Geoff Stone, Obama's Review Group

dan at geer.org dan at geer.org
Thu Apr 3 21:25:02 PDT 2014


Responding to various,

Google up Geoff Stone; he's a Constitutional lawyer, clerked for
Brennan, was Dean of the Law School and then Provost of U Chicago.
His relationship with President Obama may well result in Obama's
Presidential Library coming to U Chicago.  Maybe that is comforting.
Maybe that feeds your conclusions about how broad The Conspiracy is.

All of which is irrelevant except that you can take my word, if you
like, that he is neither a pushover nor a hired hand.  The same,
of course, can be said for all the members of Obama's special
commission.  In my view, the question on the table is means and
ends.  I observe an American public that is trending toward ever
more risk aversion.  If my observation is correct, then you know
well that it will concentrate power because risk aversion begets a
demand for absolute safety requires absolute power and absolute
power corrupts absolutely.

If I may quote another man I hold in personal regard, Joel Brenner's
(Google him, too) insight is this:

   During the Cold War, our enemies were few and we knew who they
   were.  The technologies used by Soviet military and intelligence
   agencies were invented by those agencies.  Today, our adversaries
   are less awesomely powerful than the Soviet Union, but they are
   many and often hidden.  That means we must find them before we
   can listen to them.  Equally important, virtually every government
   on Earth, including our own, has abandoned the practice of relying
   on government-developed technologies.  Instead they rely on
   commercial off-the-shelf, or COTS, technologies.  They do it
   because no government can compete with the head-spinning advances
   emerging from the private sector, and no government can afford
   to try.  When NSA wanted to collect intelligence on the Soviet
   government and military, the agency had to steal or break the
   encryption used by them and nobody else.  The migration to COTS
   changed that.  If NSA now wants to collect against a foreign
   general's or terorist's communications, it must break the same
   encryption you and I use on our own devices...  That's why NSA
   would want to break the encryption used on every one of those
   media.  If it couldn't, any terrorist in Chicago, Kabul, or
   Cologne would simply use a Blackberry or send messages on Yahoo!
   But therein lies a policy dilemma, because NSA could decrypt
   almost any private conversation.  The distinction between
   capabilities and actual practices is more critical than ever...
   Like it or not, the dilemma can be resolved only through oversight
   mechanisms that are publicly understood and trusted -- but are
   not themselves ... transparent.

I fear we are on the edge of a rat-hole here.  I forwarded Geoff's
remarks as they are relevant, timely, and speak to the absence of
simplistic nostrums in such matters, both because of the rising
popular / political demand for comfort-and-safety and because the
technologies that those charged with delivering comfort and safety
use are COTS technologies.  And dual use.  Personally, I think of
surveillance as just another tax, which you may safely assume is
said through clenched libertarian cum Tea Party teeth.

--dan




More information about the cypherpunks mailing list