Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome jya.com eyeball-series.org cryptome.cn


The Walsh Report


                                 CHAPTER 5

                             STRIKING A BALANCE

5.1      A Matter of Proportion

5.1.1      There is a broad split among the advanced industrialised
countries of the world between those where governments have taken policy
initiatives concerning cryptography and those who have simply watched
developments. Even at this stage, it is an instructive question to ask
whether the latter have suffered any disadvantage from a law enforcement,
national security or privacy point of view. The answer seems to be an
emphatic negative.

5.1.2      The moral authority of government is easily exhausted in treating
such a public policy issue and more quickly if this is done in less than
candid and even-handed fashion. As this report noted at its commencement,
the issues touch on the central relationship between the individual and the
state and there is need to ensure government is not substituted for state in
that context. To attempt to play a modern-day Canute, as those who seek to
ban unrestricted access to the Internet and restrict imports of encryption
materials have done, is simply futile in an age of seamless communication
and electronic marketplaces. Those like the United States and Great Britain
who have urged so strongly their preferred positions on the international
stage, eventually announcing them in the middle of 1996 as official policy,
appear to have viewed the issue as primarily a security and law enforcement
issue and secondarily a privacy issue. The British Government, curiously,
stated early in its paper that the policy had been decided on after detailed
discussion between Government departments, adding in the final paragraph
that formal consultation will be undertaken prior to the introduction of
legislative proposals. 56

     [para 5.1.3 not available]

5.1.4      The consequence of these 'transparent' efforts by the law
enforcement and security communities in those countries, supported by some
academics and advocates who have argued the cause of data retrieval or
sketched images of unbridled terrorism and organised crime, is the sizeable
suspicion that the key management proposals are intended primarily to
benefit their sponsors. Privacy advocates and guardians, electronic
commerce, offices of budget and management within government, the IT
industry itself have not been as effective in their advocacy though,
arguably, they have more at stake.

5.1.5      Strong support for the broad policy position taken by the present
Australian Government, and its predecessor, was evident through the Review
consultations. In view of the continuous rate of change, technology
development and changing cost structures, there is much to be said for
watching developments. None argued prescription, much less the mandating of
requirements, was a useful approach. And while one or two might see
cryptography as a rare opportunity to cock a snook at the state, there was
general recognition that as a community we must address the looming problem
in the law enforcement and national security areas. What can we do?

5.1.6      It would be sensible now to generate a more informed and broader
discussion of the situation in the Australian community. Those consulted
almost universally presumed the outcome of this Review would be used as a
trigger in that process. While the tax evaders and black economy
participants may rub their hands in glee at the comfort encryption may
afford them, the majority are likely to treat the matter seriously,
recognising the loss of the law enforcement function across a range of
fields such as narcotics and counter- terrorism and further restriction of
the funds available for public works, community services and health care
will affect the type of society we enjoy and hope to leave to our children.
In today's context, any ideal outcome based on a key management system
advocated elsewhere or an amalgam of various systems could too easily be
circumvented by organised crime or terrorists with reasonable capability and
the intention to shield their plans from the investigative agencies of the
state. As such systems are primarily intended to meet the needs of public
safety, it would be futile to impose requirements which are costly and/or
which have a harmful privacy impact but which fail to address their
fundamental purpose.

5.1.7      The approach of this Review is to strike a balance: to ensure the
extant powers of law enforcement and national security agencies to access
and intercept are relevant, to recommend a modest increase to those
investigative powers, to afford some greater protection to their high risk
activities and to acknowledge the benefit which encryption will bring to
people and corporations in securing their data. The Commonwealth Privacy Act
1988 remains the only information privacy law in Australia with legally
binding rules. 57 This statute implemented Australia's commitment to take
the 1980 OECD Guidelines Governing the Protection of Privacy and Transborder
Flows of Personal Data into account in domestic legislation. 58 The
Government has stated its intention of extending the application of the
Privacy Act, which regulates Commonwealth government agencies and all users
of consumer credit information and tax file numbers, to the private sector.
59 There would be much sense in avoiding, particularly during the period
until legislation is introduced into the parliament, a perception that the
privacy of the whole community was to be constrained to address a small
sector need. This would leave the government better placed to act or
intervene legislatively, if that should later be required.

5.1.8      As at October 1996, no 'magic' solution to this problem was in
prospect. There is yet a short time available. The impact of encryption on
the totality of law enforcement and national security interests in Australia
remains fairly negligible, though the problem is only as far away as
tomorrow. What should be done in the interval? Government should continue to
monitor the situation and study the experience of others, as the practices
eventually adopted by major players such as the European Union, the United
States and the OECD will have trans-national impact. There are some
practical steps both to strengthen and maintain the investigative capability
of law enforcement and national security which should be undertaken and some
greater protection given to the covert operational methods of law
enforcement and national security agencies. These are discussed in more
detail in Chapter 6.

5.1.9      The Privacy Commissioner, the New South Wales Anti-
Discrimination Board and various lawyers and academics with a strong
interest in privacy issues were concerned there should be no diminution of
the stringent program of oversight and accountability where intrusive powers
were exercised. 60 I concur entirely with that attitude. A view seemed to
emerge that the Commonwealth's oversight and accountability arrangements
were more effective than those of the States. The Review found general
support for the approach of increasing, to some small degree, the warranted
intrusive powers directed against persons the subject of serious
investigations, rather than imposing a penalty on the whole community by
attempting, in vain fashion, to limit or control the use of encryption.

5.1.10 Some consideration was given to the idea that the department vested
with the driving and coordination function on cryptography policy might
ensure Ministers were kept abreast of developments overseas and the changing
situation and requirements for Australia. On reflection, it was felt this
function would more effectively be discharged by a further review, on terms
similar to this one. There is need for that degree of detachment in the
conduct of a review so that all views may be garnered and synthesised into
policy options. This is more readily extended to a reviewer than an official
with daily responsibility for elements of the policy. A time of late 1997
would allow for the passage of 12 months since this review, a significant
period of technological development, some experience of a deregulated
telecommunications market and any impact on law enforcement and national
security, the preparation by the AFP of the proposed submission on the
impact of the loss of real-time access to voice and data communications 61,
the conclusion of the OECD drafting exercise and legislative proposals being
brought forward in Britain and the United States.

5.2      Export Controls

5.2.1      The Review was invited to examine the effectiveness of
Australia's export controls on encryption technology. How this issue might
be addressed depends very much on the interest being espoused. As the Review
moved among its primary catchment area, parties representing privacy, law
enforcement or national security interests, it was apparent no uniform
judgement could be made. Few who spoke to the Review thought the issue of
Australia's export controls could be divorced from the export controls of
the United States. That the United States was but one of a number of
signatory countries, first to COCOM and more recently to the Wassenar
agreement, seems generally to be ignored. Its super-power status and
position as the principal global software manufacturer prompt an
identification of those agreements with the national interest of the United
States

5.2.2      The Australian government effects controls on the export of
defence and related goods through the Customs Act 1901, the Customs
(prohibited Exports) Regulations and, the guidelines Australian Controls on
tile Export of Defence and related Goods - Guidelines for Exporters. issued
in March 1994 and the Australian Controls on the Export of Technology With
Civil and Military Applications - A Guide for Exporters and Importers issued
in November 1994. The controls specify a range of cryptography products,
such as cryptographic equipment, software controlling the function of
cryptographic equipment, computers performing such functions, mechanical
bits and pieces used in these processes and applications software for such
purposes.

5.2.3      The context of the controls make it clear the government
encourages the export of defence and related goods where these do not
conflict with the national interest or Australia's external obligations. The
Strategic Trade Policy and Operations Section of the Department of Defence
considers export applications and makes recommendations on them. It also
works closely with manufacturers, where possible, to advise on products and
applications eligible for export.

5.2.4      From the vantage point of the Defence Department, and the
Review's terms of reference require particular regard be paid to national
security and defence interests, the principal defensive goal of export
controls is the prevention of the proliferation of 'strong' encryption.
Various commentators thought Australia's export controls may have had some
effect in this regard though they suspected American export controls have
much the greater impact. A claimed by-product or secondary benefit is that
export controls may have aided the Australian cryptographic industry,
enabling it to export and market more competitively in the region. This
claim, couched in the subjunctive tense, was disputed by many but does not
bear on the primary defensive goal of export controls.

