THE METAPHOR IS THE KEY: CRYPTOGRAPHY,
THE CLIPPER CHIP, AND THE CONSTITUTION

A. Michael Froomkin

Document information and copyright notice

[Page n] references relate to the pagination of the printed version.

Click here to jump to a specific page:

To table of contents



IV. Ideas Are Weapons

The Bill of Rights is predicated on assumptions about technological limits that may soon be falsified. For example, the First Amendment is premised on a theory of speech that never imagined that scientific speech might become inherently dangerous.{582} Some have argued that the publication of advanced cryptographic algorithms constitutes inherently dangerous speech. Although I [Page 844]think these arguments are misguided because the devices described by the speech cannot directly hurt anyone, it is certainly possible to imagine that one day someone will create a device that is easy to build, runs on house current, and is incredibly destructive. Publication of the plans for such a device might be dangerous indeed, and arguably outside the First Amendment, at least as originally conceived. In light of technical changes, "the Justices are now faced . . . with the difficult task of deciding just how high a price our constitutional commitment to open, meaningful discussion requires us to pay in terms of . . . competing concerns."{583}

The Fourth Amendment also has implicit assumptions about the limits of technology that will soon break down, if they have not already done so.{584} The Fourth Amendment was written, debated, ratified, administered, and interpreted for its first two hundred years on the basis of the assumption that there are physical limits to the government's ability to make "reasonable" searches. Although this presumption has begun to fray in the face of technical augmentation of the public servant's ability to peer into private property,{585} the basic assumption that the police cannot be everywhere at once remains unshaken.{586} This assumption may have to change, and soon. If it does, our thinking about the Fourth Amendment will need to change with it.{587}

[Page 845]When the Bill of Rights was adopted in 1791, speech took place between persons who saw each other eye-to-eye, or who wrote letters by hand, or printed pamphlets, books, and newspapers using hand-set type. Today those forms of communication have been supplemented, and often supplanted, by electronic communications including telephones, desktop publishing, and e-mail; additionally, letters are often typed on computers before being mailed. These new media--particularly the telephone, but increasingly e-mail--are the bases of modern social and commercial relations. They play significant roles in political and cultural organizations as well.{588} Broadcasting via radio and television (including cable television) is now the dominant mode of mass communication, having long supplanted the written word. But new forms of electronic communication such as the electronic bulletin board, the Internet USENET newsgroup, and the Internet mailing list promise to revive the importance of the written word.

Under current law, a person communicating via new media is less able to ensure her privacy than were speakers in the late eighteenth century. If Thomas Jefferson wanted to speak privately to John Adams, they could go for a walk in an open field where they could see any potential eavesdroppers from a mile away.{589} Letters could be encoded with the then-unbreakable VigenŠre cipher, although this would have been a slow process and was thus rarely used.{590} In contrast, modern eavesdroppers, particularly[Page 846]wiretappers, are invisible. Strong cryptography offers the prospect of restoring the privacy enjoyed by Jefferson and Adams to anyone with a computer or a scrambler telephone, thereby making it again possible to enjoy this privacy, albeit with a larger number of correspondents spread out over greater distances.

As the preceding sections have shown, however, it is far from obvious from the Court's recent decisions that the Constitution will be read to block a future government's attempt to dampen the privacy-enhancing effects of the cryptographic revolution. Part III argued that the constitutionality of hypothetical mandatory key escrow legislation would most often turn on a balancing test in which the Supreme Court would seek to weigh security claims against privacy interests.{591} Regardless of how the Court decides to strike the balance, it will involve a process requiring decisions not compelled by any precedent. As is often the case when the law encounters new technology, the decisional law is indeterminate or at the very least distinguishable. In order to predict where the law relating to cryptography may be going and to suggest feasible alternatives, one needs to understand the concerns that are likely to influence the balance between claims asserting security and privacy interests. The remainder of this final Part looks at how this balancing of incommensurables might work.

A. Caught Between Archetypes

The protections we find in the Constitution turn in part on the horror stories and heroic legends we tell ourselves; constitutional law is indeed "haunted by archetypes."{592} Examples of archetypes in constitutional law include Chief Justice Marshall, President Lincoln, the Lochner Court, President Nixon, and the phenomenon of McCarthyism.{593} The key escrow debates have the misfortune[Page 847]to be situated at the intersection of entrenched but conflicting social/political archetypes: the totalitarian state and the conspirator.

