Chipping Away at Privacy by Shari Steele and Daniel J. Weitzner On April 16, 1993, the Clinton Administration announced a national standard for encryption. Under the Administration's Clipper Chip proposal, voice telephone conversations would be encrypted by chips built into the telephone units used by the caller and the call recipient. Put simply, when a call is made, the two telephones involved communicate with one another and establish a unique key based on information contained on each of their chips. The telephones then use that key to encrypt and decrypt the conversation. In this way, anyone attempting to wiretap the telephone conversation would not be able to understand what was being said. However, in order to provide a means for law enforcement officers to decrypt messages for court-authorized wiretaps, the Administration's proposal suggested that the keys be held in trust by a third party, who would only release keys when presented with valid warrants to perform wiretaps. To further ensure that the keys would not be too easily obtained, the Administration's proposal suggested that each key be split in half, with each half of each key held by a different escrow agent. The Clipper Chip, which was originally developed by the National Security Agency (NSA), does offer some measure of privacy to individuals while providing law enforcement officers with the means to conduct wiretaps. However, there are some serious problems with the government's proposal. First, the Administration has not established that the Clipper Chip offers maximum privacy protection. An encryption algorithm cannot be trusted unless it can be tested, yet the Administration proposes to keep the Chip algorithm classified. What will give people confidence in the safety of their keys? Furthermore, while the use of the key escrow system is one way to balance privacy and law enforcement needs, the details of this scheme must be explored publicly before it is adopted. But before we even begin to address these concerns, we need to start with one very basic question: Is the Clipper Chip an attempt by the federal government to control the use of encryption? A government- mandated encryption standard raises profound constitutional questions. Clipper Mandate Imminent? So far, the Administration has not declared that use of the Clipper Chip will be mandatory, but several factors point in that direction: * The government has justified keeping the Clipper Chip encryption algorithm secret by claiming that it is the only way to ensure compliance with the proposed key escrow system. Many parties have already questioned the need for a secret algorithm, especially given the existence of robust, public-domain encryption techniques. The most common explanation given for use of a secret algorithm is the need to prevent users from bypassing the key escrow system proposed along with the Clipper Chip. If the system is truly voluntary, then why go to such lengths to ensure compliance with the escrow procedure? * A voluntary system does not solve law enforcement's problems. The major stated rationale for government intervention in the domestic encryption arena is to ensure that law enforcement officers have continued access to criminal communications. Yet, a voluntary scheme seems inadequate to meet this goal. Criminals who seek to avoid interception and decryption of their communications would simply use another system, free from escrow provisions. Unless a government- proposed encryption scheme is mandatory, it would fail to achieve its primary law enforcement purpose. In a voluntary regime, only the law- abiding would use the escrow system. Any attempt to mandate a particular cryptographic standard for private communications, to require that encrypted messages use an escrow system, or to prohibit the use of specific encryption algorithms would raise fundamental constitutional questions. In order to appreciate the importance of the concerns raised, we must recognize that we are entering an era in which most of society will rely on encryption to protect the privacy of their electronic communications. Constitutional Concerns If the Administration does intend to mandate the use of a particular encryption technology, such as the Clipper Chip, and to make the use of all other encryption technologies illegal, there are serious constitutional concerns. A mandatory key escrow system violates the First, Fourth and Fifth Amendments of the Constitution. * A mandatory key escrow system violates the Fourth Amendment prohibition against "unreasonable search and seizure." Wiretapping and other electronic surveillance have always been recognized as exceptions to the fundamental Fourth Amendment prohibition against secret searches. Even with a valid search warrant, law enforcement agents must "knock and announce" their intent to search a location before proceeding. Failure to do so violates the Fourth Amendment. Increasing reliance on advanced telecommunications requires that we re-examine the scope and application of the exception granted to wiretaps. Until now, the law of search and seizure has made a sharp distinction between, on the one hand, seizures of papers and other items in a person's physical possession and, on the other hand, wiretapping of electronic communications. Law enforcement officers must inform an owner, through the presentation of a valid warrant, before searching and/or seizing papers or personal effects. Only in the exceptional case of wiretapping may law enforcement officers invade a person's privacy without simultaneously informing that person. Today, the distinction between storage of information and communication of information is not so clear. Instantaneous access to encryption keys, without notice to the communicating parties, may well constitute a secret search if law enforcement officers seize the "papers" (now in electronic form) of a virtual corporation or an individual. * A key escrow system forces a mass waiver of all users' Fifth Amendment rights against self-incrimination. The Fifth Amendment protects individuals facing criminal charges from having to reveal information that might incriminate them at trial. So far, no court has determined whether or not the Fifth Amendment allows a defendant to refuse to disclose his or her cryptographic key. As society and technology have changed, courts and legislatures have gradually adapted fundamental constitutional rights to new circumstances. Such decisions require careful, deliberate action. But the existence of a key escrow system would have the effect of waiving this right for every person who used the system in a single step. * Prohibition against use of certain cryptographic techniques is a content-based restriction which violates individuals' right to free speech guaranteed under the First Amendment. Prohibiting the use of a particular form of cryptography for the express purpose of making communication intelligible to law enforcement officers is akin to prohibiting someone from speaking a language not understood by law enforcement officers. And, while courts have upheld "time, place and manner" restrictions, such as laws that limit the volume of speakers from interfering with surrounding activities and confine demonstrators to certain physical areas, no court has ever upheld an outright ban on the use of a particular language. Moreover, in order for a time, place and manner restriction to be a valid restraint on speech, a government must show that it is the "least restrictive means" of accomplishing the government's goal. It is precisely this question -- the availability of alternatives that could solve law enforcement's actual problems -- that we must be able to explore before we can promote a solution such as key escrow. Digital Privacy and Security Working Group On May 14, 1993, the Digital Privacy and Security Working Group sent a list of over 100 questions to President Clinton, expressing the Group's concerns and asking that a public dialogue be initiated to discuss the issue further. The Digital Privacy and Security Working Group is a coalition of over 50 organizations -- from computer software and hardware firms, to telecommunications companies and energy companies, to the American Civil Liberties Union and the Electronic Frontier Foundation -- that was formed over a decade ago and is chaired by EFF's Executive Director, Jerry Berman. The Working Group identified several other aspects of the Administration's encryption proposal that warranted further discussion, including: * the security of the key escrow system; * the advisability of a government-developed and classified algorithm; * the Clipper Chip's practicality and commercial acceptability; * the effect of the proposal on American competitiveness and the balance of trade; * possible implications for the development of digital communications; and, * the effect on the right to privacy and other constitutional rights. The Administration has agreed to slow down the process in order to enable a deliberate government policy on encryption to be developed before any one encryption technology is embraced.