The Internet and the State
Fall 2002
Part 4: Anonymity and Identification
1. Cryptography as a Threat to the State
Reading
-
Statement of Louis J.
Freeh,
Director of the Federal Bureau of Investigation, Before the Senate Committee
on Judiciary Subcommittee for the Technology, Terrorism, and Government
Information, on Cybercrime (March 28, 2000);
Declan McCullagh, Former FBI chief takes on encryption, CNET News.com (Oct. 14, 2002)
-
Froomkin, The
Metaphor is the Key: Cryptography, the Courts, and the Constitution,
143 Penn. L. Rev. 709 (1995), §§ I.A, I.C.2(a)&(b), III &
IV.B
-
Froomkin, It
Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow",
1996 U. Chi. L. Forum 15, §§ III B & C.
-
Anonymous, Introduction
to Blacknet
-
Orin S. Kerr, The Fourth Amendment in Cyberspace: Can Encryption
Create a "Reasonable Expectation of Privacy?", 33 Conn. L. Rev. 503 (2001)
(on Westlaw)
-
Junger v. Daley, 209
F.3d 481 (6th Cir. 2000)
-
Kyllo v. United States, -- U.S. -- (No.99-8508 June
11, 2001). Majority
opinion. Dissenting
opinion.
-
Carrie Kirby, New
Encryption laws for e-mail unlikely (Oct. 6, 2001)
Thinking
-
Which of the following are First Amendment "speech"
-
a message encrypted in a code no one remembers
-
ancient hieroglyphics
-
modern art
-
the source code for cryptographic software
-
a paper piano roll in a player piano
-
a list of random numbers
-
a program (compiled) for cryptographic software
-
an encrypted message
-
a gun
-
a nuclear bomb
-
blueprints for a gun
-
blueprints for a nucelar bomb
-
instructions on how to build a nuclear bomb in rhyming couplets set to
music
-
What meaning does a 'reasonable expectation of privacy' have as technology
changes?
-
What limits can the US government impose on the use of cryptography in
peacetime? In wartime?
-
How dangerous is cryptography in the wrong hands?
-
Can it be kept out of the wrong hands? How?
-
If cryptography cannot be kept out of the wrong hands, what policies can
nations adopt to minimize illicit uses short of an outright ban?
Optional
-
Bernstein v. United States, 176
F.3d 1132 (9th Cir. 1999) [note that this opinion was withdrawn by
Bernstein v. U.S. Dept. of Justice, 192 F.3d 1308 (1999), which granted
a rehearing en banc; the matter was subsequently remanded to the district
court for further proceedings in which the government basically said it doesn't intend to enforce the regulations against people like Bernstein]
- D.J. Bernstein, Bernstein v. United States web site
-
Eben Moglen, So
Much For Savages (1999)
-
Dam, Kenneth and Lin, Herbert (Eds), Executive
Summary of the CRISIS Report
-
Hal Abelson et al, The Risks
of Key Recovery, Key Escrow & Trusted Third Party Encryption (1998)
-
Peter Lewis, On the Net
(Sept. 11, 1995)
-
Tim C. May, The
Crypto Anarchist Manifesto,
-
Report of the President's Working Group on Unlawful Conduct on the Internet,
The
Electronic Frontier: The Challenge of Unlawful Conduct Involving Use of
the Internet
-
Bruce Sterling, The
Hacker Crackdown (1994),
-
John Gilmore, Re:
PERL/RSA t-shirts for Americans only (June 6, 1995)
-
Dave Touretzky, How
to decrypt a DVD: in haiku form (2001)
-
Highly recommended: Don't Eat Pete, D-e-C-S-S
(descramble) (.mp3) (big file, be very patient)
2. Anonymity Control (part 1)
Reading
-
Froomkin, Part II.A of Flood
Control on the Information Ocean: Living With Anonymity, Digital Cash,
and Distributed Databases
-
Froomkin, Legal Issues in Anonymity and Pseudonymity, 15 The Information
Society 113 (1999). [This document is not available online, but a more
dated treatment of the same topic can be found in parts II.B of Froomkin,
Flood
Control on the Information Ocean: Living With Anonymity, Digital Cash,
and Distributed Databases ]
-
Stefanie Olsen, Nearly
undetectable tracking device raises concern (July 12, 2000)
-
McIntyre
v. Ohio Elections Commission, 514 U.S. 334 (1995).
-
Urofsky v. Gilmore, 216
F.3d 401 (4th Cir. 2000). (An easier to read version, lacking a few
corrections, is here).
-
Julie E. Cohen, A Right to Read Anonymously: A Closer look at
"Copyright Management" in Cyberspace, 28 Conn. L. Rev. 981 (1996).
.pdf
or ugly text
version. pp. 1-19 & 30-51
-
Eric Friedman and Paul Resnick, The
Social Cost of Cheap Pseudonyms (Aug. 17, 2000) (.pdf), pp. 1-7 &
22
Thinking
-
Even if the First Amendment allows it, in light of the Dormant Commerce
Clause can states legislate against anonymity?
-
Imagine your client wants to run an anonymous remailer. Are there
any civil or criminal liaibility issues you might wish to warn your client
about?
-
Your client has read about Haven Co and thinks it's the perfect place to
locate his anonymous remailer. Does that resolve any of your concerns?
Optional
-
O'Connor v. Ortega, 480
U.S. 709 (1987)
-
Claudia Rocio Vasquez R., Columbia
Orders Control of All Pre-Paid Call Cards (Aug. 17, 2000 )(Use the
babelfish
translator if you don't read Spanish)
-
Altern.org, Loi sur la liberté
de communication, 28 juin 2000 (In French, but there's always babelfish)
-
Declan McCullagh, The
Wrong Way to Do Dirty Tricks (June 16, 2001)
-
PGP
-
Freeware int'l PGP: http://www.pgpi.org/
-
The original PGP rant (by Phil Zimmerman): http://www.pgpi.org/doc/whypgp/en/
-
PGP FAQ Pages:
-
http://cryptography.org/getpgp.htm
-
http://www.andrebacard.com/pgp.html
-
http://web.bham.ac.uk/N.M.Queen/pgp/pgp.html
-
A good modern PGP rant: http://www.geocities.com/SiliconValley/Bay/9648/pgp2000-eng.html
3 . Anonymity Control (continued)
Reading
-
IDing Consumers
-
Roger Clarke, Identification,
Anonymity and Pseudonymity in Consumer Transactions: A Vital Systems Design
and Public Policy Issue
-
Edgar Bronfman, Jr, Remarks
(May 26, 2000).
-
18
USC 2701
-
In
re Doubleclick Inc Privacy Litigation., 154 F.Supp.2d 497 (S.D.N.Y.,
2001).
-
IDing Speakers
- David L. Sobel, The Process that
"John Doe" Is Due: Addressing the Legal Challenge to Internet
Anonymity, 5 Va. J.L. & Tech. 3 (2000).
-
Doe
v. 2themart.com Inc., 140 F. Supp. 2d 1088 (W. D. Wash. 2001).
-
Anderson v. Hale, 2001
WL 503045,
2001 U.S. Dist. LEXIS 6127, 49 Fed.R.Serv.3d 364 (N.D. Ill. May 10,
2001)
-
In re Subpoena Duces Tecum
to America Online, Inc., 2000 WL 1210372 (Va.Cir.Ct.,2000).
-
Stephen K. Gielda, Church of the Swimming Elephant, What
it is like behind Cotse? (June 5, 2001)
- Data Trails: John Leyden, EU to force ISPs and telcos to retain data for one year (Aug. 20, 2002)
- National ID Cards? Froomkin,The
Uneasy Case for National ID Cards as a Means to Enhance Privacy (draft)
Thinking
-
I've argued in several articles that anonymity/pseudonymity is the only
form of self-help available to individuals who wish to protect themselves
against data profiling -- the aggregation of facts about them in databases
that can then be used for marketing and other purposes. Other people
have replied that if that's right, privacy is as good as dead, because
anonymity/pseudonymity is of little practical value to most honest people
most of the time. Your thoughts?
- Please feel encouraged to bash holes in my ID cards article.
Optional
To Part
1 Part
2 Part
3 Part
4 Part
5
To Syllabus
Index
To Class
Policies
Last updated Oct. 28, 2002