Law in the Internet Society

View   r16  >  r15  >  r14  >  r13  >  r12  >  r11  ...
NikolaosVolanisFirstPaper 16 - 07 Sep 2011 - Main.IanSullivan
Line: 1 to 1
Changed:
<
<
META TOPICPARENT name="FirstPaper"
>
>
META TOPICPARENT name="FirstPaper2009"
 Ready for 2nd review

NikolaosVolanisFirstPaper 15 - 04 Feb 2010 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<
ready for 2nd review
>
>
Ready for 2nd review
 

NikolaosVolanisFirstPaper 14 - 03 Feb 2010 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<
ready for review
>
>
ready for 2nd review
 
Line: 17 to 17
  A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over electronic communications networks.

Changed:
<
<
B. In order to achieve this purpose, the state has to engage either in regulation of technology directly (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt a preferable techological solution.
>
>
B. In order to achieve this purpose, the state engages either in regulation of technology directly (regulation by legislation) or indirectly either by incentivising the providers of communications hardware and software to adopt a preferable technological solution or by influencing the adoption of certain industry standards
  C. Being for-profit entities, these intermediaries are primarily concerned with minimizing losses, by avoiding governmental contempt which could lead to administrative penalties or other sanctions.

Line: 33 to 33
 Our recent discussion regarding encryption technology not only demonstrates that the state can have an interest in regulating electronic communications code (as this allows for better enforcement and traceability), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation.

A. + B. In the U.S., both the Arms Export Control Act (and the Traffic in Arms Regulations) as well as the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to national defense and law enforcement respectively.

Changed:
<
<
In the wake of widespread migration to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met considerable protest (see here for example), the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17) - or by using the government's power as a major consumer of cryptographic products to rig the market). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology. After all, due to consitutional concerns, the adoption of such technology was voluntary. However, the solution did not come from large commercial entities, but from small grassroots initiatives.
>
>
In the wake of widespread migration to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met considerable protest (see here for example), the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17) - or by using the government's power as a major consumer of cryptographic products to rig the market). However, one of the reasons which led the U.S. Government to gradually abandon its preferred encryption technology was the release and swift propagation of independent, free, and considerably better software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements). After all, due to consitutional concerns, the adoption of such technology was voluntary. This response to governmental plans did not originate from large commercial entities, but from small grassroots initiatives.
 
Changed:
<
<
C. + D. Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. The aforementioned examples demonstrate that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be incentivized or disincentivized by the state in adopting specific technological solutions or complying with governmental regulations. Although, for example, the IT-savvy community has argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile, still, companies in the business of producing encryption technology prefered to comply with government regulations, in fear of invoking government contempt (or worse). Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.
>
>
However, the aforementioned observations should be viewed with a grain of sand: the limited scope of the present article fails to demonstrate the magnitude of intricacies involved not only with respect to the interests of various actors engaged in the hardware manufacture or software production for telecommunication equipment, but also with respect to the attempts to regulate the industry, either directly or through the establishment of standard setting organizations (SSOs). The stakes and interests of each party differ, depending on this party's position in the industry (hardware manufacturer, software provider, network operator, various law enforcement agencies, different states and jurisdicitons, state-influenced SSOs, privacy-sensitive NGOs, etc.), and its size and influence either on the rest of the sector-specific industry (e.g. telecoms hardware), the general telecommunications market, or even the public at large; This dynamic and ever-changing "universe" of technological challenges and power relationships between different actors creates an environment in which attempts to predict the outcome of the osmosis between politics, law and technology are often nothing more than wishful thinking. However, much of the debate centers on the degree of control asserted over the routers of a telecommunications network, as network operators want to maintain control of their network, and law enforcement parties want real time monitoring of the information passing through the routers. In this context, the questions remains how encryption technologies disrupt or promote the aforementioned goals.

C. + D. Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. The aforementioned examples demonstrate that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be incentivized or disincentivized by the state in adopting specific technological solutions or complying with governmental regulations. Although, for example, the IT-savvy community has argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile, still, companies in the business of producing encryption technology preferred to comply with government regulations, in fear of invoking government contempt (or worse). Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.

