SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : CustomTracks Corporation (CUST)

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: jjs_ynot who wrote (2368)9/18/1999 8:08:00 AM
From: Tom Hua   of 2514
 
September 17, 1999

Just Like That, the War's Over
On the Encryption Battlefield

By JASON FRY and MEGAN DOSCHER
THE WALL STREET JOURNAL INTERACTIVE EDITION

For years, export controls on encryption software has been the issue that
the libertarians of Silicon Valley point to in painting the government as a
dinosaur that's out of touch with reality.

For years, the government placed restrictions on exports of encryption
technology, branding such software as munitions, allowing companies to
send them overseas only after lengthy reviews and only allowing them to
export lower-strength software with shorter "key lengths." All this while
foreign competitors gleefully hawked software with longer key lengths to
companies and while high-powered encryption software could be
downloaded by anyone with a phone line to the Internet. Meanwhile, the
government played a cynical shell game in the courts, moving responsibility
for encryption from agency to agency in an effort to head off legal
challenges to its policies.

Even when the government did yield, things weren't much better. In early
1997, the White House began allowing the export of 56-bit encryption
software, but added a controversial provision: Software makers had to
agree to develop a "key-recovery" system that would allow
law-enforcement officials with court permission to use a "back door" to
decrypt information encrypted by that software. Key-recovery demands
were eventually dropped for firms in certain industries. But by then, 56-bit
encryption schemes had already been cracked by researchers, and
encryption experts generally agreed that 128-bit key lengths were the
minimum level needed to ensure safety.

The government's position, through all this,
was that national-security and
law-enforcement efforts would be devastated
by the widespread adoption of encryption,
leaving terrorists, spies, child pornographers
and a host of other villains free to perform
their evil without any chance of being caught.
Whenever congressional efforts to liberalize
encryption policy gained ground,
law-enforcement officials would herd member
of Congress into closed-door briefings in
which dire secrets were shared. The
half-joking line on Capitol Hill, after such
briefings, was "I'd tell you why I can't vote for
your bill, but I'd have to kill you."

Then, on Sept. 16, everything changed.

The new policy adopted by the Clinton administration permits the export,
without a license, of any encryption commodity or software following a
"technical review," with the only recipients specifically prohibited are
countries accused by the State Department of sponsoring terrorism. Sales
to foreign governments are permitted but must still be licensed. But that
was about it -- those parameters aside, there are no limit on key lengths,
no key-recovery schemes, no nothing.

Attorney General Janet Reno and others refused to admit that encryption
restriction were being relaxed, but they clearly were. What
national-security and law-enforcement officials did was make sure that they
can monitor the sale and spread of encryption commodities overseas. In
press briefings, that was portrayed as a compromise, but full-scale retreat
would be a better description. Ms. Reno let some of the old mindset show
through when she groused that "we must recognize that the policy the
administration is announcing today will result in greater availability of
encryption, which will mean that more terrorists and criminals will use
encryption."

Meanwhile, one questioner noted that in appearances before Congress,
Deputy Defense Secretary John Hamre had frequently outlined "the exact
scenarios that the Attorney General says will now come to pass, and said
they were unspeakable dangers that should be avoided."

"Now," the questioner continued, "this policy is called a 'balanced' policy.
What's shifted in the last few months?"

What shifted -- dramatically -- was the political calculus, which finally
forced the administration to face reality.

Jim Bidzos, vice chairman of RSA Security Inc. and a 15-year veteran of
the encryption wars, sees a number of factors that gradually came to exert
more and more pressure. The first came to the fore about five years ago,
as foreign firms started waking up to the opportunity that U.S. export
controls posed for their sales teams. The second factor, in his thinking, was
the tremendous contribution technology has made to the economy. A third
came about 18 months ago, when the administration tried -- and failed --
to get other nations to take a hard line on encryption policy. Then this year,
a bill to liberalize export policy attracted more than half of the House's
members as co-sponsors -- and survived the usual national-security
machinations aimed at derailing it.

Then, of course, there's the fact that there's an election coming up.

"The cynic in me wants to say there's politics at work here, too -- the
Democrats don't want to hand this issue to the Republicans," says Mr.
Bidzos.

One stop that no candidate can overlook on the campaign fund-raising
trail, he notes, is Silicon Valley -- and that's one well-moneyed area where
Vice President Gore has been granted a chilly reception compared with
those given to George W. Bush and former senator Bill Bradley. Now,
Mr. Gore has done a tremendous amount to revive his standing in techie
circles and taken an issue away from his rivals.

After a battle so lengthy and hard-fought, some in the high-tech world have
to be wondering if what was announced Thursday could really be true.
And there are some loopholes that the administration's doubters will be
watching: The government still gets a one-time review of products, and
must approve the licensing of products to foreign governments. Details
about how long those processes will take -- a key point -- have yet to
emerge. (A Defense Department official said this week that "we're not
interested in a lengthy process," but added that "companies have to come
in with more than just a brochure.")

"There are substantially attractive features of this new policy, but as usual,
the devil is in the details," Mr. Bidzos said. "A one-time review that takes
18 months isn't very helpful."

But it doesn't seem likely that those loopholes will be exploited, given the
new rules and the stated support of law-enforcement and national-security
officials for the new policy. It seems safe to say -- albeit with considerable
surprise -- that the encryption wars are history.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext