########## ########## ########## | ########## ########## ########## | GILMORE VS. THE NSA #### #### #### | ######## ######## ######## | ######## ######## ######## | THE CRYPTO ANARCHIST MANIFESTO #### #### #### | ########## #### #### | 2nd PIONEER AWARDS DEADLINE LOOMS ########## #### #### | ===================================================================== EFFector Online December 11, 1992 Issue 4.00 A Publication of the Electronic Frontier Foundation ISSN 1062-9424 ===================================================================== ACCESSING THE NSA JOHN GILMORE FILES SUIT WITH THE NATIONAL SECURITY AGENCY At the beginning of July 1992, John Gilmore filed a FOIA request with NSA asking for access to parts of cryptologic treatises written by NSA personnel: Military Cryptanalysis, Parts III and IV, by William Friedman (WF-3/4); and Military Cryptanalytics, Parts III-VI, by William Friedman and Lambros Callimahos (LC3-6). Parts I and II of each of these treatises had already been declassified and published. At the time of the request, it was not definitely known whether the parts requested by Gilmore had been re-classified. Under the FOIA, agencies are required to communicate responses to requesters within statutorily prescribed time periods. Failure to comply with the time limits for response constitutes a denial of the request, giving the requester the right to appeal. When NSA violated the first applicable time period, Gilmore filed an administrative appeal with the NSA's FOIA appeals authority. There is also a time limit for response to such appeals. After this time limit passed without a response from the NSA's appeals authority, Gilmore filed a complaint in federal court in the Northern District of California on Sept. 4, 1992, as permitted by the FOIA. Gilmore's complaint alleged three claims: First, that the NSA improperly withheld these documents from him, and had no legal basis for withholding; second, that the NSA's failure to comply with the FOIA time limits constituted a form of improper withholding; and third, that the NSA in general engages in an illegal pattern or practice of routinely violating the FOIA time limits, which should be declared illegal and enjoined. In the period between the initial FOIA request to NSA, and the filing of the complaint in federal court, Gilmore obtained copies of two of the withheld documents: Military Cryptanalysis Parts III and IV, by Friedman. These copies were discovered in libraries accessible to the general public and were provided by these libraries without any kind of restriction. Gilmore intended to get expert opinion on the national security risk posed by disclosure of these documents. He also reasoned that their very availability in such libraries demonstrated that there could be no legal basis for withholding them from a FOIA requester. At the time the documents were obtained, Gilmore had not received any indication from NSA that the documents were classified. It was therefore possible that the documents were not, in fact, classified. In addition, FOIA requests for documents generally trigger agency declassification review. Thus, even if the documents were in fact classified at the time of the request, it was possible that NSA would decide that they should no longer be classified, and release them to Gilmore. After the complaint was filed, Gilmore not only served the complaint upon NSA, he also served a number of discovery requests upon NSA, seeking to discover information about both the history of these documents and about NSA's FOIA processing procedures. In early October, after NSA had received the complaint and the discovery requests, NSA finally sent its responses to the FOIA request. NSA informed Gilmore that the documents were not going to be released to him. NSA said that it had located WF-3/4 and LC-3, but that LC-4/5/6 had never been completed because of the death of Lambros Callimahos. First, NSA asserted that the three documents which did exist were classified. WF-3/4 were classified CONFIDENTIAL, the lowest level of classification under Executive Order 12,356 governing classified information. LC-3 was classified SECRET, the middle level of classification. Under the FOIA, an agency may withhold documents if they are properly classified for reasons of national security. Second, NSA asserted that the documents could also be withheld under a different exemption in the FOIA. Under the (b)(3) exemption, documents may be withheld if there exists a statute which authorizes an agency to withhold them. NSA pointed to several statutes which arguably covered this material. One of these statutes, 18 U.S.C. Section 798, makes it a federal crime knowingly to disclose classified cryptologic or communications intelligence information to unauthorized persons. At this point, it became clear to Gilmore that there was a problem. He now knew for a fact that the documents he had were classified (WF-3/4) and that it would be a crime for him to disseminate them. He could no longer continue with his plan of showing them to other persons for fear of criminal prosecution. He also feared that should NSA ever discover that he possessed them, he would be subjected to search and seizure and the copies confiscated. (Note that although the First Amendment Privacy Protection Act generally protects the press against search and seizure for materials intended for publication where the crime involves mere possession or dissemination of information, it does not apply to any materials covered by the espionage statutes, of which 18 U.S.C. Section 798 is one.) NSA did not, however, know that he had them. Gilmore decided that the best course of action was to submit copies of WF-3/4 to the federal district court under seal. By so doing, he would ensure that at least these copies would be kept out of the NSA's hands, since it was unlikely that a federal judge would relinquish possession of documents material to pending litigation. Thus, on November 12, Gilmore made an ex parte application to file these documents under seal with Judge Thelton Henderson, the federal judge hearing his