|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: |
|
|
|
Key Recovery Systems As stated before the sense of cryptography is a properly designed cryptosystem making it essentially impossible to recover encrypted data without any knowledge of the used key. The issue of lost keys and the being-locked-out from one's own data as a consequence favors key recovery systems. On the other hand the counter argument is confidentiality: as soon as a possibility to recover a key is provided, the chances for abuses grow. Finally it is the state that does not want to provide too much secrecy. On the contrary. During the last 20 years endless discussions about the state's necessity and right to restrict private cryptography have taken place, as the governments rarely care for the benefit of private users if they believe in catching essential informations about any kind of enemy, hence looking for unrestricted access to all keys. The list of "key recovery," "key escrow," and "trusted third-party" as encryption requirements, suggested by governmental agencies, covers all the latest developments and inventions in digital technology. At the same time the NSA, one of the world's most advanced and most secret enterprises for cryptography, worked hard in getting laws through to forbid the private use of strong encryption in one way or the other. Still, it is also organizations like this one that have to admit that key recovery systems are not without any weaknesses, as the U.S. Escrowed Encryption Standard, the basis for the famous and controversially discussed Clipper Chip, showed. The reason for those weaknesses is the high complexity of those systems. Another aspect is that key recovery systems are more expensive and certainly much less secure than other systems. So, why should anyone use them? In that context, one has to understand the legal framework for the use of cryptography, a strict framework in fact, being in high contradiction to the globalised flow of communication. |
|
|
|
The Catholic Church In the beginnings of Christianity most people were illiterate. Therefore the Bible had to be transformed into pictures and symbols; and not only the stories but also the moral duties of everybody. Images and legends of the Saints turned out as useful models for human behavior - easy to tell and easy to understand. Later, when the crusades began, the Christian Church used propaganda against Muslims, creating pictures of evil, pagan and bloodcurdling people. While the knights and others were fighting abroad, people in Europe were told to pray for them. Daily life was connected to the crusades, also through money-collections - more for the cause of propaganda than for the need of money. During the period of the Counter-Reformation Catholic propaganda no longer was against foreigners but turned against people at home - the Protestants; and against their publications/books, which got prohibited by starting the so-called index. By then both sides were using disinformation for |
|
|
|
New World Order |
|
|
|
Federal Networking Council Being an organization established in the name of the US government, the Federal Networking Council (FNC) acts as a forum for networking collaborations among Federal agencies to meet their research, education, and operational mission goals and to bridge the gap between the advanced networking technologies being developed by research FNC agencies and the ultimate acquisition of mature version of these technologies from the commercial sector. Its members are representatives of agencies as the National Security Agency, the Department of Energy, the http://www.fnc.gov |
|
|
|
Internet Relay Chat (IRC) IRC is a text-based chat system used for live discussions of groups. For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, |
|
|