The Cyphernomicon

16. Crypto Anarchy

16.1. copyright
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
1994-09-10, Copyright Timothy C. May. All rights reserved.
See the detailed disclaimer. Use short sections under «fair
use» provisions, with appropriate credit, but don’t put your
name on my words.

16.2. SUMMARY: Crypto Anarchy
16.2.1. Main Points

  • «…when you want to smash the State, everything looks like
    a hammer.»
  • strong crypto as the «building material» for cyberspace
    (making the walls, the support beams, the locks)
    16.2.2. Connections to Other Sections
  • this section ties all the other sections together
    16.2.3. Where to Find Additional Information
  • again, almost nothing written on this
  • Vinge, Friedman, Rand, etc.
    16.2.4. Miscellaneous Comments
  • a very long section, possibly confusing to many

16.3. Introduction
16.3.1. «The revolution will not be televised. The revolution will,
however, be digitized.» Welcome to the New Underworld Order!
(a term I have borrowed from writer Claire Sterling.)
16.3.2. «Do the views here express the views of the Cypherpunks as a
whole?»

  • This section is controversial. Hence, even more warnings
    than usual about being careful not to confuse these
    comments with the beliefs of all or even most Cypherpunks.
  • In fairness, libertarianism is undeniably the most
    represented ideology on the list, as it is in so much of
    the Net. The reasons for this have been extensively debated
    over the years, but it’s a fact. If other major ideologies
    exists, they are fairly hidden on the Cypherpunks list.
  • Yes, some quasi-socialist views are occasionally presented.
    My friend Dave Mandl, for example, has at times argued for
    a less-anarchocapitalist view (but I think our views are
    actually fairly similar…he just has a different language
    and thinks there’s more of a difference than their actually
    is–insert smiley here).
  • And several Cypherpunks who’ve thought about the issues of
    crypto anarchy have been disturbed by the conclusions that
    seem inevitable (markets for corporate information,
    assassianation made more liquid, data havens, espionage
    made much easier, and other such implications to be
    explored later in this section).
  • So, take this section with these caveats.
  • And some of the things I thing are inevitable, and in many
    cases positive, will be repugnant to some. The end of
    welfare, the end of subsidies of inner city breeders, for
    example. The smashing of the national security state
    through digital espionage, information markets, and
    selective assassinations are not things that everyone will
    take comfort in. Some may even call it illegal, seditious,
    and dangerous. So be it.
    16.3.3. «What are the Ideologies of Cyperpunks?»
  • I mentioned this in an earlier section, but now that I’m discussing «crypto anarchy» in detail it’s good to recap some points about the ideology of Cypherpunks.
    • an area fraught with dangers, as many Cypherpunks have
      differing views of what’s important
  • Two main foci for Cypherpunks:
    • Personal privacy in an increasingly watchful society
    • Undermining of states and governments
  • Of those who speak up, most seem to lean toward the
    libertarian position, often explicitly so (libertarians
    often are to be found on the Internet, so this correlation
    is not surprising)
  • Socialists and Communitarians
    • Should speak up more than they have. Dave Mandl is the
      only one I can recall who’s given a coherent summary of
      his views.
  • My Personal Outlook on Laws and Ideology:
    • (Obviously also scattered thoughout this document.)
    • Non-coercion Principle
    • avoid initiation of physical aggression
    • «to each his own» (a «neo-Calvinist» perspective of
      letting each person pick his path, and not interfering)
    • I support no law which can easily be circumvented.
      (Traffic laws are a counterexample…I generally agree
      with basic traffic laws….)
    • And I support no law I would not personally be willing to
      enforce and punish. Murder, rape, theft, etc, but not
      «victimless crimes, » not drug laws, and not 99.9998% of
      the laws on the books.
    • Crypto anarchy is in a sense a throwback to the pre-state
      days of individual choice about which laws to follow. The
      community exerted a strong force.
    • With strong crypto («fortress crypto,» in law enforcement
      terms), only an intrusive police state can stop people
      from accessing «illegal» sites, from communicating with
      others, from using «unapproved» services, and so on. To
      pick one example, the «credit data haven» that keeps any
      and all financial records–rent problems from 1975,
      bankruptcy proceedings from 1983, divorce settlements,
      results from private investigators, etc. In the U.S.,
      many such records are «unusable»: can’t use credit data
      older than 7 years (under the «Fair Credit Reporting
      Act»), PI data, etc. But if I am thinking about lending
      Joe Blow some money, how the hell can I be told I can’t
      «consider» the fact that he declared bankruptcy in 1980,
      ran out on his debts in Haiti in 1989, and is being sued
      for all his assets by two ex-wives? The answer is simple:
      any law which says I am not allowed to take into account
      information which comes my way is flawed and should be
      bypassed. Dialing in to a credit haven in Belize is one
      approach–except wiretaps might still get me caught.
      Cyberspace allows much more convenient and secure
      bypasses of these laws.
  • (For those of you who think such bypasses of laws are
    immoral, tough. Strong crypto allows this. Get used to it.)
    16.3.4. Early history of crypto anarchy
  • 1987-8, AMIX, Salin, Manifesto
    • discussed crypto implications with Phil Salin and Gayle
      Pergamit, in December of 1987
    • with a larger group, including Marc Stiegler, Dave Ross,
      Jim Bennett, Phil Salin, etc., in June 1988.
    • released «The Crypto Anarchist Manifesto» in August 1988.
  • Fen LaBalme had «Guerillan Information Net» (GIN), which he
    and I discussed in 1988 at the Hackers Conference
  • «From Crossbows to Cryptography,» 1987?
    • made similar points, but some important differences
  • TAZ also being written at this time

16.4. The Crypto Anarchist Manifesto
16.4.1. Unchanged since it’s writing in mid-1988, except for my e-
mail address.

  • There are some changes I’d make, but…
  • It was written quickly, and in a style to deliberately
    mimic what I remembered of the «Communist Manifesto.» (for
    ironic reasons)
  • Still., I’m proud that more than six years ago I correctly
    saw some major points which Cypherpunks have helped to make
    happen: remailers, anonymous communictation, reputation-
    based systems, etc.
  • For history’s sake, here it is:
    16.4.2. The Crypto Anarchist Manifesto Timothy C. May
    tcmay@netcom.com A specter is haunting the modern world, the specter of crypto
    anarchy. Computer technology is on the verge of providing the ability
    for individuals and groups to communicate and interact with
    each other in a totally anonymous manner. Two persons may
    exchange messages, conduct business, and negotiate electronic
    contracts without ever knowing the True Name, or legal
    identity, of the other. Interactions over networks will be
    untraceable, via extensive re-routing of encrypted packets
    and tamper-proof boxes which implement cryptographic
    protocols with nearly perfect assurance against any
    tampering. Reputations will be of central importance, far
    more important in dealings than even the credit ratings of
    today. These developments will alter completely the nature of
    government regulation, the ability to tax and control
    economic interactions, the ability to keep information
    secret, and will even alter the nature of trust and
    reputation. The technology for this revolution–and it surely will be
    both a social and economic revolution–has existed in theory
    for the past decade. The methods are based upon public-key
    encryption, zero-knowledge interactive proof systems, and
    various software protocols for interaction, authentication,
    and verification. The focus has until now been on academic
    conferences in Europe and the U.S., conferences monitored
    closely by the National Security Agency. But only recently
    have computer networks and personal computers attained
    sufficient speed to make the ideas practically realizable.
    And the next ten years will bring enough additional speed to
    make the ideas economically feasible and essentially
    unstoppable. High-speed networks, ISDN, tamper-proof boxes,
    smart cards, satellites, Ku-band transmitters, multi-MIPS
    personal computers, and encryption chips now under
    development will be some of the enabling technologies. The State will of course try to slow or halt the spread of
    this technology, citing national security concerns, use of
    the technology by drug dealers and tax evaders, and fears of
    societal disintegration. Many of these concerns will be
    valid; crypto anarchy will allow national secrets to be trade
    freely and will allow illicit and stolen materials to be
    traded. An anonymous computerized market will even make
    possible abhorrent markets for assassinations and extortion.
    Various criminal and foreign elements will be active users of
    CryptoNet. But this will not halt the spread of crypto
    anarchy. Just as the technology of printing altered and reduced the
    power of medieval guilds and the social power structure, so
    too will cryptologic methods fundamentally alter the nature
    of corporations
    and of government interference in economic transactions.
    Combined with emerging information markets, crypto anarchy
    will create a liquid market for any and all material which
    can be put into words and pictures. And just as a seemingly
    minor invention like barbed wire made possible the fencing-
    off of vast ranches and farms, thus altering forever the
    concepts of land and property rights in the frontier West, so
    too will the seemingly minor discovery out of an
    arcane branch of mathematics come to be the wire clippers
    which dismantle the barbed wire around intellectual property. Arise, you have nothing to lose but your barbed wire fences!

16.5. Changes are Coming
16.5.1. Technology is dramatically altering the nature of
governments.

  • It may sound like newage trendiness, but strong crypto is
    «technological empowerment.» It literally gives power to
    individuals. Like Sam Colt, it makes them equal.
  • «Politics has never given anyone lasting freedom, and it
    never will. Anything gained through politics will be lost
    again as soon as the society feels threatened. If most
    Americans have never been oppressed by the government
    (aside from an annual mugging) it is because most of them
    have never done anything to threaten the government’s
    interests.» [Mike Ingle, 1994-01-01]
  • Thesis: Strong crypto is a good thing
    • tool against governments of all flavors, left and right
    • religious freedom
    • personal choice
      16.5.2. Dangers of democracy in general and electronic democracy in
      particular
  • mob rule, rights of minority ignored
  • too many things get decided by vote that have no business
    being voted on
  • «don’t tax me…», De Tocqueville’s warning
  • electronic democracy is even worse
    • moves further from republican, representative system to
      electronc mob rule
    • too rapid a system
    • Detweiler’s «electrocrasy» (spelling?)…brain-damaged,
      poorly thought-out
      16.5.3. The collapse of democracy is predicted by many
  • the «tipping factor» exceeded, with real taxation rates at
    50% or more in most developed countries, with conditions of
    «taxation without representation» far beyond anything in
    American colonial times
    • with professional politicians…and mostly millionaires
      running for office
    • the Cincinnatus (sp?) approach of going into government
      just for a few years, then returning to the farm or
      business, is a joke
  • rise of nominalism [argued by James Donald]
    • «After Athenian democracy self destructed, the various
      warring parties found that they could only have peace if
      they disowned omnipotent government. They put together a
      peace agreement that in part proclaimed limits to
      government, in part acknowledged inherent limits to what
      was proper for governments to do and in part guaranteed
      that the government would not go beyond what it was
      proper for government to do, that the majority could not
      do as it pleased with the minority, that not any act of
      power was a law, that law was not merely whatever the
      government willed. They did not agree on a constitution but agreed to
      respect an unwritten constitution that already existed in
      some sense. A similar arrangement underlies the American constitution
      (now defunct) and the English declaration of right (also
      defunct) The problem with such formal peace agreements is that
      they can only be put together after government has
      substantially collapsed. Some of us wish to try other
      possibilities in the event of collapse. The American constitution collapsed because of the rise
      of nominalist theories «The constitution says whatever
      the courts say that it says.» [James Donald, 1994-08-31]
  • War on Drugs, conspiracy charges, random searches,
    emergency preparedness orders (Operation Vampire Killer,
    Operation Night Train, REX-84). The killings of more than a
    dozen reporters and tipsters over the past decade, many of
    them covering the Iran-Contra story, the drug deals, the
    CIA’s dealings…the Farm appears to be «swamping» more and
    more of these troublemakers in the headlong march toward
    fascism.
  • De Tocqueville’s warning that the American experiment in
    democracy would last only until voters discovered they
    could pick the pockets of others at the ballot box
    • a point reached about 60 years ago
    • (prior to the federal income tax and then the «New Deal,»
      there were systemic limitations on this ability to the
      pockets of others, despite populist yearnings by
      some….after the New Deal, and the Great Society, the
      modern era of runaway taxation commenced.)
      16.5.4. Depredations of the State
  • «Discrimination laws»..choice no longer allowed
    • the strip club in LA forced to install wheelchair access-
      -for the dancers!
    • age no longer allowed to be a factor…gag!
  • democracy run rampant….worst fears of Founders
    • votes on everything…
  • gun control, seizures, using zoning laws (with FFL
    inspections as informants)
  • welfare state,…Murray, inner cities made worse…theft
  • «currency export» laws…how absurd that governments
    attempt to control what folks do with their own money!
    16.5.5. Things are likely to get worse, financially (a negative
    view,though there are also reasons to be optimistic)
  • a welfare state that is careening toward the edge of a
    cliff…escalating spending, constantly increasing national
    debt (with no signs that it will ever be paid down)
    • pension burdens are rising dramatically, according to
      «Economist», 1994-08.
  • the link to crypto is that folks had better find ways to
    immunize themselves from the coming crunch
  • Social Security, other pension plans are set to take 30-40%
    of all GDP
    • too many promies, people living longer
    • estimate: $20 trillion in «unfunded liabilities»
  • health care expectations… growing national debt
    16.5.6. Borders are becoming transparent to data…terabytes a day
    are flowing across borders, with thousands of data formats
    and virtually indistinguishable from other messages.
    Compressed files, split files, images, sounds, proprietary
    encryption formats, etc. Once can almost pity the NSA in
    the hopelessness of their job.

16.6. Free Speech and Liberty–The Effects of Crypto
16.6.1. «What freedom of speech is becoming.»

  • An increased willingness to limit speech, by attaching restrictions based on it being «commercial» or «hate speech.»
    • advertising laws being the obvious example: smoking,
      alcohol, etc.
    • doctors, lawyers, etc.
    • sex, nudity
    • even laws that say billboards can’t show guns
  • A chilling but all too common sentiment on the Net is shown
    by this quote: «Is it freedom of speech to spew racism ,
    and steriotypes, just because you lack the intellectual
    capacity to comprehend that , perhaps, somewhere, there is
    a different way of life, which is not congruent with your
    pre-conceived notions?» [Andrew Beckwith, soc.culture.usa]
    16.6.2. We don’t really have free speech
  • election laws
  • advertising laws
  • «slander» and «libel»
    • thankfully, anonymous systems will make this moot
  • permission needed…licensing, approval, certification
    • «qualifications»
    • granted, Supremes have made it clear that political
      comments cannot be restricted, but many other areas have
    • often the distinction involves ‘for pay»
  • Perhaps you are thinking that these are not really examples
    of government censorship, just of other crimes and
    other rights taking precedence. Thus, advertisers can’t
    make false or misleading claims, and can’t advertise
    dangerous or otherwise unapproved items. And I can’t make
    medical diagnoses, or give structural and geological
    advice, and so on…a dozen good examples. But these
    restrictions emasculate free speech, leaving only banal
    expression of appropriately-hedged «personal opinions» as
    the free speech that is allowed…and even that is ofen
    subject to crazy lawsuits and threats of legal action.

16.7. The Nature of Anarchies
16.7.1. Anarchy doesn’t mean chaos and killing

  • As J. Bruce Dawson put it in a review of Linux in the
    September, 1994 «Byte,» «It’s anarchy at its best.»
  • Ironically, crypto anarchy does admit the possibility (and hence probablility) of more contract killings as an ultimate enforcement mechanism for contracts otherwise unenforceable.
    • which is what is occurring in drug and other crime
      situaions: the parties cannot go to the police or courts
      for righting of wrongs, so they need to have the ultimate
      threat of death to enforce deals. It makes good sense
      from a reputation/game theory point of view.
      16.7.2. Leftists can be anarchists, too
  • In fact, this tends to be the popular interpretation of
    anarchy. (Besides the bomb-throwing, anti-Tsar anarchists
    of the 19th century, and the bomb-throwing anarchists of
    the U.S. early this century.)
  • «Temporary Autonomous Zones» (TAZ)
    • Hakim Bey (pseudonym for )
    • Mondo 2000, books, (check with Dave Mandl, who helps to
      publish them)
      16.7.3. Anarchic development
  • Markets and emergent behaviors vs. planned development
    • principles of locality come into play (the local players
      know what they want and how much they’ll pay for it)
    • central planners have «top-down» outlooks
    • Kevin Kelley’s «Out of Control» (1994). Also, David
      Friedman’s «Technologies of Freedom.»
  • An example I heard about recently was Carroll College, in
    Wisconsin. Instead of building pathways and sidewalks
    across the newly-constructed grounds, the ground was left
    bare. After some time, the «emergent pathways» chosen by
    students and faculty were then turned into paved pathways,
    neatly solving the problem of people not using the
    «planned» pathways. I submit that much of life works this
    way. So does the Net (the «information footpaths»?).
  • anarchies are much more common than most people
    think…personal relationships, choices in life, etc.
    16.7.4. The world financial system is a good example: beyond the
    reach of any single government, even the U.S. New World
    Order, money moves and flows as doubts and concerns appear.
    Statist governments are powerless to stop the devaluation of
    their currencies as investors move their assets (even slight
    moves can have large marginal effects).
  • «anarchy» is not a term most would apply, but it’s an
    anarchy in the sense of there being no rulers («an arch»),
    no central command structure.

16.8. The Nature of Crypto Anarchy
16.8.1. «What is Crypto Anarchy?»

  • «Why the name?»
    • a partial pun on several things»
    • «crypto,» meaning «hidden,» as used in the term «crypto
      fascist» (Gore Vidal called William F. Buckley this)
    • «crypto anarchy» meaning the anarchy will be hidden,
      not necessarily visible
    • and of course cryptology is centrally invovled
  • Motivation
    • Vernor Vinge’s «True Names»
    • Ayn Rand was one of the prime motivators of crypto
      anarchy. What she wanted to do with material technology
      (mirrors over Galt’s Gulch) is much more easily done
      with mathematical technology.
      16.8.2. «Anarchy turns people off…why not a more palatable name?»
  • people don’t understand the term; if people understood the
    term, it might be more acceptable
  • some have suggested I call it «digital liberty» or
    somesuch, but I prefer to stick with the historical term
    16.8.3. Voluntary interactions involve Schelling points, mutually-
    agreed upon points of agreement
    16.8.4. Crypto anarchy as an ideology rather than as a plan.
  • Without false modesty, I think crypto anarchy is one of the
    few real contributions to ideology in recent memory. The
    notion of individuals becoming independent of states by
    bypassing ordinary channels of control is a new one. While
    there have been hints of this in the cyberpunk genre of
    writing, and related areas (the works of Vinge especially),
    the traditional libertarian and anarchist movements have
    mostly been oblivious to the ramifications of strong
    crypto.
  • Interestingly, David Friedman, son of Milton and author of
    «The Machinery of Freedom,» became a convert to the ideas.
    At least enough so as to give a talk in Los Angeles
    entitles «Crypto Anarchy and the State.»
  • Conventional political ideology has failed to realize the
    huge changes coming over the next several decades.
    Focussing on unwinnable battles at the ballot box, they
    fritter away their energies; they join the political
    process, but they have nothing to «deal» with, so they
    lose. The average American actually wants to pick the
    pockets of his neighbors (to pay for «free» health care, to
    stop companies from laying-off unneeded workers, to bring
    more pork back to the local enonomy), so the average voter
    is highly unlikely to ever vote for a prinicpled
    Libertarian candidate.
  • Fortunately, how people vote has little effect on certain
    «ground truths» that emerge out of new technologies and new
    economic developments.

