Copy Link
Add to Bookmark
Report

SURFPUNK Technical Journal 103

  

Date: Sat, 5 Feb 94 19:16:10 PST
Reply-To: <surfpunk@versant.com>
Return-Path: <cocot@versant.com>
Message-ID: <surfpunk-0103@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@versant.com (gur Obfavn bs Gryrpbzzhavpngvbaf)
To: surfpunk@versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0103] ESCROW: The Bosnia of Telecommunications

# [wrt Mitch Kabor and the Electronic Frontier Foundation]
#
# "The foundation promotes the hope of cheap, easy
# and equal access to a data highway constructed
# along the lines of the Internet, the impromptu net-
# work of 1.3 million computers in 40 countries that
# allows roughly 30 million people to talk to one
# another, read E-mail, post messages, download texts
# (from the Library of Congress as well as from most
# university libraries), play chess, conduct symposia,
# organize political rallies, tell jokes -- all with-
# out having to pay tolls, receive authorization, sub-
# mit a financial statement, or prove that they don't
# smoke."
#
# Lewis Latham writing in the January 1994
# issue of Harper's Magazine
#
######################################


We heard too little for too long. It seemed that Clipper was
losing steam. Industry has not been thrilled with the idea,
more and more major software companies are deploying non-Escrowed
RSA encryption in consumer products, comments received by NIST
ran like two-hundred-something to one against, Clipper was
widely criticized and parodied, people behind it were demoted, etc.

This batch of press releases makes it look to me like the Clinton
Administration is really determined to push it through. Bad News.

Some personal news: I've got my sun3 at home up and running live on
the Internet via The Little Garden (you remember the blurb we
surfpunked back in december) and I've almost got DNS working and its
domain name registered. I've been putting time into this and also into
writing cryptographic tools. I got my licensed copy of PGP from
ViaCrypt but still need a DOS box or emulator of my own to run it on.
(Call ViaCrypt in Phoenix AZ to order yours.) I'll continue
publishing Surfpunk as interesting material appears, but I'm not
scouring the net myself these days as much as I used to, and I just
haven't found that much I thought interesting enough to qualify for
Surfpunk. We'll probably continue to be low-volume for a while -- but
you probably get enough junk in the mail already, right? strick

________________________________________________________________________
________________________________________________________________________

From: Stanton McCandlish <mech>
Subject: Alert--Admin. names escrow agents, no compromise on Clipper - 7 files

EFF Press Release 04/04/94 * DISTRIBUTE WIDELY *

At two briefings, Feb. 4, 1994, the Clinton Administration and various
agencies gave statements before a Congressional committee, and later
representatives of civil liberties organizations, industry spokespersons
and privacy advocates. The Electronic Frontier Foundation's position,
based on what we have seen and heard from the Administration today, is
that the White House is set on a course that pursues Cold War national
security and law enforcement interests to the detriment of individual
privacy and civil liberties.

The news is grim. The Administration is:

* not backing down on Clipper
* not backing down on key escrow
* not backing down on selection of escrow agents
* already adamant on escrowed key access procedures
* not willing to elminate ITAR restrictions
* hiding behind exaggerated threats of "drug dealers" and "terrorists"

The material released to the industry and advocacy version of the briefing
have been placed online at ftp.eff.org (long before their online
availability from goverment access sites, one might add). See below for
specific details.

No information regarding the Congressional committee version of the briefing
has been announced. EFF Director Jerry Berman, who attended the private
sector meeting, reported the following:

"The White House and other officials briefed industry on its Clipper chip
and encryption review. While the review is not yet complete, they have
reached several policy conclusions. First, Clipper will be proposed as
a new Federal Information Processing Standard (FIPS) next Wednesday. [Feb.
9] It will be "vountary" for government agencies and the private sector
to use. They are actively asking other vendors to jump in to make the
market a Clipper market. Export licensing processes will be speeded up but
export restrictions will not be lifted in the interests of national
security. The reason was stated bluntly at the briefing : to frustrate
competition with clipper by other powerful encryption schemes by making
them difficult to market, and to "prevent" strong encryption from leaving
the country thus supposedly making the job of law enforcement and
intelligence more difficult. Again in the interest of national security. Of
course, Clipper will be exportable but they would not comment on how other
governments will view this. Treasury and NIST will be the escrow agents
and Justice asserted that there was no necessity for legislation to
implement the escrow procedures.