 The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results. A similar story took place with Yahoo! in 2002, whereas Microsoft's Bing it the most recent example search engine that respectfully bowed down before Party propaganda.
Changed:
<
<
E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential. In contrast to the top-down ("cathedral") model of organisational structure and production, where directives are set by the top and followed incontestably, the process behind free software production resembles more a "great babbling bazaar of different agendas and approaches", where authority follows and derives from responsibility and participation: the more an individual contributes to a project and takes responsibility for the pieces of software, the more decision authority that individual is granted by the community. This Aristotelian context of participation (in which the latter is perceived as a manifestation and reward of the highest virtue, underlines both the open source software production process and participatory democracy).
>
>
Again, it should be stated that the aforementioned examples risk to create a false and simplified image about the tensions and stakes involved in the telecommunications industry, by emphasizing primarily on the relationship between the state and the major telecom or Internet private players: in this particular context, the ultimate question of remains unaddressed, touching upon the Platonic debate on control, government and morality: if the government manages to assert total control over the established networks and standards, quis custodiet ipsos custodes? Is "national security" or "battle against terrorism" a new form of "noble lie"? And what will be the role of encryption in the communications infrastructure? Will it still be possible to push it at the "edge" of the -still- dum network, which would allow us to encrypt all content we transmit over it, or will such control over the network eventually lead to it gaining more "intelligent" capabilities, thus filtering out all encrypted material (or at least, all material which is encrypted by not authorized to be encrypted)? At the time being, it seems that we are benefiting from the inertia created by the complexity of the system, which allows for a certain degree of privacy and anonymity.

E. Still, regardless of how complex these relationships are, I hope that the foregoing discussion has demonstrated that communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential. In contrast to the top-down ("cathedral") model of organizational structure and production, where directives are set by the top and followed incontestably, the process behind free software production resembles more a "great babbling bazaar of different agendas and approaches", where authority follows and derives from responsibility and participation: the more an individual contributes to a project and takes responsibility for the pieces of software, the more decision authority that individual is granted by the community. This Aristotelian context of participation (in which the latter is perceived as a manifestation and reward of the highest virtue, underlines both the open source software production process and participatory democracy).

 

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, NikolaosVolanis


NikolaosVolanisFirstPaper 13 - 31 Jan 2010 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 111 to 111
  insecurity for its own communications, and it didn't want to do that.
Added:
>
>

Thank you, Professor. I'll attempt another review, based on our recent conversation

-- NikolaosVolanis - 31 Jan 2010

 
 
<--/commentPlugin-->
\ No newline at end of file

NikolaosVolanisFirstPaper 12 - 26 Jan 2010 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 70 to 70
 Anyhow, other than China, what you are saying seems very rational.

-- AndoY - 05 Dec 2009

Added:
>
>
Nikolaos, you have no idea how deep into the details of technological design government regulation of telecommunications industry machinery extends. The part of the market you don't discuss, and which is not strongly documented outside the industry and the segment of academia that studies network traffic engineering, is the "heavy iron" of telecomms: the routers. You mention one Cisco box and one agreement to assist tapping, but that's trivial. Network operators buy and operate hundreds of thousands of routers that perform not just all the switching in the net, but all the real-time monitoring of all the switching in the net. Those boxes not only are designed to make it possible for the network operator to monitor operations and the law enforcement operator to monitor communications, they are also built to resist intrusion by other parties under extremely exacting government regulatory standards that affect design decisions from the hardware on up. Those regulatory standards are also implemented, largely, through government acquisition controls, which you could consider "voluntary" standards if you like, but which are dominant nonetheless.

Maybe you are right that we don't want all this interpenetration of government and private telecomms, but someone will be running those big routers, and I do want both the parts that allow the routers to be monitored comprehensively by whoever is operating them, and I also want all the technological overkill that goes into making it as hard as humanly possible to sneak any code into those routers. The reality that national governments are going to force their way into those routers from a technological perspective is not something I can prevent technologically: here my defense is technology further out to the edge of the net, where I can encrypt my own traffic and a snowstorm of everyone's encrypted traffic can proceed as I describe in So Much for Savages. Oh, and there's the rule of law.

But free technology has its limits. It's all very heartwarming to attribute the failure of Clipper to the success of PGP, but I think that's not really what happened. I think Clipper failed because the US Govt realized that it was preparing to assure insecurity for its own communications, and it didn't want to do that.
 
 
<--/commentPlugin-->

NikolaosVolanisFirstPaper 11 - 05 Dec 2009 - Main.AndoY
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 59 to 59
 Thanks for your comment, Brian. I followed your advice, trying to stay within the word limit. I agree with you, point E. deserves more analysis than that found in this ending paragraph.

-- NikolaosVolanis - 04 Dec 2009

Added:
>
>

Nikolaos,

I like your essay.

One thing I came to my mind reading your essay is that neither Google nor Firefox may be the strongest search platform in China. They have their own local engine like Baidu.com. The way Chinese Internet is developing seems quite different from the rest of the world. A local search engine like Baidu.com should have better relationship with the Chinese government and maybe impossible even for open source players to gain a significant presence in China.

Anyhow, other than China, what you are saying seems very rational.

-- AndoY - 05 Dec 2009

 
 
<--/commentPlugin-->

NikolaosVolanisFirstPaper 10 - 04 Dec 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 39 to 39
 The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results. A similar story took place with Yahoo! in 2002, whereas Microsoft's Bing it the most recent example search engine that respectfully bowed down before Party propaganda.
Changed:
<
<
E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential
>
>
E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential. In contrast to the top-down ("cathedral") model of organisational structure and production, where directives are set by the top and followed incontestably, the process behind free software production resembles more a "great babbling bazaar of different agendas and approaches", where authority follows and derives from responsibility and participation: the more an individual contributes to a project and takes responsibility for the pieces of software, the more decision authority that individual is granted by the community. This Aristotelian context of participation (in which the latter is perceived as a manifestation and reward of the highest virtue, underlines both the open source software production process and participatory democracy).
 

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, NikolaosVolanis

Line: 53 to 52
 I enjoyed your essay. I agree that in the context you describe the tools of communication "surpass[] the field of engineering," and I also agree that the power of free software in such a domain, especially in light of governmental influence (as you describe), is significant. My only suggestion would be to consider drawing out E. just a bit more. Your discussion of C+D in light of A+B does a good job of painting a picture of the current situation, and in doing so your essay clearly conveys the dangers of the status quo. While I follow what you mean in E. and how you see it as a possible remedy, it would be helpful to add a sentence or two explaining it further. Otherwise, I appreciated the detailed links and careful historical discussion. I think the essay is nicely done.

-- BrianS - 03 Dec 2009

Added:
>
>

Thanks for your comment, Brian. I followed your advice, trying to stay within the word limit. I agree with you, point E. deserves more analysis than that found in this ending paragraph.

-- NikolaosVolanis - 04 Dec 2009

 
 
<--/commentPlugin-->

NikolaosVolanisFirstPaper 9 - 03 Dec 2009 - Main.BrianS
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 46 to 46
 # * Set ALLOWTOPICVIEW = TWikiAdminGroup, NikolaosVolanis

Added:
>
>

Nikolaos,

I enjoyed your essay. I agree that in the context you describe the tools of communication "surpass[] the field of engineering," and I also agree that the power of free software in such a domain, especially in light of governmental influence (as you describe), is significant. My only suggestion would be to consider drawing out E. just a bit more. Your discussion of C+D in light of A+B does a good job of painting a picture of the current situation, and in doing so your essay clearly conveys the dangers of the status quo. While I follow what you mean in E. and how you see it as a possible remedy, it would be helpful to add a sentence or two explaining it further. Otherwise, I appreciated the detailed links and careful historical discussion. I think the essay is nicely done.

-- BrianS - 03 Dec 2009

 
 
<--/commentPlugin-->
\ No newline at end of file

NikolaosVolanisFirstPaper 8 - 22 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 37 to 37
 C. + D. Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. The aforementioned examples demonstrate that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be incentivized or disincentivized by the state in adopting specific technological solutions or complying with governmental regulations. Although, for example, the IT-savvy community has argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile, still, companies in the business of producing encryption technology prefered to comply with government regulations, in fear of invoking government contempt (or worse). Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.
Changed:
<
<
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results. A similar story took place with Yahoo! in 2002
>
>
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results. A similar story took place with Yahoo! in 2002, whereas Microsoft's Bing it the most recent example search engine that respectfully bowed down before Party propaganda.
 E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential

NikolaosVolanisFirstPaper 7 - 21 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
ready for review
Line: 43 to 43
 

Deleted:
<
<
 # * Set ALLOWTOPICVIEW = TWikiAdminGroup, NikolaosVolanis
Added:
>
>

 
<--/commentPlugin-->
 \ No newline at end of file

NikolaosVolanisFirstPaper 6 - 19 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<
please do not review yet.
>
>
ready for review
 
Line: 21 to 21
  C. Being for-profit entities, these intermediaries are primarily concerned with minimizing losses, by avoiding governmental contempt which could lead to administrative penalties or other sanctions.

Changed:
<
<
D. In this context, when communications hardware and software is provided by commercial enterprises, asserting control over the latter through indirect regulation asserts influence over the specifications of hardware and software output. Thus, state digital surveillance and enforcement interests are better served through a top-down production process by commercial actors, whereas the commercial actors may achieve higher profits or preferable treatment by ensuring that their hardware and software complies with state-promoted specifications.
>
>
D. In this context, when communications hardware and software is provided by commercial enterprises, asserting control over the latter through indirect regulation asserts influence over the specifications of hardware and software output. Digital surveillance and enforcement interests are better served through a top-down production process by commercial actors, whereas the latter may achieve higher profits or preferable treatment by ensuring that their hardware and software complies with state-endorsed specifications.
  E. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.
Line: 30 to 30
 

2. Analysis

Changed:
<
<
Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating electronic communications code (as this allows for better enforcement and traceability), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation.
>
>
Our recent discussion regarding encryption technology not only demonstrates that the state can have an interest in regulating electronic communications code (as this allows for better enforcement and traceability), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation.
 A. + B. In the U.S., both the Arms Export Control Act (and the Traffic in Arms Regulations) as well as the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to national defense and law enforcement respectively.
Changed:
<
<
In the wake of widespread migration to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17) - or by using the government's power as a major consumer of cryptographic products to rig the market). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology. After all, due to consitutional concerns, the adoption of such technology was voluntary. However, the solution did not come from large commercial entities, but from small grassroots initiatives.
>
>
In the wake of widespread migration to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met considerable protest (see here for example), the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17) - or by using the government's power as a major consumer of cryptographic products to rig the market). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology. After all, due to consitutional concerns, the adoption of such technology was voluntary. However, the solution did not come from large commercial entities, but from small grassroots initiatives.
 C. + D. Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. The aforementioned examples demonstrate that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be incentivized or disincentivized by the state in adopting specific technological solutions or complying with governmental regulations. Although, for example, the IT-savvy community has argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile, still, companies in the business of producing encryption technology prefered to comply with government regulations, in fear of invoking government contempt (or worse). Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.
Changed:
<
<
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results.
>
>
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results. A similar story took place with Yahoo! in 2002
 E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential

NikolaosVolanisFirstPaper 5 - 18 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
please do not review yet.
Line: 31 to 31
 

2. Analysis

Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating electronic communications code (as this allows for better enforcement and traceability), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation.
Deleted:
<
<
A. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to national defense and law enforcement respectively. In the wake of commercial transition to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.
 
Changed:
<
<
Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. In this context, it demonstrates that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be appropriately incentivized or disincentivized by the State in adopting specific technological solutions or complying with governmental regulations. For example, at the start of the debate over the government’s intent to control encryption technologies, the IT-savvy community had argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile. Still, companies in the business of producing encryption technology prefered to comply with government regulations. Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.
>
>
A. + B. In the U.S., both the Arms Export Control Act (and the Traffic in Arms Regulations) as well as the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to national defense and law enforcement respectively. In the wake of widespread migration to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17) - or by using the government's power as a major consumer of cryptographic products to rig the market). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology. After all, due to consitutional concerns, the adoption of such technology was voluntary. However, the solution did not come from large commercial entities, but from small grassroots initiatives.
 
Changed:
<
<
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese regulation is thus better enforced (embedded in computer code) and Google can now access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results.
>
>
C. + D. Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. The aforementioned examples demonstrate that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be incentivized or disincentivized by the state in adopting specific technological solutions or complying with governmental regulations. Although, for example, the IT-savvy community has argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile, still, companies in the business of producing encryption technology prefered to comply with government regulations, in fear of invoking government contempt (or worse). Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.
 
Changed:
<
<
In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential
>
>
The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese governmental concerns about information over the net are fully addressed (since they are embedded in computer code) and Google can access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results.

E. In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential

 


NikolaosVolanisFirstPaper 4 - 18 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
please do not review yet.
Line: 13 to 13
 

1. The Argument

Changed:
<
<
I will attempt to demonstrate how the interdependence of governmental and private commercial interests are detrimental for the development of communication networks and communications related software. My basic proposition is the following: A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over electronic communications networks. B. In order to achieve this purpose, the state has to engage either in regulation of technology directly (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt a preferable techological solution. C. To the extent that these intermediaries are commercial enterprises, they are primarily concerned with minimizing losses, by avoiding governmental contempt which could lead to administrative penalties or other sanctions. D. In this context, if communications hardware and software is provided by commercial enterprises, asserting control over them through indirect regulation asserts influence over the specifications of hardware and software output. Thus, state digital surveillance and enforcement interests are better served through a top-down production process by commercial actors, whereas the commercial actors may achieve higher profits or preferable treatment by ensuring that their hardware and software complies with state-promoted specifications. E. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.
>
>
I will attempt to demonstrate how the interdependence of governmental and private commercial interests are detrimental for the development of communication networks and communications related software. My basic proposition is the following:

A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over electronic communications networks.

B. In order to achieve this purpose, the state has to engage either in regulation of technology directly (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt a preferable techological solution.

C. Being for-profit entities, these intermediaries are primarily concerned with minimizing losses, by avoiding governmental contempt which could lead to administrative penalties or other sanctions.

D. In this context, when communications hardware and software is provided by commercial enterprises, asserting control over the latter through indirect regulation asserts influence over the specifications of hardware and software output. Thus, state digital surveillance and enforcement interests are better served through a top-down production process by commercial actors, whereas the commercial actors may achieve higher profits or preferable treatment by ensuring that their hardware and software complies with state-promoted specifications.

E. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.

 

Changed:
<
<

2. Supporting Material

>
>

2. Analysis

 
Changed:
<
<
Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating code (as this allows for better enforcement), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation. A. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to law enforcement. In the wake of packet switching telephony, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.
>
>
Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating electronic communications code (as this allows for better enforcement and traceability), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation. A. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to national defense and law enforcement respectively. In the wake of commercial transition to digital telephony and data networks such as the net, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.
 Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. In this context, it demonstrates that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be appropriately incentivized or disincentivized by the State in adopting specific technological solutions or complying with governmental regulations. For example, at the start of the debate over the government’s intent to control encryption technologies, the IT-savvy community had argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile. Still, companies in the business of producing encryption technology prefered to comply with government regulations. Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.