16.9. Uses of Crypto Anarchy
16.9.1. Markets unfettered by local laws (digital black markets, at
least for items that can be moved through cyberspace)
16.9.2. Espionage

16.10. The Implications-Negative and Positive-of Crypto Anarchy
16.10.1. «What are some implications of crypto anarchy?»

  • A return to contracts
    • whiners can’t go outside contracts and complain
    • relates to: workers, terms of employment, actions, hurt
      feelings
    • with untraceable communication, virtual networks….
  • Espionage
    • Spying is already changing dramatically.
    • Steele’s (or Steeler?) «open sources»
      • collecting info from thousands of Internet sources
    • Well, this cuts both ways..
    • Will allow:
    • BlackNet-type solicitations for military secrets («Will
      pay $300,000 for xxxx»)
    • Digital Dead Drops
      • totally secure, untraceable (pools, BlackNet mode)
      • no Coke cans near the base of oak trees out on Route
        42
      • no chalk marks on mailboxes to signal a message is
        ready
      • no «burning» of spies by following them to dead drops
      • No wonder the spooks are freaked out!
    • Strong crypto will also have a major effect on NSA, CIA,
      and FBI abilities to wiretap, to conduct surveillance,
      and to do domestic and foreign counterintelligence
    • This is not altogether a great thing, as there may be
      some counterintelligence work that is useful (I’m
      perhaps betraying my lingering biases), but there’s
      really only one thing to say about it: get used to it.
      Nothing short of a totalitarian police state (and
      probably not even that, given the spread of strong
      crypto) can stop these trends.
  • Bypassing sanctions and boycotts
    • Just because Bill Clinton doesn’t like the rulers of
      Haiti is no reason for me to honor his «sanctions»
    • Individual choice, made possible by strong crypto
      (untraceable transactions, pseudonyms, black markets)
  • Information Markets and Data Havens
    • medical
    • scientific
    • corporate knowledge
    • dossiers
    • credit reports
    • without the absurd rules limiting what people can store
      on their computers (e.g., if Alice keeps records going
      back more than 7 years, blah blah, can be thrown in
      jail for violating the «Fair Credit Reporting Act»)
    • bypassing such laws
    • true, governments can attempt to force disclosure of
      «reasons» for all decisions (a popular trend, where
      even one’s maid cannot be dismissed without the
      «reasons» being called into question!); this means that
      anyone accessing such offshore (or in cyberspace…same
      difference) data bases must find some acceptable reason
      for the actions they take…shouldn’t be too hard
    • (as with so many of these ideas, the beauty is that the
      using of such services is voluntary….)
  • Consulting
    • increased liquidity of information
    • illegal transactions
    • untraceability and digital money means many «dark» possibilities
      • markets for assassinations
      • stolen property
      • copyright infringement
  • Espionage
    • information markets (a la AMIX)
    • «digital dead drops»
  • Offshore accounts
  • Money-laundering
  • Markets for Assassinations
    • This is one of the more disturbing implications of crypto
      anarchy. Actually, it arises immediately out of strong,
      unbreakable and untraceable communication and some form
      of untraceable digital cash. Distrurbing it may be, but
      the implications are also interesting to consider…and
      inevitable.
    • And not all of the implications are wholly negative.
    • should put the fear of God into politicians
    • «Day of the Jackal» made electronic
    • any interest group that can (anonymously) gather money
      can have a politician zapped. Positive and negative
      implications, of course.
    • The fact is, some people simply need killing. Shocking as
      that may sound to many, surely everyone would agree that
      Hitler deserved killing. The «rule of law» sounds noble,
      but when despicable people control the law, other
      measures are called for.
    • Personally, I hold that anyone who threatens what I think
      of as basic rights may need killing. I am held back by
      the repercussions, the dangers. With liquid markets for
      liquidations, things may change dramatically.
      16.10.2. The Negative Side of Crypto Anarchy
  • Comment:
    • There are some very real negative implications;
      outweighed on the whole by the benefits. After all, free
      speech has negatives. Poronography has negatives. (This
      may not be very convincing to many….I can’t do it here-
      -the gestalt has to be absorbed and considered.)
  • Abhorrent markets
    • contract killings
    • can collect money anonymously to have someone
      whacked…nearly anyone who is controversial can generate
      enough «contributions»
    • kidnapping, extortion
  • Contracts and assassinations
    • «Will kill for $5000»
    • provides a more «liquid» market (pun intended)
    • sellers and buyers more efficiently matched
    • FBI stings (which are common in hiring hit men) are
      made almost impossible
    • the canonical «dark side» example–Eric Drexler, when
      told of this in 1988, was aghast and claimed I was
      immoral to even continue working on the implications of
      crypto anarchy!
    • made much easier by the inability to trace payments, the
      lack of physical meetings, etc.
  • Potential for lawlessness
    • bribery, abuse, blackmail
    • cynicism about who can manipulate the system
  • Solicitation of Crimes
    • untraceably, as we have seen
  • Bribery of Officials and Influencing of Elections
    • and direct contact with officials is not even
      needed…what if someone «lets it be known» that a
      council vote in favor of some desired project will result
      in campaign contributions?
  • Child molestors, pederasts, and rapists
    • encrypting their diaries with PGP (a real case, says the
      FBI)
    • this raises the privacy issue in all its glory…privacy
      protects illegality…it always has and it always will
  • Espionage is much easier
    • from the guy watching ships leave a harbor to the actual
      theft of defense secrets
    • job of defending against spies becomes much more
      difficult: and end to microdots and invisible ink, what
      with the LSB method and the like that even hides the very
      existence of encrypted messages!
  • Theft of information
    • from corporations and individuals
    • corporations as we know them today will have to change
    • liquidity of information
    • selling of corporate secrets, or personal information
  • Digilantes and Star Chambers
    • a risk of justice running amok?
    • Some killers are not rehabilitated and need to be
      disposed of through more direct means
    • Price, Rhode Island, 21, 4 brutal killings
      • stabbings of children, mother, another
    • for animals like this, vigilantism…discreet execution…is justified…
      • or, at least some of us will consider it justified
      • which I consider to be a good thing
    • this relates to an important theme: untraceable
      communication and markets means the ability to «opt
      out» of conventional morality
  • Loss of trust
    • even in families, especially if the government offers
      bounties and rewards
    • recall Pavel Morozov in USSR, DARE-type programs
      (informing on parents)
    • more than 50% of all IRS suits involve one spouse
      informing to the IRS
  • how will taxes be affected by the increased black market?
    • a kind of Laffer curve, in which some threshold of
      taxation triggers disgust and efforts to evade the taxes
    • not clear how large the current underground economy
      is….authorities are motivated to misstate the size
      (depending on their agenda)
  • Tax Evasion (I’m not defending taxation, just pointing out what most would call a dark side of CA)
    • By conducting business secretly, using barter systems,
      alternative currencies or credit systems, etc.
    • a la the lawyers who use AMIX-like systems to avoid
      being taxed on mutual consultations
    • By doing it offshore
    • so that the «products» are all offshore, even though
      many or most of the workers are telecommuting or using
      CA schemes
    • recall that many musicians left Europe to avoid 90% tax
      rates
    • the «nest egg» scam: drawing on a lump sum not reported
    • Scenario: Alice sells something very valuable-perhaps the specs on a new product-to Bob. She deposits the fee, which is, say, a million dollars, in a series of accounts. This fee is not reported to the IRS or anyone else.
      • the fee could be in cash or in a «promise»
      • in multiple accounts, or just one
      • regardless, the idea is that she is now paid, say,
        $70,000 a year for the next 20 years (what with
        interest) as a «consultant» to the company which
        represents her funds
      • this of course does not CA of any form, merely some
        discreet lawyers
      • and of course Alice reports the income to the
        IRS-they never challenge the taxpayer to «justify»
        work done (and would be incapable of «disallowing»
        the work, as Alice could call it a «retainer,» or
        as pay for Board of Directors duties, or
        whatever…in practice, it’s easiest to call it
        consulting)
    • these scams are closely related to similar scams for laundering money, e.g., by selling company assets at artificially low (or high) prices
      • an owner, Charles, could sell assets to a foreign
        company at low prices and then be rewarded in tax-
        free, under the table, cash deposited in a foreign
        account, and we’re back to the situation above
  • Collusion already is common; crypto methods will make some such collusions easier
    • antique dealers at an auction
  • espionage and trading of national secrets (this has positive aspects as well)
    • «information markets» and anonymous digital cash
    • (This realization, in late 1987, was the inspiration for
      the ideas behind crypto anarchy.)
  • mistrust
  • widening gap between rich and poor, or those who can use
    the tools of the age and those who can’t
    16.10.3. The Positive Side of Crypto Anarchy
  • (other positive reasons are implicitly scattered throughout
    this outline)
  • a pure kind of libertarianism
    • those who are afraid of CA can stay away (not strictly
      true, as the effects will ripple)
  • a way to bypass the erosion of morals, contracts, and
    committments (via the central role of reputations and the
    exclusion of distorting governments)
  • individual responsibility
  • protecting privacy when using hypertext and cyberspace
    services (many issues here)
  • «it’s neat» (the imp of the perverse that likes to see
    radical ideas)
  • A return to 4th Amendment protections (or better)
    • Under the current system, if the government suspects a
      person of hiding assets, of conspiracy, of illegal acts,
      of tax evasion, etc., they can easily seize bank
      accounts, stock accounts, boats, cars, ec. In particular,
      the owner has little opportunity to protect these assets.
  • increased liquidity in markets
  • undermining of central states
    • loss of tax revenues
    • reduction of control
  • freedom, personal liberty
  • data havens, to bypass local restrictive laws
  • Anonymous markets for assassinations will have some good aspects
    • the liquidation of politicians and other thieves, the
      killing of those who have assisted in the communalization
      of private property
    • a terrible swift sword
      16.10.4. Will I be sad if anonymous methods allow untraceable markets
      for assassinations? It depends. In many cases, people deserve
      death–those who have escaped justice, those who have broken
      solemn commitments, etc. Gun grabbing politicians, for
      example should be killed out of hand. Anonymous rodent
      removal services will be a tool of liberty. The BATF agents
      who murdered Randy Weaver’s wife and son should be shot. If
      the courts won’t do it, a market for hits will do it.
  • (Imagine for a moment an «anonymous fund» to collect the
    money for such a hit. Interesting possibilities.)
  • «Crypto Star Chambers,» or what might be called
    «digilantes,» may be formed on-line, and untraceably, to
    mete out justice to those let off on technicalities. Not
    altogether a bad thing.
    16.10.5. on interference in business as justified by «society supports
    you» arguments (and «opting out)
  • It has been traditionally argued that society/government has a right to regulate businesses, impose rules of behavior, etc., for a couple of reasons:
    • «to promote the general welfare» (a nebulous reason)
    • because government builds the infrastructure that makes
      business possible
    • the roads, transportation systems, etc. (actually, most
      are privately built…only the roads and canal are
      publically built, and they certainly don’t have to
      be)
    • the police forces, courts, enforcement of contracts,
      disputes, etc.
    • protection from foreign countries, tariff negotiations,
      etc., even to the physical protection against
      invading countries
  • But with crypto anarchy, all of these reasons vanish!
    • society isn’t «enabling» the business being transacted
      (after all, the parties don’t even necessarily know what
      countries the other is in!)
    • no national or local courts are being used, so this set
      of reasons goes out the window
    • no threat of invasion…or if there is, it isn’t
      something governments can address
  • So, in addition to the basic unenforceability of outlawing crypto anarchy–short of outlawing encryption–there is also no viable argument for having governments interfere on these traditional grounds.
    • (The reasons for them to interfere based on fears for
      their own future and fears about unsavory and abominable
      markets being developed (body parts, assassinations,
      trade secrets, tax evasion, etc.) are of course still
      «valid,» viewed from their perspective, but the other
      reasons just aren’t.)

16.11. Ethics and Morality of Crypto Anarchy
16.11.1. «How do you square these ideas with democracy?»

  • I don’t; democracy has run amok, fulfilling de
    Tocqueville’s prediction that American democracy would last
    only until Americans discovered they could pick the pockets
    of their neighbors at the ballot box
  • little chance of changing public opinion, of educating them
  • crypto anarchy is a movement of individual opting out, not
    of mass change and political action
    16.11.2. «Is there a moral responsibility to ensure that the overall
    effects of crypto anarchy are more favorable than unfavorable
    before promoting it?»
  • I don’t think so, any more than Thomas Jefferson should
    have analyzed the future implications of freedom before
    pushing it so strongly.
  • All decisions have implications. Some even cost lives. By
    not becoming a doctor working in Sub-Saharan Africa, have I
    «killed thousands»? Certainly I might have saved the lives
    of thousands of villagers. But I did not kill them just
    because I chose not to be a doctor. Likewise, by giving
    money to starving peasants in Bangladesh, lives could
    undeniably be «saved.» But not giving the money does not
    murder them.
  • But such actions of omission are not the same, in my mind,
    as acts of comission. My freedom, via crypto anarchy, is
    not an act of force in and of itself.
  • Developing an idea is not the same as aggression.
  • Crypto anarchy is about personal withdrawal from the
    system, the «technologies of disconnection,» in Kevin
    Kelly’s words.
    16.11.3. «Should individuals have the power to decide what they will
    reveal to others, and to authorities?»
  • For many or even most of us, this has an easy answer, and
    is axiomatically true. But others have doubts, and more
    people may have doubts as some easily anticipated
    develpoments occur.
  • (For example, pedophiles using the much-feared «fortress
    crypto,» terrorists communicating in unbreakable codes, tza
    evaders, etc. Lots of examples.)
  • But because some people use crypto to do putatively evil
    things, should basic rights be given up? Closed doors can
    hide criminal acts, but we don’t ban closed doors.
    16.11.4. «Aren’t there some dangers and risks to letting people pick
    and choose their moralities?»
  • (Related to questions about group consensus, actions of the
    state vs. actions of the individual, and the «herd.)
  • Indeed, there are dangers and risks. In the privacy of his
    home, my neighbor might be operating a torture dungeon for
    young children he captures. But absent real evidence of
    this, most nations have not sanctioned the random searches
    of private dwellings (not even in the U.S.S.R., so far as I
    know).
    16.11.5. «As a member of a hated minority (crypto anarchists) I’d
    rather take my chances on an open market than risk official
    discrimination by the state…..Mercifully, the technology we
    are developing will allow everyone who cares to to decline to
    participate in this coercive allocation of power.» [Duncan
    Frissell, 1994-09-08]
    16.11.6. «Are there technologies which should be «stopped» even before
    they are deployed?»
  • Pandora’s Box, «things Man was not meant to know,» etc.
  • It used to be that my answer was mostly a clear «No,» with
    nuclear and biological weapons as the only clear exception.
    But recent events involving key escrow have caused me to
    rethink things.
  • Imagine a company that’s developing home surveillance
    cameras…perhaps for burglar prevention, child safety,
    etc. Parents can monitor Junior on ceiling-mounted cameras
    that can’t easily be tampered with or disconnected, without
    sending out alarms. All well and good.
  • Now imagine that hooks are put into these camera systems to
    send the captured images to a central office. Again, not
    necessarily a bad idea–vacationers may want their security
    company to monitor their houses, etc.
  • The danger is that a repressive government could make the
    process mandatory….how else to catch sexual deviates,
    child molestors, marijuana growers, counterfeiters, and the
    like?
  • Sound implausible, unacceptable, right? Well, key escrow is
    a form of this.
  • The Danger. That OS vendors will put these SKE systems in
    place without adequate protections against key escrow being
    made mandatory at some future date.
    16.11.7. «Won’t crypto anarchy allow some people to do bad things?»
  • Sure, so what else is new? Private rooms allows plotters to
    plot their plots. Etc.
  • Not to sound too glib, but most of the things we think of
    as basic rights allow various illegal, distasteful, or
    crummy things to go on. Part of the bargain we make.
  • «Of course you could prevent contract killings by requiring
    everyone to carry government «escrowed» tape recordings to
    record all their conversations and requiring them to keep a
    diary at all times alibing their all their activities.
    This would also make it much easier to stamp out child
    pornography, plutonium smuggling, and social discrimination
    against the politically correct.» [James Donald, 1994-09-
    09]

16.12. Practical Problems with Crypto Anarchy
16.12.1. «What if «bad guys» use unbreakable crypto?»

  • What if potential criminals are allowed to have locks on
    their doors? What if potential rapists can buy pornography?
    What if….
  • These are all straw men used in varous forms throughout
    history by tyrants to control their populations. The
    «sheepocracies» of the modern so-called democratic era are
    voting away their former freedoms in favor of cradle to
    grave safety and security.
  • The latest tack is to propose limits on privacy to help
    catch criminals, pedophile, terrorists, and father rapers.
    God help us if this comes to pass. But Cypherpunks don’t
    wait for God, they write code!
    16.12.2. Dealing with the «Abhorrent Markets»
  • such as markets for assassinations and extortion
  • Possibilities:
    • physical protection, physical capure
    • make it risky
    • (on the other hand, sniping is easy)
    • «flooding» of offers
    • «take a number» (meaning: get in line)
    • attacking reputations
  • I agree that more thought is needed, more thorough analysis
  • Some people have even pointed out the benefits of killing
    off tens of thousands of the corrupt politicians, narcs,
    and cops which have implemented fascist, collectivist
    policies for so long. Assassination markets may make this
    much more practical.
    16.12.3. «How is fraud dealt with in crypto anarchy?»
  • When the perpetrators can’t even be identified.
  • One of the most interesting problems.
  • First, reputations matter. Repeat business is not assured.
    It is always best to not have too much at stake in any
    single transaction.
    16.12.4. «How do we know that crypto anarchy will work? How do we know
    that it won’t plunge the world into barbarism, nuclear war,
    and terror?»
  • We don’t know, of course. We never can.
  • However, things are already pretty bad. Look at Bosnia,
    Ruanda, and a hundred other hellholes and flashpoints
    around the world. Look at the nuclear arsenals of the
    superpowers, and look at who starts the wars. In nearly all
    cases, statism is to blame. States have killed a hundred
    million or more people in this century alone–think of
    Hitler, Stalin, Mao, and Pol Pot–through forced starvation
    of entire provinces, liquidation of the peasantry, killing
    of intellectuals, and mass exterminations of religious and
    ethnic groups. It’s hard to imagine crypto anarchy causing
    anything that bad!
  • Crypto anarchy is a cyberspatially-mediated personal course
    of action; by itself it involves no actions such as
    terrorism or nuclear blackmail. One could just as easily
    ask, «Will freedom lead to nuclear blackmail, weapons
    trading, and pedophilia?» The answer is the same: maybe,
    but so what?
    16.12.5. It is true that crypto anarchy is not for everyone. Some will
    be too incompetent to prepare to protect themselves, and will
    want a protector. Others will have poor business sense.
    16.12.6. «But what will happen to the poor people and those on welfare
    if crypto anarchy really succeeds?»
  • «So?»
  • Many of us would see this as a good thing. Not just for
    Calvinist-Randite reasons, but also because it would break
    the cycle of dependency which has actually made things
    worse for the underclass in America (at least). See Charles
    Murray’s «Losing Ground» for more on this.
  • And remember that a collapse of the tax system will mean
    more money left in the hands of former taxpayers, and hence
    more left over for true charity (for those who truly cannot
    help themselves).

16.13. Black Markets
16.13.1. «Why would anyone use black markets?»

  • when the advantages of doing so outweigh the disadvantages
    • including the chance of getting caught and the
      consequences
    • (As the chances decline, this suggests a rise in
      punishment severity)
  • businesses will tend to shy away from illegal markets,
    unless…
  • Anonymous markets for medical products
    • to reduce liability, local ethical and religious laws
    • Example: Live AIDS vaccine…considered too risky for any
      company to introduce, due to inability to get binding
      waivers of liability (even for «fully informed» patients
      who face likely death)
    • markets in body parts…
      16.13.2. Crypto anarchy opens up some exciting possibilities for
      collusion in financial deals, for insider trading, etc.
  • I’m not claiming that this will mean instant riches, as
    markets are fairly efficient () and «insiders» often don’t do well in the market. ( Some argue that relaxing laws
    against insider trading will make for an even fairer
    market…I agree with this.)
  • What I am claiming is the SEC and FinCEN computers will be
    working overtime to try to keep up with the new
    possibilities crypto anarchy opens up. Untraceable cash, as
    in offshore bank accounts that one can send anonymous
    trading instructions to (or for), means insider trading
    simply can’t be stopped…all that happens is that insiders
    see their bank accounts increase (to the extent they win
    because of the insider trading…like I said, a debatable
    point).
  • Price signalling, a la the airline case of a few years back
    (which, you won’t be surprised to hear, I have no problems
    with), will be easier. Untraceable communications, virtual
    meetings, etc.
    16.13.3. Information Markets
  • a la «information brokering,» but mediated
    cryptographically
  • recall the 1981 market in Exocet missile codes (France,
    Argentina–later of relevance when an Exocet sank a British
    ship)
    16.13.4. Black Markets, Informal Economies, Export Laws
  • Transborder data flow, legal issues
    • complex..laws, copyrights, «national sovereignty»
    • e.g., Phillipines demanded in-the-clear transmissions
      during bank loan renegotiations..and several Latin
      American countries forbid encrypted transmissions.
  • Export, Technology Export, Export Control
    • Export Control Act
    • Office of Munitions (as in «Munitions Act», circa 1918)
    • export of some crypto gear shifted from Dept. of State,
      Office of Munitions, to Dept. of Commerce
    • Commodity Control List, allows s/w that is freely
      available to the public to be exported without
      additional paperwork
    • Munitions used to be stickier about export (some would
      say justifiably paranoid)
    • Commodity Jurisdiction request, to see whether product
      for export falls under State or Commerce regulations
    • Trading with the Enemy Act
  • Exocet codes–black market sales of emasculated chips
    16.13.5. Smuggling and Black Markets
  • Black Markets in the USSR and Other Former East Bloc Nations
    • a major issue, because the normal mechanisms for free
      markets-property laws, shops, stock markets, hard
      currencies, etc.-have not been in place
    • in Russia, have never really existed
    • Role of «Mafia»
    • various family-related groups (which is how trade
      always starts, via contacts and connections and family
      loyalty, until corporations and their own structures of
      loyalty and trust can evolve)
    • how the Mafia in Russia works
      • bribes to «lose» materials, even entire trainloads
      • black market currency (dollars favored)
    • This could cause major discontent in Russia
    • as the privileged, many of them ex-Communist officials,
      are best prepared to make the transition to capitalism
    • those in factory jobs, on pensions, etc., will not have the disposable income to take advantage of the new opportunities
      • America had the dual advantages of a frontier that
        people wanted to move to (Turner, Protestant ethic,
        etc.) and a high-growth era (industrialization)
      • plus, there was no exposure to other countries at
        vastly higher living standards
  • Smuggling in the EEC
    • the dream of tariff-free borders has given way to the
      reality of a complex web of laws dictating what is
      politically correct and what is not:
    • animal growth hormones
    • artificial sweeteners are limited after 1-93 to a small
      list of approved foods: and the British are finding
      that their cherished «prawn cocktail-flavored crisps»
      are to be banned (for export to EEC or completely?)
      because they’re made with saccharin or aspartame
    • «European content» in television and movies may limit
      American productions…as with Canada, isn’t this a
      major abridgement of basic freedoms?
    • this may lead to a new kind of smuggling in «politically
      incorrect» items
    • could be argued that this is already the case with bans
      on drugs, animal skins, ivory, etc. (so tediously
      argued by Brin)
    • recall Turgut Ozal’s refreshing comments about loosening
      up on border restrictions
  • as more items are declared bootleg, smuggling will increase…politically incorrect contraband (fur, ivory, racist and sexist literature)
    • the point about sexist and racist literature being
      contraband is telling: such literature (books, magazines)
      may not be formally banned, for that would violate the
      First Amendment, but may still be imported anonymously
      (smuggled) and distributed as if they were banned (!) for
      the reason of avoiding the «damage claims» of people who
      claim they were victimized, assaulted, etc. as a result
      of the literature!
    • avoidance of prosecution or damage claims for writing, editing, distributing, or selling «damaging» materials is yet another reason for anonymous systems to emerge: those involved in the process will seek to immunize themselves from the various tort claims that are clogging the courts
      • producers, distributors, directors, writers, and even
        actors of x-rated or otherwise «unacceptable»
        material may have to have the protection of anonymous
        systems
      • imagine fiber optics and the proliferation of videos
        and talk shows….bluenoses and prosecutors will use
        «forum shopping» to block access, to prosecute the
        producers, etc.
    • Third World countries may declare «national sovereignty
      over genetic resources» and thus block the free export
      and use of plant- and animal-derived drugs and other
      products
    • even when only a single plant is taken
    • royalties, taxes, fees, licenses to be paid to local
      gene banks
    • these gene banks would be the only ones allowed to do
      genetic cataloguing
    • the problem is of course one of enforcement
  • technology, programs
    • scenario: many useful programs are priced for
      corporations (as with hotel rooms, airline tickets,
      etc.), and price-sensitive consumers will not pay $800
      for a program they’ll use occasionally to grind out term
      papers and church newsletters
  • Scenario: Anonymous organ donor banks
    • e.g., a way to «market» rare blood types, or whatever,
      without exposing one’s self to forced donation or other
      sanctions
    • «forced donation» involves the lawsuits filed by the
      potential recipient
    • at the time of offer, at least…what happens when the
      deal is consummated is another domain
    • and a way to avoid the growing number of government
      stings
  • the abortion and women’s rights underground…a hopeful ally (amidst the generally antiliberty women’s movement)
    • RU-486, underground abortion clinics (because many
      clinics have been firebombed, boycotted out of existence,
      cut off from services and supplies)
  • Illegal aliens and immigration
    • «The Boxer Barrier» used to seal barriers…Barbara Boxer
      wants the military and national guard to control illegal
      immigration, so it would be poetic justice indeed if this
      program has her name on it
      16.13.6. Organized Crime and Cryptoanarchy
  • How and Why
    • wherever money is to be made, some in the underworld will
      naturally take an interest
    • loan sharking, numbers games, etc.
    • they may get involved in the setup of underground banks,
      using CA protocols
    • shell games, anonymity
    • such Mafia involvement in an underground monetary system
      could really spread the techniques
    • but then both sides may be lobbying with the Mafia
    • the CA advocates make a deal with the devil
    • and the government wants the Mob to help eradicate the
      methods
  • Specific Programs
    • False Identities
    • in the computerized world of the 90s, even the Mob (who
      usually avoid credit cards, social security numbers,
      etc.) will have to deal with how easily their movements
      can be traced
    • so the Mob will involve itself in false IDs
      • as mentioned by Koontz
    • Money Laundering, naturally
  • but some in the government see some major freelance opportunities in CA and begin to use it (this undermines the control of CA and actually spreads it, because the government is working at cross purposes)
    • analogous to the way the government’s use of drug trade
      systems spread the techniques
      16.13.7. «Digital Escrow» accounts for mutually suspicious parties,
      especially in illegal transactions
  • drug deals, information brokering, inside information, etc.
  • But why will the escrow entity be trusted?
    • reputations
    • their business is being a reliable escrow holder, not
      it destroying their reputation for a bribe or a threat
    • anonymity means the escrow company won’t know who it’s
      «burning,» should it try to do so
    • they never know when they themselves are being tested
      by some service
    • and potential bribers will not know who to contact,
      although mail could be addressed to the escrow company
      easily enough
      16.13.8. Private companies are often allies of the government with
      regards to black markets (or grey markets)
  • they see uncontrolled trade as undercutting their monopoly
    powers
  • a way to limit competition

