[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

NYT Hits GAK, Boosts GAKS



   The New York Times, July 6, 1998, p. A10.

   Editorial

   Privacy in the Digital Age

   As more and more Americans communicate and do business
   electronically, the fear is spreading that information they
   transmit can be seized by hackers or criminals and used for
   illegal or unsavory purposes. Fortunately, the technology
   to thwart such invasions already exists. It is called
   encryption, or the encoding of digital information to
   secure its privacy. But the Federal Bureau of Investigation
   is trying hard to prevent the growing use of encryption,
   both in the United States and abroad, because of fears that
   the protective technology itself will get into the wrong
   hands. That shortsighted stand will undermine efforts to
   protect commercial transactions and may actually hamper law
   enforcement rather than help it.

   The Clinton Administration's current policies toward
   encryption have been largely dictated by the F.B.I. and the
   Justice Department. These two agencies now block encryption
   makers from exporting their most advanced technology unless
   they agree to develop a method allowing law enforcement
   agencies to gain access to it. The method favored by the
   F.B.I. is known as the key escrow, in which the key to
   cracking a code is kept with a third party that could hand
   it over quickly if law enforcement agencies demanded it.

   But the key escrow method poses tremendous threats to
   privacy. There is a danger that access to keys for the code
   could be abused by law enforcement agencies and others.
   Worse, the United States would be required to share key
   escrow information with law enforcement agencies of other
   countries, and giving access to private communications to
   countries with poor human rights records could lead to
   crackdowns on dissidents using encryption for their own
   communications.

   According to industry officials, the export controls are
   already backfiring. More and more foreign companies are
   supplying encryption technologies without key escrow
   arrangements, making it virtually impossible for the F.B.I.
   to eavesdrop and stealing business from American firms. The
   growing foreign role diminishes the ability of the F.B.I.
   to demand new safeguards or ways to penetrate the
   communications of criminals who use encryption.

   President Clinton might normally be more sympathetic to
   concerns over maintaining privacy in the digital world. But
   since Attorney General Janet Reno has protected Mr. Clinton
   from an independent counsel on campaign finance, the White
   House is said to be loath to oppose either her or Louis
   Freeh, the F.B.I. Director, on this issue.

   On Capitol Hill, the debate over encryption has created
   some unusual political alliances. Many conservative
   Republicans have stood with leaders of the high-tech
   industry to oppose any kind of ban on encryption within the
   United States and to support a loosening of export controls
   on encryption technology. It has been odd to see Trent
   Lott, the Senate majority leader, and Dick Armey, the House
   majority leader, stand with civil libertarians against the
   demands of the F.B.I. But the F.B.I. is not without
   influence. House Speaker Newt Gingrich, more friendly to
   the agency, has prevented a bill encouraging greater use of
   encryption from coming to a vote in the House.

   The concerns of law enforcement agencies are legitimate.
   But smart criminals are already using encryption, some of
   which is readily available on the Internet. That was the
   message conveyed only a few weeks ago by such unlikely
   allies as Bill Gates of Microsoft and Jim Barksdale of
   Netscape, who are on opposite sides in the Justice
   Department's antitrust lawsuit against Microsoft but agree
   on this issue.

   The F.B.I. should give up its losing fight against
   encryption and work with industry to develop new means to
   catch criminals who use it. One approach under discussion

   would be to develop software technology that could be
   surreptitiously placed in a suspect's computer to capture
   keystrokes before they are encrypted. Any such operation
   would have to be carried out under strict court control as
   the electronic equivalent of a search warrant. But law
   enforcement agencies have to find a legal and ethical way
   to stay ahead of technology, rather than stand in the way
   of it. Trying to block advances in the digital age is
   futile.

   [End]