Carl Malamud: Internet Talk Radio, flame of the Internet. 

This is Geek to the Week and we’re talk­ing to Jeffrey Schiller of the Massachusetts Institute of Technology, com­mon­ly known as MIT. Jeff is man­ag­er of sys­tems and oper­a­tions, which basi­cal­ly means he runs Net 18 of the Internet, respon­si­ble for the Athena servers, Hesiod, Kerberos, the file servers. In oth­er words when some­thing goes wrong at MIT, and that’s the kind of place where things go wrong, Jeff’s the guy you call. Jeff, wel­come to Geek of the Week.

Jeffrey Schiller: Thanks Carl. It’s very good to be here.

Malamud: Well good. You’re not­ed for your inter­est in secu­ri­ty mat­ters. Is that because you have to deal with all these pre­co­cious under­grad­u­ates? Is that would height­ened your inter­est in security?

Schiller: Well actu­al­ly, I was inter­est­ed in com­put­er secu­ri­ty when I first showed up at MIT as an under­grad­u­ate. I just found it an intel­lec­tu­al­ly inter­est­ing field of study. But indeed because we have the stu­dents that we have I have an inter­est­ing per­spec­tive on it. In fact at MIT I like to say we have only two kinds of com­put­er secu­ri­ty. We have very good com­put­er secu­ri­ty, and we have…none at all. Because noth­ing in between is of any consequence.

Malamud: Well what’s that mean?

Schiller: Well it means if we take a secu­ri­ty half-measure, we’ll have some very bright stu­dent who will explain to us in the worst way, mean­ing by doing some­thing we’d rather they did­n’t do, that it was in fact a half-measure. They will break it. They will fig­ure out once they’ve bro­ken it what thing that they could do that will cause us max­i­mum embar­rass­ment, and them min­i­mum pain, to make the point.

Malamud: Well let’s look at two exam­ples. What’s an exam­ple of a half-baked secu­ri­ty mea­sure that would­n’t be a good thing to imple­ment at a place like MIT?

Schiller: A good exam­ple would be just about any pro­to­col or ser­vice that depends on authen­tic­i­ty of IP address­es, or depends on work­sta­tions in pub­lic places declar­ing who their users are. I think the net­work file ser­vice, the net­work file sys­tem from Sun pri­or to the use of secure NFS is a clear exam­ple of that.

Malamud: What’s an exam­ple of a real­ly good secu­ri­ty mea­sure you can insti­tute that does stop your stu­dents that are bay­ing at the at the doors?

Schiller: Well, to do it right what you have to do is you have to make the prob­lem that they have to solve in order to break secu­ri­ty too hard to solve. And there are prob­lems that are too hard to solve or require to much com­pu­ta­tion. The clear exam­ple that comes to mind is any­thing based on strong cryp­tog­ra­phy if done prop­er­ly will require them to break a cryp­to sys­tem which, as bright as they may be, if it’s going to take years of CPU time to crack a par­tic­u­lar key, it’s gonna take years of CPU time for some­body else or for them. They’re not spe­cial in that regard.

Malamud: I’ve heard the the­o­ry that you can have good secu­ri­ty with­in an envi­ron­ment, with­in MIT or with­in IBM, but you can’t have good secu­ri­ty in the Internet. Do you believe that?

Schiller: Not at all. I think the rea­son that we see that we have good secu­ri­ty with­in some envi­ron­ments and we don’t have it glob­al­ly with­in the Internet is that we don’t yet have stan­dard­ized ways that are wide­ly sup­port­ed by ven­dors that would allow secu­ri­ty to exist on an Internet-wide basis. If you look at those places that do have very good secu­ri­ty you’ll dis­cov­er that they’ve done some­thing non-standard, or they’ve done some­thing them­selves or they’ve got­ten some­body else to do something…in some sense some amount of cus­tom work or cus­tom pro­gram­ming. And you can’t do that on a scale the size of the Internet. What we real­ly need is we need the ven­dors of the soft­ware and hard­ware that every­body buys to imple­ment those basic secu­ri­ty ser­vices so that we can just basi­cal­ly glue the pieces togeth­er. But that’s cer­tain­ly doable task. 

