Blaming Encryption 505
EisPick writes: "Just as a previous generation wrestled with whether or not to blame physicists for The Bomb, there are some misguided folks who are blaming Phil Zimmermann for the ability of terrorists to communicate confidentially. He tells the Washington Post, 'It has been a horrific few days.'" Meanwhile, John Gilmore has posted far and wide a call to mirror encryption code outside the United States, since export regulations are making a comeback.
Not the only target (Score:3, Insightful)
Re:Not the only target (Score:2)
If these things are not all silly, why not question whether or not a tool like PGP might have helped facilitate the attacks ? *If* it turned out that PGP-encrypted communication was intercepted by the FBI or NSA, but could not be decrypted in time, would that be irrelevant ? Would wondering about cryptography and what we want to allow be so silly then ?
Re:Not the only target (Score:2)
Yes, it would be the height of stupidity. To say that we should wonder what we should allow with respect to cryptography assumes that we have the power to deny anyone the use of encryption. We can always make it illegal, but that won't hinder anyone who is planning a terrorist action. Unless we can force everyone's brains to be incapable of doing math, we can't stop them from using encryption.
Re:Not the only target (Score:2)
Yes. We should be able to walk onto planes without being searched, carrying whatever we want (within the bounds of common sense, which some people are a bit deficient on), and travel in peace.
The tool that these soldiers employ is called "terror". The method of deployment is killing as many people at once as possible, though bombings and mass transit hijackings. Combine the two, and you have last week's horror.
The victims are us - normal people. It adds to people's fear of flying, time spent trying to convince a security guard that my palm pilot with a cracked screen is a legit device.
I'm not saying that we *shouldn't* have security... but just keep in mind that it should *not* be necessary. The goal should be attacking the source and preventing the need for such domestic measures.
--
Evan
Re:Not the only target (Score:2)
No, blame dinosaurs for allowing their rotting corpses to turn into jet fuel. The scaley bastards!
Re:Not the only target (Score:2)
According to the engineers who designed the building (rather than some hack who just wrote about it thirty years later...), it was indeed designed to withstand a 707 (current at the time), rather than a 747.
Moreover, it is not clear whether then design of the building also accounted for the fire caused by the fuel, or just for the mechanical choc of the impact. Indeed, the building did withstand the impact, it's the fire that got them.
Re:Einstein did not work on the Manhattan Project (Score:2)
I understand the desire to exonerate Einstein from the morally grey activities that used his work. But it's silly to claim anyone totally clean in this day and age.
Was crypto used? (Score:3, Interesting)
Just wondering, because I haven't seen any reports with that sort of detail in.
Re:Was crypto used? (Score:3, Funny)
Of course not! (Score:2)
Re:Was crypto used? (Score:3, Informative)
Re:Was crypto used? (Score:2)
That's how John D. Rockefeller was able to claim ignorance of Standard Oil's devious methods. When he did talk about the company's tactics, he only did it verbally, and in a lot of cases he just insulated himself from day-to-day decision to insure "plausible deniability."
Re:Was crypto used? (Score:2)
What bin Laden uses (Score:2, Informative)
According to the reported from ABC (I have forgotten his name) who went over to Afghanistan a few years ago and interviewed bin Laden he DOES use crypto.
A few years ago he stopped using cell phones and satellite phones to communicate, knowing that those technologies could be monitored.
So what does he use now to send out secret orders?
Encrypted Zip disks sent by courier who secretly take the disks out of Afghanistan. It wasn't clear whether the disks were then sent by snail mail or whether the data on them was transmitted using the internet. It also wasn't clear if PGP was used. Is his network large enough for key distribution to be a big hassle? If not he could skip public key crypto entirely and just use 3DES with a list of keys or long passphrases.
For his edicts which are meant for public consumption he makes video tapes of himself and then sends them out to arab media outlets which then broadcast them.
Re:Was crypto used? (Score:2)
Jason.
Re:Was crypto used? (Score:2)
If all this would be limited to just the US I couldn't care less but unfortunately it isn't and europe is pretty much following the US in everything it does.
The recent events, however tragic, make it painfully clear what is wrong with the US. Within minutes after the crash the media machinery puts the video images in an infinite loop feeding them to their public, of course commercial breaks are inserted at regular intervals and CNN is likely to make significant profits in the next few weeks. Soon after, the US president, after being lost for a few hours in some distant US state, appears to make what can only be explained as a christian fundamentalist statement by calling for a prayer. The worst part is that this statement is fueled by opportunism (gotto keep the christian right wing people happy otherwise gore takes over in a few years) rather than true belief.
Now further opportunism dictates to nuke those damn arabs. Never mind the millions of refugees, never mind that the amount of innocent people who will die as a direct consequence of the media show the US army is about to give in the middle east will vastly outnumber the poor souls who lost their lives in new york (btw. a substantial amount of those people were muslim). And never mind that the short attention span of the US media and its audience is never going to outlive the chain of events about to be triggered in the middle east.
