Interesting People mailing list archives
testimony by Steve Walker on Export controls
From: David Farber <farber () linc cis upenn edu>
Date: Tue, 12 Oct 93 17:08:40 -0400
TESTIMONY BY STEPHEN T. WALKER PRESIDENT TRUSTED INFORMATION SYSTEMS, INC. FOR SUBCOMMITTEE ON ECONOMIC POLICY, TRADE AND ENVIRONMENT COMMITTEE ON FOREIGN AFFAIRS U.S. HOUSE OF REPRESENTATIVES OCTOBER 12, 1993 Good Afternoon. I am pleased to testify today about the negative impact that U.S. export control regulations on cryptography are having on one of the few industries where the U.S. remains dominant worldwide: the information system software industry. The major points of my testimony are that U.S. export controls do not prevent the international availability of good quality cryptography but do penalize the U.S. software industry and U.S. business in general. My name is Stephen T. Walker. I am the founder and President of Trusted Information Systems (TIS), Inc., a ten year old firm with 85 employees. With offices in Glenwood, MD; Los Angeles, CA; Mountain View, CA; Minneapolis, MN; and London, UK, TIS specializes in research, product development, and consulting in the fields of computer and communications security. I am also here representing the Software Publishers Association (SPA) and its members on this most important topic. The SPA is the principal trade association of the personal computer software industry. Since 1984, it has grown to over 1,000 members, representing the leading publishers in the business, consumer, and education software markets. My background includes twenty-two years as an employee of the Department of Defense, with the National Security Agency (NSA), the Defense Advanced Research Projects Agency, and the Office of the Secretary of Defense. During my final three years in Government, I was the Director of Information Systems for the Assistant Secretary of Defense for Communications, Command, Control, and Intelligence (C3I). In 1983, I left Government service and began my own consulting firm, specializing in the area of information systems security. My company has experienced steady growth and now offers a variety of products with improved information security for military and civilian applications in addition to our continuing consulting activities. Several of these products are adversely affected by U.S. Government export controls, as are the products of many SPA members. For the past two years, I have been a member of the Computer System Security and Privacy Advisory Board (CSSPAB), chartered by Congress in the Computer Security Act of 1987 to advise the Executive and Legislative Branches on matters of national concern in computer security. In March 1992, the Board first called for a national review of the balance between the interests of law enforcement/national security and those of the public regarding use of cryptography in the United States. The Board has been heavily involved in this review, receiving public input on the Administration's Clipper Initiative, announced by the President on April 16 of this year. Participation in the Board's review has been highly beneficial in helping me form my opinions in this area. OVERVIEW The focus of attention at today's hearing is the negative impact that U.S. export controls on cryptography are having on the U.S. computer industry. In May 1992, I testified before the House Judiciary Committee, Subcommittee on Economic and Commercial Law hearings, on the impact of U.S. export laws on our industry's ability to protect itself from foreign industrial espionage. I also participated in similar hearings in July 1991 and June 1990 in which this topic was of major importance. The export control subject continues to arise in different contexts, but the difficult problems lurking behind it are always the same. The stakes for the software industry are high. The U.S. holds 75% of the global market for packaged software. Most software companies make 35-40% of their revenue from exports; for some companies exports are as much as 50% of their business. When demand for cryptographic products is increasing, export restrictions essentially place an "earnings cap" on U.S. software publishers. A National Dilemma The basic issue is a dilemma of truly national proportions between the long standing and vital interests of our Government to learn as much as it can about its adversaries--be they criminals, terrorists, or other governments--on the one hand, and the basic right to privacy that all Americans assume they have and are seeking to extend to their personal and business communications, whether by telephone, electronic mail, or other forms of computer communications. The resolution of this dilemma will have enormous impact on our country for decades to come. The Government's national security interests contend that if good quality cryptography were to become widely available in this country and the world, our ability to wiretap criminals and listen in to terrorists and other adversaries would be severely hurt. Those seeking improved privacy protection argue that encryption is needed to support worldwide business operations and good quality cryptography is already available worldwide. Continuing U.S. Government restrictions are only penalizing U.S. users with inferior U.S.