Home >Policies and Regulations >Encryption >Comments by Ambassador David Aaron

Comments by Ambassador David Aaron
Special Envoy for Cryptography

U.S. Envoy Outlines Foreign Encryption Policies

Foreign encryption policies, markets and legal access were among the topics of a January 28 speech by Ambassador David Aaron, Special Envoy for Cryptography to the RSA Data Security Conference in San Francisco.

U.S. allies "support the concept of lawful access by governments" to encrypted files and communications, reports Ambassador Aaron. He explained that "many governments in the interest of public safety, want stronger controls than we have."

"The international encryption market will not be a wide-open affair," he said. Addressing the RSA Data Security Conference, Ambassador Aaron said that as the encryption industry plans for the future, it should "take into consideration the likelihood that lawful access and key recovery will be a growing international requirement."

The Administration seeks to encourage the widespread use of encryption where users, in an emergency, can recover access to their keys needed to descramble their data. This would also enable law enforcement, under judicial authority, to gain access to encrypted data, as they do now with unscrambled evidence.

Despite our trading partners misgivings about the decision last October to relax U.S. export controls on encryption, Ambassador Aaron says that "all are willing to cooperate with us to work out the needed international arrangements" to make strong encryption work across international borders "while ensuring that public safety is not jeopardized."

Ambassador Aaron cited several cases where encryption was used in terrorist plots, drug dealing, child pornography and espionage. He stressed that despite the risks, the Clinton Administration policy on encryption "in no way seeks to expand the powers of law enforcement nor reduce the privacy of individuals. The intent is to maintain, in the face of technological change, the current legal instruments it has."

"Domestic use of key recovery will be voluntary, he emphasized. "All Americans will remain free to use any encryption system in the United States." Ambassador Aaron expressed appreciation for the contribution made by private industry to this policy initiative and called for even more dialogue and cooperation. He said that the result of such cooperation "can be a level of privacy and confidentiality never before available to both individuals and business."


Statement by Ambassador David Aaron
US Envoy for Cryptography

RSA Data Security Conference, January 28, 1997

International Views of Key Recovery

The first thing that I wanted to do in preparing for this assignment was to understand the concerns of industry and the general public.

I've had the pleasure of meeting with dozens of US and foreign industry leaders and representatives - not only those in the encryption business per se, but others in the field of electronic commerce, telecommunications, finance and other industries for which secure communications are essential. They have all impressed upon me the crucial importance of robust encryption for the future of their enterprises.

Businesses are increasingly reliant on private networks and the internet for their communications and operations. As proprietary information and intellectual property is transmitted over these networks, it must be protected by strong encryption.

Business is also increasingly multinational in nature. Thus, any system of encryption must be able to operate across national borders.

Businesses are becoming more aware of the need to recover encrypted files. Companies simply cannot risk loss of access to their valuable intellectual property because of lost passwords, accidents or, a rogue employee.

I have also had the opportunity to meet with representatives of privacy groups. They point out that every day our citizens are electronically transmitting more and more sensitive personal data, including medical, health, and financial information. Such transactions require robust security afforded by encryption.

Earlier in my career, I had the experience of working on a Congressional investigation of Government violations of Americans' right to privacy. So I well understand the concerns of privacy advocates. When Americans' fundamental rights are involved, it is understandable that the public will be extremely sensitive and cautious.

To enable encryption to be used widely for privacy protection and electronic commerce, rapid development of a support infrastructure is needed. This infrasture must provide the policies, product, and certificate services that will allow encryption to be used, and most important, used WITH CONFIDENCE.

The Administration supports this requirement, as exemplified by its initiative announced in October to promote the development of an international key management infrastructure.
The Administration envisions an infrastructure that, if developed wisely, will offer greater privacy and confidentiality than ever before. It will provide for authenticated transactions, robust confidentiality services, and key recovery features. The latter will enable users, and law enforcement under proper legal authority, the ability to regain access to encrypted data.

This approach addresses needs of the user while ensuring the public safety is not placed in jeopardy. While this has been a controversial issue, the ability to protect the rights of Americans flows from successfully fulfilling the basic public safety obligations of government.

Already the Justice Department has encountered important examples of instances where encryption has been used by terrorist and criminals. For example,

In the Aldrich Ames spy case, Ames was instructed by his Russian handlers to encrypt computer file information to be passed to them.

Ramzi Yosef, recently convicted of conspiring to blow up 10 US-owned airliners in the Far East, and his co-conspirators stored information about their terrorist plot in an encrypted computer file. (Yosef is on trial for his role as the mastermind of the World Trade Center bombing.)

In a child pornography case here in California, one of the subjects used encryption in transmitting obscene and pornographic images of children over the Internet.

In a major international drug-trafficking case, the subject of a court-ordered wiretap used a telephone encryption device, significantly impacting the investigation.

Some anti-government militia groups are now promoting the use of encryption as a means of thwarting legitimate law enforcement investigations.

In several major hacker cases, the subjects have encrypted computer files, to conceal evidence of serious crimes. One of these, Kevin Lee Poulsen, recently pled guilty in Los Angeles and San Jose Federal Courts for among other things, breaking into and manipulating Pacific Bell telephone computers.

I cite these examples not in the spirit of argument, but to stress that in developing its policy on encryption, the government has made a good faith effort to balance the obligations and interests involved. And I want to stress that this policy in no way seeks to expand the powers of law enforcement nor reduce the privacy protections of individuals. The intent is to maintain, in the face of technological change, the current legal instruments it has and continues to require - instruments which Congress itself has determined are necessary in the interest of public safety.

Business leaders have also made clear to me, and to the Administration, that they believe there exists now a strong international market for robust encryption, and that American industry is in a leading position to respond. But, if American firms are not allowed to meet that demand in a timely way, they are deeply concerned that our leading position in information technology across the board could be jeopardized - even in product areas not incorporating encryption. Thus, industry asked for further export policy liberalization and streamlining of the regulatory requirements.

These concerns are being heard in Washington. The Administration has taken the following steps - many based on the direct recommendations of industry representatives:

First, at the end of last year, jurisdiction for licenses of encryption exports was transferred from the Department of State to the Department of Commerce. Commercial encryption is no longer treated as a munition and thereby subject to various foreign policy embargoes. We hope this will both speed up and simplify the tasks of obtaining licenses.

Second, and very important, the Administration will license the export of encryption products, of any algorithm and any key length, if they incorporate key recovery.

Third, the Administration will also permit the export, over the next two years, of 56-bit DES and equivalent encryption products without key recovery provided exporters make commitments to develop key recovery products. I am pleased to report that already at least 4 vendors have formally filed key recovery commitments and several more companies are in the initial stages of dialogue with the Department of Commerce.

And last, a point which is often lost in the debate, domestic use of key recovery will be voluntary as announced by the Vice President last October. All Americans will remain free to use any encryption system in the United States.

However, I must be frank with you. The Administration's agreement to allow the export of DES poses risks to national security and law enforcement, but these are risks that we are willing to accept to support the development of a key management infrastructure with key recovery.

In addition to export liberalization, the Administration is also taking other steps in partnership with US industry to hasten development of key management infrastructure:

We have initiated ten US Government pilot projects to demonstrate the practicality of key recovery as part of a key management infrastructure. One pilot which may be of interest to this audience involves the electronic filing of patent applications with the US Patent and Trademark Office, incorporating digital signature and encryption.

The Department of Commerce has convened a technical, private sector advisory committee to develop a Federal Information Processing Standard for a Federal Key Management Infrastructure with a focus on key recovery. We are encouraged by the high degree of industry participation in this activity, which will better ensure a successful outcome.

The Administration will use a formal mechanism to provide industry, users, state and local law enforcement, and other private sector representatives with the opportunity to advise on the future of key recovery.

Finally, the Clinton Administration will soon propose legislation relating to the provision of commercial key recovery services, including providing penalties for improper release of keys, and liability limitations. To this end, we will be consulting fully and broadly with Congress.

As part of this overall effort the President asked me to serve as Special Envoy for Cryptography. In accepting this assignment, I have been struck that everyone involved with the encryption issue, whatever their views, recognizes that the international reaction will determine the success or failure of their particular approach. With that common starting point, I though I would share with you the results of my consultations with foreign governments thus far.

But before doing so, I think I need to describe my role. A recent publication labeled me the Czar for cryptography. I am not a Czar. For one thing I am mindful of what happened to the real Czar. More important, I report to an interagency group at the deputy Cabinet level. They, under the Vice President, are the real policymakers.

My assignment is to explain the US Government's position on this issue to other governments and get their views. My goal is an international consensus on the development of a global key management and key recovery architecture -- one that will foster robust and dependable security for the global information infrastructure while protecting public safety and national security.

My consultations also focus on the underlying requirements in building such an international infrastructure such as cross border certification of public keys and authenticated transactions, principles of interoperability, and key recovery criteria. One of my main messages is that while governments must provide the appropriate policy framework, the task of actually building an international key management infrastructure must lie with the private sector.

So far, I have held high level meetings with the governments of France, Great Britain, Germany, Belgium and Canada as well as with the Commission of the European Union. I have also had the opportunity to meet with the representatives of other governments of the OECD in the course of negotiations on cryptography policy guidelines about which I'll say more in a minute.

From San Francisco, I will go to Australia and Japan and then return to Europe for consultations with other governments there. Subsequently, I also plan to consult with emerging market nations in Asia, Africa and South America.

So, what I have to report is not a final tally of all governments' views, but I believe it is instructive nonetheless.

All governments appreciate the importance of encryption for the future of their economies;
All recognize the increasing need for privacy protection due to the explosion of electronic commerce;

All governments recognize the need for international cooperation to create a KMI and certificate services to facilitate privacy and electronic commerce;

All support the concept of lawful access by governments and the use of trusted parties and/or key escrow as a possible mechanism.

Many governments, in the interest of public safety, want stronger controls than we have. They have, or are considering, domestic controls on the use of encryption within their borders.

Virtually every government has expressed unhappiness with the US decision to release 56 bit non-key recovery products even with key recovery commitments. Several have criticized the absence of internal US controls.

They are concerned that the increased availability of such products without key recovery could undermine their ability to protect the public safety within their borders.

Also, many suspect that our policy is driven by a desire to obtain a commercial advantage.

Nonetheless, all are willing to cooperate with us to work out the needed international arrangements for a global key management infrastructure.

In that context, two approaches to the encryption issue appear to be emerging internationally: one is market-oriented like ours, where governments provide the appropriate policies and regulatory framework to allow for and protect the voluntary use of key recovery. The other, which is not the U.S. approach, is based on government rules and strict controls, including domestic mandatory key escrow for communications. In either case, one of my primary objectives is to ensure that any requirements and limitations imposed in other countries do not discriminate against US companies.

An important element in getting to an international consensus on encryption issues has been the development of cryptography policy guidelines at the OECD. The discussions, which began in December 1995, among the 29 member countries, have included representatives from government and business, law enforcement, security, and privacy interests.

The guidelines, now in draft, outline basic principles for cryptography policy. They cover the issues of trust, choice, market-driven development and standards of cryptographic methods, as well as protection of privacy and personal data, lawful access, liability and international cooperation. As many of you know, we have included as many US business representatives as possible on the US delegation to the OECD meetings on encryption.

Though these guidelines are broad in nature and non-binding, our goal is their adoption and application by governments, businesses and individuals in safeguarding electronic transactions, communications and data storage. We expect final approval by governments in the Spring.

CONCLUSION

In conclusion, I want to underscore that every government I have consulted wants to protect the privacy of its citizens while also preserving lawful access to encrypted materials for public safety purposes. During the negotiation of the OECD Guidelines, delegates were specifically asked if their governments' wished to give up or reject their sovereign rights to lawful access. None did - not even the most ardent advocates of free choice, privacy and unfettered commerce.

So from what I can see at this point in my mission, the international encryption market will not be a wide open affair. As you in the encryption industry plan for the future, I would encourage you to take into account the likelihood that lawful access and key recovery will be a growing international requirement.

Many companies, including many represented in this audience, have announced efforts to search for key recovery solutions for their customers, and have provided useful ideas and feedback to the Administration. We are grateful to them and eager to hear more of your ideas and suggestions. I ask the rest of you to consider joining our efforts to develop the framework for an international key management infrastructure that will provide for robust encryption and key recovery for all users.

I believe the result of our cooperation can be a level of privacy and confidentiality never before available to both individuals and business. It can provide the security necessary to make electronic commerce and digital communications powerful engines of economic growth, improving the lives of us all.

And as I go forward in my assignment, I want you to know that I am committed to support the leadership role of American industry in the highly competitive international arena of information technology. I am eager to work with you and your representatives, and I look forward to seeing you all again.


FOIA | Disclaimer | Privacy Policy | Information Quality
Department of Commerce
| BIS Jobs | No FEAR Act | USA.gov | Contact Us