-Caveat Lector-

http://www.newsmax.com/archives/articles/2001/5/14/203404.shtml

source documents - http://www.softwar.net/clipper.html

U.S. Considered Sharing Security Secrets With China, Syria, Pakistan

Charles R. Smith
Tuesday, May 15, 2001

Newly declassified documents show that America considered sharing secret
computer security code "keys" with foreign powers including China, Syria and
Pakistan.

The documents include a secret 1993 CIA cable on the "Clipper" project, a
computer security chip developed by the U.S. government. The Clipper chip
contained advanced "key recovery" surveillance technology, allowing the
government to secretly tap phone conversations and monitor computer
communications.

"Are Clipper devices likely to be permitted for importation and use in the
host
country?" asked a secret 1993 CIA cable addressed to the U.S. embassies in
Beijing, Damascus and Islamabad.

"Would the host country demand joint key holding or exclusive rights to
Clipper
keys for law enforcement or intelligence purposes?"

"The U.S. intelligence community is concerned about the potentially profound
impact on collection capabilities of the widespread foreign use of
increasingly
sophisticated encryption devices," states the secret CIA cable.

"Is there the possibility of cryptography 'race'?" asks the CIA cable.

The secret 1993 CIA cable is one of 69 documents released by the U.S. State
Department on the secret Clipper chip project. The documents were forced
from
the State Department through the Freedom of Information Act.

In addition, the State Department refused to release 12 documents as
classified
"in the interest of national defense or foreign relations."

Surveillance on 'Everyone in the U.S.'

According to a top-secret 1992 memo, the Clipper chip contained an
"exploitable"
feature allowing the government to secretly monitor all communications.
However,
to be successful, the Clipper project also included plans to "mandate" the
surveillance chip to be manufactured into all U.S. phones and computers.

FBI Director William Sessions described the mandatory nature of the Clipper
project in a 1993 letter to George Tenet, then Bill Clinton's national
security
adviser.

"Technical solutions, such as they are, will only work if they are
incorporated
into all encryption products," noted Sessions.

"To ensure that this occurs, legislation mandating the use of Government
approved encryption products or adherence to Government encryption criteria
is
required."

In 1993, Department of Justice Assistant Attorney General Richard Colgate
wrote
to Webster Hubbell on the Clipper project. Hubbell, then assistant to
Attorney
General Janet Reno, was tasked by the Clinton administration to run the
top-secret Clipper surveillance program.

"FBI, NSA and NSC want to push legislation which would require all
government
agencies and eventually everyone in the U.S. to use a new public-key based
cryptography method," wrote Colgate in his letter to Hubbell.

Hubbell later left the Justice Department in 1994 after pleading guilty to
charges related to the Whitewater investigation. By 1997, the billion-dollar
Clipper project also fell into trouble and was canceled in favor of less
costly
key recovery surveillance technology then under development.

Eavesdropping Technology Sent to China

The newly released documents shows that the Clinton administration
considered
sharing secret Clipper surveillance keys with China and other hostile powers
in
order to monitor worldwide communications for "law enforcement" purposes.

However, during a 1997 interview, Adm. James McConnell, former director of
the
National Security Agency, confirmed that the Clinton administration gave the
sophisticated key recovery surveillance technology to communist China in
1996.

McConnell noted that the advanced technology gives China the power to
electronically lock out U.S. intelligence monitoring and lock in the Chinese
population.

"Even if the Chinese use weak encryption the sheer volume of their
communications will make it impossible for us to monitor. If China were to
erect
a public key infrastructure it will severely impact our intelligence
gathering
ability," stated McConnell.

He also stated that Clinton was aware that the advanced surveillance
technology
might be abused by hostile foreign powers.

"Can Key Recovery be used against dissidents and political opponents?" asked
Adm. McConnell.

"In a word, YES," he concluded emphatically.

'Serious Degradation of National Security'

The newly declassified documents suggesting that Beijing, Damascus and
Islamabad
might be given access to secret code keys drew sharp criticism from inside
and
outside of Capitol Hill.

"The compromising of U.S. sensitive encryption systems demonstrates the
dangerous international environment that we now must face," stated Al
Santoli,
senior defense adviser to Rep. Dana Rohrabacher, R-Calif.

"The Clinton administration's sharing of key recovery technology with
adversarial countries such as China, and countries that have housed or
sponsored
terrorist groups such as Pakistan or Syria, shows the serious degradation of
national security that the Bush administration has inherited," noted
Santoli.

"It's another example of the utter wackiness of the Clipper project," stated
Michael Ledeen, a resident scholar at the American Enterprise Institute and
author of "Machiavelli on Modern Leadership."

"I'm not sure one can conclude from this cable that we were automatically
going
to share the 'keys' with the listed governments; we may simply have been
trying
to find out whether the other countries would INSIST on having the key which
might be a negative for the project itself," noted Ledeen.

"Why not share all our code keys?" questioned another senior national
security
official who requested that he not be identified.

"After all, China and Syria are on the U.N. Human Rights Commission and
we're
not," he concluded with disgust.


=================================================================
                                Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

          FROM THE DESK OF:

                               *Michael Spitzer*    <[EMAIL PROTECTED]>

               The Best Way To Destroy Enemies Is To Change Them To Friends
=================================================================

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to