Malamud: What are some of those cus­tom solu­tions that won’t scale?

Schiller: [Mutters:] Now you’re mak­ing me think. 

Malamud: That’s what we try to do here on Geek of the Week. [both laugh]

Schiller: Um…

Malamud: Is a fire­wall, for exam­ple? A lot of peo­ple put in fire­walls and they pro­tect their net­work by say­ing the only thing that can get into our net­work is elec­tron­ic mail. Does that work?

Schiller: Well that’s actu­al­ly a very good exam­ple, because that’s exact­ly— That’s a won­der­ful exam­ple of some­thing that’s very crude, very effec­tive, and absolute­ly the wrong thing to do. And I won’t take cred­it for this argu­ment. This is actu­al­ly an argu­ment that Dave Clark has made on many occa­sions and I hearti­ly agree with, which is by build­ing fire­walls what you’ve done is you’ve lim­it­ed the avail­abil­i­ty of your net­work not only to hack­ing from out­side, but also to good pur­pos­es that might be done. There was a col­lab­o­ra­tive project that I was work­ing with with a rather large hard­ware vendor—I can’t men­tion their name here. And part of that col­lab­o­ra­tion would require us for debug­ging to send pack­ets between their inter­nal net­work and my net­work. And the bot­tom line was we weren’t able to do that because they could­n’t con­vince the secu­ri­ty peo­ple who ran that fire­wall to let those pack­ets through. So if you’re going to— You know, you can secure your­self, but at the same time you’re gonna lose oppor­tu­ni­ties and that oppor­tu­ni­ty cost is very hard to evaluate. 

Malamud: Can you get around those fire­walls? Can you build IP over email, for example?

Schiller: Well I don’t know if you’d want to build IP over email, but in fact a lot of the fire­walls that are in place today, if an employ­ee of the orga­ni­za­tion, an insid­er, wants to take some mea­sures that their man­age­ment might not approve of, you can usu­al­ly build tun­nels through most of the fire­wall that’re in exis­tence today. To be more clear, it was very pos­si­ble that if I real­ly want­ed to col­lab­o­rate with those folks inside of that com­pa­ny I was work­ing with, that they could have, using a PC con­fig­ured an IP tun­nel from their insti­tu­tion to my insti­tu­tion that would allow full rout­ing through the fire­wall. Now of course, they knew they weren’t sup­posed to do that, they were try­ing to be on the up and up so they did­n’t do that. But keep in mind an insid­er who has mal­in­tent, and after all we don’t build the fire­walls to keep the good guys out we build them the keep the bad guys out and some­times those bad guys are insid­ers, a bad guy would have no prob­lems build­ing that IP tun­nel and doing what­ev­er bad thing they want­ed to do with it.

Malamud: So you think fire­walls are not secure.

Schiller: Uh, I think they’re more secure than not being present if you don’t use oth­er secu­ri­ty tech­niques. I would­n’t say to some­body who has a fire­wall, Knock down the fire­wall. Do noth­ing else.” Because indeed they’ll have a decrease in secu­ri­ty. What I’m say­ing is two things. I’m say­ing to users, you got­ta find oth­er solu­tions to the fire­walls. And I’m say­ing to the ven­dors, you’ve got to pro­vide those solu­tions. The tech­nol­o­gy exists, you just got­ta use it in clever ways. 

And then of course the users have to tell the ven­dors, We want this. Make that a pri­or­i­ty for your prod­ucts.” And then the fire­walls can go away because they’ll be obsolete. 

Malamud: Is secu­ri­ty some­thing that the users have to pro­vide or is it some­thing that the Internet should be pro­vid­ing for the users?

Schiller: Well, that’s an inter­est­ing ques­tion. Of course the Internet does­n’t con­sist of just the net­work and the users, there’s net­work ser­vice providers, there’s host admin­is­tra­tors, there’s a whole range of peo­ple. Ultimately there’s the end user sit­ting on the desk­top. And cer­tain­ly the end user should­n’t have to be a secu­ri­ty expert in order to have a secure Internet. In fact, you can argue that the end user, be they a math­e­mati­cian, be they a physi­cist, be they a biol­o­gist, should­n’t even need to be a com­put­er expert, nonethe­less a com­put­er secu­ri­ty expert, to use the net­work. But yet there are those of us with­in the net­work who run part of the infra­struc­ture who should be aware. 

I should be, for exam­ple, care­ful to ensure that when we run the MIT net­work that we run it in such a fash­ion that my users can be pro­tect­ed. That means that I may have to advise my users. That means I should be lob­by­ing vendors—and I do this and maybe I’m doing this right now—that they should be pro­vid­ing turnkey solu­tions that are safe out of the box, so when my users, my physi­cists, and my biol­o­gists buy them that they should just by default to be secure. I think the peo­ple who run the nation­al net­works need to be tak­ing secu­ri­ty seri­ous­ly, and I think they actu­al­ly are but they’re in some sense the wrong lev­el. It’s sort of like ask­ing the high­way patrol to be respon­si­ble for mak­ing sure hous­es don’t get bur­gled in a local neigh­bor­hood by some­how doing some­thing on the inter­state at some level.

So there’s a role for many dif­fer­ent play­ers to play but I say right now the largest role is in the hands of pro­to­col design­ers for com­mu­ni­ca­tions pro­to­cols, com­put­er sys­tem designers—the peo­ple who design these sys­tems that we use. I think it’s of course incum­bent upon the ven­dors and the peo­ple who work for those ven­dors who build these sys­tems. And I think it’s a lit­tle bit incum­bent on the users to cre­ate the mar­ket for those ven­dors to want to do that.

Malamud: Well let’s talk about some of the pro­to­cols that could be deployed that lead to a more secure Internet. One that comes to mind imme­di­ate­ly is Privacy-Enhanced Mail. Privacy-Enhanced Mail seems to have two pieces. One is an under­ly­ing infra­struc­ture of pub­lic key cer­tifi­cates, and the oth­er one is secure mes­sag­ing on top of it. Do you think that PEM is actu­al­ly going to go some­place. Are we gonna see that wide­ly deployed in the Internet?

Schiller: Well I think it’s still too ear­ly to tell how widely-deployed that tech­nol­o­gy will be. I’m of course hop­ing that it will be wide­ly deployed; there’s some very good ideas in there. Earlier you asked me a ques­tion about can we scale secu­ri­ty from local sites to the entire Internet. And part of the PEM tech­nol­o­gy, the pub­lic key cer­tifi­cate infra­struc­ture, is exact­ly the tech­nol­o­gy that you need to deploy so that you can have secure ses­sions and secure com­mu­ni­ca­tion that goes across the entire Internet between peo­ple who have nev­er met each oth­er in dif­fer­ent states and in dif­fer­ent coun­tries and yet have that com­mu­ni­ca­tion, be it elec­tron­ic mail, video con­fer­enc­ing, you name it, be secure. Once we have that pub­lic key infra­struc­ture, PEM as PEM—as Privacy-Enhanced Mail is but the first appli­ca­tion that can take advan­tage of it. And these days we tend to think of the two as tied togeth­er because we’re using Privacy-Enhanced Mail as the way of deploy­ing the pub­lic key infra­struc­ture but they real­ly are separate.

But once you have that pub­lic infra­struc­ture, Privacy-Enhanced Mail of course if you look mail itself is one of the largest and most heavily-used appli­ca­tions on the Internet. It’s one of the key ways that peo­ple com­mu­ni­cate with each oth­er. Sometimes send­ing some very sen­si­tive infor­ma­tion. Sometimes send­ing infor­ma­tion of com­mer­cial val­ue. Not only spec­i­fi­ca­tions but also pur­chas­ing com­mit­ments and pur­chase orders. And being able to secure that both in terms of con­fi­den­tial­i­ty as well as authen­tic­i­ty and integri­ty is a very impor­tant ser­vice the Internet can provide.


