search the site using Google™
|
|
Jill M. Ryan, Freedom To Speak Unintelligibly: The
First Amendment Implications Of Government-Controlled Encryption, 4 Wm.
& Mary Bill RTS. J. 1165 (1996).
Student Review:
This note effectively
explains the growing use of encryption in "the information age," and how
its popularity threatens law enforcement. The government's recent
efforts to implement a voluntary encryption standard are analyzed and
the not predicts that this voluntary approach will eventually give way
to widespread government regulation of the creation and distribution of
this type of software.
The note also examines many of the constitutional questions
surrounding such governmental action. The government's fear of
encryption is based on the simple fact that "new technology can make
life easier for everyone, not just the law-abiding." (1167) FBI Special
Agent in Charge James Kallstrom underscored the government's interest in
maintaining its ability to intercept criminal activity:
"I can assure you that a loss or diminishment of
electronic surveillance will produce the following disastrous
results: An increase in loss of life, attributable to
law enforcement's inability to prevent terrorist acts and
murders. An increase in corruption and economic harm to
business, industry labor unions, and society
generally...An increased availability of much cheaper
narcotics and illegal drugs -- along with the personal,
societal, and economic harm brought about by increased
drug use."
The Clinton Administration attempted to address the fears of the
FBI and other law enforcement officials, while at the same time
appeasing those concerned about limits on privacy. The result was the
"Escrow Encryption Standard" (EES) which was formally adopted on
February 4, 1994 as a voluntary government standard. Although
characterized as a "voluntary" standard, Ryan argues that this is a bit
of a misnomer. The government's persuasive influence in announcing a
"standard" combined with the strict limits it places on exporting
encryption devices avoids "an overt mandate," but Ryan claims it also
signals "the government's intent to control the availability and use of
strong encryption." (1181).
Supporters of EES claim that is more powerful than the "Pretty
Good Privacy" (PGP) encryption software, which was
anonymously posted on the internet and subsequently used across the
world. In an attempt to appease privacy rights
activists, the government may only obtain access information after
receiving a court-approved wiretapping order, and then further receiving
access from the key's two "escrow agents." [The two agents are located
in the Treasury and Commerce
Departments.]
Without both pieces to the key, any information is unintelligible.
Still, detractors of this policy remain distrustful of such
potential government access, despite the added precautionary steps taken
here. A Time/CNN poll taken in March, 1994
indicated that 80% percent of the general population opposed the policy.
Interestingly, financial institutions who arguably receive the most
benefit from strong encryption, have shown a reluctance to change from
the algorithms they currently
employ. Manufacturers of encryption devices argue that they are at a
competitive disadvantage because of the dual standard they are expected
to use. They must make two products instead of one: a product with
weaker encryption, which may be exported, and a stronger encryption
product for use within the United States. Also, regardless of export
restrictions, some companies claim that foreign purchasers would be
reluctant to purchase products to which the United States government
owned the key.
This author claims there is evidence that policy announced in 1994
is failing. In August 1995, the Clinton administration
announced that it would begin allowing companies to export stronger
encryption software. This change in policy included allowing the
exportation of 64 bit encryption keys, which would be held by private
companies and "would only be made
available to the government under a court order." (1187) Still, Ryan
argues that this move should not be interpreted as a
signal that the government is giving up its effort to control encryption
technology: "Although EES no longer appears likely to become the de
factor standard, the government still intends to control encryption."
(Id. at 1187).
Ryan concludes that "in order to adequately address the
government's fears, the government must enact a mandatory
encryption scheme" by which it would legally require the use of only
government approved encryption devices. (1167)
Assuming this prediction will occur, Ryan then examines some of the
constitutional questions at issue. First, Ryan asks
whether complete government control of encryption would constitute a
search. Applying a Katz-style analysis, Ryan
concludes that "a properly guarded key to a cryptographic system would
be an item of information for which the user would have both a
subjectively and objectively reasonable expectation of privacy" and "is
thus clearly a search or seizure for Fourth Amendment purposes." (1190)
Second, such potential government regulation may face challenges
based on the Fifth Amendment's right against
self-incrimination. Ryan points out that "requiring users to make their
key available to the overnment is arguably analogous to forcing users to
disclose their secrets in advance." (1191).
Third, Ryan asks whether such action would violate the First
Amendment's freedom of association clause. "This argument," she
explains, "stems from such cases as NAACP v. Alabama ex. rel.
Patterson and Talley v. California, wherein the Supreme Court
held that requiring disclosure of an organizationÆs members or an
individuals identity could violate the First Amendment freedoms of
association and speech." (Id.)
Finally, Ryan looks at government regulation of encryption as a
First Amendment free speech issue. Commentators haveargued as to whether
it should be perceived as "content-neutral" or "content-based"
regulation. Those in the neutral camp argue that it regulates language
irrespective of the subject matter. Those who argue it is content-based
consider the language regulated to be the actual encryption algorithm.
Therefore, their argument goes, only specific language is in fact being
regulated. This determination is significant because "content-neutral"
regulation will receive an intermediate level of scrutiny and therefore
have a better chance of surviving.
Article Summary by: Tom Price
|