16.14. Money Laundering and Tax Avoidance
16.14.1. Hopelessness of controlling money laundering

  • I see all this rise in moneylaundering as an incredibly hopeful trend, one that will mesh nicely with the use of cryptography
    • why should export of currency be limited?
    • what’s wrong with tax evasion, anyway?
  • corrupting, affects all transactions
  • vast amounts of money flowing
  • 2000 banks in Russia, mostly money-laundering
  • people and countries are so starved for hard currency that most banks outside the U.S. will happily take this money
    • no natural resources in many of these countries
    • hopeless to control
  • being presented as «profits vs. principals,» but I think
    this is grossly misguided
  • Jeffery Robinson, «The Landrymen,» interviewed on CNN, 6-24- 94
    • «closer to anarchy» (yeah!)
    • hopeless to control
    • dozens of new countries, starved for hard currency, have
      autonomy to set banking policies (and most European
      countries turn a blind eye toward most of the anti-
      laundering provisions)
      16.14.2. Taxes and Crypto
  • besides avoidance, there are also issues of tax records,
    sales tax, receipts, etc.
  • this is another reason government may demand access to cyberspace:
    • to ensure compliance, a la a tamper-resistant cash
      register
    • to avoid under-the-table transactions
    • bribery, side payments, etc.
  • Note: It is unlikely that such access to records would stop
    all fraud or tax evasion. I’m just citing reasons for them
    to try to have access.
  • I have never claimed the tax system will collapse totally,
    or overnight, or without a fight. Things take time.
  • tax compliance rates dropping
    • the fabric has already unraveled in many countries, where
      the official standard of living is below the apparent
      standard of living (e.g., Italy).
    • tax evasion a major thing
    • money runs across the border into Switzerland and
      Austria
    • Frissell’s figures
    • media reports
  • Tax issues, and how strong crypto makes it harder and harder to enforce
    • hiding income, international markets, consultants,
      complexly structured transactions
      16.14.3. Capital Flight
  • «The important issue for Cypherpunks is how we should
    respond to this seemingly inevitable increased mobility of
    capital. Does it pose a threat to privacy? If so, let’s
    write code to thwart the threat. Does it offer us any
    tools we can use to fight the efforts of nation-states to
    take away our privacy? If so, let’s write code to take
    advantage of those tools.» [ Sandy Sandfort, Decline and
    Fall, 1994–06-19]
    16.14.4. Money Laundering and Underground Banks
  • a vast amount of money is becoming available under the table: from skimming, from tax avoidance, and from illegal activities of all kinds
    • can be viewed as part of the internationalization of all
      enterprises: for example, the Pakistani worker who might
      have put his few rupees into some local bank now deposits
      it with the BCCI in Karachi, gaining a higher yield and
      also increasing the «multiplier» (as these rupees get
      lent out many times)
    • is what happened in the U.S. many years ago
    • this will accelerate as governments try to get more taxes
      from their most sophisticated and technical taxpayers,
      i.e., clever ways to hide income will be sought
  • BCCI, Money-Laundering, Front Banks, CIA, Organized Crime
    • Money Laundering
    • New York City is the main clearinghouse, Federal
      Reserve of New York oversees this
    • Fedwire system
    • trillions of dollars pass through this system, daily
    • How money laundering can work (a maze of techniques)
      • a million dollars to be laundered
      • agent wires it, perhaps along with other funds, to
        Panama or to some other country
      • bank in Panama can issue it to anyone who presents
        the proper letter
      • various ways for it to move to Europe, be issued as
        bearer stock, etc.
      • 1968, offshore mutual funds, Bernie Kornfield
    • CIA often prefers banks with Mob connections
    • because Mob banks already have the necessary security
      and anonymity
    • and are willing to work with the Company in ways that
      conventional banks may not be
    • links go back to OSS and Mafia in Italy and Sicily, and to heroin trade in SE Asia
      • Naval Intelligence struck a deal in WW2 with Mafia,
        wherby Meyer Lansky would protect the docks against
        strikes (presumably in exchange for a «cut»), if
        Lucky Luciano would be released at the end of the war
        (he was)
      • Operation Underworld: Mafia assisted Allied troops in
        Sicily
      • «the Corse»
      • Luciano helped in 1947 to reopen Marseilles when
        Communist strikers had shut it down
      • continuing the pattern of cooperation begun during
        the war
      • thus establishing the French Connection!
      • Nugan Hand Bank
    • BCCI and Bank of America favored by CIA
      • Russbacher says B of A a favored cover
      • we will almost certainly discover that BCCI was the
        main bank used, with the ties to Bank of America
        offices in Vienna
      • Bank of America has admitted to having had early ties with BCCI in the early 1970s, but claims to have severed those ties
        • however, Russbacher says that CIA used B of A as
          their preferred bank in Europe, especially since
          it had ties to companies like IBM that were used
          as covers for their covert ops
      • Vienna was a favored money-laundering center for CIA,
        especially using Bank of America
    • a swirl of paper fronts, hiding the flows from regulators
      and investors
    • «nominees» used to hide true owners and true activities
    • various nations have banking secrecy laws, creating the
      «veil» that cannot be pierced
    • CIA knew about all of the flights to South America (and
      probably elsewhere, too)
    • admitted Thomas Polgar, a senior ex-CIA official, in
      testimony on 9-19-91
    • this indicates that CIA knew about the arms deals, the
      drug deals, and the various other schemes and scams
    • Earlier CIA-Bank Scandals (Nugan Hand and Castle Bank)
    • Nugan Hand Bank, Australia
      • Frank Nugan, Sydney, Australia, died in 1980
      • apparent suicide, but clearly rigged
        • Mercedes, rifle with no fingerprints, position
          all wrong
        • evidence that he’d had a change of heart-was
          praying daily, a la Charles Colson-and was
          thinking about getting out of the business
      • set up Nugan Hand Bank in 1973
      • private banking services, tax-free deposits in
        Caymans
      • used by CIA agents, both for Agency operations and for their own private slush/retirement funds
        • several CIA types on the payroll (listed their
          addresses as same as Air America)
        • William Colby on Board, and was their lawyer
      • links to organized crime, e.g., Santo Trafficante, Jr.
        • Florida, heroin, links to JFK assassination
        • trafficante was known as «the Cobra» and handled
          many transactions for the CIA
      • money-laundering for Asian drug dealers
      • Golden Triangle: N-H even had branches in GT
        • and branch in Chiang Mai, in Thailand
      • links to arms dealers, like Edwin P. Wilson
      • U.S. authorites refused to cooperate with
        investigations
      • and when info was released, it was blacked out with
        a «B-1» note, implying national security
        implications
      • investigations by Australian Federal Bureau of Narcotics were thwarted-agents transferred and Bureau disbanded shortly thereafter
        • similar to «Don’t fuck with us» message sent to
          FBI and DEA by CIA
      • N-H Bank had close working relation with Australian
        Security Intelligence Organization (ASIO)
      • NSA tapped phone conversations (speculative) of
        Nugan that indicated ASIO collusion with N-H Bank
        in the drug trade
      • Pine Gap facility, near Alice Springs (NSA, NRO)
      • P.M. Gough Whitlam’s criticism of Pine Gap led to
        CIA-ASIO plot to destroy the Whitlam gov’t.
      • November 1975 fall instigated with wiretaps and
        forgeries
      • Nugan Hand Bank was also involved with «Task Force
        157,» a Naval Intelligence covert operation, given
        the cover name «Pierce Morgan» (a good name?)
      • reported to Henry Kissinger
      • recall minor point that Navy is often the preferred
        service for the ruling elite (the real preppies)
      • and George Bush’s son, George W. Bush, was involved
        with Nugan Hand:
      • linked to William Quasha, who handled N-H deals in
        Phillipines
      • owners of Harken Energy Corp. a Texas-based company that bought G.W. Bush’s oil company «Spectrum 7» in 1986
        • later got offshore drilling rights to Bahrain’s
          oil-with G.W. Bush on the Board of Directors
        • could this be another link to Gulf Crisis?
    • Castle Bank, Bahamas, Paul E. Helliwell
      • OSS (China). CIA
      • Mitch WerBell, White Russian specialist in
        assassination, silencers, worked for him in China
      • Howard Hunt worked for him
      • after WW2, set up Sea Supply Inc., CIA front in Miami
      • linked to Resorts International
      • law firm of Helliwell, Melrose and DeWolf
      • lent money to Bahamian P.M. Lynden Pindling in
        exchange for extension of gambling license
      • Robert Vesco, Bebe Rebozo, and Howard Hughes
      • in contrast to the «Eastern Establishment,» these
        were Nixon’s insiders
      • links with ex-CIA agent Robert Maheu (who worked
        for Hughes); onvolved withTrafficante, CIA plot to
        kill Castro, and possible links to JFK
        assassination
      • Vesco active in drug trade
      • also involved in purchase of land for Walt Disney
        World
      • 27,000 acres near Orlando
      • Castle Bank was a CIA conduit
    • Operation Tradewinds, IRS probe of bank money flows
      • late 60s
      • investigation of «brass plate» companies in Caymans,
        Bahamas
      • Plot Scenario: Operation Tradewinds uncovered many
        UltraBlack operations, forcing them to retrench and
        dig in deeper, sacrificing several hundred million
      • circa 1977 (Castle Bank shut down)
    • World Finance Corporation (WFC)
      • started in 1971 in Coral Gables
      • first known as Republic National Corporation
      • Walter Surrey, ex-OSS, like Helliwell of Castle
        Bank, helped incorporate it
      • Business
      • exploited cash flows in Florida
      • dealt with CIA, Vesco, Santo Trafficante, Jr.
      • also got loan deposits from Arabs
      • links to Narodny Bank, the Soviet bank that also
        pay agents
      • a related company was Dominion Mortgage Company, located at same address as WFC
        • linked to narcotics flow into Las Vegas
        • and to Trafficante, Jr.
        • suitcases of cash laundered from Las Vegas to
          Miami
      • Jefferson Savings and Loan Association, Texas
      • Guilermo Hern‡ndez Cartaya, ex-Havana banker, Cuban
        exile, was chief figure
      • veteran of Bay of Pigs (likely CIA contacts)
      • investigated by R. Jerome Sanford, Miami assistant
        U.S. attorney
      • Dade County Organized Crime Bureau also involved in
        the 1978 investigation
    • Rewald and his banking deals
    • BCCI was a successor to this bank
    • CIA and DEA Links to Drug Trade
    • former agents and drug traffickers were frequently
      recruited by DEA and CIA to run their own drug
      operation, sometimes with political motivations
    • Carlos Hern‡ndez recruited by BNDD (Bureau of Narcotics
      and Dangerous drugs, predecessor to DEA) to form a
      death squad to assassinate other drug traffickers
    • possible links of the drug dealers to UltraBlack/Witness Security Program
      • agents in Florida, the stock broker killing in 1987
      • Seal was betrayed by the DEA and CIA, allowed to be
        killed by the Columbians
    • Afghan Rebels, Arms to Iran (and Iraq), CIA, Pakistan
    • there was a banking and arms-running network centered
      in Karachi, home of BCCI, for the various arms deals
      involving Afghan rebels
    • Karachi, Islamabad, other cities
    • Influence Peddling, Agents
    • a la the many senior lawyers hired by BCCI (Clark
      Clifford, Frank Manckiewicz [spelling?]
    • illustrates again the basic corruptability of a centralized command economy, where regulators and lawmakers are often in the pockets of corrupt enterprises
      • clearly some scandals and losses will occur in free
        markets, but at least the free markets will not be
        backed up with government coercion
    • Why CIA is Involved in So Many Shady Deals?
    • ideal cover for covert operations
      • outside audit channels
      • links to underworld
    • agents providing for their own retirements, their own private deals, and feathering their own nests
      • freedom from interferance
      • greed
    • deals like that of Noriega, in which CIA-supported dictators and agents provided for their own lavish lifestyles\
      • and the BCCI-Noriega links are believed to have
        contributed to the CIA’s unwillingness to question
        the activities of the BCCI (actually, the Justice
        Department)
    • Role of Banks in Iraq and Gulf War, Iraq-Gate, Scandals
    • Export Import Bank (Ex-Im), CCC
    • implicated in the arming of Iraq
    • Banco Lavorzo Nazionale [spelling?]
    • CIA was using BNL to arrange $5B in transfers, to arm Iraq, to ensure equality with Iran
      • because BNL wouldn’t ask where it came from
      • federally guaranteed loans used to finance covert ops
      • the privatizing of covert ops by the CIA and NSA
      • deniability
      • they subcontracted the law-breaking
      • the darker side of capitalism did the real work
      • but the crooks learned quickly just how much they
        could steal…probably 75% of stolen money
      • insurance fraud…planes allowed to be stolen, then
        shipped to Contras, with Ollie North arguing that
        nobody was really hurt by this whole process
    • ironically, wealthy Kuwaitis were active in financing «instant banks» for money laundering and arms transactions, e.g., several in Channel Islands
      • Ahmad Al Babtain Group of Companies, Ltd., a
        Netherlands Antilles corporation
    • Inslaw case fits in with this picture
    • Federal Reserve and SEC Lack the Power to «Peirce the
      Veil» on Foreign Banks
    • as the Morgenthau case in Manhattan develops
    • a well-known issue
    • But should we be so surprised?
    • haven’t banks always funded wars and arms merchants?
    • and haven’t some of them failed?
    • look at the Rothschilds
    • what is surprising is that so many people knew what it
      was doing, what its business was, and that it was even
      nicknamed «Banks of Crooks and Criminals International»
    • Using software agents for money laundering and other
      illegal acts
    • these agents act as semi-autonomous programs that are a few steps beyond simple algortihms
      • it is not at all clear that these agents could do
        very much to run portfolio, because nothing really
        works
    • real use could be as «digital cutouts»: transferring
      wealth to other agents (also controlled from afar, like
      marionettes)
    • advantage is that they can be programmed to perform
      operations that are perhaps illegal, but without
      traceability
    • Information brokers as money launderers (the two are
      closely related)
    • the rise of AMIX-style information markets and Sterling-
      style «data havens» will provide new avenues for money
      laundering and asset-hiding
    • information is intrinsically hard to value, hard to put a price tag on (it varies according to the needs of the buyers)
      • meaning that transnational flows of inforamation
        cannot be accurately valued (assigned a cash value)
      • is closely related to the idea of informal
        consulting and the nontaxable nature of it
  • cardboard boxes filled with cash, taped and strapped, but
    still bursting open
  • gym bags carrying relatively tiny amounts of the skim: a
    mere hundred thousand in $100s
  • L.A. becoming a focus for much of this cash
    • nearness to Mexico, large immigrant communities
    • freeways and easy access
    • hundreds of airstrips, dozens of harbors
    • though East Coast seems to have even more, so this
      doesn’t seem like a compelling reason
    • Ventura County and Santa Barbara
      16.14.5. Private Currencies, Denationalization of Money
  • Lysander Spooner advocated these private currencies
  • and «denationalization of money» is a hot topic
  • is effect, alternatives to normal currency already exist
    • coupons, frequent flier coupons, etc.
    • telephone cards and coupons (widely used in Asia and
      parts of Europe)
    • ironically, U.S. had mostly opted for credit cards,
      which are fully traceable and offer minimal privacy,
      while other nations have embraced the anonymity of
      their kind of cards…and this seems to be carrying
      over to the toll booth systems being planned
    • barter networks
    • chop marks (in Asia)
    • «reputations» and favors
    • if Al gives Bob some advice, is this taxable? (do
      lawyers who talk amongst themselves report the
      transactions/ od course not, and yet this is
      effectively either a barter transaction or an outright
      gift)
    • sophisticated financial alternatives to the dollar
    • various instruments
    • futures, forward contracts, etc.
    • «information» (more than just favors)
    • art works and similar physical items
    • not a liquid market, but for high rollers, an easy way
      to transfer hundreds of millions of dollars (even with
      the discounted values of a stolen item, and not all the
      items will be stolen…many people will be very careful
      to never travel with stolen art)
    • diamonds, gems have long been a form of transportable
      wealth
    • art works need not be declared at most (?) borders
      • this may change with time
        16.14.6. Tax Evasion Schemes
  • unreported income, e.g., banks like the BCCI obviously did
    not report what they or their customers were doing to the
    various tax authorities (or anyone else)
  • deferred income, via the kind of trust funds discussed here
    (wherein payment is deferred and some kind of trust is used
    to pay smaller amounts per year)
  • Asset-Hiding, Illegal Payments, Bribes, and Tax Evasion Funds Can Be Protected in a «Retirement Fund»
    • e.g., a politician or information thief-perhaps an Intel
      employee who sells something for $1M-can buy shares in a
      crypto-fund that then ensures he is hired by a succession
      of consulting firms for yearly consulting…or even just
      placed on a «retainer» of, say, $100K a year
    • IRS may come to have doubts about such services, but unless the government steps in and demands detailed inspection of actual work done-and even then I think this would be impossible and/or illegal-such arrangements would seem to be foolproof
      • why can’t government demand proof of work done?
      • who judges the value of an employee?
      • of advice given, of reports generated, or of the
        value of having a consultant «on retainer»?
      • such interference would devastate many vested
        interests
    • tax and other advantages of these «crypto annuities»
      • tax only paid on the yearly income, not on the lump
        sum
      • authorities are not alerted to the sudden receipt of
        a lump sum (an ex-intelligence official who receives
        a payement of $1 M will come under suspicion, exactly
        as would a politician)
      • and a lump sum payment might well arouse suspicions
        and be considered evidence of some criminal activity
      • the original lump sum is protected from confiscation
        by governments, by consideration in alimony or
        bankruptcy cases, etc.
      • such «consulting annuities» may be purchased just
        so as to insulate earnings from alimony,
        bankruptcy, etc.
      • as usual, I’m not defending these steps as moral or
        as good for the business climate of the world, just
        as inevitable consequences of many current trends
        and technical developments
    • the «shell game» is used to protect the funds
    • with periodic withdrawals or transfers
    • note that this whole scheme can pretty much be done by
      attorneys and agents today, though they may be subpoenaed
      or otherwise encouraged to blab
    • it may not even be illegal for a consultant to take his
      fee over a period of many years
    • the IRS may claim the «discounted present value» as a lump sum, but other folks already do things like this
      • royalty streams (and nobody claims an author must
        agree with the IRS to some estimated value of this
        stream)
      • percentages of the gross (and the like)
      • engineers and other professionals are often kept on
        payrolls not so much for their instantaneous
        achievements as for their past and projected
        achievements-are we to treat future accomplishments
        in a lump sum way?
    • IRS and others may try to inspect the terms of the employment or consulting agreement, but these seems too invasive and cumbersome
      • it makes the government a third party in all
        negotiations, requiring agents to be present in all
        talks or at least to read and understand all
        paperwork
      • and even then, there could be claims that the
        government didn’t follow the deals
      • not enough time or manpower to handle all these
        things
      • and the invasion of privacy is extreme!
      • Scenario: the Fincen-type agencies may deal with the
        growing threat of CA-type systems (and encryption in
        general) by involving the government in ostensibly
        private deals
      • analogous to the sales tax and bookkeeping
        arrangements (where gov’t. is a third party to all
        transactions)
      • or EEOC, race and sex discimination cases
        • will transcripts and recordings of all job
          interviews come to be required?
        • «laying track»
      • OSHA, pollution, etc.
      • software copying laws (more to the point): government seems to have the power to enter a business to see if illegal copies are in use; this may first require a warrant
        • how long before various kinds of software are
          banned?
        • with the argument being that some kinds of
          software are analogous to lockpicks and other
          banned burglar tools
        • «used to facillitate the illegal copying of
          protected software»
        • the threat of encryption for national security as
          well as for the money-laundering and illegal
          payments possibilities may cause the government
          to place restrictions on the use of crypto
          software for anything except approved uses
          (external e-mail, etc.)
        • and even these uses can of course be subverted
    • and crypto techniques are not actually necessary: lawyers
      and other discreet agents will suffice
    • furthermore, corporations have a fair amount of lattitude
      in setting retirement policies and benefits, and so the
      methods I’ve described to shelter current income may
      become more widespread
    • though there may be some proviso that if benefits exceeed some percentage of yearly income, factoring in years on the job, that these benefits are taxed in some punative way
      • e.g.., a corporation that pays $100K a year to a
        critical technical person for a year of work and then
        pays him $60K a year for the next ten years could
        reasonably be believed to have set up a system to
        help him avoid taxes on a large lump sum payment
    • Asset-hiding, to avoid seizure in bankruptcies, lawsuits
    • e.g., funds placed in accounts which are secret, or in systems/schemes over which the asset-hider has control of some kind (voting, consulting, etc.)
      • this is obscure: what I’m thinking of is some kind of
        deal in which Albert is hired by Bob as an «advisor»
        on financial matters: but Bob’s money comes from
        Albert and so the quid pro quo is that Bob will take
        Albert’s advice….hence the effective laundering and
        protection
    • May also be used to create «multi-tier» currency systems,
      e.g., where reported transactions are some fraction of
      actuals
    • suppose we agree to deal at some artificially low
      value: electricians and plumbers may barter with each
      other at a reported $5 an hour, while using underground
      accounts to actually trade at more realistic levels
    • government (IRS) has laws about «fair value»-but how could these laws be enforced for such intangibles as software?
      • if I sell a software program for $5000, can the
        government declare this to be over or underpriced?
      • likewise, if a plumber charges $5 an hour, can the
        government, suspecting tax evasion, force him to
        charge more?
    • once again, the nature of taxation in our increasingly
      many-dimensioned economy seems to necessitate major
      invasions of privacy
      16.14.7. «Denationalization of Money»
  • as with the old SF standby of «credits»
  • cf. the books on denationalization of money, and the idea of competing currencies
    • digital cash can be denominated in these various
      currencies, so it makes the idea of competing currencies
      more practical
    • to some extent, it already exists
  • the hard money advocates (gold bugs) are losing their faith, as they see money moving around and never really landing in any «hard» form
    • of course, it is essential that governments and groups
      not have the ability to print more money
  • international networks will probably denominate
    transactions in whatever currencies are the most stable and
    least inflationary (or least unpredictably inflationary)

16.15. Intellectual Property
16.15.1. Concepts of property will have to change

  • intellectual property; enforcement is becoming problematic
  • when thieves cannot be caught
    16.15.2. Intellectual property debate
  • include my comment about airwaves
  • work on payment for items…Brad Cox, Peter Sprague, etc.
    • Superdistribution, metered usage
  • propertarian
  • many issues

16.16. Markets for Contract Killings, Extortion, etc.
16.16.1. Note: This is a sufficiently important topic that it deserves
its own heading. There’s material on this scattered around
this document, material I’ll collect together when I get a
chance.
16.16.2. This topic came up several times on then Extropians mailing
list, where David Friedman (author of «The Machinery of
Freedom» and son of Nobel Prize winner Milton Friedman) and
Robin Hanson debated this with me.
16.16.3. Doug Cutrell summarized the concerns of many when he wrote:

  • «…the availability of truly secure anonymity, strong
    encryption, and untraceable digital cash could allow
    contract killing to be an openly conducted business. For
    example, an anonymous news post announces a public key
    which is to be used to encode a contract kill order, along
    with a digital cash payment. The person placing the
    contract need only anonymously place the encrypted message
    in alt.test. Perhaps it is even possible to make it
    impossible to tell that the message was encrypted with the
    contract killer’s public key (the killer would have to
    attempt decryption of all similarly encoded messages on
    alt.test, but that might be quite feasible). Thus it could
    be completely risk free for anyone to place a contract on
    anyone else.» [Doug Cutrell, 1994-09-09]
    16.16.4. Abhorrent markets
  • contract killings
  • can collect money anonymously to have someone
    whacked…nearly anyone who is controversial can generate
    enough «contributions»
  • kidnapping, extortion
    16.16.5. Dealing with Such Things:
  • never link physical ID with pseudonyms! (they won’t kill you if they don’t know who you are)
    • and even if one pseudonym is linked, make sure your
      financial records are not linkable
  • trust no one
  • increased physical security…make the effort of killing
    much more potentially dangerous
  • flooding attacks..tell extortionists to «get in line»
    behind all the other extortionists
  • announce to world that one does not pay extortionists…set up protocol to ensure this
    • yes, some will die as a result of this
  • console yourself with the fact that though some may die,
    fewer are dying as a result of state-sponsored wars and
    terrorism (historically a bigger killer than contract
    killings!)

16.17. Persistent Institutions
16.17.1. Strong crypto makes possible the creation of institutions
which can persist for very long periods of time, perhaps for
centuries.

  • such institutions already exist: churches (Catholics of
    several orders), universities, etc.
    16.17.2. all of these «persistent» services (digital banks, escrow
    services, reputation servers, etc.) require much better
    protections against service outages, seizures by governments,
    natural disasters, and even financial collapse than do most
    existing computer services-an opportunity for offshore escrow-
    like services
  • to maintain a distributed database, with unconditional
    privacy, etc.
  • again, it is imperative that escrow companies require all material placed in it to be encrypted
    • to protect them against lawsuits and claims by
      authorities (that they stole information, that they
      censored material, that they are an espionage conduit,
      etc.)
      16.17.3. Escrow Services
  • «Digital Escrow» accounts for mutually suspicious parties, especially in illegal transactions
    • drug deals, information brokering, inside information,
      etc.
    • But why will the escrow entity be trusted?
    • reputations
      • their business is being a reliable escrow holder, not
        it destroying their reputation for a bribe or a
        threat
    • anonymity means the escrow company won’t know who it’s «burning,» should it try to do so
      • they never know when they themselves are being tested
        by some service
    • and potential bribers will not know who to contact,
      although mail could be addressed to the escrow company
      easily enough
  • like bonding agencies
  • key is that these entities stand to gain very little by
    stealing from their customers, and much to lose (hinges on
    ratio of any single transaction to size of total market)
  • useful for black markets and illegal transactions (a
    reliable third party that both sides can trust, albeit not
    completely)
    16.17.4. Reputation-Based Systems
  • Credit Rating Services that are Immune from Meddling and Lawsuits
    • with digital pseudonyms, true credit rating data bases
      can be developed
    • with none of the «5 year expirations» (I mean, who are
      you to tell me I must not hold it against a person that
      records show he’s declares Chapter 7 every 5 years or
      so?…such information is information, and cannot be
      declared illegal, despite the policy issues that are
      involved)
    • this could probably be done today, using offshore data banks, but then there might develop injunctions against use by Stateside companies
      • how could this be enforced? stings? entrapment?
      • it may be that credit-granting entities will be
        forced to use rigid formulas for their decisions,
        with a complete audit trail available to the
        applicant
      • if any «discretion» or judgment is allowed, then
        these extralegal or offshore inputs can be used
      • related to «redlining» and other informal
        signalling mechanisms
      • remember that Prop. 103 attempted to bypass normal
        laws of economics
    • AMIX-like services will offer multiple approaches here
    • ranging from conventional credit data bases, albeit with lower costs of entry (e.g., a private citizen could launch a «bankruptcy filings» data base, using public records, with no expiration-they’re just reporting the truth, e.g., that Joe Blow filed for personal bankruptcy in 1987
      • this gets into some of the strange ideas involving
        mandatory rewriting of the truth, as when «credit
        records are expunged» (expunged from what? from my
        personal data bases? from records that were public
        and that I am now selling access to?)
      • there may be arguments that the «public records» are
        copyrighted or otherwise owned by someone and hence
        cannot be sold
      • telephone book case (however, the Supremes held
        that the «creative act» was the specific
        arrangement)
      • one ploy may be a Habitat-like system, where some of
        the records are «historical»
    • to offshore data bases
  • Book Reviews, Music Reviews
    • sometimes with pseudonyms to protect the authors from
      retaliation or even lawsuits
  • «What should I buy?» services, a la Consumer Reports
    • again, protection from lawsuits
      16.17.5. Crypto Banks and the «Shell Game» as a Central Metaphor
  • Central metaphor: the Shell Game
    • description of conventional shell game (and some
      allusions to con artists on a street corner-the hand is
      quicker than the eye)
    • like entering a room filled with safe deposit boxes, with
      no surveillance and no way to monitor activity in the
      boxes….and user can buy new boxes anonymously,
      transferring contents amongst the boxes
    • only shutting down the entire system and forcing all
      the boxes open would do anything-and this would «pool»
      all of the contents (unless a law was passed saying
      people could «declare» the contents before some
      day….)
    • the shell game system can be «tested»-by testing
      services, by suspicious individuals, whatever-at very low
      cost by dividing some sum amongst many accounts and
      verifying that the money is still there (by retrieving or
      cashing them in)
    • and remember that the accounts are anonymous and are
      indistinguishable, so that the money cannot be seized
      without repercussions
    • this is of course the way banks and similar reputation-
      based institutions have always (or mostly) worked
    • people trusted the banks not to steal their money by
      verifying over some period of time that their money was
      not vanishing
    • and by relying upon some common sense ideas of what the
      bank’s basic business was (the notion that a bank
      exists to continue in business and will make more money
      over some long run period by being trustworthy than it
      would make in a one-shot ripoff)
  • Numbered accounts
    • recall that Switzerland has bowed to international
      pressure and is now limiting (or eliminating) numbered
      accounts (though other countries are still allowing some
      form of such accounts, especially Lichtenstein and
      Luxembourg)
    • with crypto numbers, even more security
    • «you lose your number, tough»
    • but the money must exist in some form at some time?
    • options for the physical form of the money
    • accounts are shares in a fund that is publicly invested
      • shares act as «votes» for the distribution of
        proceeds
      • dividends are paid to the account (and sent wherever)
      • an abstract, unformed idea: multiple tiers of money,
        like unequal voting rights of stock…
    • could even be physical deposits
      • perhaps even manipulated by automatic handling
        systems (though this is very insecure)
  • the Bennett-Ross proposal for Global Data Services is
    essentially the early form of this
    16.17.6. cryonicists will seek «crypto-trusts» to protect their assets
  • again, the «crypto» part is not really necessary, given trustworthy lawyers and similar systems
    • but the crypto part-digital money-further automates the
      system, allowing smaller and more secure transactions
      (overhead is lower, allowing more dispersions and
      diffusion)
    • and eliminates the human link
    • thus protecting better against subpoenas, threats, etc.
  • and to help fund «persistent institutions» that will fund research and protect them in suspension
    • they may also place their funds in «politically correct»
      longterm funds-which may or may not exert a postive
      ifluence in the direction they wish, what with the law of
      unintended consequences and all
      opl
  • many avenues for laundering money for persistent institutions
    • dummy corporations (or even real corporations)
    • with longterm consulting arrangements
    • «shell game» voting
  • as people begin to believe that they may just possibly be revived at some future time, they will begin to worry about protecting their current assets
    • recollections of «Why Call Them Back from Heaven?»
    • worries about financial stability, about confiscation
      of wealth, etc.
    • no longer will ersatz forms of immortality-endowments fo
      museums, universities, etc.-be as acceptable…people
      will want the real thing
  • Investments that may outlive current institutions
    • purchases of art works (a la Bill Gates, who is in fact a
      possibel model for this kind of behavior)
    • rights to famous works, with provision for the copyright
      expirations, etc. (which is why physical possession is
      preferable)
    • shell games, of course (networks of reputation-based
      accounts)
  • Jim Bennett reports that Saul Kent is setting up such
    things in Lichtenstein for Alcor (which is what I suggested
    to Keith Henson several years ago)

