Introduction: Spyglass and the Internet
Good morning. My name is Tim Krauskopf, and I am the co-founder
and Chief Technology Officer of Spyglass, located in Naperville,
Illinois. We are a small business employing 137 people and had
revenues of $10 million last year. We are growing rapidly, and
are in a unique position in the Internet software industry of
holding the exclusive rights to the commercial version of Mosaic,
originally developed at the National Center for Supercomputing
Applications at the University of Illinois at Urbana-Champaign.
Mosaic is software that was developed to allow people to navigate
the graphical portions of the Internet, specifically the World
Wide Web. Spyglass is also unique in that we license our Internet
technology to more than 70 companies who incorporate it in various
products. So our technology plays a central role in the growth
of the broader Internet software industry. Our company's first product was a suite of data visualization tools used by scientists and engineers. We entered the Internet and World Wide Web market in May, 1994 when we completed our licensing arrangement with NCSA to develop and market a commercial version of NCSA Mosaic. Spyglass was selected for several reasons: First, I had been involved in developing early Internet technology, co-authoring NCSA/Telnet, software that made the Internet accessible for researchers and students. Second, Spyglass had already established a strong track record developing cross-platform software for the commercial marketplace. In August of 1994, NCSA extended its agreement to provide, on an exclusive basis, all future commercial licensing rights to Spyglass. Our core business is to license Spyglass Mosaic technology to other companies to include in their Internet and Intranet-related products. As the Web market has grown and evolved, so has Spyglass and its technologies. You may have heard about our recent acquisition of Surfwatch, the leading provider of filtering and parental control technology.
The Information Technology Association of America
I am here today representing both Spyglass and our primary trade
association, the Information Technology Association of America.
Spyglass licenses Web technology to many other ITAA member companies
such as Oracle Corporation, Computer Associates, IBM, Microsoft, Platinum Technology, and others.
The Information Technology Association of America represents a
broad cross-section of the software, Internet, information technology
services, telecommunications and systems integration segments
of the high-technology industry. ITAA direct and affiliate members
number over 9,000 across the U.S. ITAA is the umbrella organization
for 25 of the regional high technology organizations in various
states, representing them here in Washington, D.C.
Member companies include Netscape Communications, Microsoft, Oracle Corporation, Computer Associates, Novell, IBM, AT&T, MCI, and EDS, to name a few.
ITAA's software division has made a name for itself as the leading
organization representing the Internet, Intranet and Network-centric
business software industry. The largest software companies focusing
upon the Internet and Intranet markets are active in the association.
Priority issues include encryption, international, federal and
state taxation of software, services and the Internet, telecommunications
reform, copyright, immigration, and the Year 2000 software crisis.
ITAA Supports the Goals of S. 1726
ITAA supports the goals of S. 1726, the Promotion of Electronic
Commerce in the Digital Era (Pro-CODE), because it recognizes
that:
1. The issue of encryption and information security over computer
networks and the Internet is no longer an esoteric, arcane subject.
How security over this network of networks is addressed will have
a broad, pervasive impact on the future of the Internet, business
and society. Companies have legitimate concerns about protecting
their proprietary information from competitors and foreign governments.
2. The Internet is a global medium and the availability of encryption
products around the world must be a fundamental factor in setting
U.S. export policy. While there are legitimate law enforcement
and national security considerations, U.S. policy cannot ignore
these market realities.
3. The economic cost of the Administration's current policy on
encryption will be enormous not only to U.S. software industry
jobs and revenues but will also have an impact on the ability
of U.S. businesses to harness the Internet to enter new markets.
We will discuss each one of these points in turn, and then lay out our specific recommendations for moving forward.
The Significance of Information Security and Encryption in
a Networked World: The Threat Is Real
A cover story in Business Week last year proclaimed that,
"The Web Changes Everything." While that may be a slight
exaggeration, the Internet is indeed starting to transform not
only how business is conducted but society more broadly.
Within several years, there will be more than 100 million people
connected to the Internet. Zona Research estimates that the market
for corporate "Intranets" alone - businesses harnessing
Internet technology for both in-house and inter-enterprise applications
- will grow to more than $6 billion by 1998.
