Technology Pledge News
What is this Technology Pledge?
The Technology Pledge Questionnaire
Briefing Sheet: Internet Content Regulation
Briefing Sheet: Online Availability of Government Information
Briefing Sheet: Market-driven cryptography policy
There are millions of them. They're well-educated, wealthy, and they vote. They're the users of the Internet, and now they've got their own political platform: the Technology Pledge.
The Technology Pledge is a political platform for the technological public and industry to make their needs known to Federal, State, and Local candidates. By urging your candidate to answer the questionnaire or take the Pledge, you can educate them as to the needs of the Internet and online community.
It's simple. Simply print this out and fax it or mail it to a candidate. Post a message to a local newsgroup or bulletin board asking people to do the same thing you're doing. Place a link on your homepage to the Pledge at URL:
http://www.efa.org.au/pledge/ozpledge.htmlIf you get a response, let us know at pledge@efa.org.au. We'll verify it with the candidate and publicise their responses.
For over a hundred years Australia has engaged in an ever-expanding experiment of democracy. Digital information technology will be the engine for continuing our successful government into the twenty-first century.
The digital economy is Australia's explosive new industry. The actions of the Federal and State Governments in the next few years will dramatically affect the business worthiness of this new medium. Because of its fragile state, great care must be taken to avoid over-regulating the growing industry we are seeing today. Careful avoidance of over-regulation will also prevent us from acting hastily in the areas of the public's civil liberties.
Issue 1: More Parental Responsibility, Less Government Regulation of Content
The new interactive medium is fundamentally different from the print world, the broadcast medium, and the telephone environment. Unlike those media, the interactive medium contains everything needed to empower users, including concerned parents, to control access to unwanted information. In addition, current obscenity and child pornography laws extend to the interactive world already.
While in office, I pledge to support parental control instead of government censorship on interactive services.
Issue 2: Online Availability To Public Documents
One of the cornerstones of our democracy has been its openness. Many government documents are already available to the public through the Australian Government Publishing Service, and your local library. Online technologies present an opportunity to increase public access and to provide faster access to government information with little or no increase in production cost.
While in office, I pledge to support online availability of government information to the public free of charge as an additional standard method of government publication.
Issue 3: Encourage the development of a secure Global Information Infrastructure (GII)
Encryption technologies are an enabling tool to allow businesses and the public to protect their privacy and the security of their communications and stored information. Businesses require cryptography to stay competitive; the public requires it to safeguard their confidential information.
By supporting software and hardware companies in the building of products with market-driven encryption standards, a secure Global Information Infrastructure can be built that the marketplace will trust. The electronic marketplace is similar to the local marketplace: if the public and the industry do not trust the safety of the marketplace, they will not use it for transacting their business. Thus far, encryption proposals from the U.S. Administration such as the Clipper Chip have failed to meet the needs of both the public and industry for building this secure marketplace.
While in office, I pledge to support market-driven standards for cryptography instead of anti-competitive government regulation.
The purpose of the questionnaire is to allow candidates to address the issues without necessarily having to commit to the entire platform. Please feel free to give it to any candidate and return the results to Electronic Frontiers Australia (EFA). Contact details can be found at URL:
http://www.efa.org.au/EFA and at the end of this document.Question 1:
Laws regulating content are inappropriate for the global online world, where users have a tremendous amount of control over what they see.
Do you support parental control, as opposed to laws regulating
content as a method of controlling children's access to the
Internet?
yes/no
Question 2:
The electronic dissemination of government information, such as:
Do you support the online dissemination of government information?
yes/no
Question 3:
Cryptography is necessary for securing the Global Information Infrastructure. The Australian Government has had no strong policy on either supporting or denying the use of cryptography for business and personal users.
Do you support industry in its quest to develop, sell, and use
products with market-driven cryptography standards?
yes/no
This year has seen an unprecedented public debate on the issue of children's access to material on public networks such as the Internet. In particular, it has become obvious that much material that the States and Commonwealth are working to restrict is in fact covered by current law and prosecutable by current methods. In particular, laws that criminalize child pornography, solicitation of minors, and obscene material have been enforced in recent South Australian and Queensland prosecutions, proving that new legislation is in fact not necessary.
These prosecutions prove that current laws already extend to the Internet, and that no new legislation is needed to prosecute them. Furthermore, new laws to attempt to regulate the "grey area" that is traditionally left up to the discretion of parents are not enforcible on the global Internet, nor can they hope to be enforced by the multitude of businesses currently thriving on the Internet.
Industry has not been asleep though. Far ahead of any regulation, consumer demand has created a new industry of blocking software that allows parents to restrict and monitor their childrens access to the Internet, even when the parent is not present.
Not only can a parent use such software on their home computer, but many online services now offer free blocking software to their subscribers, allowing parents to configure the amount of access they wish to give their children to the Internet. Blocking technology is more sophisticated for interactive services than for any other medium.
All of these presently existing measures point to the fact that parents are really the most appropriate people to be policing their children's access to the Internet, and if they need help, there is an extremely competitive market willing to offer it to them, often as a free service.
