Summary: 16.2.1. Main Points - "...when you want to smash the State, everything looks like a hammer." - strong crypto as the "building material" for cyberspace (making the walls, the support beams, the locks) 16.2.2. Connections to Other Sections - this section ties all the other sections together 16.2.3. Where to Find Additional Information - again, almost nothing written on this - Vinge, Friedman, Rand, etc. 16.2.4. Miscellaneous Comments - a very long section, possibly confusing to many Intro: 16.3.1. "The revolution will not be televised. The revolution *will*, however, be digitized." Welcome to the New Underworld Order! (a term I have borrowed from writer Claire Sterling.) 16.3.2. "Do the views here express the views of the Cypherpunks as a whole?" - This section is controversial. Hence, even more warnings than usual about being careful not to confuse these comments with the beliefs of all or even most Cypherpunks. - In fairness, libertarianism is undeniably the most represented ideology on the list, as it is in so much of the Net. The reasons for this have been extensively debated over the years, but it's a fact. If other major ideologies exists, they are fairly hidden on the Cypherpunks list. - Yes, some quasi-socialist views are occasionally presented. My friend Dave Mandl, for example, has at times argued for a less-anarchocapitalist view (but I think our views are actually fairly similar...he just has a different language and thinks there's more of a difference than their actually is--insert smiley here). - And several Cypherpunks who've thought about the issues of crypto anarchy have been disturbed by the conclusions that seem inevitable (markets for corporate information, assassianation made more liquid, data havens, espionage made much easier, and other such implications to be explored later in this section). - So, take this section with these caveats. - And some of the things I thing are inevitable, and in many cases positive, will be repugnant to some. The end of welfare, the end of subsidies of inner city breeders, for example. The smashing of the national security state through digital espionage, information markets, and selective assassinations are not things that everyone will take comfort in. Some may even call it illegal, seditious, and dangerous. So be it. 16.3.3. "What are the Ideologies of Cyperpunks?" + I mentioned this in an earlier section, but now that I'm discussing "crypto anarchy" in detail it's good to recap some points about the ideology of Cypherpunks. - an area fraught with dangers, as many Cypherpunks have differing views of what's important + Two main foci for Cypherpunks: - Personal privacy in an increasingly watchful society - Undermining of states and governments - Of those who speak up, most seem to lean toward the libertarian position, often explicitly so (libertarians often are to be found on the Internet, so this correlation is not surprising) + Socialists and Communitarians - Should speak up more than they have. Dave Mandl is the only one I can recall who's given a coherent summary of his views. + My Personal Outlook on Laws and Ideology: - (Obviously also scattered thoughout this document.) + Non-coercion Principle - avoid initiation of physical aggression - "to each his own" (a "neo-Calvinist" perspective of letting each person pick his path, and not interfering) - I support no law which can easily be circumvented. (Traffic laws are a counterexample...I generally agree with basic traffic laws....) - And I support no law I would not personally be willing to enforce and punish. Murder, rape, theft, etc, but not "victimless crimes, " not drug laws, and not 99.9998% of the laws on the books. - Crypto anarchy is in a sense a throwback to the pre-state days of individual choice about which laws to follow. The community exerted a strong force. - With strong crypto ("fortress crypto," in law enforcement terms), only an intrusive police state can stop people from accessing "illegal" sites, from communicating with others, from using "unapproved" services, and so on. To pick one example, the "credit data haven" that keeps any and all financial records--rent problems from 1975, bankruptcy proceedings from 1983, divorce settlements, results from private investigators, etc. In the U.S., many such records are "unusable": can't use credit data older than 7 years (under the "Fair Credit Reporting Act"), PI data, etc. But if I am thinking about lending Joe Blow some money, how the hell can I be told I can't "consider" the fact that he declared bankruptcy in 1980, ran out on his debts in Haiti in 1989, and is being sued for all his assets by two ex-wives? The answer is simple: any law which says I am not allowed to take into account information which comes my way is _flawed_ and should be bypassed. Dialing in to a credit haven in Belize is one approach--except wiretaps might still get me caught. Cyberspace allows much more convenient and secure bypasses of these laws. - (For those of you who think such bypasses of laws are immoral, tough. Strong crypto allows this. Get used to it.) 16.3.4. Early history of crypto anarchy + 1987-8, AMIX, Salin, Manifesto - discussed crypto implications with Phil Salin and Gayle Pergamit, in December of 1987 - with a larger group, including Marc Stiegler, Dave Ross, Jim Bennett, Phil Salin, etc., in June 1988. - released "The Crypto Anarchist Manifesto" in August 1988. - Fen LaBalme had "Guerillan Information Net" (GIN), which he and I discussed in 1988 at the Hackers Conference + "From Crossbows to Cryptography," 1987? - made similar points, but some important differences - TAZ also being written at this time 16.4.1. Unchanged since it's writing in mid-1988, except for my e- mail address. - There are some changes I'd make, but... - It was written quickly, and in a style to deliberately mimic what I remembered of the "Communist Manifesto." (for ironic reasons) - Still., I'm proud that more than six years ago I correctly saw some major points which Cypherpunks have helped to make happen: remailers, anonymous communictation, reputation- based systems, etc. - For history's sake, here it is: 16.4.2. The Crypto Anarchist Manifesto Timothy C. May tcmay@netcom.com A specter is haunting the modern world, the specter of crypto anarchy. Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation. The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies. The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy. Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing- off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property. Arise, you have nothing to lose but your barbed wire fences! 16.5.1. Technology is dramatically altering the nature of governments. - It may sound like newage trendiness, but strong crypto is "technological empowerment." It literally gives power to individuals. Like Sam Colt, it makes them equal. - "Politics has never given anyone lasting freedom, and it never will. Anything gained through politics will be lost again as soon as the society feels threatened. If most Americans have never been oppressed by the government (aside from an annual mugging) it is because most of them have never done anything to threaten the government's interests." [Mike Ingle, 1994-01-01] + Thesis: Strong crypto is a good thing - tool against governments of all flavors, left and right - religious freedom - personal choice 16.5.2. Dangers of democracy in general and electronic democracy in particular - mob rule, rights of minority ignored - too many things get decided by vote that have no business being voted on - "don't tax me...", De Tocqueville's warning + electronic democracy is even worse - moves further from republican, representative system to electronc mob rule - too rapid a system - Detweiler's "electrocrasy" (spelling?)...brain-damaged, poorly thought-out 16.5.3. The collapse of democracy is predicted by many + the "tipping factor" exceeded, with real taxation rates at 50% or more in most developed countries, with conditions of "taxation without representation" far beyond anything in American colonial times - with professional politicians...and mostly millionaires running for office - the Cincinnatus (sp?) approach of going into government just for a few years, then returning to the farm or business, is a joke + rise of nominalism [argued by James Donald] - "After Athenian democracy self destructed, the various warring parties found that they could only have peace if they disowned omnipotent government. They put together a peace agreement that in part proclaimed limits to government, in part acknowledged inherent limits to what was proper for governments to do and in part guaranteed that the government would not go beyond what it was proper for government to do, that the majority could not do as it pleased with the minority, that not any act of power was a law, that law was not merely whatever the government willed. They did not agree on a constitution but agreed to respect an unwritten constitution that already existed in some sense. A similar arrangement underlies the American constitution (now defunct) and the English declaration of right (also defunct) The problem with such formal peace agreements is that they can only be put together after government has substantially collapsed. Some of us wish to try other possibilities in the event of collapse. The American constitution collapsed because of the rise of nominalist theories "The constitution says whatever the courts say that it says." [James Donald, 1994-08-31] - War on Drugs, conspiracy charges, random searches, emergency preparedness orders (Operation Vampire Killer, Operation Night Train, REX-84). The killings of more than a dozen reporters and tipsters over the past decade, many of them covering the Iran-Contra story, the drug deals, the CIA's dealings...the Farm appears to be "swamping" more and more of these troublemakers in the headlong march toward fascism. + De Tocqueville's warning that the American experiment in democracy would last only until voters discovered they could pick the pockets of others at the ballot box - a point reached about 60 years ago - (prior to the federal income tax and then the "New Deal," there were systemic limitations on this ability to the pockets of others, despite populist yearnings by some....after the New Deal, and the Great Society, the modern era of runaway taxation commenced.) 16.5.4. Depredations of the State + "Discrimination laws"..choice no longer allowed - the strip club in LA forced to install wheelchair access- -for the dancers! - age no longer allowed to be a factor...gag! + democracy run rampant....worst fears of Founders - votes on everything... - gun control, seizures, using zoning laws (with FFL inspections as informants) - welfare state,...Murray, inner cities made worse...theft - "currency export" laws...how absurd that governments attempt to control what folks do with their own money! 16.5.5. Things are likely to get worse, financially (a negative view,though there are also reasons to be optimistic) + a welfare state that is careening toward the edge of a cliff...escalating spending, constantly increasing national debt (with no signs that it will ever be paid down) - pension burdens are rising dramatically, according to "Economist", 1994-08. - the link to crypto is that folks had better find ways to immunize themselves from the coming crunch + Social Security, other pension plans are set to take 30-40% of all GDP - too many promies, people living longer - estimate: $20 trillion in "unfunded liabilities" - health care expectations... growing national debt 16.5.6. Borders are becoming transparent to data...terabytes a day are flowing across borders, with thousands of data formats and virtually indistinguishable from other messages. Compressed files, split files, images, sounds, proprietary encryption formats, etc. Once can _almost_ pity the NSA in the hopelessness of their job. 16.6.1. "What freedom of speech is becoming." + An increased willingness to limit speech, by attaching restrictions based on it being "commercial" or "hate speech." + advertising laws being the obvious example: smoking, alcohol, etc. - doctors, lawyers, etc. - sex, nudity - even laws that say billboards can't show guns - A chilling but all too common sentiment on the Net is shown by this quote: "Is it freedom of speech to spew racism , and steriotypes, just because you lack the intellectual capacity to comprehend that , perhaps, somewhere, there is a different way of life, which is not congruent with your pre-conceived notions?" [Andrew Beckwith, soc.culture.usa] 16.6.2. We don't really have free speech - election laws - advertising laws + "slander" and "libel" - thankfully, anonymous systems will make this moot + permission needed...licensing, approval, certification - "qualifications" - granted, Supremes have made it clear that political comments cannot be restricted, but many other areas have - often the distinction involves 'for pay" - Perhaps you are thinking that these are not really examples of government censorship, just of _other crimes_ and _other rights_ taking precedence. Thus, advertisers can't make false or misleading claims, and can't advertise dangerous or otherwise unapproved items. And I can't make medical diagnoses, or give structural and geological advice, and so on...a dozen good examples. But these restrictions emasculate free speech, leaving only banal expression of appropriately-hedged "personal opinions" as the free speech that is allowed...and even that is ofen subject to crazy lawsuits and threats of legal action. 16.7.1. Anarchy doesn't mean chaos and killing - As J. Bruce Dawson put it in a review of Linux in the September, 1994 "Byte," "It's anarchy at its best." + Ironically, crypto anarchy does admit the possibility (and hence probablility) of more contract killings as an ultimate enforcement mechanism for contracts otherwise unenforceable. - which is what is occurring in drug and other crime situaions: the parties cannot go to the police or courts for righting of wrongs, so they need to have the ultimate threat of death to enforce deals. It makes good sense from a reputation/game theory point of view. 16.7.2. Leftists can be anarchists, too - In fact, this tends to be the popular interpretation of anarchy. (Besides the bomb-throwing, anti-Tsar anarchists of the 19th century, and the bomb-throwing anarchists of the U.S. early this century.) + "Temporary Autonomous Zones" (TAZ) - Hakim Bey (pseudonym for ) - Mondo 2000, books, (check with Dave Mandl, who helps to publish them) 16.7.3. Anarchic development + Markets and emergent behaviors vs. planned development - principles of locality come into play (the local players know what they want and how much they'll pay for it) - central planners have "top-down" outlooks - Kevin Kelley's "Out of Control" (1994). Also, David Friedman's "Technologies of Freedom." - An example I heard about recently was Carroll College, in Wisconsin. Instead of building pathways and sidewalks across the newly-constructed grounds, the ground was left bare. After some time, the "emergent pathways" chosen by students and faculty were then turned into paved pathways, neatly solving the problem of people not using the "planned" pathways. I submit that much of life works this way. So does the Net (the "information footpaths"?). - anarchies are much more common than most people think...personal relationships, choices in life, etc. 16.7.4. The world financial system is a good example: beyond the reach of any single government, even the U.S. New World Order, money moves and flows as doubts and concerns appear. Statist governments are powerless to stop the devaluation of their currencies as investors move their assets (even slight moves can have large marginal effects). - "anarchy" is not a term most would apply, but it's an anarchy in the sense of there being no rulers ("an arch"), no central command structure. 16.8.1. "What is Crypto Anarchy?" + "Why the name?" + a partial pun on several things" - "crypto," meaning "hidden," as used in the term "crypto fascist" (Gore Vidal called William F. Buckley this) - "crypto anarchy" meaning the anarchy will be hidden, not necessarily visible - and of course cryptology is centrally invovled + Motivation - Vernor Vinge's "True Names" - Ayn Rand was one of the prime motivators of crypto anarchy. What she wanted to do with material technology (mirrors over Galt's Gulch) is _much_ more easily done with mathematical technology. 16.8.2. "Anarchy turns people off...why not a more palatable name?" - people don't understand the term; if people understood the term, it might be more acceptable - some have suggested I call it "digital liberty" or somesuch, but I prefer to stick with the historical term 16.8.3. Voluntary interactions involve Schelling points, mutually- agreed upon points of agreement 16.8.4. Crypto anarchy as an ideology rather than as a plan. - Without false modesty, I think crypto anarchy is one of the few real contributions to ideology in recent memory. The notion of individuals becoming independent of states by bypassing ordinary channels of control is a new one. While there have been hints of this in the cyberpunk genre of writing, and related areas (the works of Vinge especially), the traditional libertarian and anarchist movements have mostly been oblivious to the ramifications of strong crypto. - Interestingly, David Friedman, son of Milton and author of "The Machinery of Freedom," became a convert to the ideas. At least enough so as to give a talk in Los Angeles entitles "Crypto Anarchy and the State." - Conventional political ideology has failed to realize the huge changes coming over the next several decades. Focussing on unwinnable battles at the ballot box, they fritter away their energies; they join the political process, but they have nothing to "deal" with, so they lose. The average American actually _wants_ to pick the pockets of his neighbors (to pay for "free" health care, to stop companies from laying-off unneeded workers, to bring more pork back to the local enonomy), so the average voter is highly unlikely to ever vote for a prinicpled Libertarian candidate. - Fortunately, how people vote has little effect on certain "ground truths" that emerge out of new technologies and new economic developments. 16.9.1. Markets unfettered by local laws (digital black markets, at least for items that can be moved through cyberspace) 16.9.2. Espionage 16.10.1. "What are some implications of crypto anarchy?" + A return to contracts - whiners can't go outside contracts and complain - relates to: workers, terms of employment, actions, hurt feelings - with untraceable communication, virtual networks.... + Espionage + Spying is already changing dramatically. + Steele's (or Steeler?) "open sources" - collecting info from thousands of Internet sources - Well, this cuts both ways.. + Will allow: - BlackNet-type solicitations for military secrets ("Will pay $300,000 for xxxx") + Digital Dead Drops - totally secure, untraceable (pools, BlackNet mode) - no Coke cans near the base of oak trees out on Route 42 - no chalk marks on mailboxes to signal a message is ready - no "burning" of spies by following them to dead drops - No wonder the spooks are freaked out! - Strong crypto will also have a major effect on NSA, CIA, and FBI abilities to wiretap, to conduct surveillance, and to do domestic and foreign counterintelligence - This is not altogether a great thing, as there may be _some_ counterintelligence work that is useful (I'm perhaps betraying my lingering biases), but there's really only one thing to say about it: get used to it. Nothing short of a totalitarian police state (and probably not even that, given the spread of strong crypto) can stop these trends. - + Bypassing sanctions and boycotts - Just because Bill Clinton doesn't like the rulers of Haiti is no reason for me to honor his "sanctions" - Individual choice, made possible by strong crypto (untraceable transactions, pseudonyms, black markets) + Information Markets and Data Havens - medical - scientific - corporate knowledge - dossiers + credit reports - without the absurd rules limiting what people can store on their computers (e.g., if Alice keeps records going back more than 7 years, blah blah, can be thrown in jail for violating the "Fair Credit Reporting Act") - bypassing such laws - true, governments can attempt to force disclosure of "reasons" for all decisions (a popular trend, where even one's maid cannot be dismissed without the "reasons" being called into question!); this means that anyone accessing such offshore (or in cyberspace...same difference) data bases must find some acceptable reason for the actions they take...shouldn't be too hard - (as with so many of these ideas, the beauty is that the using of such services is voluntary....) + Consulting - increased liquidity of information + illegal transactions + untraceability and digital money means many "dark" possibilities - markets for assassinations - stolen property - copyright infringement + Espionage - information markets (a la AMIX) - "digital dead drops" - Offshore accounts - Money-laundering + Markets for Assassinations - This is one of the more disturbing implications of crypto anarchy. Actually, it arises immediately out of strong, unbreakable and untraceable communication and some form of untraceable digital cash. Distrurbing it may be, but the implications are also interesting to consider...and inevitable. - And not all of the implications are wholly negative. + should put the fear of God into politicians - "Day of the Jackal" made electronic - any interest group that can (anonymously) gather money can have a politician zapped. Positive and negative implications, of course. - The fact is, some people simply need killing. Shocking as that may sound to many, surely everyone would agree that Hitler deserved killing. The "rule of law" sounds noble, but when despicable people control the law, other measures are called for. - Personally, I hold that anyone who threatens what I think of as basic rights may need killing. I am held back by the repercussions, the dangers. With liquid markets for liquidations, things may change dramatically. 