Clipper Chick

Changing sides in the government's war against piracy, Dorothy Denning went from hacker hero to one of the most hated people on the Net.
Dorothy Denning points to a white plastic box, about the size of a trade paperback book, next to the telephone in her office at Georgetown University. "By the way," she says "that's a Clipper device." As she nods toward the item, Denning's face - a warm physiognomy that would fit the sort of church lady who never rapped a knuckle in her life - breaks into a characteristic smile: tentative, but welcoming. The smile acknowledges the joke, a joke on herself, really. I ask her when she last used the device, which allows her to speak with similarly equipped callers in total, unequivocal, uncrackable privacy - unless, of course, a legally authorized government wiretapper is eavesdropping. "Once in a while," she answers. "I must confess I haven't used it in a long time."
"When?"
She can't remember.
"Three months ago? Six months?"
"Oh, it could be a year. Part of the reason I have it here is so that, you know, it's a good conversation piece."
Not that I needed that slab of high tech to nudge Clipper into the conversation. By 1993 Dorothy Denning had earned a fine reputation in the field of computer security and cryptography, but the introduction that year of the Clipper Chip brought her a measure of fame that catapulted her beyond her perch in academia to a controversial and powerful role in the continuing debate about the regulation of cryptography in this country - and indeed the world. (Clipper, of course, was the government's proposed solution to its projected inability to conduct legal surveillance in an encrypted digital world.) For defending the government's position and having the nerve to insist that she was duty-bound as a citizen to do so, Denning has been reviled. On the Net, she has been the subject of ridicule on countless newsgroups and listservs, enduring vicious - often sexist - personal insults for simply expressing her opinions on matters crypto. She has been booed and hissed in public appearances. Fellow academics and former colleagues whisper that she has abandoned scholarly distance and hopped into bed with the government. When pressed for a memorable example of vilification, Denning herself recalls, with a mix of bemusement and horror, one of the milder epithets: Clipper Chick. Of course, her critics don't repeat such slurs to her face. Who could? She is 51 years old, meticulously polite, and she weighs about as much as one of George Foster's arms. (Bruce Sterling once described her as "something like a Pilgrim maiden behind leaded glass; if she were 6 inches high, Dorothy Denning would look great inside a china cabinet.") Yet the rage she generates in some of the foes of government crypto policy is a better indication of her real strength and of the considerable effect her lone voice has had in the debate over how - or whether - cryptography should be regulated. Indeed, no single person, within or without the government, has been as fierce an advocate of the Clinton administration's crypto policy as Dorothy Denning. When White House officials do take the podium in defense of Clipper and its progeny, they usually make it clear that they would be happier discussing other less contentious subjects. Most often, they require that you do not quote them for attribution. For them, defending crypto policy is like having dental surgery. By contrast, Denning has a passion for expounding the arguments for a system whereby so-called key escrow backdoors preserve government access to encrypted messages. And Denning is willing to swing the weight of her reputation behind it - which adds exponentially to her arguments. After all, she doesn't have to do this. As the years go by, the subject gains more attention, almost all of it directed at attacking the government's case, which has evolved from Clipper itself into a number of increasingly complicated schemes all embodying the essence of Clipper: government access to the keys that ensure the secrecy. Yet Denning persists, in perpetual sync with the administration's position, chairing panels, churning out papers, writing Op-Ed pieces, zinging the opposition in cyberspace missives. As you might expect, Dorothy Denning is very popular in government circles. Mike Nelson, until recently the administration's point person on the subject, is extremely high on her. So is Clint Brooks, the National Security Agency's architect of Clipper. And when FBI director Louis Freeh spoke last September at a conference Denning chaired on international crypto policy, he broke from his jeremiad on kiddie pornographers and Filipino terrorists hiding under the cover of RSA algorithms and thanked Denning "for the tremendous work and support that she has given to the development of education of these issues." Even critics of government policy admit she's the Feds' best weapon. "Dorothy Denning," says Marc Rotenberg of the Electronic Privacy Information Center, "has given a gloss of credibility to proposals that would not otherwise be taken seriously." Why does Dorothy Denning do it? Her opponents sometimes look for a personal explanation, either mercenary or psychological. Denning heatedly denies any sellout; she says she gets no grants from the FBI or NSA. The psychological possibility is intriguing but elusive. There seems to be no Rosebud in her past to easily explain it - none of her friends or family members, for instance, were victims of a kidnapping in which insufficient information led to tragedy. When pressed for any personal connection to the urgency of the key escrow scheme she defends (which hinges on generating an extra key to unlock data, and the government having access to that key), she takes some time to think about it and, after several days, emails a reply. There were times as a college student when she lost the keys to her apartment and the police had to let her in. And just recently, after taking her regular swim on the Georgetown campus, she emerged from the pool to find that she could not open the combination lock on her locker. Inside were her clothes, her money, her ID. She shivered as she contemplated the necessity of venturing outside in 40-degree cold, wearing only a wet bathing suit and a faltering smile, imploring strangers for help. That disaster was averted when a university worker snapped the lock with a bolt cutter, but the incident reinforced her belief in the value of a system that automatically provides a spare key. Not exactly the stuff of spy novels. But there is drama in the story of Dorothy Denning's relentless defense of Clipper, and it comes from the path she has taken to get there. Just a decade ago, Denning was a relatively obscure academic, toiling in the field of computer security while courting no controversy. But six years ago, she suddenly emerged as a semipariah to the security crowd by announcing that instead of demonizing the young hackers who broke into computers, we should try to understand them, work with them, even learn from them. But no sooner had the cyber-liberties crowd begun to embrace this new champion than she jammed a hard right turn, siding strongly with law enforcement and the government point of view - eventually becoming the FBI's favorite prof, cleared to hear top-secret skinny from the NSA. Because of her previous views, each swing of her pendulum was akin to a celebrated defection to an enemy camp. Those sharing her new views were delighted that she finally saw the light and welcomed the status she brought to the cause. Those she left behind felt betrayed and wondered if she'd taken leave of her senses. Yet there is a consistency to Dorothy Denning: at every turn, she does what she feels is right, and the elements that determine her positions are intensely personal. Ultimately, hers is the tale of a woman who quietly yet determinedly succeeds in a world where few women venture - but finds her ultimate success in discovering an unlikely niche where she can finally be herself. It's her husband, Peter Denning, himself a distinguished computer scientist, who underscores the depth of her commitment today. To hear him talk, his wife almost thinks she has been tapped by God to defend crypto policy in spite of the legions aligned against her. "I don't care if I'm alone," he imagines her thinking, "I believe it's my destiny."