- developed security products and limiting U.S. industry from participating in a rapidly growing international marketplace. Technology Has Shifted The core of the issue is a shift in technology over the past twenty years that has fundamentally altered both business communications needs and an advantage that law enforcement and national security interests have enjoyed since the earliest days of electronic communications. Before radio and telephone communications, governments had to resort to intercepting mail and notes carried by spies to learn their adversaries' plans. When electronic communications became prevalent, governments found they could intercept those communications relatively easily with very useful results. When encryption was applied to these communications, it became more difficult to make sense of them, but that turned into a test of wits among the mathematicians of various countries. Some were more successful than others. During the time up to the 1980s, this behind-the-scenes struggle was waged among governments with little if any effect on individuals or business communities. But technology shifts beginning in the early 1980s and accelerating at breathtaking rates today resulted in vast computer communications and security capabilities for industrial and personal use worldwide and at the same time have made it much harder for law enforcement and national security interests to continue their interception roles. As we struggle to understand the complex issues confronting us in this dilemma, we must recognize that even if U.S. commercial and private interests were willing to forgo their right to private communications and U.S. computer manufacturers were willing to drop out of the international market for information products employing good quality security protection, the ability of the Government to decrypt the communications of its adversaries will continue to diminish at ever increasing rates over the foreseeable future, no matter what measures, such as employing key escrow techniques or outlawing cryptography, our Government may choose to take. The technology shifts we are seeing here have interesting parallels to those in the field of radar. Since the beginning of World War II, radar has played an essential role in defending against attacks from the air. But recent technology shifts have produced stealth capabilities that for now, at least, effectively defeat radar. We will soon face an equivalent dilemma as stealth measures become widely available: how to prevent drug dealers, terrorists, and other adversaries from using them to enter our country undetected. We could require that all aircraft have some form of reflector that will guarantee that the Government can detect them whenever it has the need, but it is unlikely that those who wish to enter our airspace undetected will comply with such requirements. We must recognize that those who wish to protect their communications from eavesdroppers will increasingly be able to do so. We must be careful not to continue to insist on misguided measures to try to retain decryption capability that will inevitably be eroded by technology, no matter how important we feel that capability may be. The Congress Must Act Now! The principal vehicle that the Government's law enforcement and national security interests have used to maintain the balance on their side of this dilemma over the years has been the imposition of strict export control measures on all cryptographic products leaving this country. In light of the ongoing and inevitable technological shift toward better protection mechanisms and increasing business communications needs, a review of this policy is urgently needed. Such a review must be conducted by someone willing to understand the needs of both sides of the issue. Based on our experiences to date, I am convinced that the U.S. Congress is the only organization with the authority and balanced perspective to tackle such a tough issue. I hope that these hearings will be the beginning of a true national debate of this most vital issue. I would like to begin my testimony with a review of how these export controls came into place and why they made good sense in an earlier time but not necessarily now. I will then discuss the widespread and rapidly growing foreign availability of cryptographic products that is making this technological shift so hard for our intelligence capabilities. Following this, I will review the highly negative effect that U.S. export controls are having on U.S. industries and the average U.S. citizen. WHY DO WE HAVE EXPORT CONTROLS ON CRYPTOGRAPHY? The method that governments have used for most of this century to protect the privacy of their electronic communications and that has gradually become available to individuals throughout the world is called cryptography: the scrambling of data prior to transmission (encryption) and unscrambling upon receipt (decryption). As governments came to rely upon cryptography to protect their vital communications, groups of highly skilled mathematicians were assembled by the same governments to attempt to break the encrypted communications of their adversaries. In David Kahn's 1973 book, The Codebreakers, he states: Codebreaking is the most important form of secret intelligence in the world today. It produces much more and much more trustworthy information than spies, and this intelligence exerts great influence upon the policies of governments. Few would argue that this statement remains just as true today as when it was written. Export Controls Were Essential Initially All modern governments face the difficult competing tasks of having good enough encryption capabilities to protect their own communications while trying to defeat the encryption capabilities of their adversaries. As encryption hardware devices became readily available, governments had to control where these devices went in order to limit the availability of good cryptography to hostile adversaries. Export control on encryption devices became an integral part of the Department of State munitions control process, where it remains today. With the advent of computers, the ability to perform encryption functions using software programs rather than hardware made encryption more readily available and its export control more difficult. In the 1970s, efforts to improve the protection of domestic sensitive information led to publication of encryption algorithms such as the Federal Information Processing Standard (FIPS) Data Encryption Standard (DES) algorithm, which, while intended to be implemented only in hardware, quickly became available throughout the world in software. Personal computers gave individual users direct access to the vast power of the computer and led to a revolution in how businesses operate. Now highly sensitive corporate plans and financial information flow freely over the phone lines among clusters of computers, and users are demanding improved security for their sensitive information from their software suppliers. The natural result of this evolution is the need to include good quality encryption capabilities within modern software products for sale to multinational corporations worldwide. However, governments still want to control where encryption devices go in order to limit the availability of good quality encryption to hostile adversaries. But Times Have Changed So a problem that twenty years ago only affected governments and that led to the harsh export control restrictions presently in place on encryption now threatens the ability of U.S. citizens and businesses to protect their own sensitive information and the ability of the U.S. software industry to market the products that its multinational customers are demanding. This is truly a dilemma of national proportions that cannot be left solely in the hands of the national security interests to resolve. Few would argue that the Government should not continue listening to the communications of its adversaries. But now that we have a worldwide economy with massive amounts of sensitive information flowing in all directions at all times, few are willing to give up the ability to provide reasonable protection to their own information in order to help the Government eavesdrop. "Listening In" Will Keep Getting Harder Even if we could forgo our personal and business privacy needs for the sake of the national security interests, the continuous evolution of technology has already made it harder to listen in to those who do not want to be heard than it was even a year ago. And that evolution will continue to make it even harder next year and in every year that follows. The same technologies that have brought about the personal computer revolution are making good quality cryptography available worldwide, and those people, businesses, and governments that choose to protect their communications can now do so quite effectively and at reasonable cost. The task of listening in to others is becoming more and more difficult every day in spite of extensive export controls. The widespread availability of encryption products worldwide will make it ever harder to decrypt the communications of adversaries who do not want to be heard, with or without excessive export control measures. It is important to note that whether the U.S. Government drops export controls altogether on encryption products or attempts to impose absolute restrictions even on domestic use of encryption, the task of law enforcement and the national security community to listen in to our adversaries is going to get progressively harder day by day. Now Export Controls Are Harmful to the Nation Export controls served a useful purpose following World War II and up to the early 1980s. They protected the Government's interests and did not interfere with the interests of private citizens and commerce. Since cryptography has become an important tool for protecting the sensitive information of everyone, not just governments, and since the technology to implement good quality cryptography has now become readily available worldwide, export controls on good quality cryptography are no longer needed and are highly detrimental to the interests of the nation. HOW WIDESPREAD IS CRYPTOGRAPHY WORLDWIDE? Since the publication of the Data Encryption Standard as a U.S. Federal Information Processing Standard in 1977, cryptography has shifted from the exclusive domain of governments to that of individuals and businesses. DES in both hardware and software implementations is the de facto international standard against which all other algorithms are measured. DES must be recertified as a FIPS every five years. In 1982, it was recertified without controversy. In 1987-1988, NSA recommended against recertification except for specialized use such as banking, but the recertification proceeded. This year the recertification is before the Secretary of Commerce awaiting approval. If approved, software implementations of DES will be allowed for the first time. DES was adopted by the U.S. and international banking community shortly after its publication as a FIPS. The banking community fought for and obtained the right to export DES for financial uses, primarily integrity checks but also for banking confidentiality uses, and the right to generate their own keying material (the random numbers that initialize the encryption/decryption processes) without relying on any other Government agency. In the mid 1980s, DES was proposed as an international standard by the International Standards Organization (ISO) as Data Encryption Algorithm-1 (DEA-1). Final approval was not made because of an appeal by the U.S. suggesting that the ISO should not approve any specific algorithms but leave that decision to individual nations. The availability of DES and the controversy that arose as soon as it was published concerning whether it had weaknesses that NSA could exploit fostered the highly fruitful academic research into public key cryptography in the late 1970s. Public key algorithms have the major advantage that the sender does not need to have established a previous secret key with the recipient for
Current thread:
- testimony by Steve Walker on Export controls David Farber (Oct 12)
- <Possible follow-ups>
- testimony by Steve Walker on Export controls David Farber (Oct 12)
- testimony by Steve Walker on Export controls David Farber (Oct 12)
- testimony by Steve Walker on Export controls David Farber (Oct 12)