5.2.5      From a strategic perspective of the IT industry in Australia,
changes to United States export controls, certainly changes of the order
advocated in the Republican bills before the Congress, were considered
deleterious by sections of industry. This view was based on the premise that
all strategic decisions of the industry have been predicated on the
expectation that export controls, Australian and American, would not
significantly vary. The more controlled relaxation of export controls
announced by the United States Vice-President on 1 October 1996 mark a
departure from that planning base but are less extreme than some have
advocated. 62

5.2.6      There were, however, more particular indications of a negative
side to export controls. Software and hardware manufacture is dominated by
the United States, so business, IT or otherwise, has to ensure product
compatibility when buying products. It was said, almost uniformly,
Australian products tended to be more expensive (from small amounts to some
thousands of dollars), less convenient (US software applications may be
purchased in thousands of shops but hunting is often required to find the
Australian equivalent) and problems of compatibility frequently arise with
systems geared to American products and applications. Major banks have the
capacity to step around this problem and purchase off-shore.

5.2.7      When particular judgements were offered about the impact of
United States export controls, the point was always made that the United
States was one of a considerable number of countries linked first under
COCOM and more recently under the Wassenar agreement and should not,
therefore, be viewed as acting alone. This was uniformly countered with the
view that the United States position as a military and economic super-power,
combined with its dominant position in the software production market, gave
it the critical voice in any grouping to which it belonged or sponsored.

5.2.8      Some irritation was expressed with the export licence system.
Certainly, there was appreciation that 'continuing licences' had been
introduced by DSD, enabling manufacturers to export to foreign countries or
specified companies for a 12 month period, without reference back to the
Directorate.

5.2.9      It is a truism to note that research and development take time. A
strong view was put to the Review by the IT industry that incentives to
undertake R&D in Australia are diminishing and likely to continue to do so.
Even without the pressure which a relaxation of US export controls would
cause, a migration of both technology and the research and development
effort from Australia is likely. Any amelioration of the export control
regime would likely hasten that trend.

5.2.10      A common banking industry view was that while Australian
encryption products were always available, they did not always meet business
needs. American products normally offered functionality, but their
availability was frequently uncertain. End user licensing is seen as a
problem for banks as the purpose is often wider than the commercial
transaction and any part- escrowing of keys would render the system
insecure. Consequently, banks are sometimes forced to rewrite software or
undertake substantial work to link or cause to interface two separate
products. Because some of these couplings are 'unnatural', the expected
productivity benefits are reduced.

5.2.11      One consequence of the abolition of US export controls or
substantial contraction of them is likely to be an outbreak of a condition
which might be termed 'key length envy' - the assumption that by simply
lengthening the key a greater degree of security is obtained. Of itself this
contention is simplistic. What matters is the key space, or the pool from
which keys are drawn, the soundness of the operating system and the
operator's procedures. Providing the algorithm is sound, the operating
standards are high and functionality is not adversely affected, a longer key
will offer more security than a shorter one. Key length estimates are
normally geared to what is required in 20 years' time and that is considered
adequate protection against concerted efforts to discover them. There is a
general wariness in some business circles of the enormous amount of idle
time which exists for the computing power of large-scale corporations and
the purposes to which that power might be put, but that, as they say, is
another story.

Footnotes:

56 Paper on Regulatory Intent Concerning Use of Encryption on Public
Networks, issued by the Department of Trade and Industry. London. 11 June
1996, paragraph 2 and paragraph 16. See Annex D.

57 Nigel Waters, 'Street Surveillance and Privacy" in Privacy Law & Policy
Reporter, Vol 3, No 3, June 1996, p 49.

58 The OECD Guidelines are attached as Annex E to this report.

59 A discussion paper to this effect was issued by the Attorney-General in
September 1996.

60 While these views have been made clear in publications and writings, they
were repeated to the Review during discussions in Sydney on 10-11 July 19%.

61 See finding 1.2.19.

62 The United states Vice President's statement on encryption is set out in
Annex F

Chapter 6

----------------------------------------------------------------------------