December 2, 2002
(Originally published in October 1997)
Is this the same John Ashcroft as the current Attorney General of the USA? It is. This piece was originally written in 1997. It begs a question: who's the real John Ashcroft? But before you go ahead and read his 1997 view of, in his words, a forthcoming "Orwellian world," you have to read about a more recent Ashscroft take. Here it is:
The Internet provides a great opportunity to our country, in part by representing the most inviting form of communication ever developed. It draws people together from all corners of the globe to share and communicate on an unprecedented level, and brings all branches of government closer to the public that they serve.
The Internet allows small businesses to reach out across the globe and conquer the distances between them and potential customers. Individuals can view merchandise and make purchases without leaving home. The Internet also holds great promise for education. Students -- rural, suburban, and urban -- are increasingly able to access a wealth of information with their fingertips that was previously beyond their reach.
In order to guarantee that the United States meets the challenge of this new means of commerce, communication, and education, government must be careful not to interfere. We should not harness the Internet with a confusing array of intrusive regulations and controls. Yet, the Clinton administration is trying to do just that.
The Clinton administration would like the Federal government to have the capability to read any international or domestic computer communications. The FBI wants access to decode, digest, and discuss financial transactions, personal e-mail, and proprietary information sent abroad -- all in the name of national security. To accomplish this, President Clinton would like government agencies to have the keys for decoding all exported U.S. software and Internet communications.
This proposed policy raises obvious concerns about Americans' privacy, in addition to tampering with the competitive advantage that our U.S. software companies currently enjoy in the field of encryption technology. Not only would Big Brother be looming over the shoulders of international cyber-surfers, but the administration threatens to render our state-of-the-art computer software engineers obsolete and unemployed.
There is a concern that the Internet could be used to commit crimes and that advanced encryption could disguise such activity. However, we do not provide the government with phone jacks outside our homes for unlimited wiretaps. Why, then, should we grant government the Orwellian capability to listen at will and in real time to our communications across the Web?
The protections of the Fourth Amendment are clear. The right to protection from unlawful searches is an indivisible American value. Two hundred years of court decisions have stood in defense of this fundamental right. The state's interest in effective crime-fighting should never vitiate the citizens' Bill of Rights.
The president has proposed that American software companies supply the government with decryption keys to high level encryption programs. Yet, European software producers are free to produce computer encryption codes of all levels of security without providing keys to any government authority. Purchasers of encryption software value security above all else. These buyers will ultimately choose airtight encryption programs that will not be American-made programs to which the U.S. government maintains keys.
In spite of this truism, the president is attempting to foist his rigid policy on the exceptionally fluid and fast-paced computer industry. Furthermore, recent developments in decryption technology bring into question the dynamic of government meddling in this industry. Three months ago, the 56-bit algorithm government standard encryption code that protects most U.S. electronic financial transactions from ATM cards to wire transfers was broken by a low-powered 90 MHZ Pentium processor.
In 1977, when this code was first approved by the U.S. government as a standard, it was deemed unbreakable. And for good reason. There are 72 quadrillion (72,000 trillion) different combinations in a 56-bit code. However, with today's technology these 72 quadrillion combinations can each be tried in a matter of time.
Two days after this encryption code was broken, a majority of the U.S. Senate Commerce Committee voted, in accordance with administration policy, to force American software companies to perpetuate this already compromised 56-bit encryption system. In spite of the fact that 128-bit encryption software from European firms is available on Web sites accessible to every Internet user. Interestingly, European firms can import this super-secure encryption technology (originally developed by Americans) to the United States, but U.S. companies are forbidden by law from exporting these same programs to other countries.
I believe that moving forward with the president's policy or the Commerce Committee's bill would be an act of folly, creating a cadre of government "peeping toms" and causing severe damage to our vibrant software industries. Government would be caught in a perpetual game of catch-up with whiz-kid code-breakers and industry advances. Senate Majority Leader Trent Lott has signaled his objection to both proposals.
The leader and I would like to work to bring solid encryption legislation to the Senate floor. Any proposal should give U.S. encryption software manufacturers the freedom to compete on equal footing in the international marketplace, by providing the industry with a quasi-governmental board that would decide encryption bit strength based on the level of international technological development.
U.S. companies are on the front line of on-line technologies -- value-added industries of the future. Consider this: Every eighteen months, the processing capability of a computer doubles. The speed with which today's fastest computers calculate will be slug-like before the next millennium or the next presidential election comes along. The best policy for encryption technology is one that can rapidly react to breakthroughs in decoding capability and roll back encryption limits as needed.
The administration's interest in all e-mail is a wholly unhealthy precedent, especially given this administration's track record on FBI files and IRS snooping. Every medium by which people communicate can be subject to exploitation by those with illegal intentions. Nevertheless, this is no reason to hand Big Brother the keys to unlock our e-mail diaries, open our ATM records, read our medical records, or translate our international communications.
Additionally, the full potential of the Internet will never be realized without a system that fairly protects the interests of those who use the Internet for their businesses, own copyrighted material, deliver that material via the Internet, or individual users. The implications here are far-reaching, with impacts that touch individual users, companies, libraries, universities, teachers, and students.
In December 1996, two treaties were adopted by the diplomatic conference of the World Intellectual Property Organization (WIPO) to update international copyright law. These treaties would extend international copyright law into the digital environment, including the Internet. However, these treaties do not provide a comprehensive response to the many copyright issues raised by the flourishing of the Internet and the promise of digital technology. We must work to keep the scales of copyright law balanced, providing important protections to creators of content, while ensuring their widespread distribution. In an attempt to meet these goals, I introduced the Digital Copyright Clarification and Technology Education Act of 1997.
Equally important, we must begin a process that is structured to balance the rights of copyright owners with the needs and technological limitations of those who enable the distribution of the electronic information, and with the rights and needs of individual end users. The current treaties and statements are not sufficient, and include some language that could create legal uncertainty. This vague language could lead to laws that ignore technical realities. The language must be clarified through the enactment of legislation in conjunction with the Senate's ratification of the treaties.
Another issue that could prevent the Internet from reaching its potential is taxation. If we tax the Internet prematurely or allow discriminatory taxing, we may stifle a burgeoning technological development that holds much commercial, social, and educational promise for all Americans. Taxation should be considered only after we have fully examined and understood the impact that unequivocal taxation would have on this new means of commerce. The Internet Tax Freedom Act would allow for full consideration of the opportunities and possible abuses by placing a moratorium on further taxation of online commerce and technologically discriminatory taxes. It is important to note that S. 442 will allow states and local jurisdictions to continue to collect any tax already levied on electronic commerce.
On-line communications technology is akin to the Wild West of the 19th century. To best settle this new frontier, we should unleash American know-how and ingenuity. The government's police-state policy on encryption is creating hindrances and hurdles that will eventually injure our ability to compete internationally. Government's role should be to break down barriers, to allow everyone to excel to their highest and best.
Source: Global Issues -- USIA Electronic Journal, Vol. 2, No. 4, October 1997, http://usinfo.state.gov/journals/itgic/1097/ijge/ijge1097.htm. For the curious minds out there, we suggest a visit to the Electronic Journals of the U.S. Department of State, Office of International Information Programs (formerly the Information Bureau of the United States Information Agency). You'll see your tax dollars at work in Arabic, French, Portuguese, Russian, Spanish, and obviously English. No less than five journals to disseminate "official information!" -- http://usinfo.state.gov/journals/ -- Ah, the power of the Internet!
Here again is the excerpt of Attorney General John Ashcroft's testimony to the Senate Committee on the Judiciary, December 6, 2001:
"We have sought and received additional tools from Congress. Already, we have begun to utilize many of these tools. Within hours of passage of the USA PATRIOT Act, we made use of its provisions to begin enhanced information sharing between the law-enforcement and intelligence communities. We have used the provisions allowing nationwide search warrants for e-mail and subpoenas for payment information. And we have used the Act to place those who access the Internet through cable companies on the same footing as everyone else."
You ponder, you think, and you decide what John Ashcroft really is about.
· · · · · ·
John Ashcroft is currently the Attorney General of the USA in the Bush II Administration. We would not dare guess his next incarnation.
Do you wish to share your opinion? We invite your comments. E-mail the Editor. Please include your full name, address and phone number. If we publish your opinion we will only include your name, city, state, and country.
Published under the provision of U.S. Code, Title 17, section 107.
This Week's Internal Links
Censorship By Other Means: The Witch-Hunting of a Professor - by Gilles d'Aymery
Asymmetric Total Information Awareness - by Jan Baughman
Screams And Cries: Prison Camp Lora and the Trial of the Lora 8 - by Gregory Elich
Hold The Turkey - by Michael Stowell
An Invitation To Catastrophe - by Milo Clark
The Blind Men And The Elephant - A Poem by John Godfrey Saxe
Palestinian Children In The Night - by Sam Bahour
Pity the Poor Iraqi - by Philip Greenspan
The First Winter Storms - A Poetic Exchange by Frank Wycoff and Jan Baughman
The Search For A Nonviolent Future - Book Review by Mac Lawrence
Swans, The Birds - by Gilles d'Aymery
Letters to the Editor