16.10.2. The Negative Side of Crypto Anarchy + Comment: - There are some very real negative implications; outweighed on the whole by the benefits. After all, free speech has negatives. Poronography has negatives. (This may not be very convincing to many....I can't do it here- -the gestalt has to be absorbed and considered.) + Abhorrent markets - contract killings - can collect money anonymously to have someone whacked...nearly anyone who is controversial can generate enough "contributions" - kidnapping, extortion + Contracts and assassinations - "Will kill for $5000" + provides a more "liquid" market (pun intended) - sellers and buyers more efficiently matched - FBI stings (which are common in hiring hit men) are made almost impossible - the canonical "dark side" example--Eric Drexler, when told of this in 1988, was aghast and claimed I was immoral to even continue working on the implications of crypto anarchy! - made much easier by the inability to trace payments, the lack of physical meetings, etc. + Potential for lawlessness - bribery, abuse, blackmail - cynicism about who can manipulate the system + Solicitation of Crimes - untraceably, as we have seen + Bribery of Officials and Influencing of Elections - and direct contact with officials is not even needed...what if someone "lets it be known" that a council vote in favor of some desired project will result in campaign contributions? + Child molestors, pederasts, and rapists - encrypting their diaries with PGP (a real case, says the FBI) - this raises the privacy issue in all its glory...privacy protects illegality...it always has and it always will + Espionage is much easier - from the guy watching ships leave a harbor to the actual theft of defense secrets - job of defending against spies becomes much more difficult: and end to microdots and invisible ink, what with the LSB method and the like that even hides the very existence of encrypted messages! + Theft of information - from corporations and individuals - corporations as we know them today will have to change - liquidity of information - selling of corporate secrets, or personal information + Digilantes and Star Chambers - a risk of justice running amok? + Some killers are not rehabilitated and need to be disposed of through more direct means + Price, Rhode Island, 21, 4 brutal killings - stabbings of children, mother, another + for animals like this, vigilantism...discreet execution...is justified... - or, at least some of us will consider it justified - which I consider to be a good thing - this relates to an important theme: untraceable communication and markets means the ability to "opt out" of conventional morality + Loss of trust + even in families, especially if the government offers bounties and rewards - recall Pavel Morozov in USSR, DARE-type programs (informing on parents) - more than 50% of all IRS suits involve one spouse informing to the IRS + how will taxes be affected by the increased black market? - a kind of Laffer curve, in which some threshold of taxation triggers disgust and efforts to evade the taxes - not clear how large the current underground economy is....authorities are motivated to misstate the size (depending on their agenda) + Tax Evasion (I'm not defending taxation, just pointing out what most would call a dark side of CA) + By conducting business secretly, using barter systems, alternative currencies or credit systems, etc. - a la the lawyers who use AMIX-like systems to avoid being taxed on mutual consultations + By doing it offshore - so that the "products" are all offshore, even though many or most of the workers are telecommuting or using CA schemes - recall that many musicians left Europe to avoid 90% tax rates + the "nest egg" scam: drawing on a lump sum not reported + Scenario: Alice sells something very valuable-perhaps the specs on a new product-to Bob. She deposits the fee, which is, say, a million dollars, in a series of accounts. This fee is not reported to the IRS or anyone else. - the fee could be in cash or in a "promise" - in multiple accounts, or just one + regardless, the idea is that she is now paid, say, $70,000 a year for the next 20 years (what with interest) as a "consultant" to the company which represents her funds - this of course does not CA of any form, merely some discreet lawyers - and of course Alice reports the income to the IRS-they never challenge the taxpayer to "justify" work done (and would be incapable of "disallowing" the work, as Alice could call it a "retainer," or as pay for Board of Directors duties, or whatever...in practice, it's easiest to call it consulting) + these scams are closely related to similar scams for laundering money, e.g., by selling company assets at artificially low (or high) prices - an owner, Charles, could sell assets to a foreign company at low prices and then be rewarded in tax- free, under the table, cash deposited in a foreign account, and we're back to the situation above + Collusion already is common; crypto methods will make some such collusions easier - antique dealers at an auction + espionage and trading of national secrets (this has positive aspects as well) - "information markets" and anonymous digital cash - (This realization, in late 1987, was the inspiration for the ideas behind crypto anarchy.) - mistrust - widening gap between rich and poor, or those who can use the tools of the age and those who can't 16.10.3. The Positive Side of Crypto Anarchy - (other positive reasons are implicitly scattered throughout this outline) + a pure kind of libertarianism - those who are afraid of CA can stay away (not strictly true, as the effects will ripple) - a way to bypass the erosion of morals, contracts, and committments (via the central role of reputations and the exclusion of distorting governments) - individual responsibility - protecting privacy when using hypertext and cyberspace services (many issues here) - "it's neat" (the imp of the perverse that likes to see radical ideas) + A return to 4th Amendment protections (or better) - Under the current system, if the government suspects a person of hiding assets, of conspiracy, of illegal acts, of tax evasion, etc., they can easily seize bank accounts, stock accounts, boats, cars, ec. In particular, the owner has little opportunity to protect these assets. - increased liquidity in markets + undermining of central states - loss of tax revenues - reduction of control - freedom, personal liberty - data havens, to bypass local restrictive laws + Anonymous markets for assassinations will have some good aspects - the liquidation of politicians and other thieves, the killing of those who have assisted in the communalization of private property - a terrible swift sword 16.10.4. Will I be sad if anonymous methods allow untraceable markets for assassinations? It depends. In many cases, people deserve death--those who have escaped justice, those who have broken solemn commitments, etc. Gun grabbing politicians, for example should be killed out of hand. Anonymous rodent removal services will be a tool of liberty. The BATF agents who murdered Randy Weaver's wife and son should be shot. If the courts won't do it, a market for hits will do it. - (Imagine for a moment an "anonymous fund" to collect the money for such a hit. Interesting possibilities.) - "Crypto Star Chambers," or what might be called "digilantes," may be formed on-line, and untraceably, to mete out justice to those let off on technicalities. Not altogether a bad thing. 16.10.5. on interference in business as justified by "society supports you" arguments (and "opting out) + It has been traditionally argued that society/government has a right to regulate businesses, impose rules of behavior, etc., for a couple of reasons: - "to promote the general welfare" (a nebulous reason) + because government builds the infrastructure that makes business possible - the roads, transportation systems, etc. (actually, most are privately built...only the roads and canal are publically built, and they certainly don't _have_ to be) - the police forces, courts, enforcement of contracts, disputes, etc. - protection from foreign countries, tariff negotiations, etc., even to the *physical* protection against invading countries + But with crypto anarchy, *all* of these reasons vanish! - society isn't "enabling" the business being transacted (after all, the parties don't even necessarily know what countries the other is in!) - no national or local courts are being used, so this set of reasons goes out the window - no threat of invasion...or if there is, it isn't something governments can address + So, in addition to the basic unenforceability of outlawing crypto anarchy--short of outlawing encryption--there is also no viable argument for having governments interfere on these traditional grounds. - (The reasons for them to interfere based on fears for their own future and fears about unsavory and abominable markets being developed (body parts, assassinations, trade secrets, tax evasion, etc.) are of course still "valid," viewed from their perspective, but the other reasons just aren't.) 16.11.1. "How do you square these ideas with democracy?" - I don't; democracy has run amok, fulfilling de Tocqueville's prediction that American democracy would last only until Americans discovered they could pick the pockets of their neighbors at the ballot box - little chance of changing public opinion, of educating them - crypto anarchy is a movement of individual opting out, not of mass change and political action 16.11.2. "Is there a moral responsibility to ensure that the overall effects of crypto anarchy are more favorable than unfavorable before promoting it?" - I don't think so, any more than Thomas Jefferson should have analyzed the future implications of freedom before pushing it so strongly. - All decisions have implications. Some even cost lives. By not becoming a doctor working in Sub-Saharan Africa, have I "killed thousands"? Certainly I might have saved the lives of thousands of villagers. But I did not kill them just because I chose not to be a doctor. Likewise, by giving money to starving peasants in Bangladesh, lives could undeniably be "saved." But not giving the money does not murder them. - But such actions of omission are not the same, in my mind, as acts of comission. My freedom, via crypto anarchy, is not an act of force in and of itself. - Developing an idea is not the same as aggression. - Crypto anarchy is about personal withdrawal from the system, the "technologies of disconnection," in Kevin Kelly's words. 16.11.3. "Should individuals have the power to decide what they will reveal to others, and to authorities?" - For many or even most of us, this has an easy answer, and is axiomatically true. But others have doubts, and more people may have doubts as some easily anticipated develpoments occur. - (For example, pedophiles using the much-feared "fortress crypto," terrorists communicating in unbreakable codes, tza evaders, etc. Lots of examples.) - But because some people use crypto to do putatively evil things, should basic rights be given up? Closed doors can hide criminal acts, but we don't ban closed doors. 16.11.4. "Aren't there some dangers and risks to letting people pick and choose their moralities?" - (Related to questions about group consensus, actions of the state vs. actions of the individual, and the "herd.) - Indeed, there are dangers and risks. In the privacy of his home, my neighbor might be operating a torture dungeon for young children he captures. But absent real evidence of this, most nations have not sanctioned the random searches of private dwellings (not even in the U.S.S.R., so far as I know). 16.11.5. "As a member of a hated minority (crypto anarchists) I'd rather take my chances on an open market than risk official discrimination by the state.....Mercifully, the technology we are developing will allow everyone who cares to to decline to participate in this coercive allocation of power." [Duncan Frissell, 1994-09-08] 16.11.6. "Are there technologies which should be "stopped" even before they are deployed?" - Pandora's Box, "things Man was not meant to know," etc. - It used to be that my answer was mostly a clear "No," with nuclear and biological weapons as the only clear exception. But recent events involving key escrow have caused me to rethink things. - Imagine a company that's developing home surveillance cameras...perhaps for burglar prevention, child safety, etc. Parents can monitor Junior on ceiling-mounted cameras that can't easily be tampered with or disconnected, without sending out alarms. All well and good. - Now imagine that hooks are put into these camera systems to send the captured images to a central office. Again, not necessarily a bad idea--vacationers may want their security company to monitor their houses, etc. - The danger is that a repressive government could make the process mandatory....how else to catch sexual deviates, child molestors, marijuana growers, counterfeiters, and the like? - Sound implausible, unacceptable, right? Well, key escrow is a form of this. - The Danger. That OS vendors will put these SKE systems in place without adequate protections against key escrow being made mandatory at some future date. 16.11.7. "Won't crypto anarchy allow some people to do bad things?" - Sure, so what else is new? Private rooms allows plotters to plot their plots. Etc. - Not to sound too glib, but most of the things we think of as basic rights allow various illegal, distasteful, or crummy things to go on. Part of the bargain we make. - "Of course you could prevent contract killings by requiring everyone to carry government "escrowed" tape recordings to record all their conversations and requiring them to keep a diary at all times alibing their all their activities. This would also make it much easier to stamp out child pornography, plutonium smuggling, and social discrimination against the politically correct." [James Donald, 1994-09- 09] 16.12.1. "What if "bad guys" use unbreakable crypto?" - What if potential criminals are allowed to have locks on their doors? What if potential rapists can buy pornography? What if.... - These are all straw men used in varous forms throughout history by tyrants to control their populations. The "sheepocracies" of the modern so-called democratic era are voting away their former freedoms in favor of cradle to grave safety and security. - The latest tack is to propose limits on privacy to help catch criminals, pedophile, terrorists, and father rapers. God help us if this comes to pass. But Cypherpunks don't wait for God, they write code! 16.12.2. Dealing with the "Abhorrent Markets" - such as markets for assassinations and extortion + Possibilities: + physical protection, physical capure - make it risky - (on the other hand, sniping is easy) + "flooding" of offers - "take a number" (meaning: get in line) - attacking reputations - I agree that more thought is needed, more thorough analysis - Some people have even pointed out the benefits of killing off tens of thousands of the corrupt politicians, narcs, and cops which have implemented fascist, collectivist policies for so long. Assassination markets may make this much more practical. 16.12.3. "How is *fraud* dealt with in crypto anarchy?" - When the perpetrators can't even be identified. - One of the most interesting problems. - First, reputations matter. Repeat business is not assured. It is always best to not have too much at stake in any single transaction. 16.12.4. "How do we know that crypto anarchy will work? How do we know that it won't plunge the world into barbarism, nuclear war, and terror?" - We don't know, of course. We never can. - However, things are already pretty bad. Look at Bosnia, Ruanda, and a hundred other hellholes and flashpoints around the world. Look at the nuclear arsenals of the superpowers, and look at who starts the wars. In nearly all cases, statism is to blame. States have killed a hundred million or more people in this century alone--think of Hitler, Stalin, Mao, and Pol Pot--through forced starvation of entire provinces, liquidation of the peasantry, killing of intellectuals, and mass exterminations of religious and ethnic groups. It's hard to imagine crypto anarchy causing anything that bad! - Crypto anarchy is a cyberspatially-mediated personal course of action; by itself it involves no actions such as terrorism or nuclear blackmail. One could just as easily ask, "Will freedom lead to nuclear blackmail, weapons trading, and pedophilia?" The answer is the same: maybe, but so what? 16.12.5. It is true that crypto anarchy is not for everyone. Some will be too incompetent to prepare to protect themselves, and will want a protector. Others will have poor business sense. 16.12.6. "But what will happen to the poor people and those on welfare if crypto anarchy really succeeds?" - "So?" - Many of us would see this as a good thing. Not just for Calvinist-Randite reasons, but also because it would break the cycle of dependency which has actually made things worse for the underclass in America (at least). See Charles Murray's "Losing Ground" for more on this. - And remember that a collapse of the tax system will mean more money left in the hands of former taxpayers, and hence more left over for true charity (for those who truly cannot help themselves). 16.13.1. "Why would anyone use black markets?" + when the advantages of doing so outweigh the disadvantages - including the chance of getting caught and the consequences - (As the chances decline, this suggests a rise in punishment severity) - businesses will tend to shy away from illegal markets, unless... + Anonymous markets for medical products - to reduce liability, local ethical and religious laws - Example: Live AIDS vaccine...considered too risky for any company to introduce, due to inability to get binding waivers of liability (even for "fully informed" patients who face likely death) - markets in body parts... 