Outdated U.S. export restrictions on encryption is a major barrier
to realizing the potential of the Global Information Infrastructure
and all it has to offer, such as business communications, financial
transactions, healthcare and personal medical information, and
consumer privacy.
A New York Times editorial this week made the point effectively:
"Once largely the domain of governments and their intelligence
services, encryption technology is now commonly used by corporations,
banks, securities firms and individual computer operators. It
is time to revise Government encryption policy to fit this new
universe."
The recent, authoritative report of the National Research Council
(which includes former Attorney General Benjamin Civiletti and
Ann Caracristi, a former Deputy Director of the National Security
Agency) also pointed out the growing pervasive impact of communications
networks upon global society:
"As the availability and use of computer-based systems grow,
so, too, does their interconnection. The result is a shared infrastructure
of information, computing, and communications resources that facilitates
collaboration at a distance, geographic dispersal of operations,
and sharing of data.
Today, the rising level of familiarity
with computer-based systems is combining with an explosion of
experimentation with information and communications infrastructure
in industry, education, health care, government, and personal
settings to motivate new uses and societal expectations about
the evolving infrastructure."
In short, we are going through a paradigm shift in which the importance
of protecting the security of information on computer networks
is growing at a geometric rate.
The threat to the security of information on the Internet is real.
Companies are concerned not only about the ability of competitors
to gain access to proprietary information, but also foreign intelligence
agencies. Two former Directors of France's intelligence agency
have stated that they gather economic intelligence, including
information from certain companies that have been targeted. Attached
is a box included in the National Research Council report laying
out the "Threat Sources."Last August, a French student
was able to crack a 40-bit encryption scheme distributed by Netscape
Communications by using computers at his university in his spare
time (it took him 8 days to break the code). A group of computer
scientists released a report recently that $10,000 worth of computer
hardware can break a 40-bit key in 12 minutes. The group estimates
that a 56-bit key using a $10 million corporate computer could
be broken in 12 seconds. Such costs could be justified by a foreign
company or intelligence agency trying to steal financial information,
trade secrets or valuable technology.
In meeting the threat, our responsibility is three-fold: to understand
the shifts taking place in society, to identify the new vulnerabilities,
and to put in place the technology solutions necessary, including
strong encryption, to counteract inappropriate or illegal behavior.
The Internet is a Global Medium and Foreign Availability Must
Be a Fundamental Factor in U.S. Policy
The Internet does not stop at the U.S. border. It is a global
medium that does not recognize the boundaries between states,
countries or continents. If information or products are made
available somewhere on the Internet, it is accessible to anyone
regardless of geographic location. S. 1726 allows U.S. software
and computer companies to compete on a level playing field with
our foreign competitors in this rapid growth global marketplace.
We are particularly pleased that S. 1726 recognizes that distributing
software over the Internet will grow in volume and economic significance
and should be used as a factor in determining whether a product
is generally available around the world.
One of the most perplexing aspects of the Administration's position
is that it has decided to turn a blind eye to the issue of what
strength of encryption products are broadly available outside
of the U.S. The Administration's position is reminiscent of the
Reagan Administration's decision to ban the export of Apple II
computers to Eastern Europe in the 1980s. The Clinton Administration
used foreign availability as a key factor in its decision last
year to change the definition of supercomputer and relax its control
on the export of computer workstations. It has elected to stick
its head in the sand and ignore this key factor in its deliberations
on encryption. Basing its research on a study originally conducted by Dr. Lance Hoffman of George Washington University in conjunction with the Software Publishers Association in 1993, Trusted Information Systems (TIS) has identified 1181 encryption products worldwide (the full study is available at http://www.tis.com). TIS has found 497 foreign products from 28 countries. 193 of these products use DES, which has a 56-bit key length and is not permitted for export by U.S. companies. A recent study by the Commerce Department and National Security Agency comes to similar conclusions.
Anecdotal examples underscore why U.S. companies are losing market
share rapidly. There is a foreign product called Sioux on the
market in which the company uses U.S. export restrictions as a
major selling point to customers. The company's Web page (http://www.thawte.com/products/sioux/)
proclaims that, "The U.S. ITAR regulations prohibit the export
of strong encryption technology from North America. This means
that companies such as Netscape, Microsoft and Open Market have
to ship "Export Versions" of their software which have
limited encryption capability - using 40-bit keys which can be
trivially deciphered
since Sioux was developed outside of
the ITAR framework it ships with full encryption enabled all over
the world. Why limit your security?" These are real competitive
handicaps faced by U.S. companies.
This past Sunday, working from home on my PC, I went to the World-Wide
Web to see what was easily available for downloading. I had heard
there was a free application with SSL called "Apache"
and a search on Digital's AltaVista catalog for "Apache with
SSL" quickly led me to the names and locations on the web.
Here is a summary of what I found.
[SSL, or secure sockets layer, is a protocol for protecting any
amount of data during transmission between client and server programs.
SSL provides server authentication, data encryption and message
integrity. It was designed by Netscape Communications for use
in Internet applications. It is a highly desired feature for
our customers, and Spyglass provides a compatible product. Encryption
libraries allow software developers to build secure applications
using various operating systems and platforms.]
I found a WWW server, which roughly matches the feature set of
our own Spyglass Server, called Apache. At an Oxford University
site, I found a version which can be configured with SSL if you
have an SSL library. At that site, I found pointers to Australia
for obtaining SSL. I also found pointers to a commercialized
version of that product available from South Africa, called Sioux.
I consider this product a direct competitor to our own.
In particular, I downloaded the "SSLeay" library. Though
written in Australia, I downloaded from a site in Japan because
the network link was faster. Copies can be found at sites in
Korea, Germany, Taiwan, the UK, Japan, and of course, Australia.
URLs: ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/ (Original Australian
site) ftp://ftp.epistat.m.u-tokyo.ac.jp/pub/Crypto (Japanese mirror site) This library contains source code to implement to any encryption bit length, DES, RC2, RC4, IDEA, and RSA encryption schemes. The documentation brags about being interoperable with all US implementations even though none of the code is derived from any US source. They simply had people inside the US test the results. I was able to download the 500K file, peruse and compile the source code without any problems in about 30 minutes. I don't believe I broke any laws because I only imported the code, never exported it.
The conclusion is that these algorithms and source code are fully
available to anyone who has access to the Internet. Because they
are available in source code form, even 64-bit or 128-bit capabilities
may have trouble competing.
ITAA believes that the issue of foreign availability is a key
element in changing the Administration's policy. S. 1726 permits
the export of encryption that is "generally available,"
but we believe that this section of the legislation may require
more detailed definitions. We are announcing today that we will
work with Congress to craft a detailed, specific way to assess
the global availability of encryption products. Such legislation
must ensure that the analysis is objective and has teeth. This
assessment must be timely and conducted at least three times a
year given the pace of technological and market development.
There's a joke in the Internet industry that the pace of technological
change and market growth is so rapid in our business that each
calendar year is really more like seven years, or a dog's year.
We need to assess foreign availability on a continual basis to
ensure that U.S. industry is not placed at an unfair disadvantage
in the global marketplace.
The Impact of the Administration's Encryption Policy upon U.S.
Jobs, the Software Industry and Small Businesses
The U.S. software industry leads the world. U.S. firms hold more
than 70 percent of the global market for pre-packaged software.
The software industry has created more than 500,000 jobs across
the U.S. The U.S. is also dominant in the emerging Internet software
market, with ITAA member firms like Netscape, Microsoft, Spyglass,
IBM, Oracle and others leading the world.
The Computer Systems Policy Project estimates that unless U.S.
policy on encryption is relaxed, this will cost 200,000 jobs and
$60 billion in revenues over the next four years. As the world
relies increasingly upon software used and shared across computer
networks instead of stand-alone workstations, the impact of U.S.
restrictions on encryption upon the U.S. software industry grows
larger and larger.
The impact of a restrictive U.S. export policy will have an impact
beyond just the U.S. software industry, however. It is anticipated
that U.S. small businesses will rely increasingly on the Internet
as an effective way to help them enter foreign markets. One of
the greatest potential benefits of Internet business communications
is that it lowers the barriers for small businesses to enter these
new markets. As more and more companies begin to rely upon digital
commerce, efforts to protect confidential and sensitive company
information carried on this network grow in importance. The Administration's policy allows the export of encrypted software above a 40-bit key length limit if a company permits a government-certified third party to hold the "keys" that unlock the encrypted information. [As demonstrated above, a 40-bit key length is too weak to ensure the protection of information over the Internet.]