The days that reporters reported wars like in Vietnam are long gone. CNN is already being banned from Afganistan and soon the US military can (and will) do whatever pleases them. The gulf war wasn't as clean as CNN wanted us to believe and nor will this war (a b52 is not what I would call an anti terrorist weapon).
Incidently, I recall that a few months ago during the election campaign dubya had some trouble answering the question who the president of pakistan was. I hope his knowledge of this area has improved somewhat by now.
For the time being, enjoy the show just be aware that reality isn't what they show you on TV.
Re:Was crypto used? (Score:2)
Actually, I don't think that's true. I watched CNN a lot last week, and there was almost no interruption to the news, no commercial breaks at all. It must have cost them a lot of money to do that.
Never mind the millions of refugees, never mind that the amount of innocent people who will die as a direct consequence of the media show the US army is about to give in the middle east will vastly outnumber the poor souls who lost their lives in new
You're forgetting two things. Firstly, that the US hasn't actually done anything yet, it's simply moved a few ships around. And secondly, the US is the single largest provider of humanitarian aid to Afghanistan. Don't let either of these facts mess with your preconceptions, tho', that would make you just as bad as "the US media and its audience" that you hold in such contempt.
Incidently, I recall that a few months ago during the election campaign dubya had some trouble answering the question who the president of pakistan was
Who is the President of Uzbekistan? Post now, don't check on google. What about Mozambique?
Re:Was crypto used? (Score:2)
I have no idea who they are. I have no idea who the president of Pakistan is. I also have no idea how US relations are between the US and those countries.
But I do expect our president to know these things. He's trusted to make decisions for the country, so he better be well informed.
Re:Was crypto used? (Score:2)
I'm Canadian but I wouldn't be nearly as smug about this if I were you. Luckily the current Canadian government is at least somewhat sensible, but don't underestimate the power of American pressure.
If one of our right-wing parties were in power right now then it would be all over. We'd have American-style immigration and crypto laws already.
Re:Was crypto used? (Score:3, Insightful)
So it should be much of a logic leap if bad guys didn't have crypto, they'd use something else. Technology don't kill people, people kill people.
Re:Was crypto used? (Score:2)
Ferinstance - the day of the attacks, the Liberals, the Tories and the Alliance were ALL talking war. The Opposition was goading the gov't into stronger and stronger words. Only the NDP urged caution, and recommended a criminal, rather than, warlike response. Food for thought.
Re:Was crypto used? (Score:2)
Re:Was crypto used? (Score:2)
To stop terrorists, as police often cite, is sometimes you have to use your feet. Go track them down, use basic police skills, round them up and get them to tell on their friends (you're going to spend a night in jail... you could sit alone in a cell... or spend the night in a cell with undesirables...)
No, it wasn't Phil's fault... (Score:2)
--- begin secret encrypted text ---
Vg jnf gur thl jub vairagrq ebg13
--- end secret encrypted text ---
American cryptography, that is (Score:2, Insightful)
Russians had (and still do have) their own cryptographic algorithms, as do Germans, Australians, Italians. I mean, what's the difference? Do export regulations really make that much of a difference?
Re:American cryptography, that is (Score:2)
Everything has a good and a bad side... (Score:2)
Re:Everything has a good and a bad side... (Score:3, Funny)
Yep, which is why I'm surprised that steak knives, cars, hammers, shovels, nail guns, saber saws, toothpicks, forks and computers haven't been banned from American homes yet. *sigh*
Re:Everything has a good and a bad side... (Score:2)
Try banning those from getting on an airplane.
Re:Everything has a good and a bad side... (Score:2)
-Puk
p.s. I'm not saying the ban is a bad idea, I'm just noting it.
Technology is not the problem (Score:3, Insightful)
Why use technology when nobody is looking at the plain and simple stuff? Looks like KISS works to the advantage of terrorists as well.
Re:Technology is not the problem (Score:2)
Re:Technology is not the problem (Score:2, Funny)
Before now, there has been speculation that Osama Bin Laden has hidden messages in pornographic images posted and swapped on Usenet, eBay and Amazon.
However, after analysing over two million images from eBay, Niels Provos and colleagues from the University of Michigan have said they found no evidence of hidden messages. Mr Provos and his colleagues are now extending their work to check more images.
Yeah, right. Any excuse to look at porn.
Excuse me - I just have to recheck my stash of porn to see if any contain hidden terrorist communications.
Re:Technology is not the problem (Score:2)
Which is exactly why people shouldn't use encryption just for the heck of it. If terrorists' use of encryption causes them to be visible, then they won't use it, which deprives them of a valuable tool.
I'm sure the point will be made a thousand times.. (Score:2)
The principles allowing the creation of strong encryption are fundamental and simple enough that if it were not available freely it could be developed with minimal expense by anyone who wanted it. If it had been kept from the ordinary citizen the terrorist would still have it.
Re:I'm sure the point will be made a thousand time (Score:2)
Black Tuesday and the Passive American (Score:3, Interesting)
"We must give up some of our freedoms to help combat terrorism."
The predictable words -- and actions -- are beginning to spew from political, military, and law enforcement officials and their supporters. For safety, for security, for the greater good, they somberly tell us, we must comply with their agendas. To be protected from terrorism we must submit to more restrictions -- on our ability to travel, our freedom from arbitrary searches, on the privacy of our communications, on our right to bear arms, on our ability to conduct business hidden from the prying eyes of government.
Sen. Judd Gregg (R-New Hampshire) has called for a global prohibition on encryption products without backdoors for government surveillance.
Travel regulators have banned knives on planes. (Does this mean even the pilots can't protect themselves and passengers against hijackers?)
ISPs who were reluctant to cooperate with the FBI's invasive Carnivore program are now rushing to comply.
The Senate has, in the wake of Black Tuesday, voted to increase the FBI's authority to tap the phones of anyone suspected of terrorism. As we've seen by all these other random restrictions, we are ALL suspects in the eyes of the U.S. government.
Perhaps most ominously of all, the Washington Post quoted House Democrat Leader Richard Gephardt (D-MO) as making the self-contradictory, but entirely predictable statement, "We're in a new world where we have to rebalance freedom and security. We can't take away people's civil liberties . . . but we're not going to have all the openness and freedom we have had." The Post [washingtonpost.com] then went on to describe how every war or crisis of the last 100 years has been use to increase government power -- often in the most draconian ways. More Data Here [afcomm.com] Freelance supporters of the Surveillance State are rushing to urge everyone to comply. One liberal talk show host responded to callers who complained that Big Brother policies at airports were a problem, "Big Brother is the only thing holding us together!"
He offered no evidence to show how Big Brother made us safe on Tuesday, September 11.
WE MUST THINK FREE, NOT PATRIOTICALLY JERK OUR KNEES
Soon we may be at war. And as always at such times, we'll be expected to "pull together," "do what our leaders tell us is necessary," and sacrifice more freedom in the name of "safety and security" or patriotism. And, as the reality of the Day of Horror seeps in, who doesn't feel an urge to strike back, to "get behind our government," to "show those murdering bastards they can't push Americans around," and to "do whatever it takes to defend the greatest country on earth"? -- even if that means sacrificing individual liberty to "the cause."
Whatever happens from here on out, we need to remember that Big Brother is NOT holding us together -- that he never can and never will. We must remember that the kind of restrictions on the liberties of ordinary Americans that were entirely ineffective in preventing the attacks of Tuesday, September 11, 2001 will not magically prevent future attacks merely because their severity is increased.
What did all of Big Brother's efforts do to prevent Tuesday's slaughter? The violations of freedom we've already been subjected to in the name of safety -- airport x-rays, ID checks, disarmament, body searches, and the whole gamut -- became a sick a joke when the day arrived that we needed them to protect the country against the world's worst criminals. In fact, Daniel Pipes of the Wall Street Journal was quick to point out how the government's reliance on mass eavesdropping and tracking actually diverted resources from more effective anti-terrorism methods, such as actually studying and infiltrating genuine terrorist groups.
Yet now the government proposes a giant national effort to do more of the same -- to impose more ineffective, wasteful, and oppressive mass surveillance and restrictions.
New restrictions on the freedoms of non-violent people will do nothing to make America or the world safer. They'll make us less safe, as well as less free.
There are at least two reasons for this.
The first is that more restrictions, and more power placed in the hands of government, will simply, in the long run, create more rage and therefore more desire to strike violently. (As we also saw, some restrictions, like those that forbid armed citizens on planes, also make it harder for Americans to protect themselves and their country.)
The second is something we observed, tragically, though cell phone calls from four doomed, hijacked planes: the fatal passivity and dependence that seems to be becoming the norm in American behavior.
THE PASSIVE, UNTHINKING AMERICAN
It appears now that a handful of heroic passengers on one flight, having learned via telephone that two other hijacked planes had already smashed into the World Trade Center, decided not to allow themselves to be used as weapons of war. These passengers on United Flight 93 attacked the hijackers who were in control of the plane. Doomed in any case, they ended up dying in the woods and fields of rural Pennsylvania, rather than passively allowing their captors to get away with an even more horrendous mass murder.
We also know that, on at least one other flight --American Airlines Flight 77, which smashed into the Pentagon -- passenger Barbara Olson learned from her husband, U.S. Solicitor General Theodore Olson, of the World Trade Center catastrophe. During two separate calls, Mrs. Olson (a well- known author and conservative television commentator) asked her husband what the pilot -- standing next to her in the back of the plane -- should do.
Picture that. Passengers and crew have been herded -- and note that word well, herded -- to the back of the plane. Even the pilot, the leader, the chief decision-maker, does nothing. Can't think what do to. Can't act. Instead of attempting to save their own lives and the lives of others on the ground, what do they do? They expect a federal government official to make the decision for them. THE EVIDENCE SAYS THAT THESE PEOPLE DIDN'T EVEN FEEL EMPOWERED TO DEFEND THEIR OWN LIVES WITHOUT FIRST ASKING THE ADVICE OR PERMISSION OF WASHINGTON, D.C..