1. Big Brother

There can be no doubt that the power of the national government has grown with every response to a national challenge, be it the Civil War, subsequent wars, the depression, or the moral, political, and practical demands of the modern welfare state. The original American constitution, the Articles of Confederation, collapsed because it was too decentralized. The replacement, our current Constitution, was bitterly opposed by a substantial minority who believed it to be an overcorrection towards centralized rule.{594} Since the adoption of the Constitution, or at least since the installation of Chief Justice Marshall, the tendency has been to ratchet power towards the center, away from states. This progression is exemplified by the evolution of the Commerce Clause. Gradually, the federal power to regulate under the Commerce Clause has come to encompass almost all economic transactions, no matter how local.{595} The evolution of the formal relationship between the central government and the individual is, however, more complex. The size and complexity of the national government's economic, legal, and regulatory powers have grown greatly, but so too (if perhaps not as quickly) have the formal legal rights of the paradigmatic citizen.{596}

Despite these developments, no sophisticated constitutional analysis is necessary to recognize that the government still lacks the authority to require that every television set sold in the United States carry with it a microphone for police to eavesdrop on[Page 848]conversations in the home.{597} The deficiencies in this proposal would not be cured by hedging the microphone's remote controls with the most elaborate safeguards and requiring careful judicial review before activating any of the devices. The very idea is, fortunately, laughable, so much so that it is hard even to imagine any government official proposing it.{598}

Similarly, it is hard to imagine that a statute designed to ease surreptitious entry by the police, requiring every citizen to give the government a set of keys to her house, would survive even cursory judicial review.{599} These hypothetical statutes require so little analysis because they immediately evoke George Orwell's 1984.{600} Big Brother and his thought police provide a vivid archetype of state overintrusion into private life.{601}

Vivid as the Orwellian archetype may be, it is far from all-powerful, as demonstrated by the large number of dissenting opinions vainly invoking it.{602} It may be that mandatory key[Page 849]escrow will produce the same public outcry as the wiretap-ready TV set{603} or a telephone that can be turned into a bugging device even when on the hook.{604} It should. And if it does, half of this Article is an exercise in pedantic overcaution, and the fact that the state of the law produces a need for such caution is a deeply damning indictment of the Burger/ Rehnquist Court's privacy jurisprudence. For if it is obvious from the Zeitgeist that mandatory key escrow is impossible, yet far from obvious from the relevant cases, then the cases are revealed as being significantly more state-oriented and illiberal than what "society is prepared to recognize as `reasonable.'"{605}

Even overcaution has its place. The spirit of the times is always subject to change. As a result, we have a human court to interpret the Constitution in light of changing conditions.{606} Interpreters of the Constitution are unable to be completely insensitive to the felt necessities of the times, whether consciously or not. The decision about the constitutionality of mandatory key escrow would be no exception to this rule. The same dynamic that produced the facts of Korematsu v. United States and the decision itself might arise again,{607} especially if those necessities are felt strongly by officials gripped by a sense of insecurity or danger.{608} "Collectively we[Page 850]face no greater challenge than maintaining sensible perspectives on national security issues," but we sometimes fail the test.{609} One need not believe that the executive is inevitably repressive or that the judiciary is inevitably supine to recognize that both of these tendencies can be found in our nation's history, and that we therefore cannot rule out their recurrence with total confidence.


2. The Conspirator

Cryptography is the conspirator's ideal tool. This fact, more than anything else, will provide the emotional (if not the legal) justification for any attempt to control the use of unescrowed cryptography. Anxiety that people will be able to do terrible things without being detected until it is too late has been a recurring worry since the Puritans colonized North America.{610}

Given the public opposition to Clipper,{611} the government is unlikely to propose mandatory key escrow without some triggering event. In the wake of a great crime, perhaps by terrorists or drug cartels--the detection of which could plausibly have been frustrated by encryption--that which today looks clearly unconstitutional might unfortunately appear more palatable.{612} Suppose, for example,[Page 851]that Senator McCarthy had been able to demonstrate in 1952 that Communists were using strong encryption to protect their secrets. It is not hard to believe that some form of key escrow or an outright ban on cryptography would have been proposed, if not adopted. Big Brother may yet look more comforting than the reigning criminal archetypes.

a. Panics Over Plotters

The fear that two or more persons may unite in common cause to carry out an unlawful or reprehensible plot against a social community and its privileged ideals is an archetypical American concern.{613} The real or imagined conspirators have varied, being alternately foreign, domestic, or an unholy alliance of the two.{614} The fear of conspirators is not a recent phenomena dating back to the McCarthy era, but rather is rooted in the Puritan jeremiad about the dangers of succumbing to Satanic, Catholic, or nonconformist [Page 852]conspiracies. "In a nation in which every man is supposed to be on the make, there is an overriding fear of being taken in."{615} Fear of conspiracy is hardly unique to America,{616} although "Americans have been curiously obsessed with the contingency of their experiment with freedom."{617} The fear of conspiracy in America is a subject so vast that no small sketch can do it justice.