"I asked if there would be a report to explain the rationale for choosing
these results - we have no explanation of the Administration's thinking, or
any brief in support of the results. They replied that there would be no
report because they have been unable to write one, due to the complexity of
the issue.

"One Administation spokesperson said this was the Bosnia of
Telecommunications. I asked, if this was so, how, in the absense of some
policy explanation, could we know if our policy here will be as successful
as our policy in Bosnia?"

The announcements, authorization procedures for release of escrowed keys,
and q-and-a documents from the private sector briefing are online at EFF.

They are:

"Statement of the [White House] Press Secretary" [White House]
file://ftp.eff.org/pub/EFF/Policy/Crypto/wh_press_secy.statement

"Statement of the Vice President" [very short - WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/gore_crypto.statement

"Attorney General Makes Key Escrow Encryption Announcements" [Dept. of Just.]
file://ftp.eff.org/pub/EFF/Policy/Crypto/reno_key_escrow.statement

"Authorization Procedures for Release pf Emcryption Key Components in
Conjunction with Intercepts Pursuant to Title III/State Statutes/FISA"
[3 docs. in one file - DoJ]
file://ftp.eff.org/pub/EFF/Policy/Crypto/doj_escrow_intercept.rules

"Working Group on Data Security" [WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/interagency_workgroup.announce

"Statement of Dr. Martha Harris Dep. Asst. Secy. of State for Polit.-Mil.
Affairs: Encryption - Export Control Reform" [Dept. of State]
file://ftp.eff.org/pub/EFF/Policy/Crypto/harris_export.statement

"Questions and Answers about the Clinton Administration's Encryption
Policy" [WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/wh_crypto.q-a

These files are available via anonymous ftp, or via WWW at:
http://www.eff.org/ in the "EFF ftp site" menu off the front page.

Gopher access:
gopher://gopher.eff.org/
Look in "EFF Files"/"Papers and Testimony"/"Crypto"

All 7 of these documents will be posted widely on the net immediately
following this notice.

--
Stanton McCandlish * mech@eff.org * Electronic Frontier Found. OnlineActivist
F O R M O R E I N F O, E - M A I L T O: I N F O @ E F F . O R G
O P E N P L A T F O R M O N L I N E R I G H T S
V I R T U A L C U L T U R E C R Y P T O

________________________________________________________________________

THE WHITE HOUSE
OFFICE OF THE VICE PRESIDENT

EMBARGOED UNTIL, 3: 00 PM EST CONTACT: 202/456-7035
February 4, 1994

STATEMENT OF THE VICE PRESIDENT

Today's announcements on encryption represent important steps in
the implementation of the Administration's policy on this critical
issue. Our policy is designed to provide better encryption to
individuals and businesses while ensuring that the needs of law
enforcement and national security are met.

Encryption is a law and order issue since it can be used by criminals
to thwart wiretaps and avoid detection and prosecution. It also has
huge strategic value. Encryption technology and cryptoanalysis
turned the tide in the Pacific and elsewhere during World War II.

[end of statement]

________________________________________________________________________

Department of Justice

EMBARGOED FOR 3 P.M. RELEASE AG
FRIDAY, FEBRUARY 4, 1994 (202) 616-2771

ATTORNEY GENERAL MAKES KEY ESCROW ENCRYPTION ANNOUNCEMENTS

Attorney General Janet Reno today announced selection of the two
U.S. Government entities that will hold the escrowed key
components for encryption using the key escrow encryption method.
At the same time, the Attorney General made public procedures
under which encryption key components will be released to
government agencies for decrypting communications subject to
lawful wiretaps.

Key Escrow Encryption (formerly referred to as Clipper Chip )
strikes an excellent balance between protection of communications
privacy and protection of society. It permits the use in
commercial telecommunications products of chips that provide
extremely strong encryption, but can be decrypted, when necessary,
by government agencies conducting legally authorized wiretaps.
Decryption is accomplished by use of keys--80-bit binary numbers--
that are unique to each individual encryption chip. Each unique
key is in turn split into two components, which must be recombined
in order to decrypt communications. Knowing one component does not
make decryption any more feasible than not knowing either one.

The two escrow agents are the National Institute of Standards and
Technology (NIST), a part of the Department of Commerce, and the
Automated Systems Division of the Department of the Treasury. The
two escrow agents were chosen because of their abilities to
safeguard sensitive information, while at the same time being able
to respond in a timely fashion when wiretaps encounter encrypted
communications. In addition, NIST is responsible for establishing
standards for protection of sensitive, unclassified information in
Federal computer systems.

The escrow agents will act under strict procedures, which are
being made public today, that will ensure the security of the key
components and govern their release for use in conjunction with
lawful wiretaps. They will be responsible for holding the key
components: for each chip, one agent will hold one of the key
components, and the second agent will hold the other. Neither will
release a key component, except to a government agency with a
requirement to obtain it in connection with a lawfully authorized
wiretap. The system does not change the rules under which
government agencies are authorized to conduct wiretaps.

When an authorized government agency encounters suspected key-
escrow encryption, a written request will have to be submitted to
the two escrow agents. The request will, among other things, have
to identify the responsible agency and the individuals involved;
certify that the agency is involved in a lawfully authorized
wiretap; specify the wiretap's source of authorization and its
duration; and specify the serial number of the key-escrow
encryption chip being used. In every case, an attorney involved in
the investigation will have to provide the escrow agents assurance
that a validly authorized wiretap is being conducted.

Upon receipt of a proper request, the escrow agents will transmit
their respective key components to the appropriate agency. The
components will be combined within a decrypt device, which only
then will be able to decrypt communications protected by key-
escrow encryption. When the wiretap authorization ends, the device
s ability to decrypt communications using that particular chip
will also be ended.

The Department of Justice will, at the various stages of the
process, take steps to monitor compliance with the procedures.

________________________________________________________________________

>From the White House

Embargoed until 3:00 p.m. EST Feb. 4, 1994

QUESTIONS AND ANSWERS ABOUT THE
CLINTON ADMINISTRATION'S ENCRYPTION POLICY

Q. What were the findings of the encryption technology review?

A. The review confirmed that sound encryption technology is
needed to help ensure that digital information in both computer
and telecommunications systems is protected against unauthorized
disclosure or tampering. It also verified the importance of
preserving the ability of law enforcement to understand encrypted
communications when conducting authorized wiretaps. Key escrow
technology meets these objectives.

Specific decisions were made to enable federal agencies and the
private sector to use the key escrow technology on a voluntary
basis and to allow the export of key escrow encryption products.

In addition, the Department of State will streamline export
licensing procedures for products that can be exported under
current regulations in order to help U.S. companies to sell their
products abroad.

To meet the critical need for ways to verify the author and sender
of an electronic message -- something that is crucial to business
applications for the National Information Infrastructure -- the
federal government is committed to ensuring the availability of a
royalty-free, public-domain Digital Signature Standard.

Finally, an interagency working group has been established to
continue to address these issues and to maintain a dialogue with
industry and public interest groups.

Q. Who has been consulted during this review? The Congress?
Industry? What mechanism is there for continuing consultation?

A. Following the President's directive announced on April 16,
1993, extensive discussions have been held with Congress,
industry, and privacy rights groups on encryption issues. Formal
public comment was solicited on the Escrowed Encryption Standard
and on a wide variety of issues related to the review through the
Computer System Security and Privacy Advisory Board.

The White House Office of Science and Technology Policy and the
National Security Council will chair the interagency working
group. The group will seek input from the private sector both
informally and through several existing advisory committees. It
also will work closely with the Information Policy Committee of
the Information Infrastructure Task Force, which is responsible
for coordinating Administration telecommunications and information
policy.

Q. If national security and law enforcement interests require
continued export controls of encryption, what specific benefits
can U.S. encryption manufacturers expect?