The cost of such a key escrow scheme would be paid for by individual
companies. So, companies would be faced with either choosing
1) a level of security for their information that is not 100%
secure or accepting a 2) significant administrative burden and
additional costs. In addition, such a key escrow requirement
could become a "de facto" global standard which would
create, in effect, an international Internet "tax."
This "tax" would be part of the cost of doing business
on this global network of networks.
So the Administration's policy would raise the costs and the barriers
for small businesses to enter new markets. S. 1726 recognizes
this fact by rejecting mandatory key escrow schemes. ITAA is
conducting a survey of small businesses to gather more information
on the importance of the Internet to them and the impact of the
Administration's encryption policies (see http://www.itaa.org).
We will also be analyzing in greater detail the costs associated
with the Administration's key escrow scheme.
Our Specific Recommendations and Principles Moving Forward
We support the goals of S. 1726, the Pro-Code legislation. Below
is our position on the Administration's policies and our recommendations,
followed by a set of principles on information security that we
endorse. It should be noted that Spyglass as a company has a
position that goes beyond the ITAA stance, which I will expand
upon as well.
ITAA endorses the following industry principles on encryption
developed by the United States Council for International Business:
While Spyglass supports fully the ITAA recommendations and all
of the supporting reasoning presented here, I would like to go
one step beyond the ITAA position because of Spyglass' unique
position in the market.
Spyglass only has 72 customers. Nearly half of them receive source
code to our WWW technologies as part of our service to them.
Companies like NEC, Nippon Telephone and Telegraph, Dacom, and
Siemens-Nixdorf do not receive our full product. We eliminate
all of the encryption libraries and any references to them. Spyglass
can compete against the free Apache WWW technology or the Sioux
product by providing additional features over and above what can
be obtained for free on the network. We cannot compete when certain
features cannot be legally shipped. More WWW technologies appear
weekly and more and more of them include encryption features.
A source code customer of ours, JSB, a British company, told me
last week that they required an SSL (Secure Sockets Layer) library
with encryption for use in their product. He is willing but cannot
purchase it from us. I am convinced that he will find one available
from outside the US. I am more worried about how many other companies
there are who have not contacted us.
Spyglass would add the following recommendations:
A) For RC2, RC4, DES, and RSA encryption schemes, release all
capabilities at all key bit lengths. The source code to these
algorithms (or equivalent) is available all over the world on
the Internet today. My reading of S. 1726 is that it would accomplish
this goal. B) For all cases, eliminate the restrictions on software "hooks" which call the encryption libraries. Spyglass would then be able to ship source code to SSL and other Internet security schemes along with binary libraries which use restricted key lengths (or key escrow). Ironically, by not letting us make it easy for our customers to use short key lengths, we are forcing them to find foreign alternatives which do not have key length restrictions (or key escrow). While S. 1726 would accomplish this end, the Administration could eliminate the restrictions tomorrow by changing the language in the International Traffic in Arms Regulations or ITAR (see 22 CFR Section 121.1).
In conclusion, let me say that we recognize the concerns of both
the law enforcement and national security communities. But the
Administration's current policies do not and will not be successful
by ignoring the explosive growth and nature of the global Internet
and the pace of technological change. And the Administration's
policies would also prove devastating to the U.S. software industry.
A New York Times editorial makes the point that "The
best way for the Government to protect its ability to eavesdrop
on domestic and foreign criminals is to stay technically ahead
of them
The export restrictions do nothing to keep encryption
software out of the hands of criminals and hostile governments,
but needlessly drive American exports out of foreign markets."
The National Research Council also advocates that the U.S. Government
fund robust research programs to keep our law enforcement and
intelligence agencies ahead technologically. ITAA endorses this
recommendation, as well as the provision in S. 1726 directing
the Secretary of Commerce to "prohibit the export or re-export
of computer software and computer hardware
" if it will
be diverted or modified for foreign military or terrorist use.
Thank you, and I look forward to your questions.
|