Malamud: You’re lis­ten­ing to Geek of the Week. Support for this pro­gram is pro­vid­ed by O’Reilly and Associates, rec­og­nized world­wide for defin­i­tive books on the Internet, Unix, the X Windows sys­tem, and oth­er tech­ni­cal top­ics. Additional sup­port for Geek of the Week comes from Sun Microsystems. Sun, the net­work is the computer.

Don’t touch that mouse, Internet Talk Radio will be right back.

[Ask Dr. SNMP seg­ment omitted]


Malamud: The pub­lic key infra­struc­ture that we’re deploy­ing is based on some some some­what pro­pri­etary tech­nol­o­gy that comes from RSA. Is that the right tech­nol­o­gy to be bas­ing this glob­al secu­ri­ty infra­struc­ture on?

Schiller: It’s the best tech­nol­o­gy that I’ve seen. Basically all oth­er tech­nolo­gies that would com­pete with it have the prop­er­ty that the peo­ple who wish to com­mu­ni­cate have to some­how meet. They have the some­how exchange some secure infor­ma­tion out­side of the con­text of the Internet. And many peo­ple on the Internet who com­mu­ni­cate only com­mu­ni­cate through the net­work, because of eco­nom­ic rea­sons, geo­graph­ic dis­tances, or what have you. The net­work to be real­ly use­ful must be a whole unto itself, and pub­lic key cryp­tog­ra­phy is one of the key tech­nolo­gies and enables it. And indeed in this coun­try, in the United States, it is a pro­pri­etary tech­nol­o­gy. And one of the chal­lenges fac­ing us is fig­ur­ing out ways to deal with that pro­pri­etary tech­nol­o­gy to ensure that the own­ers of it are prop­er­ly com­pen­sat­ed and yet the tech­nol­o­gy is wide­ly deployed in a man­ner that is not offen­sive to the end users. 

And I might add that pub­lic key tech­nol­o­gy is not the only pro­pri­etary tech­nol­o­gy that’s in wide­spread use. Ethernet, one of the key local area net­work­ing tech­nolo­gies, is a pro­pri­etary tech­nol­o­gy. There are many patents that cov­er it. And when you buy Ethernet hard­ware, part of the mon­ey that you pay for that goes to pay the patent hold­ers. And so what we need is to fig­ure out a fair and equi­table way of com­pen­sat­ing the inven­tors of the pub­lic key tech­nol­o­gy and the patent hold­ers, and yet is as innocu­ous and as in essence unno­ticed as the pay­ments of patents on Ethernet boards.

Malamud: The Internet is a glob­al infra­struc­ture. And the RSA tech­nol­o­gy is sub­ject to some export restric­tions. How is that gonna impact our abil­i­ty to deploy that infrastructure?

Schiller: Well actu­al­ly there’s a very sim­ple answer to that, which is— Some peo­ple might argue with this, par­tic­u­lar peo­ple with­in the export con­trol area, not that I want to say bad things about them. You can draw your own con­clu­sions, but there are some peo­ple who think that only smart peo­ple exist in the United States. But frankly my expe­ri­ence shows that that’s just not true. And indeed export con­trol says that an imple­men­ta­tion of Privacy-Enhanced Mail or any pro­to­col that would be using pub­lic key cryp­tog­ra­phy, or any cryp­tog­ra­phy for that mat­ter, can’t be export­ed from the US but there’s noth­ing to say that some­body in anoth­er coun­try can’t imple­ment some­thing accord­ing to the same set of RFCs and have them inter­op­er­ate. One of the beau­ties of the Internet stan­dards process is because so much empha­sis is placed on inter­op­er­a­ble imple­men­ta­tions, and the stan­dards are fine-tuned so that is two peo­ple or two orga­ni­za­tions read the stan­dard and code to it that they would result in some­thing that would you inter­op­er­ate, we’re a leg up. I mean it’s very like­ly that we will see, and in fact we’re already begin­ning to see, PEM imple­men­ta­tions done in oth­er coun­tries that will inter­op­er­ate with ours. And in that con­text export con­trol’s just not an issue.

Malamud: But are the export con­trols ratio­nal? Do they have any tech­ni­cal basis in fact? If peo­ple in oth­er coun­tries are able to do that tech­nol­o­gy what’s the pur­pose of an export control?

Schiller: Well, I’m not the right per­son to ask that ques­tion. Obviously you have to find the right peo­ple with­in the gov­ern­ment, and I’m not sure that their forth­com­ing with this type of stuff to come out explain their ratio­nale. But I can speculate.

I think what’s hap­pen­ing— If I was in their posi­tion, if I was to take their point of view, I think the thing that con­cerns the export con­trol peo­ple and that con­cerns law enforce­ment agents is, their night­mare is a ter­ror­ist or a drug deal­er going into a Radio Shack store and buy­ing the Realistic Telephone Authenticator And Scrambler, which uses tech­nol­o­gy so strong that they can­not break it and yet there it is for ten bucks, any­body can walk off the street and buy it. That’s their night­mare. I don’t think they’re con­cerned with an Internet pro­fes­sion­al writ­ing a pro­gram or even a PEM imple­men­ta­tion and dis­trib­ut­ing it, because that’s not going to be avail­able on the shelves of Radio Shack.

Malamud: We should men­tion that prod­uct is not avail­able on the shelves of Radio Shack. 

Schiller: No, no. I have recent­ly been in a Radio Shack store and I assured there are no such prod­ucts on the shelves of Radio Shack stores. And if you lift­ed export con­trol, and if you dereg­u­late all of that tech­nol­o­gy, then you real­ly would see such prod­ucts. So there is a price to be paid.

Malamud: The Internet is well over twenty-five years old by this time, yet secu­ri­ty has been a long time in com­ing. We have a few things. We have things like pass­words when you try to FTP in to a cer­tain account. But we don’t have a real secu­ri­ty infra­struc­ture. Has the Internet tried to do secu­ri­ty too well, and as a result not come up with things that we can use today?

Schiller: Well I think the lack of secu­ri­ty on the Internet is— First of all this is not a prob­lem that is unique to the Internet. If you look at oth­er net­works that are built, they either have no secu­ri­ty or, worse yet, they have the half-measure secu­ri­ty that I say our stu­dents break triv­ial­ly. Security that appears to be secu­ri­ty for the end users, but in fact is not proof against any kind of a seri­ous attack. Within the Internet we have very lit­tle half-measure secu­ri­ty. I hard­ly think we have any at all. We have a lot­ta no secu­ri­ty and I think a lot­ta that is based on the his­to­ry of the Internet hav­ing come from the ARPANET, com­ing from a research com­mu­ni­ty, researchers, good guys, lot­sa oth­er good guys, not think­ing of the net­work as a com­mer­cial vehi­cle. I mean cer­tain­ly the ear­ly peo­ple who built it were not say­ing, Hey I’m build­ing a bank­ing net­work.” They said, No, I’m build­ing up a net­work to do my research on, and noth­ing that some­body else can do to this net­work is par­tic­u­lar­ly inter­est­ing or dam­ag­ing to me.” In fact the Internet Worm inci­dent, which I think scared a lot­ta peo­ple in 1988 on the Internet, to some parts of the research com­mu­ni­ty was an inter­est­ing curios­i­ty. Gee, I did­n’t know you can do some­thing like that. That’s pret­ty neat. 

So it’s a dif­fer­ent point of view. And of course now we’re play­ing catch-up. Now we have a sit­u­a­tion with the Internet, in some sense while we weren’t look­ing, went in a very short peri­od of time from that research toy to being a major com­mer­cial net­work where peo­ple… And you know, peo­ple will say well it’s not real­ly a com­mer­cial net­work. But I would say that there’s a lot of peo­ple if not most peo­ple today who use the Internet…use it as part of the thing that they have to do to do their job. So it’s part of their life. And they view it as a secure pro­duc­tion ser­vice that has got­ta be there. And that may not be com­mer­cial…though of course we’re becom­ing more com­mer­cial, but that is cer­tain­ly not a research net­work either. 

