Letter protesting proposed FBI Digital Telephony bill
Date: Wed, 23 Sep 92 09:03:23 EST
Errors-To: Comp-privacy Error Handler <comp-privacy-request@PICA.ARMY.MIL>
From: Computer Privacy Digest Moderator <comp-privacy@PICA.ARMY.MIL>
To: Comp-privacy@PICA.ARMY.MIL
Subject: Computer Privacy Digest V1#081
Computer Privacy Digest Wed, 23 Sep 92 Volume 1 : Issue: 081
Today's Topics: Moderator: Dennis G. Rears
submission for comp.society.privacy
The Computer Privacy Digest is a forum for discussion on the
effect of technology on privacy. The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy
(Moderated). Submissions should be sent to
comp-privacy@pica.army.mil and administrative requests to
comp-privacy-request@pica.army.mil.
Back issues are available via anonymous ftp on ftp.pica.army.mil
[129.139.160.200].
----------------------------------------------------------------------
Subject: submission for comp.society.privacy
Date: Fri, 18 Sep 92 01:27:42 -0700
From: Joseph Truitt <sgi.com!biocad!valis.biocad.com!joseph@PICA.ARMY.MIL>
Subject: Letter protesting proposed FBI Digital Telephony bill
[This message posted to usenet groups alt.privacy,
alt.society.civil-liberty, comp.society.cu-digest, comp.society.privacy,
comp.dcom.telecom, comp.org.eff.talk, and sci.crypt. I apologize if you
see this more than once; I do not have a means to reliably cross-post. If
you make public comments about this message, please add these newsgroups to
the Followup-To: header, if you consider it appropriate, and have the means
to do so. Thanks.]
By now, you have probably heard of the proposed FBI Digital Telephony bill,
a sweeping piece of legislation that would grant the Justice Department
many new technical and executive capabilities for tapping into any wire or
fiber optic data stream. This is my open letter to the following
congressmen regarding the proposal. I encourage you to write and send a
letter, as well. Permission is granted to freely redistribute this
article [wholly intact, preferably].
The Honorable Sen. Ernest Hollings, Chairman
Senate Commerce Committee
U.S. Senate
Washington, DC 22101
The Honorable Don Edwards, Chairman,
Subcommittee on Constitutional Rights
House Judiciary Committee
U.S. House of Representatives
Washington, DC 20515
The Honorable Jack Brooks, Chairman,
House Judiciary Committee
U.S. House of Representatives
Washington, DC 20515
Chairman, Senate Communication Subcommittee
U.S. Senate
Washington, DC 22101
Chairman, House Telecommunication Subcommittee
U.S. House of Representatives
Washington, DC 20515
Chairman of the FCC
1919 M Street N.W.
Washington, DC 20554
References: May 1992 Digital Telephony proposal (I will gladly send you a
copy, if you don't already have one).
FBI Congressional Affairs office, 202/324-3000
"Decrypting the Puzzle Palace"
EFFector Online, July 29, 1992
Electronic Foundier Foundation
"FBI Seeks Right to Tap All Net Services"
ComputerWorld, June 8, 1992 - Vol. XXVI, No. 23
"Tap Dance"
Scientific American, June, 1992
"Promising Technology Alarms Government"
Houston Chronicle, June 21, 1992
Editorial
NewsBytes, July 13, 1992
By Joseph Truitt on 92/09/17.
- ----- begin letter -----
September 17, 1992
Dear Sir,
I am writing you an open letter in regard to the FBI Digital Telephony
proposal, in the hopes that it can be heavily revised before being
introduced as a bill. While I can appreciate the FBI's concern about
staying abreast of communication technology advances, I must take issue
with the implications of the sweeping proposal. I believe it has the
potential to create some serious problems (especially in combination with
future legislation to limit or standardize encryption algorithms):
* Allows the government to be too much like "Big Brother"--to very
conveniently monitor [from comfortable central offices] all types of
wired communications from virtually any source.
* Violates the right for businesses and individuals to employ a secure
communications channel, if they so desire.
* Discourages development of better communications technology.
* Puts domestic communication equipment makers at a disadvantage in the
international market.
* Invites abuse of executive branch power.
* Promotes a black market of illegally obtained information.
To expound on these points, I wish to respond in some detail to several
quoted portions of the latest draft of the proposal I have available,
introduced in May, 1992:
A BILL
To ensure the continuing access of law enforcement to the content of
wire and electronic communications when authorized by law and for
other purposes.
May I inquire as to these "other purposes"?
(1)(b) The purposes of this Act are to clarify the responsibilities
of providers of electronic communication services and private branch
exchange operators to provide such assistance as necessary to ensure
the ability of government agencies to implement lawful court orders or
authorizations to intercept wire and electronic communications.
Footnote 2. Whether the content is voice, facsimile, imagery (e.g.
video), computer data, signalling information, or other forms of
communication, does not matter; all forms of communication are
intercepted.
Shortly after the introduction of the May draft of the DT proposal, William
A. Bayse, head of the FBI's technical services division, confirmed that the
FBI wants real-time remote access to all data, fax, voice and video traffic
in the U.S. I contend that this is more than a mere clarification of the
telecom common carrier's responsibility to assist law enforcement (Omnibus
Crime and Safe Streets Act of 1968), as the proposal indicates. It is
ominous and unreasonably intrusive.
(a) Providers of electronic communication services and private branch
exchange operators shall provide within the United States capability
and capacity for the government to intercept wire and electronic
communications when authorized by law:
(1) concurrent with the transmission of the communication to the
recipient of the communication;
(2) in the signal form representing the content of the communication
between the subject of the intercept and any individual with whom the
subject is communicating, exclusive of any other signal representing
the content of the communication between any other subscribers or
users of the electronic communication services provider or private
branch exchange operator, and including information on the individual
calls (including origin, destination and other call set-up
information), and services, systems, and features used by the subject
of the interception;
(3) notwithstanding the mobility of the subject of the intercept or
the use by the subject of the intercept of any features of the
telecommunication system, including, but not limited to, speed-
dialing or call forwarding features;
(4) at a government monitoring facility remote from the target
facility and remote from the system of the electronic communication
services provider or private branch exchange operator;
(5) without detection by the subject of the intercept or any
subscriber
(6) without degradation of any subscriber's telecommunications
service.
Telecommunication systems are the highway for information exchange between
computers around the world. Modifying U.S. telecommunication systems to
comply with item (4), in combination with the other items (and parallel
government efforts to cripple legal encryption schemes, such as a narrowly
defeated FBI rider to Senate Bill 266--sure to be followed by other
attempts) would create grave security and privacy risks for any business or
individual subscriber to those systems, not to mention the international
computer users whose telecom traffic--such as private electronic mail--is
unwittingly routed through the U.S.
Given a fertile environment for growth, cyberspace (partial definition: an
immersive, interactive communication environment facilitated by computers)
might soon be where a majority of commercial and private transactions will
occur. A person sitting in New York can already meet and discuss business
with another person sitting in San Francisco, in one virtual living room.
However, since electronic codes describing these meetings/transactions must
travel over wire or optics, exciting advances in sensitive business
communications (for highly dynamic cooperation and strategic maneuvers)
would most likely be thwarted by fear that competitors or other enemies
might wrongfully gain access to that communication via the new remote wire
taps.
Why should businesses be paranoid about such eavesdropping? Because a hole
for the FBI to plug into would also be available for any other
knowledgeable user to plug into. Remote monitoring of all wires would
require an extensive system of hardware and/or software tapping devices
that could be activated by remote commands. Frank Dzubeck, president of
Communications Network Architects, Inc. in Washington, D.C. believes that
[for the telephone common carrier portion of the electronic network], in
essence, the FBI wants to hook up a leased line from its remote monitoring
post to a spare port on the telephone company's switch or the LAN's router
or smart hub. Like it or not, such "back doors" _would_ be discovered, and
exploited by people outside of law enforcement--and outside of the
U.S.--regardless of threatening fines and prison terms. High tech
espionage, extortion, and blackmail would explode with such convenient,
uniform information taps available. It is not feasible to create remote
monitoring devices for FBI use that cannot be widely abused by other
agencies or individuals.
The 4th Amendment to the Bill of Rights does not just bar the government
from unreasonable searches. I believe that it also implies that the
government should avoid creating an environment that encourages citizens to
search each other without permission, and that the citizens have a right to
privately communicate (so as to avoid "unreasonable searches" of their
ideas).
Imagine the implications if a bill were introduced to instruct the U.S.
Post Office and all cargo carriers to provide devices to remotely inspect
the contents of all letters and parcels at the leisure of law enforcement
officials. Without fail, this hypothetical device would soon arrive in the
hands of people outside of law enforcement, and it would be immediately
duplicated and sold underground.
A bill might as well be introduced to force everyone to pay for and install
remotely activated and government monitored "secure" video cameras in their
offices and living rooms. This analogy may sound extreme, but it is valid,
given the end-user financial burden from this proposal, the proliferation
of computer-facilitated conference meetings, and the sundry attempts by the
FBI and NSA to disallow serious encryption algorithm development and use in
the U.S.
Encryption restrictions are inextricably linked with digital wire tapping,
because the sender must have total control of either the format or the
distribution of his/her communications in order to have reasonable
electronic privacy. If both format and distribution are
controlled/compromised by others (like the government), then the foundation
of electronic privacy crumbles.
Under the guise of regulating international export of encryption
technology, the recent State Department / Commerce Department / NSA
attempts to legislate inferior encryption standards into wireless
communications are just a short step away from similar standards for wired
communication. One individual close to the TR45.3 committee reviewing the
standards said that at least some of the members were "interested in weak
cellular encryption because they considered warrants not to be 'practical'
when it came to pursuing drug dealers and other criminals using cellular
phones." That attitude does not align with the "minimization" principle of
the Omnibus Crime and Safe Streets Act that is touted as the foundation for
the new Digital Telephony proposal (to require a warrant for every search,
and to avoid monitoring parties that are not listed in that warrant). The
cellular encryption standard pushed by the NSA is so weak that anyone with
the right PC-based black box would be able to monitor so-called "secure"
cellular conversations in their area. I posit that, given the proposed
remote taps, wired communications would suffer a similar indignity,
especially as wire tap activation/decryption codes filtered into the hands
of non-law-enforcement people.
Such a built-in weakness to communications privacy would not only
discourage healthy, competitive growth of companies producing tangible
goods and services, but also threaten cutting-edge information-based
companies, such as the American Information Exchange (AMIX) in Palo Alto,
CA. It does not seem wise to introduce more stumbling blocks into the path
of the already ponderous U.S. business economy. Information _is_ the
future of business--and the secure exchange of information must be
encouraged, rather than discouraged, if the U.S. wants to participate in
the astounding growth that can be facilitated by computers. Ron Rivest
(the "R" in RSA, a popular and relatively secure encryption scheme) said,
"We have the largest information based economy in the world. We have lots
of reasons for wanting to protect information, and weakening our encryption
systems for the convenience of law enforcement doesn't serve the national
interest."
(e) The Attorney General shall have exclusive authority to enforce
the provisions of subsections (a), (b) and (c) of this section. The
Attorney General may apply to the appropriate United States District
Court for an order restraining or enjoining any violation of
subsection (a), (b) or (c) of this section. The District Court
shall have jurisdiction to restrain and enjoin violations of
subsections (a) of this section.
<from a previous draft>
(h) Notwithstanding section 552b of Title 5, United States Code or any
other provision of law, the Attorney General or his designee may
direct that any Commission proceeding concerning regulations,
standards or registrations issued or to be issued under the authority
of this section shall be closed to the public.
What is the purpose of this unprecedented step of placing control over
certification of telecommunications equipment in the hands of the Attorney
General? Why shouldn't the Federal Communications Commission (FCC) remain
in control of such certification, as opposed to becoming a rubber stamp?
And why should we place the Attorney General in a position to shut down any
telecommunications advance without benefit of a public hearing?