16.13.2. Crypto anarchy opens up some exciting possibilities for collusion in financial deals, for insider trading, etc. - I'm not claiming that this will mean instant riches, as markets are fairly efficient (*) and "insiders" often don't do well in the market. (* Some argue that relaxing laws against insider trading will make for an even fairer market...I agree with this.) - What I am claiming is the SEC and FinCEN computers will be working overtime to try to keep up with the new possibilities crypto anarchy opens up. Untraceable cash, as in offshore bank accounts that one can send anonymous trading instructions to (or for), means insider trading simply can't be stopped...all that happens is that insiders see their bank accounts increase (to the extent they win because of the insider trading...like I said, a debatable point). - Price signalling, a la the airline case of a few years back (which, you won't be surprised to hear, I have no problems with), will be easier. Untraceable communications, virtual meetings, etc. 16.13.3. Information Markets - a la "information brokering," but mediated cryptographically - recall the 1981 market in Exocet missile codes (France, Argentina--later of relevance when an Exocet sank a British ship) 16.13.4. Black Markets, Informal Economies, Export Laws + Transborder data flow, legal issues + complex..laws, copyrights, "national sovereignty" - e.g., Phillipines demanded in-the-clear transmissions during bank loan renegotiations..and several Latin American countries forbid encrypted transmissions. + Export, Technology Export, Export Control - Export Control Act - Office of Munitions (as in "Munitions Act", circa 1918) + export of some crypto gear shifted from Dept. of State, Office of Munitions, to Dept. of Commerce - Commodity Control List, allows s/w that is freely available to the public to be exported without additional paperwork - Munitions used to be stickier about export (some would say justifiably paranoid) - Commodity Jurisdiction request, to see whether product for export falls under State or Commerce regulations - Trading with the Enemy Act - Exocet codes--black market sales of emasculated chips 16.13.5. Smuggling and Black Markets + Black Markets in the USSR and Other Former East Bloc Nations + a major issue, because the normal mechanisms for free markets-property laws, shops, stock markets, hard currencies, etc.-have not been in place - in Russia, have never really existed + Role of "Mafia" - various family-related groups (which is how trade always starts, via contacts and connections and family loyalty, until corporations and their own structures of loyalty and trust can evolve) + how the Mafia in Russia works - bribes to "lose" materials, even entire trainloads - black market currency (dollars favored) + This could cause major discontent in Russia - as the privileged, many of them ex-Communist officials, are best prepared to make the transition to capitalism + those in factory jobs, on pensions, etc., will not have the disposable income to take advantage of the new opportunities - America had the dual advantages of a frontier that people wanted to move to (Turner, Protestant ethic, etc.) and a high-growth era (industrialization) - plus, there was no exposure to other countries at vastly higher living standards + Smuggling in the EEC + the dream of tariff-free borders has given way to the reality of a complex web of laws dictating what is politically correct and what is not: - animal growth hormones - artificial sweeteners are limited after 1-93 to a small list of approved foods: and the British are finding that their cherished "prawn cocktail-flavored crisps" are to be banned (for export to EEC or completely?) because they're made with saccharin or aspartame - "European content" in television and movies may limit American productions...as with Canada, isn't this a major abridgement of basic freedoms? + this may lead to a new kind of smuggling in "politically incorrect" items - could be argued that this is already the case with bans on drugs, animal skins, ivory, etc. (so tediously argued by Brin) - recall Turgut Ozal's refreshing comments about loosening up on border restrictions + as more items are declared bootleg, smuggling will increase...politically incorrect contraband (fur, ivory, racist and sexist literature) + the point about sexist and racist literature being contraband is telling: such literature (books, magazines) may not be formally banned, for that would violate the First Amendment, but may still be imported anonymously (smuggled) and distributed as if they were banned (!) for the reason of avoiding the "damage claims" of people who claim they were victimized, assaulted, etc. as a result of the literature! + avoidance of prosecution or damage claims for writing, editing, distributing, or selling "damaging" materials is yet another reason for anonymous systems to emerge: those involved in the process will seek to immunize themselves from the various tort claims that are clogging the courts - producers, distributors, directors, writers, and even actors of x-rated or otherwise "unacceptable" material may have to have the protection of anonymous systems - imagine fiber optics and the proliferation of videos and talk shows....bluenoses and prosecutors will use "forum shopping" to block access, to prosecute the producers, etc. + Third World countries may declare "national sovereignty over genetic resources" and thus block the free export and use of plant- and animal-derived drugs and other products - even when only a single plant is taken - royalties, taxes, fees, licenses to be paid to local gene banks - these gene banks would be the only ones allowed to do genetic cataloguing - the problem is of course one of enforcement + technology, programs - scenario: many useful programs are priced for corporations (as with hotel rooms, airline tickets, etc.), and price-sensitive consumers will not pay $800 for a program they'll use occasionally to grind out term papers and church newsletters + Scenario: Anonymous organ donor banks + e.g., a way to "market" rare blood types, or whatever, without exposing one's self to forced donation or other sanctions - "forced donation" involves the lawsuits filed by the potential recipient - at the time of offer, at least...what happens when the deal is consummated is another domain - and a way to avoid the growing number of government stings + the abortion and women's rights underground...a hopeful ally (amidst the generally antiliberty women's movement) - RU-486, underground abortion clinics (because many clinics have been firebombed, boycotted out of existence, cut off from services and supplies) + Illegal aliens and immigration - "The Boxer Barrier" used to seal barriers...Barbara Boxer wants the military and national guard to control illegal immigration, so it would be poetic justice indeed if this program has her name on it 16.13.6. Organized Crime and Cryptoanarchy + How and Why + wherever money is to be made, some in the underworld will naturally take an interest - loan sharking, numbers games, etc. + they may get involved in the setup of underground banks, using CA protocols - shell games, anonymity - such Mafia involvement in an underground monetary system could really spread the techniques + but then both sides may be lobbying with the Mafia - the CA advocates make a deal with the devil - and the government wants the Mob to help eradicate the methods + Specific Programs + False Identities - in the computerized world of the 90s, even the Mob (who usually avoid credit cards, social security numbers, etc.) will have to deal with how easily their movements can be traced + so the Mob will involve itself in false IDs - as mentioned by Koontz - Money Laundering, naturally + but some in the government see some major freelance opportunities in CA and begin to use it (this undermines the control of CA and actually spreads it, because the government is working at cross purposes) - analogous to the way the government's use of drug trade systems spread the techniques 16.13.7. "Digital Escrow" accounts for mutually suspicious parties, especially in illegal transactions - drug deals, information brokering, inside information, etc. + But why will the escrow entity be trusted? + reputations - their business is being a reliable escrow holder, not it destroying their reputation for a bribe or a threat + anonymity means the escrow company won't know who it's "burning," should it try to do so - they never know when they themselves are being tested by some service - and potential bribers will not know who to contact, although mail could be addressed to the escrow company easily enough 16.13.8. Private companies are often allies of the government with regards to black markets (or grey markets) - they see uncontrolled trade as undercutting their monopoly powers - a way to limit competition 16.14.1. Hopelessness of controlling money laundering + I see all this rise in moneylaundering as an incredibly hopeful trend, one that will mesh nicely with the use of cryptography - why should export of currency be limited? - what's wrong with tax evasion, anyway? - corrupting, affects all transactions - vast amounts of money flowing - 2000 banks in Russia, mostly money-laundering + people and countries are so starved for hard currency that most banks outside the U.S. will happily take this money - no natural resources in many of these countries - hopeless to control - being presented as "profits vs. principals," but I think this is grossly misguided + Jeffery Robinson, "The Landrymen," interviewed on CNN, 6-24- 94 - "closer to anarchy" (yeah!) - hopeless to control - dozens of new countries, starved for hard currency, have autonomy to set banking policies (and most European countries turn a blind eye toward most of the anti- laundering provisions) 16.14.2. Taxes and Crypto - besides avoidance, there are also issues of tax records, sales tax, receipts, etc. + this is another reason government may demand access to cyberspace: - to ensure compliance, a la a tamper-resistant cash register - to avoid under-the-table transactions - bribery, side payments, etc. - Note: It is unlikely that such access to records would stop all fraud or tax evasion. I'm just citing reasons for them to try to have access. - I have never claimed the tax system will collapse totally, or overnight, or without a fight. Things take time. + tax compliance rates dropping + the fabric has already unraveled in many countries, where the official standard of living is below the _apparent_ standard of living (e.g., Italy). - tax evasion a major thing - money runs across the border into Switzerland and Austria - Frissell's figures - media reports + Tax issues, and how strong crypto makes it harder and harder to enforce - hiding income, international markets, consultants, complexly structured transactions 16.14.3. Capital Flight - "The important issue for Cypherpunks is how we should respond to this seemingly inevitable increased mobility of capital. Does it pose a threat to privacy? If so, let's write code to thwart the threat. Does it offer us any tools we can use to fight the efforts of nation-states to take away our privacy? If so, let's write code to take advantage of those tools." [ Sandy Sandfort, Decline and Fall, 1994--06-19] 16.14.4. Money Laundering and Underground Banks + a vast amount of money is becoming available under the table: from skimming, from tax avoidance, and from illegal activities of all kinds - can be viewed as part of the internationalization of all enterprises: for example, the Pakistani worker who might have put his few rupees into some local bank now deposits it with the BCCI in Karachi, gaining a higher yield and also increasing the "multiplier" (as these rupees get lent out many times) - is what happened in the U.S. many years ago - this will accelerate as governments try to get more taxes from their most sophisticated and technical taxpayers, i.e., clever ways to hide income will be sought + BCCI, Money-Laundering, Front Banks, CIA, Organized Crime + Money Laundering - New York City is the main clearinghouse, Federal Reserve of New York oversees this - Fedwire system - trillions of dollars pass through this system, daily + How money laundering can work (a maze of techniques) - a million dollars to be laundered - agent wires it, perhaps along with other funds, to Panama or to some other country - bank in Panama can issue it to anyone who presents the proper letter - various ways for it to move to Europe, be issued as bearer stock, etc. - 1968, offshore mutual funds, Bernie Kornfield + CIA often prefers banks with Mob connections - because Mob banks already have the necessary security and anonymity - and are willing to work with the Company in ways that conventional banks may not be + links go back to OSS and Mafia in Italy and Sicily, and to heroin trade in SE Asia - Naval Intelligence struck a deal in WW2 with Mafia, wherby Meyer Lansky would protect the docks against strikes (presumably in exchange for a "cut"), if Lucky Luciano would be released at the end of the war (he was) - Operation Underworld: Mafia assisted Allied troops in Sicily - "the Corse" + Luciano helped in 1947 to reopen Marseilles when Communist strikers had shut it down - continuing the pattern of cooperation begun during the war - thus establishing the French Connection! - Nugan Hand Bank + BCCI and Bank of America favored by CIA - Russbacher says B of A a favored cover + we will almost certainly discover that BCCI was the main bank used, with the ties to Bank of America offices in Vienna + Bank of America has admitted to having had early ties with BCCI in the early 1970s, but claims to have severed those ties - however, Russbacher says that CIA used B of A as their preferred bank in Europe, especially since it had ties to companies like IBM that were used as covers for their covert ops - Vienna was a favored money-laundering center for CIA, especially using Bank of America + a swirl of paper fronts, hiding the flows from regulators and investors - "nominees" used to hide true owners and true activities - various nations have banking secrecy laws, creating the "veil" that cannot be pierced + CIA knew about all of the flights to South America (and probably elsewhere, too) - admitted Thomas Polgar, a senior ex-CIA official, in testimony on 9-19-91 - this indicates that CIA knew about the arms deals, the drug deals, and the various other schemes and scams + Earlier CIA-Bank Scandals (Nugan Hand and Castle Bank) + Nugan Hand Bank, Australia + Frank Nugan, Sydney, Australia, died in 1980 + apparent suicide, but clearly rigged - Mercedes, rifle with no fingerprints, position all wrong - evidence that he'd had a change of heart-was praying daily, a la Charles Colson-and was thinking about getting out of the business + set up Nugan Hand Bank in 1973 - private banking services, tax-free deposits in Caymans + used by CIA agents, both for Agency operations and for their own private slush/retirement funds - several CIA types on the payroll (listed their addresses as same as Air America) - William Colby on Board, and was their lawyer + links to organized crime, e.g., Santo Trafficante, Jr. - Florida, heroin, links to JFK assassination - trafficante was known as "the Cobra" and handled many transactions for the CIA + money-laundering for Asian drug dealers + Golden Triangle: N-H even had branches in GT - and branch in Chiang Mai, in Thailand - links to arms dealers, like Edwin P. Wilson + U.S. authorites refused to cooperate with investigations - and when info was released, it was blacked out with a "B-1" note, implying national security implications + investigations by Australian Federal Bureau of Narcotics were thwarted-agents transferred and Bureau disbanded shortly thereafter - similar to "Don't fuck with us" message sent to FBI and DEA by CIA + N-H Bank had close working relation with Australian Security Intelligence Organization (ASIO) - NSA tapped phone conversations (speculative) of Nugan that indicated ASIO collusion with N-H Bank in the drug trade + Pine Gap facility, near Alice Springs (NSA, NRO) - P.M. Gough Whitlam's criticism of Pine Gap led to CIA-ASIO plot to destroy the Whitlam gov't. - November 1975 fall instigated with wiretaps and forgeries + Nugan Hand Bank was also involved with "Task Force 157," a Naval Intelligence covert operation, given the cover name "Pierce Morgan" (a good name?) - reported to Henry Kissinger - recall minor point that Navy is often the preferred service for the ruling elite (the real preppies) + and George Bush's son, George W. Bush, was involved with Nugan Hand: - linked to William Quasha, who handled N-H deals in Phillipines + owners of Harken Energy Corp. a Texas-based company that bought G.W. Bush's oil company "Spectrum 7" in 1986 - later got offshore drilling rights to Bahrain's oil-with G.W. Bush on the Board of Directors - could this be another link to Gulf Crisis? + Castle Bank, Bahamas, Paul E. Helliwell + OSS (China). CIA - Mitch WerBell, White Russian specialist in assassination, silencers, worked for him in China - Howard Hunt worked for him - after WW2, set up Sea Supply Inc., CIA front in Miami + linked to Resorts International - law firm of Helliwell, Melrose and DeWolf - lent money to Bahamian P.M. Lynden Pindling in exchange for extension of gambling license + Robert Vesco, Bebe Rebozo, and Howard Hughes - in contrast to the "Eastern Establishment," these were Nixon's insiders - links with ex-CIA agent Robert Maheu (who worked for Hughes); onvolved withTrafficante, CIA plot to kill Castro, and possible links to JFK assassination - Vesco active in drug trade + also involved in purchase of land for Walt Disney World - 27,000 acres near Orlando - Castle Bank was a CIA conduit + Operation Tradewinds, IRS probe of bank money flows - late 60s - investigation of "brass plate" companies in Caymans, Bahamas + Plot Scenario: Operation Tradewinds uncovered many UltraBlack operations, forcing them to retrench and dig in deeper, sacrificing several hundred million - circa 1977 (Castle Bank shut down) + World Finance Corporation (WFC) + started in 1971 in Coral Gables - first known as Republic National Corporation - Walter Surrey, ex-OSS, like Helliwell of Castle Bank, helped incorporate it + Business - exploited cash flows in Florida - dealt with CIA, Vesco, Santo Trafficante, Jr. - also got loan deposits from Arabs - links to Narodny Bank, the Soviet bank that also pay agents + a related company was Dominion Mortgage Company, located at same address as WFC - linked to narcotics flow into Las Vegas - and to Trafficante, Jr. - suitcases of cash laundered from Las Vegas to Miami - Jefferson Savings and Loan Association, Texas + Guilermo Hernández Cartaya, ex-Havana banker, Cuban exile, was chief figure - veteran of Bay of Pigs (likely CIA contacts) - investigated by R. Jerome Sanford, Miami assistant U.S. attorney - Dade County Organized Crime Bureau also involved in the 1978 investigation - Rewald and his banking deals - BCCI was a successor to this bank + CIA and DEA Links to Drug Trade - former agents and drug traffickers were frequently recruited by DEA and CIA to run their own drug operation, sometimes with political motivations - Carlos Hernández recruited by BNDD (Bureau of Narcotics and Dangerous drugs, predecessor to DEA) to form a death squad to assassinate other drug traffickers + possible links of the drug dealers to UltraBlack/Witness Security Program - agents in Florida, the stock broker killing in 1987 - Seal was betrayed by the DEA and CIA, allowed to be killed by the Columbians + Afghan Rebels, Arms to Iran (and Iraq), CIA, Pakistan - there was a banking and arms-running network centered in Karachi, home of BCCI, for the various arms deals involving Afghan rebels - Karachi, Islamabad, other cities + Influence Peddling, Agents - a la the many senior lawyers hired by BCCI (Clark Clifford, Frank Manckiewicz [spelling?] + illustrates again the basic corruptability of a centralized command economy, where regulators and lawmakers are often in the pockets of corrupt enterprises - clearly some scandals and losses will occur in free markets, but at least the free markets will not be backed up with government coercion + Why CIA is Involved in So Many Shady Deals? + ideal cover for covert operations - outside audit channels - links to underworld + agents providing for their own retirements, their own private deals, and feathering their own nests - freedom from interferance - greed + deals like that of Noriega, in which CIA-supported dictators and agents provided for their own lavish lifestyles\ - and the BCCI-Noriega links are believed to have contributed to the CIA's unwillingness to question the activities of the BCCI (actually, the