And why should we have expected otherwise? Americans have been told repeatedly never to resist crime, always to submit to any demand a thug makes of them. Always go along -- for safety's sake. Go along in order to avoid angering the criminal. We've been told always to submit, as well, to any demand made by anyone who appears to be "in charge." These people on Flight 77 -- and presumably on two of the other flights -- were apparently so paralyzed by their conditioning that they couldn't assert themselves even when the alternative was certain death.
Even as pathetically disarmed as they were, they could have battered the hijackers with their briefcases, with their shoes, their purses. They could have overwhelmed them with sheer numbers of bodies. They could have gouged at their eyes with fingers or car keys. Could have knocked them unconscious with luggage from the overhead racks. Could have tripped them, stomped on them, tied them up with cords from audio headsets.
But except on United Flight 93, they apparently did nothing. And so three planes flew, sure and true, into the heart of three American landmarks, slaughtering thousands.
THE ONLY TRUE SECURITY MEASURE: A BILL OF RIGHTS CULTURE
We must take back America as a country. We must make it free and independent again -- no longer the would-be ruler of its own people, and no longer playing at being the world's supercop. Only by doing that will earn the world's peace and respect.
We must take our own individual lives and independent spirits back from would-be rulers and criminals, as well.
If we consent, passively, to give up more freedoms -- even "temporarily," or "as an emergency measure" -- we'll be doing the opposite. We'll be less safe, less free.
To restore American freedom and personal courage, we must restore the Bill of Rights -- in our country and in our hearts and minds. If we understand the Bill of Rights, we'll understand what we're fighting for -- and why. If we let it slip away what's left won't be worth fighting for.
This means not merely having an intellectual or legal understanding of the Bill of Rights. This means not merely memorizing the Bill of Rights or teaching it to our children. This means understanding the concepts of individual liberty that underlie the Bill of Rights -- then living those concepts, breathing them, eating the, dreaming them, holding them as the most central values of our lives, in the same place we hold our beliefs in the diety, or our dedication to our families, or to truth or justice.
We must behave as free people, expect and encourage others to behave as free people -- and have zero tolerance for anyone who abuses freedom or uses his authority to violate the Bill of Rights.
If there ever was a time in history to get behind the Bill of Rights and promote it, it is now. If we yield to this mushy thinking that the road to freedom and safety lies in GIVING UP freedom and the Bill of Rights, then we might as well bow down in defeat right now.
If we don't defend our rights, we'll have no rights. If we don't defend ourselves, our family members, and our fellow citizens -- AND defend their freedoms -- then our lives will be no more valuable than those of cattle and sheep. And the America we end up with won't be the America we thought we were fighting for.
If you want to be a passive herd beast -- obey whatever the authority of the moment, be that a bureaucrat or a hijacker, tells you to do. Listen to their lies about "safety and security" and obey, obey, obey.
But If you truly want to combat terrorism or terror-war, learn the Bill of Rights, teach the Bill of Rights, and enforce the Bill of Rights with every action of your life.
FIGHT BACK WITH THE BILL OF RIGHTS.
The Liberty Crew [jpfo.org] Jews For The Preservation of Firearms Ownership, Inc.
Misdirected Hate Mail (Score:4, Informative)
It says Bin Laden uses pictures on porn sites... (Score:2)
I can just hear it now:
Hillary: "Are you surfing porn again, Bill?!?"
Bill: "No...I'm...I'm...looking for...looking for terrorist messages! Yeah, that's it!"
islamic pr0n terrorist messages = urban legend (Score:3, Insightful)
You'd as likely find a strict Muslim eating pork rinds in a liquor store as you would surfing a pr0n site, for steganographic purposes or otherwise. The lives of these men are entirely constructed around a strict obedience to (what they misguidedly see as a correct interpretation of) their faith. Further, it as been noted by Western intelligence organizations that these terrorist organizations use very little technology at all (even phones) instead relying on classical "no-tech" spycraft, which is part of the reason that the increasingly-focused-on-electronic-surveillance agencies have a very hard time tracking bin Laden et al.
Even if you assume that they utilize information technology in their organization and steganography in particular, it is highly unlikely that pornographic images are being used.
Naturally and as usual the political elites are using an external threat to move against internal things they do not like, such as encryption and pornography. (An analogy would be how every new recreational pharmaceutical is called a Date Rape Drug. Yet, strangely, the most frequently used chemical in date rape is still available widely, namely ethyl alcohol. Crack would be legal too if crack dealers were beefy white guys, wearing suits with Rotary Club pins on the lapel, that gave campaign contributions.)
Re:islamic pr0n terrorist messages = urban legend (Score:2)
If this is true, and it pertains to attitudes that more than just a few of these people have, perhaps the story about secret porn communication isn't so far fetched.
(personally, I still think it is a bogus story, but that's just me)
Reminds me of the scene from"The Running Man"... (Score:2)
Re:It says Bin Laden uses pictures on porn sites.. (Score:2)
Bill Clinton hasn't been the President of the US for about 8 months now.
Unless you are inferring that they installed "Net Nanny" when George got into the Whitehouse to keep the bad stuff from him. In which case we should go after "Net Nanny" and their ilk for harboring terrorists.
Re:Misdirected Hate Mail (Score:2)
Re:Misdirected Hate Mail (Score:2)
I wonder if the shitweasel gets the message goatse.cx is sending him.
(This time, it might pay to visit goatse.cx [goatse.cx], before you moderate ;-)
Re: (Score:2)
Blood on his hands (Score:2)
Zimmerman's hate e-mail told him "I hope you can sleep at night with the blood of 5,000 people on your hands." This person must be privy to proof that hasn't been released to the rest of us. But much more importantly, I hope that person sent an even stronger e-mail to every employee of American and United Airlines. And to all the service employees of several airports which were involved. And, hmmm, let's see, oh yes... also to everyone who works for companies who manufacture knives and box-cutters. And to all recent US sentors who have rejected spending more of the billions collected in air travel taxes on airport security rather than balancing the budget. There's probably a few thousand other people that are implicated before Phil Zimmerman.
Knee jerk reaction (Score:2)
Please, I can't believe that people actually believe that everyone who's involved in any tool the terrorists used is actually guilty of anything.
People who would more guilty than Phil;
- The manufacturers of the knifes and box-cutters.
- The airplane manufacturers.
- The printers of the airplane manuals in Arabic.
- The people who produced the food for the terrorists last meal.
Guilty by association? This is more like guilty by living in the same world.
Don't forget nonexistant airport security... (Score:2)
Open Letter to Phil (Score:5, Insightful)
You're coming under attack for your decision to provide strong crypto to the general public. Please do not falter. There is a definite need for this sort of thing and the fact that it might be misused is no reason to ban it.
Cars can be used to run over people. Hammers can be used to hit people. I don't think I need to mention guns. There are lots of things out there that can be used counter to their original purpose. I think in the coming age strong crypto at a personal level will be very important.
There will always be people who blame the inventors for some of the uses their inventions are put. Some people blame Einstein for the devastation of Hiroshima & Nagasaki. Is Einstein really at fault? If someone dies in a car crash, who should be blamed - Ford? Benz? Should the Wright brothers be partly held to blame for the events of September 11th?
Just because your tool was possibly used in a bad way doesn't make you guilty. If it's any comfort, since there is so much talk about heroes lately, know that you are one of MY heroes. I remember the early USENET discussions and your original profile in Wired. I've always thought that if I had more ability in math, I would've liked to be like you.
Please know that for many of us, you are not a bad guy by any stretch of the imagination, and for a few of us, you are one of the really good guys.
Thanks for listening.
Re:Open Letter to Phil (Score:2)
I almost wish that posting had a space to add my signature to, in the way of petitions. I guess I'll have to do with adding this reply, and thank you for putting the time in to express what so many of us feel, so well.
Malk
Re:Open Letter to Phil (Score:2)
You know, Einstein was really troubled, right up to his death, about his role in developing The Bomb. Oppenheimer (in my sig), also was deeply despairing of his role. I guess it's not bad company to be in.
The thing about technology like this is that many other crypto researchers were working on similar things. If it hadn't been Phil's 'Pretty Good Privacy', it could just as easily have been Bruce's 'Applying Privacy', or Ron's 'Privacy the RSA Way' or perhaps IDG's 'Privacy for Dummies'. There are so many people on the cypherpunks list (which I haven't been on in a couple of years) who would have been eager to do the same thing. I just don't think it's necessary for Phil to beat himself up about it.
Just my opinion.
Re:Open Letter to Phil (Score:2)
Like most things, there is a necessary balance between the need for transparency in an efficient democratic society, and the need for protection from unreasonable search and seizure (e.g. the fourth ammendment). Phil helped tip the technological balance in one direction, but he didn't upend the scales.
--LP
OK, help me out here. (Score:2)
Does anyone have a preprepared tarball of a veritable shiteload of encryption utilities -- ie everything you could possibly want, ssh, gpg, etc. I think somebody should create a tarball that we can mirror around, all the same, everywhere. And I'm too lazy to go create it myself, as I've already got a website up with a couple tools.
Farsi (Score:2)
Re:Farsi (Score:2)
In WWII, the US Marines code "network" was cracked wide open by the japanese. So, they found a valuable asset: Native Americans speaking in their own language.
Not one of the Codetalker transmissions were ever broken, and they were speaking in "plaintext" the entire time (albeit with a modified vocabulary).
Encryption is as much an exercise in creativity and problem-solving as it it math.
Codetalker stuff:
http://www.history.navy.mil/faqs/faq61-1.htm
Cryptography as a weapon (Score:3, Interesting)
We're all yelling and screaming about "what's next", taking away "more of our freedoms" and such like. Someone raised the point that the freedom to assemble in private, to learn to fly aircraft, to be free from random searches of houses, were also contributing factors to these terrorist acts. The problem is, if the government was able to monitor communications, restrictions on those activities wouldn't even be talked about -- the activities themselves are innocuous, but in the right combination they could indicate something sinister. This is the reason that people buying huge quantities of nitrogen-rich fertilizer are monitored because of its bomb making potential.
I'm not advocating "back doors" in encryption products, mainly because it's too late for those to be useful when perfectly effective encryption is already out there for terrorists and anyone else to use. But the fact remains that the ability of people to unbreakably encrypt their grocery lists does have consequences beyond merely ensuring their privacy.
Re:Cryptography as a weapon (Score:2)
During WWII, the state of the art was the Enigma machine. The cryptographers had the upper hand, and it was the imperative of wiining the war, which turned things around. During those times, the fact that the state of the art of cryptanalysis had caught up, was not widely advertised.
The point is that these arguments are fluid, and depend on the current state of the art. With cryptography reigning supreme, it makes no sense to turn back the clock. Instead of crippling their own citizens, they should be looking for weaknesses in public key cryptography!
Re:Cryptography as a weapon (Score:2)
And as you correctly point out, when fighting Enigma, the codebreakers had the upper hand.
One thing (source: That awesome NOVA documentary on Bletchley Park) that bears repeating is that some of the biggest "breaks" in the cracking of Enigma (and its successors) often came from operator error on the part of the enemy soldier in the field, who didn't know how to use Enigma securely.
That's not to say that Enigma was ever secure by today's standards -- only to say that the task of breaking it was made easier by screwups on the part of the enemy. (How many times have you walked by a cubicle and seen a password scribbled on a Post-it note? Your co-worker doesn't see it as a security risk, because they don't know the implications of what they're doing. The German soldier in the field made similar mistakes.)
I would assume our codebreakers know about the exposure created by operator error, and are working on the problem as we speak. (And I wish them the best of luck - and I mean that sincerely, not in jest.)
As computer systems grow in complexity, the number of avenues for such mistakes on the part of our new enemy increases exponentially. For any given communications channel, I can think of dozens of ways in which information could be extracted. I'm sure you can too.
On that note, though, I'd ask you (not you-the-poster specifically, but all of the generic "you" reading this), however, to keep your speculations on ways in which the Bad Guys could slip up to yourself. I'm sure our codebreakers have already thought these holes. I'm not convinced the Bad Guys have thought of them all, and I'd like to see the balance of power tilted in our favor as much as possible.
I was originally going to write something about how our current war is rather like the Battle of the Atlantic in WW2 - hunting down U-boats that had total domination of the seas, and protecting merchant mariners who lacked air cover for much of their journey - a battle in which crypto was absolutely vital.
Then I realized the current war has something else in common with past wars:
Loose lips sink ships.
(Whereupon I shall shut the fsck up :-)
Just like blaming Alfred Nobel for Dynamite (1866) (Score:2)
Re:Just like blaming Alfred Nobel for Dynamite (18 (Score:2)
I do agree with your point, though.
How do you uninvent something? (Score:2)
Re:How do you uninvent something? (Score:2)
Orville & Wilbur Wright (Score:2)
Blame Encryption?? (Score:5, Funny)
Re:Blame Encryption?? (Score:2)
Re:Blame Encryption?? (Score:2)
I've given blood, donated my time and money. I've also paid my respects but the one thing I refuse to do is change the way I look at life. I have the right to express my grief the way I want to.
Break this or shut up.... (Score:3, Interesting)
Let this string be the line in the sand. If this can be decrypted, THEN we should worry about encryption software. If it cannot be decrypted, then any high school student can do strong crypto in their bedroom with the calculator they got for free for signing up for a mall card, and this discussion is just about invading privacy and enabling government to spy on businesses.
du+27XAFml4uYuezNwvsewJpwj+AElF6ySV7vgXjtdoMIHYVT
tZHoDscCzdoV2VjlT9zPwJtdfbmHrt3wABqINnfrRbTRppr
FyzyfS+Gp+/L+w3u04A=
Re:Break this or shut up.... (Score:2)
Re:Break this or shut up.... (Score:2)
The bottom line is this: They should not be able to decrypt your messages without a warrant.
Re:Break this or shut up.... (Score:2)
We could argue that the average teen (or terrorist) doesn't have access to quality random data, but then there's
Many have said the cat is out of the bag... no, the cat was out of the bag in 1850. The cat is now living in a large and opulant palace in the Nile River Delta, being woshiped by women who thow tiny pickles at it... take the metaphor for what it's worth
Re:Break this or shut up.... (Score:2)
You can combine one time pads with standard block ciphers to make an unbreakable encryption algorithm. You just put a one-time-pad encrypted version of the block cipher key at the beginning of your message. Or, you just use portions of the one time pad itself as your block cipher keys. Arranging for sharing enough one-time pad data with your co-conspirators to handle this isn't too big a problem.
