Hack Liberty Forum Archive

Static Archive of forum.hackliberty.org

Download as .zip Download as .tar.gz View on GitHub

Mining the Cyphernomicon for Gold: Quotes and Notes

Post #1 • c0mmando Created: 2025-02-10 18:08 Updated: 2025-02-10 18:08

Quotes

“Freedom is, practically, given as much (or more) by the tools we can build to protect it, as it is by our ability to convince others who violently disagree with us not to attack us. On the Internet we have tools like anon remailers and PGP that give us a great deal of freedom from coercion even in the midst of censors. Thus, these tools piss off fans of centralized information control, the defenders of the status quo, like nothing else on the Internet.”

“If I withhold my capital from some country or enterprise I am not threatening to kill anyone. When a “Democratic State” decides to do something, it does so with armed men. If you don’t obey, they tend to shoot… If technological change enhances the powers of individuals, their power is enhanced no matter what the government does.”

“If the collective is weakened and the individual strengthened by the fact that I have the power of cheap guns, cars, computers, telecoms, and crypto then the collective has been weakened and we should ease the transition to a society based on voluntary rather than coerced interaction. Unless you can figure out a new, improved way of controlling others; you have no choice.”

” it’s very hard to coordinate dozens of free-thinking, opinionated, smart people, especially when there’s no whip hand, no financial incentive, no way to force them into line”

The changes I want won’t come through a series of ads that are just fingers in the dike. (More cynically, Americans are getting the government they’ve been squealing for. My interest is in bypassing their avarice and repression, not in changing their minds.)”


11.3.4. “Why would the government monitor my communications?”

“Because of economics and political stability… You can build computers and monitoring devices in secret, deploy them in secret, and listen to everything. To listen to everything with bludgeons and pharmaceuticals would not only cost more in labor and equipment, but also engender a radicalizing backlash to an actual police state.”
Eric Hughes, 1994-01-26

Systems like Digital Telephony and Clipper make it much too easy for governments to routinely monitor their citizens, using automated technology that requires drastically less human involvement than previous police states required.

11.3.5. “How much surveillance is actually being done today?”

FBI and Law Enforcement Surveillance Activities

NSA and Security Agency Surveillance Activities

MINARET

Revelations following the Pentagon Papers security leak had picked up private communications related to the Papers. This was late 1963, early 1964, around the time UB was going. The main antenna system for intercepting ASCII from un-TEMPESTed terminals and PCs can pick up signals through walls up to a foot thick (or more, considering how such impulses bounce around).

Joint FBI/NSA Surveillance Activities

Key Meetings and Developments

Plot Twist

This may have motivated NSA and UB/Severn to pursue other avenues, such as the use of criminals as cutouts, paralleling the “Plumbers Unit” used by the White House.

10/1/73

AG Elliot Richardson orders FBI and SS to stop requesting NSA surveillance material. NSA agreed to stop providing this but didn’t inform Richardson about Shamrock or Minaret. Events of this year marked the end of Minaret.

3/4/77

The Justice Department recommends against prosecution of any NSA or FBI personnel over Operations Shamrock and Minaret, deciding that NSCID No. 9 (aka No. 6) gave NSA sufficient leeway.

Operation Shamrock - Details

Additional Developments

Many links exist, from secrecy, compartmentalization, and illegality to the methods used and the subversion of government power. “Shamrock was blown… Ultra Black burrowed even deeper.”

NSA, FBI, and Surveillance of Cuban Sympathizers

NSA, FBI, and Dissenters

NSA enthusiastically supported ICI, seeking increased surreptitious entries and elimination of legal restrictions on domestic surveillance. Recipients were to be on a “Bigot List” with even more security than traditional TOP SECRET, HANDLE VIA COMINT CHANNELS ONLY.

FINCEN, IRS, and Other Economic Surveillance


11.4.8. Why are so many computer service, telecom, and credit agency companies located near U.S. intelligence agency sites?

For example, there is a cluster of telecom and credit reporting agencies (e.g., TRW Credit, TransUnion, etc.) in and around the McLean/Langley area of Northern Virginia, including:

Similarly, various computer network providers, such as UUCP and America Online, are also located in this region.

Perspectives on the Proximity

  1. Least Conspiratorial View :
    The companies are located near Washington, D.C., for various regulatory, lobbying, and business reasons.

  2. Most Conspiratorial View :
    Their proximity ensures that intelligence agencies have easy access to communications, direct landlines, etc.

Additional Considerations

As Paul Ferguson, a Cypherpunk and manager at US Sprint, puts it:

“We’re located in Herndon, Virginia, right across the street from Dulles Airport and a hop, skip & jump down the street from the new NRO office…,-)”
— P.F., 1994-08-18


11.5. Surveillance in Other Countries

11.5.1. Overlap with Earlier Discussions

Partly, this section overlaps with the earlier discussion of crypto laws in other countries.

11.5.2. Major Non-U.S. Surveillance Organizations


1.6. Surveillance Methods and Technology

11.6.1. Speculative Nature of the Discussion

(Some of this gets speculative and may not be to everyone’s liking.)

11.6.2. What is TEMPEST and What’s Its Importance?

TEMPEST apparently stands for nothing; it is not an acronym, but rather a name. The all-caps spelling is the standard format.

Key Concerns

Notable Observation

“Many LCD screens can be read at a distance. The signal is not as strong as that from the worst VDUs, but it is still considerable. I have demonstrated attacks on Zenith laptops at 10 meters or so with an ESL 400 monitoring receiver and a 4m dipole antenna; with a more modern receiver, a directional antenna, and a quiet RF environment, there is no reason why 100 meters should be impossible.”
— Ross Anderson, Tempest Attacks on Notebook Computers ??? , comp.security.misc, 1994-08-31


16.2. SUMMARY: Crypto Anarchy

16.2.1. Main Points

“…when you want to smash the State, everything looks like a hammer.”
Strong crypto serves as the “building material” for cyberspace (making the walls, the support beams, the locks).

16.2.2. Connections to Other Sections

This section ties all the other sections together.

16.2.3. Where to Find Additional Information

Again, almost nothing has been written on this topic. Notable authors include Vinge, Friedman, Rand, etc.

16.2.4. Miscellaneous Comments

This is a very long section and may be confusing to many.

16.3. Introduction

16.3.1. The Revolution Will Be Digitized

“The revolution will not be televised. The revolution will, however, be digitized.”
Welcome to the New Underworld Order! (a term borrowed from writer Claire Sterling.)

16.3.2. Do the Views Here Express the Views of the Cypherpunks as a Whole?

This section is controversial. Hence, there are more warnings than usual about being careful not to confuse these comments with the beliefs of all or even most Cypherpunks.

Several Cypherpunks who have considered the issues of crypto anarchy have been disturbed by the seemingly inevitable conclusions, such as:

So, take this section with these caveats. Some of the things I think are inevitable, and in many cases positive, will be repugnant to some. For example:

These are not things that everyone will find comforting. Some may even label them illegal, seditious, and dangerous. So be it.

16.3.3. What are the Ideologies of Cypherpunks?

I mentioned this in an earlier section, but now that I’m discussing “crypto anarchy” in detail, it’s good to recap some points about the ideology of Cypherpunks.

Of those who speak up, most seem to lean toward the libertarian position, often explicitly so. This correlation is not surprising, as libertarians are often found on the Internet.

My Personal Outlook on Laws and Ideology

(Obviously also scattered throughout this document.)

Crypto anarchy is, in a sense, a throwback to the pre-state days of individual choice about which laws to follow. The community exerted a strong force.

With strong crypto (“fortress crypto,” in law enforcement terms), only an intrusive police state can stop people from accessing “illegal” sites, communicating with others, or using “unapproved” services.

For example, consider the “credit data haven” that keeps any and all financial records—rent problems from 1975, bankruptcy proceedings from 1983, divorce settlements, results from private investigators, etc. In the U.S., many such records

16.4. The Crypto Anarchist Manifesto

16.4.1. Unchanged Since Its Writing in Mid-1988

This manifesto has remained unchanged since its writing in mid-1988, except for my email address.

For history’s sake, here it is:

16.4.2. The Crypto Anarchist Manifesto

Timothy C. May
tcmay@netcom.com

A specter is haunting the modern world, the specter of crypto anarchy.

Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name or legal identity of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will completely alter the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even change the nature of trust and reputation.

The technology for this revolution—and it surely will be both a social and economic revolution—has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make these ideas practically realizable. The next ten years will bring enough additional speed to make these ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.

The State will, of course, try to slow or halt the spread of this technology, citing national security concerns, the use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be traded freely and will enable illicit and stolen materials to be exchanged. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.

Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally change the nature of corporations and government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material that can be put into words and pictures.

And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West

16.5. Changes are Coming

16.5.1. Technology is Dramatically Altering the Nature of Governments

It may sound like new-age trendiness, but strong crypto is “technological empowerment.” It literally gives power to individuals. Like Sam Colt, it makes them equal.

“Politics has never given anyone lasting freedom, and it never will. Anything gained through politics will be lost again as soon as the society feels threatened. If most Americans have never been oppressed by the government (aside from an annual mugging), it is because most of them have never done anything to threaten the government’s interests.”
— Mike Ingle, 1994-01-01

Thesis: Strong Crypto is a Good Thing

16.5.2. Dangers of Democracy in General and Electronic Democracy in Particular

16.5.3. The Collapse of Democracy is Predicted by Many

“After Athenian democracy self-destructed, the various warring parties found that they could only have peace if they disowned omnipotent government. They put together a peace agreement that, in part, proclaimed limits to government, acknowledged inherent limits to what was proper for governments to do, and guaranteed that the government would not go beyond what was proper for government to do. The majority could not do as it pleased with the minority, and not any act of power was a law; law was not merely whatever the government willed. They did not agree on a constitution but agreed to respect an unwritten constitution that already existed in some sense.”

16.5.4. Depredations of the State

16.5.5. Things Are Likely to Get Worse, Financially

(This is a negative view, though there are also reasons to be optimistic.)

16.8. The Nature of Crypto Anarchy

16.8.1. What is Crypto Anarchy?

16.8.2. Anarchy Turns People Off…Why Not a More Palatable Name?

16.8.3. Voluntary Interactions

16.8.4. Crypto Anarchy as an Ideology Rather Than as a Plan

16.9. Uses of Crypto Anarchy

16.9.1. Markets Unfettered by Local Laws

16.9.2. Espionage

16.10. The Implications - Negative and Positive - of Crypto Anarchy

16.10.1. What Are Some Implications of Crypto Anarchy?

Espionage

Bypassing Sanctions and Boycotts

Consulting

Disturbing Implications

16.10.2. The Negative Side of Crypto Anarchy

Comment

Abhorrent Markets

Potential for Lawlessness

Solicitation of Crimes

Bribery of Officials and Influencing of Elections

16.10.3. The Positive Side of Crypto Anarchy

16.11. Ethics and Morality of Crypto Anarchy

16.11.1. How Do You Square These Ideas with Democracy?

16.11.2. Is There a Moral Responsibility to Ensure That the Overall Effects of Crypto Anarchy Are More Favorable Than Unfavorable Before Promoting It?

16.11.3. Should Individuals Have the Power to Decide What They Will Reveal to Others, and to Authorities?