Justice Department) + Role of Banks in Iraq and Gulf War, Iraq-Gate, Scandals - Export Import Bank (Ex-Im), CCC - implicated in the arming of Iraq - Banco Lavorzo Nazionale [spelling?] + CIA was using BNL to arrange $5B in transfers, to arm Iraq, to ensure equality with Iran - because BNL wouldn't ask where it came from - federally guaranteed loans used to finance covert ops + the privatizing of covert ops by the CIA and NSA - deniability - they subcontracted the law-breaking - the darker side of capitalism did the real work - but the crooks learned quickly just how much they could steal...probably 75% of stolen money - insurance fraud...planes allowed to be stolen, then shipped to Contras, with Ollie North arguing that nobody was really hurt by this whole process + ironically, wealthy Kuwaitis were active in financing "instant banks" for money laundering and arms transactions, e.g., several in Channel Islands - Ahmad Al Babtain Group of Companies, Ltd., a Netherlands Antilles corporation - Inslaw case fits in with this picture + Federal Reserve and SEC Lack the Power to "Peirce the Veil" on Foreign Banks - as the Morgenthau case in Manhattan develops - a well-known issue + But should we be so surprised? - haven't banks always funded wars and arms merchants? - and haven't some of them failed? - look at the Rothschilds - what is surprising is that so many people knew what it was doing, what its business was, and that it was even nicknamed "Banks of Crooks and Criminals International" + Using software agents for money laundering and other illegal acts + these agents act as semi-autonomous programs that are a few steps beyond simple algortihms - it is not at all clear that these agents could do very much to run portfolio, because nothing really works - real use could be as "digital cutouts": transferring wealth to other agents (also controlled from afar, like marionettes) - advantage is that they can be programmed to perform operations that are perhaps illegal, but without traceability + Information brokers as money launderers (the two are closely related) - the rise of AMIX-style information markets and Sterling- style "data havens" will provide new avenues for money laundering and asset-hiding + information is intrinsically hard to value, hard to put a price tag on (it varies according to the needs of the buyers) - meaning that transnational flows of inforamation cannot be accurately valued (assigned a cash value) - is closely related to the idea of informal consulting and the nontaxable nature of it - cardboard boxes filled with cash, taped and strapped, but still bursting open - gym bags carrying relatively tiny amounts of the skim: a mere hundred thousand in $100s + L.A. becoming a focus for much of this cash - nearness to Mexico, large immigrant communities - freeways and easy access + hundreds of airstrips, dozens of harbors - though East Coast seems to have even more, so this doesn't seem like a compelling reason - Ventura County and Santa Barbara 16.14.5. Private Currencies, Denationalization of Money - Lysander Spooner advocated these private currencies - and "denationalization of money" is a hot topic + is effect, alternatives to normal currency already exist - coupons, frequent flier coupons, etc. + telephone cards and coupons (widely used in Asia and parts of Europe) - ironically, U.S. had mostly opted for credit cards, which are fully traceable and offer minimal privacy, while other nations have embraced the anonymity of their kind of cards...and this seems to be carrying over to the toll booth systems being planned - barter networks - chop marks (in Asia) + "reputations" and favors - if Al gives Bob some advice, is this taxable? (do lawyers who talk amongst themselves report the transactions/ od course not, and yet this is effectively either a barter transaction or an outright gift) + sophisticated financial alternatives to the dollar - various instruments - futures, forward contracts, etc. - "information" (more than just favors) + art works and similar physical items - not a liquid market, but for high rollers, an easy way to transfer hundreds of millions of dollars (even with the discounted values of a stolen item, and not all the items will be stolen...many people will be very careful to never travel with stolen art) - diamonds, gems have long been a form of transportable wealth + art works need not be declared at most (?) borders - this may change with time 16.14.6. Tax Evasion Schemes - unreported income, e.g., banks like the BCCI obviously did not report what they or their customers were doing to the various tax authorities (or anyone else) - deferred income, via the kind of trust funds discussed here (wherein payment is deferred and some kind of trust is used to pay smaller amounts per year) + Asset-Hiding, Illegal Payments, Bribes, and Tax Evasion Funds Can Be Protected in a "Retirement Fund" + e.g., a politician or information thief-perhaps an Intel employee who sells something for $1M-can buy shares in a crypto-fund that then ensures he is hired by a succession of consulting firms for yearly consulting...or even just placed on a "retainer" of, say, $100K a year + IRS may come to have doubts about such services, but unless the government steps in and demands detailed inspection of actual work done-and even then I think this would be impossible and/or illegal-such arrangements would seem to be foolproof + why can't government demand proof of work done? - who judges the value of an employee? - of advice given, of reports generated, or of the value of having a consultant "on retainer"? - such interference would devastate many vested interests + tax and other advantages of these "crypto annuities" - tax only paid on the yearly income, not on the lump sum - authorities are not alerted to the sudden receipt of a lump sum (an ex-intelligence official who receives a payement of $1 M will come under suspicion, exactly as would a politician) - and a lump sum payment might well arouse suspicions and be considered evidence of some criminal activity + the original lump sum is protected from confiscation by governments, by consideration in alimony or bankruptcy cases, etc. - such "consulting annuities" may be purchased just so as to insulate earnings from alimony, bankruptcy, etc. - as usual, I'm not defending these steps as moral or as good for the business climate of the world, just as inevitable consequences of many current trends and technical developments + the "shell game" is used to protect the funds - with periodic withdrawals or transfers - note that this whole scheme can pretty much be done by attorneys and agents today, though they may be subpoenaed or otherwise encouraged to blab + it may not even be illegal for a consultant to take his fee over a period of many years + the IRS may claim the "discounted present value" as a lump sum, but other folks already do things like this - royalty streams (and nobody claims an author must agree with the IRS to some estimated value of this stream) - percentages of the gross (and the like) - engineers and other professionals are often kept on payrolls not so much for their instantaneous achievements as for their past and projected achievements-are we to treat future accomplishments in a lump sum way? + IRS and others may try to inspect the terms of the employment or consulting agreement, but these seems too invasive and cumbersome + it makes the government a third party in all negotiations, requiring agents to be present in all talks or at least to read and understand all paperwork - and even then, there could be claims that the government didn't follow the deals - not enough time or manpower to handle all these things - and the invasion of privacy is extreme! + Scenario: the Fincen-type agencies may deal with the growing threat of CA-type systems (and encryption in general) by involving the government in ostensibly private deals - analogous to the sales tax and bookkeeping arrangements (where gov't. is a third party to all transactions) + or EEOC, race and sex discimination cases - will transcripts and recordings of all job interviews come to be required? - "laying track" - OSHA, pollution, etc. + software copying laws (more to the point): government seems to have the power to enter a business to see if illegal copies are in use; this may first require a warrant + how long before various kinds of software are banned? - with the argument being that some kinds of software are analogous to lockpicks and other banned burglar tools - "used to facillitate the illegal copying of protected software" + the threat of encryption for national security as well as for the money-laundering and illegal payments possibilities may cause the government to place restrictions on the use of crypto software for anything except approved uses (external e-mail, etc.) - and even these uses can of course be subverted - and crypto techniques are not actually necessary: lawyers and other discreet agents will suffice + furthermore, corporations have a fair amount of lattitude in setting retirement policies and benefits, and so the methods I've described to shelter current income may become more widespread + though there may be some proviso that if benefits exceeed some percentage of yearly income, factoring in years on the job, that these benefits are taxed in some punative way - e.g.., a corporation that pays $100K a year to a critical technical person for a year of work and then pays him $60K a year for the next ten years could reasonably be believed to have set up a system to help him avoid taxes on a large lump sum payment + Asset-hiding, to avoid seizure in bankruptcies, lawsuits + e.g., funds placed in accounts which are secret, or in systems/schemes over which the asset-hider has control of some kind (voting, consulting, etc.) - this is obscure: what I'm thinking of is some kind of deal in which Albert is hired by Bob as an "advisor" on financial matters: but Bob's money comes from Albert and so the quid pro quo is that Bob will take Albert's advice....hence the effective laundering and protection + May also be used to create "multi-tier" currency systems, e.g., where reported transactions are some fraction of actuals - suppose we agree to deal at some artificially low value: electricians and plumbers may barter with each other at a reported $5 an hour, while using underground accounts to actually trade at more realistic levels + government (IRS) has laws about "fair value"-but how could these laws be enforced for such intangibles as software? - if I sell a software program for $5000, can the government declare this to be over or underpriced? - likewise, if a plumber charges $5 an hour, can the government, suspecting tax evasion, force him to charge more? - once again, the nature of taxation in our increasingly many-dimensioned economy seems to necessitate major invasions of privacy 16.14.7. "Denationalization of Money" - as with the old SF standby of "credits" + cf. the books on denationalization of money, and the idea of competing currencies - digital cash can be denominated in these various currencies, so it makes the idea of competing currencies more practical - to some extent, it already exists + the hard money advocates (gold bugs) are losing their faith, as they see money moving around and never really landing in any "hard" form - of course, it is essential that governments and groups not have the ability to print more money - international networks will probably denominate transactions in whatever currencies are the most stable and least inflationary (or least unpredictably inflationary) 16.15.1. Concepts of property will have to change - intellectual property; enforcement is becoming problematic - when thieves cannot be caught 16.15.2. Intellectual property debate - include my comment about airwaves + work on payment for items...Brad Cox, Peter Sprague, etc. - Superdistribution, metered usage - propertarian - many issues 16.16.1. Note: This is a sufficiently important topic that it deserves its own heading. There's material on this scattered around this document, material I'll collect together when I get a chance. 16.16.2. This topic came up several times on then Extropians mailing list, where David Friedman (author of "The Machinery of Freedom" and son of Nobel Prize winner Milton Friedman) and Robin Hanson debated this with me. 16.16.3. Doug Cutrell summarized the concerns of many when he wrote: - "...the availability of truly secure anonymity, strong encryption, and untraceable digital cash could allow contract killing to be an openly conducted business. For example, an anonymous news post announces a public key which is to be used to encode a contract kill order, along with a digital cash payment. The person placing the contract need only anonymously place the encrypted message in alt.test. Perhaps it is even possible to make it impossible to tell that the message was encrypted with the contract killer's public key (the killer would have to attempt decryption of all similarly encoded messages on alt.test, but that might be quite feasible). Thus it could be completely risk free for anyone to place a contract on anyone else." [Doug Cutrell, 1994-09-09] 16.16.4. Abhorrent markets - contract killings - can collect money anonymously to have someone whacked...nearly anyone who is controversial can generate enough "contributions" - kidnapping, extortion 16.16.5. Dealing with Such Things: + never link physical ID with pseudonyms! (they won't kill you if they don't know who you are) - and even if one pseudonym is linked, make sure your financial records are not linkable - trust no one - increased physical security...make the effort of killing much more potentially dangerous - flooding attacks..tell extortionists to "get in line" behind all the other extortionists + announce to world that one does not pay extortionists...set up protocol to ensure this - yes, some will die as a result of this - console yourself with the fact that though some may die, fewer are dying as a result of state-sponsored wars and terrorism (historically a bigger killer than contract killings!) 16.17.1. Strong crypto makes possible the creation of institutions which can persist for very long periods of time, perhaps for centuries. - such institutions already exist: churches (Catholics of several orders), universities, etc. 16.17.2. all of these "persistent" services (digital banks, escrow services, reputation servers, etc.) require much better protections against service outages, seizures by governments, natural disasters, and even financial collapse than do most existing computer services-an opportunity for offshore escrow- like services - to maintain a distributed database, with unconditional privacy, etc. + again, it is imperative that escrow companies require all material placed in it to be encrypted - to protect them against lawsuits and claims by authorities (that they stole information, that they censored material, that they are an espionage conduit, etc.) 16.17.3. Escrow Services + "Digital Escrow" accounts for mutually suspicious parties, especially in illegal transactions - drug deals, information brokering, inside information, etc. + But why will the escrow entity be trusted? + reputations - their business is being a reliable escrow holder, not it destroying their reputation for a bribe or a threat + anonymity means the escrow company won't know who it's "burning," should it try to do so - they never know when they themselves are being tested by some service - and potential bribers will not know who to contact, although mail could be addressed to the escrow company easily enough - like bonding agencies - key is that these entities stand to gain very little by stealing from their customers, and much to lose (hinges on ratio of any single transaction to size of total market) - useful for black markets and illegal transactions (a reliable third party that both sides can trust, albeit not completely) 16.17.4. Reputation-Based Systems + Credit Rating Services that are Immune from Meddling and Lawsuits + with digital pseudonyms, true credit rating data bases can be developed - with none of the "5 year expirations" (I mean, who are you to tell me I must not hold it against a person that records show he's declares Chapter 7 every 5 years or so?...such information is information, and cannot be declared illegal, despite the policy issues that are involved) + this could probably be done today, using offshore data banks, but then there might develop injunctions against use by Stateside companies - how could this be enforced? stings? entrapment? + it may be that credit-granting entities will be forced to use rigid formulas for their decisions, with a complete audit trail available to the applicant - if any "discretion" or judgment is allowed, then these extralegal or offshore inputs can be used - related to "redlining" and other informal signalling mechanisms - remember that Prop. 103 attempted to bypass normal laws of economics + AMIX-like services will offer multiple approaches here + ranging from conventional credit data bases, albeit with lower costs of entry (e.g., a private citizen could launch a "bankruptcy filings" data base, using public records, with no expiration-they're just reporting the truth, e.g., that Joe Blow filed for personal bankruptcy in 1987 - this gets into some of the strange ideas involving mandatory rewriting of the truth, as when "credit records are expunged" (expunged from what? from my personal data bases? from records that were public and that I am now selling access to?) + there may be arguments that the "public records" are copyrighted or otherwise owned by someone and hence cannot be sold - telephone book case (however, the Supremes held that the "creative act" was the specific arrangement) - one ploy may be a Habitat-like system, where some of the records are "historical" - to offshore data bases + Book Reviews, Music Reviews - sometimes with pseudonyms to protect the authors from retaliation or even lawsuits + "What should I buy?" services, a la Consumer Reports - again, protection from lawsuits 16.17.5. Crypto Banks and the "Shell Game" as a Central Metaphor + Central metaphor: the Shell Game - description of conventional shell game (and some allusions to con artists on a street corner-the hand is quicker than the eye) + like entering a room filled with safe deposit boxes, with no surveillance and no way to monitor activity in the boxes....and user can buy new boxes anonymously, transferring contents amongst the boxes - only shutting down the entire system and forcing all the boxes open would do anything-and this would "pool" all of the contents (unless a law was passed saying people could "declare" the contents before some day....) + the shell game system can be "tested"-by testing services, by suspicious individuals, whatever-at very low cost by dividing some sum amongst many accounts and verifying that the money is still there (by retrieving or cashing them in) - and remember that the accounts are anonymous and are indistinguishable, so that the money cannot be seized without repercussions + this is of course the way banks and similar reputation- based institutions have always (or mostly) worked - people trusted the banks not to steal their money by verifying over some period of time that their money was not vanishing - and by relying upon some common sense ideas of what the bank's basic business was (the notion that a bank exists to continue in business and will make more money over some long run period by being trustworthy than it would make in a one-shot ripoff) + Numbered accounts - recall that Switzerland has bowed to international pressure and is now limiting (or eliminating) numbered accounts (though other countries are still allowing some form of such accounts, especially Lichtenstein and Luxembourg) + with crypto numbers, even more security - "you lose your number, tough" - but the money must exist in some form at some time? + options for the physical form of the money + accounts are shares in a fund that is publicly invested - shares act as "votes" for the distribution of proceeds - dividends are paid to the account (and sent wherever) - an abstract, unformed idea: multiple tiers of money, like unequal voting rights of stock... + could even be physical deposits - perhaps even manipulated by automatic handling systems (though this is very insecure) - the Bennett-Ross proposal for Global Data Services is essentially the early form of this 16.17.6. cryonicists will seek "crypto-trusts" to protect their assets + again, the "crypto" part is not really necessary, given trustworthy lawyers and similar systems - but the crypto part-digital money-further automates the system, allowing smaller and more secure transactions (overhead is lower, allowing more dispersions and diffusion) - and eliminates the human link - thus protecting better against subpoenas, threats, etc. + and to help fund "persistent institutions" that will fund research and protect them in suspension - they may also place their funds in "politically correct" longterm funds-which may or may not exert a postive ifluence in the direction they wish, what with the law of unintended consequences and all opl + many avenues for laundering money for persistent institutions + dummy corporations (or even real corporations) - with longterm consulting arrangements - "shell game" voting + as people begin to believe that they may just possibly be revived at some future time, they will begin to worry about protecting their current assets + recollections of "Why Call Them Back from Heaven?" - worries about financial stability, about confiscation of wealth, etc. - no longer will ersatz forms of immortality-endowments fo museums, universities, etc.