NikolaosVolanisFirstPaper 3 - 15 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
please do not review yet.
Line: 13 to 13
 

1. The Argument

Changed:
<
<
I will attempt to demonstrate how the interdependence of governmental and private commercial interests are detrimental for the development of communication networks and communications related software. My basic proposition is the following: A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over the net. B. In order to achieve this purpose, the state has to engage either directly in regulation of technology (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt the preferred techological solution. C. To the extent that these intermediaries are commercial enterprises, they are primarily concerned with maximizing profits, by avoiding governmental contempt or administrative penalties. E. In this context, if communications hardware and software is provided by commercial enterprises, asserting control over them through indirect regulation ensures control of their hardware and software output. Thus, the State prefers commercial actors to better regulate the Internet (particularly since regulating individual behavior seems rather impossible), while the commercial actors may achieve higher profits by ensuring that their hardware and software complies with state-promoted specifications. F. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.
>
>
I will attempt to demonstrate how the interdependence of governmental and private commercial interests are detrimental for the development of communication networks and communications related software. My basic proposition is the following: A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over electronic communications networks. B. In order to achieve this purpose, the state has to engage either in regulation of technology directly (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt a preferable techological solution. C. To the extent that these intermediaries are commercial enterprises, they are primarily concerned with minimizing losses, by avoiding governmental contempt which could lead to administrative penalties or other sanctions. D. In this context, if communications hardware and software is provided by commercial enterprises, asserting control over them through indirect regulation asserts influence over the specifications of hardware and software output. Thus, state digital surveillance and enforcement interests are better served through a top-down production process by commercial actors, whereas the commercial actors may achieve higher profits or preferable treatment by ensuring that their hardware and software complies with state-promoted specifications. E. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.
 

2. Supporting Material

Changed:
<
<
Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating code (as this allows for better enforcement), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to law enforcement. In the wake of packet switching telephony, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.
>
>
Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating code (as this allows for better enforcement), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation. A. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to law enforcement. In the wake of packet switching telephony, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.
 Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. In this context, it demonstrates that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be appropriately incentivized or disincentivized by the State in adopting specific technological solutions or complying with governmental regulations. For example, at the start of the debate over the government’s intent to control encryption technologies, the IT-savvy community had argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile. Still, companies in the business of producing encryption technology prefered to comply with government regulations. Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.

NikolaosVolanisFirstPaper 2 - 15 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Added:
>
>
please do not review yet.
 

NikolaosVolanisFirstPaper 1 - 05 Nov 2009 - Main.NikolaosVolanis
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"

Arrested Development: musings on the interdependence of State and commercial actors in the development of communication software and hardware

-- By NikolaosVolanis - 05 Nov 2009

1. The Argument

I will attempt to demonstrate how the interdependence of governmental and private commercial interests are detrimental for the development of communication networks and communications related software. My basic proposition is the following: A. State law enforcement interests mandate specific technological solutions which allow for increased traceability of the behavior of individuals over the net. B. In order to achieve this purpose, the state has to engage either directly in regulation of technology (regulation by legislation) or indirectly by incentivising the providers of communications hardware and software to adopt the preferred techological solution. C. To the extent that these intermediaries are commercial enterprises, they are primarily concerned with maximizing profits, by avoiding governmental contempt or administrative penalties. E. In this context, if communications hardware and software is provided by commercial enterprises, asserting control over them through indirect regulation ensures control of their hardware and software output. Thus, the State prefers commercial actors to better regulate the Internet (particularly since regulating individual behavior seems rather impossible), while the commercial actors may achieve higher profits by ensuring that their hardware and software complies with state-promoted specifications. F. In this business-political embrace, grassroots software or hardware development may offset a drive towards excessive governmental control over the digital behavior of individuals.

2. Supporting Material

Our recent discussion regarding encryption technology not only demonstrates that the State can have an interest in regulating code (as this allows for better enforcement), but also that such control can be exercised through commercial technologies, when the latter are favored by regulation. In the U.S., both the Arms Export Control Act and the Communications Assistance for Law Enforcement Act (CALEA, enacted in 1994) dealt with the critical issue of cryptography and the danger that this technology may pose to law enforcement. In the wake of packet switching telephony, CALEA’s purpose was to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications operators and manufacturers of telecommunications equipment take necessary steps to ensure that their equipment and services support built-in surveillance capabilities, so as to allow state monitoring of communications traffic in real-time. Around the same time (1993), the U.S government developed and promoted an encryption device to be adopted by telecommunications operators for voice transmission, the “Clipper Chip”. The core of that concept was based on the ability of the Government to override the encryption technology at will (“established authority”), since the cryptographic key of every device bearing the chip would be put in governmental escrow. Although this initiative met strong consumer protest, the U.S. government continued to press for key escrow by offering incentives to manufacturers (e.g. by allowing more relaxed export controls if key escrow was part of the software exported - for a more detailed account, see here (pp.15-17)). Still, with the release and swift propagation of independent free software such as PGP and Nautilus (open source software which provided strong encryption without key escrow requirements), it became impossible for the U.S. government to effectively advance its preferred encryption technology.

Indeed, by enabling both confidentiality and identification, encryption technology can be perceived as both “liberating” and “oppressive” technology, depending on the actual parameters that define its use. In this context, it demonstrates that as software or hardware development becomes a commercial activity, it is produced by a smaller number of for-profit entities, which, in turn can be appropriately incentivized or disincentivized by the State in adopting specific technological solutions or complying with governmental regulations. For example, at the start of the debate over the government’s intent to control encryption technologies, the IT-savvy community had argued that such an artificial attempt to control the flow of information and to restrain it within the U.S. would be futile. Still, companies in the business of producing encryption technology prefered to comply with government regulations. Likewise, a company called Network Associates (the successor of the PGP software), originally a strong opponent of encryption regulation, started to offer products that adopted key recovery mechanisms for corporations. With regard to the hardware industry, Cisco provides us with another example of a company submitting to governmental incentives through regulation: In 1998, it announced a router that would enable encryption (thus providing encryption at the OSI network layer, not the application layer, as it is the case with software such as PGP), but which would contain a switch which would allow the government to override such encryption (p.71) so as to monitor internet traffic.

The aforementioned cases indicate that the state may influence the supply of hardware and software by commercial entities, by effectively asserting indirect control over the commercial entities themselves. A final and more recent example may be that of Google and its political/business interaction with the Chinese government: Google adopts the technology mandated by brute political force; Chinese regulation is thus better enforced (embedded in computer code) and Google can now access and profit from the Chinese market. It takes a couple of golden handshakes and historical or current politically sensitive issues like “Tiananmen Protests” or “Tibetan independence” are seamlessly purged from the Google search results.

In this context, communications software and hardware acquires a meaning that surpasses the field of engineering. It becomes a form of control and thus a focus of political contest and choice (p. 28). And in such political contest, free software (“free as in free speech”) acquires its full potential

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, NikolaosVolanis


Revision 16r16 - 07 Sep 2011 - 00:44:13 - IanSullivan
Revision 15r15 - 04 Feb 2010 - 06:47:39 - NikolaosVolanis
Revision 14r14 - 03 Feb 2010 - 06:04:44 - NikolaosVolanis
Revision 13r13 - 31 Jan 2010 - 00:27:04 - NikolaosVolanis
Revision 12r12 - 26 Jan 2010 - 00:07:57 - EbenMoglen
Revision 11r11 - 05 Dec 2009 - 23:23:28 - AndoY
Revision 10r10 - 04 Dec 2009 - 19:41:58 - NikolaosVolanis
Revision 9r9 - 03 Dec 2009 - 06:52:18 - BrianS
Revision 8r8 - 22 Nov 2009 - 07:35:13 - NikolaosVolanis
Revision 7r7 - 21 Nov 2009 - 05:05:21 - NikolaosVolanis
Revision 6r6 - 19 Nov 2009 - 05:05:16 - NikolaosVolanis
Revision 5r5 - 18 Nov 2009 - 16:28:08 - NikolaosVolanis
Revision 4r4 - 18 Nov 2009 - 04:02:14 - NikolaosVolanis
Revision 3r3 - 15 Nov 2009 - 18:06:49 - NikolaosVolanis
Revision 2r2 - 15 Nov 2009 - 05:23:39 - NikolaosVolanis
Revision 1r1 - 05 Nov 2009 - 18:07:35 - NikolaosVolanis
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM