The Technology Industry and Encryption Policies
Home | About the Author | Contact 
 
 
Home
Documents
Thesis
Bibliography
Links
 
 
Cypher Wars : Pretty Good Privacy Gets Pretty Legal
by Steven Levy, Wired (02/11/1994)
 
This article presents the early history of PGP, a personal computer-based program that encrypts files and electronic mail and was at first given away free over the internet, while this apparently violated both intellectual property laws (RSA Data Security Inc. had the sole property of the algorithm the software was based on) and law enforcement regulations. Since then, PGP has evolved to use an encryption engine from RSAREF, a cryptography toolkit developed by RSA Data Security and released to the public as a freeware, and is compliant with intellectual property laws.
 
BSA Letter to Interagency Working Group on Encryption
by Becca Gould, Business Software Alliance (08/11/96)
 
Reaction of the Business Software Alliance after the Administration's recent decision to liberalize export controls for commercial encryption products. According to this association, there are four major problems that still need to be solved. First, in the domain of interim export control relief, the government should not only draft and approve the new regulations quickly, but also further the proposed policy by defining periodic upward adjustments in key length and explicitly allowing the use of 128-bit encryption in financial applications. Second, the government should make sure that any key recovery initiative is voluntary and market-driven. Third, the government should adopt a more efficient approach to obtain industry commitment to develop key recovery capacities in the products, by allowing them to immediately begin exporting 56-bit products, and by focusing only on a medium-term incentive that is the possibility to export encryption programs with long key lengths if the company's products satisfy the key recovery conditions in 2 years. Finally, the BSA urges the governement to allow companies to export 56-bit products without key recovery even after 2 years, in order to allow the functioning and further development of the installed base in the future.
 
BSA Letter to Vice President Gore
by Robert W. Holleyman, Business Software Alliance (02/12/1996)
 
Letter of the BSA expressing the discontent of the association because of the way the Administration has seemingly backtracked since the October 1 encryption policy announcement. The letter reiterates the position of the BSA, and ask for the necessary government support in order to safeguard the international competitiveness of the software industry.
 
New Encryption Technology on the Horizon : Companies scamper towards key recovery schemes
by Neil Munro, INFOSec.com (1997)
 
This article looks at the attitude of numerous IT giants and small, specialized security companies trying to jump-start the market for key-recovery technology, which is designed to provide executives with spare keys to their company's data assets, but would also allow the US government to seize those spare keys and have an easy access to encrypted communications in the event of criminal investigation. Due to the fact that the government has pressured companies to split copies of their spare keys and leave them in storage with two federal agencies for this purpose, the development of the technology has been slowed down, although most potential corporate clients would welcome the key-recovery technology. More recently though, the government has tried to promote its development by allowing companies to export products with electronic keys of more than 56 bits, against the promise to have key-recovery products available by the end of 1998. However, .he technology is still criticized by civil libertarians, encryption proponents and by many industry executives concerned that the government's encryption plans may hinder their international sales
 
Sun Dodges Crypto Export Limits
by Tim Clarke and Alex Lash, CNET News.com (19/05/1997)
 
This article announces the future availability of advanced security software based on Sun's SKIP (Simple Key Management for the Internet Protocol) encryption and key management protocol through a third party, a subsidiary of Sun based in Russia. By doing so, Sun is pulling an end-run around U.S. limits on exporting strong encryption.
 
TIS CEO Stephen Walker explains the critical issues of security and encryption
by Linda Radosevich, Info World Electric (01/09/1997)
 
Interview of Stephen Walker who is president, CEO, and founder of Trusted Information Systems (TIS), and testified before Congress in July 1997 on the controversial key escrow debate. His stance on government control over encryption technology export is somewhat unique in the software industry: to let companies develop their own key-recovery systems, then to integrate the different systems and build a government-approved public key infrastructure.
 
Letter of Californian Companies CEOs to Senator Dianne Feinstein
Written on January 15, 1998
 
This letter presents the position on encryption policy of 26 CEOs of Californian companies, who argue that mandatory key recovery policies, domestically and for export, will make the United States a second class nation in the Information Age. It is maintaining United States leadership in the development of state-of-the-art cryptography that is, according to them, in the best interests of U.S. national security and law enforcement.
 
RSA Data Security blasts government encryption policy
by Ellen Messmer, Network World Fusion (16/01/1998)
 
This article describes the attitude of the Security industry as well as some global corporations in front of the law enforcement requirements required by the government. Whereas it seems that most security professionals are against government-approved key-recovery schemes, and are often involved in lobbying efforts against them, it is also true that most of the big corporations which are involved in the development of encryption products are developing products compliant with key-management infrastructures. Among them, the case of RSA perfectly illustrates what has become a business necessity.
 
U.S. encryption policy costing billions of dollars in lost sales, report claims
by Elinor Mills, IDG News Service (06/04/1998)
 
Summary of a report written by an independent think-tank, the Economic Strategy Institute (ESI) of Washington, D.C., which estimates that the U.S. government's encryption export policy is detrimental not only to the domestic applications software business but also other IT sectors and could result in a loss of between $35 billion and $95.9 billion over five years. The loss would be due to lost encryption sales that are picked up by non-U.S. vendors, slower growth in encryption-dependent industries like banking, forgone cost savings and efficiency gains that could be earned from greater Internet, extranet and intranet usage and finally, indirect costs.
 
