13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Clipper ChipAs Clinton settled into the presidency, he experiencedincreasing conflict with Congress <strong>and</strong> a public angered byhis policies. A 1993 PRD to permit U.S. forces to operateunder the control of a United Nations comm<strong>and</strong>er particularlyenraged many conservatives <strong>and</strong> had to be ab<strong>and</strong>oned.The administration responded to its critics bymaking overseas actions more modest in scope. In Clinton’ssecond term, the administration sought to integrateEastern <strong>and</strong> Western Europe without provoking tensionswith Russia; to promote more open trade; to improvedefenses against such transnational threats as terrorism<strong>and</strong> narcotics; <strong>and</strong> to encourage a strong <strong>and</strong> stable Asian-Pacific community by seeking trade cooperation with Chinawhile avoiding confrontation with it on human rights issues.Critics of administration argue that it appeared to lacka clear consensus on what constituted vital national interests.The obvious reluctance of the president to risk significantnumbers of troops to achieve declared politicalobjectives prompted U.S. allies to express concern aboutreduced American global military involvement <strong>and</strong> mayhave encouraged continued troubles with “rogue” nationssuch as Iraq.❚ FURTHER READING:BOOKS:Drew, Elizabeth. On the Edge: The Clinton Presidency.New York: Simon & Schuster, 1994.Herrnson, Paul S., <strong>and</strong> Dilys M. Hill, eds. The ClintonPresidency: The First Term, 1992–96 New York: St.Martin’s Press, 1999.ELECTRONIC:Digital National <strong>Security</strong> Archive. “Presidential Directiveson National <strong>Security</strong> from Truman to Clinton.” 2003.(April25, 2003).White House. “History of the National <strong>Security</strong> Council,1947–1997.” (April 25, 2003).SEE ALSOCold War (1972–1989): The Collapse of the Soviet UnionExecutive Orders <strong>and</strong> Presidential DirectivesIraq War: Prelude to War (The International Debate Overthe Use <strong>and</strong> Effectiveness of Weapons Inspections)Iraqi Freedom, Operation (2003 War Against Iraq)National <strong>Security</strong> Advisor, United StatesNational <strong>Security</strong> Strategy, United StatesNATO (North Atlantic Treaty Organization)NSC (National <strong>Security</strong> Council)NSC (National <strong>Security</strong> Council), HistoryClipper ChipIn 1993, officials in the administration of President WilliamJefferson Clinton announced the proposed use of a cryptographicdevice intended to protect private communicationsfor all but authorized monitoring by governmentagencies. Termed the “clipper chip,” the device wouldpermit secure encrypted voice communications, but wouldalso allow United States law enforcement <strong>and</strong> intelligenceagencies to monitor those communications by obtainingthe algorithm keys to decrypt the transmissions.As initially proposed the government would allow thekeys to be maintained in a database held by an independentagent. Access to those keys would be permitted onlyas “legally authorized.” Critics <strong>and</strong> privacy advocatesimmediately questioned the vague <strong>and</strong> broad use of theterm legally authorized.“A chip similar in design <strong>and</strong> performance specifications,the Capstone chip, could be similarly regulated toallow secure data transmissions that could also be easilydecrypted by United States law <strong>and</strong> intelligence agenciesvia known algorithmic keys.An algorithm defines a repeatable step-by-step seriesof mathematical or language manipulation procedures toencrypt or decrypt a message or communication. Cryptologysystems utilize algorithms <strong>and</strong> the labels, mechanics,recursive procedures, or other solutions are termed ”keys“to the algorithm.Use of the clipper chip was adopted <strong>and</strong> authorized in1994. The National Institute of St<strong>and</strong>ards <strong>and</strong> Technology(NIST) <strong>and</strong> the Department of the Treasury were designatedto be the database repositories or ”escrow“ agentsfor the algorithmic keys. Rules regarding access to thekeys were developed in accord with state <strong>and</strong> nationalsecurity wiretap orders.The clipper chip utilizes the SKIPJACK algorithm aspart of the Escrowed Encryption St<strong>and</strong>ard (EES) program.SKIPJACK was developed as a classified algorithm by theNational <strong>Security</strong> Agency (NSA). SKIPJACk was initiallydeveloped as part of the Fortezza encryption suite <strong>and</strong> is asymmetric cipher with a fixed key length of 80 bits. <strong>Security</strong>experts assert that multiple encryption programs mayeventually replace SKIPJACK like encryption-decryptionprograms.❚ FURTHER READING:PERIODICALS:Baker, Stewart A. ”Don’t Worry, Be Happy: Why Clipper IsGood for You.“ Wired. June 1994.Johnson, George. ”The Spies’ Code <strong>and</strong> How It Broke,“New York Times, Week in Review. July 16, 1995.SEE ALSOCipher Key218 Encyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!