A. The reforms will simplify encryption product export licensing
and speed the review of encryption product exports. Among other
benefits, manufacturers should see expedited delivery of products,
reduced shipping and reporting costs, and fewer individual license
requests -- especially for small businesses that cannot afford
international distributors. A personal exemption for business
travellers using encryption products will eliminate delays and
inconvenience when they want to take encryption products out of
the U.S. temporarily.

Q. Why is the key escrow standard being adopted?

A. The key escrow mechanism will provide Americans and
government agencies with encryption products that are more secure,
more convenient, and less expensive than others readily available
today -- while at the same time meeting the legitimate needs of
law enforcement.

Q. Will the standard be mandatory?

A. No. The Administration has repeatedly stressed that the key
escrow technology, and this standard, is for voluntary use by
federal and other government agencies and by the private sector.
The standard that is being issued only applies to federal agencies
-- and it is voluntary.

Does this approach expand the authority of government agencies to
listen in on phone conversations?

No Key escrow technology provides government agencies with no
[sic] new authorities to access the content of the private
conversations of Americans.

Q. Will the devices be exportable? Will other devices that use
the government hardware?

A. Yes. After an initial review of the product, the State
Department will permit the export of devices incorporating key
escrow technology to most end users. One of the attractions of
this technology is the protection it can give to U.S. companies
operating at home and abroad.

Q. Suppose a law enforcement agency is conducting a wiretap on a
drug smuggling ring and intercepts a conversation encrypted using
the device. What would they have to do to decipher the message?

A. They would have to obtain legal authorization, normally a
court order, to do the wiretap in the first place. They would then
present documentation, including a certification of this
authorization, to the two entities responsible for safeguarding
the keys. (The key is split into component parts, which are stored
separately in order to ensure the security of the key escrow
system.) They then obtain the components for the keys for the
device being used by the drug smugglers. The components are then
combined and the message can be read.

Q. Who will hold the escrowed keys?

A. The Attorney General has selected two U.S. agencies to hold
the escrowed key components: the Treasury Department's Automated
Systems Division and the Commerce Department's National Institute
of Standards and Technology.

Q. How strong is the security in the device? How can I be sure
how strong the security is?

A. This system is more secure than many other voice encryption
system readily available today. While the algorithm upon which the
Escrowed Encryption Standard is based will remain classified to
protect the security of the system, an independent panel of
cryptography experts found that the algorithm provides significant
protection. In fact, the panel concluded that it will be 36 years
until the cost of breaking the algorithm will be equal to the cost
of breaking the current Data Encryption Standard now being used.

Q. Is there a "trap door" that would allow unauthorized access
to the keys?

A. No. There is no trapdoor.

Q. Whose decision was it to propose this product?

A. The National Security Council, the Justice Department, the
Commerce Department, and other key agencies were involved in this
decision. The approach has been endorsed by the President, the
Vice President, and appropriate Cabinet officials.


________________________________________________________________________


U.S. Department of Justice
Washington, D.C. 20530

February 4, 1994

AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY COMPONENTS
IN CONJUNCTION WITH INTERCEPTS PURSUANT TO TITLE III

The following are the procedures for the release of escrowed key
components in conjunction with lawfully authorized interception of
communications encrypted with a key-escrow encryption method.
These procedures cover all electronic surveillance conducted
pursuant to Title III of the Omnibus crime Control and Safe
Streets Act of 1968, as amended (Title III), Title 18, United
States Code, Section 2510 et seq.

1) In each case there shall be a legal authorization for the
interception of wire and/or electronic communications.

2) All electronic surveillance court orders under Title III
shall contain provisions authorizing after-the-fact minimization,
pursuant to 18 U.S.C. 2518(5), permitting the interception and
retention of coded communications, including encrypted
communications.

3) In the event that federal law enforcement agents discover
during the course of any lawfully authorized interception that
communications encrypted with a key escrow encryption method are
being utilized, they may obtain a certification from the
investigative agency conducting the investigation, or the Attorney
General of the United States or designee thereof. Such
certification shall

(a) identify the law enforcement agency or other
authority conducting the interception and the person providing the
certification;

(b) certify that necessary legal authorization has been
obtained to conduct electronic surveillance regarding these
communications;

(c) specify the termination date of the period for which
interception has been authorized;

(d) identify by docket number or other suitable method
of specification the source of the authorization;

(e) certify that communications covered by that
authorization are being encrypted with a key-escrow encryption
method;

(f) specify the identifier (ID) number of the key escrow
encryption chip providing such encryption; and

(g) specify the serial (ID) number of the key-escrow
decryption device that will be used by the law enforcement agency
or other authority for decryption of the intercepted
communications.