MODIFY THE MESSAGE ABOVE UP (Score:2)
How is the pad itself shared by both nodes?
The Hunt for Blame (Score:2, Insightful)
If you recall the Colorado school masacre, you will remember the fact that the parents attempted to sue ID software for creating a game which, in their minds, influenced their children to go on a school masacre.
The situation here is very much the same, and Phil is now taking the blame. However, why stop there? Why not blame our roads for allows the terrorists for getting around? How about phones so they could reserve airline tickets and flight school courses? Why not blame computers as a whole for allowing the terrorists to communicate?
The truth is, people will hunt for a reason HOW. How was this allowed to happen? How could this have happened to ME? We resort to blaming others, whether it be the FBI, CIA or even someone like Phil Z.
Time will pass and people will begin to take notice of the real problems that allowed the terrorists to operate. Does Phil Z have the blood of 5000 people on his hands? Hardly.
Blame U$ Foreign Policy (Score:2, Interesting)
Would you like fries with that....
Why not blame everyone? (Score:2, Insightful)
- The people who make knives / box knives.
- The people who trained the terrorists to fly.
- The people who sold the terrorists the plane tickets.
- The people who made the planes.
- The people who made the plane fuel.
- The people who made the WTC.
Yes this is stupid.
Which is more at fault, encryption or airliners? (Score:2, Insightful)
Levelling the playing field? (Score:3, Insightful)
[sarcasm]
Right on! How dare anyone give the victims of oppressive (and sometimes genocidal) US foreign policy a means to strike back at their oppressors!
[/sarcasm]
Besides, do people really think that had PGP NOT been available, that terrorists would have sent their messages in "clear"? Anyone thinking that needs to pick up a stick and whack themselves in the head with it..."Stupid (whack), stupid (whack), stupid (whack)!"
other sources of blame (Score:2)
These technologies should be heavily regulated:
Each of these played a key role in the attack. Once these technologies are under control, America will be safe from terrorists. I guarantee it.
Signed, John Q. Stupid, United States Congress
Watch out Sheep Crossing (Score:2)
JOhn
Backdoors would not have worked (Score:2)
Any easy to use one time pad software out there? (Score:2)
The reason being that even if the US gov't intercepts such a communication they could never prove it is an encrypted email - for all intents and purposes, without the pad, it's random data.
-josh
Microsoft implicated too... (Score:2)
At that point, I knew the world had truly gone barking mad again.
It's the same with Crypto. Something that people don't understand is automatically to blame.
How we look back on the Luddites of the Industrial Revolution, and consider them unenlightened barbarians.
Going around and destroying the things they didn't understand because they felt threatened by it, without realising what they were truly rebelling against.
Now, have a look at what's happening to the Internet, science, and the digital age as a whole...
Each advance is slowly be destroyed by those that don't understand it, and can't work out how to control it, except this time, it's being done with a web of legislation and an army of lawyers.
Methinks in many years to come, these will be remembered as the Luddites of our current age.
Crypto is just one of the machines they're trying to break.
Malk
He's guilty of foolish technological optimism (Score:2)
Should he feel guilty for making such a powerful tool available to anyone while naively assuming the use of this technology would be free expression, and ignoring the possiblity that it could be used by terrorists, criminals, and other unsavory people and organizations? You're damn right he should.
Technology, by its very nature, is amoral. It can be used for good or ill, depending on who uses it and how. Whether or not a technology is good is defined not by what it is, but by whom it is used and for what purpose.
PGP and similar programs enabled anyone to communicate electronically in perfect privacy, removing the balance of public scrutiny. And when you combine that with the facts that it is easier to kill and destroy than save and create, and that the world is full of people willing to do so for any number of reasons, it should have come as no surprise that those people would be significantly strengthened by this.
I suppose if Phil hadn't written PGP somebody else would have done it - but that doesn't change how naive he was to think that it would automatically make the world a better place. The road to hell is paved with good intentions. I wish people would learn that lesson.
cryptochrome
Who invented the letter envelope? (Score:2)
Another mistake.. (Score:2)
The government has been itching a long time to do this, and now they can use the misinformation of the common folk to make anyone who stands with encryption a villian and an accomplice to the terrorists.
Another thing I am not so sure about is the US approach to the Taliban. We are telling them to hand over bin Laden or we will destroy them, completely ignoring their reasonable call for proof. Right now, even though there is a lot of evidence against bin LAden, it is all circumstantial, and in a smaller case it would just be dismissed without further concrete evidence. The US is out for blood. This isn't a quest for Justice yet, it is one of blind vengeance. Once we had proof, then the vengeance would be justice.
That said, something should have been done about bin Laden long ago. If we were able to definitely connect him to the older trade center bombing, two US embassy bombings, and the bombing of a US Destroyer, why only now do we really get forceful? Any one of those former actions could be construed as an act of war, and if we had been more forceful at the time, we might just have prevented the WTC tragedy. But I guess the people who lost their lives then just weren't important enough to the American people to warrant justice..
In any event, I do think we need to get bin Laden, we cannot rightfully do it under the public pretense of justice for the WTC, but rather the more sensible pretense of trying to end terrorism, or even one of his numerous other crimes. The Taliban response may always be the same, but at least the US wouldn't look as bad when they do lower the boom.
Re:Another mistake.. (Score:2)
Possibilies:
Personally, I find the credibility gap between the first two theories and the last one to be comparable to the gap between "Mommy and Daddy put the presents under the tree" and "There really is a Santa Claus".If we were able to definitely connect him to the older trade center bombing, two US embassy bombings, and the bombing of a US Destroyer, why only now do we really get forceful?
Er, how about the obvious: 1)this was a bigger attack and 2)the US has a different administration?
In any event, I do think we need to get bin Laden, we cannot rightfully do it under the public pretense of justice for the WTC, but rather the more sensible pretense of trying to end terrorism
That's the position Dubya set forth last night.
Backdoored Encryption? Who would buy it? (Score:2)
This is of course assuming there's one code that opens all or most encrypted files (one ring to rule them all). There's also the possibility that the government will just require you to submit any keys to a private repository, which would of course be hacked by Eaglesoft faster than you can say "ACLU."
And besides, how can you enforce this when 256-1024 bit encryption exists throughout the world already? You can't round up software, hell i can hide a copy of BestCrypt on my machine for future use and then make a dozen copies when i need to. Encrypted data can be hidden in plain site as noise in an mp3 file or the difference between planes of a graphic. Since criminals don't go to CrockUSA and buy the software they use to skulk about with, there would be no way to even know what they were using.
So we have useless encryption that isn't used, a huge instaled base of tough encrypters we can't stop and a group of people who our law doesn't affect. Why are we even arguing this? It's as stupid as, I dunno, declaring war against an enemy that doesn't exist yet or vowing revenge on a religion and people who had nothing to do anything. Sometimes the fucking reactionary know-nothings in this country make me wish I was in Canada, where nobody knows anything either but at least they don't have strong opinions about it.
My view: against encryption, for saving lives (Score:2)
And from the opinion polls on the street, most American would gradly give up a number of perceived "freedoms", so I'm not alone. Crypto-lovers are fighting a losing battle.
How to take the offensive (Score:2)
We don't need to play defense on this issue. We can play offense.
The increased terrorist attacks underscore the need to strengthen our computer networks with strong unbreakable cryptography. Some well meaning but misguided inviduals may argue that we should weaken our computer infrastructure with back doors to ease law enforcement, but that weakening would create a greater opportunity for terrorists, as it is a virtual certainty that, with so many back door keys, some will fall into the wrong hands.
In foreign policy, we neeed to promote the use of strong cryptography abroad, not only to strengthen the computing infrastructure of free countries, but because strong cryptography in the hands of the citizenry could help undermine oppressive regimes and enable more internal efforts at democratic reform. Since it is from oppressive regimes where terrorism seems to originate most often, making these governments more democratic is likely to be one of the most cost effective ways of reducing the terrorist threat.
We need to pueblicize the idea that the governments of the free world should be actively promoting strong cryptography, both to guard against potential cyber-attack and to reduce terrorism at its source.
Don't forget WHY the US dropped Encryption export (Score:2)
Or was it that the NSA actually does have a working quantum computer ?
Re:Time to get learned. Which package do we get? (Score:2, Informative)
Sounds like GnuPG is for you. You can download it from http://www.gnupg.org
Re:Time to get learned. Which package do we get? (Score:2)
GPG and WinPT for Doze users. (Score:2)
www.winpt.org
Get the latest of both.
WinPT is an easy to use Windows front end to the GPG command line. It acts on the clipboard and lives in the Windows tray.
Select text, copy, click on winpt, encrypt clipboard, paste into document/email/news post etc.
Easy.
Re:Time to get learned. Which package do we get? (Score:2)
Grab GnuPG [gnupg.org].
If you want nice, easy, email integration, get Eudora [eudora.com] and EudoraGPG [stack.nl].
You can send me a test message if you want. My public key is on my slashdot user page. Use the email address in the key.
Re:Zimmermann is either a pussy or an idiot (Score:2)
As an answer to 1):
No, we would likely also have nukes and lightbulbs if Edison and Einstein hadn't done their part. But PRZ is one of the Pioneers that did enourmous amount of work to bring the technology into our hands, and in a form wo could trust (with sourcecode).
Einstein did also have trouble sleeping at night after "The Bomb", even thought his part was only to write a letter to the president saying that it would be theoreticly possible to create such a thing.
2): No, but Zimmermann knows that China and other countries have already stated that they also want access to the escrov keys, to fight crimes and terrorists. And it's quite likely that they will get it. Resulting in still more human-rights abuses.
Re:Bin Laden doesn't even need encryption (Score:2)
Re:Criminal (Score:2)
Re:Quantum Computing (Score:2)
Re:Let's blame the knife manufacturers... (Score:3, Insightful)
it is rediculous. I do not think it is anyone's fault but those that abuse the technology.