JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for GP-UK Archives


GP-UK Archives

GP-UK Archives


GP-UK@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

GP-UK Home

GP-UK Home

GP-UK  1996

GP-UK 1996

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Alert - attack on GP email traffic

From:

Ross Anderson <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Tue, 02 Jul 1996 09:43:17 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (202 lines)

I append a note of the IEE meeting at which the government announced
its intention to force `Trusted Third Parties' to supply decryption
keys surreptitiously to the security services on demand. Those who
have followed the medical crypto debate will recall that the
government now propose to make the GMC the `Trusted Third Party' for
the medical profession.

I can't think of a better way to erode the trust that patients and
doctors currently have in the GMC than to turn it into a licensed
agent of state snooping. Cui bono?

Anyway, this note was posted to sci.crypt and other relevant
newsgroups on Friday, 28th June.

Ross

**************************************************************************



I went to the meeting organised at the IEE yesterday on the UK
`Trusted Third Party' proposals. One of the speakers, Nigel Hickson of
the DTI, confirmed that escrowing of confidentiality keys would be
mandatory. He also claimed that an OECD expert group was working on
`global crypto guidelines', and made clear that the controls would
focus on small-to medium enterprises and individuals rather than on
large companies.

It was a most extraordinary meeting, and showed up GCHQ in a rather
poor light. The introductory talk was given by Andrew Saunders,
advertised as head of CESG (GCHQ's protection arm) since 1991 and a
GCHQ board member. He remarked that the debate on encryption had been
acrimonious, especially in the USA, but that now technology made
possible a compromise in the form of `Trusted Third Parties' which
would supply a key delivery service and a key recovery service for
both users and law enforcement authorities.

I asked him whether his department had advised ministers that it was
all right to release the April report on encryption in the NHS network
(which floated the TTP idea), or had at least had sight of it before
its release. He claimed to have no knowledge of whether his agency had
seen it.

After a talk on the common criteria by Murray Donaldson of the
Ministry of Defence, Saunders left, and we were addressed by a man
introduced as Paul Fleury, head of the information systems security
group at the security service. He was claimed to have been with MI5
for 18 years, and in his current post for 5; and to head a team of 9
people responsible for the overall UK threat assessment (with
technical input from GCHQ), as well as for managing CRAMM and running
UNIRAS (the UK government equivalent of CERT).

Strangely enough for such a senior and responsible person, his name did
not appear on the programme, and in the list of participants he appears
only as `UNIRAS SPEAKER, Security Service, PO Box 5656, London EC1A 1AH'
(so now you know - but why did he turn up with slides that had his name
on them and yet not write his name in the attendance register?)

His talk contained little to surprise, with statistics on viruses,
equipment thefts and hacking. He did mention that 98% of the 873 hacking
incidents in 1994/5 were abuse of access by insiders rather than
external attack.

The third talk was by Elizabeth France, the Data Protection Registrar,
who expressed amusement at my having ironically referred to her (along
with the other speakers) as `one of the forces of darkness' when I
relayed notice of the meeting to the net. She proceeded to blaze with
light; she argued that the national security exemptions to data
protection law should be curtailed, and could see no reason why the
security service should not have to register along with everybody
else. She also pleaded for the wider use of privacy enhancing
technologies, such as the use of pseudonyms in medical databases.

Next was John Austen of the Yard, who pointed out that company
directors can get ten years' jail if one of their employees has
kiddieporn on a company server, since under the Children and Young
Persons Act simple possession is an offence. Then Bob Hill of the MoD
talked about the SOS-TDP project to provide security interfaces in
Microsoft, Novell and DEC products, linked with Northern Telecom's
`Enterprise Security Toolkit'; David Ferbrache of DRA talked about
security threats from the Internet; John Hughes of TIS about
firewalls; and Alex McIntosh of PCSL about how his company built a
crypto infrastructure for Shell and got government approval for it.

The threat model depicted in these talks was remote from reality. For
example, it was categorically stated that most thefts of PCs are for
the information in them, rather than the resale value of the machine
or its components. False - over 11% of UK general practitioners have
experienced theft of a practice PC, yet there is only one case known
to the BMA in which the information was abused.  Another example was
the numbers put on various threats: satellite TV hacking was said to
cost 300,000 pounds a year (according to News Datacom at Cardis 94,
that should be 200,000,000) while other risks were wildly inflated.

