-Caveat Lector-

-------- Original Message --------
Subject: Encryption: EU Report: U.S. Uses Key Escrow To Steal Secrets
Date: Fri, 17 Sep 1999 15:19:28 -0500 (CDT)
From: MichaelP <[EMAIL PROTECTED]>
Organization: ?
To: undisclosed-recipients:;

Technology News

http://www.techweb.com/wire/story/TWB19990518S0004

Report: U.S. Uses Key Escrow To Steal Secrets (05/18/99, 9:27 a.m. ET)

By Madeleine Acey, TechWeb

European plans for controlling encryption software are nothing to do with
law enforcement and everything to do with U.S. industrial espionage,
according to a report released by the European Parliament on Friday.

The working document for the Scientific and Technological Options
Assessment panel said the United States has tried to persuade European
Union countries to adopt its key escrow or key recovery policies --
allowing backdoor access to encryption programs -- saying this was
necessary to read messages exchanged by criminals.

But the report details how the UKUSA alliance -- made up of the United
Kingdom, United States, Canada, Australia, and New Zealand -- has used its
secret Echelon global spying network to intercept confidential company
communications and give them to favored competitors. Thomson S.A., located
in Paris, and Airbus Industrie, based in Blagnac Cedex, France, are said
to have lost contracts as a result of information passed to rivals.

"The U.S. government misled states in the EU and [Organization for
Economic Cooperation and Development] about the true intention of its
policy," the report adds.

"Between 1993 and 1997 police representatives were not involved in the NSA
[National Security Agency]-led policy-making process for key recovery.
Despite this, during the same period the U.S. government repeatedly
presented its policy as being motivated by the stated needs of
law-enforcement agencies."

The document went on to detail how the agencies specifically studied
Internet data. Apart from scanning all international communications lines
-- using 120 satellites, microwave listening stations, and an adapted
submarine -- it said they stored and analyzed Usenet discussions. "In the
U.K., the Defence Evaluation and Research Agency maintains a 1-terabyte
database containing the previous 90 days of Usenet messages."

The "NSA employs computer 'bots' (robots) to collect data of interest,"
the report adds. "For example, a New York website known as JYA.COM offers
extensive information on cryptography and government communications
interception activities. Records of access to the site show that every
morning it is visited by a bot from NSA's National Computer Security
Center, which looks for new files and makes copies of any that it finds."

According to a former employee, NSA had by 1995 installed "sniffer"
software to collect traffic at nine major Internet exchange points.

The report offered evidence that a leading U.S. Internet and
telecommunications company had contracted with the NSA to develop software
to capture Internet data of interest, and that deals had been struck with
Microsoft, Lotus, and Netscape to alter their products for foreign use.

"There can't be any doubt any longer that there's an economic imperative
to these policies," said Simon Davies, director of Privacy International.
"We have been lied to for years. But it will be up to companies like
Airbus to take legal action to force a definition of national security in
the context of the European Union. Then we can establish a legal framework
and appeals process."

Meanwhile, the Financial Times reported on Monday that the U.K. government
had agreed to take key escrow "off the agenda" and had accepted industry
proposals for a "largely voluntary program of co-operation with the
security services".

Government officials could not confirm the report.

But Caspar Bowden, director of the Foundation for Information Policy
Research, questioned how far any compromise would go. "Will they persist
with statutory licensing [of trusted third parties] and criminal
legislation on decryption warrants?" he asked.

Andrew Dornan of Data Communications International contributed to this
report.



*** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material
is distributed without profit to those who have expressed a prior interest
in receiving the included information for research and educational
purposes. ***

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to