-be as acceptable...people will want the real thing + Investments that may outlive current institutions - purchases of art works (a la Bill Gates, who is in fact a possibel model for this kind of behavior) - rights to famous works, with provision for the copyright expirations, etc. (which is why physical possession is preferable) - shell games, of course (networks of reputation-based accounts) - Jim Bennett reports that Saul Kent is setting up such things in Lichtenstein for Alcor (which is what I suggested to Keith Henson several years ago) 16.18.1. "The New Underworld Order" + Claire Sterling's "Thieve's World" - (Sterling is well-known for her conservative views on political matters, having written the controversial "The Terror Connection," which basically dismissed the role of the CIA and other U.S. agencies in promoting terrorism. "Thieve's World" continues the alarmist stance, but has some juicy details anyway.) - she argues for more law enforcement + but it was the corrupt police states of Nazi Germany, Sovet Russia, etc., that gave so many opportunities for modern corruption - and the CIA-etc. drug trade, Cold War excuses, and national security state waivers + in the FSU, the Russian Mafia is the chief beneficiary of privatization...only they had the cash and the connections to make the purchases (by threatening non- Mob bidders, by killing them, etc.) - as someone put in, the world's first complete criminal state 16.18.2. "Is the criminal world interested in crypto? Could they be early adopters of these advanced techniques?" - early use: BBS/Compuserve messages, digital flash paper, codes - money-laundering, anstalts, banks - Triads, chop marks - Even though this use seem inevitable, we should probably be careful here. Both because the clientele for our advice may be violent, and ditto for law enforcement. The conspiracy and RICO laws may be enough to get anyone who advises such folks into major trouble. (Of course, advice and consulting may happen throught the very same untraceable technology!) 16.18.3. crypto provides some schemes for more secure drug distribution - cells, dead drops, secure transfers to foreign accounts - communication via pools, or remailers - too much cash is usually the problem... - "follow the money" (FinCEN) - no moral qualms...nearly all drugs are less dangerous than alcohol is...that drug was just too popular to outlaw - this drug scenario is consistent with the Triad/Mob scenario 16.19.1. "my house, my rules" 16.19.2. a la David Friedman 16.19.3. markets for laws, Law Merchant - corporations, other organizations have their own local legal rules - Extropians had much debate on this, and various competing legal codes (as an experiment...not very sucessful, for various reasons) - "Snow Crash" 16.19.4. the Cypherpunks group is itself a good example: - a few local rules (local to the group) - a few constraints by the host machine environment (toad, soda) + but is the list run on "United States law"? - with members in dozens of countries? - only when the external laws are involved (if one of us threatened another, and even then this is iffy) could the external laws.... - benign neglect, by necessity 16.19.5. I have absolutely no faith in the law when it comes to cyberspatial matters (other matters, too). - especially vis-a-vis things like remote access to files, a la the AA BBS case - "the law is an ass" - patch one area, another breaks - What then? Technology. Remailers, encryption 16.19.6. Contracts and Cryptography + "How can contracts be enforced in crypto anarchy situations?" - A key question, and one which causes many people to question whether crypto anarchy can work at all. + First, think of how many situations are _already_ essentially outside the scope of the law...and yet in which something akin to "contracts" are enforceable, albeit not via the legal process. - friends, relationships + personal preferences in food, books, movies, etc. - what "recourse" does one have in cases where a meal is unsatisfactory? Not going back to the restaurant is usually the best recourse (this is also a hint about the importance of "future expectation of business" as a means of dealing with such things). - In these cases, the law is not directly involved. In fact, the law is not involved in _most_ human (and nonhuman!) interactions. + The Main Approaches: + Reputations. - reputations are important, are not lightly to be regarded - Repeat Business. - Escrow Services. + The "right of contract" (and the duty to adhere to them, to not try to change the contract after the facts) is a crucial building block. - Imagine a society in which contracts are valid. This allows those willing to sign contracts setting limits on malpractice to get cheaper health care, while those who won't sign such contracts are free to sue--but will of course have to pay more for health care. Nothing is free, and frivolous malpractice lawsuits have increased operating costs. (Recall the "psychic" who alleged that her psychic powers were lost after a CAT scan. A jury awarded her millions of dollars. Cf. Peter Huber's books on liability laws.) - Now imagine a society in which it is never clear if a contract is valid, or whether courts will overturn or amend a contract. This distorts the above analysis, and so hospitals, for example, have to build in safety margins and cushions. + Crypto can help by creating escrow or bonding accounts held by third parties--untraceable to the other parties--which act as bonding agents for completion of contracts. - Such arrangements may not be allowed. For example, a hospital which attempted to deal with such a bonding agency, and which asked customers to also deal with them, could face sanctions. - "Secured credit cards" are a current example: a person pays a reserve amount greater than the card limits (maybe 110%). The reason for doing this is not to obtain "credit," obviously, but to be able to order items over the phone, or to avoid carrying cash. (The benefit is thus in the _channel_ of commerce). 16.19.7. Ostracism, Banishment in Privately Produced Law + Voluntary and discretionary electronic communities also admit the easy possibility of banishment or ostracism (group-selected kill files). Of course, enforcement is generally difficult, e.g., there is nothing to stop individuals from continuing to communicate with the ostracized individual using secure methods. - I can imagine schemes in which software key escrow is used, but these seem overly complicated and intrusive. - The ability of individuals, and even subgroups, to thwart the ostracism is not at all a bad thing. - - "In an on-line world it would be much easier to enforce banishment or selective ostracism than in real life. Filtering agents could look for certificates from accepted enforcement agencies before letting messages through. Each user could have a set of agencies which were compatible with his principles, and another set of "outlaws". You could even end up with the effect of multiple "logical subnets" of people who communicate with each other but not outside their subnet. Some nets might respect intellectual property, others not, and so on." [Hal Finney, 1994-08-21] 16.19.8. Governments, Cyberspaces, PPLs - Debate periodically flares up on the List about this topic. - Can't be convered here in sufficient detail. - Friedman, Benson, Stephenson's "Snow Crash," etc. 16.19.9. No recourse in the courts with crypto-mediated systems - insulated from the courts - PPLs are essential - reputations, escrow, mediation (crypto-mediated mediation?) 16.19.10. Fraud - not exactly rare in the non-crypto world! - new flavors of cons will likely arise - anonymous escrow accounts, debate with Hal Finney on this issue, etc. 16.19.11. PPLs, polycentric law 16.20.1. what it is 16.20.2. parallels to Oceania, Galt's Gulch 16.20.3. Privacy in communications alters the nature of connectivity - virtual communities, invisible to outsiders - truly a crypto cabal - this is what frightens the lawmakers the most...people can opt out of the mainstream governmental system, at least partly (and probably increasingly) 16.21.1. Consider the "law" based approach - a discussion group that wants no men involved ("a protected space for womyn") - so they demand the civil law system enforce their rules - practical example: sysadmins yank accounts when "inappropriate posts" are made - the C&S case of spamming is an example - Note: The Net as currently constituted is fraught with confusion about who owns what, about what are public and what are private resources, and about what things are allowed. If Joe Blow sends Suzy Creamcheese an "unwanted" letter, is this "abuse" or "harassement"? Is it stealing Suzy's resources? (In my opinion, of course not, but I agree that things are confusing.) 16.21.2. The technological approach: - spaces created by crypto...unbreachable walls + example: a mailing list with controls on membership - could require nomination and vouching for by others - presentation of some credential (signed by someone), e.g. of femaleness - pay as you go stops spamming 16.21.3. This is a concrete example of how crypto acts as a kind of building material - and why government limitations on crypto hurt those who wish to protect their own spaces - a private mailing list is a private space, inaccessible to those outside - "There are good engineering approaches which can force data to behave itself. Many of them involve cryptography. Our government's restrictions on crypto limit our ability to build reliable computer systems. We need strong crypto for basic engineering reasons." [Kent Borg, "Arguing Crypto: The Engineering Approach," 1994-06-29] 16.21.4. Virtual Communities-the Use of Virtual Networks to Avoid Government - that is, alternatives to creating new countries (like the Minerva project) - the Assassin cult/sect in the mountains of Syria, Iraq, Afghanistan, etc. had a network of couriers in the mountain fastnessess - pirate communities, networks of trading posts and watering holes, exempt-if only for a few years-from the laws of the imperial powers 16.21.5. These private spaces will, as technology makes them more "livable" (I don't mean in a full sense, so don't send me notes about how "you can't eat cyberspace"), become full- functioned "spaces" that are outside the reach of governments. A new frontier, untouchable by outside, coercive governments. - Vinge's "True Names" made real 16.21.6. "Can things really develop in this "cyberspace" that so many of us talk about?" - "You can't eat cyberspace!' is the usual point made. I argue, however, that abstract worlds have always been with us, in the forms of commerce, reputations, friends, etc. And this will continue. - Some people have objected to the sometimes over- enthusiastic claims that economies and socities will flourish in computer-mediated cyberspaces. The short form of the objection is: "You can't eat cyberspace." Meaning, that profits and gains made in cyberspace must be converted to real world profits and gains. - In "Snow Crash," this was made out to be difficult...Hiro Protagonist was vastly wealthy in the Multiverse, but lived in a cargo container at LAX in the "real world." A fine novel, but this idea is screwy. + There are many ways to transfer wealth into the "real" world: + all the various money-laundering schemes - money in offshore accounts, accessible for vacations, visits, etc. - phony purchase orders - my favorite: Cyberspace, Inc. hires one as a "consultant" (IRS cannot and does not demand proof of work being done, the nature of the work, one's qualifications to perform the work, etc....In fact, many consultants are hired "on retainer," merely to be available should a need arise.) - information-selling - investments - 16.21.7. Protocols for this are far from complete - money, identity, walls, structures - a lot of basic work is needed (though people will pursue it locally, not after the work is done...so solutions will likely be emergent) 16.22.1. "What are data havens?" + Places where data can be hidden or protected against legal action. - Sterling, "Islands in the Net," 1988 + Medical experiments, legal advice, pornography, weapons - reputations, lists of doctors, lawyers, rent deadbeats, credit records, private eyes - What to do about the mounting pressure to ban certain kinds of research? - One of the powerful uses of strong crypto is the creation of journals, web sites, mailing lists, etc., that are "untraceable." These are sometimes called "data havens," though that term, as used by Bruce Sterling in "Islands in the Net" (1988), tends to suggest specific places like the Cayman Islands that corporations might use to store data. I prefer the emphasis on "cypherspace." - "It is worth noting that private "data havens" of all sorts abound, especially for financial matters, and most are not subject to governmental regulation....Some banks have research departments that are older and morecomprehensive than credit reporting agencies. Favored customers can use them for evaluation of private deals....Large law firms maintain data banks that approach those of banks, and they grow with each case, through additions of private investigators paid for by successive clients....Security professionals, like Wackenhut and Kroll, also market the fruits of substantial data collections....To these add those of insurance, bonding, investment, financial firms and the like which help make or break business deals." [John Young, 1994-09-07] 16.22.2. "Can there be laws about what can be done with data?" - Normative laws ("they shouldn't keep such records and hence we'll outlaw them") won't work in an era of strong crypto and privacy. In fact, some of us support data havens precisely to have records of, say, terminal diseases so we'll not lend money to Joe-who-has-AIDS. It may not be "fair" to Joe, but it's my money. (Same idea as in using offshore or cryptospatial data havens to bypass the nonsense in the "Fair Credit Reporting Act" that outlaws the keeping of certain kinds of facts about credit applicants, such as that they declared bankruptcy 10 years ago or that they left a string of bad debts in Germany in the 1970s, etc.) 16.22.3. Underground Networks, Bootleg Research, and Information Smuggling + The Sharing of Forbidden Knowledge - even if the knowledge is not actually forbidden, many people relish the idea of trafficking in the forbidden + Some modern examples + drugs and marijuana cultivation - drugs for life extension, AIDS treatments - illegal drugs for recreational use + bootleg medical research, AIDS and cancer treatments, etc. - for example, self-help user groups that advise on treatments, alternatives, etc. + lockpicking and similar security circumvention techniques - recall that possession of lockpicks may be illegal - what about manuals? (note that most catalogs have a disclaimer: "These materials are for educational purposes only, ...") - defense-related issues: limitations on debate on national security matters may result in "anonymous forums" + BTW, recent work on crab shells and other hard shells has produced even stronger armor! - this might be some of the genetic research that is highly classified and is sold on the anonymous nets + Alchemists and the search for immortality + theory that the "Grandfather of all cults" (my term) started around 4500 B.C. - in both Egypt and Babylonia/Sumeria + ancestor of Gnostics, Sufis, Illuminati, etc. - The Sufi mystic Gurdjieff claimed he was a member of a mystical cult formed in Babylon about 4500 B.C. - spider venom? + Speculation: a group or cult oriented toward life extension, toward the search for immortality-perhaps a link to The Epic of Gilgamesh. + The Gilgamesh legend - Gilgamesh, Akkadian language stone tablets in Nineveh - made a journey to find Utnapishtim, survivor of Babylonian flood and possessor of secret of immortality (a plant that would renew youth) - but Gilgamesh lost the plant to a serpent + Egyptians - obviously the Egyptians had a major interest in life extension and/or immortality + Osiris, God of Resurrection and Eternal Life - also the Dark Companion of Serius (believed to be a neutron star?) - they devoted huge fraction of wealth to pyramids, embalming, etc. (myrhh or frankincense from desert city in modern Oman, discovered with shuttle imaging radar) + "pyramid power": role on Great Seal, as sign of Illuminati, and of theories about cosmic energy, geometrical shapes, etc. - and recall work on numerological significance of Great Pyramid dimensions - + Early Christianity - focus on resurrection of Jesus Christ + Quest for immortality is a major character motivation or theme + arguably for all people: via children, achievements, lasting actions, or even "a good life" - "Living a good life is no substitute for living forever" - but some seek it explicitly - "Million alive today will never die." (echoes of past religious cults....Jehovah's Witnesses?) - banned by the Church (the Inquisition) + research, such as it was, was kept alive by secret orders that communicated secretly and in code and that were very selective about membership - classes of membership to protect against discovery (the modern spy cell system) - red herrings designed to divert attention away + all of this fits the structure of such groups as the Masons, Freemason, Illuminati, Rosicrucians, and other mystical groups - with members like John Dee, court astrologer to Queen Elizabeth + a genius writer-scientist like Goethe was probably a member of this group - Faust was his message of the struggle - with the Age of Rationalism, the mystical, mumbo-jumbo aspects of alchemical research were seen to be passé, and groups like Crowleys O.T.O. became purely mystical showmanship + but the need for secrecy was now in the financial arena, with vast resources, corporate R & D labs, and banks needed - hence the role of the Morgans, Rothschilds, etc. in these conspiracies + and modern computer networks will provide the next step, the next system of research - funded anonymously - anonymous systems mean that researchers can publish results in controversial areas (recall that cryobiologists dare not mention cryonics, lest they be expelled from American Cryobiology xxx) + Bootleg Medical Research (and Cryonics) + Cryonics Research and Anti-aging Treatments + Use of Nazi Data - hypothermia experiments at Dachau + Anti-aging drugs and treatments - fountain of youth, etc. - many FDA restrictions, of course - Mexico + Switzerland - foetal calf cells? - blood changing or recycling? + Illegal Experiments - reports that hyperbaric oxygen may help revival of patients from neat-death in freezing accidents + Black Markets in Drugs, Medical Treatments + RU-486, bans on it - anti-abortion foes - easy to synthesize - NOW has indicated plans to distribute this drug themselves, to create networks (thus creating de facto allies of the libertarian-oriented users) + Organ Banks + establishing a