13.7.1. Strong political action is emerging on the Net - right-wing conspiracy theorists, like Linda Thompson + Net has rapid response to news events (Waco, Tienenmen, Russia) - with stories often used by media (lots of reporters on Net, easy to cull for references, Net has recently become tres trendy) - Aryan Nation in Cyberspace - (These developments bother many people I mention them to. Nothing can be done about who uses strong crypto. And most fasicst/racist situations are made worse by state sponsorship--apartheid laws, Hitler's Germany, Pol Pot's killing fields, all were examples of the state enforcing racist or genocidal laws. The unbreakable crypto that the Aryan Nation gets is more than offset by the gains elsewhere, and the undermining of central authority.) - shows the need for strong crypto...else governments will infiltrate and monitor these political groups 13.7.2. Cypherpunks and Lobbying Efforts + "Why don't Cypherpunks have a lobbying effort?" + we're not "centered" near Washington, D.C., which seems to be an essential thing (as with EFF, ACLU, EPIC, CPSR, etc.) - D.C. Cypherpunks once volunteered (April, 1993) to make this their special focus, but not much has been heard since. (To be fair to them, political lobbying is pretty far-removed from most Cypherpunks interests.) - no budget, no staff, no office + "herding cats" + no financial stakes = why we don't do more + it's very hard to coordinate dozens of free-thinking, opinionated, smart people, especially when there's no whip hand, no financial incentive, no way to force them into line - I'm obviously not advocating such force, just noting a truism of systems + "Should Cypherpunks advocate breaking laws to achieve goals?" - "My game is to get cryptography available to all, without violating the law. This mean fighting Clipper, fighting idiotic export restraints, getting the government to change it's stance on cryptography, through arguements and letter pointing out the problems ... This means writing or promoting strong cryptography....By violating the law, you give them the chance to brand you "criminal," and ignore/encourage others to ignore what you have to say." [Bob Snyder, 4-28-94] 13.7.3. "How can nonlibertarians (liberals, for example) be convinced of the need for strong crypto?" - "For liberals, I would examine some pet cause and examine the consequences of that cause becoming "illegal." For instance, if your friends are "pro choice," you might ask them what they would do if the right to lifers outlawed abortion. Would they think it was wrong for a rape victim to get an abortion just because it was illegal? How would they feel about an abortion "underground railroad" organized via a network of "stations" coordinated via the Internet using "illegal encryption"? Or would they trust Clipper in such a situation? "Everyone in America is passionate about something. Such passion usually dispenses with mere legalism, when it comes to what the believer feels is a question of fundamental right and wrong. Hit them with an argument that addresses their passion. Craft a pro-crypto argument that helps preserve the object of that passion." [Sandy Sandfort, 1994- 06-30] 13.7.4. Tension Between Governments and Citizens - governments want more monitoring...big antennas to snoop on telecommunications, " - people who protect themselves are sometimes viewed with suspicion + Americans have generally been of two minds about privacy: - None of your damn business, a man's home is his castle..rugged individualism, self-sufficiency, Calvinism - What have you got to hide? Snooping on neighbors + These conflicting views are held simultaneously, almost like a tensor that is not resolvable to some resultant vector - this dichotomy cuts through legal decisions as well 13.7.5. "How does the Cypherpunks group differ from lobbying groups like the EFF, CPSR, and EPIC?" - We're more disorganized (anarchic), with no central office, no staff, no formal charter, etc. - And the political agenda of the aforementioned groups is often at odds with personal liberty. (support by them for public access programs, subsidies, restrictions on businesses, etc.) - We're also a more radical group in nearly every way, with various flavors of political extremism strongly represented. Mostly anarcho-capitalists and strong libertarians, and many "no compromises" privacy advocates. (As usual, my apologies to any Maoists or the like who don't feel comfortable being lumped in with the libertarians....if you're out there, you're not speaking up.) In any case, the house of Cypherpunks has many rooms. - We were called "Crypto Rebels" in Steven Levy's "Wired" article (issue 1.2, early 1993). We can represent a _radical alternative_ to the Beltway lawyers that dominate EFF, EPIC, etc. No need to compromise on things like Clipper, Software Key Escrow, Digital Telephony, and the NII. But, of course, no input to the legislative process. - But there's often an advantage to having a much more radical, purist body out in the wings, making the "rejectionist" case and holding the inner circle folks to a tougher standard of behavior. - And of course there's the omnipresent difference that we tend to favor direct action through technology over politicking. 