And so we’re play­ing catch-up. And we have peo­ple who have crit­i­cized the peo­ple doing secu­ri­ty in the Internet on insist­ing on doing very strong mea­sures. And those strong mea­sures some­times have prob­lems like using pro­pri­etary tech­nol­o­gy, like run­ning head-on into export con­trol laws, that cause things to slow down and not be imme­di­ate­ly avail­able. But I think in the long run that’ll be a very— I think that’s the wise course to take, because oth­er­wise we’d have a pro­lif­er­a­tion of half-measures which would prob­a­bly last us two or three years until some bright, obnox­ious Robert Morris Jr. looka­like decides to demon­strate how bad they are. I think if we’re gonna deploy a secu­ri­ty tech­nol­o­gy it real­ly does have to be good enough that we don’t all wind up with egg on our face.

Malamud: There’s a move­ment out there that says that PEM is too com­pli­cat­ed and too secure and we ough­ta be using a soft­ware prod­uct called Pretty Good Messaging. Can you com­ment on that? Is that just one of those half-baked measures?

Schiller: Uh, no. Pretty Good Privacy, the PGP pro­gram is actually—has ben­e­fit­ed from the PEM tech­nol­o­gy. If any­thing it is an imple­men­ta­tion of the basic con­cepts and ideas of PEM, with a cou­ple of inter­est­ing twists added to fit the polit­i­cal bent of its design­ers. It’s not com­pli­ant with PEM; I don’t wan­na say it’s a PEM imple­men­ta­tion. But it’s cer­tain­ly been influ­enced by the PEM RFCs. You might say it’s a freeform ver­sion of PEM, with some lib­er­ties tak­en with mes­sage for­mats and encryp­tion algorithms. 

The con­tro­ver­sy that swirls around it has to do with that with the fact that the peo­ple who own the tech­nol­o­gy in the United States are not par­ty to it and are not get­ting com­pen­sat­ed. And there’s some polit­i­cal issues around that that I don’t real­ly want to get into. And of course because it’s flow­ing across bor­ders, most­ly from Europe into the US because it was devel­oped for the most part—the cur­rent version—beyond the US bor­ders, I like to joke that we’ve cre­at­ed a new class of soft­ware. We have com­mer­cial soft­ware, we have free­ware, we have share­ware. Well PGP was the first exam­ple I’ve seen of for­bid­denware. And as such it has a cer­tain appeal to a cer­tain sort of mind­set that exists on the network. 

But it’s not a half mea­sure and in fact if any­thing it’s demon­strat­ing that the fea­tures that the PEM tech­nol­o­gy and the pub­lic key tech­nol­o­gy can pro­vide are both want­ed and very valuable.


You’re lis­ten­ing to Geek of the Week. Support for this pro­gram is pro­vid­ed by Sun Microsystems. Sun Microsystems, open sys­tems for open minds. Additional sup­port for Geek of the Week comes from O’Reilly and Associates, pub­lish­ers of books that help peo­ple get more out of computers. 

This is Internet Talk Radio. You may copy these files and change the encod­ing for­mat, but may not alter the con­tent or resell the pro­grams. You can send us mail to mail@​radio.​com.

Internet Talk Radio, same-day ser­vice in a nanosec­ond world.


Malamud: GIF files are inter­est­ing because there have been occa­sions in which let’s say overzeal­ous MIT stu­dents have put porno­graph­ic GIF files on the net­work and sent them out. And I’m sure you like oth­er net­work admin­is­tra­tors occa­sion­al­ly get oth­er net­works call­ing you up and say­ing, Stop those peo­ple from doing that.” Is that some­thing that you as a sys­tem admin­is­tra­tor should be able to do? Should you be able to stop your peo­ple from doing things?

Schiller: Well. The porno­graph­ic GIF images is actu­al­ly a very com­pli­cat­ed issue. Because there are sev­er­al dif­fer­ent sources of those images. The case we have at MIT is MIT does have a harass­ment pol­i­cy and we do have a pol­i­cy for the use of the MIT net­work that does make cer­tain types of porno­graph­ic images inap­pro­pri­ate to send across our net­work. But frankly, I know of no inci­dent where one stu­den­t’s sent a porno­graph­ic image per­son­al­ly to anoth­er stu­dent that ever caused a problem. 

The case where we have prob­lems is when some­body oper­ates an archive, or a file serv­er, or an FTP serv­er, with a publicly-writable direc­to­ry and peo­ple lit­er­al­ly all over the world store these files and fetch these files. So in some sense it’s an exchange site, so to share with your friends. And in fact I’ve mon­i­tored some of these and you see a file appears with a name like please upload such and such file.gif” And a few days lat­er a file with that name appears, and pre­sum­ably the per­son who cre­at­ed the file with the long fun­ny name has actu­al­ly gone and fetched that file. And now of course it’s still sit­ting there for any­body else who might want it. And the sit­u­a­tion we’ve had on the MIT cam­pus has been that we have fac­ul­ty mem­bers who’ve actu­al­ly run one of these machines that basi­cal­ly say that they don’t endorse porno­graph­ic images on their sys­tem, but at the same time they’re not going to be police­men and go around and clean­ing it up. They said they have a legit­i­mate rea­son for hav­ing that publicly-writeable direc­to­ry, and they’re not going to be play­ing Internet copy, in essence. And we—myself as a sys­tem administrator—are just not in a posi­tion to do any­thing about that. If the fac­ul­ty of MIT want to deal with this at a fac­ul­ty meet­ing or oth­er­wise cen­sure oth­er fac­ul­ty mem­bers or come up with a pol­i­cy state­ment, well that’s cer­tain­ly some­thing that might hap­pen. But I don’t have the author­i­ty as the net­work man­ag­er at MIT to uni­lat­er­al­ly go and stomp people.

Malamud: Well let’s say I’m the man­ag­er for the research net­work in Freedonia, for exam­ple. And my users are going across and grab­bing all these files and are hos­ing my net­work. They’re offend­ing my users, they’re get­ting rid of my infra­struc­ture. Shouldn’t you be doing some­thing since you’re the source of those files? You as MIT?

Schiller: Well cer­tain­ly things I can do is I can point out to the fac­ul­ty mem­bers who run the sys­tem that there’s real harm being done, par­tic­u­lar­ly when we have sit­u­a­tions of band­width sat­u­ra­tion and what have you. And when a spe­cif­ic inci­dent like that hap­pens we usu­al­ly can do some­thing about it. I mean, the fac­ul­ty mem­bers involved are not with­out sym­pa­thy to the prob­lem, and will react to a par­tic­u­lar inci­dent. Again, they just don’t want to be made into the Internet cops. And if I say that a par­tic­u­lar file or a par­tic­u­lar sit­u­a­tion is caus­ing a par­tic­u­lar prob­lem right now, they’ll cer­tain­ly respond to that. They won’t say well that’s just some­body else’s prob­lem. It’s just that again, it’s not so much the reac­tion to the inci­dent, it’s the I won’t be the cop” mentality.

Malamud: Okay, well they’re not the cop. And you’re not the cop. Who’s the cop? Should it be the FBI? Do we need a police on the Internet? The Bit Police.

Schiller: Well, one of— You know, you raise an inter­est­ing point. Because if all the traf­fic was with­in one coun­try, we might say, Well, you know, if the stuff that’s being trans­mit­ted is against a law, well, there are legal author­i­ties.” Of course a lot of the stuff that’s around is actu­al­ly cross­ing bor­ders. And in fact it’s not uncom­mon at all to see the con­nec­tions that come into places to get images and even software—let’s face it, legit­i­mate users are com­ing from in all con­ti­nents and many many coun­tries. So in fact it’s very hard to fig­ure out what the Internet Law” would be. So I would try to stay away from try­ing to cre­ate Internet cops because it’s not clear what law it is they have to enforce.