4) The agency conducting the interception shall submit this
certification to each of the designated key component escrow
agents. If the certification has been provided by an investigative
agency, as soon thereafter as practicable, an attorney associated
with the United States Attorney's Office supervising the
investigation shall provide each of the key component escrow
agents with written confirmation of the certification.

5) Upon receiving the certification from the requesting
investigative agency, each key component escrow agent shall
release the necessary key component to the requesting agency. The
key components shall be provided in a manner that assures they
cannot be used other than in conjunction with the lawfully
authorized electronic surveillance for which they were requested.

6) Each of the key component escrow agents shall retain a
copy of the certification of the requesting agency, as well as the
subsequent confirmation of the United States Attorney's Office. In
addition, the requesting agency shall retain a copy of the
certification and provide copies to the following for retention in
accordance with normal record keeping requirements:

(a) the United States Attorney's Office supervising the
investigation, and

(b) the Department of Justice, Office of Enforcement
Operations.

7) Upon, or prior to, completion of the electronic
surveillance phase of the investigation, the ability of the
requesting agency to decrypt intercepted communications shall
terminate, and the requesting agency may not retain the key
components.

8) The Department of Justice shall, in each such case,

(a) ascertain the existence of authorizations for
electronic surveillance in cases for which escrowed key components
have been released;

(b) ascertain that key components for a particular key
escrow encryption chip are being used only by an investigative
agency authorized to conduct electronic surveillance of
communications encrypted with that chip; and

(c) ascertain that, no later than the completion of the
electronic surveillance phase of the investigation, the ability of
the requesting agency to decrypt intercepted communications is
terminated.

9) In reporting to the Administrative Office of the United
States Courts pursuant to 18 U.S.C. Section 2519(2), the Assistant
Attorney General for the Criminal Division shall, with respect to
any order for authorized electronic surveillance for which
escrowed encryption components were released and used for
decryption, specifically note that fact.

These procedures do not create, and are not intended to create,
any substantive rights for individuals intercepted through
electronic surveillance, and noncompliance with these procedures
shall not provide the basis for any motion to suppress or other
objection to the introduction of electronic surveillance evidence
lawfully acquired.

*************************************************************


U.S. Department of Justice
Washington, D.C. 20530

February 4, 1994

AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY COMPONENTS
IN CONJUNCTION WITH INTERCEPTS PURSUANT TO STATE STATUTES

Key component escrow agents may only release escrowed key
components to law enforcement or prosecutorial authorities for use
in conjunction with lawfully authorized interception of
communications encrypted with a key-escrow encryption method.
These procedures apply to the release of key components to State
and local law enforcement or prosecutorial authorities for use in
conjunction with interceptions conducted pursuant to relevant
State statutes authorizing electronic surveillance, and Title III
of the Omnibus crime Control and Safe Streets Act of 1968, as
amended, Title 18, United States Code, Section 2510 et seq.

1) The state or local law enforcement or prosecutorial
authority must be conducting an interception of wire and/or
electronic communications pursuant to lawful authorization.

2) Requests for release of escrowed key components must be
submitted to the key component escrow agents by the principal
prosecuting attorney of the State, or of a political subdivision
thereof, responsible for the lawfully authorized electronic
surveillance.

3) The principal prosecuting attorney of such State or
political subdivision of such State shall submit with the request
for escrowed key components a certification that shall

(a) identify the law enforcement agency or other
authority conducting the interception and the prosecuting attorney
responsible therefor;

(b) certify that necessary legal authorization for
interception has been obtained to conduct electronic surveillance
regarding these communications;

(c) specify the termination date of the period for which
interception has been authorize;

(d) identify by docket number or other suitable method
of specification the source of the authorization;

(e) certify that communications covered by that
authorization are being encrypted with a key-escrow encryption
method;

(f) specify the identifier (ID) number of the key escrow
chip providing such encryption; and

(g) specify the serial (ID) number of the key-escrow
decryption device that will be used by the law enforcement agency
or other authority for decryption of the intercepted
communications.

4) Such certification must be submitted by the principal
prosecuting attorney of that State or political subdivision to
each of the designated key component escrow agents.

5) Upon receiving the certification from the principal
prosecuting attorney of the State or political subdivision, each
key component escrow agent shall release the necessary key
component to the intercepting State or local law enforcement
agency or other authority. The key components shall be provided in
a manner that assures they cannot be used other than in
conjunction with the lawfully authorized electronic surveillance
for which they were requested.

6) Each of the key component escrow agents shall retain a
copy of the certification of the principal prosecuting attorney of
the State or political subdivision. In addition, such prosecuting
attorney shall provide a copy of the certification to the
Department of Justice, for retention in accordance with normal
record keeping requirements.

7) Upon, or prior to, completion of the electronic
surveillance phase of the investigation, the ability of the
intercepting law enforcement agency or other authority to decrypt
intercepted communications shall terminate, and the intercepting
law enforcement agency or other authority may not retain the key
components.

8) The Department of Justice may, in each such case, make
inquiry to

(a) ascertain the existence of authorizations for
electronic surveillance in cases for which escrowed key components
have been released;

(b) ascertain that key components for a particular key
escrow encryption chip are being used only by an investigative
agency authorized to conduct electronic surveillance of
communications encrypted with that chip; and

(c) ascertain that, no later than the completion of the
electronic surveillance phase of the investigation, the ability of
the requesting agency to decrypt intercepted communications is
terminated.

9) In reporting to the Administrative Office of the United
States Courts pursuant to 18 U.S.C. Section 2519(2), the principal
prosecuting attorney of a State or of a political subdivision of a
State may, with respect to any order for authorized electronic
surveillance for which escrowed encryption components were
released and used for decryption, desire to note that fact.

These procedures do not create, and are not intended to create,
any substantive rights for individuals intercepted through
electronic surveillance, and noncompliance with these procedures
shall not provide the basis for any motion to suppress or other
objection to the introduction of electronic surveillance evidence
lawfully acquired.

*************************************************************


U.S. Department of Justice
Washington D.C. 20530

February 4, 1994

AUTHORIZATION PROCEDURES FOR RELEASE OF ENCRYPTION KEY COMPONENTS
IN CONJUNCTION WITH INTERCEPTS PURSUANT TO FISA

The following are the procedures for the release of escrowed key
components in conjunction with lawfully authorized interception of
communications encrypted with a key-escrow encryption method.
These procedures cover all electronic surveillance conducted
pursuant to the Foreign Intelligence Surveillance Act (FISA), Pub.
L. 95-511, which appears at Title 50, U.S. Code, Section 1801 et
seq.

1 ) In each case there shall be a legal authorization for the
interception of wire and/or electronic communications.

2) In the event that federal authorities discover during the
course of any lawfully authorized interception that communications
encrypted with a key-escrow encryption method are being utilized,
they may obtain a certification from an agency authorized to
participate in the conduct of the interception, or from the
Attorney General of the United States or designee thereof. Such
certification shall

(a) identify the agency participating in the conduct of
the interception and the person providing the certification;

to conduct electronic surveillance regarding these
communications;

(c) specify the termination date of the period for which
interception has been authorized;

(d) identify by docket number or other suitable method
of specification the source of the authorization;

(e) certify that communications covered by that
authorization are being encrypted with a key-escrow encryption
method;

(f) specify the identifier (ID) number of the key escrow
encryption chip providing such encryption; and

(g) specify the serial (ID) number of the key-escrow
decryption device that will be used by the agency participating in
the conduct of the interception for decryption of the intercepted
communications.

4) This certification shall be submitted to each of the
designated key component escrow agents. If the certification has
been provided by an agency authorized to participate in the
conduct of the interception, a copy shall be provided to the
Department of Justice, Office of Intelligence Policy and Review.
As soon as possible, an attorney associated with that office shall
provide each of the key component escrow agents with written
confirmation of the certification.