13.7.6. Why is government control of crypto so dangerous? + dangers of government monopoly on crypto and sigs - can "revoke your existence" - no place to escape to (historically an important social relief valve) 13.7.7. NSA's view of crypto advocates - "I said to somebody once, this is the revenge of people who couldn't go to Woodstock because they had too much trig homework. It's a kind of romanticism about privacy and the kind of, you know, "you won't get my crypto key until you pry it from my dead cold fingers" kind of stuff. I have to say, you know, I kind of find it endearing." [Stuart Baker, counsel, NSA, CFP '94] 13.7.8. EFF - eff@eff.org + How to Join - $40, get form from many places, EFFector Online, - membership@eff.org + EFFector Online - ftp.eff.org, pub/EFF/Newsletters/EFFector + Open Platform - ftp://ftp.eff.org/pub/EFF/Policy/Open_Platform - National Information Infrastructure 13.7.9. "How can the use of cryptography be hidden?" + Steganography - microdots, invisible ink - where even the existence of a coded message gets one shot + Methods for Hiding the Mere Existence of Encrypted Data + in contrast to the oft-cited point (made by crypto purists) that one must assume the opponent has full access to the cryptotext, some fragments of decrypted plaintext, and to the algorithm itself, i.e., assume the worst - a condition I think is practically absurd and unrealistic - assumes infinite intercept power (same assumption of infinite computer power would make all systems besides one-time pads breakable) - in reality, hiding the existence and form of an encrypted message is important + this will be all the more so as legal challenges to crypto are mounted...the proposed ban on encrypted telecom (with $10K per day fine), various governmental regulations, etc. - RICO and other broad brush ploys may make people very careful about revealing that they are even using encryption (regardless of how secure the keys are) + steganography, the science of hiding the existence of encrypted information - secret inks - microdots - thwarting traffic analysis - LSB method + Packing data into audio tapes (LSB of DAT) + LSB of DAT: a 2GB audio DAT will allow more than 100 megabytes in the LSBs - less if algorithms are used to shape the spectrum to make it look even more like noise - but can also use the higher bits, too (since a real- world recording will have noise reaching up to perhaps the 3rd or 4th bit) + will manufacturers investigate "dithering" circuits? (a la fat zero?) - but the race will still be on + Digital video will offer even more storage space (larger tapes) - DVI, etc. - HDTV by late 1990s + Messages can be put into GIFF, TIFF image files (or even noisy faxes) - using the LSB method, with a 1024 x 1024 grey scale image holding 64KB in the LSB plane alone - with error correction, noise shaping, etc., still at least 50KB - scenario: already being used to transmit message through international fax and image transmissions + The Old "Two Plaintexts" Ploy - one decoding produces "Having a nice time. Wish you were here." - other decoding, of the same raw bits, produces "The last submarine left this morning." - any legal order to produce the key generates the first message + authorities can never prove-save for torture or an informant-that another message exists - unless there are somehow signs that the encrypted message is somehow "inefficiently encrypted, suggesting the use of a dual plaintext pair method" (or somesuch spookspeak) - again, certain purist argue that such issues (which are related to the old "How do you know when to stop?" question) are misleading, that one must assume the opponent has nearly complete access to everything except the actual key, that any scheme to combine multiple systems is no better than what is gotten as a result of the combination itself - and just the overall bandwidth of data... 13.7.10. next Computers, Freedom and Privacy Conference will be March 1995, San Francisco 13.7.11. Places to send messages to - cantwell@eff.org, Subject: I support HR 3627 - leahy@eff.org, Subject: I support hearings on Clipper 13.7.12. Thesis: Crypto can become unstoppable if critical mass is reached - analogy: the Net...too scattered, too many countries, too many degrees of freedom - so scattered that attempts to outlaw strong crypto will be futile...no bottlenecks, no "mountain passes" (in a race to the pass, beyond which the expansion cannot be halted except by extremely repressive means) 13.7.13. Keeping the crypto genie from being put in the bottle - (though some claim the genie was never _in_ the bottle, historically) - ensuring that enough people are using it, and that the Net is using it - a _threshold_, a point of no return 13.7.14. Activism practicalities + "Why don't we buy advertising time like Perot did?" + This and similar points come up in nearly all political discussions (I'm seeing in also in talk.politics.guns). The main reasons it doesn't happen are: - ads cost a lot of money - casual folks rarely have this kind of money to spend - "herding cats" comes to mind, i.e., it's nearly impossible to coordinate the interests of people to gather money, set up ad campaigns, etc. - In my view, a waste of efforts. The changes I want won't come through a series of ads that are just fingers in the dike. (More cynically, Americans are getting the government they've been squealing for. My interest is in bypassing their avarice and repression, not in changing their minds.) - Others feel differently, from posts made to the list. Practically speaking, though, organized political activity is difficult to achieve with the anarchic nonstructure of the Cypherpunks group. Good luck!
Next Page: 13.8 The Battle Lines are Being Drawn
Previous Page: 13.6 Deploying Crypto
By Tim May, see README
HTML by Jonathan Rochkind