The seventeenth-century Puritan colonists of New England worried about conspiracies among Indians, Quakers, witches, and the (Catholic) French, all of whom threatened the new Israel, and in so doing also threatened to prevent the fulfillment of the millennial vision that informed those communities' founding religious vision.{618} When their relations with England soured, the colonists blamed imperialistic conspiracies they believed were aiming to destroy their liberties.{619}

In the eyes of the victors, independence only made the new nation a more attractive target to its enemies. George Washington's instantly canonical Farewell Address sounded the theme, warning of the danger posed to the American nation by secret enemies. To President Washington, it was "easy to foresee that from different causes and from different quarters much pains [would] be taken, many artifices employed, to weaken" the American commitment to its new nation. Commitment to the American experiment was precarious, vulnerable, and thus would be "the point in your political fortress against which the batteries of internal and external enemies will be most constantly and actively" directing their energies, "though often covertly and insidiously."{620} The diversity of the American people, with widely varying ancestries, differing [Page 853]sects and creeds, and different experiences depending on class and region, served to make the nation even more vulnerable to "faction" and conspiracy.{621}

Indeed, New England was soon gripped by a panic that the (mythical) Bavarian Illuminati, a secret, French-controlled, atheistic, antidemocratic cabal, was conspiring to undermine American liberty and religion. Despite the absence of any extant Bavarian Illuminati, many believed that the United States was in grave danger and "the vast majority of New England Federalists accepted the conspiracy charges as entirely plausible, if not completely proven."{622} The evils of the Terror in post-Revolutionary France only served to confirm the awesome power of conspirators, for only a vast conspiracy could explain the otherwise bewildering series of events.{623} The image of the Terror, and the Masonic or Jacobean conspirators behind it, was one of the themes sounded to justify the Alien and Sedition Acts.{624}

A related, if less sanguinary, imagery dominated the attack on the Second Bank of the United States, an institution that Jacksonian Democrats viewed as a secretive "hydra of corruption" designed to favor the rich against the majority of the country.{625} Here, perhaps for the first time, the conspiracy was understood to be home-grown, if dominated by "aristocratic" elements fundamentally alien in spirit to the American popular democracy desired by the Jacksonians.

In the decades before the Civil War, as the threat of foreign military invasion receded, Americans were gripped by the threat of vast shadowy conspiracies in which various groups, including [Page 854]Freemasons, Mormons, or Catholics, plotted secretly to subvert the American (Protestant) way of life.{626} The American commitment to openness meant that any organization that was not itself open, that held secret meetings or, worse, had secret rituals, was not just suspect, but threatening.{627} The Civil War itself came to be portrayed as an apocalyptic battle between the forces of freedom and a conspiratorial "Slave Power."{628}

Post-Civil War industrialization provided the environment for a redefinition and bifurcation of the nature of the conspiracy, one which persisted until the First World War. On the one hand, there was the conspiracy of labor organizations, be it the International Workers of the World, the Socialist International, or the beginning of the American union movement. An illustrative example was the reaction to the Haymarket Riot of 1886, in which Chicago workers battled police, and which culminated in the explosion of a dynamite bomb that was widely ascribed to anarchists. Convictions were returned by a jury made up of persons who admitted prejudice against the defendants, and whom the judge charged to convict if "there was a conspiracy to overthrow the existing order of society" and that the defendants and the bomb-thrower, whoever he might be, were parties to it.{629} Others, notably the Progressives, focused on what they perceived was the conspiracy among corporations, trusts and a small cabal built on wealth and privilege{630} designed, they thought, to wrest control of the economy and thus undermine the democratic process.{631} The entry of the United States into the[Page 855]First World War shortly after President Wilson's promise to stay out of it, combined with Communism's triumph in Russia, unleashed an orgy of antisubversive activity, although the distinction from simple nativism was not always clear.{632}

Late-twentieth-century anti-Communist antisubversion is a topic all of its own, spanning McCarthyism,{633} loyalty oaths,{634} and a large number of important civil liberties decisions, notably those alternately expanding and contracting the protections of the First Amendment.{635} The low water mark, achieved in Dennis v. United States,{636} amounted to the criminalization of "any radical political doctrine."{637} Recently, in a climate of lessened insecurity, the courts have been considerably more willing to allow a wide range of radical speech.{638} The important points for present purposes are[Page 856]that, although one could debate what constitutes the norm, decisions significantly curtailing civil liberties are far from unique and that these decisions are often driven by a fear of criminal or subversive plotters, a fear with deep roots in our culture. Given an appropriate trigger, it is entirely possible that a similar dynamic could apply to the regulation of cryptography.