Newbie prof Dorothy Elizabeth Robling was born in 1945 ("a great year for French wine," she says) in Grand Rapids, Michigan. Family legend has it that she displayed independence early: her mother recorded in her baby book that when things did not go her way, Dorothy would gather up her toys and go elsewhere. She was the second of three daughters, but the one most disposed to work for her father, who had a business in wholesale building materials, with offices in Grand Rapids and nearby Grayling, Michigan. She started working while in grade school and earned enough for her first bicycle. By her own description, she was industrious, stuffing envelopes with marketing fliers and rubber-stamping the return envelopes. As she reached high school age, she took on more responsibility, doing invoicing and inventory. She had a talent, though not necessarily a love, for math. She knew that she wanted more from her career than to work in Dad's office. Her high school adviser, evaluating her proclivities, suggested she might look into computer work and described what that might be like. "I said No way," she recalls, displaying what her husband would later refer to as "an iron will." Instead, she headed off to the University of Michigan, on scholarship, so she could train to become a teacher of high school math. She arrived at Ann Arbor in 1963 and stayed there through 1969, ultimately earning her master's. It was a liberating time, and certainly a political one. Dorothy, in a small way, participated, working on Eugene McCarthy's antiwar presidential campaign. But she was never sympathetic to the radical politics of the time. She not only was appalled at the idea of bombing school buildings for peace, but repelled by the inconsiderate tactics of the antiwar movement in general. One of her teachers was literally carried out of the classroom by judgmental antiwar types. "I found it totally uncalled for," she says. In particular, she took offense that the protesters singled out the field of computer science as a symbol of evil. That field, despite her earlier resistance, turned out to be her choice of study. She had come to it serendipitously. During her junior year, her father died, and she stayed on campus that summer to work a secretarial job at the radio astronomy department. When the professor in charge found that she could successfully spin out calculations of Doppler shifts on a Wang desk calculator, he suggested she try programming. The idea that she could concoct a mathematical recipe for two months or so, send it to the computer center, and have it quickly returned with accurate results was amazing. "I got kind of hooked," she says. Programming looked even better after she was sent out for practice teaching - the unruly sixth graders offered a resistance that she would not experience again until many years later in encounters with Clipper-hating cypherpunks. After graduating, she did not enter the teaching profession, but went straight to grad school to learn more about computers. At that time, even more than today, computer science was a field with very few women. Denning claims never to have had a problem working in a field largely dominated by men. "I think it was the training I got working for my father," she says. "There was only one other woman in his company, the secretary - so it was something I grew up with. And math classes are predominantly male, so it was always present. It has never been a problem." When Dorothy completed her master's, in 1969, she was ready to become a systems programmer. She was also newly married to a fellow student named Bill Davis. They moved to Rochester, New York - Dorothy working at the University of Rochester computing center - but within three years the marriage went bust, and she entered a doctoral program at Purdue. The very first semester, she took a course on operating systems. Her project for that class was on computer security, a subject she liked well enough to pursue seriously. She felt the same way about her teacher, a young associate professor with an MIT doctorate who had just arrived at Purdue after a teaching stint at Princeton. His name was Peter Denning. Within two years, they would marry. Computer security in the mid-1970s was a rather abstract field, dealing mostly in theories. The embryonic Internet hooked together only a few sites. Although hacker pranks were common, they were almost all launched from inside the computer centers themselves; in any case, the violations were almost always benign. The computer-security academic priesthood cogitated about access control, password schemes, and the like. Implementation was left to industry; the idea was that corporate security was perfectly attainable by taking the proper safeguards. Government work was in a realm of its own. (Denning wrote her thesis on information flow, but only as she was finishing did she learn how a similar problem - the flow of classified information - was handled by the military.) Dorothy Denning was good at her work, but she kept thinking she might be happier tackling another, more vital, area in computer science - graphics and interface design, where all the mumbo jumbo of the digital infrastructure cuts through to the human mind. At one point, she actually began working on a project called PUNT - "It stood for Program Understanding Tool, something like that," she recalls - in which the idea was to show on the screen what was happening with the program inside the computer at any given point in time. But her grant proposal was turned down. In the late 1970s, however, her work in the security realm suddenly got interesting again. Dorothy Denning was one of the few who correctly divined that a sort of revolution was under way in the world of security: cryptography, a field that for most of this century had been methodically controlled by the government, was suddenly out in the open. She had read the groundbreaking 1976 paper by Whitfield Diffie and Martin Hellman that introduced public key cryptography, but felt a true frisson two years later when encountering the article by Rivest, Shamir, and Adleman that proposed a practical implementation of the concept. She was teaching a computer security course at the time, and she realized that no textbook had yet dealt with these developments. As a smart and ambitious academician, she understood that a rare opportunity was available to her: she could write a book on this emerging field. She had been itching to do a book ever since reading Douglas Hofstadter's Pulitzer-winning Gödel, Escher, Bach: An Eternal Golden Braid (see "By Analogy," Wired 3.11, page 110), which thrilled her so much that she invited the author to Purdue, not only to give a talk but to be guest of honor at an elaborate dinner she planned where every course resonated with Hofstadter's tome. (Throughout, the diners munched on "Dilled Eggbread Denning: The Eternal Golden Braid.") Denning even composed music for the event. "Doug was the inspiration for me to write a book," she says. "Even though mine was nothing like his," she adds, laughing. "She became obsessed with that book," recalls Peter Denning. "It took her one year, start to finish, in addition to her teaching. She would wake up and jump to her terminal, and then stay up late in the night. When she turned the manuscript in to her publisher, she got reviews from people like Diffie, who offered frank criticisms. She was feeling discouraged, but she dug in and followed their suggestions." It paid off: Cryptography and Data Security, published in 1982, would be recognized as a standard text in the field, not to mention a wonderful technical introduction to the art of keeping secrets in the computer age. At the time, there was a hot controversy between the National Security Agency and the academic community: the NSA felt that by openly discussing and publishing various technical aspects of cryptography, mathematicians and computer scientists might be providing powerful knowledge to our enemies. To ensure against this, the NSA suggested that authors submit to prepublication review. The academics, Dorothy Denning among them, did not warm to this concept. She offered the NSA no opportunity to screen secrets. In any case, she says, "The whole time I was writing the book, I never once thought about the fact that cryptography might be a problem someday. It never occurred to me." That was then. If she knew then what she knows now about the case against the spread of strong cryptography, as well as the needs of the NSA, she says, "I would have sent it to them."
Hacker den mother That is the Dorothy Denning who today is the scourge of wireheads everywhere. But only a few years ago, Denning stood miles away from the government perspective, pleading the case for a certain class of lawbreakers. She was, for a brief time, the champion of hackers (though, she emphasizes, not of their illegal activities). It happened, of course, in California. In 1983, Peter Denning was offered a job at NASA's Research Institute for Advanced Computer Science, and his wife accompanied him west, taking a job at Stanford Research Institute, the prestigious think tank and research center known for projects like Doug Engelbart's pioneering interface research. Dorothy continued her work on computer security, but was beginning to harbor doubts about some of the implications. One of her main projects was developing a system for intrusion detection, and she began worrying that implementing such a scheme might violate the privacy of users. Perhaps as a result of this discomfort, she began to yearn for work in what she had always suspected was the more interesting digital frontier: graphics and interface. Finally, in 1987, she got a job in that field at Digital Equipment Corp.'s research center in Palo Alto. To her consternation, she realized she was in over her head. The people there were legendary wizards so steeped in the guts of systems that she found no place in the conversation. The disappointment was tempered by a fortuitous contact. A young hacker going by the nom de keyboard Frank Drake (in reality the same Steve G. Steinberg now found on the masthead of this magazine) knew of her work in security and crypto and wanted to interview her for a hacker zine. The ensuing electronic exchange was an absolute revelation to the studiously professional computer scientist. She was impressed that Drake had actually thought about issues like privacy and responsibility, and that piqued her curiosity. Part of her excitement also came from finally dealing with people in her work. "All my time had been spent on these abstract problems, and I guess at that point I was ready to do something different," she says. That impulse had been fueled by Denning's mind-altering attendance at The Forum, an intense, two-weekend sensitivity workshop designed by Werner Erhard that descended directly from the quasi-religious organization est. The program, she says, was "designed to get you in touch with the beliefs that you had about the world and to see the box that you lived in." In her case, the box was the math-driven theoretical world of computer science. She knew that mathematics had a real effect on society, but as far as her inner feelings were concerned, "the connection between mathematics and society seemed remote." Attending the sessions "woke up the interest I had about society and how my own work influenced society." Whether it was a case of the workshop affecting her behavior or the grown-up equivalent of packing up her toys and going elsewhere, she decided to explore a more humanistic approach to her work. So Dorothy Denning delved into the computer underground. She later turned the tables on Drake and interviewed him, then got a list of others to interview. At first it was anthropology. But as she continued, she began to admire their curiosity and accept their contention that they were just bright kids - really - kids who weren't trying to cause grief. Their misdeeds, she recalls, "didn't seem all that bad." She was smitten, and she admits that part of it could have been a displaced maternal urging. (Denning has no children; "too absorbed in my work," she says.) "I was at the age when those kids could have been mine," she says. "I could have been their mother. I started thinking, 'Gee, if one of these was my kid, he could be going to jail,' and it didn't seem justified." Eventually, she became so involved in that spirit of surrogate motherhood that she took on the role of adviser to the legal team representing Craig Neidorf, a college student facing a prison term for posting a telephone company document in an electronic publication. Her lasting statement was a paper titled "Concerning Hackers Who Break into Computers." She presented it at the 13th National Computer Security Conference in Washington, DC, in October 1990, chairing a panel with Drake (aka Steinberg), Neidorf, and Emmanuel Goldstein (aka Eric Corley), the punkish publisher of 2600, a hands-on guide to phone hacking and social engineering. "I thought the people at this conference should hear what these guys had to say," she says. (There were also some nonhacker types on the panel.) Though it follows the format of an academic article, her paper actually has more in common with some of the digi-goo-goo writings of Howard Rheingold, John Perry Barlow, and, I must admit, my own book Hackers, which is cited as a source. "My initial findings suggest," she writes, as if squinting into some social test tube, "that hackers are learners and explorers who want to help rather than cause damage and who often have very high standards of behavior.... Hackers have raised important issues about values and practices in an information society. Based on my findings, I recommend that we work closely with hackers." The paper caused quite a stir, and some in the security community regarded it with biting criticism. But the remarks that really stopped Denning in her tracks came from her former SRI colleague Donn Parker, the hawkish computer-crime guru, who considered her stance naïve if not dangerously misguided and, worst of all, unprofessional. He suggested that she might think differently if she had ever considered the other side. Now that she had departed from the mathematics and technical theories of security for the murkier grounds of human psychology, why not seek the other side of the story and talk to those who had to fight off the little bit-snatchers? So she did, pursuing the project with the same manic vigor with which she had attacked her book project. It was, yet again, a revelation. One day, she visited the Los Angeles Police Department, where an officer spent hours going through the kinds of cases the LAPD had handled, cases with nasty hackers and real victims. "I saw some of the documents taken off hackers' computers, including worksheets that they used in the cracking process." She saw evidence of outright theft of information, of stolen credit cards with merchandise ordered. "Most of the cases I heard about were ones where there was some monetary action involved," she says. She visited Gail Thackeray, the prosecutor who ran a notorious antihacker investigation called Operation Sun Devil. "There were all these stories about what a witch she was, but she was a very nice person." Then she returned to the San Francisco Bay area to understand the problems the region was suffering with hackers. In each instance, she felt that the people she met were honest and diligent public servants, protecting the world against what they considered a very real threat. She came to conclude that the cases with which she had been most familiar - cases like that of Neidorf, in which the government acted improperly against apparently innocent people - had been anomalies. "Overall, the cases were being handled very professionally," she says. "There was also a lot of concern for the kids that they busted. In fact, in the majority of the cases, they met with the kids and the parents and the whole thing was resolved out of court." After some months of interviewing law enforcement people, Denning came to realize that her own views, as expressed in her hacker paper, were misguided. All that stuff about hackers being thoughtful pioneers of constitutional freedoms was actually, she realized, bullshit. She now has thoroughly recanted her earlier stance. In 1995, she published a postscript to her 1990 paper which, in effect, contends that she totally misinterpreted the hacker scene. She now realizes that the few hackers she had interviewed may have been "learners and explorers," but the vast majority actually were petty thugs, malicious vandals, or, at the very least, misguided trespassers. "I no longer recommend working closely with hackers," she wrote, concluding that "working with people who flagrantly violate the law sends the wrong message and rewards the wrong behavior." Instead she suggests "better security and law enforcement ... so that chances of penetration are reduced while those for detection and prosecution are increased." Dorothy Denning had packed up her toys and moved one more time.
Spooky beltway insider In the midst of this reevaluation, in 1991, Denning went east. Going to DEC had been "the worst career decision in my life," and her anthropological studies of hackers received a poor reception at what, after all, was a research lab. So, when she saw two advertisements in a magazine, one for the computer science department chair at Georgetown and the other for the same position at George Mason University in northern Virginia, she applied for both. Georgetown replied first, and in short order she interviewed and accepted their offer. When George Mason finally contacted her, she told them she was unavailable, but added, "I know just the guy for you." That's how Peter Denning got his job. It was from that Washington, DC, perch that Dorothy Denning would became a policy player. In the early 1990s, the controversy du jour in cyber circles was the government's proposed Digital Telephony Bill, legislation that would require the entire telecommunications network to be wiretap-friendly - even if it cost millions or billions of dollars. Discover magazine asked Denning if she'd be interested in writing about it. "It started out as a neutral, balanced article," she says. But she sat down with the FBI and other security agencies and heard the case from their point of view, and became increasingly convinced that wiretaps were crucial to the ability of law enforcement to protect society. She heard about the planned rocket attack of an airplane being thwarted and learned that without old-fashioned analog wiretaps, that airplane and its passengers might have been dust. Likewise, wiretaps were essential in successfully prosecuting government corruption in a case called Ill Wind. She was particularly impressed that in the fight against organized crime, wiretaps had been the absolutely essential prosecution tool. But all wiretaps were in danger because advanced digital telephone systems would make it harder to install and carry out the taps. All the government wanted, she was told, was to maintain the same ability it currently enjoyed. And while others suspected that the government really wanted the ability to create more taps, at lower cost, with fewer technological hurdles, Dorothy took her government sources at their word. She had come to know and trust them. The Digital Telephony Bill, she concluded, was a fine and important initiative. Though Discover later changed its mind about wanting the article, in March 1993 she did publish a long story for the Communications of the ACM titled, "To Tap or Not to Tap." It was clear that she favored the former. It caused quite a stir, particularly because many knew Dorothy Denning as the computer security specialist who defended hackers. The public defection was seen as significant, and the reaction commensurate. "After a substantial number of conversations with people in law enforcement, I said, 'OK, I'm going to support this.' And everything changed after that." The electronic attacks then began, at first on the sci.crypt newsgroup, and then spreading more widely. Many of the postings were ad hominem, and this bothered her. For a while she saved the postings, but eventually the file got too large to keep. The worst responses were from people she knew: they were often condescending, calling her naïve. "They thought I had been sucked into the government's side of the debate without really understanding it myself and making my own intelligent decision about it," she says. "That digs at your intelligence and your gullibility, so actually those comments hurt more than the others because they came from people I respected." Her stance on Digital Telephony had given her a label: the government's good friend. With the Clipper Chip, she would become its best friend. In April 1993, she got a call from John Markoff of The New York Times, who then was researching the story that would break the news of Clipper. He seemed to know more than she did. According to a declassified National Security Council document, she reported the conversation to the FBI, which passed on to the NSC the information that Markoff "knew what was brewing." Denning confirms the story, saying that she alerted the FBI of Markoff's call in part to inquire about what might be happening but also to warn them that the Times was on the case - a heads up that may well have caused the government to speed up its announcement of Clipper. Denning didn't really learn the details until two days later, when an FBI friend told her the news. The following day, April 16, 1993, Clint Brooks, the NSA's architect of key escrow policy, drove from Maryland in a driving rain to Denning's office at Georgetown to brief her on the workings of the chip. Brooks remembers her as initially being skeptical, but coming around as she learned more about it. Later that day, she attended a Commerce Department briefing and then met with the FBI. "My reaction was very positive," she says. "It was like they really wanted to let the community know how this thing worked." In thinking about the Digital Telephony legislation, she had worried that the whole effort would be wasted if speakers encrypted their phone conversations - in that case, wiretappers would get the taps but wouldn't be able to understand a word. Denning had been musing about approaches to this problem and was delighted that the government was working a step ahead of her. "They had actually worked out something which was better than anything I had thought of," she says, "and it seemed exactly the right thing to do." At the end of that day of briefings, Denning posted a technical description of the telephone-based Clipper scheme on the Net. She also later wrote a piece for American Scientist that attempted to simply explain what Clipper was all about. She meticulously described how the chip's keys were to be stored in government escrow facilities, to be offered only to legal wiretappers. "There were all kinds of misperceptions and misconceptions," she says. Denning was also chosen by the government to be part of a panel of cryptographers who would evaluate the efficacy of the chip, in particular the secret Skipjack algorithm that did the actual encryption. This was very important for the government, because critics seized on the fact that the encryption scheme was designed by the highly secretive NSA, and it was impossible to tell whether the government had stuck in a backdoor that would allow it to break secrets - even without the keys. The panel concluded that the Clipper Chip was secure. This turned out to be somewhat of an embarrassment, since Matt Blaze, an AT&T computer scientist, discovered in May 1994 a flaw that enabled abusers to use the chip in a way that thwarted wiretappers. Denning counters: "It was definitely not in our mandate even to look for that kind of thing. We were really looking to make sure that people's data would be well protected with this - not really looking at whether someone could subvert it." After the panel review, Denning turned from merely describing the chip to outright public advocacy, reflecting the favorable opinion she had held since early in her evaluation. If the abuse from her stance on Digital Telephony was harsh, Dorothy Denning received even more brutal treatment for her defense of Clipper. Typical was the critic who charged that she must have been dropped on her head as an infant. "When she showed me some of the flaming, my blood would boil," says Peter Denning. But she kept on with it, writing an Op-Ed piece for Newsday, publishing journal articles, even debating John Perry Barlow on America Online. The Clipper Chick was going full tilt. Despite the best efforts of Dorothy Denning and the administration, the original Clipper failed. In her estimation, two factors killed it. First, it provided too much to criticize: it had a secret algorithm; it was a hardware chip, not software; and the escrow agencies holding the key were part of the government. Second, there was no market demand for such a telephone system at its US$1,200 price. But the essence of the Clipper idea - providing a government backdoor to encrypted files by way of escrowed keys - survived and even expanded to include computer communications and stored computer data. In September 1995, the government came up with a new proposal, dubbed by critics as Clipper II. The administration contended that businesses would welcome this new version because it provided a fail-safe means of retrieving computer data when keys were lost. There were also concessions: this scheme did not involve a hardware solution, but a software one. The escrow agencies would not necessarily be associated with the government. And if companies used the new key escrow crypto, they could export systems that took advantage of longer keys - the longer the key, the stronger the crypto. Without key escrow, the exported keys must remain only 40 bits long, but with them they could be 64 bits long, increasing security by a multiple of many thousands. As the government fashioned this new approach, Dorothy Denning "was very helpful with constructive suggestions," says Clint Brooks of the NSA. Once again, the marketplace showed no enthusiasm for the proposed changes. So in May 1996, the administration released a draft of a white paper that made further compromises - including provisions for self-escrowing keys. But this third proposal, dubbed by some as Clipper III, was placed in a context of a complicated structure for the management of keys, which, of course, involves government access. Once again, Denning has been defending it. Even though she has not been directly responsible for the twists and turns of policy, she provides the bedrock rationale behind all the schemes, as well as an argument for their necessity. It seems that with the current climate in Congress - where even Bob Dole has sided with crypto-anarchists in charging that the administration's policy does little but cripple our own computer industry - that the political tide is beginning to turn away from the administration. The National Research Council's May 1996 report on cryptography concluded that the government's policy is flawed, that key escrow should be approached cautiously, and that current export controls on crypto should be relaxed (see "Clinton's New Clothes," Wired 4.08, page 80). It was another blow against the administration - particularly since the committee included such establishment types as a former NSA deputy director and a onetime attorney general. Yet Dorothy Denning continues, unbowed.
Destiny This is a battle Denning may not win, but she thinks it's too important to give up. Recently, she became alarmed by an increase in cases where, she was told, investigative agencies have been frustrated by scrambled files and communications. For several days, she called these agencies and received firsthand reports. "These cases," she says, "involved child pornography, customs violations, drugs, espionage, embezzlement, murder, obstruction of justice, tax protesters, and terrorism." In the conference she hosted in September, FBI Director Louis Freeh even spoke of a crypto-packing terrorist organization in the Philippines that's plotting to kill the pope. She thinks that key escrow is destined to be a "third paradigm" of cryptography (after secret key and public key). It could become a standard means of assuring that people can get access to their own materials - as well as, of course, the means by which government can get hold of encrypted information when necessary. Without key escrow, she believes, what some of her opponents lovingly call "crypto anarchy" will indeed rule. "Crypto anarchy can be viewed as the proliferation of cryptography that provides the benefit of confidentiality protection but does nothing about its harms," she explained in a recent paper. "It is like an automobile with no brakes, no seat belts, no pollution controls, no license plate, and no way of getting in after you've locked your keys in the car." If crypto anarchy were unloosed upon the world, she predicts, "social disorder and lawlessness" would thrive and chaos itself might ultimately rule. With those stakes, how can she possibly withhold her comments? How can she allow false information about key escrow to remain unchallenged on the Net? "I have a very strong reaction to things that are false. When I see something that's false, it doesn't matter what it is, I will often respond to it," Denning says. "And so there have been cases where I know I have defended the government because I thought the statements that were being made were not fair. People will say the government is trying to do X, and I say, 'No, based on my conversations with people in the FBI and the NSA, that's not what they're trying to do, they're trying to do Y.'" So what if her critics maintain that it's one thing to attempt to correct truths, but quite another to do so in a partisan matter? What if, because her arguments always seem to favor the government, some of her peers in academia and the professional community maintain (off the record) that she has lost her credibility? "I can see why they would say that, because I find that my own views are very consistent with views of people in the NSA and FBI, and because I will defend them when I think they're being unfairly attacked," she says. "It's true - I do feel inclined to defend the government. I accept that. I accept I'm not neutral on this issue. I have taken a position on this issue and so when you take a stand, you can't look at it as a neutral impartial observer. That's the role I've fallen into."
"Are you comfortable with that role?"
"I don't think about my personal comfort. That's not an issue."
"Well, then you sound like a crusader."
"Well, no. I'm not crusading, either."
"Then you're acting as a conscience?"
Dorothy Denning pauses. "OK, maybe. I just want to make sure that the government point of view gets understood for what it is. And not for what other people say it is." In effect, Dorothy Denning is protecting the government with the same maternal fury that she once exhibited when she rushed to the aid of the hackers. Her motivations are really not about power, money, or even glory. She has made a personal connection with the law enforcers, the bureaucrats, and the spies, and her trust in them has enabled her to evaluate the evidence they present with what she considers a clearer eye than those outside the loop. Armed with what she believes is the truth, she's getting the message out. As a result, she thinks her work does make a difference, does have an impact on society. Her critics may think that she's wrong, that she's pedantic, that she's a stooge for Big Brother. But don't make that argument to Dorothy Denning. She's heard it already, and she's not buying it. Destiny has tapped the Clipper Chick on the shoulder, and she's hellbent on living up to the responsibility.

 

HOME PAGE Indice crittografia