Three minutes with Steven Levy

For decades, the U.S. government restricted the public use of high-strength encryption, and particularly its export from the United States, to protect its own surveillance of American citizens and foreign entities. Steven Levy, Newsweek's technology columnist and author of the recently published Crypto, has covered the 20-year battle between civilian cryptographers and government agencies over the public's right to privacy. He's seen the demands of the Internet and electronic-commerce finally lead to the Clinton administration's easing of restrictions in September 1999.
PCW: Why do we need encryption?
LEVY: Thirty years ago we didn't need it as much because we weren't communicating so much in such open channels. But with e-mail ... and cell phones ... it's important to communicate in a way that unwelcome people can't hear us.... [And] cryptography gives us the tool that enables us to be able to do commerce and other stuff in cyberspace.... So it really becomes essential to have something like this in place.
PCW: You write about the Penet case in Finland in 1995 in which the Church of Scientology went after a remailer service for allowing a critic of the church to anonymously post church documents on the Net. The Finnish government concluded that e-mail shouldn't have the same protection as postal mail and phone calls. Why do you think it has taken so long for electronic mail to be recognized as deserving the same protection as regular mail?
LEVY: Well, in some cases it still isn't really recognized.... For instance, if you send something in the mail from your place of employment, your employer would have the right to open your mail.
PCW: Do you think that we'll begin to see company policies and perhaps legislation to let employers prevent employees from using encryption when sending personal mail through a work computer?
LEVY: I think ... employers will demand that people use their company's keys, and you won't be able to communicate privately in a way that your employer can't read it.
PCW: You make the claim that everyone is entitled to privacy. But should that really be the case?
LEVY: There's not a privacy amendment in the Constitution, but justices have acknowledged that there is something akin to a right of privacy to a certain degree. I certainly think you start off with the premise that people are entitled to privacy, and there are cases where it's reasonable to say, "Well, in this case, you're not entitled to privacy." You could argue that felons in prison aren't entitled to many of the privacy rights that people outside have. People under suspicion or who have a warrant against them ... shouldn't have the privacy that people who aren't under suspicion have.
PCW: In your book, you talk about the "Four Horsemen of Apocalypse"--drug dealers, kidnappers, child pornographers, and terrorists--who are the unintentional beneficiaries of encryption. You also quote Phil Zimmerman as saying that "all technology has trade-offs." Is encryption for terrorists and criminals the trade-off for the rest of us to have privacy?
LEVY: If you accept that it's a reasonable thing to build encryption into systems--to let people in general take advantage of it--then you acknowledge that this is going to benefit criminals, too. But there are things that you can do to mitigate the benefit that criminals have. There are ways to track the way people communicate without knowing the content of their communications, and maybe there are ways the government can try to crack those codes.... [For instance,] you can [require] that some people who use encryption have to make their keys available.
PCW: But encryption has been let out of the bag and is widely available. How do you now address the fact that people who shouldn't have encryption already have it? How do you change that?
LEVY: You can't change that. You can outlaw guns ... but if someone wants to break the law and get a gun and is highly motivated to do so, they're going to get a gun. Now in the case of [encryption] software ... you can make it more difficult for them to use that ... but the fact is, the stuff's out there. It's a reality that law enforcement and national security agencies have to deal with, and to some degree they're beginning to adjust to it.
PCW: But haven't we stacked the cards against law enforcement and the nation's defense forces by opening encryption to everyone?
LEVY: I don't necessarily think so.... [J]ust because they might not be able to listen to a phone conversation and read e-mail as easily doesn't mean that ... they're not going to get a wealth of new information. Take, for instance, cell-phone tracking: There's a good possibility that they will be able to find out where everyone is as people talk over the phone. That's real valuable information that is going to be very helpful to them.
PCW: Yes, but certainly not as valuable as if they had written words and could hear the phone conversation.
LEVY: Well, recently there was a case in Philadelphia where a mobster was using PGP [Pretty Good Privacy], and [investigators] managed to get a keyboard sniffer in there which read the password, and they got everything... My point is that the march of technology should not be dictated by [the government's desire] to maintain the exact same methods they used to use to gather information.
PCW: So you don't think that now that we've fought so hard to get encryption public that it leaves the door wide open, that it's going to lead to anarchy as the government feared?
LEVY: No. This vision of crypto anarchy is in a way as misguided as the government's belief that they could stop this thing.... Cryptography might present more of a challenge for law enforcers or tax collectors, but they can [still] get you.
PCW: What is the future?
LEVY: We're going to get cryptography built into a number of systems over the next few years. There are some knotty problems involved in this in terms of infrastructure.... There's still work to be done, and [work] in making this stuff ubiquitous... There are hurdles, but we can start addressing these things now that the main hurdle has been largely removed. I think we're going to see digital cash happen eventually and digital signatures become common.
PCW: So how long before we'll reach the point where pretty much everyone is using encryption for their important correspondence?
LEVY: It could happen within five years.
PCW: Is stronger encryption a key to defeating hackers?
LEVY: Certainly it's helpful. One thing we can do right now is make sure that e-commerce locations that store information that could be accessed by the Internet--even if it's password-protected--store these things in encrypted format to take that extra step so that if someone does break into the system, [they] can't get hold of it.
PCW: You talked about a future of quantum computers that could break our encryption codes, and you quote Edgar Allan Poe as saying that no code is impervious to cracking. Are we standing on the cyberspace equivalent of landfill by putting too much stock in encryption?
LEVY: No.... There is quantum cryptography as well as quantum computers, and quantum cryptography would protect you from the quantum computer. So basically it's an arms race. Obviously ... you can't get complacent and say that today's cryptography will protect us forever, but you can with some confidence say that every step of the way there will be strong codes to protect you from state-of-the-art means of crypt analysis.
PCW: You imply that the blame for the lack of security on the Internet today lies with the government's resistance to stronger public encryption.
LEVY: Not solely. The Internet was not built with security in mind. So we started off with a problem: How do you secure something that is by its nature open? But I think the government exacerbated the situation by taking the stance it did.
PCW: What could the government have done differently?
LEVY: They could have recognized earlier that there's arguably an equal national security interest in securing the Internet with cryptography as there is in preserving our ability to listen in on other people by suppressing public cryptography. We would have been maybe a couple of years ahead of where we are now in security.
PCW: Is it fair to say that e-commerce saved the day for encryption?
LEVY: I think it certainly helped. It was the cavalry riding in.
PCW: It's interesting to note that the impetus for relaxing the regulations was economic.
LEVY: Yes, but it went hand in hand with the idea that we weren't going to put our nation at risk by doing it. Where the motivation was economic, the argument was that this is something that is economically beneficial and in excess of whatever drawbacks might come with it.
PCW: So you don't think they sold us out for big business?
LEVY: I don't think so, because this stuff is good for securing the economy, and for securing the infrastructure. So at a certain point the disaster scenarios became just as scary from not using cryptography as they did for using it.

 

HOME PAGE Indice crittografia