b. Modern Incarnations: The Drug Kingpin and the Terrorist

Today's most significant criminal archetypes are the drug kingpin and the terrorist. Perhaps because criminal, anarchist, and terrorist archetypes arise from events rather than literature, there is no single figure or movement with the evocative power of Big Brother, now that the international communist conspiracy has left the anxiety closet and joined the Wobblies and the Jacobins in the care of the History Department. Jack the Ripper, the prototypical serial killer, may be the closest thing to a threatening criminal archetype that has lasted more than two generations, although Al Capone, Charles Manson, and the urban gang member all have achieved some near-mythic status as well.

What criminal archetypes lack in longevity, they make up in menace. At least until his capture, the terrorist archetype for many years was Carlos the Jackal.{639} Carlos's capture, coming as it does on the heels of the collapse of any credible international communist movement, may create a small window of opportunity for privacy activists to seek legislative or judicial ratification for their argument that Big Brother is a greater menace. This window may not be open for long.{640}

[Page 857]The "War on Drugs" proclaimed by President Ronald Reagan in 1982 and enthusiastically endorsed by Presidents Bush and Clinton may be our "longest war."{641} "Refusing to shoulder" the "unbearable burden" of communities "devastated" by drugs, "Americans have given the government a mandate to eliminate the scourge before its effects become irrevocable."{642} Champions of the War on Drugs claim "almost universal acceptance [of the notion] that the drug problem is `the worst disease that plagues our nation today.'"{643} Notably, "[b]y the mid 1980s . . . anti-drug sentiment encompassing even casual use became a national cause."{644}

Likewise, fear of the drug kingpin quickly reached Congress, which reacted first by passing the continuing criminal enterprise statute, better known as the drug kingpin statute, imposing long mandatory minimum sentences.{645} When that was not enough, Congress passed a statute permitting the death penalty in drug cases connected to a killing.{646} Along the way, Congress made attempting to be a drug kingpin and conspiring with a drug kingpin punishable by the same penalty as the offense itself.{647}

With Congress and the Executive in such agreement, it is no surprise that the War on Drugs is a major social phenomenon, having criminalized behavior engaged in by somewhere between fourteen and twenty-three million Americans per year.{648} Experts[Page 858]recently began to study the war's longer-term effects, including the incarceration of hundreds of thousands of persons, clogged courts, corrupt police officers and corrupt judges, and a disproportionate impact on African-American males (and, through them, on their families).{649} The War on Drugs has achieved these and other dubious results through the expedient of demonizing the drug user, the drug "pusher," and especially the drug "kingpin."{650}

The fear of drug trafficking puts great pressure on the police. The mutually consensual nature of the drug crime requires a special type of police work because "law enforcement lacks its staunchest ally, the victim,"{651} who might report the crime and testify against the perpetrator. As a result, the police are driven to use surveillance, wiretapping, and informants because they have little else upon which to rely.{652} In 1993, about two-thirds of the court-ordered wiretaps were for drug-related offenses.{653} A similar dynamic has stimulated the expansion of surveillance into the workplace.{654}

The attempt to control drug trafficking also puts pressures on the courts that go beyond increasing caseloads. The War on Drugs creates pressure to support efforts to eradicate the drug "plague." The results of such pressure include Supreme Court descriptions of drug traffickers as "sophisticated criminal syndicates" that create[Page 859]an unprecedented obstacle for law enforcement.{655} In addition, the antidrug crusade has had a major impact on the Fourth Amendment: since President Reagan declared the War on Drugs, the government has prevailed in nearly every search and seizure case before the Supreme Court.{656}

As James Boyd White points out in his analysis of Chief Justice Taft's majority opinion in Olmstead v. United States,{657} the "organization, scale, enterprise, and success" of a criminal enterprise can become the occasion for a morality tale in which the government represents good struggling against the forces of evil.{658} In the context of actions that can be painted as enormous threats, constitutional texts like the Fourth Amendment can be made to seem irrelevant.{659} The implication for mandatory key escrow is obvious: the more closely the purposes of a statute are aligned with control of drugs or terrorism, and especially the more closely the facts of a test case conform to the apprehension of an archetypical evildoer, the less chance it will be declared unconstitutional.{660}


To table of contents