(f) Any person who willfully violates any provision of subsection
(a) of this section shall be subject to a civil penalty of $10,000
per day for each day in violation. The Attorney General may file a
civil action in the appropriate United States District Court to
collect, and the United States District Courts shall have
jurisdiction to impose, such fines.
(g) Definitions--As used in subsections (a) through (f) of this
section--
(1) 'provider of electronic communication service' or 'private
branch exchange operator' means any service or operator which
provides to users thereof the ability to send or receive wire or
electronic communication,
The proposal does not limit itself to new network connections--it also
applies to all existing connections. Can our nation's struggling
businesses afford to upgrade their computer and PBX networks to be easily,
remotely tappable? I think not. Can they afford the resulting $10,000/day
fine as soon as the FBI discovers the omission? Not likely. The
substantial expense of upgrading equipment would immediately be passed
along to the the subscribers. What an insult--to be forced to pay for the
privilege of being tapped!
In short, the Digital Telephony proposal would encourage abuse of executive
branch power. It has the potential to inhibit technological innovation in
communications equipment, systems, and services. It could indirectly place
certain designs, manufacturers, or types of service at an advantage or a
disadvantage, and it places no statutory safeguards against being quietly
exploited in this way by someone with favored access to the Attorney
General or to the FCC.
What specific changes do I request on the Digital Telephony proposal?
1. Limit the type of data lines that can be tapped to PBX and
common-carrier phone lines, so as to not impede the development of other
computer communications technology. This would be be in line with a
"clarification" of the Omnibus Crime and Safe Streets Act.
2. Eliminate the "remote access" capability. Instead of forcing telecom
providers to install ubiquitous tapping hardware and/or software equipment
that can be accessed via privileged leased telephone lines, have them
publish clear documentation completely describing the protocols used on
their wires and optics. The FBI should contract some domestic electronic
companies to design, build, maintain, and periodically upgrade a reasonable
number of data channel isolation / storage devices that could be
temporarily connected on a per-warrant basis to the phone lines, trunks, or
hubs that serve the suspects in question. Since the domestic
telecommunication companies would not have to engineer a built-in data
tap/compromise into their equipment, they would not be put at a
disadvantage in the international market because of inferior security or
having to maintain dual models (one domestic, one international).
3. Keep lawmaking in Congress where the Constitution--for very good
reason--put it. A committee or small advisory office could be established
to take input from the Justice Department, establish expertise in the area,
and formulate occasional legislation to be submitted through the normal
legislative process, in full public view.
Also, if the Justice Department introduces any more legislation (boldly, or
surreptitiously as a rider) to regulate or outlaw the domestic use of any
type of electronic data encryption, please reject it. The freedom of
format and content of speech must be upheld, as well as the author's right
to know and limit the forum.
In closing, I would like to quote John Perry Barlow of the Electronic
Frontier Foundation, as he echoes my sentiments precisely:
The legal right to express oneself is meaningless if there is no
secure medium through which that expression may travel. By the same
token, the right to hold certain unpopular opinions is forfeit unless
one can discuss those opinions with others of like mind without the
government listening in.
... there is a kind of corrupting power in the ability to create
public policy in secret while assuring that the public will have
little secrecy of its own.
In its secrecy and technological might, the NSA already occupies a
very powerful position. And conveying to the Department of Justice
what amounts to licensing authority for all communications technology
would give it a control of information distribution rarely asserted
over English-speaking people since Oliver Cromwell's Star Chamber
Proceedings.
Are there threats, foreign or domestic, which are sufficiently grave
to merit the conveyance of such vast legal and technological might?
And even if the NSA and FBI may be trusted with such power today, will
they always be trustworthy? Will we be able to do anything about it if
they aren't?
Sincerely,
Joseph Truitt
53 S. Cragmont Ave.
San Jose, CA 95127
joseph@biocad.com (my employer does not necessarily share my opinions)
------- End of Forwarded Message
------------------------------
End of Computer Privacy Digest V1 #081
******************************
Comments
Post a Comment