Malamud: There was a recent arti­cle in the Communications of the ACM which dealt with the ques­tion of cryp­tog­ra­phy and cryp­to keys, and the role of law enforce­ment. And that pro­pos­al basi­cal­ly said well…you know…if we have total­ly secure mes­sag­ing and total­ly secure Internet, then we’re in a posi­tion where the FBI won’t be able to track down a ter­ror­ist or a drug deal­er, and there­fore that encour­ages crime. Should there be a loop­hole in a secu­ri­ty sys­tem or a way that the FBI ought to be able to come in with a prop­er war­rant to be able to fig­ure out what what’s been going on?

Schiller: Well…there’s actu­al­ly two answers to that ques­tion. Let me answer more generally. 

The use of cryp­tog­ra­phy to pro­vide pri­va­cy to mes­sages is a new thing, at least in terms of very strong cryp­tog­ra­phy being avail­able poten­tial­ly to a very large num­ber of peo­ple. And that’s a very big plus for pro­vid­ing pri­va­cy. And you know, com­put­ers to date have had a real­ly bad track record on the pri­va­cy front. Usually they’re used to take away your pri­va­cy. Corporations, cred­it card com­pa­nies, have data­bas­es of peo­ple. I under­stand some states are look­ing to dig­i­tize the pic­ture that’s on your dri­ver’s license and that’ll be stored in the data­base. And so com­put­ers have been the source of remov­ing pri­va­cy, and here’s an exam­ple where actu­al­ly some pri­va­cy can be brought back not only to indi­vid­u­als, but that self-same tech­nol­o­gy can be used by the orga­ni­za­tions, cred­it card com­pa­nies, or what have you that want to do the right thing and pro­tect their data­bas­es against hack­ing and what have you. 

So it’s a two-edged sword; both edges cut in our favor. We get per­son­al pri­va­cy, and by pro­vid­ing the tools to improve secu­ri­ty, those who do have data­base will be able to bet­ter pro­tect them from bad entries and hack­ing and what have you. So, that’s the first answer I’ll give you. 

And as far as I sym­pa­thize with law enforce­men­t’s con­cerns that the bad guys of the world might be able to use this tech­nol­o­gy to com­mu­ni­cate beyond the abil­i­ty of the FBI to lis­ten in, and that will make crimes eas­i­er to com­mit and that will aid crim­i­nals, well my com­ment is: tele­phones aid crim­i­nals. Automobiles aid criminals—heck, before you had the auto­mo­bile doing a fast get­away was next to impos­si­ble. And yet—

Malamud: Well, hors­es aid crim­i­nals too.

Schiller: [laughs] So you say you know, maybe we should out­law auto­mo­biles, or maybe we should put a fea­ture in your auto­mo­bile that the FBI by remote con­trol can like, make it stop. And I don’t think peo­ple would sort of go along with that, and this is just anoth­er exam­ple. As tech­nol­o­gy advances it changes the way the world is. It makes some crimes eas­i­er to com­mit and makes cer­tain law enforce­ment eas­i­er to do, and it’s a two-edged sword.

Malamud: It sounds like you’re say­ing that the tech­nol­o­gy is not nec­es­sar­i­ly gonna take away pri­va­cy. That the Internet can actu­al­ly enhance pri­va­cy if prop­er­ly applied? Or at least protected?

Schiller: You know, tech­nol­o­gy pro­vides the abil­i­ty for indi­vid­u­als and orga­ni­za­tions to do dif­fer­ent things. And I think tech­nol­o­gy on the Internet will pro­vide for increas­ing pri­va­cy of per­son­al com­mu­ni­ca­tions. Or, if not prop­er­ly used, or at not used in the inter­est of indi­vid­ual pri­va­cy can be used to take it away. It’s all up to how we use the tech­nol­o­gy, and how oth­ers use the tech­nol­o­gy. It’s not the tech­nol­o­gy itself.

Malamud: Thank you Jeff Schiller. This has been Geek of the Week. We’ve been talk­ing to Jeffrey Schiller from Massachusetts insti­tute of Technology. 


This has been Geek of the Week, brought to you by Sun Microsystems, and by O’Reilly and Associates. To pur­chase an audio cas­sette or audio CD of this pro­gram, send elec­tron­ic mail to radio@​ora.​com. Internet Talk Radio, the medi­um is the message.