case. Gilmore also concurrently filed a motion for leave to amend his original complaint in order to address the constitutional and other issues arising from his possession of the documents and the criminality of disseminating documents found in libraries open to the general public. It is important to realize that the criminal statute at issue here does not recognize improper classification as a defense. Under existing law, the government need only show that the documents were classified by the government, and that they are cryptologic- or communications-intelligence-related. It remains unclear precisely what the specific requirement under the statute is, i.e., whether "knowingly" means actual knowledge of classification, or merely some reason to know. (That same day, NSA filed two motions of its own: a motion for a protective order blocking Gilmore's discovery requests, and a motion for summary judgment asking the court to dispose of the case on the ground that NSA was entitled to judgment as a matter of law. In support of its summary judgment motion, NSA filed a sworn declaration by Michael Smith, Chief of Policy, explaining why the documents should be withheld, and why NSA's FOIA processing procedures were not illegal.) NSA was served with papers indicating that WF-3/4 had been received by the district court. This was the first time that NSA knew that Gilmore possessed the documents. They reacted strongly. John Martin, the Justice Department lawyer representing NSA, asked that Gilmore surrender his copies to NSA, saying that NSA was very upset and might send its own agents or FBI agents to get the copies from Gilmore. He also wanted to know where Gilmore got them. Martin also suggested that Gilmore might be criminally liable under the espionage statutes relating to possession of national defense information. NSA regained its composure the next day, realizing that it did not know exactly what Gilmore had. Although NSA had been served with papers indicating what Gilmore had done, Gilmore had not sent them copies of the documents. Thus they could not know for sure whether the documents he had were the ones they considered classified. Gilmore agreed to send copies of his copies to NSA for their review, after which NSA would decide what to do. During this period, tension was high. Gilmore considered filing an ex parte motion for a temporary restraining order against NSA and the U.S. Attorney General to prevent them >from both moving against him personally and against any copies of the documents presently on library shelves. This motion was drafted but never filed. On the day before Thanksgiving, NSA announced that WF-3/4 would be declassified, and effectively renounced any claim that it could withhold them from the public. NSA gave no official reason for its action. NSA is currently reviewing the third document, LC-3, to see how much of it can be released now that WF-3/4 have been declassified. (NSA had asserted in its summary judgment papers that LC-3 was based on WF-3/4.) NSA's review is to be completed by January 15, 1993, at which time it will release an edited version of LC-3 to Gilmore. It is anticipated that this edited version of LC-3 will be analyzed by Gilmore and his experts, and that Gilmore and NSA will engage in settlement negotiations to determine whether NSA has satisfied Gilmore's request. The settlement discussions will also include Gilmore's claims regarding NSA's FOIA processing procedures. The parties have stipulated that if no settlement is reached the litigation will proceed. A status conference has been set for February 9. NSA will, if necessary, file an amended motion for summary judgment by February 12. Following opposition and reply briefs, the hearing on all motions will take place on March 22. [John Gilmore is a member of the EFF Board of Directors. He can reached as gnu@cygnus.com. Gilmore's lawyer, Lee Tien, can be reached as tien@toad.com.] -==--==--==-<>-==--==--==- THE CRYPTO ANARCHIST MANIFESTO by Timothy C. May (tcmay@netcom.com) A specter is haunting the modern world, the specter of crypto anarchy. Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re- routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation. The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies. The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be traded freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy. Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property. Arise, you have nothing to lose but your barbed wire fences! -==--==--==-<>-==--==--==- Date: Wed, 02 Dec 92 21:31:47 -0800 From: haynes@cats.UCSC.EDU (Jim Haynes) Newsgroups: comp.dcom.telecom Subject: Historical Note on Telecom Privacy Apropos of all the talk on FBI wiretapping, cellular eavesdropping, etc., I found this passage in "Old Wires and New Waves"; Alvin F. Harlow; 1936. He's writing about unscrupulous telegraph operators in the early days. They would use information in telegrams for personal gain, or delay messages or news for personal gain, or sell news reports to non-subscribers of the press association. "Pennsylvania passed a law in 1851, making telegrams secret, to prevent betrayal of private affairs by operators. When, therefore, an operator was called into court in Philadelphia a little later, and ordered to produce certain telegrams which would prove an act of fraud, he refused to do so, saying that the state law forbade it. The circuit court, shocked at this development, proceeded to override the law, saying: It must be apparent that, if we adopt this construction of the law, the telegraph may be used with the most absolute security for purposes destructive to the well-being of society - a state of things rendering its absolute usefulness at least questionable. The correspondence of the traitor, the murderer, the robber and the swindler, by means of which their crimes and frauds could be the more readily accomplished and their detection and punishment avoided, would become things so sacred that they never could be accessible to the public justice, however deep might be the public interest involved in