[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
CPSR Secrecy Statement
- To: CYPHERPUNKS <[email protected]>
- Subject: CPSR Secrecy Statement
- From: Dave Banisar <[email protected]>
- Date: Fri, 16 Jul 1993 8:27:56 EST
- Organization: CPSR Washington Office
CPSR Secrecy Statement
Computer Professionals for Social Responsibility (CPSR) has
called for a complete overhaul in the federal government's
information classification system, including the removal of
cryptography from the categories of information automatically
deemed to be secret. In a letter to a special Presidential task
force examining the classification system, CPSR said that the
current system -- embodied in an Executive Order issued by
President Reagan in 1982 -- "has limited informed public debate on
technological issues and has restricted scientific innovation and
technological development."
The CPSR statement, which was submitted in response to a
task force request for public comments, strongly criticizes a
provision in the Reagan secrecy directive that presumptively
classifies any information that "concerns cryptology." CPSR notes
that "while cryptography -- the science of making and breaking
secret security codes -- was once the sole province of the
military and the intelligence agencies, the technology today plays
an essential role in assuring the security and privacy of a wide
range of communications affecting finance, education, research and
personal correspondence." With the end of the Cold War and the
growth of widely available computer network services, the outdated
view of cryptography reflected in the Reagan order must change,
according to the statement.
CPSR's call for revision of the classification system is
based upon the organization's experience in attempting to obtain
government information relating to cryptography and computer
security issues. CPSR is currently litigating Freedom of
Information Act lawsuits against the National Security Agency
(NSA) seeking the disclosure of technical data concerning the
digital signature standard (DSS) and the administration's recent
"Clipper Chip" proposal. NSA has relied on the Reagan Executive
Order as authority for withholding the information from the
public.
In its submission to the classification task force, CPSR
also called for the following changes to the current secrecy
directive:
* A return to the "balancing test," whereby the public
interest in the disclosure of information is weighed
against the claimed harm that might result from such
disclosure;
* A prohibition against the reclassification of
information that has been previously released;
* The requirement that the economic cost of classifying
scientific and technical be considered before such
information may be classified;
* The automatic declassification of information after
20 years, unless the head of the original classifying
agency, in the exercise of his or her non-delegable
authority, determines in writing that the material
requires continued classification for a specified
period of time; and
* The establishment of an independent oversight
commission to monitor the operation of the security
classification system.
The task force is scheduled to submit a draft revision of
the Executive Order to President Clinton on November 30.
The full text of the CPSR statement can be obtained via
ftp, wais and gopher from cpsr.org, under the filename
cpsr\crypto\secrecy_statement.txt.
CPSR is a national organization of professionals in the
computing field. Membership is open to the public. For more
information on CPSR, contact <[email protected]>.
July 14, 1993
Information Security Oversight Office
750 17th Street, N.W.
Suite 530
Washington, DC 20006
Attention: PRD Task Force
Re: Proposed Changes to the Security Classification System
This submission is made in response to the Notice published
in the Federal Register on May 20, 1993 (58 FR 29480). According
to the Notice, the Task Force is soliciting submissions "by
interested parties on proposals to change the system under which
information is classified, safeguarded, and declassified in the
interest of national security." Computer Professionals for Social
Responsibility (CPSR), a national organization of professionals in
the computing field, has a long-standing interest in the problems
surrounding the current information classification system -- a
system that has limited informed public debate on technological
issues and has restricted scientific innovation and technological
development. Based on our experience conducting litigation under
the Freedom of Information Act and our efforts to assess certain
government policies concerning cryptography and computer security,
we have the following recommendations regarding changes to the
security classification system.
General Recommendations
CPSR believes that the current Executive Order 12356 is far
too broad in its definition of classifiable information and that
post Cold War realities require the substantial revision of this
outdated directive. We share the views of many public interest,
journalistic, academic, historical, and scientific organizations
that have recommended a complete revision of the classification
scheme. We believe such a revision is both necessary and
appropriate. In particular, we support the following changes to
the classification system:
* A return to the "balancing test," whereby the public
interest in the disclosure of information is weighed
against the claimed harm that might result from such
disclosure;
* A prohibition against the reclassification of
information that has been previously released;
* The requirement that the economic cost of classifying
scientific and technical be completed before such
information may be classified;
* The automatic declassification of information after
20 years, unless the head of the original classifying
agency, in the exercise of his or her non-delegable
authority, determines in writing that the material
requires continued classification for a specified
period of time; and
* The establishment of an independent oversight
commission to monitor the operation of the security
classification system.
"Cryptology" as a Classification Category
In addition to endorsing these general recommendations, we
wish to address in detail one particular provision of the current
Executive Order that unnecessarily restricts the dissemination of
technical data that should be routinely available to the public
and the scientific community. At the time EO 12356 was
promulgated in 1982, a new classification category was
established, simply defined as "cryptology." EO 12356, Sec.
1.3(a)(8). When the House Government Operations Committee
examined the Executive Order shortly after its issuance, the
Committee concluded that "[t]he need for this new category is
uncertain" and noted that "[t]he word 'cryptology,' as added by
the Reagan order, is not qualified or defined." H. Rep. No. 731,
97th Cong., 2d Sess. 16 (1982).
This concern carries even more weight today. The designation
of a routine privacy-enhancing technology as presumptively a
national security matter is inconsistent with the end of the Cold
War and the dramatic growth of commercial and civilian
telecommunications networks. While cryptography -- the science of
making and breaking secret security codes -- was once the sole
province of the military and the intelligence agencies, the
technology today plays an essential role in assuring the security
and privacy of a wide range of communications affecting finance,
education, research, and personal correspondence.
Electronic communications are now widely used in the civilian
sector and have become an integral component of the global
economy. Computers store and exchange an ever increasing amount
of personal information, including medical and financial data. In
this electronic environment, the need for privacy-enhancing
technologies is apparent. Communications applications such as
electronic mail and electronic funds transfers require secure
means of encryption and authentication -- goals that can be
achieved only through the development and dissemination of robust
cryptographic technology within the civilian sector.
The Computer Security Act and Civilian Cryptography
In recognition of the emerging significance of civilian
cryptography, Congress enacted the Computer Security Act (P.L.
100-235) in 1987. When Congress enacted the legislation, it
expressed particular concern that the National Security Agency
("NSA"), a secretive military intelligence agency, would
improperly limit public access to information concerning civilian
computer security activities. H. Rep. No. 153 (Part 2), 100th
Cong., 1st Sess. 21 (1987). The House Report on the Act notes
that NSA's
natural tendency to restrict and even deny access to
information that it deems important would disqualify
that agency from being put in charge of the protection
of non-national security information in the view of many
officials in the civilian agencies and the private
sector.
Id.
To alleviate these concerns, Congress granted sole authority
to the National Institute of Standards and Technology ("NIST") --
a civilian agency within the Department of Commerce -- to
establish technical cryptography standards for civilian computer
security. During Congress' consideration of the legislation, "NSA
opposed its passage and asserted that NSA should be in control of
this nation's computer standards program." Id. at 7. Congress
forthrightly rejected NSA's position, noting that continued
military control over all cryptographic development "would
jeopardize the entire Federal standards program." Id. at 26.
Since the enactment of the Computer Security Act, CPSR has
sought to monitor compliance with its provisions. In keeping with
those efforts, CPSR requested relevant information from NIST under
the Freedom of Information Act ("FOIA") concerning the development
of the "digital signature standard" -- the agency's first proposed
cryptographic standard since passage of the legislation. It is
important to note that the proposed standard itself would be
"applicable to all federal departments and agencies for the
protection of unclassified information." 56 Fed. Reg. 42981
(August 30, 1991) (emphasis added).
After CPSR filed a lawsuit to compel disclosure of the
information, NIST acknowledged that the great bulk of responsive
material was under the jurisdiction of NSA. NSA, in turn, has
sought to withhold a substantial amount of that information on the
grounds that it "concerns cryptology" and is therefore classified.
CPSR v. National Institute of Standards and Technology, et al.,
C.A. 92-0972-RCL (D.D.C.). The current Executive Order is thus
being used to classify information relating to a civilian agency's
development of a security standard intended to protect
unclassified information. Such a result contravenes Congress'
intent that non-military cryptographic standards would be
developed openly and subject to public scrutiny.
The Public Interest in Cryptography
More recent developments further illustrate how the
application of cryptographic technology is moving out of the
"national security" realm and is thus an inappropriate subject for
presumptive classification. On April 16, 1993, the President
announced that "government engineers" had developed a new
cryptographic device known as the "Clipper Chip" that is intended
for widespread public use. The President noted that
"[s]ophisticated encryption technology has been used for years to
protect electronic funds transfer ... [and] is now being used to
protect electronic mail and computer files." He also recognized
that "encryption technology can help Americans protect business
secrets and the unauthorized release of personal information."
Unfortunately, the administration subsequently acknowledged
that the "Clipper" technology was developed by NSA and that the
underlying technical data is classified. As in the case of the
digital signature standard, a new technology that may have a
significant impact on the nation's telecommunications
infrastructure was developed in secrecy behind a shield of NSA-
imposed classification. There is a great deal of interest in the
development of civilian cryptography, but public involvement in
the process has been substantially hampered by the improper
classification of relevant technical information. See, e.g.,
Markoff, U.S. as Big Brother of Computer Age, New York Times, May
6, 1993 at D1.
In the Cold War atmosphere that prevailed for 45 years,
cryptography was often viewed as a national security matter and
policy makers were at times willing to permit the National
Security Agency and the military establishment to maintain a
shroud of secrecy around the technology, even to the detriment of
scientific research and public accountability. With the end of
the Cold War and the growth of widely available computer network
services, this view of cryptography must change. Indeed, Congress
recognized the need for reform when it enacted the Computer
Security Act in 1987, even before the demise of the Soviet Union.
At the same time, cryptographic technology has become an
increasingly vital component of the nation's civilian information
infrastructure. Under these circumstances, there is no rational
basis for continuing the presumption that information that
"concerns cryptology" should be classified. The economic and
scientific cost to the country of the continuation of this policy
will be substantial and cannot be justified.
We believe that cryptographic information should only be
classified upon a specific showing that such disclosure will
result in an identifiable harm to legitimate national security
interests. Such a showing could clearly be made, for instance,
with respect to the actual "keys" to government cryptographic
systems. However, the wholesale classification of all information
relating to this increasingly important field of computer science
cannot be justified and may even slow the development of more
secure systems. We urge the Task Force to recommend to the
President that "cryptology" be removed from any listing of
classification categories that might be contained in a revised
Executive Order on security classification.
* "Cryptology" should be removed from the designated
"Classification Categories."
Limitations on Quasi-Classification Authority
In addition to our concern regarding classification for
cryptology, we wish to raise several additional points about the
operation of the Executive Order. One aspect of the Executive
Order concerning classification authority with which we agree has
not received proper notice by federal agencies. That is
paragraph (b) or Part 1 which states that "Except as otherwise
provided by statute, no other terms shall be used to identify
classified information." It has been CPSR's experience that
agencies continue to use the designation "sensitive but
unclassified" to invoke a national security concern when in fact
there is no basis for such a claim and when such a "quasi-
classification" is disfavored by the Executive Order and contrary
to the intent of the Computer Security Act. In one instance, the
Federal Bureau of Investigation specifically restricted public
access to information regarding the development of certain
computer systems because it designated technical documents
"sensitive but unclassified."
We believe that these activities improperly restrict public
access to government information that should otherwise be made
available. For this reason, we believe that a revised Executive
Order should make very clear that classification authority is
narrowly restricted.
* Classification authority must be narrowly construed and
invoked only pursuant to designated classification levels,
recognized by statute or executive order.
Limitations on Classification to Conceal Misconduct
We are further concerned that Section 1.6(a)-(b) and Section
5.4(b)(2)(c) in the current Executive Order have not received
adequate attention by the national security community. Section
1.6(a) states that:
In no case shall administrative information be
classified in order to conceal violations of law,
inefficiencies, or administrative error; to prevent
embarrassment to a person, organization, or agency; to
restrain competition; or to prevent or delay the release
of information that does not require protection in the
interest of national security.
Section 1.6(b) further states that "[b]asic scientific information
not clearly related to the national security may not be
classified."
Section 5.4 (Sanctions) states, in pertinent part, that:
(b) Officers and employees of the United States
government and its contractors, licensees, and grantees
shall be subject to appropriate sanctions if they: . . .
(2) knowingly and willfully classify or continue the
classification of information in violation of this Order
or any implementing directive;
(c) sanctions may include reprimand, suspension without
pay, removal, termination of classification authority,
loss or denial of access to classified information, or
other sanctions in accordance with applicable law and
agency regulation.
As indicated above, it has been CPSR's experience that the
National Security Agency sought to conceal its activities under
the Computer Security Act through improper assertion of the (b)(1)
exemption to the Freedom of Information Act. It is clearly an
improper use of classification authority to conceal agency conduct
in this manner. Such activities frustrate public oversight and
permit the abuse of powers.
Based on this experience, we make the following
recommendations:
* ISOO should conduct an investigation to determine whether
the NSA's classification of documents regarding
cryptography was improper and, if so, whether sanctions are
appropriate for the agency officials involved.
* Any agency or government official exercising
classification authority with the intent of concealing
misconduct, inefficiencies or improper conduct should be
subject to sanctions and the ISOO should make known on an
annual basis its efforts to ensure that such activities do
not occur.
Implementation and Review
It is also our belief that it would be appropriate to
establish an independent commission on classification authority
that would meet periodically to review the activities of the
Information Security Oversight Office and to solicit public input
on issues regarding information classification and national
security. Such a commission could include a representative of the
National Security Council and the Director of the ISOO. It would
also include distinguished archivists, historians, journalists,
librarians, scientists and academics. Such a commission could
provide ongoing oversight of the classification program and help
ensure that future policies reflect the widespread needs of our
country in information policy and the changing nature of our
national security interest.
We appreciate this opportunity to present our views and would
be pleased to provide you with any additional information you
might require.
Marc Rotenberg David L. Sobel
CPSR Washington Director CPSR Legal Counsel