16.18. Organized Crime: Triads, Yakuza, Mafia, etc.
16.18.1. «The New Underworld Order»

  • Claire Sterling’s «Thieve’s World»
    • (Sterling is well-known for her conservative views on
      political matters, having written the controversial «The
      Terror Connection,» which basically dismissed the role of
      the CIA and other U.S. agencies in promoting terrorism.
      «Thieve’s World» continues the alarmist stance, but has
      some juicy details anyway.)
    • she argues for more law enforcement
    • but it was the corrupt police states of Nazi Germany,
      Sovet Russia, etc., that gave so many opportunities for
      modern corruption
    • and the CIA-etc. drug trade, Cold War excuses, and
      national security state waivers
    • in the FSU, the Russian Mafia is the chief beneficiary of privatization…only they had the cash and the connections to make the purchases (by threatening non- Mob bidders, by killing them, etc.)
      • as someone put in, the world’s first complete
        criminal state
        16.18.2. «Is the criminal world interested in crypto? Could they be
        early adopters of these advanced techniques?»
  • early use: BBS/Compuserve messages, digital flash paper,
    codes
  • money-laundering, anstalts, banks
  • Triads, chop marks
  • Even though this use seem inevitable, we should probably be
    careful here. Both because the clientele for our advice may
    be violent, and ditto for law enforcement. The conspiracy
    and RICO laws may be enough to get anyone who advises such
    folks into major trouble. (Of course, advice and consulting
    may happen throught the very same untraceable technology!)
    16.18.3. crypto provides some schemes for more secure drug
    distribution
  • cells, dead drops, secure transfers to foreign accounts
  • communication via pools, or remailers
  • too much cash is usually the problem…
  • «follow the money» (FinCEN)
  • no moral qualms…nearly all drugs are less dangerous than
    alcohol is…that drug was just too popular to outlaw
  • this drug scenario is consistent with the Triad/Mob
    scenario

16.19. Privately Produced Law, Polycentric Law, Anarcho-Capitalism
16.19.1. «my house, my rules»
16.19.2. a la David Friedman
16.19.3. markets for laws, Law Merchant

  • corporations, other organizations have their own local
    legal rules
  • Extropians had much debate on this, and various competing
    legal codes (as an experiment…not very sucessful, for
    various reasons)
  • «Snow Crash»
    16.19.4. the Cypherpunks group is itself a good example:
  • a few local rules (local to the group)
  • a few constraints by the host machine environment (toad,
    soda)
  • but is the list run on «United States law»?
    • with members in dozens of countries?
  • only when the external laws are involved (if one of us
    threatened another, and even then this is iffy) could the
    external laws….
  • benign neglect, by necessity
    16.19.5. I have absolutely no faith in the law when it comes to
    cyberspatial matters (other matters, too).
  • especially vis-a-vis things like remote access to files, a
    la the AA BBS case
  • «the law is an ass»
  • patch one area, another breaks
  • What then? Technology. Remailers, encryption
    16.19.6. Contracts and Cryptography
  • «How can contracts be enforced in crypto anarchy situations?»
    • A key question, and one which causes many people to
      question whether crypto anarchy can work at all.
    • First, think of how many situations are already
      essentially outside the scope of the law…and yet in
      which something akin to «contracts» are enforceable,
      albeit not via the legal process.
    • friends, relationships
    • personal preferences in food, books, movies, etc.
      • what «recourse» does one have in cases where a meal
        is unsatisfactory? Not going back to the restaurant
        is usually the best recourse (this is also a hint
        about the importance of «future expectation of
        business» as a means of dealing with such things).
    • In these cases, the law is not directly involved. In
      fact, the law is not involved in most human (and
      nonhuman!) interactions.
    • The Main Approaches:
    • Reputations.
      • reputations are important, are not lightly to be
        regarded
    • Repeat Business.
    • Escrow Services.
  • The «right of contract» (and the duty to adhere to them, to not try to change the contract after the facts) is a crucial building block.
    • Imagine a society in which contracts are valid. This
      allows those willing to sign contracts setting limits on
      malpractice to get cheaper health care, while those who
      won’t sign such contracts are free to sue–but will of
      course have to pay more for health care. Nothing is free,
      and frivolous malpractice lawsuits have increased
      operating costs. (Recall the «psychic» who alleged that
      her psychic powers were lost after a CAT scan. A jury
      awarded her millions of dollars. Cf. Peter Huber’s books
      on liability laws.)
    • Now imagine a society in which it is never clear if a
      contract is valid, or whether courts will overturn or
      amend a contract. This distorts the above analysis, and
      so hospitals, for example, have to build in safety
      margins and cushions.
  • Crypto can help by creating escrow or bonding accounts held by third parties–untraceable to the other parties–which act as bonding agents for completion of contracts.
    • Such arrangements may not be allowed. For example, a
      hospital which attempted to deal with such a bonding
      agency, and which asked customers to also deal with them,
      could face sanctions.
  • «Secured credit cards» are a current example: a person pays
    a reserve amount greater than the card limits (maybe 110%).
    The reason for doing this is not to obtain «credit,»
    obviously, but to be able to order items over the phone, or
    to avoid carrying cash. (The benefit is thus in the
    channel of commerce).
    16.19.7. Ostracism, Banishment in Privately Produced Law
  • Voluntary and discretionary electronic communities also admit the easy possibility of banishment or ostracism (group-selected kill files). Of course, enforcement is generally difficult, e.g., there is nothing to stop individuals from continuing to communicate with the ostracized individual using secure methods.
    • I can imagine schemes in which software key escrow is
      used, but these seem overly complicated and intrusive.
    • The ability of individuals, and even subgroups, to thwart
      the ostracism is not at all a bad thing.
  • «In an on-line world it would be much easier to enforce
    banishment or selective ostracism than in real life.
    Filtering agents could look for certificates from accepted
    enforcement agencies before letting messages through. Each
    user could have a set of agencies which were compatible
    with his principles, and another set of «outlaws». You
    could even end up with the effect of multiple «logical
    subnets» of people who communicate with each other but not
    outside their subnet. Some nets might respect intellectual
    property, others not, and so on.» [Hal Finney, 1994-08-21]
    16.19.8. Governments, Cyberspaces, PPLs
  • Debate periodically flares up on the List about this topic.
  • Can’t be convered here in sufficient detail.
  • Friedman, Benson, Stephenson’s «Snow Crash,» etc.
    16.19.9. No recourse in the courts with crypto-mediated systems
  • insulated from the courts
  • PPLs are essential
  • reputations, escrow, mediation (crypto-mediated mediation?)
    16.19.10. Fraud
  • not exactly rare in the non-crypto world!
  • new flavors of cons will likely arise
  • anonymous escrow accounts, debate with Hal Finney on this
    issue, etc.
    16.19.11. PPLs, polycentric law

16.20. Libertaria in Cyberspace
16.20.1. what it is
16.20.2. parallels to Oceania, Galt’s Gulch
16.20.3. Privacy in communications alters the nature of connectivity

  • virtual communities, invisible to outsiders
  • truly a crypto cabal
  • this is what frightens the lawmakers the most…people can
    opt out of the mainstream governmental system, at least
    partly (and probably increasingly)

16.21. Cyberspace, private spaces, enforcement of rules, and technology
16.21.1. Consider the «law» based approach

  • a discussion group that wants no men involved («a protected
    space for womyn»)
  • so they demand the civil law system enforce their rules
  • practical example: sysadmins yank accounts when
    «inappropriate posts» are made
  • the C&S case of spamming is an example
  • Note: The Net as currently constituted is fraught with
    confusion about who owns what, about what are public and
    what are private resources, and about what things are
    allowed. If Joe Blow sends Suzy Creamcheese an «unwanted»
    letter, is this «abuse» or «harassement»? Is it stealing
    Suzy’s resources? (In my opinion, of course not, but I
    agree that things are confusing.)
    16.21.2. The technological approach:
  • spaces created by crypto…unbreachable walls
  • example: a mailing list with controls on membership
    • could require nomination and vouching for by others
    • presentation of some credential (signed by someone), e.g.
      of femaleness
  • pay as you go stops spamming
    16.21.3. This is a concrete example of how crypto acts as a kind of
    building material
  • and why government limitations on crypto hurt those who
    wish to protect their own spaces
  • a private mailing list is a private space, inaccessible to
    those outside
  • «There are good engineering approaches which can force data
    to behave itself. Many of them involve cryptography. Our
    government’s restrictions on crypto limit our ability to
    build reliable computer systems. We need strong crypto for
    basic engineering reasons.» [Kent Borg, «Arguing Crypto:
    The Engineering Approach,» 1994-06-29]
    16.21.4. Virtual Communities-the Use of Virtual Networks to Avoid
    Government
  • that is, alternatives to creating new countries (like the
    Minerva project)
  • the Assassin cult/sect in the mountains of Syria, Iraq,
    Afghanistan, etc. had a network of couriers in the mountain
    fastnessess
  • pirate communities, networks of trading posts and watering
    holes, exempt-if only for a few years-from the laws of the
    imperial powers
    16.21.5. These private spaces will, as technology makes them more
    «livable» (I don’t mean in a full sense, so don’t send me
    notes about how «you can’t eat cyberspace»), become full-
    functioned «spaces» that are outside the reach of
    governments. A new frontier, untouchable by outside, coercive
    governments.
  • Vinge’s «True Names» made real
    16.21.6. «Can things really develop in this «cyberspace» that so many
    of us talk about?»
  • «You can’t eat cyberspace!’ is the usual point made. I
    argue, however, that abstract worlds have always been with
    us, in the forms of commerce, reputations, friends, etc.
    And this will continue.
  • Some people have objected to the sometimes over-
    enthusiastic claims that economies and socities will
    flourish in computer-mediated cyberspaces. The short form
    of the objection is: «You can’t eat cyberspace.» Meaning,
    that profits and gains made in cyberspace must be converted
    to real world profits and gains.
  • In «Snow Crash,» this was made out to be difficult…Hiro
    Protagonist was vastly wealthy in the Multiverse, but lived
    in a cargo container at LAX in the «real world.» A fine
    novel, but this idea is screwy.
  • There are many ways to transfer wealth into the «real» world:
    • all the various money-laundering schemes
    • money in offshore accounts, accessible for vacations,
      visits, etc.
    • phony purchase orders
    • my favorite: Cyberspace, Inc. hires one as a
      «consultant» (IRS cannot and does not demand proof of
      work being done, the nature of the work, one’s
      qualifications to perform the work, etc….In fact,
      many consultants are hired «on retainer,» merely to be
      available should a need arise.)
    • information-selling
    • investments

      16.21.7. Protocols for this are far from complete
  • money, identity, walls, structures
  • a lot of basic work is needed (though people will pursue it
    locally, not after the work is done…so solutions will
    likely be emergent)

16.22. Data Havens
16.22.1. «What are data havens?»

  • Places where data can be hidden or protected against legal action.
    • Sterling, «Islands in the Net,» 1988
  • Medical experiments, legal advice, pornography, weapons
    • reputations, lists of doctors, lawyers, rent deadbeats,
      credit records, private eyes
  • What to do about the mounting pressure to ban certain kinds
    of research?
  • One of the powerful uses of strong crypto is the creation
    of journals, web sites, mailing lists, etc., that are
    «untraceable.» These are sometimes called «data havens,»
    though that term, as used by Bruce Sterling in «Islands in
    the Net» (1988), tends to suggest specific places like the
    Cayman Islands that corporations might use to store data. I
    prefer the emphasis on «cypherspace.»
  • «It is worth noting that private «data havens» of all sorts
    abound, especially for financial matters, and most are not
    subject to governmental regulation….Some banks have
    research departments that are older and morecomprehensive
    than credit reporting agencies. Favored customers can use
    them for evaluation of private deals….Large law firms
    maintain data banks that approach those of banks, and they
    grow with each case, through additions of private
    investigators paid for by successive clients….Security
    professionals, like Wackenhut and Kroll, also market the
    fruits of substantial data collections….To these add
    those of insurance, bonding, investment, financial firms
    and the like which help make or break business deals.»
    [John Young, 1994-09-07]
    16.22.2. «Can there be laws about what can be done with data?»
  • Normative laws («they shouldn’t keep such records and hence
    we’ll outlaw them») won’t work in an era of strong crypto
    and privacy. In fact, some of us support data havens
    precisely to have records of, say, terminal diseases so
    we’ll not lend money to Joe-who-has-AIDS. It may not be
    «fair» to Joe, but it’s my money. (Same idea as in using
    offshore or cryptospatial data havens to bypass the
    nonsense in the «Fair Credit Reporting Act» that outlaws
    the keeping of certain kinds of facts about credit
    applicants, such as that they declared bankruptcy 10 years
    ago or that they left a string of bad debts in Germany in
    the 1970s, etc.)
    16.22.3. Underground Networks, Bootleg Research, and Information
    Smuggling
  • The Sharing of Forbidden Knowledge
    • even if the knowledge is not actually forbidden, many
      people relish the idea of trafficking in the forbidden
    • Some modern examples
    • drugs and marijuana cultivation
      • drugs for life extension, AIDS treatments
      • illegal drugs for recreational use
    • bootleg medical research, AIDS and cancer treatments, etc.
      • for example, self-help user groups that advise on
        treatments, alternatives, etc.
    • lockpicking and similar security circumvention techniques
      • recall that possession of lockpicks may be illegal
      • what about manuals? (note that most catalogs have a
        disclaimer: «These materials are for educational
        purposes only, …»)
    • defense-related issues: limitations on debate on
      national security matters may result in «anonymous
      forums»
    • BTW, recent work on crab shells and other hard shells has produced even stronger armor!
      • this might be some of the genetic research that is
        highly classified and is sold on the anonymous nets
    • Alchemists and the search for immortality
    • theory that the «Grandfather of all cults» (my term) started around 4500 B.C.
      • in both Egypt and Babylonia/Sumeria
      • ancestor of Gnostics, Sufis, Illuminati, etc.
      • The Sufi mystic Gurdjieff claimed he was a member
        of a mystical cult formed in Babylon about 4500
        B.C.
      • spider venom?
      • Speculation: a group or cult oriented toward life
        extension, toward the search for immortality-perhaps
        a link to The Epic of Gilgamesh.
      • The Gilgamesh legend
        • Gilgamesh, Akkadian language stone tablets in
          Nineveh
        • made a journey to find Utnapishtim, survivor of
          Babylonian flood and possessor of secret of
          immortality (a plant that would renew youth)
        • but Gilgamesh lost the plant to a serpent
      • Egyptians
        • obviously the Egyptians had a major interest in
          life extension and/or immortality
        • Osiris, God of Resurrection and Eternal Life
        • also the Dark Companion of Serius (believed to
          be a neutron star?)
        • they devoted huge fraction of wealth to pyramids,
          embalming, etc. (myrhh or frankincense from
          desert city in modern Oman, discovered with
          shuttle imaging radar)
        • «pyramid power»: role on Great Seal, as sign of
          Illuminati, and of theories about cosmic energy,
          geometrical shapes, etc.
        • and recall work on numerological significance
          of Great Pyramid dimensions
      • Early Christianity
        • focus on resurrection of Jesus Christ
      • Quest for immortality is a major character motivation or theme
        • arguably for all people: via children,
          achievements, lasting actions, or even «a good
          life»
        • «Living a good life is no substitute for living
          forever»
        • but some seek it explicitly
        • «Million alive today will never die.» (echoes of
          past religious cults….Jehovah’s Witnesses?)
    • banned by the Church (the Inquisition)
    • research, such as it was, was kept alive by secret orders that communicated secretly and in code and that were very selective about membership
      • classes of membership to protect against discovery
        (the modern spy cell system)
      • red herrings designed to divert attention away
    • all of this fits the structure of such groups as the Masons, Freemason, Illuminati, Rosicrucians, and other mystical groups
      • with members like John Dee, court astrologer to Queen
        Elizabeth
      • a genius writer-scientist like Goethe was probably a
        member of this group
      • Faust was his message of the struggle
    • with the Age of Rationalism, the mystical, mumbo-jumbo
      aspects of alchemical research were seen to be passŽ,
      and groups like Crowleys O.T.O. became purely mystical
      showmanship
    • but the need for secrecy was now in the financial arena, with vast resources, corporate R & D labs, and banks needed
      • hence the role of the Morgans, Rothschilds, etc. in
        these conspiracies
    • and modern computer networks will provide the next step, the next system of research
      • funded anonymously
      • anonymous systems mean that researchers can publish
        results in controversial areas (recall that
        cryobiologists dare not mention cryonics, lest they
        be expelled from American Cryobiology xxx)
  • Bootleg Medical Research (and Cryonics)
    • Cryonics Research and Anti-aging Treatments
    • Use of Nazi Data
      • hypothermia experiments at Dachau
    • Anti-aging drugs and treatments
      • fountain of youth, etc.
      • many FDA restrictions, of course
      • Mexico
      • Switzerland
      • foetal calf cells?
      • blood changing or recycling?
    • Illegal Experiments
      • reports that hyperbaric oxygen may help revival of
        patients from neat-death in freezing accidents
    • Black Markets in Drugs, Medical Treatments
    • RU-486, bans on it
      • anti-abortion foes
      • easy to synthesize
      • NOW has indicated plans to distribute this drug
        themselves, to create networks (thus creating de
        facto allies of the libertarian-oriented users)
    • Organ Banks
      • establishing a profit motive for organ donors
      • may be the only way to generate enough donations,
        even from the dead
      • some plans are being made for such motives,
        especially to motivate the families of dying
        patients
      • ethical issues
      • what about harvesting from the still-living?
      • libertarians would say: OK, if informed consent was
        given
      • the rich can go to overseas clinics
    • AIDS patients uniting via bulletin boards to share treatment ideas, self-help, etc.
      • with buying trips to Mexico and elsewhere
    • authorities will try to halt such BBSs (on what
      grounds, if no money is changing hands?)
    • Doctors may participate in underground research networks
      to protect their own reputations and professional status
    • to evade AMA or other professional organizations and
      their restrictive codes of ethics
    • or lawsuits and bad publicity
      • some groups, the «Guardian Angels» of the future,
        seek to expose those who they think are committing
        crimes: abortionists (even though legal), etc.
    • «politically incorrect» research, such as vitamin
      therapy, longevity research, cryonics
    • breast implant surgery may be forced into black markets
      (and perhaps doctors who later discover evidence of such
      operations may be forced to report such operations)
  • Back Issues of Tests and Libraries of Term Papers
    • already extant, but imagine with an AMIX-like frontend?
  • Different kinds of networks will emerge, not all of them equally accessible
    • the equivalent of the arms and drug networks-one does not
      gain entree merely by asking around a bit
    • credibility, reputation, «making your bones»
    • these networks are not open to the casual person
  • Some Networks May Be For the Support of Overseas Researchers
    • who face restrictions on their research
    • e.g., countries that ban birth control may forbid
      researchers from communication with other researchers
    • suppose U.S. researchers are threatened with sanctions-loss of their licenses, censure, even prosecution-if they participate in RU-486 experiments?
      • recall the AIDS drug bootleg trials in SF, c. 1990
    • or to bypass export restrictions
    • scenario: several anonymous bulletin boards are set
      up-and then closed down by the authorities-to facillitate
      anonymous hookups (much like «anonymous FTP»)
  • Groups faced with debilitating lawsuits will «go underground»
    • Act Up! and Earth First! have no identifiable central
      office that can be sued, shut down, etc.
    • and Operation Rescue has done the same thing
      16.22.4. Illegal Data
  • credit histories that violate some current law about
    records
  • bootleg medical research
  • stolen data (e.g., from competitors….a GDS system could
    allow remote queries of a database, almost «oracular,»
    without the stolen data being in a U.S. jurisdiction)
  • customers in the U.K or Sweden that are forbidden to
    compile data bases on individuals may choose to store the
    data offshore and then access it discreetly (another reason
    encryption and ZKIPS must be offered)
    16.22.5. «the Switzerland of data»
  • Brussells supposedly raises fewer eyebrows than
    Lichtenstein, Luxembourg, Switzerland, etc.
  • Cayman Islands, other small nations see possibilities
    16.22.6. Information markets may have to move offshore, due to
    licensing and other restrictions
  • just as stock brokers and insurance brokers are licensed,
    the government may insist that information resellers be
    licensed (pass exams, be subject to audits and regulations)

16.23. Undermining Governments–Collapse of the State
16.23.1. «Is it legal to advocate the overthrow of governments or the
breaking of laws?»

  • Although many Cypherpunks are not radicals, many others of
    us are, and we often advocate «collapse of governments» and
    other such things as money laundering schemes, tax evasion,
    new methods for espionage, information markets, data
    havens, etc. This rasises obvious concerns about legality.
  • First off, I have to speak mainly of U.S. issues…the laws
    of Russia or Japan or whatever may be completely different.
    Sorry for the U.S.-centric focus of this FAQ, but that’s
    the way it is. The Net started here, and still is
    dominantly here, and the laws of the U.S. are being
    propagated around the world as part of the New World Order
    and the collapse of the other superpower.
  • Is it legal to advocate the replacement of a government? In
    the U.S., it’s the basic political process (though cynics
    might argue that both parties represent the same governing
    philosophy). Advocating the violent overthrow of the U.S.
    government is apparently illegal, though I lack a cite on
    this.
  • Is it legal to advocate illegal acts in general? Certainly much of free speech is precisely this: arguing for drug use, for boycotts, etc.
    • The EFF gopher site has this on «Advocating Lawbreaking,
      Brandenburg v. Ohio. «:
    • «In the 1969 case of Brandenburg v. Ohio, the Supreme
      Court struck down the conviction of a Ku Klux Klan
      member under a criminal syndicalism law and established
      a new standard: Speech may not be suppressed or
      punished unless it is intended to produce ‘imminent
      lawless action’ and it is ‘likely to produce such
      action.’ Otherwise, the First Amendment protects even
      speech that advocates violence. The Brandenburg test is
      the law today. «
      16.23.2. Espionage and Subversion of Governments Will be
      Revolutionized by Strong Crypto
  • (I think they see what we see, too, and this is a
    motivation for the attempts to limit the use of strong
    crypto. Besides some of the more conventional reasons.)
  • Digital dead drops will revolutionize espionage
    • spies and their controllers can communicate securely,
      relatively quickly, without fear of being watched, their
      drops compromised, etc.
    • no more nooks of trees, no more chalk marks on
      mailboxes to signal a drop to be made
    • this must be freaking out the intelligence community!
    • more insights into why the opposition to crypto is so
      strong
  • Cell-Based Systems and Conventional Protection Systems
    • Cells are a standard way to limit the damage of exposure
    • the standard is the 3-person cell so common in the
      early days of Soviet espionage in the U.S.
    • but computer systems may allow new kinds of cells, with
      more complicated protocols and more security
    • Keeping files for protection is another standard
      protection method
    • and with strong crypto, these files can be kept encrypted and in locations not apparent (e.g., posted on bulletin boards or other such places, with only the key needed at a later time to open them)
      • a la the «binary files» idea, wherein encrypted files
        are widely available for some time before the key is
        distributed (thus making it very hard for governments
        to halt the distribution of the raw files)
        16.23.3. «Xth Column» (X = encrypted)
  • The possible need to use strong cryptography as a tool to
    fight the state.
  • helping to undermine the state by using whistleblowers and anonymous information markets to leak information
    • the 63,451 people given false identities in the WitSec
      program…leak their names, watch them be zapped by
      vengeful enemies, and watch the government squirm
    • auction off the details of the 1967 Inspector General’s
      report on CIA assassinations
      16.23.4. use of clandestine, cell-based systems may allow a small
      group to use «termite» methods to undermine a society, to
      destroy a state that has become too repressive (sounds like
      the U.S. to me)
  • encrypted systems, anonymous pools, etc., allow truly
    secure cell-based systems (this is, by the way, one of the
    concerns many countries have about «allowing» cryptography
    to be used…and they’re right abou the danger!)
  • subversion of fascist or socialist governments, undermining
    the so-called democratic governments
    16.23.5. «Why won’t government simply ban such encryption methods?»
  • This has always been the Number One Issue!
    • raised by Stiegler, Drexler, Salin, and several others
      (and in fact raised by some as an objection to my even
      discussing these issues, namely, that action may then be
      taken to head off the world I describe)
  • Types of Bans on Encryption and Secrecy
    • Ban on Private Use of Encryption
    • Ban on Store-and-Forward Nodes
    • Ban on Tokens and ZKIPS Authentication
    • Requirement for public disclosure of all transactions
    • Recent news (3-6-92, same day as Michaelangelo and
      Lawnmower Man) that government is proposing a surcharge
      on telcos and long distance services to pay for new
      equipment needed to tap phones!
    • S.266 and related bills
    • this was argued in terms of stopping drug dealers and
      other criminals
    • but how does the government intend to deal with the
      various forms fo end-user encryption or «confusion»
      (the confusion that will come from compression,
      packetizing, simple file encryption, etc.)
  • Types of Arguments Against Such Bans
    • The «Constitutional Rights» Arguments
    • The «It’s Too Late» Arguments
    • PCs are already widely scattered, running dozens of
      compression and encryption programs…it is far too
      late to insist on «in the clear» broadcasts, whatever
      those may be (is program code distinguishable from
      encrypted messages? No.)
    • encrypted faxes, modem scramblers (albeit with some
      restrictions)
    • wireless LANs, packets, radio, IR, compressed text and
      images, etc….all will defeat any efforts short of
      police state intervention (which may still happen)
    • The «Feud Within the NSA» Arguments
    • COMSEC vs. PROD
    • Will affect the privacy rights of corporations
    • and there is much evidence that corporations are in
      fact being spied upon, by foreign governments, by the
      NSA, etc.
  • They Will Try to Ban Such Encryption Techniques
    • Stings (perhaps using viruses and logic bombs)
    • or «barium,» to trace the code
    • Legal liability for companies that allow employees to use
      such methods
    • perhaps even in their own time, via the assumption that
      employees who use illegal software methods in their own
      time are perhaps couriers or agents for their
      corporations (a tenuous point)
      16.23.6. «How will the masses be converted?»
  • Probably they won’t. Things will just happen, just as the
    masses were not converted on issues of world financial
    markets, derivative instruments, and a lot of similar
    things.
  • Crypto anarchy is largely a personal approach of
    withdrawal, of avoidance. Mass consensus is not needed
    (unless the police state option is tried).
  • Don’t think in terms of selling crypto anarchy to Joe
    Average. Just use it.
    16.23.7. As things seem to be getting worse, vis-a-vis the creation of
    a police state in the U.S.–it may be a good thing that
    anonymous assassination markets will be possible. It may
    help to level the playing field, as the Feds have had their
    hit teams for many years (along with their safe houses,
    forged credentials, accommodation addresses, cut-outs, and
    other accouterments of the intelligence state).
  • (I won’t get into conspiracies here, but the following
    terms may trigger some memories: Gehlen Org, Wackenhut,
    McKee Team, Danny Casolaro, Cabazon Indians, Gander crash,
    Iraq arms deals, Pan Am 103, Bridegrooms of Death, French
    Connection, Fascist Third Position, Phoenix Program, Bebe
    Rebozo, Marex, Otto Skorzeny, Nixon, P-2, Klaus Barbie,
    etc.)
  • Plenty of evidence of misbehavior on a massive scales by
    the intelligence agencies, the police forces, and states in
    general. Absolute power has corrupted absolutely.
  • I’m certainly not advocating the killing of Congressrodents
    and other bureaucrats, just noting that this cloud may have
    a silver lining.

16.24. Escrow Agents and Reputations
16.24.1. Escrow Agents as a way to deal with contract renegging

  • On-line clearing has the possible danger implicit in all
    trades that Alice will hand over the money, Bob will verify
    that it has cleared into hisaccount (in older terms, Bob
    would await word that his Swiss bank account has just been
    credited), and then Bob will fail to complete his end of
    the bargain. If the transaction is truly anonymous, over
    computer lines, then of course Bob just hangs up his modem
    and the connection is broken. This situation is as old as
    time, and has always involved protcols in which trust,
    repeat business, etc., are factors. Or escrow agents.
  • Long before the «key escrow» of Clipper, true escrow was
    planned. Escrow as in escrow agents. Or bonding agents.
  • Alice and Bob want to conduct a transaction. Neither trusts
    the other;
    indeed, they are unknown to each other. In steps «Esther’s
    Escrow Service.» She is also utraceable, but has
    established a digitally-signed presence and a good
    reputation for fairness. Her business is in being an escrow
    agent, like a bonding agency, not in «burning» either
    party. (The math of this is interesting: as long as the
    profits to be gained from any small set of transactions is
    less than her «reputation capital,» it is in her interest
    to forego the profits from burning and be honest. It is
    also possible to arrange that Esther cannot profit from
    burning either Alice or Bob or both of them, e.g., by
    suitably encrypting the escrowed stuff.)
  • Alice can put her part of the transaction into escrow with
    Esther, Bob can do the same, and then Esther can release
    the items to the parties when conditions are met, when both
    parties agree, when adjudication of some sort occurs, etc.
    (There a dozen issues here, of course, about how disputes
    are settled, about how parties satisfy themselves that
    Esther has the items she says she has, etc.)
    16.24.2. Use of escrow services as a substute for government
  • as in underworld deals, international deals, etc.
    • «Machinery of Freedom» (Friedman), «The Enterprise of
      Law» (Benson)
  • «It is important to note in any case that the use of third-
    party escrow as a substitute for Government regulation was
    a feature of the Northern European semi-anarchies of
    Iceland and Ireland that have informed modern libertarian
    thought.» [Duncan Frissell, 1994-08-30]
    16.24.3. Several people have raised the issue of someone in an
    anonymous transaction simply taking the money and not
    performing the service (or the flip side). This is where
    intermediaries come into the picture, just as in the real
    worl (bonds, escrow agents, etc.).
    16.24.4. Alice and Bob wish to conduct an anonymous transaction; each
    is unknown to the other (no physical knowledge, no pseudonym
    reputation knowledge). These «mutually suspicious agents,» in
    1960s- and 70s-era computer science lingo, must arrange
    methods to conduct business while not trusting the other.
    16.24.5. Various cryptographic protocols have been developed for such
    things as «bit commitment» (useful in playing poker over the
    phone, for example). I don’t know of progress made at the
    granularity of anonymous transactions, though. (Though the
    cryptographic protocol building blocks at lower levels–such
    as bit commitment and blobs–will presumably be used
    eventually at higher levels, in markets.)
    16.24.6. I believe there is evidence we can shorten the cycle by
    borrowing noncryptographic protocols (heresy to purists!) and
    adapting them. Reputations, for example. And escrow agents (a
    form of reputation, in that the «value» of a bonding entity
    or escrow agent lies in reputation capital).
    16.24.7. if a single escrow agent is suspected of being untrustworthy
    (in a reputation capital sense), then can use multiple
    escrows
  • with various protocols, caveat emptor
  • n-out-of-m voting schemes, where n escrow agents out of m
    are required to complete a transaction
  • hard to compromise them all, especially if they have no
    idea whether they are being «legitimately bribed» or merely
    pinged by a reputation-rating service
  • Hunch: the work of Chaum, Bos, and the Pfaltzmanns on DC-
    nets may be direcly applicable here…issues of collusion,
    sets of colluders, detection of collusion, etc.

16.25. Predictions vs. Implications
16.25.1. «How do we know that crypto anarchy will ‘work,’ that the
right institutions will emerge, that wrongs will be righted,
etc.?»

  • We don’t know. Few things are certain. Only time will tell.
    These are emergent situations, where evolution will
    determine the outcome. As in other areas, the forms of
    solutions will take time to evolve.
  • (The Founders could not have predicted the form corporate
    law would take, as but one example.)
    16.25.2. My thinking on crypto anarchy is not so much prediction as
    examination of trends and the implications of certain things.
    Just as steel girders mean certain things for the design of
    buildings, so too does unbreakable crypto mean certain things
    for the design of social and economic systems.
    16.25.3. Several technologies are involved:
  • Unbreakable crypto
  • Untraceable communication
  • Unforgeable signatures
    16.25.4. (Note: Yes, it’s sometimes dangerous to say «unbreakable,»
    «untraceable,» and «unforgeable.» Purists eschew such terms.
    All crypto is economics, even information-theoretically
    secure crypto (e.g., bribe someone to give you the key, break
    in and steal it, etc.). And computationally-secure crypto–
    such as RSA, IDEA, etc.–can in principle be brute-forced.
    In reality, the costs may well be exhorbitantly
    high…perhaps more energy than is available in the entire
    universe would be needed. Essentially, these things are about
    as unbreakable, untraceable, and unforgeable as one can
    imagine.)
    16.25.5. «Strong building materials» implies certain things. Highways,
    bridges, jet engines, etc. Likewise for strong crypto, though
    the exact form of the things that get built is still unknown.
    But pretty clearly some amazing new structures will be built
    this way.
    16.25.6. Cyberspace, walls, bricks and mortar…
    16.25.7. «Will strong crypto have the main effect of securing current
    freedoms, or will it create new freedoms and new situations?»
  • There’s a camp that believe mainly that strong crypto will
    ensure that current freedoms are preserved, but that this
    will not change things materially, Communications can be
    private, diaries can be secured, computer security will be
    enhanced, etc.
  • Another camp–of which I am a vocal spokesman–believes
    that qualitatively different types of transactions will be
    made possible. In addition, of course, to the securing of
    liberties that the first camp things is the main effect.
  • These effects are specultative, but probably include:
    • increased hiding of assets through untraceable banking
      systems
    • markets in illegal services
    • increased espionage
    • data havens
      16.25.8. «Will all crypto-anarchic transactions be anonymous?»
  • No, various parties will negotiate different arrangements.
    All a matter of economics, of enforcement of terms, etc.
    Some will, some won’t. The key thing is that the decision
    to reveal identity will be just another mutually negotiated
    matter. (Think of spending cash in a store. The store owner
    may want to know who his customers are, but he’ll still
    take cash and remain ignorant in most cases. Unless a
    government steps in and distorts the market by requiring
    approvals for purchases and records of identities–think of
    guns here.)
  • For example, the local Mob may not lend me money if I am
    anonymous to them, but they have a «hook» in me if they
    know who I am. (Aspects of anonymity may still be used,
    such as systems that leave no paper or computer trail
    pointing to them or to me, to avoid stings.)
  • «Enforcement» in underground markets, for which the
    conventional legal remedies are impossible, is often by
    means of physical force: breaking legs and even killing
    welshers.
  • (Personally, I have no problems with this. The Mob cannot
    turn to the local police, so it has to enforce deals its
    own way. If you can’t pay, don’t play.)