More information on this issue can be found in the Voters Telecom Watch Internet Parental Control Frequently Asked Questions file which can be obtained through the VTW web page. URL:
http://www.vtw.org/
Recent projects to place government information on the Internet have resulted in some amazing services at a fraction of the cost of their paper counterparts. For example, the Australian Federal Parliament has recently established an experimental service on the World Wide Web. URL:
http://www.aph.gov.au/This service gives Australians unprecedented access to the workings of the democratic process not previously attainable without significant cost to taxpayers. Just imagine how much it would cost if everyone who was curious about a piece of legislation simply called up Parliament House and asked for it to be mailed to them? Parliamentary staff and budgets would suffer significantly under the weight of postage alone.
Instead, Australians can access such information directly and quickly through the World Wide Web. They can also query the Hansard and read the full texts of debate from the floors of the House and Senate. URL: http://www.aph.gov.au/library/trialhom.html
Greater access to government information promotes the ideal of citizen participation. In addition, the low cost of making available information online has resulted in the discovery of much better methods of reaching the public.
Other sites on the World Wide Web with parliamentary or government information include:
The only pitfall we must watch out for is the "sole commercial distributor" paradigm, where the government chooses one company to provide government information to the public. The danger is that the sole distributor makes their information available for a price that is out of the range of the general public.
If the government publishes its information for free on the Internet, this does not remove the market for industry. In fact, the presence of free information online only encourages users to seek out the added-value services that many third party information providers are now selling.
One example is the U.S. Securities and Exchange Commision's EDGAR filings. Although these are available in raw form online, their presence has spurred a market for "added value" EDGAR providers who can link the information in EDGAR to other data, such as market data, stock histories, and news services. Faster and more advanced search capabilities are also now being marketed to companies that use the EDGAR filings. This demonstrates that government can spur on the information economy by publishing its own information in the public domain, and allowing private enterprise to add their value and sell that added-value product to the public.
Cryptography is the art of "secret writing". In other words, writing something in such a way that it cannot be read by others, even if you give it to them.
Although strong encryption technologies are not in wide public use at the moment, there is great demand for them in the marketplace. Virtually all banks and large corporations use encryption to keep their proprietary information confidential from hostile foreign governments and competitors. Users of public networks, such as the Internet, use encryption to attempt to secure their sensitive personal information from eavesdroppers.
To enable business on the Global Information Infrastructure, market-driven standards need to be enacted that can be embraced by customers and implemented by the industry.
The U.S. Administration has proposed two policies on the use of encryption that may potentially doom the U.S. software and hardware industry. The first proposal was introduced in 1994: the Clipper Chip. This chip would allow users to hide their confidential data using encryption, but only in a proprietary manner that could be later decrypted by the U.S. government. This proposal was very unpopular, as both the U.S. public and private industry insisted that no one would buy products with the Clipper Chip. Sales of products incorporating the Clipper Chip have been expectedly flat.
The second proposal, dubbed "Clipper II" or "Son of Clipper", was presented in July of this year by the U.S. Administration at a workshop sponsored by the U.S. NIST in Maryland. Clipper II was just as unpopular with the U.S. public and private industry, as many companies argued that there was no market for products whose overriding requirement is law enforcement access.
In July 1995, Steve Orlowski, Assistant Director, Security Management, Australian Attorney-General's Department, presented his "personal" views on cryptography to a cryptography policy conference in Brisbane. In his paper Mr Orlowski proposed a two level encryption policy. Weak encryption for the general public which could be broken by law enforcement and security services and strong key-escrowed cryptography for financial transactions with banks and large institutions.
Are the government's concerns about the misuse of cryptography reasonable? There is some evidence that criminals will someday use cryptography to commit crimes, the same way that today they use cars for getaways from bank robberies. However there are few, if any, documented cases today of criminals using encryption to evade capture and arrest by law enforcement.
Many representatives from the public and private sectors are working hard to find a common ground between the needs of law enforcement, the public, and private industry. Both Clipper schemes so far have met the needs of law enforcement, but failed to address the needs of industry and the public.
It is clear that this is an issue that will require a significant amount of public debate with give and take from all sides. However one thing remains clear: any solution that is unpopular with the marketplace will not be purchased by the public, and will not be produced by industry for a market that does not exist.
Q: If I support this part of the Pledge, does that mean I support the right of citizens to foil an authorized wiretap?
A: No, this provision does nothing to diminish the powers of law enforcement to obtain a warrant to perform a wiretap. Nor does it diminish their power to use any tools available to them to decrypt any encrypted communications you might be using to build evidence for their case.
Q: If I support this part of the Pledge, does that mean I support the right of law enforcement to perform wiretaps in an unauthorized fashion, or in greater capacity than they are currently authorized to do?
A: No, this statement does not propose to expand the powers of law enforcement to conduct legal wiretaps.
Q: Isn't encryption used by criminals?
A: As of this date, there are no documented cases of criminals using encryption to evade law enforcement officials, although there are many urban legends about such an event. Assuming there will someday be one, this is still a very small number for the attention this issue has been given. In addition, law enforcement has benefitted from advances in technology that have given it a wealth of other investigative tools recently.
Finally, we cannot ban everything that might be used in the course of a crime. Automobiles are not munitions just because criminals use them. What we need to focus on is the original crime.
Last updated: 15 January 1996.