|
|
| EPIC Analysis of the Encrypted Communications Privacy Act |
| by Electronic Privacy Information Center (03/1996) |
|
|
| Sen. Patrick Leahy
(D-VT) and several other co-sponsors have introduced the Encrypted Communications
Privacy Act of 1996 (S.1587). The proposed legislation comes in the midst
of an ongoing debate concerning U.S. encryption policy and at a time when
the need for secure electronic communications is becoming widely recognized.
The explosive growth of the Internet underscores the need for policies that
encourage the development and use of robust security technologies to protect
sensitive personal and commercial information in the digital environment.
The Electronic Privacy Information Center (EPIC) has long advocated adoption
of a national encryption policy that emphasizes the protection of personal
data and encourages the widespread dissemination of privacy- enhancing technologies.
The text of the proposed legislation is available at: http://www.epic.org/crypto/legislation/s1587.html Analysis Relax export controls by transferring authority for export decisions to the Secretary of Commerce, and mandate the removal of controls on "generally available" encryption software; Create a legal framework for key escrow agents, including an obligation to disclose keys and assist law enforcement, and establish penalties for improper disclosure; Affirm the freedom to use and sell encryption within the United States; and Criminalize the use of encryption which may have the
effect of obstructing a felony investigation. The Commerce Department historically has been dependent upon NSA for assessments of the worldwide availability of encryption technology. The Commerce Department recently released the results of a survey it conducted of foreign encryption products. Portions of the Department's report were classified by NSA and withheld from public disclosure (EPIC is currently seeking the release of the complete report in a lawsuit filed under the Freedom of Information Act; Electronic Privacy Information Center v. Department of Commerce, C.A. No. 95-2228 (D.D.C.)). By conditioning the relaxation of export controls on a finding that similar products are "generally available," the legislation will likely perpetuate NSA's ability to influence export determinations and to thwart public oversight of Commerce Department actions. The "generally available" requirement will
continue to hamper the development of innovative security technology by
U.S. firms. Restricting exports to products comparable to those already
"available from a foreign supplier" will ensure that foreign,
and not domestic, firms will be on the leading edge of privacy-enhancing
technology. This is necessarily a non-competitive trade policy that will
continue to obstruct the development of strong encryption. Key Escrow Procedures The legislation also establishes reporting requirements on the number of orders and extensions served on key holders to obtain access to decryption keys or decryption assistance consistent with current reporting requirements in the federal wiretap statute. Statutory protection for the privacy of encryption keys appears to be a worthy goal. The bill's key-escrow procedures, however, must be considered in the context of the larger policy debate concerning encryption. Beginning with Clipper and continuing with the more recent "commercial key-escrow" proposal, law enforcement agencies and the national security community have lobbied aggressively for the implementation of key-escrow systems that would provide government the ability to decrypt secure data. Such proposals have also been supported by companies that have received substantial government contracts or promises of special deals on export licenses. Users and most businesses have remained firmly opposed to the key-escrow concept. Indeed, there is virtually no installed base for key-escrow encryption, while the number of users of non-escrowed encryption is in the millions. By placing a Congressional imprimatur on the key-escrow concept, the legislation will have the effect of supporting an escrow scheme that has already been rejected by users and businesses. A statutory scheme that creates a legal framework for key-escrow is contrary to the privacy interests of network users and the security needs required for network development. EPIC recommends that the key escrow provisions of the bill be dropped.
EPIC believes that there is a fundamental constitutional right to use encryption and would support only an unconditional articulation of that right. The current statutory framework clearly opens the door to further regulation of privacy-enhancing technologies.
EPIC commends the sponsors of the proposed legislation
for moving the public debate on the relaxation of export controls forward
and recognizing the need for an overhaul of an out-dated policy. We are
confident that further consideration of the unnecessary and potentially
dangerous provisions contained in the current version will result in a
legislative approach that best serves the needs of all concerned -- users,
industry and government. |
|
|