-Caveat Lector- from alt.politics.org.cia ----- As always, Caveat Lector. Om K ----- <A HREF="aol://5863:126/alt.politics.org.cia:40686">New CIA Documents On Clinton Crypto Scandal</A> ----- Subject: New CIA Documents On Clinton Crypto Scandal From: [EMAIL PROTECTED] Date: Tue, Dec 15, 1998 3:01 AM Message-id: <755fi7$tqf$[EMAIL PROTECTED]> http://www.worldnetdaily.com/bluesky_smith/19981215_xcsof_give_it_to.shtml The CIA has released new documents written in 1996 showing Vice President Al Gore ordered the CIA to enforce strict controls on mass market security software for personal computers. The documents were discovered at the Department of Commerce and were released by the CIA in response to a Freedom of Information (FOIA) request. The CIA documents are two memos written by CIA Director John Deutch to President Clinton and Vice President Al Gore. The CIA reports detail Federal government efforts to monitor computer communications such as email, using a technique to secretly intercept and decode any messages. According to the CIA Director, the back-door keys were to be held by "key recovery agents" licensed by the Commerce Department. According to one document, a memo written by CIA Director Deutch, Gore ordered the CIA to tell the Commerce Department to take a "tougher approach to licensing." The memo states Gore ordered the CIA to "tighten the control regime for encryption products that do not support key recovery." Janet Reno, according to Deutch, took a much harder line, supporting an all out Federal take-over of the industry. The Justice Department, proposed "legislation that would ... ban the import and domestic manufacture, sale or distribution of encryption that does not have key recovery." The CIA Director, backed by the Commerce Department, rejected the Reno proposals in favor of a so called "middle of the road approach." According to the CIA, "We have rejected the policy option of mandatory control because we believe legislation to ban use of encryption in private communications will not be adopted here or abroad, notably in Germany and Japan." The memos include the CIA Director's blank copy of a Presidential executive order that was later signed by President Clinton in November, 1996. The CIA written executive order transferred control of encryption technology to the Commerce Department. The order transferred authority for both mass media software and formerly military items such as radios, and satellite telemetry systems hardened against atomic warfare. Mass media encryption software is freely available over the Internet and sold in retail outlets. There are currently NO domestic regulations covering the private or business use of security software in the United States. The software is used to protect medical, financial and personal information. The Clinton administration considers such PC software to be a threat. Law enforcement claims encryption technology could be used by criminals and terrorists. The Clinton administration considers mass market software a "munition" and strictly controls exports with felony charges backed by the Department of Justice. Clinton's plan was to force U.S. computer makers to build back-doors into their products in order to obtain an export license. The CIA Director wrote to Clinton, "Our principle lever is exports controls, which can influence industry because it seeks to develop products that work worldwide. Thus, our proposal would ease export controls in exchange for industry commitment to build key recovery products and supporting infrastructure." Clearly, the Clinton administration was aware of the futile operation to control PC software available in the retail market. The CIA report detailing the imposition of strict controls contradicts an earlier May, 1996, Commerce Department document. The May 1996 Commerce document details a meeting with the CIA, FBI and Department of Justice. The document states "Efforts to maintain tight controls on encryption in the 'Internet age' lack credibility, threaten to impose real costs on U.S. industry and, its competitiveness, and are becoming a political embarrassment for the Administration." According to the 1996 Commerce document, "Lost in the debate, but not irrelevant, is the fact that it is virtually impossible to enforce export control's against them when they can be exported by phone and modem or/in someone's pocket." Clearly, it is far easier to control multi-million dollar military grade items than low cost PC software. Rare or hard to build electronics such as radiation hardened, encrypted, telemetry control for satellites, are not available to the general public nor would they be of much use. Military communications, such as secure satellite control systems, are built to withstand the intense radiation of space or nuclear warfare. There is no doubt that the Chinese military sought such items for their strategic nuclear forces. For example, in February 1996, a Chinese Long March rocket crashed with a high tech Loral Intelsat satellite, killing 200 civilians. U.S. investigators discovered that a hardened telemetry control board was removed from the crashed Loral satellite. Clinton authorized exports of military encrypted communications and satellite telemetry to the communist Chinese. In July 1996, Clinton signed a waiver for Loral to export a fully operational, encrypted, satellite control station to Beijing. According to the GAO, Clinton authorized the direct export of an encrypted air-defense communications system directly to the Chinese Air Force. Clinton's signature was sought by Loral's competitors as well. For example, Motorola wrote the State Department in November, 1994, requesting to export encrypted radios to China. The Motorola letter clearly notes that Bill Clinton was signing waivers for other American companies. The 1994 Motorola letter states "This is to request that your office initiate action to obtain a waiver from requirement for individual export license notifications to Congress for wireless mobile communications systems containing encryption for China. Such a waiver was issued by the President in September of this year for civilian satellite systems and encrypted products for use by American firms operating in China." Law enforcement and intelligence agencies are directly responsible for our national security. U.S. intelligence and federal law enforcement officials often pride themselves as being the prime defense against espionage and terrorism. The FBI an NSA are responsible for military grade exports. They have the oversight and the power to prevent exports of multi-million dollar satellites and other military equipment to communist China. The FBI and the NSA failed America. While overlooking Bill Clinton signing waiver after waiver for exports of military hardware to China - the NSA and FBI decided to go after American citizens. Yet, the FBI and the NSA are NOT responsible for the millions of personal and business computers in America. Government agencies offer no protection from hackers or virus attacks. The FBI and the NSA are NOT the first line of American digital defense. The American computer industry established a vast array of anti-virus software and hardware to fight malicious software threats. The same should follow for mass market encryption software which keeps hackers out of unauthorized data. However, the Clinton policy takes jobs away from America engineers and passes them overseas. According to a November 1998 report from the CATO Institute, "The next generation of advanced encryption technology for e-mail or real-time communications is unlikely to be developed within the United States... As long as export controls are maintained, jobs, capital and profits will leave the United States as technology companies set up operations elsewhere." Bill Clinton and Al Gore insist on controlling domestic mass media and business computer security. They are hurting American security. Their policy costs lives and money. It helps the terrorists, criminals and hackers penetrate vital computer systems that control banking, communications and electric power. In addition, Bill Clinton used government policy to black-mail American businesses seeking export licenses. Clinton used his office for extortion, selling the secrets of our military communications to enrich himself and remain in power. The 1998 CATO Institute report calls American encryption policy an "albatross" around Clinton's neck. The new report released by the CIA shows the Clinton encryption policy was no "albatross". The encryption policy was a "cash cow", feeding Chinese Army money directly into Bill Clinton's 1996 re-election campaign. ================================================================ New Document from the CIA http://www.softwar.net/cia.html ================================================================ 1 if by land, 2 if by sea. Paul Revere - encryption 1775 Charles R. Smith SOFTWAR http://www.softwar.net [EMAIL PROTECTED] Pcyphered SIGNATURE: 5EC96FBAEE6CB446494FF6DFF2CB482D71234461F57F027D5D8D87B99B98CB38 A1145ADAD2024386FF3D0B80FDE0C8BEA3F4B616E604A9BC3E8F6385756003E0 ED3A62725CC69CEC ================================================================ SOFTWAR EMAIL NEWSLETTER 12/15/1998 *** to unsubscribe reply with "unsubscribe" as subject *** ================================================================ -----------== Posted via Deja News, The Discussion Network ==---------- http://www.dejanews.com/ Search, Read, Discuss, or Start Your Own ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, Omnia Bona Bonis, All My Relations. Adieu, Adios, Aloha. Amen. Roads End Kris DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om