Thirteen Companies Support 'Private Doorbell' Encryption Alternative
by Nancy Weil, IDG News Service (13/07/1998)
 
Position of thirteen leading IT companies which are backing an alternative to the controversial key recovery method, an encryption technology allowing a network operator to access private information at the behest of law enforcement agencies. "House key" encryption uses what is called a "private doorbell" to enable law enforcement agencies to gain access to encrypted information, only when law enforcement agencies serve the network operator with a warrant or court order to unlock the information. Technically speaking, the technology would allow network administrators to encrypt documents when they are dispatched by a router, and then unencrypt them when they reach a destination router, which makes the solution viable only for corporate users on a network, not individual users using routers of an outside ISP.
 
Encryption Wars
by Gode Davis, Web Server Online Magazine (09/1998)
 
This article describes the two distinctly different encryption wars which are being fought. The first one, illustrated here with the exemple of the Junger's case, is about the rights of individuals to post encryption algorithms on the Internet or to more readily access software capable of generating strong encryption for their personal needs. The other is a fundamental conflict between business and government over just how "encrypted" the Internet should be. Such business associations as the Software Publishers Association (SPA) and the Computer Systems Policy Project (CSPP) argue that strong encryption technology is already widely available in other countries and that the limits imposed by encryption export controls are crippling security software development in the United States. They also underlines the risks of the key-escrow system which has been part of the Clinton Administration's encryption policy mix since January 1997.
 
U.S. Encryption Policy far from 'Home Run', Alliance Says
by Franck Wolfe, Philips Publishing International (28/10/1998)
 
Action of leading software developers in favour of further loosening of export restrictions on encryption products, after the announcement of a new encryption policy by the Clinton Administration. Indeed, globalization of the encryption trade makes it more and more difficult for these companies to compete efficiently, yet the new policy does not completely lift the limits on mass-market encryption technologies.
 
Why U.S. Encryption Policy Harms Businesses and the Economy
by Justin Matlick, in Action Alert No. 15, Center for Freedom and Technology (01/03/1999)
 
This article shows why the White House insistance on regulating encryption technology is an ineffective policy and harms the Internet, U.S. encryption makers, and the domestic economy. According to the author, who is the director of the Center for Freedom and Technology at the Pacific Research Institute in San Francisco, legislators must consider a better and proven approach as they debate reforms in the area of encryption. The ideal policy would eliminate encryption controls and embrace the free market.
 
Microsoft Stonewalls NSA_Key Questions
by Duncan Campbell, Senior Research Fellow, Electronic Privacy Information Center(27/04/2000)
 
This document is a correspondence between Duncan Campbell, Richard Purcell (Microsoft’s Director of Corporate Privacy) and Scott Culp (Microsoft Security Response Centre) about the controversy of the "NSA_key" in Windows Operating System. Additionnally, Andrew D. Fernandes of Cryptonym Corporation (who discovered the NSA_KEY) explains why the explanation given by Microsoft (the NSA_KEY would in fact be there for backup purposes) is not satisfying.
 
Crypto Headache
by Will Rodger, Interactive Week (12/02/2001)
 
Description of the problems faced by companies in the approval process of data-scrambling hardware and software. Although Clinton Adminstration has relaxed the export rules, commercial software is still subject to close scrutiny, and companies often have to go through a costly, burdensome process in order to clear the regulatory burden.
 
Keeping Secrets
by Fred Hapgood, CIO Magazine (15/07/2001)
 
This article explains the lack of enthusiasm of the industry regarding the development of encryption products in the early 90s, while a popular technical culture, based in campuses and the online hacker communities, developed itself and initiated the development of open standards. But starting from the mid-90s, encryption started to focus the attention of the corporate side as well, with products that allow encryption to be delivered by the network instead of the user, that secure Virtual Private Networks used by companies to aloow secure data exchange, and ease centralized data management processes.
 
Elusive Security
by Paul Coe Clark III, The Net Economy (20/09/2001)
 
This document is an interview with Christopher King, the security-practice director for Greenwich Technology Partners. Asked whether companies will change the way they implement security, and about proposed bills to strengthen federal wiretap laws and encryption controls after the Sept. 11 attacks on the World Trade Center, King explains why government backdoors in all encryption products is not something that is going to happen, in spite of the public climate to pass the law.
 
Techies Urge Senator To Drop Encryption Key Plan
by Brian Krebs, Newsbytes (27/09/2001)
 
Article describing the protest of eight executives affiliated with the Association for Competitive Technology (ACT), a group heavily funded by Microsoft, against a proposal by US Senators to that would require encryption makers to register backdoor keys with the government. The proposal, which came out as part of the discussion about anti-terrorism legislation, would be to create a "quasi-judicial entity" appointed by the Supreme Court that would control access to the key repository.
 
Copyright © 2001-2002 Vincent Caldeira