16.26. How Crypto Anarchy Will Be Fought
16.26.1. The Direct Attack: Restrictions on Encryption

  • «Why won’t government simply ban such encryption methods?»
    • This has always been the Number One Issue!
    • raised by Stiegler, Drexler, Salin, and several others
      (and in fact raised by some as an objection to my even
      discussing these issues, namely, that action may then
      be taken to head off the world I describe)
    • Types of Bans on Encryption and Secrecy
    • Ban on Private Use of Encryption
    • Ban on Store-and-Forward Nodes
    • Ban on Tokens and ZKIPS Authentication
    • Requirement for public disclosure of all transactions
    • Recent news (3-6-92, same day as Michaelangelo and Lawnmower Man) that government is proposing a surcharge on telcos and long distance services to pay for new equipment needed to tap phones!
      • S.266 and related bills
      • this was argued in terms of stopping drug dealers and
        other criminals
      • but how does the government intend to deal with the
        various forms fo end-user encryption or «confusion»
        (the confusion that will come from compression,
        packetizing, simple file encryption, etc.)
    • Types of Arguments Against Such Bans
    • The «Constitutional Rights» Arguments
    • The «It’s Too Late» Arguments
      • PCs are already widely scattered, running dozens of
        compression and encryption programs…it is far too
        late to insist on «in the clear» broadcasts, whatever
        those may be (is program code distinguishable from
        encrypted messages? No.)
      • encrypted faxes, modem scramblers (albeit with some
        restrictions)
      • wireless LANs, packets, radio, IR, compressed text
        and images, etc….all will defeat any efforts short
        of police state intervention (which may still happen)
    • The «Feud Within the NSA» Arguments
      • COMSEC vs. PROD
    • Will affect the privacy rights of corporations
      • and there is much evidence that corporations are in
        fact being spied upon, by foreign governments, by the
        NSA, etc.
    • They Will Try to Ban Such Encryption Techniques
    • Stings (perhaps using viruses and logic bombs)
      • or «barium,» to trace the code
    • Legal liability for companies that allow employees to use such methods
      • perhaps even in their own time, via the assumption
        that employees who use illegal software methods in
        their own time are perhaps couriers or agents for
        their corporations (a tenuous point)
  • restrictions on: use of codes and ciphers
  • there have long been certain restrictions on the use of encryption
    • encryption over radio waves is illegal (unless the key is
      provided to the government, as with Morse code)
    • in war time, many restrictions (by all governments)
    • those who encrypt are ipso facto guilty and are shot
      summarily, in many places
    • even today, use of encryption near a military base or
      within a defense contractor could violate laws
  • S.266 and similar bills to mandate «trapdoors»
    • except that this will be difficult to police and even to
      detect
    • so many ways to hide messages
    • so much ordinary compression, checksumming, etc.
  • Key Registration Trail Balloon
    • cite Denning’s proposal, and my own postings
      16.26.2. Another Direct Attack: Elimination of Cash
  • the idea being that elimination of cash, with credit cards replacing cash, will reduce black markets
    • «one person, one ID» (goal of many international
      standards organizations)
  • this elimination of cash may ultimately be tied in to the
    key registration ideas…government becomes a third party
    in all transactions
  • a favorite of conspiracy theorists
    • in extreme form: the number of the Beast tattooed on us
      (credit numbers, etc.)
    • currency exchanges (rumors on the Nets about the imminent
      recall of banknotes, ostensibly to flush out ill-gotten
      gains and make counterfeiting easier)
    • but also something governments like to do at times, sort
      of to remind us who’s really in charge
    • Germany, a couple of times
    • France, in the late 1950s
    • various other devaluations and currency reforms
  • Partial steps have already been made
    • cash transactions greater than some value-$10,000 at this
      time, though «suspicious» sub-$10K transactions must be
      reported-are banned
    • large denomination bills have been withdrawn from
      circulation
    • used in drug deals, the argument goes
    • Massachussetts has demanded that banks turn over all
      account records, SS numbers, balances, etc.
  • «If what you’re doing is legal, why do you need cash for it?»
    • part of the old American dichotomy: privacy versus «What
      have you got to hide?»
  • But why the outlawing of cash won’t work
    • if a need exists, black markets will arise
    • i.e., the normal tradeoff between risk and reward:
      there may be some «discounts» on the value, but cah
      will still circulate
    • too many other channels exist: securities, secrets, goods
    • from trading in gold or silver, neither of which are outlawed any longer, to trading in secrets, how can the government stop this?
      • art being used to transfer money across international
        borders (avoids Customs)
      • «consideration» given, a la the scam to hide income
    • total surveillance?
      • it doesn’t even work in Russia
      • on the other hand, Russia lacks the «point of sale»
        infrastructure to enforce a cashless system
        16.26.3. Another Direct Attack: Government Control of Encryption,
        Networks, and Net Access
  • a la the old Bell System monopoly, which limited what could
    be hooked up to a phone line
  • the government may take control of the networks in several ways:
    • FCC-type restrictions, though it is hard to see how a
      private network, on private property, could be restricted
    • as it is not using part of the «public spectrum»
    • but it is hard to build a very interesting network that
      stays on private property….and as soon as it crosses
      public property, BINGO!
    • «National Data Highway» could be so heavily subsidized
      that alternatives will languish (for a while)
    • the Al Gore proposals for a federally funded system
      (and his wife, Tipper, is of course a leader of the
      censorship wing)
    • and then the government can claim the right and duty to
      set the «traffic» laws: protocols, types of encryption
      allowed, etc.
    • key patents, a la RSA (if in fact gov’t. is a silent
      partner in RSA Data Security)
      16.26.4. An Indirect Attack: Insisting that all economic transactions
      be «disclosed» (the «Full Disclosure Society» scenario)
  • this sounds Orwellian, but the obvious precedent is that businesses must keep records of all financial transactions (and even some other records, to see if they’re colluding or manipulating something)
    • for income and sales tax reasons
    • and OSHA inspections, INS raids, etc.
    • there is currently no requirement that all transactions
      be fully documented with the identies of all parties,
      except in some cases like firearms purchases, but this
      could change
    • especially as electronic transactions become more
      common: the IRS may someday insist on such records,
      perhaps even insisting on escrowing of such records, or
      time-stamping
    • this will hurt small businesses, due to the entry cost and overhead of such systems, but big businesses will probably support it (after some grumbling)
      • big business always sees bureaucracy as one of their
        competitive advantages
    • and individuals have not been hassled by the IRS on minor
      personal transactions, though the web is tightening:
      1099s are often required (when payments exceed some
      amount, such as $500)
    • small scale barter transactions
  • but the nature of CA is that many transactions can be financial while appearing to be something else (like the transfer of music or images, or even the writing of letters)
    • which is why a cusp is coming: full disclosure is one
      route, protection of privacy is another
  • the government may cite the dangers of a «good old boy network» (literally) that promulgates racist, sexist, and ableist discrimination via computer networks
    • i.e., that the new networks are «under-representing
      people of color»
    • and how can quotas be enforced in an anonymous system?
  • proposals in California (7-92) that consultants file
    monthly tax statements, have tax witheld, etc.
  • a strategy for the IRS: require all computer network users
    to have a «taxpayer ID number» for all transactions, so
    that tax evasion can be checked
    16.26.5. Attempts to discredit reputation-based systems by deceit,
    fraud, nonpayment, etc.
  • deliberate attacks on the reputation of services the
    government doesn’t want to see
  • there may be government operations to sabotage businesses,
    to undermine such efforts before they get started
  • analogous to «mail-bombing» an anonymous remailer
    16.26.6. Licensing of software developers may be one method used to
    try to control the spread of anonymous systems and
    information markets
  • by requiring a «business license» attached to any and all
    chunks of code
  • implemented via digital signatures, a la the code signing protocols mentioned by Bob Baldwin as a means of reducing trapdoors, sabotage, and other modifications by spies, hackers, etc.
    • proposals to require all chunks of code to be signed,
      after the Sililcon Valley case in mid-80s, where
      spy/saboteur went to several s/w companies and meddled
      with code
  • «seals» from some group such as «Software Writers
    Laboratories,» with formal specs required, source code
    provided to a trusted keeper, etc.
  • such licensing and inspection will also serve to lock-in the current players (Microsoft will love it) and make foreign competition in software more difficult
    • unless the foreign competition is «sanctioned,» e.g.,
      Microsoft opens a code facility in India
      16.26.7. RICO-like seizures of computers and bulletin board systems
  • sting operations and setups
  • Steve Jackson Games is obvious example
  • for illegal material (porno, drug advocacy, electronic
    money, etc.) flowing through their systems
  • even when sysop can prove he did not know illegal acts were
    being committed on his system (precedents are the yachts
    seized because a roach was found)
  • these seizures can occur even when a trial is never held
    • e.g., the «administrative seizure» of cars in Portland in
      prostitution cases
    • and the seizures are on civil penalties, where the
      standards of proof are much lower
  • in some cases a mere FBI investigation is enough to get employees fired, renters kicked out, IRS audits started
    • reports that a woman in Georgia who posted some «ULs»
      (unlisted numbers?) was fired by her company after the
      FBI got involved, told by her landlord that her lease was
      not being extended, and so forth
    • «We don’t truck with no spies»
    • the IRS audit would not ostensibly be for harassment, but
      for «probable cause» (or whatever term they use) that tax
      avoidance, under-reporting, even money-laundering might
      be involved
      16.26.8. Outlawing of Digital Pseudonyms and Credentialling
  • may echoe the misguided controversy over Caller ID
    • misguided because the free market solution is clear: let
      those who wish to hide their numbers-rape and battering
      support numbers, police, detectives, or even just
      citizens requesting services or whatever-do so
    • and let those who refuse to deal with these anonymous
      callers also do so (a simple enough programming of
      answering machines and telephones)
  • for example, to prevent minors and felons from using the
    systems, «true names» may be required, with heavy fines and
    forfeitures of equipment and assets for anybody that fails
    to comply (or is caught in stings and setups)
  • minors may get screened out of parts of cyberspace by mandatory «age credentialing» («carding»)
    • this could be a major threat to such free and open
      systems, as with the various flaps over minors logging on
      to the Internet and seeing X-rated images (however poorly
      rendered) or reading salacious material in alt.sex
    • there may be some government mood to insist that only
      «true names» be used, to facillitate such age screening
      (Fiat-Shamir passports, papers, number of the Beast?)
  • the government may argue that digital pseudonyms are presumptively considered to be part of a conspiracy, a criminal enterprise, tax evasion, etc.
    • the old «what have you got to hide» theory
    • closely related to the issue of whether false IDs can be
      used even when no crimes are being committed (that is,
      can Joe Average represent himself by other than his True
      Name?)
  • civil libertarians may fight this ban, arguing that
    Americans are not required to present «papers» to
    authorities unless under direct suspicion for a crime
    (never mind the loitering laws, which take the other view)
    16.26.9. Anonymous systems may be restricted on the grounds that they
    constitute a public nuisance
  • or that they promote crime, espionage, etc.
  • especially after a few well-publicized abuses
    • possibly instigated by the government?
  • operators may have to post bonds that effectively drive
    them out of business
    16.26.10. Corporations may be effectively forbidden to hire consultants
    or subcontractors as individuals
  • the practical issue: the welter of tax and benefit laws make individuals unable to cope with the mountains of forms that have to be filed
    • thus effectively pricing individuals out of this market
  • the tax law side: recall the change in status of consultants a few years back…this may be extended further
    • a strategy for the IRS: require all computer network
      users to have a «taxpayer ID number» for all
      transactions, so that tax evasion can be checked
    • not clear how this differs from the point above, but I
      feel certain more such pressures will be applied (after
      all, most corporations tend to see independent
      contractors as more of a negative than a positive)
  • this may be an agenda of the already established companies:
    they see consultants and free lancers as thieves and
    knaves, stealing their secrets and disseminating the crown
    jewels (to punningly mix some metaphors)
  • and since the networks discussed here facilitate the use of
    consultants, more grounds to limit them
    16.26.11. There may be calls for U.N. control of the world banking
    system in the wake of the BCCI and similar scandals
  • to «peirce the veil» on transnationals
  • calls for an end to banking secrecy
  • talk about denying access to the money centers of New York
    (but will this push the business offshore, in parallel to
    the Eurodollar market?)
  • motivations and methods
    • recall the UNESCO attempt a few years back to credential
      reporters, ostensibly to prevent chaos and «unfair»
      reporting…well, the BCCI and nuclear arms deals
      surfacing may reinvigorate the efforts of
      «credentiallers»
    • the USSR and other countries entering the world community
      may sense an opportunity to get in on the formation of
      «boards of directors» of these kinds of banks and
      corporations and so may push the idea in the U.N.
    • sort of like a World Bank or IMF with even more power
      to step in and take control of other banks, and with
      the East Bloc and USSR having seats!
      16.26.12. «National security»
  • if the situation gets serious enough, a la a full-blown
    crypto anarchy system, mightn’t the government take the
    step of declaring a kind of national emergency?
  • provisions exist: «401 Emergency» and FEMA plans
  • of course, the USSR tried to intitiate emergency measures
    and failed
  • recall that a major goal of crypto anarchy is that the
    systems described here will be so widely deployed as to be
    essential or critical to the overall economy…any attempt
    to «pull the plug» will also kill the economy
    16.26.13. Can authorities force the disclosure of a key?
  • on the «Yes» side:
    • is same, some say, as forcing combination to a safe
      containing information or stolen goods
    • but some say-and a court may have ruled on this-that
      the safe can always be cut open and so the issue is
      mostly moot
    • while forcing key disclosure is compelled testimony
    • and one can always claim to have forgotten the key
    • i.e., what happens when a suspect simply clams up?
    • but authorities can routinely demand cooperation in
      investigations, can seize records, etc.
  • on the «No» side:
    • can’t force a suspect to talk, whether about where he hid
      the loot or where his kidnap victim is hidden
    • practically speaking, someone under indictment cannot be
      forced to reveal Swiss bank accounts….this would seem
      to be directly analogous to a cryptographic key
    • thus, the key to open an account would seem to be the
      same thing
    • a memorized key cannot be forced, says someone with EFF
      or CPSR
  • on balance, it seems clear that the disclosure of
    cryptographic keys cannot be forced (though the practical
    penalty for nondisclosure could be severe)
  • but this has not really been tested, so far as I know
  • and many people say that such cooperation can be
    demanded…

16.27. How Crypto Anarchy Advocates Will Fight Back
16.27.1. Bypassing restrictions on commercial encryption packages by
not making them «commercial»

  • public domain
  • freely distributed
  • after all, the basic algorithms are simple and don’t really
    deserve patent protection: money will not be made by the
    originators of the code, but by the actual providers of
    services (for transmission and storage of packets)
    16.27.2. Noise and signals are often indistinguishable
  • as with the LSB audio signal approach…unless the
    government outlaws live recordings or dubs on digital
    systems…
    16.27.3. Timed-release files (using encryption) will be used to hide
    files, to ensure that governments cannot remove material they
    don’t like
  • easier said than done
    16.27.4. Legal approaches will also be taken: fundamental
    constitutional issues
  • privacy, free speech, free association
    16.27.5. The Master Plan to Fight Restrictions on Encryption
  • «Genie out of the bottle» strategy: deploy crypto widely
    • intertwined with religions, games, whistleblower groups,
      and other uses that cannot easily just be shut down
    • scattered in amongst many other activities
  • Media attention: get media to report on value of
    encryption, privacy, etc.
  • Diffusion, confusion, and refusion
    • Diffuse the use by scattering it around
    • Confuse the issue by fake religions, games, other uses
    • Refuse to cooperate with the government
  • Free speech arguments: calling the discussions free speech
    and forcing the government to prove that the free speech is
    actually an economic transaction
  • links with religions, corporations, etc.
    • private meetings protected
    • voting systems

16.28. Things that May Hide the Existence of Crypto Anarchy
16.28.1. first and foremost, the incredible bandwidth, the bits
sloshing around the world’s networks…tapes being exchanged,
PCs calling other PCs, a variety of data and compression
formats, ISDN, wireless transmission, etc.
16.28.2. in the coming years, network traffic will jump a thousand-
fold, what with digital fax, cellular phones and computers,
ISDN, fiber optics, and higher-speed modems

  • and these links will be of all kinds: local, private,
    corporate, business, commercial, bootleg (unrecorded),
    cellular radio, etc.
    16.28.3. corporations and small groups will have their own private
    LANs and networks, with massive bandwidth, and with little
    prospects that the government can police them-there can be no
    law requiring that internal communications be readable by the
    government!
  • and the revelations that Ultra Black has been used to read
    messages and use the information will be further proof to
    corporations that they need to adopt very strong security
    measures
  • and «partnerships» can be scattered across the country, and even internationally, and have great lattitude in setting up their own communication and encryption systems
    • recall Cargill case
    • and also remember that the government may crack down on
      these systems
      16.28.4. AMIX-like services, new services, virtual reality (for games,
      entertainment, or just as a place of doing business) etc.
  • many users will encrypt their links to VR servers, with a decryption agent at the other end, so that their activities (characters, fantasies, purchases, etc.) cannot be monitored and logged
    • this will further increase the bandwidth of encrypted
      data and will complicate further the work of the NSA and
      similar agencies
    • attempts to force «in the clear» links will be doomed
      by the welter of PC standards, compression utilities,
      cellular modems, and the like…there will be no
      «cleartext» that can be mandated
      16.28.5. steganography
  • in general, impossible to know that a message contains other encypted messages
    • except in stings and setups, which may be ruled illegal
  • the LSB method, and variants
    • LSB of DAT, DCC, MD, etc., or even sound bites (chunks of
      sampled sounds traded on bulletin boards)
    • especially of live or analog-dubbed copies (the noise
      floor of a typical consumer-grade mike is much higher
      than the LSB of DAT)
    • of images, Adobe Photoshop images, artwork, etc.
    • imagine an «Online Art Gallery» that is used to store messages, or a «Photo Gallery» that participants post their best photos to, offering them for sale
      • Sturges case
      • LSB method
    • gets into some theoretical nitpicking about the true
      nature of noise, especially if the entire LSB channel is
      uncharacteristic of «real noise»
    • but by reducing the bandwidth somewhat, the noise
      profile can be made essentially undistinguishable from
      real noise
    • and a 2 GB DAT produces 130 MB of LSB, which is a lot
      of margin!
    • what could the government do?
    • stings and setups to catch and scare off potential
      users
    • an attempt to limit the wide use of digital
      data-hopeless!
    • a requirement for government-approved «dithering»?
      • this would be an enforcement nightmare
      • and would only cause the system to be moved into
        higher bits
      • and with enough error correction, even audible
        dithering of the signal would not wipe out the
        encrypted signal
    • variants: text justification, word selection
    • bandwidth tends to be low
    • but used in Three Days of the Condor
  • virtual reality art may further enable private communications
    • think of what can be encrypted into such digital images!
    • and user has total privacy and is able to manipulate the
      images and databases locally
      16.28.6. in the sense that these other things, such as the governments
      own networks of safe houses, false identities, and bootleg
      payoffs, will tend to hide any other such systems that emerge
  • because investigators may think they’ve stumbled onto yet another intelligence operation, or sting, or whatever
    • this routinely cripples undercover investigations
    • scenario: criminals even float rumors that another agency
      is doing an operation….?
      16.28.7. Government Operations that Resemble Cryptoanarchy will
      Confuse the Issues
  • various confidential networks already exist, operated by
    State, DoD, the services, etc.
  • Witness Protection Program (or Witness Relocation Program)
    • false IDs, papers, transcripts
    • even money given to them (and the amounts seem to be
      downplayed in the press and on t.v., with a sudden spate
      of shows about how poorly they do in the middle of middle
      America-sounds like a planted story to me)
    • cooperation with certain companies and schools to assist
      in this aspect
  • Payoffs of informants, unofficial agents
    • like agents in place inside defense contractors
    • vast amount of tips from freelancers, foreign citizens,
      etc.
    • operators of safe houses (like Mrs. Furbershaw)
  • Networks of CIA-funded banks, for various purposes
    • a la the Nugan-Hand Bank, BCCI, etc.
    • First American, Bank of Atlanta, Centrust Savings, etc.
    • these banks and S&Ls act as conduits for controversial or
      secret operations, for temporary parking of funds, for
      the banking of profits, and even for the private
      retirement funds of agents (a winked-at practice)
  • Confidential networks over computer lines
    • e.g., encrypted teleconferencing of Jasons, PFIAB, etc.
    • these will increase, for many reasons
    • concerns over terrorism
    • demands on time will limit travel (especially for
      groups of non-fulltime committee members)
  • these suspected government operations will deter
    investigation
    16.28.8. Encrypted Traffic Will Increase Dramatically
  • of all kinds
  • mail, images, proposals, faxes, etc.
  • acceptance of a P-K mail system will make wide use of
    encryption nearly automatic (though some fraction, perhaps
    the majority, will not even bother)
  • there may even be legal reasons for encryption to increase:
    • requirements that employee records be protected, that
      medical records be protected, etc.
    • «prudent man» rules about the theft of information (could
      mean that files are to be encrypted except when being
      worked on)
    • digital signatures
    • echoes of the COMSEC vs. SIGINT (or PROD) debate, where
      COMSEC wants to see more encryption (to protect American
      industry against Soviet and commercial espionage)
  • Selling of «Anonymous Mailers»?
    • using RSA
    • avoiding RSA and the P-K patent morass
    • could sell packets of one-time pads
    • no effective guarantee of security, but adequate for many simple purposes
      • especially if buyers swap them with others
      • but how to ensure that copies are not kept?
    • idea is to enable a kind of «Democracy Wall»
    • prepaid «coins,» purchased anonymously
    • as with the Japanese phone cards
    • or the various toll booth electronic tokens being
      developed
      16.28.9. Games, Religions, Legal Consultation, and Other «Covers» for
      the Introduction and Proliferation of Crypto Anarchy
  • won’t be clear what is real encryption and what is game-
    playing
  • imagine a game called «Cryptoanarchy»!
  • Comment on these «Covers»
    • some of these will be quite legitimate, others will be
      deliberately set up as covers for the spread of CA
      methods
    • perhaps subsidized just to increase traffic (and
      encrypted traffic is already expected to increase for a
      variety of reasons)
    • people will have various reasons for wanting anonymity
  • Games
    • «Habitat»-style games and systems
    • with «handles» that are much more secure than at
      present (recall Chip’s comments)
    • behaviors that are closely akin to real-world illegal behaviors:
      • a thieves area
      • an espionage game
      • a «democracy wall» in which anything can be posted
        anonymously, and read by all
    • MUDs (Multi-user Domains, Multi-User Dungeons)
    • lots of interest here
    • topic of discussion at a special Cypherpunks meeting,
      early 1994.
    • interactive role-playing games will provide cover for the
      spread of systems: pseudonyms will have much more
      protection than they now have
    • though various methods may exist to «tag» a transaction
      (a la barium), especially when lots of bandwidth is
      involved, for analysis (e.g., «Dark Dante» is
      identified by attaching specific bits to stream)
    • Dealing with Barium Tracers
      • code is allowed to simmer in an offsite machine for
        some time (and with twiddling of system clock)
      • mutations added
    • Shared Worlds
    • authors, artists, game-players, etc. may add to these
      worlds
    • hypertext links, reputation-based systems
    • hypothesize a «True Names» game on the nets, based
      explicitly on Vinge’s work
    • perhaps from an outfit like Steve Jackson Games, maker
      of similar role-playing games
    • with variable-resolution graphics (a la Habitat)
    • virtual reality capabilities
    • a game like «Habitat» can be used as a virtual Labyrinth,
      further confusing the line between reality and fantasy
    • and this could provide a lot of bandwidth for cover
    • the Smalltalk «Cryptoids» idea is related to this…it
      looks like a simulation or a game, but can be used by
      «outsiders»
  • Religions
    • a nearly ironclad system of liberties, though some
      limits exist
    • e.g., a church that uses its organization to transport
      drugs or run a gambling operation would be shut down
      quickly (recall the drug church?)
    • and calls for tax-break limitations (which Bill of
      Rights says nothing about)
    • still, it will be very difficult for the U.S.
      government to interfere with the communications of a
      «religion.»
    • «ConfessionNet»
    • a hypothetical anonymous system that allows confessions to be heard, with all of the privileges of privacy that normal confessions have
      • successors to 900 numbers?
    • virtually ironclad protections against government interference
      • «Congress shall make no law…»
    • but governments may try to restrict who can do this, a la the restrictions in the 70s and 80s on «instant Reverends»
      • Kirby J. Hensley’s Univeral Life Church
      • various IRS restrictions, effectively establishing
        two classes of religions: those grandfathered in and
        given tax breaks and the like, and those that were
        deemed invalid in some way
    • Scenario: A Scientology-like cult using CA as its chief
      communications system?
    • levels of initiation same as a cell system
    • «clearing»
    • New Age garbage: Ascended Masters, cells, money flowing
      back and forth
    • blackballing
  • Digital Personals
    • the «personals» section of newspapers currently requires
      the newspaper to provide the anonymity (until the parties
      mutually agree to meet)
    • what about on AMIX or similar services?
    • a fully digital system could allow self-arranging systems
    • here’s how it could work:
    • Alice wants to meet a man. She writes up a typical ad,
      «SWF seeks SWM for fun and walks on the beach…»
    • Alice encloses her specially-selected public key, which
      is effectively her only name. This is probably a one-
      time deal, unlinkable to her in any way.
    • She encrypts the entire package and sends it through a
      remailing chain (or DC-Net) for eventual posting in a
      public place.
    • Everyone can download the relevant area (messages can
      be sorted by type, or organized in interest groups),
      with nobody else knowing which messages they’re
      reading.
    • Bob reads her message and decides to repond. He
      digitizes a photo of himself and includes some other
      info, but not his real name. He also picks a public key
      for Alice to communicate with him.
    • Bob encrypts all of this with the public key of Alice
      (though remember that he has no way of knowing who she
      really is).
    • Bob sends this message through a remailing chain and it
      gets posted as an encrypted message addressed to the
      public key of Alice. Again, some organization can
      reduce the total bandwidth (e.g., an area for
      «Replies»).
    • Alice scans the replies and downloads a group of
      messages that includes the one she can see-and only she
      can see!-is addressed to her.
    • This has established a two-way communication path
      between Alice and Bob without either of them knowing
      who the other one is or where they live. (The business
      about the photos is of course not conducive to
      anonymity, but is consistent with the «Personals»
      mode.)
    • If Alice and Bob wish to meet in person it is then easy
      for them to communicate real phone numbers and the
      like.
    • Why is this interesting?
    • it establishes a role for anonymous systems
    • it could increase the bandwidth of such messages
  • Legal Services (Legitimate, i.e., not even the bootleg stuff)
    • protected by attorney-client privileges, but various Bar
      Associations may place limits on the use of networks
    • but if viewed the way phones are, seems unlikely that
      Bars could do much to limit the use of computer
      networks
    • and suppose a Nolo Press-type publishing venture started
      up on the Nets? (publishing self-help info under
      pseudonyms)
    • or the scam to avoid taxes by incorporating as a
      corporation or nonprofit?
  • Voting Systems
    • with and without anonymity
    • Board of Directors-type voting
    • with credentials, passwords, and (maybe) anonymity
      (under certain conditions)
    • Blackballing and Memberships
    • generally anonymous
    • blackballing may be illegal these days (concerns about
      racism, sexism, etc.)
    • cf. Salomaa for discussion of indistinguishability of
      blackballing from majority voting
    • Consumer Ratings and Evaluations
    • e.g., there may be «guaranteed anonymous» evalution
      systems for software and other high-tech items (Joe
      Bluecollar won’t mess with computers and complicated
      voting systems)
    • Politically Active Groups May Have Anonymous Voting
    • to vote on group policies, procedures, leadership
    • or on boycott lists (recall the idea of the PC-Card
      that doesn’t allow politically incorrect purchases)
    • this may be to protect themselves from lawsuits (SLAPP) and government harassment
      • they fear government infiltrators will get the names
        of voters and how they voted
    • Official Elections
    • though this is unlikely for the barely-literate
      majority
    • the inevitable fraud cases will get wide exposure and
      scare people and politicians off even more
    • unlikely in next decade
    • Journal Refereeing
    • some journals, such as Journal of Cryptology,
      appropriately enough, are already using paper-based
      versions of this
    • Xanadu-like systems may be early adopters
      • there are of course reasons for just the opposite:
        enhanced used of reputations
      • but in some cases anonymity may be preferred
  • Groupware
    • anonymous comment systems (picture a digital blackboard
      with anonymous remarks showing up)
    • these systems are promoted to encourage the quiet to have
      an equal voice
    • but they also provide another path to anonymous and/or
      reputation-based systems
  • Psychological Consultations
    • will require the licensing of counselors, of course
      (under U.S. laws)
    • what if people call offshore counselors?
    • and various limitations on privacy of records exist
    • Tarisoff [spelling?]
    • subpoenas
    • record-keeping required
    • may be used by various «politically correct» groups
    • battered women
    • abused children
    • perhaps in conjunction with the RU-486-type issues,
      some common ground can be established (a new kind of
      Underground Railroad)
  • Advice on Medicine (a la AIDS, RU 486)
    • anonymity needed to protect against lawsuits and seizure
    • NOW and other feminist groups could use crypto anarchy
      methods to reduce the risks to their organizations
  • Anonymous Tip Lines, Whistleblower Services
    • for example, a newspaper might set up a reward system,
      using the crypto equivalent of the «torn paper» key
    • where informant holds onto the torn off «key»
    • even something like the James Randi/Yuri Geller case
      reveals that «anonymous critics» may become more common
    • corporate and defense contractor whistleblowers may seek
      protection through crypto methods
    • a «Deep Throat» who uses bulletin boards to communicate
      with DS?
    • this presumes much wider use of computers and modems by
      «average» people…and I doubt «Prodigy»-type systems
      will support these activities!
    • but there may be cheap systems based on video game
      machines, a la the proposed Nintendo computers
    • environmentalists set up these whistleblower lines, for
      people to report illegal logging, spraying, etc.
  • Online, «Instant» Corporations
    • shell companies, duly incorporated in Delaware or
      wherever (perhaps even foreign sites) are «sold» to
      participants who wish to create a corporate cover for
      their activities
    • so that AMIX-like fees are part of the «internal
      accounting»
  • Anonymous collaborative writing and criticism
    • similar to anonymous voting
      16.28.10. Compressed traffic will similarly increase
  • and many compression algortithms will offer some form of
    encryption as a freebie
  • and will be difficult to decypher, based just on sheer
    volume
  • files will have to at least be decompressed before key word
    searches can be done (though there may be shortcuts)

16.29. The Coming Phase Change
16.29.1. «We’d better hope that strong cypto, cheap telecoms and free
markets can provide the organizing basis for a workable
society because it is clear that coercion as an organizing
principle ain’t what it used to be.» [Duncan Frissell, in
his sig, 4-13-94]
16.29.2. «What is the «inevitability» argument?»

  • Often made by me (Tim May), Duncan Frissell, Sandy
    Sandfort, and Perry Metzger (with some twists). And Hal
    Finney takes issue with certain aspects and contributes
    incisive critiques.
  • Reasons:
    • borders becoming more transparent to data flow
    • encryption is not detectable/stoppable
    • derivative financial instruments, money sloshing across
      borders
    • transnationalism
    • cash machines, wire transfers
    • «permanent tourists»
  • Borders are becoming utterly transparent to massive data
    flows. The rapid export of crypto is but an ironic example
    of this. Mosaid, ftp, gopher, lynx…all cross borders
    fluidly and nearly untraceably. It is probably too late to
    stop these systems, short of «pulling the plug» on the Net,
    and this pulling the plug is simply too expensive to
    consider. (If the Feds ever really figure out the long-
    range implications of this stuff, they may try it…but
    probably not.)
    16.29.3. «What is the «crypto phase change»?»
  • I’m normally skeptical of claims that a «singularity» is
    coming (nanotechnology being the usual place this is
    claimed, a la Vinge), but «phase changes» are more
    plausible. The effect of cheap printing was one such phase
    change, altering the connectivity of society and the
    dispersion of knowledge in a way that can best be described
    as a phase change. The effects of strong crypto, and the
    related ideas of digital cash, anonymous markets, etc., are
    likely to be similar.
  • transition
  • tipping factors, disgust by populace, runaway taxation
  • «leverage effect»
    • what Kelly called «the fax effect»
    • crypto use spreads, made more popular by common use
  • can nucleate in a small group…doesn’t need mass
    acceptance
    16.29.4. «Can crypto anarchy be stopped?»
  • A goal is to get crypto widely enough deployed that it cannot then be stopped
    • to the point of no return, where the cost of withdrawing
      or banning a technology is simply too high (not always a
      guaranteee)
  • The only recourse is a police state in which homes and
    businesses are randomly entered and searched, in which
    cryptography is outlawed and vigorously prosecuted, in
    which wiretaps, video surveillance, and other forms of
    surveillance are used aggressively, and in which perhaps
    the very possession of computers and modems is restricted.
  • Anything short of these police state tactics will allow the
    development of the ideas discussed here. To some extent.
    But enough to trigger the transition to a mostly crypto
    anarchic situation.
  • (This doesn’t mean everyone, or even most, will use crypto
    anarchy.)
    16.29.5. Need not be a universal or even popular trend
  • even if restricted to a minority, can be very influential
  • George Soros, Quantum fund, central banks, Spain, Britain,
    Germany
  • and a minority trend can affect others
    16.29.6. «National borders are just speedbumps on the digital
    superhighway.»
    16.29.7. «Does crypto anarchy have to be a mass movement to succeed?»
  • Given that only a tiny fraction is now aware of the
    implications….
  • Precedents for «vanguard» movements
    • high finance in general is an elite thing
    • Eurodollars, interest rate swaps, etc….not exactly
      Joe Average…and yet of incredible importance (George
      Soros has affected European central bank policy)
    • smuggling is in general not a mass thing
    • etc.
  • Thus, the users of crypto anarchic tools and instruments can have an effect out of proportion to their numbers
    • others will start to use
    • resentment by the «suckers» will build
    • the services themselves–the data havens, the credit
      registries, the espionage markets–will of course have a
      real effect
      16.29.8. Strong crypto does not mean the end to law enforcement
  • «…cryptography is not by any means a magic shield for
    criminals. It eliminates, perhaps, one avenue by which
    crimes might be discovered. However, it is most certainly
    not the case that someone who places an open anonymous
    contract for a murder in an open forum is doing so «risk
    free». There are plenty of ways she might be found out.
    Likewise, big secret societies that nefariously undermine
    the free world via cryptography are as vulnerable as ever
    to the motivations of their own members to expose the
    groups in a double-cross.» [Mike McNally, 1994-09-09]

16.30. Loose Ends
16.30.1. governments may try to ban the use of encryption in any
broadcast system, no matter how low the power, because of a
realization that all of them can be used for crypto anarchy
and espionage

  • a losing battle, of course, what with wireless LANs of
    several flavors, cellular modems, the ability to hide
    information, and just the huge increase in bandwidth
    16.30.2. «tontines»
  • Eric Hughes wrote up some stuff on this in 1992 [try to get
    it]
  • Italian pseudo-insurance arrangements
  • «digital tontines»?
    16.30.3. Even in market anarchies, there are times when a top-down,
    enforced set of behaviors is desirable. However, instead of
    being enforced by threat of violence, the market itself
    enforces a standard.
  • For example, the Macintosh OS, with standardized commands
    that program developers are «encouraged» to use. Deviations
    are obviously allowed, but the market tends to punish such
    deviations. (This has been useful in avoiding modal
    software, where the same keystroke sequence might save a
    file in one program and erase it in another. Sadly, the
    complexity of modern software has outpaced the Mac OS
    system, so that Command-Option Y often does different
    things in different programs.)
  • Market standards are a noncoercive counter to total chaos.
    16.30.4. Of course, nothing stops people from hiring financial
    advisors, lawyers, and even «Protectors» to shield them from
    the predations of others. Widows and orphans could choose
    conservative conservators, while young turks could choose to
    go it alone.
    16.30.5. on who can tolerate crypto anarchy
  • Not much different here from how things have been in the
    past. Caveat emptor. Look out for Number One. Beware of
    snake oil.
    16.30.6. Local enforcement of rules rather than global rules
  • e.g., flooding of Usenet with advertising and chain letters
    • two main approaches
    • ban such things, or set quotas, global acceptable use
      policies, etc. (or use tort law to prosecute & collect
      damages)
    • local carrriers decide what they will and will not
      carry, and how much they’ll charge
    • it’s the old rationing vs. market pricing argument
      16.30.7. Locality is a powerful concept
  • self-responsibility
  • who better to make decisions than those affected?
  • tighter feedback loops
  • avoids large-scale governments
  • Nonlocally-arranged systems often result in calls to stop «hogging» of resources, and general rancor and envy
    • water consumption is the best example: anybody seen
      «wasting» water, regardless of their conservations
      elsewhere or there priorities, is chastised and rebuked.
      Sometimes the water police are called.
    • the costs involved (perhaps a few pennies worth of
      water, to wash a car or water some roses) are often
      trivial…meanwhile, billions of acre-feet of water are
      sold far below cost to farmers who grow monsoon crops
      like rice in the California desert
    • this hypocrisy is high on my list of reasons why free
      markets are morally preferable to rationing-based
      systems

Descubre más desde Anonimato, Privacidad, Hacking & ++

Suscríbete y recibe las últimas entradas en tu correo electrónico.

Páginas: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Los comentarios están cerrados.

Blog de WordPress.com.

Subir ↑