profit motive for organ donors - may be the only way to generate enough donations, even from the dead - some plans are being made for such motives, especially to motivate the families of dying patients - ethical issues + what about harvesting from the still-living? - libertarians would say: OK, if informed consent was given - the rich can go to overseas clinics + AIDS patients uniting via bulletin boards to share treatment ideas, self-help, etc. - with buying trips to Mexico and elsewhere - authorities will try to halt such BBSs (on what grounds, if no money is changing hands?) + Doctors may participate in underground research networks to protect their own reputations and professional status - to evade AMA or other professional organizations and their restrictive codes of ethics + or lawsuits and bad publicity - some groups, the "Guardian Angels" of the future, seek to expose those who they think are committing crimes: abortionists (even though legal), etc. - "politically incorrect" research, such as vitamin therapy, longevity research, cryonics - breast implant surgery may be forced into black markets (and perhaps doctors who later discover evidence of such operations may be forced to report such operations) + Back Issues of Tests and Libraries of Term Papers - already extant, but imagine with an AMIX-like frontend? + Different kinds of networks will emerge, not all of them equally accessible + the equivalent of the arms and drug networks-one does not gain entree merely by asking around a bit - credibility, reputation, "making your bones" - these networks are not open to the casual person + Some Networks May Be For the Support of Overseas Researchers + who face restrictions on their research - e.g., countries that ban birth control may forbid researchers from communication with other researchers + suppose U.S. researchers are threatened with sanctions-loss of their licenses, censure, even prosecution-if they participate in RU-486 experiments? - recall the AIDS drug bootleg trials in SF, c. 1990 - or to bypass export restrictions - scenario: several anonymous bulletin boards are set up-and then closed down by the authorities-to facillitate anonymous hookups (much like "anonymous FTP") + Groups faced with debilitating lawsuits will "go underground" - Act Up! and Earth First! have no identifiable central office that can be sued, shut down, etc. - and Operation Rescue has done the same thing 16.22.4. Illegal Data - credit histories that violate some current law about records - bootleg medical research - stolen data (e.g., from competitors....a GDS system could allow remote queries of a database, almost "oracular," without the stolen data being in a U.S. jurisdiction) - customers in the U.K or Sweden that are forbidden to compile data bases on individuals may choose to store the data offshore and then access it discreetly (another reason encryption and ZKIPS must be offered) 16.22.5. "the Switzerland of data" - Brussells supposedly raises fewer eyebrows than Lichtenstein, Luxembourg, Switzerland, etc. - Cayman Islands, other small nations see possibilities 16.22.6. Information markets may have to move offshore, due to licensing and other restrictions - just as stock brokers and insurance brokers are licensed, the government may insist that information resellers be licensed (pass exams, be subject to audits and regulations) 16.23.1. "Is it legal to advocate the overthrow of governments or the breaking of laws?" - Although many Cypherpunks are not radicals, many others of us are, and we often advocate "collapse of governments" and other such things as money laundering schemes, tax evasion, new methods for espionage, information markets, data havens, etc. This rasises obvious concerns about legality. - First off, I have to speak mainly of U.S. issues...the laws of Russia or Japan or whatever may be completely different. Sorry for the U.S.-centric focus of this FAQ, but that's the way it is. The Net started here, and still is dominantly here, and the laws of the U.S. are being propagated around the world as part of the New World Order and the collapse of the other superpower. - Is it legal to advocate the replacement of a government? In the U.S., it's the basic political process (though cynics might argue that both parties represent the same governing philosophy). Advocating the *violent overthrow* of the U.S. government is apparently illegal, though I lack a cite on this. + Is it legal to advocate illegal acts in general? Certainly much of free speech is precisely this: arguing for drug use, for boycotts, etc. + The EFF gopher site has this on "Advocating Lawbreaking, Brandenburg v. Ohio. ": - "In the 1969 case of Brandenburg v. Ohio, the Supreme Court struck down the conviction of a Ku Klux Klan member under a criminal syndicalism law and established a new standard: Speech may not be suppressed or punished unless it is intended to produce 'imminent lawless action' and it is 'likely to produce such action.' Otherwise, the First Amendment protects even speech that advocates violence. The Brandenburg test is the law today. " 16.23.2. Espionage and Subversion of Governments Will be Revolutionized by Strong Crypto - (I think they see what we see, too, and this is a motivation for the attempts to limit the use of strong crypto. Besides some of the more conventional reasons.) + Digital dead drops will revolutionize espionage + spies and their controllers can communicate securely, relatively quickly, without fear of being watched, their drops compromised, etc. - no more nooks of trees, no more chalk marks on mailboxes to signal a drop to be made + this must be freaking out the intelligence community! - more insights into why the opposition to crypto is so strong + Cell-Based Systems and Conventional Protection Systems + Cells are a standard way to limit the damage of exposure - the standard is the 3-person cell so common in the early days of Soviet espionage in the U.S. - but computer systems may allow new kinds of cells, with more complicated protocols and more security + Keeping files for protection is another standard protection method + and with strong crypto, these files can be kept encrypted and in locations not apparent (e.g., posted on bulletin boards or other such places, with only the key needed at a later time to open them) - a la the "binary files" idea, wherein encrypted files are widely available for some time before the key is distributed (thus making it very hard for governments to halt the distribution of the raw files) 16.23.3. "Xth Column" (X = encrypted) - The possible need to use strong cryptography as a tool to fight the state. + helping to undermine the state by using whistleblowers and anonymous information markets to leak information - the 63,451 people given false identities in the WitSec program...leak their names, watch them be zapped by vengeful enemies, and watch the government squirm - auction off the details of the 1967 Inspector General's report on CIA assassinations 16.23.4. use of clandestine, cell-based systems may allow a small group to use "termite" methods to undermine a society, to destroy a state that has become too repressive (sounds like the U.S. to me) - encrypted systems, anonymous pools, etc., allow truly secure cell-based systems (this is, by the way, one of the concerns many countries have about "allowing" cryptography to be used...and they're right abou the danger!) - subversion of fascist or socialist governments, undermining the so-called democratic governments 16.23.5. "Why won't government simply ban such encryption methods?" + This has always been the Number One Issue! - raised by Stiegler, Drexler, Salin, and several others (and in fact raised by some as an objection to my even discussing these issues, namely, that action may then be taken to head off the world I describe) + Types of Bans on Encryption and Secrecy - Ban on Private Use of Encryption - Ban on Store-and-Forward Nodes - Ban on Tokens and ZKIPS Authentication - Requirement for public disclosure of all transactions + Recent news (3-6-92, same day as Michaelangelo and Lawnmower Man) that government is proposing a surcharge on telcos and long distance services to pay for new equipment needed to tap phones! - S.266 and related bills - this was argued in terms of stopping drug dealers and other criminals - but how does the government intend to deal with the various forms fo end-user encryption or "confusion" (the confusion that will come from compression, packetizing, simple file encryption, etc.) + Types of Arguments Against Such Bans - The "Constitutional Rights" Arguments + The "It's Too Late" Arguments - PCs are already widely scattered, running dozens of compression and encryption programs...it is far too late to insist on "in the clear" broadcasts, whatever those may be (is program code distinguishable from encrypted messages? No.) - encrypted faxes, modem scramblers (albeit with some restrictions) - wireless LANs, packets, radio, IR, compressed text and images, etc....all will defeat any efforts short of police state intervention (which may still happen) + The "Feud Within the NSA" Arguments - COMSEC vs. PROD + Will affect the privacy rights of corporations - and there is much evidence that corporations are in fact being spied upon, by foreign governments, by the NSA, etc. + They Will Try to Ban Such Encryption Techniques + Stings (perhaps using viruses and logic bombs) - or "barium," to trace the code + Legal liability for companies that allow employees to use such methods - perhaps even in their own time, via the assumption that employees who use illegal software methods in their own time are perhaps couriers or agents for their corporations (a tenuous point) 16.23.6. "How will the masses be converted?" - Probably they won't. Things will just happen, just as the masses were not converted on issues of world financial markets, derivative instruments, and a lot of similar things. - Crypto anarchy is largely a personal approach of withdrawal, of avoidance. Mass consensus is not needed (unless the police state option is tried). - Don't think in terms of selling crypto anarchy to Joe Average. Just use it. 16.23.7. As things seem to be getting worse, vis-a-vis the creation of a police state in the U.S.--it may be a good thing that anonymous assassination markets will be possible. It may help to level the playing field, as the Feds have had their hit teams for many years (along with their safe houses, forged credentials, accommodation addresses, cut-outs, and other accouterments of the intelligence state). - (I won't get into conspiracies here, but the following terms may trigger some memories: Gehlen Org, Wackenhut, McKee Team, Danny Casolaro, Cabazon Indians, Gander crash, Iraq arms deals, Pan Am 103, Bridegrooms of Death, French Connection, Fascist Third Position, Phoenix Program, Bebe Rebozo, Marex, Otto Skorzeny, Nixon, P-2, Klaus Barbie, etc.) - Plenty of evidence of misbehavior on a massive scales by the intelligence agencies, the police forces, and states in general. Absolute power has corrupted absolutely. - I'm certainly not advocating the killing of Congressrodents and other bureaucrats, just noting that this cloud may have a silver lining. 16.24.1. Escrow Agents as a way to deal with contract renegging - On-line clearing has the possible danger implicit in all trades that Alice will hand over the money, Bob will verify that it has cleared into hisaccount (in older terms, Bob would await word that his Swiss bank account has just been credited), and then Bob will fail to complete his end of the bargain. If the transaction is truly anonymous, over computer lines, then of course Bob just hangs up his modem and the connection is broken. This situation is as old as time, and has always involved protcols in which trust, repeat business, etc., are factors. Or escrow agents. - Long before the "key escrow" of Clipper, true escrow was planned. Escrow as in escrow agents. Or bonding agents. - Alice and Bob want to conduct a transaction. Neither trusts the other; indeed, they are unknown to each other. In steps "Esther's Escrow Service." She is _also utraceable_, but has established a digitally-signed presence and a good reputation for fairness. Her business is in being an escrow agent, like a bonding agency, not in "burning" either party. (The math of this is interesting: as long as the profits to be gained from any small set of transactions is less than her "reputation capital," it is in her interest to forego the profits from burning and be honest. It is also possible to arrange that Esther cannot profit from burning either Alice or Bob or both of them, e.g., by suitably encrypting the escrowed stuff.) - Alice can put her part of the transaction into escrow with Esther, Bob can do the same, and then Esther can release the items to the parties when conditions are met, when both parties agree, when adjudication of some sort occurs, etc. (There a dozen issues here, of course, about how disputes are settled, about how parties satisfy themselves that Esther has the items she says she has, etc.) 16.24.2. Use of escrow services as a substute for government + as in underworld deals, international deals, etc. - "Machinery of Freedom" (Friedman), "The Enterprise of Law" (Benson) - "It is important to note in any case that the use of third- party escrow as a substitute for Government regulation was a feature of the Northern European semi-anarchies of Iceland and Ireland that have informed modern libertarian thought." [Duncan Frissell, 1994-08-30] 16.24.3. Several people have raised the issue of someone in an anonymous transaction simply taking the money and not performing the service (or the flip side). This is where _intermediaries_ come into the picture, just as in the real worl (bonds, escrow agents, etc.). 16.24.4. Alice and Bob wish to conduct an anonymous transaction; each is unknown to the other (no physical knowledge, no pseudonym reputation knowledge). These "mutually suspicious agents," in 1960s- and 70s-era computer science lingo, must arrange methods to conduct business while not trusting the other. 16.24.5. Various cryptographic protocols have been developed for such things as "bit commitment" (useful in playing poker over the phone, for example). I don't know of progress made at the granularity of anonymous transactions, though. (Though the cryptographic protocol building blocks at lower levels--such as bit commitment and blobs--will presumably be used eventually at higher levels, in markets.) 16.24.6. I believe there is evidence we can shorten the cycle by borrowing noncryptographic protocols (heresy to purists!) and adapting them. Reputations, for example. And escrow agents (a form of reputation, in that the "value" of a bonding entity or escrow agent lies in reputation capital). 16.24.7. if a single escrow agent is suspected of being untrustworthy (in a reputation capital sense), then can use _multiple_ escrows - with various protocols, caveat emptor - n-out-of-m voting schemes, where n escrow agents out of m are required to complete a transaction - hard to compromise them all, especially if they have no idea whether they are being "legitimately bribed" or merely pinged by a reputation-rating service - Hunch: the work of Chaum, Bos, and the Pfaltzmanns on DC- nets may be direcly applicable here...issues of collusion, sets of colluders, detection of collusion, etc. 16.25.1. "How do we know that crypto anarchy will 'work,' that the right institutions will emerge, that wrongs will be righted, etc.?" - We don't know. Few things are certain. Only time will tell. These are emergent situations, where evolution will determine the outcome. As in other areas, the forms of solutions will take time to evolve. - (The Founders could not have predicted the form corporate law would take, as but one example.) 16.25.2. My thinking on crypto anarchy is not so much _prediction_ as examination of trends and the implications of certain things. Just as steel girders mean certain things for the design of buildings, so too does unbreakable crypto mean certain things for the design of social and economic systems. 16.25.3. Several technologies are involved: - Unbreakable crypto - Untraceable communication - Unforgeable signatures 16.25.4. (Note: Yes, it's sometimes dangerous to say "unbreakable," "untraceable," and "unforgeable." Purists eschew such terms. All crypto is economics, even information-theoretically secure crypto (e.g., bribe someone to give you the key, break in and steal it, etc.). And computationally-secure crypto-- such as RSA, IDEA, etc.--can in *principle* be brute-forced. In reality, the costs may well be exhorbitantly high...perhaps more energy than is available in the entire universe would be needed. Essentially, these things are about as unbreakable, untraceable, and unforgeable as one can imagine.) 16.25.5. "Strong building materials" implies certain things. Highways, bridges, jet engines, etc. Likewise for strong crypto, though the exact form of the things that get built is still unknown. But pretty clearly some amazing new structures will be built this way. 16.25.6. Cyberspace, walls, bricks and mortar... 16.25.7. "Will strong crypto have the main effect of securing current freedoms, or will it create new freedoms and new situations?" - There's a camp that believe mainly that strong crypto will ensure that current freedoms are preserved, but that this will not change things materially, Communications can be private, diaries can be secured, computer security will be enhanced, etc. - Another camp--of which I am a vocal spokesman--believes that qualitatively different types of transactions will be made possible. In addition, of course, to the securing of liberties that the first camp things is the main effect. + These effects are specultative, but probably include: - increased hiding of assets through untraceable banking systems - markets in illegal services - increased espionage - data havens 16.25.8. "Will all crypto-anarchic transactions be anonymous?" - No, various parties will negotiate different arrangements. All a matter of economics, of enforcement of terms, etc. Some will, some won't. The key thing is that the decision to reveal identity will be just another mutually negotiated matter. (Think of spending cash in a store. The store owner may _want_ to know who his customers are, but he'll still take cash and remain ignorant in most cases. Unless a government steps in and distorts the market by requiring approvals for purchases and records of identities--think of guns here.) - For example, the local Mob may not lend me money if I am anonymous to them, but they have a "hook" in me if they know who I am. (Aspects of anonymity may still be used, such as systems that leave no paper or computer trail pointing to them or to me, to avoid stings.) - "Enforcement" in underground markets, for which the conventional legal remedies are impossible, is often by means of physical force: breaking legs and even killing welshers. - (Personally, I have no problems with this. The Mob cannot turn to the local police, so it has to enforce deals its own way. If you can't pay, don't play.) 16.26.1. The Direct Attack: Restrictions on Encryption + "Why won't government simply ban such encryption methods?" + This has always been the Number One Issue! - raised by Stiegler, Drexler, Salin, and several others (and in fact raised by some as an objection to my even discussing these issues, namely, that action may then be taken to head off the world I describe) + Types of Bans on Encryption and Secrecy - Ban on Private Use of Encryption - Ban on Store-and-Forward Nodes - Ban on Tokens and ZKIPS Authentication - Requirement for public disclosure of all transactions + Recent news (3-6-92, same day as Michaelangelo and Lawnmower Man) that government is proposing a surcharge on telcos and long distance services to pay for new equipment needed to tap phones! - S.266 and related bills - this was argued in terms of stopping drug dealers and other criminals - but how does the government intend to deal with the various forms fo end-user encryption or "confusion" (the confusion that will come from compression, packetizing, simple file encryption, etc.) + Types of Arguments Against Such Bans - The "Constitutional Rights" Arguments + The "It's Too Late" Arguments - PCs are already widely scattered, running dozens of compression and encryption programs...it is far too late to insist on "in the clear" broadcasts, whatever those may be (is program code distinguishable from encrypted messages? No.) - encrypted faxes, modem scramblers (albeit with some restrictions) - wireless LANs, packets, radio, IR, compressed text and images, etc....all will defeat any efforts short of police state intervention (which may still happen) + The "Feud Within the NSA" Arguments - COMSEC vs. PROD + Will affect the privacy rights of corporations - and there is much evidence that corporations are in fact being spied upon, by foreign governments, by the NSA, etc. + They Will Try to Ban Such Encryption Techniques + Stings (perhaps using viruses and logic bombs) - or "barium," to trace the code + Legal liability for companies that allow employees to use such methods - perhaps even in their own time, via the assumption that employees who use illegal software methods in their own time are perhaps couriers or agents for their corporations (a tenuous point) - restrictions on: use of codes and ciphers + there have long been certain restrictions on the use of encryption - encryption over radio waves is illegal (unless the key is provided to the government, as with Morse code) + in war time, many restrictions (by all governments) - those who encrypt are ipso facto guilty and are shot summarily, in many places - even today, use of encryption near a military base or within a defense contractor could violate laws + S.266 and similar bills to mandate "trapdoors" + except that this will be difficult to police and even to detect - so many ways to hide messages - so much ordinary compression, checksumming, etc. + Key Registration Trail Balloon - cite Denning's proposal, and my own postings 16.26.2. Another Direct Attack: Elimination of Cash + the idea being that elimination of cash, with credit cards replacing cash, will reduce black markets - "one person, one ID" (goal of many international standards organizations) - this elimination of cash may ultimately be tied in to the key registration ideas...government becomes a third party in all transactions + a favorite of conspiracy theorists - in extreme form: the number of the Beast tattooed on us (credit numbers, etc.) - currency exchanges (rumors on the Nets about the imminent recall of banknotes, ostensibly to flush out ill-gotten gains and make counterfeiting easier) + but also something governments like to do at times, sort of to remind us who's really in charge - Germany, a couple of times - France, in the late 1950s - various other devaluations and currency reforms + Partial steps have already been made - cash transactions greater than some value-$10,000 at this time, though "suspicious" sub-$10K transactions must be reported-are banned + large denomination bills have been withdrawn from circulation - used in drug deals, the argument goes - Massachussetts has demanded that banks turn over all account records, SS numbers, balances, etc. + "If what you're doing is legal, why do you need cash for it?" - part of the old American dichotomy: privacy versus "What have you got to hide?" + But why the outlawing of cash won't work + if a need exists, black markets will arise - i.e., the normal tradeoff between risk and reward: there may be some "discounts" on the value, but cah will still circulate + too many other channels exist: securities, secrets, goods + from trading in gold or silver, neither of which are outlawed any longer, to trading in secrets, how can the government stop this? - art being used to transfer money across international borders (avoids Customs) - "consideration" given, a la the scam to hide income + total surveillance? - it doesn't even work in Russia - on the other hand, Russia lacks the "point of sale" infrastructure to enforce a cashless system 16.26.3. Another Direct Attack: Government Control of Encryption, Networks, and Net Access - a la the old Bell System monopoly, which limited what could be hooked up to a phone line + the government may take control of the networks in several ways: + FCC-type restrictions, though it is hard to see how a private network, on private property, could be restricted - as it is not using part of the "public spectrum" - but it is hard to build a very interesting network that stays on private property....and as soon as it crosses public property, BINGO! + "National Data Highway" could be so heavily subsidized that alternatives will languish (for a while) - the Al Gore proposals for a federally funded system (and his wife, Tipper, is of course a leader of the censorship wing) - and then the government can claim the right and duty to set the "traffic" laws: protocols, types of encryption allowed, etc. - key patents, a la RSA (if in fact gov't. is a silent partner in RSA Data Security) 16.26.4. An Indirect Attack: Insisting that all economic transactions be "disclosed" (the "Full Disclosure Society" scenario) + this sounds Orwellian, but the obvious precedent is that businesses must keep records of all financial transactions (and even some other records, to see if they're colluding or manipulating something) - for income and sales tax reasons - and OSHA inspections, INS raids, etc. + there is currently no requirement that all transactions be fully documented with the identies of all parties, except in some cases like firearms purchases, but this could change - especially as electronic transactions become more common: the IRS may someday insist on such records, perhaps even insisting on escrowing of such records, or time-stamping + this will hurt small businesses, due to the entry cost and overhead of such systems, but big businesses will probably support it (after some grumbling) - big business always sees bureaucracy as one of their competitive advantages + and individuals have not been hassled by the IRS on minor personal transactions, though the web is tightening: 1099s are often required (when payments exceed some amount, such as $500) - small scale barter transactions + but the nature of CA is that many transactions can be financial while appearing to be something else (like the transfer of music or images, or even the writing of letters) - which is why a cusp is coming: full disclosure is one route, protection of privacy is another + the government may cite the dangers of a "good old boy network" (literally) that promulgates racist, sexist, and ableist discrimination via computer networks - i.e., that the new networks are "under-representing people of color" - and how can quotas be enforced in an anonymous system? - proposals in California (7-92) that consultants file monthly tax statements, have tax witheld, etc. - a strategy for the IRS: require all computer network users to have a "taxpayer ID number" for all transactions, so that tax evasion can be checked 16.26.5. Attempts to discredit reputation-based systems by deceit, fraud, nonpayment, etc. - deliberate attacks on the reputation of services the government doesn't want to see - there may be government operations to sabotage businesses, to undermine such efforts before they get started - analogous to "mail-bombing" an anonymous remailer 16.26.6. Licensing of software developers may be one method used to try to control the spread of anonymous systems and information markets - by requiring a "business license" attached to any and all chunks of code + implemented via digital signatures, a la the code signing protocols mentioned by Bob Baldwin as a means of reducing trapdoors, sabotage, and other modifications by spies, hackers, etc. - proposals to require all chunks of code to be signed, after the Sililcon Valley case in mid-80s, where spy/saboteur went to several s/w companies and meddled with code - "seals" from some group such as "Software Writers Laboratories," with formal specs required, source code provided to a trusted keeper, etc. + such licensing and inspection will also serve to lock-in the current players (Microsoft will love it) and make foreign competition in software more difficult - unless the foreign competition is "sanctioned," e.g., Microsoft opens a code facility in India 16.26.7. RICO-like seizures of computers and bulletin board systems - sting operations and setups - Steve Jackson Games is obvious example - for illegal material (porno, drug advocacy, electronic money, etc.) flowing through their systems - even when sysop can prove he did not know illegal acts were being committed on his system (precedents are the yachts seized because a roach was found) + these seizures can occur even when a trial is never held - e.g., the "administrative seizure" of cars in Portland in prostitution cases - and the seizures are on civil penalties, where the standards of proof are much lower + in some cases a mere FBI investigation is enough to get employees fired, renters kicked out, IRS audits started + reports that a woman in Georgia who posted some "ULs" (unlisted numbers?) was fired by her company after the FBI got involved, told by her landlord that her lease was not being extended, and so forth - "We don't truck with no spies" - the IRS audit would not ostensibly be for harassment, but for "probable cause" (or whatever term they use) that tax avoidance, under-reporting, even money-laundering might be involved 16.26.8. Outlawing of Digital Pseudonyms and Credentialling + may echoe the misguided controversy over Caller ID - misguided because the free market solution is clear: let those who wish to hide their numbers-rape and battering support numbers, police, detectives, or even just citizens requesting services or whatever-do so - and let those who refuse to deal with these anonymous callers also do so (a simple enough programming of answering machines and telephones) - for example, to prevent minors and felons from using the systems, "true names" may be required, with heavy fines and forfeitures of equipment and assets for anybody that fails to comply (or is caught in stings and setups) + minors may get screened out of parts of cyberspace by mandatory "age credentialing" ("carding") - this could be a major threat to such free and open systems, as with the various flaps over minors logging on to the Internet and seeing X-rated images (however poorly rendered) or reading salacious material in alt.sex - there may be some government mood to insist that only "true names" be used, to facillitate such age screening (Fiat-Shamir passports, papers, number of the Beast?) + the government may argue that digital pseudonyms are presumptively considered to be part of a conspiracy, a criminal enterprise, tax evasion, etc. - the old "what have you got to hide" theory - closely related to the issue of whether false IDs can be used even when no crimes are being committed (that is, can Joe Average represent himself by other than his True Name?) - civil libertarians may fight this ban, arguing that Americans are not required to present "papers" to authorities unless under direct suspicion for a crime (never mind the loitering laws, which take the other view) 16.26.9. Anonymous systems may be restricted on the grounds that they constitute a public nuisance - or that they promote crime, espionage, etc. + especially after a few well-publicized abuses - possibly instigated by the government? - operators may have to post bonds that effectively drive them out of business 16.26.10. Corporations may be effectively forbidden to hire consultants or subcontractors as individuals + the practical issue: the welter of tax and benefit laws make individuals unable to cope with the mountains of forms that have to be filed - thus effectively pricing individuals out of this market + the tax law side: recall the change in status of consultants a few years back...this may be extended further - a strategy for the IRS: require all computer network users to have a "taxpayer ID number" for all transactions, so that tax evasion can be checked - not clear how this differs from the point above, but I feel certain more such pressures will be applied (after all, most corporations tend to see independent contractors as more of a negative than a positive) - this may be an agenda of the already established companies: they see consultants and free lancers as thieves and knaves, stealing their secrets and disseminating the crown jewels (to punningly mix some metaphors) - and since the networks discussed here facilitate the use of consultants, more grounds to limit them 16.26.11. There may be calls for U.N. control of the world banking system in the wake of the BCCI and similar scandals - to "peirce the veil" on transnationals - calls for an end to banking secrecy - talk about denying access to the money centers of New York (but will this push the business offshore, in parallel to the Eurodollar market?) + motivations and methods - recall the UNESCO attempt a few years back to credential reporters, ostensibly to prevent chaos and "unfair" reporting...well, the BCCI and nuclear arms deals surfacing may reinvigorate the efforts of "credentiallers" + the USSR and other countries entering the world community may sense an opportunity to get in on the formation of "boards of directors" of these kinds of banks and corporations and so may push the idea in the U.N. - sort of like a World Bank or IMF with even more power to step in and take control of other banks, and with the East Bloc and USSR having seats! 16.26.12. "National security" - if the situation gets serious enough, a la a full-blown crypto anarchy system, mightn't the government take the step of declaring a kind of national emergency? - provisions exist: "401 Emergency" and FEMA plans - of course, the USSR tried to intitiate emergency measures and failed - recall that a major goal of crypto anarchy is that the systems described here will be so widely deployed as to be essential or critical to the overall economy...any attempt to "pull the plug" will also kill the economy 16.26.13. Can authorities force the disclosure of a key? + on the "Yes" side: + is same, some say, as forcing combination to a safe containing information or stolen goods - but some say-and a court may have ruled on this-that the safe can always be cut open and so the issue is mostly moot - while forcing key disclosure is compelled testimony - and one can always claim to have forgotten the key - i.e., what happens when a suspect simply clams up? - but authorities can routinely demand cooperation in investigations, can seize records, etc. + on the "No" side: - can't force a suspect to talk, whether about where he hid the loot or where his kidnap victim is hidden - practically speaking, someone under indictment cannot be forced to reveal Swiss bank accounts....this would seem to be directly analogous to a cryptographic key - thus, the key to open an account would seem to be the same thing - a memorized key cannot be forced, says someone with EFF or CPSR - on balance, it seems clear that the disclosure of cryptographic keys cannot be forced (though the practical penalty for nondisclosure could be severe) - but this has not really been tested, so far as I know - and many people say that such cooperation can be demanded... 16.27.1. Bypassing restrictions on commercial encryption packages by not making them "commercial" - public domain - freely distributed - after all, the basic algorithms are simple and don't really deserve patent protection: money will not be made by the originators of the code, but by the actual providers of services (for transmission and storage of packets) 16.27.2. Noise and signals are often indistinguishable - as with the LSB audio signal approach...unless the government outlaws live recordings or dubs on digital systems... 16.27.3. Timed-release files (using encryption) will be used to hide files, to ensure that governments cannot remove material they don't like - easier said than done 16.27.4. Legal approaches will also be taken: fundamental constitutional issues - privacy, free speech, free association 16.27.5. The Master Plan to Fight Restrictions on Encryption + "Genie out of the bottle" strategy: deploy crypto widely - intertwined with religions, games, whistleblower groups, and other uses that cannot easily just be shut down - scattered in amongst many other activities - Media attention: get media to report on value of encryption, privacy, etc. + Diffusion, confusion, and refusion - Diffuse the use by scattering it around - Confuse the issue by fake religions, games, other uses - Refuse to cooperate with the government - Free speech arguments: calling the discussions free speech and forcing the government to prove that the free speech is actually an economic transaction + links with religions, corporations, etc. - private meetings protected - voting systems 16.28.1. first and foremost, the incredible bandwidth, the bits sloshing around the world's networks...tapes being exchanged, PCs calling other PCs, a variety of data and compression formats, ISDN, wireless transmission, etc. 16.28.2. in the coming years, network traffic will jump a thousand- fold, what with digital fax, cellular phones and computers, ISDN, fiber optics, and higher-speed modems - and these links will be of all kinds: local, private, corporate, business, commercial, bootleg (unrecorded), cellular radio, etc. 16.28.3. corporations and small groups will have their own private LANs and networks, with massive bandwidth, and with little prospects that the government can police them-there can be no law requiring that internal communications be readable by the government! - and the revelations that Ultra Black has been used to read messages and use the information will be further proof to corporations that they need to adopt very strong security measures + and "partnerships" can be scattered across the country, and even internationally, and have great lattitude in setting up their own communication and encryption systems - recall Cargill case - and also remember that the government may crack down on these systems 16.28.4. AMIX-like services, new services, virtual reality (for games, entertainment, or just as a place of doing business) etc. + many users will encrypt their links to VR servers, with a decryption agent at the other end, so that their activities (characters, fantasies, purchases, etc.) cannot be monitored and logged + this will further increase the bandwidth of encrypted data and will complicate further the work of the NSA and similar agencies - attempts to force "in the clear" links will be doomed by the welter of PC standards, compression utilities, cellular modems, and the like...there will be no "cleartext" that can be mandated 16.28.5. steganography + in general, impossible to know that a message contains other encypted messages - except in stings and setups, which may be ruled illegal + the LSB method, and variants + LSB of DAT, DCC, MD, etc., or even sound bites (chunks of sampled sounds traded on bulletin boards) - especially of live or analog-dubbed copies (the noise floor of a typical consumer-grade mike is much higher than the LSB of DAT) + of images, Adobe Photoshop images, artwork, etc. + imagine an "Online Art Gallery" that is used to store messages, or a "Photo Gallery" that participants post their best photos to, offering them for sale - Sturges case - LSB method + gets into some theoretical nitpicking about the true nature of noise, especially if the entire LSB channel is uncharacteristic of "real noise" - but by reducing the bandwidth somewhat, the noise profile can be made essentially undistinguishable from real noise - and a 2 GB DAT produces 130 MB of LSB, which is a lot of margin! + what could the government do? - stings and setups to catch and scare off potential users - an attempt to limit the wide use of digital data-hopeless! + a requirement for government-approved "dithering"? - this would be an enforcement nightmare + and would only cause the system to be moved into higher bits - and with enough error correction, even audible dithering of the signal would not wipe out the encrypted signal + variants: text justification, word selection - bandwidth tends to be low - but used in Three Days of the Condor + virtual reality art may further enable private communications - think of what can be encrypted into such digital images! - and user has total privacy and is able to manipulate the images and databases locally 16.28.6. in the sense that these other things, such as the governments own networks of safe houses, false identities, and bootleg payoffs, will tend to hide any other such systems that emerge + because investigators may think they've stumbled onto yet another intelligence operation, or sting, or whatever - this routinely cripples undercover investigations - scenario: criminals even float rumors that another agency is doing an operation....? 16.28.7. Government Operations that Resemble Cryptoanarchy will Confuse the Issues - various confidential networks already exist, operated by State, DoD, the services, etc. + Witness Protection Program (or Witness Relocation Program) - false IDs, papers, transcripts - even money given to them (and the amounts seem to be downplayed in the press and on t.v., with a sudden spate of shows about how poorly they do in the middle of middle America-sounds like a planted story to me) - cooperation with certain companies and schools to assist in this aspect + Payoffs of informants, unofficial agents - like agents in place inside defense contractors - vast amount of tips from freelancers, foreign citizens, etc. - operators of safe houses (like Mrs. Furbershaw) + Networks of CIA-funded banks, for various purposes - a la the Nugan-Hand Bank, BCCI, etc. - First American, Bank of Atlanta, Centrust Savings, etc. - these banks and S&Ls act as conduits for controversial or secret operations, for temporary parking of funds, for the banking of profits, and even for the private retirement funds of agents (a winked-at practice) + Confidential networks over computer lines - e.g., encrypted teleconferencing of Jasons, PFIAB, etc. + these will increase, for many reasons - concerns over terrorism - demands on time will limit travel (especially for groups of non-fulltime committee members) - these suspected government operations will deter investigation 16.28.8. Encrypted Traffic Will Increase Dramatically - of all kinds - mail, images, proposals, faxes, etc. - acceptance of a P-K mail system will make wide use of encryption nearly automatic (though some fraction, perhaps the majority, will not even bother) + there may even be legal reasons for encryption to increase: - requirements that employee records be protected, that medical records be protected, etc. - "prudent man" rules about the theft of information (could mean that files are to be encrypted except when being worked on) - digital signatures - echoes of the COMSEC vs. SIGINT (or PROD) debate, where COMSEC wants to see more encryption (to protect American industry against Soviet and commercial espionage) + Selling of "Anonymous Mailers"? - using RSA + avoiding RSA and the P-K patent morass - could sell packets of one-time pads + no effective guarantee of security, but adequate for many simple purposes + especially if buyers swap them with others - but how to ensure that copies are not kept? - idea is to enable a kind of "Democracy Wall" + prepaid "coins," purchased anonymously - as with the Japanese phone cards - or the various toll booth electronic tokens being developed 16.28.9. Games, Religions, Legal Consultation, and Other "Covers" for the Introduction and Proliferation of Crypto Anarchy - won't be clear what is real encryption and what is game- playing - imagine a game called "Cryptoanarchy"! + Comment on these "Covers" - some of these will be quite legitimate, others will be deliberately set up as covers for the spread of CA methods - perhaps subsidized just to increase traffic (and encrypted traffic is already expected to increase for a variety of reasons) - people will have various reasons for wanting anonymity + Games + "Habitat"-style games and systems - with "handles" that are much more secure than at present (recall Chip's comments) + behaviors that are closely akin to real-world illegal behaviors: - a thieves area - an espionage game - a "democracy wall" in which anything can be posted anonymously, and read by all + MUDs (Multi-user Domains, Multi-User Dungeons) - lots of interest here - topic of discussion at a special Cypherpunks meeting, early 1994. + interactive role-playing games will provide cover for the spread of systems: pseudonyms will have much more protection than they now have - though various methods may exist to "tag" a transaction (a la barium), especially when lots of bandwidth is involved, for analysis (e.g., "Dark Dante" is identified by attaching specific bits to stream) + Dealing with Barium Tracers - code is allowed to simmer in an offsite machine for some time (and with twiddling of system clock) - mutations added + Shared Worlds - authors, artists, game-players, etc. may add to these worlds - hypertext links, reputation-based systems + hypothesize a "True Names" game on the nets, based _explicitly_ on Vinge's work - perhaps from an outfit like Steve Jackson Games, maker of similar role-playing games - with variable-resolution graphics (a la Habitat) - virtual reality capabilities + a game like "Habitat" can be used as a virtual Labyrinth, further confusing the line between reality and fantasy - and this could provide a lot of bandwidth for cover - the Smalltalk "Cryptoids" idea is related to this...it looks like a simulation or a game, but can be used by "outsiders" + Religions + a nearly ironclad system of liberties, though _some_ limits exist - e.g., a church that uses its organization to transport drugs or run a gambling operation would be shut down quickly (recall the drug church?) - and calls for tax-break limitations (which Bill of Rights says nothing about) - still, it will be _very_ difficult for the U.S. government to interfere with the communications of a "religion." + "ConfessionNet" + a hypothetical anonymous system that allows confessions to be heard, with all of the privileges of privacy that normal confessions have - successors to 900 numbers? + virtually ironclad protections against government interference - "Congress shall make no law..." + but governments may try to restrict who can do this, a la the restrictions in the 70s and 80s on "instant Reverends" - Kirby J. Hensley's Univeral Life Church - various IRS restrictions, effectively establishing two classes of religions: those grandfathered in and given tax breaks and the like, and those that were deemed invalid in some way + Scenario: A Scientology-like cult using CA as its chief communications system? - levels of initiation same as a cell system - "clearing" - New Age garbage: Ascended Masters, cells, money flowing back and forth - blackballing + Digital Personals - the "personals" section of newspapers currently requires the newspaper to provide the anonymity (until the parties mutually agree to meet) - what about on AMIX or similar services? - a fully digital system could allow self-arranging systems + here's how it could work: - Alice wants to meet a man. She writes up a typical ad, "SWF seeks SWM for fun and walks on the beach..." - Alice encloses her specially-selected public key, which is effectively her only name. This is probably a one- time deal, unlinkable to her in any way. - She encrypts the entire package and sends it through a remailing chain (or DC-Net) for eventual posting in a public place. - Everyone can download the relevant area (messages can be sorted by type, or organized in interest groups), with nobody else knowing which messages they're reading. - Bob reads her message and decides to repond. He digitizes a photo of himself and includes some other info, but not his real name. He also picks a public key for Alice to communicate with him. - Bob encrypts all of this with the public key of Alice (though remember that he has no way of knowing who she really is). - Bob sends this message through a remailing chain and it gets posted as an encrypted message addressed to the public key of Alice. Again, some organization can reduce the total bandwidth (e.g., an area for "Replies"). - Alice scans the replies and downloads a group of messages that includes the one she can see-and only she can see!-is addressed to her. - This has established a two-way communication path between Alice and Bob without either of them knowing who the other one is or where they live. (The business about the photos is of course not conducive to anonymity, but is consistent with the "Personals" mode.) - If Alice and Bob wish to meet in person it is then easy for them to communicate real phone numbers and the like. + Why is this interesting? - it establishes a role for anonymous systems - it could increase the bandwidth of such messages + Legal Services (Legitimate, i.e., not even the bootleg stuff) + protected by attorney-client privileges, but various Bar Associations may place limits on the use of networks - but if viewed the way phones are, seems unlikely that Bars could do much to limit the use of computer networks - and suppose a Nolo Press-type publishing venture started up on the Nets? (publishing self-help info under pseudonyms) - or the scam to avoid taxes by incorporating as a corporation or nonprofit? + Voting Systems - with and without anonymity + Board of Directors-type voting - with credentials, passwords, and (maybe) anonymity (under certain conditions) + Blackballing and Memberships - generally anonymous - blackballing may be illegal these days (concerns about racism, sexism, etc.) - cf. Salomaa for discussion of indistinguishability of blackballing from majority voting + Consumer Ratings and Evaluations - e.g., there may be "guaranteed anonymous" evalution systems for software and other high-tech items (Joe Bluecollar won't mess with computers and complicated voting systems) + Politically Active Groups May Have Anonymous Voting - to vote on group policies, procedures, leadership - or on boycott lists (recall the idea of the PC-Card that doesn't allow politically incorrect purchases) + this may be to protect themselves from lawsuits (SLAPP) and government harassment - they fear government infiltrators will get the names of voters and how they voted + Official Elections - though this is unlikely for the barely-literate majority - the inevitable fraud cases will get wide exposure and scare people and politicians off even more - unlikely in next decade + Journal Refereeing - some journals, such as Journal of Cryptology, appropriately enough, are already using paper-based versions of this + Xanadu-like systems may be early adopters - there are of course reasons for just the opposite: enhanced used of reputations - but in some cases anonymity may be preferred + Groupware - anonymous comment systems (picture a digital blackboard with anonymous remarks showing up) - these systems are promoted to encourage the quiet to have an equal voice - but they also provide another path to anonymous and/or reputation-based systems + Psychological Consultations - will require the licensing of counselors, of course (under U.S. laws) - what if people call offshore counselors? + and various limitations on privacy of records exist - Tarisoff [spelling?] - subpoenas - record-keeping required + may be used by various "politically correct" groups - battered women - abused children - perhaps in conjunction with the RU-486-type issues, some common ground can be established (a new kind of Underground Railroad) + Advice on Medicine (a la AIDS, RU 486) - anonymity needed to protect against lawsuits and seizure - NOW and other feminist groups could use crypto anarchy methods to reduce the risks to their organizations + Anonymous Tip Lines, Whistleblower Services + for example, a newspaper might set up a reward system, using the crypto equivalent of the "torn paper" key - where informant holds onto the torn off "key" - even something like the James Randi/Yuri Geller case reveals that "anonymous critics" may become more common + corporate and defense contractor whistleblowers may seek protection through crypto methods - a "Deep Throat" who uses bulletin boards to communicate with DS? + this presumes much wider use of computers and modems by "average" people...and I doubt "Prodigy"-type systems will support these activities! - but there may be cheap systems based on video game machines, a la the proposed Nintendo computers - environmentalists set up these whistleblower lines, for people to report illegal logging, spraying, etc. + Online, "Instant" Corporations + shell companies, duly incorporated in Delaware or wherever (perhaps even foreign sites) are "sold" to participants who wish to create a corporate cover for their activities - so that AMIX-like fees are part of the "internal accounting" + Anonymous collaborative writing and criticism - similar to anonymous voting 16.28.10. Compressed traffic will similarly increase - and many compression algortithms will offer some form of encryption as a freebie - and will be difficult to decypher, based just on sheer volume - files will have to at least be decompressed before key word searches can be done (though there may be shortcuts) 16.29.1. "We'd better hope that strong cypto, cheap telecoms and free markets can provide the organizing basis for a workable society because it is clear that coercion as an organizing principle ain't what it used to be." [Duncan Frissell, in his sig, 4-13-94] 16.29.2. "What is the "inevitability" argument?" - Often made by me (Tim May), Duncan Frissell, Sandy Sandfort, and Perry Metzger (with some twists). And Hal Finney takes issue with certain aspects and contributes incisive critiques. + Reasons: - borders becoming more transparent to data flow - encryption is not detectable/stoppable - derivative financial instruments, money sloshing across borders - transnationalism - cash machines, wire transfers - "permanent tourists" - Borders are becoming utterly transparent to massive data flows. The rapid export of crypto is but an ironic example of this. Mosaid, ftp, gopher, lynx...all cross borders fluidly and nearly untraceably. It is probably too late to stop these systems, short of "pulling the plug" on the Net, and this pulling the plug is simply too expensive to consider. (If the Feds ever really figure out the long- range implications of this stuff, they may try it...but probably not.) 16.29.3. "What is the "crypto phase change"?" - I'm normally skeptical of claims that a "singularity" is coming (nanotechnology being the usual place this is claimed, a la Vinge), but "phase changes" are more plausible. The effect of cheap printing was one such phase change, altering the connectivity of society and the dispersion of knowledge in a way that can best be described as a phase change. The effects of strong crypto, and the related ideas of digital cash, anonymous markets, etc., are likely to be similar. - transition - tipping factors, disgust by populace, runaway taxation + "leverage effect" - what Kelly called "the fax effect" - crypto use spreads, made more popular by common use - can nucleate in a small group...doesn't need mass acceptance 16.29.4. "Can crypto anarchy be stopped?" + A goal is to get crypto widely enough deployed that it cannot then be stopped - to the point of no return, where the cost of withdrawing or banning a technology is simply too high (not always a guaranteee) - The only recourse is a police state in which homes and businesses are randomly entered and searched, in which cryptography is outlawed and vigorously prosecuted, in which wiretaps, video surveillance, and other forms of surveillance are used aggressively, and in which perhaps the very possession of computers and modems is restricted. - Anything short of these police state tactics will allow the development of the ideas discussed here. To some extent. But enough to trigger the transition to a mostly crypto anarchic situation. - (This doesn't mean everyone, or even most, will use crypto anarchy.) 16.29.5. Need not be a universal or even popular trend - even if restricted to a minority, can be very influential - George Soros, Quantum fund, central banks, Spain, Britain, Germany - and a minority trend can affect others 16.29.6. "National borders are just speedbumps on the digital superhighway." 16.29.7. "Does crypto anarchy have to be a mass movement to succeed?" - Given that only a tiny fraction is now aware of the implications.... + Precedents for "vanguard" movements + high finance in general is an elite thing - Eurodollars, interest rate swaps, etc....not exactly Joe Average...and yet of incredible importance (George Soros has affected European central bank policy) - smuggling is in general not a mass thing - etc. + Thus, the users of crypto anarchic tools and instruments can have an effect out of proportion to their numbers - others will start to use - resentment by the "suckers" will build - the services themselves--the data havens, the credit registries, the espionage markets--will of course have a real effect 16.29.8. Strong crypto does not mean the end to law enforcement - "...cryptography is not by any means a magic shield for criminals. It eliminates, perhaps, one avenue by which crimes might be discovered. However, it is most certainly not the case that someone who places an open anonymous contract for a murder in an open forum is doing so "risk free". There are *plenty* of ways she might be found out. Likewise, big secret societies that nefariously undermine the free world via cryptography are as vulnerable as ever to the motivations of their own members to expose the groups in a double-cross." [Mike McNally, 1994-09-09] 16.30.1. governments may try to ban the use of encryption in any broadcast system, no matter how low the power, because of a realization that all of them can be used for crypto anarchy and espionage - a losing battle, of course, what with wireless LANs of several flavors, cellular modems, the ability to hide information, and just the huge increase in bandwidth 16.30.2. "tontines" - Eric Hughes wrote up some stuff on this in 1992 [try to get it] - Italian pseudo-insurance arrangements - "digital tontines"? 16.30.3. Even in market anarchies, there are times when a top-down, enforced set of behaviors is desirable. However, instead of being enforced by threat of violence, the market itself enforces a standard. - For example, the Macintosh OS, with standardized commands that program developers are "encouraged" to use. Deviations are obviously allowed, but the market tends to punish such deviations. (This has been useful in avoiding modal software, where the same keystroke sequence might save a file in one program and erase it in another. Sadly, the complexity of modern software has outpaced the Mac OS system, so that Command-Option Y often does different things in different programs.) - Market standards are a noncoercive counter to total chaos. 16.30.4. Of course, nothing stops people from hiring financial advisors, lawyers, and even "Protectors" to shield them from the predations of others. Widows and orphans could choose conservative conservators, while young turks could choose to go it alone. 16.30.5. on who can tolerate crypto anarchy - Not much different here from how things have been in the past. Caveat emptor. Look out for Number One. Beware of snake oil. 16.30.6. Local enforcement of rules rather than global rules + e.g., flooding of Usenet with advertising and chain letters + two main approaches - ban such things, or set quotas, global acceptable use policies, etc. (or use tort law to prosecute & collect damages) - local carrriers decide what they will and will not carry, and how much they'll charge - it's the old rationing vs. market pricing argument 16.30.7. Locality is a powerful concept - self-responsibility - who better to make decisions than those affected? - tighter feedback loops - avoids large-scale governments + Nonlocally-arranged systems often result in calls to stop "hogging" of resources, and general rancor and envy + water consumption is the best example: anybody seen "wasting" water, regardless of their conservations elsewhere or there priorities, is chastised and rebuked. Sometimes the water police are called. - the costs involved (perhaps a few pennies worth of water, to wash a car or water some roses) are often trivial...meanwhile, billions of acre-feet of water are sold far below cost to farmers who grow monsoon crops like rice in the California desert - this hypocrisy is high on my list of reasons why free markets are morally preferable to rationing-based systems