CSS controls all US Signal Intelligence ( SIGINT )
budget in excess of US $ 30 billion ( 1998 27 billion )
beyond democratic control
ECHELON Report
On Sept. 05th, 2001, G. Schmid, rapporteur of the Temporary Committee on the ECHELON Interception System, presented his report to the European Parliament.
„The existence of a global system for intercepting communications, operated by) the USA, the UK, Canada, Australia and New Zealand under the UKUSA Agreement, is no longer in doubt.“
ECHELON Site
Misawa, Japan
FAPSI
Federalnoje Agenstwo Prawitelstwennoj Swjasi i Informazij
tasked, inter alia, with economic-technological espionage
ground-stations only in CIS, except Socotra Island, Yemen
SIGINT aircraft ( four outside-CIS bases ) and ships
service provider to western industry
FAPSI
DGSE
Direction Générale de la Sécurité Extérieure operates
To protect information we need national cryptology solutions not under control of the “big spy nations”.
Is this really the solution ?
If yes, how far ?
Export Controls
The Waasenaar Arrangement of 1995, to which Luxembourg is a signatory, imposes export control on systems, equipment and components using the following (either directly or after modification):
symmetric algorithm using a key longer than 56 bits; or
a public-key algorithm, in which the security of the algorithm is based on one of the following:
(1) the factorisation of integers higher than 512 bits (e.g. RSA),
(2) discrete log computations in the multiplicative group of a finite
field larger than 512 bits,
(3) discrete log computations in a group other than those mentioned above, and which is larger than 112 bits.
D R Kongo, Lebanon, Liberia, Libya, Mynamar (Burma), Nigeria, North Korea, PRC (except Hong Kong), Ruanda, Sierra Leone, Somalia, Sudan, Syria, Tansania, Uganda.
Crypto Policy – GLIC* Report 1998
A survey yielded 76 responses:
30 Green ( no restrictions )
19 Green / Yellow ( no restrictions, but respect Waasenaar Arrangement )
12 Yellow ( domestic controls plus Waasenaar Arrangement )
3 Yellow / Red
1 Red / Yellow
6 Red ( tight controls )
5 Unknown / no Response
* Global Internet Liberty Campaign
Key Management Infrastructure ( KMI )
A large ( unknown ) number of countries requires national KMI.
NSA still requires world-wide KMI under their control.
Access to keys by national authorities based on applicable national and international law.
Governments‘ respect of national and international law ranges from „flexible“ to non-existent; under „anti-terrorism“ everything goes.
Key Escrow
Governments need to fight crime – access to key escrow is understood.
Nobody really knows who actually will have access.
No western government can resist the „friendly approach“ of the NSA for access.