5) Upon receiving the certification, each key component
escrow agent shall release the necessary key component to the
agency participating in the conduct of the interception. The key
components shall be provided in a manner that assures they cannot
be used other than in conjunction with the lawfully authorized
electronic surveillance for which they were requested.

6) Each of the key component escrow agents shall retain a
copy of the certification, as well as the subsequent written
confirmation of the Department of Justice, Office of Intelligence
Policy and Review.

7) Upon, or prior to, completion of the electronic
surveillance phase of the investigation, the ability of the agency
participating in the conduct of the interception to decrypt
intercepted communications shall terminate, and such agency may
not retain the key components.

8) The Department of Justice shall, in each such case,

(a) ascertain the existence of authorizations for
electronic surveillance in cases for which escrowed key components
have been released;

(b) ascertain that key components for a particular key
escrow encryption chip are being used only by an agency authorized
to participate in the conduct of the interception of
communications encrypted with that chip; and

(c) ascertain that, no later than the completion of the
electronic surveillance phase of the investigation, the ability of
the agency participating in the conduct of the interception to
decrypt intercepted communications is terminated.

9) Reports to the House Permanent Select Committee on
Intelligence and the Senate Select Committee on Intelligence,
pursuant to Section 108 of FISA, shall, with respect to any order
for authorized electronic surveillance for which escrowed
encryption components were released and used for decryption,
specifically note that fact.

These procedures do not create, and are not intended to create,
any substantive rights for individuals intercepted through
electronic surveillance, and noncompliance with these procedures
shall not provide the basis for any motion to suppress or other
objection to the introduction of electronic surveillance evidence
lawfully acquired.



________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix. Quantum Californians appear in one of two states,
spin surf or spin punk. Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@versant.com>,
subscription requests to <surfpunk-request@versant.com>.
WWW Archive at ``http://www.acns.nwu.edu/surfpunk/''.
________________________________________________________________________
________________________________________________________________________




The Internet Index
Compiled by Win Treese (treese@crl.dec.com), 7/8/93
Revised: 12/16/93

Annual rate of growth for Gopher traffic: 997%

Annual rate of growth for World-Wide Web traffic: 341,634%

Average time between new networks connecting to the Internet: 10 minutes

Number of newspaper and magazine articles about the Internet during the
first nine months of 1993: over 2300

Number of on-line coffeehouses in San Francisco: 18

Cost for four minutes of Internet time at those coffeehouses: $0.25

Date of first known Internet mail message sent by a head of state: 2 March 1993
(Sent by Bill Clinton, President of the United States)

Date on which first Stephen King short story published via the Internet before
print publication: 19 Sept 1993

Number of mail messages carried by IBM's Internet gateways
in January, 1993: about 340,000

Number of mail messages carried by Digital's Internet gateways
in June, 1993: over 700,000

Advertised network numbers in July, 1993: 13,293
Advertised network numbers in July, 1992: 5,739

Date after which more than half the registered networks were
commercial: August, 1991

Number of Internet hosts in Norway, per 1000 population: 5
Number of Internet hosts in United States, per 1000 population: 4
Number of Internet hosts in July, 1993: 1,776,000

Round-trip time from Digital CRL to mcmvax.mcmurdo.gov in McMurdo, Antartica:
640 milliseconds
Number of hops: 18

Number of USENET articles posted on a typical day in February, 1993: 350,000
Number of megabytes posted: 44
Number of users posting: 80,000
Number of sites represented: 25,000

Number of Silicon Valley real estate agencies advertising with
Internet mail addresses: 1

Terabytes carried by the NSFnet backbone in February, 1993: 5

Number of countries reachable by electronic mail: 137 (approx.)
Number of countries not reachable by electronic mail: 99 (approx.)
Number of countries on the Internet: 60

Amount of time it takes for Supreme Court decisions to become
available on the Internet: less than one day.

Date of first National Public Radio program broadcast simultaneously
on the Internet: 21 May 1993

Percent of Boardwatch Top 100 BBS systems with Internet Connectivity: 21

Number of people on the Internet who know you're a dog: 0


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT