Frank Sudia's proposal: Let's revive encryption key escrow

Steve Schear schear at lvcm.com
Sun Sep 16 18:22:46 PDT 2001


In "Encryption and the Restoration of National Sovereignty," you said:
"No one disputes that unbreakable encryption impairs government ability to 
intercept suspect communications and issue warrants for stored data. The 
citizens have gained "unreviewable discretion" to communicate without 
oversight. They did not have this power before. Now they do."

"This was a direct loss of sovereignty by the Government, with a 
corresponding "gain" by the citizens. Conversely, the restoration of 
investigative capabilities cannot be considered "taking freedom and liberty 
from the People," since they never historically possessed this freedom."
========================================================================

The Fourth Amendment was adopted in direct response to the English 
Parliament's practice of giving colonial revenue officers complete 
discretion to search for smuggled goods by means of writs of assistance. 
The writs permitted colonial authorities, including British troops, to 
enter homes and offices at will and search any person or place they wanted. 
The early Americans rebelled against these general searches, and on the eve 
of the Declaration of Independence, Samuel Adams said he regarded the 
opposition to general searches as "the Commencement of the Controversy 
between Great Britain and America." It is fair to say that absolute 
protection from general government searches is one of this country's 
founding principles.

When the framers struck the original balance between personal privacy and 
the needs of law enforcement, remote listening devices had not yet been 
invented. But it is clear that had they existed, the framers would not have 
approved of them. By definition, electronic surveillance constitutes a 
general search, not a search limited to specific objects, people and places 
as required by the Fourth Amendment. Wiretapping, bugs, and keys to 
encrypted messages intrude on the most intimate aspects of human life. They 
hear/see everything and everyone, indiscriminately. Like vacuum cleaners, 
they sweep up all the details of innocent and often intimate private 
conversations. A tap on the phone of one person necessarily captures the 
conversations of anyone who happens to use that phone or call that number. 
Unlocking one person's encryption code subjects all who electronically 
communicate with that person to government surveillance. Even obtaining a 
court warrant does not fix this problem. Electronic eavesdropping cannot be 
regulated by a warrant precisely because of its dragnet quality; the object 
to be seized or the premises to be searched cannot be limited or even 
specified, because it is in the very nature of the technology to catch 
everything.

In 1927, during the height of federal enforcement of National Alcohol 
Prohibition, the Court attempted to come to grips with electronic 
eavesdropping for the first time. Roy Olmstead, a bootlegger convicted 
entirely on the basis of evidence from wiretaps, argued before the Court 
that a search had been conducted without a warrant and without probable 
cause in violation of his Fourth Amendment rights. In a 5-4 opinion, the 
Court ruled that a physical entry (a "trespass") must be committed before 
the Fourth Amendment's protection could be invoked. Since the wiretaps were 
physically placed outside Olmstead's home, the Court reasoned, there was no 
government intrusion and therefore no Fourth Amendment protection. The 
Olmstead decision defined the law for forty years, and during that period, 
the government was able to engage in virtually unrestricted electronic spying.

The Olmstead case, by a narrow 5-4 margin, destroyed the original balance 
of the Fourth Amendment, but it was also the occasion for Justice Louis D. 
Brandeis' prescient dissent in which he warned that, "The progress of 
science in furnishing the government with means of espionage is not likely 
to stop with wire-tapping." Brandeis wrote that because wiretaps 
indiscriminately pick up every conversation within their reach, they 
constitute the kind of general search prohibited outright by the Fourth 
Amendment, and that even a warrant requirement would not give sufficient 
protection. Unfortunately for our privacy rights, Brandeis' dissent has 
never been adopted by the Court, although it did overrule its Olmstead 
decision in 1967 when it belatedly recognized that the Fourth Amendment 
applied to wiretapping and electronic spying (Katz v. U.S.). Nonetheless, 
Justice Brandeis' account of the framer's intentions is right on the mark:

   "The makers of our Constitution...sought to protect Americans in their
   beliefs, their thoughts, their emotions and their sensations. They
   conferred as against the Government, the right to be let alone -- the
   most comprehensive of the rights of man and the right most valued by
   civilized men."

Cryptography can help shift the balance of the Fourth Amendment back to 
what the framers originally intended. And that is what the FBI is against.

The government's own records show that electronic surveillance is of 
marginal utility in preventing or solving serious crimes. It did not, for 
example, stop or lead to the apprehension of the Unabomber, Timothy 
McVeigh, or the first World Trade Center bombers. Those crimes were solved 
by good detective work. Serious crimes of violence, including terrorist 
crimes, are almost never the targets of electronic surveillance. Electronic 
surveillance does, however, lead to violations of the privacy rights of 
vast numbers of innocent Americans. According to the government's own 
statistics, 2.2 million conversations were intercepted in 1996, of which 
1.7 million were deemed innocent by prosecutors.

Electronic surveillance is absolutely inconsistent with a free society. 
Free citizens must have the ability to conduct instantaneous, direct, 
spontaneous and private communication using whatever technology is 
available. Without the assurance that private communications are, indeed, 
private, habits based upon fear and insecurity will gradually replace 
habits of freedom.





More information about the cypherpunks-legacy mailing list