Bob Morris, the former NSA chief scientist, is fond of asking security
researchers, `Do you consider yourself to be more dishonest, or more
incompetent?' Well, does GCHQ know that the threat model presented at
their meeting is wrong, or don't they?

Anyway, Alex McIntosh's talk brought matters back to crypto policy
when he explained that following UK and US government approval of a
corporate security architecture designed for Shell, Fortune 500
companies would be trusted to manage their own keys. The explanation is
that they have so much to lose that they will be responsive to warrants
and subpoenas. (The doctrine of equality of persons before the law was
not, of course, mentioned.)

The final speaker was Nigel Hickson from the DTI. The excuse given for
his late arrival ws that he had been in France with the OECD and had
been discussing crypto policy for three days. He looked somewhat junior
but was said to co-chair the ITSEC scheme with CESG and to be one of a
group of five people in DTI responsible for information security policy.

In the introduction to his talk, he picked up on Alex's remarks about
Shell and stated that the motivation for the DTI's involvement was
that while `large firms will crack security', it would be an
inhibiting factor for small-to-medium firms and individuals, and would
prevent them participating in commerce on the Internet (this seemed to
clash with the policy announcement that corporate encryption would be
regulated but private would not be).

He then quite blatantly waffled until his time was almost up before
getting to the reason most people had come to the meeting, namely the
DTI announcement of its intent to regulate `Trusted Third Parties'. My
notes on his words are as follows:

 Why the UK announcement? Many reasons, some of which are highlighted in
 the public statement. The primary reason is that to secure electronic
 commerce people will need access to strong crypto, and if this is serious
 then government will have to look at what systems are `appropriate'. The
 UK government has spent a lot of time discussing the essential balance.
 Continued law enforcement access is required along the lines of the
 Interception of Communications Act. The government has `obviously' looked
 at TTPs and at `elements of key escrow'. There was no mention of national
 intelligence requirements.

 Policy framework for the provision of encryption services:

 1	No new controls on the use of encryption, such as types of
	algorithm. The introduction of trusted third parties will be
	on a voluntary basis;

 2	Licensing of TTPs will be on (a) competence (b) ability to
	provide a service (c) cooperation with government under
	conditions of warranted interception;

 3	International working will be the essential vehicle to drive it
	- first in Europe and then in a wider field.

 Legislation later this year is possible. The EU is working on a `second
 infosec decision' to promote TTPs in Europe. The OECD expert group is
 working on global crypto guidelines.

By the time he had finished this short exposition, he had run over the
advertised time of 4.15, eating well into the fifteen minutes that the
programme had allocated for discussion. There were only a few questions:
Paul Leyland managed to ask whether it would be mandatory for
confidentiality keys to be escrowed, and Hickson said yes.

Just as the questions were starting to flow, the chairman - advertised
as Mr DJ Robertson, Ministry of Defence - declared the meeting closed. I
objected; I pointed out that there were plenty of people with questions,
and that the government's attempts to sell their proposal would not be
aided by such blatant news management, which would surely be reported. He
said that we absolutely had to be out of the room by half past four - the
time then - and overruled me, remarking that the Universities of Oxford
and Cambridge had asked quite enough questions.

Then a large gentleman came up to me and said that he hoped my remark
about publicising their news management had been made in jest. I told him
that it was not, and he became menacing. He said that the meeting was
held under IEE rules and seemed taken aback when I stood my ground and
told him I was a member. He then said that he was also a graduate of
Cambridge and that he would write to very senior people in the University
about me. Good luck to him. Although he wouldn't give me his name, his
lapel badge said `B Buxton' and the attendance register lists a Bill
Buxton, Parity Solutions Ltd., Wimbledon Bridge House, 1 Hartford Road,
Wimbledon SW19 3RU.

After the meeting, we milled around, to the evident discomfiture of the
man advertised as Robertson. Finally, at almost five o'clock, an IEE
lady turned up while there were still a few of us in the corridor. He
asked her to see us off the premises, at which she smiled and asked
whether we knew our way out. When I said yes, she said 'that's all right
then' and went off. The man advertised as Robertson scuttled away without
meeting my eye.

As Bob would ask, incompetence or dishonesty? Well, I didn't get the
impression that our spooks are even competent at being dishonest.

Ross Anderson









%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

March 2024
October 2023
August 2023
June 2023
May 2023
February 2023
June 2022
October 2021
January 2021
October 2020
September 2020
August 2020
July 2020
June 2020
March 2020
January 2020
December 2019
September 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager