put at a

disadvantage in the international market because of inferior security or

having to maintain dual models (one domestic, one international).


3. Keep lawmaking in Congress where the Constitution--for very good

reason--put it.  A committee or small advisory office could be established

to take input from the Justice Department, establish expertise in the area,

and formulate occasional legislation to be submitted through the normal

legislative process, in full public view.


Also, if the Justice Department introduces any more legislation (boldly, or

surreptitiously as a rider) to regulate or outlaw the domestic use of any

type of electronic data encryption, please reject it.  The freedom of

format and content of speech must be upheld, as well as the author's right

to know and limit the forum.


In closing, I would like to quote John Perry Barlow of the Electronic

Frontier Foundation, as he echoes my sentiments precisely:


     The legal right to express oneself is meaningless if there is no

     secure medium through which that expression may travel. By the same

     token, the right to hold certain unpopular opinions is forfeit unless

     one can discuss those opinions with others of like mind without the

     government listening in.

 

     ... there is a kind of corrupting power in the ability to create

     public policy in secret while assuring that the public will have

     little secrecy of its own.


     In its secrecy and technological might, the NSA already occupies a

     very powerful position. And conveying to the Department of Justice

     what amounts to licensing authority for all communications technology

     would give it a control of information distribution rarely asserted

     over English-speaking people since Oliver Cromwell's Star Chamber

     Proceedings.


     Are there threats, foreign or domestic, which are sufficiently grave

     to merit the conveyance of such vast legal and technological might?

     And even if the NSA and FBI may be trusted with such power today, will

     they always be trustworthy? Will we be able to do anything about it if

     they aren't?


Sincerely,




Joseph Truitt

53 S. Cragmont Ave.

San Jose, CA 95127


joseph@biocad.com (my employer does not necessarily share my opinions)


 ------- End of Forwarded Message





------------------------------



End of Computer Privacy Digest V1 #081

******************************


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS