EFFector       Vol. 11, No. 11       July 23, 1998
                              [email protected]
  A Publication of the Electronic Frontier Foundation     ISSN 1062-9424

 IN THE 139th ISSUE OF EFFECTOR

    * SENATE PASSES 3 INTERNET CENSORSHIP BILLS
    * EFF DES CRACKER MACHINE BRINGS HONESTY TO CRYPTO-POLICY DEBATE
    * EFF & OTHER GROUPS WARN CONGRESS OF DANGERS IN NEW FBI WIRETAP
      WISHLIST
    * ADMINISTRIVIA

  See http://www.eff.org for more information on EFF activities &
  alerts!
    _________________________________________________________________



 FOR IMMEDIATE RELEASE

   July 21, 1998

   CONTACT:

  Electronic Frontier Foundation, +1 415 436 9333, [email protected]

  Laste minute update: In addition to the McCain & Coats Internet
  censorship bills, a piece of legislation to ban most forms of online
  gambling Web sites also passed as an amendment to the appropriations
  bill below (which was passed in full by the Senate, July 22, 1998).
  There is presently no action alert issued regarding these bills, but
  one will be forthcoming shortly, when action on the House side is
  clear and we know where to direct our activism. Check
  http://www.eff.org/blueribbon.html periodically for updates.

                 ELECTRONIC FRONTIER FOUNDATION REACTS TO
             SENATE PASSAGE OF TWO INTERNET CENSORSHIP BILLS

                      Statement of Barry Steinhardt
             President of the Electronic Frontier Foundation

  This afternoon the Senate passed two draconian bills that would
  ultimately prevent access to a wide array of content on the Internet.
  The two bills were passed as amendments to an appropriations bill for
  the Commerce, Justice and State Department. They were brought up
  without any notice to those members of the Senate who opposed them and
  without any opportunity for meaningful debate. In effect, free speech
  on the Internet was the victim of an ambush.

  The initial amendment offered by Senators John McCain (R-AZ) and Patty
  Murray (D-WA) would require schools and libraries that receive federal
  funds for Internet connections to install filtering software to block
  "inappropriate" material. The second, "the CDA II" bill sponsored by
  Senator Dan Coats (R-IN) would enact a wide ranging ban on Web posting
  of material deemed "harmful to minors."

  The two bills represent a real and present danger to free speech on
  the Internet. The McCain/Murray amendment will force libraries and
  schools to use all-too-frequently crude and overbroad filters that
  block out a wide array of non-"harmful" speech -- everything from the
  Quaker home page to the American Association of University Women has
  been blocked by these programs.

  Indeed, you can no more create a computer program to block out one
  community's view of "indecency" or "obscenity" than you can devise a
  filtering program to block out misguided proposals by members of
  Congress. Both may be desirable, but neither are possible.

  At first glance, the Coats' CDA II bill appears to be a relatively
  benign provision that purportedly applies only to commercial
  pornographers who market to minors. But it is a Trojan horse. Beneath
  the veneer, it covers any Web site that has a commercial component and
  which has material that some community will consider "harmful to
  minors", even if that is not the material for sale. This ranges from
  the electronic bookseller Amazon.com to EFF's site, which sells books
  and T-Shirts.
                   ___________________________________

  The Electronic Frontier Foundation is one of the leading civil
  liberties organizations devoted to ensuring that the Internet remains
  the world's first truly global vehicle for free speech, and that the
  privacy and security of all on-line communication is preserved.
  Founded in 1990 as a nonprofit, public interest organization, EFF is
  based in San Francisco, California. EFF maintains an extensive archive
  of information on encryption policy, privacy, and free speech at
  http://www.eff.org.


      EFF DES CRACKER MACHINE BRINGS HONESTY TO CRYPTO-POLICY DEBATE

       ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE

   CONTACT:

  Electronic Frontier Foundation, +1 415 436 9333, [email protected]

  SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today
  raised the level of honesty in crypto politics by revealing that the
  Data Encryption Standard (DES) is insecure. The U.S. government has
  long pressed industry to limit encryption to DES (and even weaker
  forms), without revealing how easy it is to crack. Continued adherence
  to this policy would put critical infrastructures at risk; society
  should choose a different course.

  To prove the insecurity of DES, EFF built the first unclassified
  hardware for cracking messages encoded with it. On Wednesday of this
  week the EFF DES Cracker, which was built for less than $250,000,
  easily won RSA Laboratory's "DES Challenge II" contest and a $10,000
  cash prize. It took the machine less than 3 days to complete the
  challenge, shattering the previous record of 39 days set by a massive
  network of tens of thousands of computers. The research results are
  fully documented in a book published this week by EFF and O'Reilly and
  Associates, entitled "Cracking DES: Secrets of Encryption Research,
  Wiretap Politics, and Chip Design."

  "Producing a workable policy for encryption has proven a very hard
  political challenge. We believe that it will only be possible to craft
  good policies if all the players are honest with one another and the
  public," said John Gilmore, EFF co-founder and project leader. "When
  the government won't reveal relevant facts, the private sector must
  independently conduct the research and publish the results so that we
  can all see the social trade-offs involved in policy choices."

  The nonprofit foundation designed and built the EFF DES Cracker to
  counter the claim made by U.S. government officials that governments
  cannot decrypt information when protected by DES, or that it would
  take multimillion-dollar networks of computers months to decrypt one
  message. "The government has used that claim to justify policies of
  weak encryption and 'key recovery,' which erode privacy and security
  in the digital age," said EFF Executive Director Barry Steinhardt. It
  is now time for an honest and fully informed debate, which we believe
  will lead to a reversal of these policies."

  "EFF has proved what has been argued by scientists for twenty years,
  that DES can be cracked quickly and inexpensively," said Gilmore. "Now
  that the public knows, it will not be fooled into buying products that
  promise real privacy but only deliver DES. This will prevent
  manufacturers from buckling under government pressure to 'dumb down'
  their products, since such products will no longer sell." Steinhardt
  added, "If a small nonprofit can crack DES, your competitors can too.
  Five years from now some teenager may well build a DES Cracker as her
  high school science fair project."

  The Data Encryption Standard, adopted as a federal standard in 1977 to
  protect unclassified communications and data, was designed by IBM and
  modified by the National Security Agency. It uses 56-bit keys, meaning
  a user must employ precisely the right combination of 56 1s and 0s to
  decode information correctly. DES accounted for more than $125 million
  annually in software and hardware sales, according to a 1993 article
  in "Federal Computer Week." Trusted Information Systems reported last
  December that DES can be found in 281 foreign and 466 domestic
  encryption products, which accounts for between a third and half of
  the market.

  A DES cracker is a machine that can read information encrypted with
  DES by finding the key that was used to encrypt that data. DES
  crackers have been researched by scientists and speculated about in
  the popular literature on cryptography since the 1970s. The design of
  the EFF DES Cracker consists of an ordinary personal computer
  connected to a large array of custom chips. It took EFF less than one
  year to build and cost less than $250,000.

  This week marks the first public test of the EFF DES Cracker, which
  won the latest DES-cracking speed competition sponsored by RSA
  Laboratories ( http://www.rsa.com/rsalabs/ ). Two previous RSA
  challenges proved that massive collections of computers coordinated
  over the Internet could successfully crack DES. Beginning Monday
  morning, the EFF DES Cracker began searching for the correct answer to
  this latest challenge, the RSA DES Challenge II-2. In less than 3 days
  of searching, the EFF DES Cracker found the correct key. "We searched
  more than 88 billion keys every second, for 56 hours, before we found
  the right 56-bit key to decrypt the answer to the RSA challenge, which
  was 'It's time for those 128-, 192-, and 256-bit keys,'" said Gilmore.

  Many of the world's top cryptographers agree that the EFF DES Cracker
  represents a fundamental breakthrough in how we evaluate computer
  security and the public policies that control its use. "With the
  advent of the EFF DES Cracker machine, the game changes forever," said
  Whitfield Diffie, Distinguished Engineer at Sun Microsystems and famed
  co-inventor of public key cryptography. "Vast Internet collaborations
  cannot be concealed and so they cannot be used to attack real, secret
  messages. The EFF DES Cracker shows that it is easy to build search
  engines that can."

  "The news is not that a DES cracker can be built; we've known that for
  years," said Bruce Schneier, the President of Counterpane Systems.
  "The news is that it can be built cheaply using off-the-shelf
  technology and minimal engineering, even though the department of
  Justice and the FBI have been denying that this was possible." Matt
  Blaze, a cryptographer at AT&T Labs, agreed: "Today's announcement is
  significant because it unambiguously demonstrates that DES is
  vulnerable, even to attackers with relatively modest resources. The
  existence of the EFF DES Cracker proves that the threat of "brute
  force" DES key search is a reality. Although the cryptographic
  community has understood for years that DES keys are much too small,
  DES-based systems are still being designed and used today. Today's
  announcement should dissuade anyone from using DES."

  EFF and O'Reilly and Associates have published a book about the EFF
  DES Cracker, "Cracking DES: Secrets of Encryption Research, Wiretap
  Politics, and Chip Design." The book contains the complete design
  details for the EFF DES Cracker chips, boards, and software. This
  provides other researchers with the necessary data to fully reproduce,
  validate, and/or improve on EFF's research, an important step in the
  scientific method. The book is only available on paper because U.S.
  export controls on encryption potentially make it a crime to publish
  such information on the Internet.

  EFF has prepared a background document on the EFF DES Cracker, which
  includes the foreword by Whitfield Diffie to "Cracking DES." (See
  http://www.eff.org/descracker/ ). The book can be ordered for
  worldwide delivery from O'Reilly & Associates via the Web
  ( http://www.ora.com/catalog/crackdes ), or phone (1 800 998 9938, or
  +1 707 829 0515.)
    _________________________________________________________________

  The Electronic Frontier Foundation is one of the leading civil
  liberties organizations devoted to ensuring that the Internet remains
  the world's first truly global vehicle for free speech, and that the
  privacy and security of all on-line communication is preserved.
  Founded in 1990 as a nonprofit, public interest organization, EFF is
  based in San Francisco, California. EFF maintains an extensive archive
  of information on encryption policy, privacy, and free speech at the
  EFF Web site ( http://www.eff.org ).

    _________________________________________________________________



   EFF & OTHER GROUPS WARN CONGRESS OF DANGERS IN NEW FBI WIRETAP WISHLIST

  July 17, 1998

  The Honorable Ted Stevens
  Chairman
  Committee on Appropriations
  United States Senate
  Washington, D.C. 20510

  Dear Mr. Chairman:

  We are writing to urge you to reject any efforts by the Federal Bureau
  of Investigation to use the appropriations process to expand its
  electronic surveillance powers through amendments to the
  Communications Assistance for Law Enforcement Act (CALEA). Four years
  ago, FBI Director Freeh hailed CALEA as achieving "a delicate but
  critical balance between public safety and privacy and constitutional
  rights." Director Freeh praised CALEA:

    "I think we have reached a remarkable compromise and achievement in
    preserving that tool [wiretapping] as it has existed since 1968 and
    yet balancing all the technology and privacy concerns which are so
    precious to all of us."

  - FBI Director Louis Freeh, Congressional testimony, August 1994.

  But ever since the law was enacted, the FBI has tried to use it not
  merely to preserve its surveillance capabilities as Congress intended,
  but to expand them, demanding that companies build expensive new
  surveillance features. Using the checks and balances in the law, the
  undersigned privacy groups have asked the FCC to reject the FBI's
  demands.

  We understand that the FBI is now asking Congress for major revisions
  of the 1994 law, to mandate the FBI's requests for expanded
  surveillance capabilities and strike from the Act key provisions
  intended to ensure a balance between privacy and law enforcement. We
  understand that the FBI has asked that there be attached to the CJS
  appropriations bill an amendment that would:
    * Codify the FBI's entire list of enhanced surveillance capabilities
      -- For over a year, industry and privacy groups have opposed the
      FBI's efforts to use CALEA to expand government surveillance
      capabilities. The FBI's proposed expansions are now being
      challenged before the FCC. The FBI amendment would terminate the
      FCC proceeding by ordering the Commission to adopt without
      revision the entire FBI wish list, including the capabilities to
      track wireless phone users without meeting constitutional
      standards and to continue monitoring all parties to a conference
      call after the suspect has dropped off the call.
    * Eliminate public accountability - The proposed amendment states
      that the FCC shall enact the FBI wish list immediately and
      "without notice and comment." This means that privacy groups would
      have no right to have their concerns heard. When Congress set up
      the CALEA process, it required the FCC to protect privacy and
      minimize cost. The FBI amendment would render those considerations
      irrelevant.
    * Require carriers to disclose "the exact physical location" of
      wireless phone users without any court approval - In 1994, FBI
      Director Freeh testified that CALEA "does not include any
      information which might disclose the general location of a mobile
      [phone]... There is no intent whatsoever...tto acquire anything
      that could properly be called 'tracking' information." Now the FBI
      is seeking "exact" physical location, going beyond even the cell
      site information industry has offered to provide law enforcement
      in its CALEA plan now under challenge on privacy grounds at the
      FCC.
      Furthermore, the FBI amendment, in a provision that purports to
      address privacy concerns, requires carriers to provide tracking
      information on any wireless phone user for up to two days without
      a court order, upon the mere request of any police officer. This
      is less protection than current law.
    * Establish a bogus standard for access to location information - In
      what the FBI will undoubtedly characterize as a concession to
      privacy, the amendment would require wireless carriers to provide
      location information whenever presented with a court order "based
      upon a finding that there is probable cause to believe that the
      location information is relevant to a legitimate law enforcement
      objective." This is actually weaker than current law, which
      requires at least that the information be relevant and material to
      an ongoing investigation. "Legitimate law enforcement objective"
      doesn't even require that police have an ongoing case. The use of
      the words "probable cause" do not make this provision acceptable.
      The issue is "probable cause" to believe what?
    * Write "reasonableness" out of the statute - In 1994, Director
      Freeh testified that CALEA "reflects reasonableness in every
      provision." The statute specifically said that carriers could be
      required to modify their systems for law enforcement purposes only
      if the changes were "reasonably achievable." Now the FBI amendment
      would amend the Act to state that compliance with the FBI's wish
      list is "deemed reasonably achievable." To "deem" something means
      that we pretend it is so even when it isn't. This amendment
      deprives the FCC of jurisdiction to assess the feasibility and
      cost of CALEA compliance.
    * Packet networks - In another provision that will be characterized
      as a concession to privacy, the amendment states that carriers "to
      the extent possible" shall separate call-identifying information
      from content when transmitted as packet-mode data. Privacy groups
      have asked the FCC to determine how and when this can be done. By
      depriving the Commission of authority over implementation of
      CALEA, the FBI amendment may be precluding privacy groups and
      others from having any input in deciding how surveillance is to be
      conducted in the packet networks that represent the future of
      telephony.

  In short, the FBI is trying to rewrite CALEA to get what it failed to
  get from Congress four years ago, and what it has failed to get since
  from industry and through the FCC. The FBI's efforts are under
  challenge at the FCC and in the courts. The FBI's proposed amendment
  is an effort to cut off those challenges.

  It is appropriate for Congress at this time to extend the CALEA
  compliance and "grandfather" dates, in order to allow resolution of
  the substantive issues pending before the FCC. It would be
  inappropriate for Congress to grant FBI the authority that it was
  denied four years ago after a lengthy hearing and negotiation process.

  The FBI may try to characterize its proposal as a compromise. It is
  not. The granting of a one-time extension to industry and the
  purported concessions to privacy do not come close to justifying a
  fundamental rewriting of CALEA, which is what the FBI amendment would
  do.

  We would be happy to meet with you or your staff to discuss our
  concerns more fully.

  Sincerely,

  Laura W. Murphy
  American Civil Liberties Union

  James P. Lucier, Jr.
  Americans for Tax Reform

  Jerry Berman
  Center for Democracy and Technology

  Barry Steinhardt
  Electronic Frontier Foundation

  Marc Rotenberg
  Electronic Privacy Information Center

  Lisa S. Dean
  Free Congress Foundation

  Cc: The Honorable Robert C. Byrd
      The Honorable Judd Gregg
      The Honorable Ernest F. Hollings
      The Honorable Patrick J. Leahy


    _________________________________________________________________

ADMINISTRIVIA

  EFFector is published by:

  The Electronic Frontier Foundation
  1550 Bryant St., Suite 725
  San Francisco CA 94103 USA
  +1 415 436 9333 (voice)
  +1 415 436 9993 (fax)

  Editor: Stanton McCandlish, Program Director/Webmaster ([email protected])

  Membership & donations: [email protected]
  Legal services: [email protected]
  General EFF, legal, policy or online resources queries: [email protected]

  Reproduction of this publication in electronic media is encouraged.
  Signed articles do not necessarily represent the views of EFF. To
  reproduce signed articles individually, please contact the authors for
  their express permission. Press releases and EFF announcements may be
  reproduced individually at will.

  To subscribe to EFFector via email, send message body of:
  subscribe effector-online
  to [email protected], which will add you to a subscription list for
  EFFector. To unsubscribe, send a similar message body, like so:
  unsubscribe effector-online

  Please tell [email protected] to manually remove you from the list if this
  does not work for some reason.

  Back issues are available at:
  http://www.eff.org/pub/EFF/Newsletters/EFFector

  To get the latest issue, send any message to
  [email protected] (or [email protected]), and it will be mailed to
  you automagically. You can also get:
  http://www.eff.org/pub/EFF/Newsletters/EFFector/current.html