their production. The judge therefore ordered the operator to produce the telegrams." -==--==--==-<>-==--==--==- THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS: CALL FOR NOMINATIONS Deadline: December 31,1992 In every field of human endeavor,there are those dedicated to expanding knowledge,freedom,efficiency and utility. Along the electronic frontier, this is especially true. To recognize this,the Electronic Frontier Foundation has established the Pioneer Awards for deserving individuals and organizations. The Pioneer Awards are international and nominations are open to all. In March of 1992, the first EFF Pioneer Awards were given in Washington D.C. The winners were: Douglas C. Engelbart of Fremont, California; Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom Jennings of San Francisco, California; and Andrzej Smereczynski of Warsaw, Poland. The Second Annual Pioneer Awards will be given in San Francisco, California at the 3rd Conference on Computers, Freedom, and Privacy in March of 1993. All valid nominations will be reviewed by a panel of impartial judges chosen for their knowledge of computer-based communications and the technical, legal, and social issues involved in networking. There are no specific categories for the Pioneer Awards, but the following guidelines apply: 1) The nominees must have made a substantial contribution to the health, growth, accessibility, or freedom of computer-based communications. 2) The contribution may be technical, social, economic or cultural. 3) Nominations may be of individuals, systems, or organizations in the private or public sectors. 4) Nominations are open to all, and you may nominate more than one recipient. You may nominate yourself or your organization. 5) All nominations, to be valid, must contain your reasons, however brief, on why you are nominating the individual or organization, along with a means of contacting the nominee, and your own contact number. No anonymous nominations will be allowed. 6) Every person or organization, with the single exception of EFF staff members, are eligible for Pioneer Awards. 7) Persons or representatives of organizations receiving a Pioneer Award will be invited to attend the ceremony at the Foundation's expense. You may nominate as many as you wish, but please use one form per nomination. You may return the forms to us via email to pioneer@eff.org You may mail them to us at: Pioneer Awards, EFF, 155 Second Street Cambridge MA 02141. You may FAX them to us at: +1 617 864 0866 Just tell us the name of the nominee, the phone number or email address at which the nominee can be reached, and, most important, why you feel the nominee deserves the award. You may attach supporting documentation. Please include your own name, address, and phone number. We're looking for the Pioneers of the Electronic Frontier that have made and are making a difference. Thanks for helping us find them, The Electronic Frontier Foundation -------EFF Pioneer Awards Nomination Form------ Please return to the Electronic Frontier Foundation via email to: pioneer@eff.org via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA; via FAX to +1 617 864 0866 Nominee: Title: Company/Organization: Contact number or email address: Reason for nomination: Your name and contact information: Extra documentation attached: DEADLINE: ALL NOMINATIONS MUST BE RECEIVE BY THE ELECTRONIC FRONTIER FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., DECEMBER 31,1992. -==--==--==-<>-==--==--==- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION If you support our goals and our work, you can show that support by becoming a member now. Members receive our bi-weekly electronic newsletter, EFFector Online, the @eff.org newsletter and special releases and other notices on our activities. But because we believe that support should be freely given, you can receive these things even if you do not elect to become a member. Our memberships are $20.00 per year for students, $40.00 per year for regular members. You may, of course, donate more if you wish. Our privacy policy: The Electronic Frontier Foundation will never, under any circumstances, sell any part of its membership list. We will, from time to time, share this list with other non-profit organizations whose work we determine to be in line with our goals. If you do not grant explicit permission, we assume that you do not wish your membership disclosed to any group for any reason. ---------------- EFF MEMBERSHIP FORM --------------- Mail to: The Electronic Frontier Foundation, Inc. 155 Second St. #40 Cambridge, MA 02141 I wish to become a member of the EFF I enclose:$__________ $20.00 (student or low income membership) $40.00 (regular membership) $100.00(Corporate or company membership. This allows any organization to become a member of EFF. It allows such an organization, if it wishes to designate up to five individuals within the organization as members.) I enclose an additional donation of $ Name: Organization: Address: City or Town: State: Zip: Phone:( ) (optional) FAX:( ) (optional) Email address: I enclose a check [ ] . Please charge my membership in the amount of $ to my Mastercard [ ] Visa [ ] American Express [ ] Number: Expiration date: Signature: Date: I hereby grant permission to the EFF to share my name with other non-profit groups from time to time as it deems appropriate [ ] . Initials: Your membership/donation is fully tax deductible. ===================================================================== EFFector Online is published by The Electronic Frontier Foundation 155 Second Street, Cambridge MA 02141 Phone: +1 617 864 0665 FAX: +1 617 864 0866 Internet Address: eff@eff.org Reproduction of this publication in electronic media is encouraged. Signed articles do not necessarily represent the view of the EFF. To reproduce signed articles individually, please contact the authors for their express permission. ===================================================================== This newsletter is printed on 100% recycled electrons. Downloaded From P-80 International Information Systems 304-744-2253