The Power of Independent Thinking

←  EVENTS



Stay Connected
Get the latest updates straight to your inbox.



Will Strong Encryption Protect Privacy and Make Government Obsolete?
April 24, 2001
David D. Friedman

Contents

Introductory Remarks by David Theroux

Good evening, ladies and gentlemen. I’m David Theroux and I’m the president of The Independent Institute. I want to welcome you to our Independent Policy Forum this evening.

As most of you know, we conduct these programs, roughly, monthly and feature scholars and other experts who have written important new books and important issues. And tonight is certainly no exception.

This is the book that we’re featuring today, Law’s Order, by our speaker David Friedman. I hope that everyone has gotten several copies. They make great presents, graduation, whatever.

The actual title of tonight’s talk is, “Will Encryption Protect Privacy and Make Government Obsolete?” Some of us might wonder if it had ever been otherwise.

David is actually trained as a physicist and economist, teaches at the law school at Santa Clara University because of his extensive knowledge in law and economics and other related fields.

As many of you know, The Institute regularly sponsors programs like this. We’re a public policy research institute. We produce many books. This is our quarterly journal, The Independent Review, which I hope everyone here is also subscribing to for everyone in the family. This particular issue has a number of articles that pertain to privacy-related issues, especially pertaining to the nanny state, national security, and other matters. I wanted to recognize Robert Mondavi wineries who have very kindly donated the wine that we have enjoyed, and also The Customer Company, which co-sponsors our programs.

For those of you who are new to The Institute, in the registration packet you’ll find background information about our program, including how you can become a member and receive discounts, the journal, and many other benefits. We also invite you to visit our Website. We have a superb archive of previous events available in transcript and audio and so forth, as well as information about many of our publications.

Our next event will be on May 16. The program will focus on the ideas and significance of the Nobel Laureate economist and political theorist F.A. Hayek. The program is entitled, “Friedrich Hayek and the Future of Liberty.” The speakers will be Alan Ebenstein, who has a new book called Friedrich Hayek: A Biography, and Charles Baird, professor of economics at California State University, Hayward.

On July 5, we’ll be hosting a program called, “Why are the Public Schools Failing and What Can Be Done?” The speakers then will be two economists, one whose name is John Merrifield from the University of Texas at San Antonio who’s author of a new book called, The School Choice Wars, and Richard Vedder, who is a senior fellow here and also a professor of economics at Ohio University, who’s author of a new monograph for us called Can Teachers Own Their Own Schools?

Later, on August 14, we’ll be hosting Larry Elder, who many of you know is a popular radio and TV talk show host and personality, and his book entitled Ten Things You Can’t Say in America. We’ll also be hosting Thomas Szasz this fall on his new book called, Pharmacracy, which is excerpted, I should mention, in this new issue of The Independent Review.

Last Friday, some of you may have noticed that The Washington Post reported on the efforts of the government in China to continue its approach, its efforts, to censor information technology. The questions that our speaker will be looking at is: can such repression work? and what are the pros and cons to such efforts? On the one hand, China was apparently ineffective in blocking the access that people had tried to have to foreign news accounts related to the recent spy plane incident. Furthermore, the U.S. plane—I’m not sure if you have noticed some of the reports that mentioned, the plane was equipped with the latest NSA technology that enables the government to intercept all e-mail, faxes, and other electronic media—so it wasn’t simply a question of surveillance of certain specific things, but it could survey virtually all transactions.

Just imagine the uproar here in the U.S. if the Chinese or the Cubans were flying continual surveillance flights along the West or the East Coast of the U.S. monitoring all communications media. On the other hand, when the truth about a deadly school explosion spread earlier across Chinese chat rooms, it turned out that government officials were essentially powerless to stop it, and they actually issued what was, essentially, a remarkable public apology. So that’s what our speaker will be discussing; this tension between these two dynamics.

The U.S. itself, of course, is the home of the FBI’s Carnivore surveillance system, as well as the NSA’s Echelon system, which is actually an international system. In Congress, we actually have a bill that’s proposed that includes a provision to make mandatory to have a special chip imbedded in all new cell phones by the year, I believe, 2005. It would enable the government to track the location of all cell phone use and their users.

Clearly, the subject of privacy is no longer the exclusive domain of speculative thinkers or futurists. It is a fact of public debate. The question—one of the questions—to ask is, will privacy-enhancing technology improve faster than privacy-threatening technology? Should the government make standards of privacy? Should it enforce contracts in cyberspace, or would private law do a better job? Tonight our speaker will discuss many of these issues.

David Friedman, as I mentioned, is a professor of law at Santa Clara University. He received his Ph.D. in physics from the University of Chicago. I went to the University of Chicago, but did not major in physics. He has taught at Cornell, the University of Chicago, Tulane, UCLA, Virginia Polytechnic Institute, University of California at Irvine, University of Pennsylvania, and Columbia University.

In addition to his new book, Law’s Order, he’s also the author of The Machinery of Freedom: A Guide to a Radical Capitalism. And if you haven’t read The Machinery of Freedom, you’ve really missed a very important and, I think, stimulating book. Also, the books Price Theory and Hidden Order, which are also ones I’d highly recommend.

He’s contributed to The New Palgrave Dictionary of Economics. He is the author of many articles and reviews in many economics journals such as The American Economic Review, The Journal of Law and Economics, The Journal of Political Economy, Economics and Philosophy, and so forth.

David is also well known for pioneering some of the most creative and insightful critical analyses of government institutions and setting forth a non-state approach to social cooperation and human endeavor. I’m very pleased to introduce David Friedman. [Applause]

David Friedman

Actually David Theroux doesn’t know what I’m going to say because he hasn’t heard the talk either. I have written important books on important—(speaking into microphone)—you really need this thing for something?

David Theroux

Yes please.

David Friedman

I see, all right. I have written—I regard the microphone as a device for distorting the human voice—I was going to say, I have written important books on important subjects, but I have not written any books on the subject I’m talking about tonight. I do have some things on my Web site on that topic, in particular an old article called, “Strong Privacy: Perils and Promises of Encryption,” which is really the written version of what I’m saying, as of five or six years ago, when I wrote the article.

I am afraid government is not obsolete—yet. Government is very good at what it does, enormously better than any competing institution. And if you don’t believe me, compare the total revenue collected by the U.S. government each year with the total of all private theft and robbery in the U.S. It’s orders of magnitude larger. It is a very successful institution.

But what I wanted to talk about was not the government, although we’ll come back to that. I wanted to start out talking about the question of how you can maintain your privacy, because there are really two ways of protecting your privacy, and one of them doesn’t work.

The one that doesn’t work, which is, of course, the method central to all privacy law, is to let information about you out, and then control how other people use it. And if you believe it does work, I suggest a very simple experiment. The Fair Credit Reporting Act—Federal law—forbids credit agencies to release credit reports on people except to those who have a legitimate need for the credit report. So the experiment is to start with the name of a random person, $10,000, and the yellow pages for private detectives for your city, then see whether you can end with a credit report on that random person. And I predict the—if you are reasonably ingenious—the answer will yes. And you’ll have money left.

Protecting privacy with “public key encryption”

The other way of protecting your privacy, the way that works, is to keep control over the information from the beginning. That is, not to let the information out. And it turns out that the technologies that have developed over the last few decades, make possible very, very powerful tools for that kind of privacy. And the central technology, which some of you know lots about but some of you know very little about—and I think we’ll have to talk about—is public key encryption.

Suppose you want to send a message to somebody and you want to make sure that if it’s intercepted, strangers can’t read it. And the old—not very old—the 50-year-old solution to this problem was that you had a form, a way of encrypting the message, a way of scrambling the message, which depended on a key, a set of instructions for scrambling. And you used the key to scramble to the message, you sent it to somebody, and he used the key to unscramble it.

Now if you think about it, there’s a fundamental problem with this technology, and the problem is that the reason you need encryption is that you don’t have a secure communication channel. The reason you need encryption is that when you send messages to people, they might get intercepted. But then when you send the key to him that might get intercepted, too. And if the key has been intercepted—especially if you don’t know it’s been intercepted—then somebody else can read your mail. So the traditional single-key system has very serious limitations. It’s workable for governments that can afford to send military attachés with briefcases handcuffed to their wrists, hither and yon about the world. But it isn’t very practical for the rest of us.

And the solution is a mathematical solution made a few decades ago called public key encryption. And the way public key encryption works is that you generate two keys, each of these is simply a long number. And these keys have a rather complicated mathematical relationship to each other, which as the result that if you use one key to encrypt a message, that key cannot decrypt it. It depends on the fact that there are some mathematical operations that are much harder to do in one direction than the other. But the other key of the pair will decrypt it. So you roll up a key pair and you declare one of the two members of the pair to be your public key, and you give it to everybody in sight. And now anybody who wants to send a message to you encrypts the messages in your public key, sends it to you, and you decrypt it with your private key. And since your private key has never left your possession, you don’t need any secure communication channel. All right? And if the people who are spying on you manage to steal a copy of your public key, that’s fine. They can send you secret messages, too.

So it’s a very simple and elegant idea, and I’m not going to try to describe the mathematics of it. But if you’re really curious, if you go up on the Web, there’s a firm called RSA, which is, in a sense, the major firm in this business, and last time I looked they had extensive Web page explanations of how public key encryption works, at least how their algorithms for public key encryption work.

It turns out that this single technology provides a whole lot of separate pieces that you can put together to get what I think of as a world of strong privacy. A world in which people can interact with each other, with quite a high degree of confidence that no third party can know what they’re saying, know who they’re talking to, trace their financial transactions, or in any way get information about what they’re doing.

The first technology is encryption itself, and the only tricky part is how you distribute your public key; how you make sure people really know it’s your public key; and we can talk about that if people want, but for the moment just assume that we have some way of doing that. Once you’ve done that, the next problem is when you are dealing with people who haven’t seen you at a distance, how do you prove you’re you? How do you prove that when you are posing a revolt against the U.S. government, you’re not really an FBI agent in disguise? Think of other cases when FBI agents disguised themselves as 12-year-old girls, for example, for other law enforcement purposes.

But how can you have a system where people can prove they’re them? And this is really two questions. One of them is, how do I prove I’m David Friedman who teaches at Santa Clara?—because for some purposes I might want to send a communication in which I identify myself. And the other question is, how do I prove I’m the same unknown person who communicated with you last week? So the first question is, how do I link my cyberspace identity to my real space identity? But the second and more interesting question is, how I prove my cyberspace identity?—because I’m going to be arguing that there are a lot of purposes for which you don’t want to link those two identities, for which you want to keep the cyberspace identity anonymous in real space, but not in cyberspace.

And the solution to this is something called a digital signature. And what I’ll describe is a slightly simpler method than is really used, but it would work and it will do. And the method is quite simple. I wish to send you a message and prove it’s from me. So I encrypt the message with my private key. I then add a note to it saying, “This is from David Friedman,” and send it to you. You get the message, you decrypt it with my public key. Remember, what’s encrypted with either key can be decrypted with the other. Since it turns out to be a message and not gibberish, you know it must have been encrypted with the private key that matches my public key. I’m the only person in the world who has the private key that matches my public key. Hence, I must have sent the message.

That’s the guts of how digital signatures work. And not only does that mean that I can prove that I’m me, it also means that if necessary, you can later prove to a third party that I sent that message, even if I deny it, because you now have in your possession the message encrypted with my private key, and the only way you could have gotten that is from me. So it provides not just identity, but non-deniable identity, as it were. It provides what a signature on a contract is supposed to provide, but much more reliable. Not perfectly. I could be careless and somebody stole my private key; that’s my fault. But the only thing I’ve got to do essentially in that system is make sure that my private key is secret. And since I never have to show it to anybody, that should not be impossible.

So we now have the ability to communicate securely and the ability to prove either my cyberspace identity or my real-space identity as I prefer. I should say, the way I prove my real-space identity is I go to some respected organization, say American Express or the Catholic Church, or whoever you and I both trust, which organization itself has its public key well-known. [Laughter.] All right. I really go to Verisign, which is a private firm in this business, but no reason you would have heard of it.

And that organization, I go to them and I show them my passport, and I show them my face and I show them my driver’s license, and I show them my public key. And then they write what’s called a digital certificate, which essentially is a statement intended to be read by a computer, which says, “David D. Friedman, who teaches at Santa Clara and lives in the following place, has public key such and such.” They digitally sign it with their private key. Now I can send anybody in the world who knows their public key that certificate. They check that American Express really checked that I’m me, and now they know my public key, and now they can trust my digital signature. So that’s how I demonstrate my real space identity. For my cyberspace identity, all I do is: the first time I communicate with you I give you my public key, and thereafter, anybody who can send you digital signatures which check with that public key is me. That’s the basic logic of it.

So now we can communicate with identity and with privacy, but we still have to worry about people seeing who they’re talking to because that’s one common way of breaking privacy. And the solution to that? There are a couple of solutions, but the easiest one is something called an anonymous remailer, and the idea is very simple.

When I want to send a message to you, instead of sending it directly to you, I send it to David, here, who’s an anonymous remailer, along with your e-mail, and he forwards it to you. Now, of course, that doesn’t work, because now if somebody intercepts it, they can read the e-mail address and know, or alternatively they can just watch the message come in to him, go out from him, see where it came from and who it went to. I’m assuming the spy who’s watching the whole system. The beauty of this technology is that even with that spy, you’re still safe.

And so what I do—what I left out when I was describing it—is first I take the message, I encrypt it with your public key because I don’t want him to read my mail, then I add to that your e-mail address unencrypted, and I encrypt all of that with his public key, the remailer’s public key. Now the message goes in to him, he strips off the top layer of encryption, which is with his public key. He can now read the e-mail address, so he forwards it to you. Observe that somebody who intercepts the message when it’s coming from me can’t read the e-mail address because it’s encrypted with his public key. And somebody who’s watching him can’t tell which incoming message matches which outgoing message, because, of course, since he’s in the business, he’s running 6,000 a minute and the messages look different when one layer of encryption is stripped off. All right?

Now, you see, there’s still one remaining problem, and that is that David may be working for the FBI. That’s all right, that’s all right. It wasn’t your e-mail address that it was being forwarded to. It was the e-mail address of another anonymous remailer, and there was another layer of encryption, and another e-mail address, and of course, I don’t trust him either because the FBI’s been very energetic nowadays, so that was going to another one.

So my e-mail message bounces through 10 anonymous remailers before it reaches the intended recipient, and if you think of the logic of the system, unless all 10 are working for the same bad guys, I’m safe, because any one broken link means you can’t trace the line. So it really is a fairly powerful way of doing it.

The remaining problem is how I can make payments, because in order to do many things, you have to be able to pay people money. How I can make payments without being traceable. And credit cards and checks aren’t a very good solution, for obvious reasons.

But it turns out that using encryption technology, you can create what is referred to as anonymous digital cash, or anonymous e-cash. And I’m not going to go into details. If people are curious, I can describe a way you could do it much simpler than the way people actually propose to do it. (And again, I assume we’re going to have a question period, and therefore, I can skip over things and if people find them puzzling, they can call me on them.) But the basic effect is that I send you a piece of information, and the result of your having that piece of information is that you now have control over an asset that I used to control. And you can send the information on to somebody else, and he can send it on to somebody else, and the hundredth person walks into the bank and takes the dollar bill that that information represents, and it’s done in such a way that each transaction, I lose control as you get control, that you and—in effect, the information changes each time it’s transmitted, so my old information is now obsolete, and the result is, you get the same anonymity that cash gives you, that it is true, if our money were still redeemable for silver, at some point, the dollar bill comes in and gets redeemed, but it doesn’t have a history on it. It doesn’t say where it’s been, and therefore it can’t be used to trace transactions. And you can do exactly the same thing with anonymous cash.

How anonymity with reputation can undermine taxation and regulation

So what is the result of this set of technologies? It’s a very interesting world. To begin with, it is a world where you can simultaneously have anonymity and reputation. All right? That sounds paradoxical, but, I can have a cyberspace persona defined by a public key, and you can roll out public keys any time you like, public-private key pairs, so I have a cyberspace persona defined by a public key, and I can choose never to link that cyberspace persona to a real space persona, so that I can develop a reputation.

Suppose, for example, that I wanted to practice law without a license. No, I’m not in fact a member of the bar, so if I want to give legal advice, and I’m worried about getting into trouble, I set up online and I offer free legal advice for awhile. And when people have concluded that my legal advice is good, I start charging for it, and I get a reputation as a good source of legal advice, and at some point, the American Bar Association hears about this, and they say, “we want to arrest this person.” And so they send me a message, because there’s some way of sending me messages through remailers, and the message says, “Please come here so we can arrest you.” And I throw it in the waste basket and that’s the end of it, because they don’t even know what continent I’m on, or whether I’m a man or a woman, a very bright 12-year-old, or a 90-year-old who hasn’t gotten senile yet.

So that’s a very interesting feature of this system. And it has both attractive and unattractive results. One obvious attractive result is that freedom of speech no longer depends on the legal doctrines of the Supreme Court. It only depends on the laws of mathematics.

Now I don’t want to badmouth the Supreme Court. Freedom of speech is one of the few issues they’ve been pretty good on historically. But, that was last decade. There is no predicting what they’ll do next decade. And I prefer a system where violating freedom of speech is not merely illegal but impossible, where they’re unable to do it, not really not allowed to do it. That’s the good bit.

On the other hand—oh, another good bit, well, people in this room will think it’s a good bit, other people won’t—is that you can’t tax or regulate something you can’t see. All right. If I earn my money in cyberspace and spend it in real space, they can tax it when I spend it. If I earn money in real space and spend it in cyberspace, they can tax it when I earn it. But if I earn money in cyberspace and spend it in cyberspace, in particular if I’m spending it for information goods, for computer programs, or videos, or consulting databases, or services, for anything which can be transmitted over the computer rather than having to be delivered by a UPS van, now, both the earning and the spending of money are invisible, and it now vanishes from the IRS.

Ditto for regulation, as in my example of practicing law without a license. Presumably, most of you will think this is a good thing. Some people won’t. They have reasonable arguments for their position, although I think they’re mistaken. They think there are good things the government does and it needs money to do them with.

MurderInc.com: the dark side of encryption

But let me go on to a consequence that even some of us may be unhappy with. And that is, that it becomes possible to have criminal firms with brand name reputation. And I like to think of it in terms for my business plan for Murder Incorporated. Because I say to myself, “Suppose I wanted to kill somebody. Me, right now. What—other than moral reservations, which might depend on who I was thinking of killing—what keeps me from doing it?” [Laughter.]

And the answer is not the price. All right. As far as I can gather from published reports, the cost of a hit man is less than the cost of a new car. And we bought a new car quite recently. We could afford that. [Laughter.] All right.

What keeps me from doing it is that I don’t have any safe way of locating a reliable seller of that service. If I were a professional criminal, I would. I would have the right contracts. But ordinary citizens don’t. This problem we can solve. All right.

So think about my world of strong privacy. And the business plan goes as follows: Step One is a series of mysterious billboards placed at very high density places, on big highways. And all the billboard has is a series of numbers, digits, and the statement, “Write down this number!” That’s it.

The next thing that happens a week or two later is that the New York Times, and the Christian Science Monitor, and a few other major newspapers, receive a long classified ad, or at least a long ad, which appears to be gibberish. And maybe there’s a sign above it, saying “Save this ad!”

The next thing is a very high profile assassination. I don’t think politicians are important enough. I think a bomb at the Academy Awards is probably the optimal marketing strategy. [Laughter.] But you might manage it, say, at the World Series instead. On the field, of course.

So in any case, we in some way kill a bunch of people who get a lot of attention. And as soon as that happens, e-mails go, of course, through anonymous remailers, to all of the newspapers that we published this ad in, pointing out that if they take the number which was on that billboard, and use it to decrypt the ad, they will find something interesting. And what they will find is a description of our assassination, published two days before the assassination occurred.

So we have just demonstrated two things. One, we have an organization that is willing and able to kill people, and two, what its public key is. All right? The rest is details. We now—since all the world has our public key—all the world can send us messages with confidence that nobody else but us can read it. All the world can check that messages from us are really from us. We are going to have to set up some protocols for getting messages to us through remailers, but that shouldn’t be too hard, and now people can buy our services. “We are Murder Incorporated.” That was also in the encrypted ad, of course. “And we are looking for business.”

So that’s the unattractive—that’s the downside of strong privacy—and you can think of other less exotic cases. For example, Trade Secrets Incorporated, “We buy and sell.” Or a pirate archive which sells other people’s intellectual property at a penny on the dollar in an anonymous digital location.

So there are a bunch of opportunities for criminals which exist ultimately because this technology prevents the enforcement of law, certain kinds of laws, and although some laws shouldn’t be enforced, some should. But there’s a law against murder, and both are becoming harder. My prejudice is that weakening government is, on net, a good thing, but that doesn’t mean that it has no bad consequences.

Let me however, raise a very general point about technological process with some specific applications, and that is, that technological change makes some things harder to do and some things easier to do. And when something you want to do gets very hard, what you ought to start thinking about is, is there some other way of achieving this objective that’s just gotten easier. And in this case, at least a partial solution to Murder, Incorporated, is that if I am going to do things which will make people want to murder me, I do them online with my cyberspace identity, because there’s no way that Murder, Incorporated, can get a bullet through a T-1 line.

So the same technology, on the one hand, makes murder easier, by solving one of the problems in arranging for murder. Of course, they still have to kill people. You can still protect yourself in real space; it takes a bullet in real space. But at the same time, it makes one of the defenses against murder, namely anonymity.

And of course, that suggests some of the reasons why people may choose to do business anonymously. The reasons for you and me aren’t all that strong. I mean, tax evasion is very nice, but it’s not worth enormous amounts of trouble, and in fact, I don’t encrypt at the moment. I don’t have many secrets.

But there are quite a lot of people who live in countries where, difficult though it may to imagine, property rights are considerably less secure than they are here. And where letting either your government or your neighbors know that you’re rich is very risky, unless you’ve made an adequate investment in political influence. And in those countries, the idea of being able to sell valuable services, say computer programming or other things in a way such that no third party knows that you are the person getting that income, is going to be very attractive. All right. Some reasons to do it here, more reasons to do it elsewhere.

How to enforce contracts in cyberspace

Let me go on to discuss the question of using the technology to solve the problems that technology raises, but in a different and somewhat more detailed context. And that’s the question of enforcing contracts. Because in general, contracts in cyberspace raise a problem. They raise two problems. Even without anonymity, they raise a problem because national boundaries are transparent in cyberspace, and therefore, you would like to be able to do business with people without worrying about what state or country they’re in.

However, although it’s possible to enforce contracts in the courts across jurisdictional and national boundaries, it’s relatively complicated, slow, expensive, and therefore much more difficult than for a contract with your neighbors. Hence, using the courts to enforce contracts is going to be somewhat more difficult in cyberspace than in real space. If the world I sketched comes into existence, it’s going to be a whole lot more difficult, because there’s no way the courts can enforce a contract against somebody if they don’t know who he is, right? [Laughter.]

On the other hand, if you actually think about contract enforcement in the real world, it should occur to you that there are two mechanisms by which we do it, and using law courts is the less important of the two. More important is that most individuals and most firms keep their promises most of the time, not because they’re afraid of being sued, but because they don’t want a bad reputation.

Some of you may remember the wonderful line in, The Moon is a Harsh Mistress, by Heinlein where Manny is saying, “Why on earth, they have laws for everything. They even have laws for private contracts. Why would you do business with a guy if you need the law? Doesn’t he have a reputation?” Anyway, it’s a good passage, good book. Great book.

But what I want to argue is that at the same time that moving to online commerce makes legal enforcement more difficult, it makes reputational enforcement easier. And, there are a couple of reasons.

How cyberspace strengthens reputational enforcement

To begin with, if you think about reputation enforcement, the crucial variable is the cost interested third parties of finding out who cheated who. Right? Suppose that you and I have a deal and you cheated me. And I say, “I’m going to tell everybody that you cheated me.” And you say, “Well, I’ll deny it.” And let us suppose, as is often the case, that for the third parties who might care whether you’re honest; figuring out whether you cheated me is costly because you’re going to do your best to argue that you were the wronged party and I cheated you. That not only reduces the effect of the reputation sanctional, it also gives me a reason not to complain in the first place, because if you didn’t cheat me, I cheated you, and thus when I complain, both of our reputations go down, if other people can’t check which of us in the wrong.

So it’s crucial, in order for a reputation system to work well, that interested third parties be able, at low cost, to know who is in the family. And the Internet helps in two ways. First, it makes finding information and transmitting information very quick and easy, so that in a casual sense, you can do a search using Google off the Web and off Usenet, and in a minute see if anybody has mentioned the firm you’re thinking of doing business with, and what they said. Some, more organized fashion, as many of you know, eBay has deliberately gone out of its way to set up reputational mechanisms. That is to set things up, so that when you buy something on eBay, after the goods are delivered, you have an opportunity to report on the transaction and those reports are available to anybody else who wants to buy from that seller. So those sorts of reputation mechanisms work.

Let me describe a more formal reputation mechanism that one could use, if larger amounts were at stake. It goes as follows. You and I sign a contract. In the contract, we specify a private arbitrator. The contract includes the private arbitrator’s public key, which you’ll remember is the information you need to check his digital solution. The contract is digitally signed by both you and me. Now, you think I violated the contract. You demand arbitration. The arbitrator rules that I owe you $10,000 in damages. I refuse to pay. The arbitrator writes a brief statement that I agreed to—that he would be the arbitrator of disputes, that he gave a verdict, and that I refused to pay the damages. Digitally signs it and gives it to you.

You now have a package. That package consists of the original contract which I digitally signed, so provably I agreed to it, and the arbitrator’s verdict, which he digitally signed, so provably the arbitrator I agreed to, said that I cheated. You may now e-mail that package to anybody else in the industry. You can put it up on a Web site with my name all over it, so anybody who does a Web search for me will find it. In various low-cost ways, you can make it readily available to the world. And the beauty of it is, that when somebody gets the package, it takes his computer four seconds, or something less than four seconds, to find out that I cheated you, because all it has to do is verify the digital signature. Obviously if this is a routine procedure, we’ll have standard ways of formatting the information so that no human being has to intervene and the computer can just check it, and then say, “Hey boss, this guy cheats.”

So that means that as a technology that makes it possible to drastically reduce the cost to interested third parties of knowing who cheated. And it’s really two technologies. One is a very old one, and that’s arbitration. And the point of the arbitration is that it provides a cheap way for third parties to figure out who was in the wrong, because the arbitrator has done all the work, and all they have to know is, I agree to that arbitrator and that arbitrator says I’m in the wrong. And that exists at present. It existed for a long time. There are articles on private arbitration in various industries, mostly written by Lisa Bernstein, who’s been very enterprising in this field, starting with her classic article about the New York diamond industry, which is possibly the world’s most trust-intensive industry, in which almost nobody uses the courts, because the courts don’t let you keep secrets. People have secrets, and for several other reasons.

Now, there is a problem of course, which is: suppose I want to make a contract with someone who has no reputation. He’s not a repeat player in this market, segment. Well, the solution to that is, you piggyback on somebody else who does have a reputation, and you do it by bonding, so that I want to make a contract, and the maximum damages I’m going to be liable for are $10,000. So we agree on an arbitrator who is also a bonding agent. Each of us deposits $10,000 in digital cash with him. Of course, our contract with him specifies the arbitrator that he and we agree to use if we disagree with his verdict. Make sure he can’t steal the money, which he probably won’t do for reputational reasons anyway. And now, if he finds that I defaulted on the contract, he can award some of my money to you as damages. So the crucial thing now is that the bonding agent arbitrator has a reputation and that makes him honest, and once he’s honest, we just trust him and thus get our enforcement second-hand.

You can think of other mechanisms as well, but I think this is enough to make the point that you can have a system for enforcing contracts entirely private, entirely reputational. Now of course, one implication is that if you’re a new boy on the block, other than bonding, you aren’t going to be able to make large contracts. But that’s often true in the real world as well, that you develop a reputation for awhile by making small contracts, and as the reputation becomes larger, people are willing to make larger contracts with you.

This could be the story of the 21st century, but it could also be the story of about the 12th century. Because as many of you may know, our present system of mercantile law ultimately has its roots in the lex mercatoria, which was a legal system that was evolved by the fair courts of medieval Europe, entirely as private law. That is, this was a context where you have lots of small governmental units with varying legal rules. You had courts at which merchants met from all over Europe, so they evolved their own system of legal rules, which was enforced primarily by reputational sanctions. And later got taken over, at least in England, by the common law, sort of adopted into it, and I suppose, ultimately ends up as the UCC [Uniform Commerical Code], largely. So this is not entirely new.

One of the attractive features of this system is that it is a system for generating efficient law, because when you are deciding what arbitrator to write into your contract, you want the arbitrator, who has the legal rules, that on average, maximize the sum gains—the gains for the contracting parties. So you want the arbitrator who gets the right result at low cost. Doesn’t take bribes. Follows legal rules that don’t result in you’re doing expensive things to avoid damages, and so forth.

So this is actually a market mechanism for generating efficient law for the private market, and I found that attractive, because I in fact, described that mechanism in 1971, when I wrote my first book in which I was describing an imaginary anarcho-capitalist society. I was trying to sketch out how a society could work with private property rights, but without government.

And one of the points I made, after showing how the legal institutions that work, this was not a reputational in question. These were ones where if necessary, they could shoot people. But after showing how the legal institutions worked, I proceed to show why they would have market reasons to generate efficiently. And I argued at the time, that one of the great advantages of my version of libertarianism over the “minarchist” version, was that the minarchist version has no reason to expect its institutions to actually generate the right law. It just assumes they do. Whereas in mine, I have economic reasons to expect to generate economically efficient law, and pretty persuasive reasons to believe that freedom is usually economically efficient, and that therefore, there will be a close, though not perfect, correlation to do an economically efficient law in libertarianism.

So here, it looks as though I don’t have to wait 200 years for anarchro-capitalism to show up and transform the world. It’s going to be happening more or less around us in cyberspace, not in real space, but in cyberspace in the form of the kind of private law I’ve described, which I think is already developing.

Now, I could talk about other things along these lines as well, but I’m going pretty long, so let me instead, give you some sort of summary comments, and then we can discuss things, and lots of more things to talk about, but talk is short and ours is long, as are speakers. [Laughter]

30 year prediction: more freedom, especially in cyberspace

Let me say a little bit about what I am guessing, and it’s only a guess, because prediction is, I think, a hazardous business. I’m not in the prophecy business, but my guess of what’s going to happen is that we’re going to be moving towards a world where you have two sets of institutions. One in cyberspace and one in real space. And the institutions in cyberspace are going to be voluntary institutions because the fundamental nature of cyberspace interaction is that all you’re doing is sending messages. You can’t get a bullet through a T-1 line. So that means that although it’s true you can defraud people, and ultimately do things like computer break-in, which are versions of fraud, you can’t use force. And we’re unhappy with both force and fraud, but force is a lot more dangerous. With fraud, you can protect yourself against it if you’re careful. With force, you can’t. So it’s going to be a world of voluntary association, private law, all these things.

It will give us problems where you are working on the interface between cyberspace and real space, where you use the privacy of cyberspace to contract for a real space assassination. That’s where the problems are going to exist. But as long as you’re only in cyberspace, you can’t really assassinate people. Not people.

On the other hand, real space will still belong to the state, unfortunately. However, the state will be weakened in two interesting ways. The first is that the more of your life is in cyberspace, the more mobile you are, because it means that if you’re working in a virtual firm. If your friends are largely people you know in virtual reality, who might be anywhere, now if you don’t like the government that’s taxing you, you move a thousand miles across a border and you’ve put a dot forward file in your e-mail file, so your e-mail all follows you—and you have to get a new house, but nothing else changes very much.

So, the more mobile people are, the more governments have to compete for taxpayers, and thus the less they can steal. A very general rule, one which I sketched out in my first economics article a very, very long time ago, where I was an analyzing the size and shape of nations and arguing that large linguistically homogenous nations were a result of rising incomes, because it meant that human income was a major tax source, and if you want to tax human beings, you’ve got to make sure there’s nowhere outside of your control they want to live. So I claim that explained the linguistic nationalists of the 19th century. “Economic Theory of the Size and Shape of Nations,” Journal of Political Economy, 1976. Anyway, so that’s one effect.

Public key encryption as a virtual Second Amendment

The second effect, is that governments are going to be weaker because they cannot control information from us. And this is what I’ve come to refer, especially when talking to my conservative friends, as the virtual Second Amendment. That if you think about the Second Amendment, the right to keep and bear arms, I think it’s pretty clear what’s going on.

It’s clear if you read say, Adam Smith. (I assume you all know that the important event of the year 1776, was not any of this nonsense going on in the colonies. That was the year that The Wealth of Nations was published.) [Laughter.] Anyway, Smith discusses the question of militias. He doesn’t come up with the same conclusion, but it’s clear with the intellectual background of the late 18th century, that they were facing this problem. Professional soldiers are better than amateurs. They win battles, but professional armies are a potential threat to a free state, because when the government gets tyrannical, the army does what it’s told. Remember that Cromwell is a military dictator of England in the mid-17th century, so this is stuff people are still remembering. It’s only a hundred years ago, a little more than a hundred years ago.

And the American solution, which I think was a very ingenious solution, is that you have a big militia. The militia is officered by the states, not by the federal government. It’s the federal government that owns the professional army. The federal government makes the drill rules, so that if the militia is functioning as an adjunct to the federal army, they can all work together, but it doesn’t have any control over the militia.

And this saves you in two directions. First, it means you don’t need a very big professional army, because although your militia isn’t very good, there’s lots of it, so you can get along with a smaller professional army. And, second, it means that if the federal government engages in tyranny and uses the professional army, the militia outguns it a hundred to one. And even if they’re not as good, that’s good enough. That was the theory.

I don’t think that works anymore. I think that’s probably a good explanation of why we have the Second Amendment. But, much as it pains me to say it, I think that’s obsolete. I think it’s obsolete because the difference between the weapons a hunter uses and the weapons a soldier uses, is a whole lot bigger now than it was in the 18th century. And that while having an armed populace no doubt makes tyranny a little less likely, it’s not really a very effective connection.

On the other hand, my guess is, that any serious conflicts between the U.S. government and its citizens are going to be mainly information wars, not mainly bullet wars. And for information wars, I want to argue, widespread use of public key encryption is the virtual equivalent of the right to keep and bear arms, because it means not that government isn’t allowed to do bad things, but that government doesn’t have the power to do bad things. See? That’s the elegance of the Second Amendment. The Second Amendment doesn’t say government may not establish a tyranny. The Second Amendment says, We will set up a situation in which if they try to establish a tyranny, they will lose. And that, it seems to me, is also the attractive feature of widespread use of strong encryption. It means if they try to censor people they will lose, in the long term. So, that’s my view at least of the future we face.

Will government thwart the encryption revolution?

Now the final question is, why won’t they stop it? Because I’ve got to tell you, I’m not the first person to think of these things, and while most of the other people who think of these things are also nutty libertarian types, the basic history of these ideas is that I stole them from a bunch of people called cypher-punks, of whom the leading light is Tim May, who stole some of them from me. That is to say, Tim read The Machinery of Freedom. He then took what he knew about online stuff, which I knew nothing about when I wrote the book, and evolved my ideas and other ideas into his ideas about the sort of crypto-anarchy I’ve been describing, and then I stole the ideas back from him. It’s only fair. [Laughter.]

But, there is another set of people who have been thinking about these things for a long time, and they’re very smart people, and they all work for the National Security Agency. They’re the other encryption people. So, the bad guys know about it too. All right?

Why, therefore, have the attempts to regulate encryption, of which the most famous was the Clipper Initiative—which some of you know about, and there have been others. Why have they so far been flops? And why do I think, though I could be wrong, they’re going to keep being flops, at least in the U.S.? And the ultimate reason is because governments have very short time horizons. All right?

Think about the question of, to what degree you are willing to accept a cost now for a benefit of the future. The critical question is whether you have secure property rights, all right? You’re thinking of planting black walnut trees, and they take, let us say, 40 years to mature. In a world of secure property rights, you plant the black walnut trees. In 20 years, you sell that forest to somebody else who is willing to wait another 20 years. In 20 more years he harvests the trees, and it’s worth making such long-term investments.

In a world of insecure property rights, by the time 20 years have passed, the odds are very high that somebody has stolen your walnut trees or the land they’re standing on. Someone, either a government or a private party. And therefore, you only make investments for the short-term payoffs. In our political system, political actors have insecure property rights. President Clinton could rent the White House. He couldn’t sell it. That’s an important fact. He didn’t own it. What does that mean? It means that Clinton was not willing to accept short-term political costs in order to make sure that the President 20 years later could collect taxes. All right?

But if you think about the nature of encryption regulation, because encryption and digital signatures are key technologies for making online commerce work, because in online commerce, you’re moving lots of valuable information and money around, and you can’t do it if you can’t protect it, it follows that serious limitations on encryption are going to make it much harder to develop online commerce, and they’re going to do it right now. That’s going to be a big political hit now.

Why will they do it? In order that we can’t cheat on our taxes 10 or 20 years from now. But Mr. Bush doesn’t care about 20 years from now either. So that’s why the prediction that I made, back at the beginning of the Clipper Chip stuff, which so far has held, is that the political actors won’t be willing to take the short-term hits that they need in order to block this, assuming they can block it. And once it’s well-established, it’s very hard to do anyway. So that’s my guess. I may be wrong. I’m doubtless an optimist by nature, but I think that’s what’s been happening, and is going to continue to happen.

Who is it who tries to block it? And the answer is, it’s the long-lived bureaucracies. Because the NSA has much more secure property rights in its turf than Clinton does in his. So does the FBI. So it’s been the NSA and the FBI pushing it, and it’s been the Clintons not getting pushed, because they’d be the ones who’d have to take the heat, and they don’t want to take the heat. And so far, at least that’s worked. It may or may not, but that’s my guess.

So therefore, my guess of the future we face, and I may be wrong, but my guess is that it’s going to be a future where people who chose privacy, can in fact, have it. It’ll take a few years to get all of the infrastructure established. To get e-mail programs modified so they automatically keep track of keys and encrypted or decrypt without you having to worry about it.

On the other hand, some of it’s happened very fast, that as you may have noticed, any time you do anything on the Web, you are every once in awhile, running into secure pages, and what does that mean? It means that those pages are rolling up a public key/private key pair, sending you the public key, you’re sending stuff back, and therefore the whole transaction is encrypted. So that’s a transparent, easy way of using encryption that’s already happening. That’s the future. It’s going to be a mixed future. I don’t want to predict beyond 30 years, because I’ve concluded there are too many technologies out there that could radically change the world in 30 years, but that’s my current guess, thank you. [Applause.]

David Theroux

Carl has the microphone, if you just wait for that. And David, you want to just field the questions yourself?

David Friedman

Sure. Yes, I was delivering that talk from a pocket computer, and it’s a lovely pocket computer and I’ll tell you all about it later. What was the first question? Yes?

Audience Member 1: I see a couple of bootstrapping problems. Although encryption is being used regularly over the Internet, what’s being encrypted is basically credit card transactions, which are imminently traceable and taxable. And the two other problems: there’s a long string of dead companies who have tried to do digital cash, and I don’t see anything forthcoming in the near future that will be successful. And also, to deny the government tax revenue basically, [what] both parties have to do [to] be able to spend a dollar so they earn in cyberspace, as soon as they get taken out of cyberspace, it’s taxable. So you can’t do—even though you could buy something from IBM that’s an information product, and pay them anonymously—because they have very many feet in the meet-space world, the government is going to tax them.

David Friedman

Well, to begin with you’re assuming—it’s interesting—you’re assuming a world where every time IBM makes a transaction, they have to tell the government whether they know whether the other party is reporting it.

Audience Member #1

No, it’s just that their income will be taxed.

David Friedman

Yeah, but yours won’t. Yours will be only if the government could somehow use them, but since you might well be outside of the jurisdiction, they don’t try to tax German purchasers of information stuff from IBM, so therefore, you’re still free. IBM is being taxed, but prior to that, IBM and you would both be taxed.

Audience Member #1

Right. But [Inaudible]

David Friedman

Well, except that there are limits on collection and elasticity and so forth. My favorite counter-example, is on the general issue of—clearly impossible is always too strong a statement for the real world. But I’d like to point out that state governments are currently losing, many, many million dollars of revenue, due to barriers much weaker than this barrier. And I’m thinking about the problem of taxing interstate mail-order sales.

I know the situation in Illinois, and I’m pretty sure it’s true in California: If I buy a copier from 47th Street Camera in New York, I am legally obliged to pay the State of Illinois a payment which corresponds to the sales tax on that copier. Furthermore, if I were so foolish as to again buy a copier when living in Illinois from 47th Street Camera, I might end up paying that tax, because it happens that New York and Illinois are both parties to something called The Great Lakes Compact, which is a bunch of states on the Great Lakes that have agreed to share the relevant information. And the reason I know that was that I did buy a copier from 47th Street Camera, and to my great astonishment, got a bill from the State of Illinois for the taxes.

Thereafter, I bought my high-tech stuff from Texas, which is not a party subject to the Compact. [Laughter.] And if you think about the logic of the situation, the more states sign the contract, the greater the incentive to be the chiseler on the cartel and to be the state that doesn’t sign the contract. So that’s a case where in fact they have failed to collect large amounts of taxes, because of a relatively smaller barrier, so I think that stands.

As far as what’s happening, George Orwell wrote a series of articles for an American magazine during World War II, and just after the war, he wrote sort of a summary, a retrospect article. And he said it was very interesting, looking back, because he got right, the way things were going, but he always got wrong how fast they were going. Because as an intellectual, he looked at the logic of the situation, as it were, but the world had a lot of inertia. So that may well be true, and I’m a little disappointed that Mark Twain Bank didn’t succeed, that we don’t have a digital cash system.

My latest effort to jump-start the digital cash movement is my solution to this spam problem, which I’ve been trying to get unsuccessfully published as an op-ed, which involves your putting a price on your mailbox—five cents say—and when somebody who isn’t on your list of people you want to receive mail from sends you an e-mail, it gets bounced with a message saying, I charge five cents to receive mail from strangers. If you wish to send me mail, here is the URL of the stamp machine.

And the stamp machine is now a Web page, which sells anonymous digital cash in small denominations, and that means that the stamps are reusable, unlike the government’s inferior stamps, so when you want to send messages to people who don’t already know you, you just use one of the stamps you received when somebody sent the message to you. And that seems to be a nice, innocuous idea, and if I can get it going, it’s one way of jump-starting the cash. And I think privacy advocates will be happy with the idea that these small denomination things are being done in an anonymous fashion, because you’ll want to be able to trace people’s letters back and forth. But of course, we can all do arithmetic, and a hundred million five cent stamps is a lot of money. [Laughter.] And computers multiply real easy.

Maybe I’m wrong, but it does seem to me that the logic of things drives them eventually, and sometimes it takes a while.

In the case of encryption, it’s basically a network problem that I don’t want to encrypt my mail to you unless I know you’re already set up to receive it, and there what I’m hoping is going to happen is that two or three of the main companies doing e-mail will get together and they’ll agree on some standardized protocol so that we can make it all transparent, and basically when you receive an e-mail from somebody that’s gibberish, your machine automatically writes back to his machine and say, “Please send me his public key with the certificate,” and it automatically sends it, and thereafter is no problem. But we’ll see. Lots of entrepreneurial opportunities here. Yes?

Audience Member #2

You talked about the Clipper chip. Is that still happening? It’s not happening. So the equipment, the infrastructure that was built on the government side with the two key requirement and all that stuff, Justice Department and some other authority—

David Friedman

Ah, interesting. As far as I know—that’s a good question—governments sometimes maintain things long after they’re dead. And so I don’t guarantee that the mechanism isn’t there, but nobody’s using the Clipper chip, there is no effort to get people to use Clipper chip, maybe the government uses it for low-security stuff. They were never going to use it for high-security stuff. They knew better.

Audience Member #2

Is it true that the only company that was installing that as a function of some negotiation was AT&T?

David Friedman

I think that’s right, yeah, but I don’t think it ended up going anywhere.

Audience Member #2

Interesting. Thank you.

David Friedman

Yeah. No, the next generation were proposals for key escrow schemes, for schemes in which you’re allowed to have your own keys, but you’ve got to have your private key escrowed with an authorized agency, and none of those things were going anywhere either. And I’m a little puzzled about why Americans are as in favor of privacy as they are, but I’m delighted to observe it. Yeah?

Audience Member #3

You mentioned that the NSA and FBI seemed to be picking up all of the e-mails. Is that right?

David Friedman

I didn’t mention that. The NSA has for many, many years been part of an international operation called Echelon, which intercepts phone messages, and of course, phone messages might be emails, and I’m sure it intercepts e-mails if they go on the air, and presumably reads very few of them. But it uses it for traffic analysis and other things. The FBI has a Carnivore system, which according to their description, which for all I know may be true, they essentially get a court order saying you can read all e-mails to Mr. Smith from Mr. Jones in between these dates, and Carnivore then looks at all e-mail that passes the relevant nodes and filters those out. And that’s their description. Now I would’ve thought that you might also want to look at the e-mail which had certain words in it, but they say they’re not doing that. And for all I know, that’s true.

Audience Member #3

But I guess what I’m looking from is the macro standpoint, and I’m trying to put a limit on kind of helping encryption just by kind of—the decay mode or—of data, is that if the government or entities are intercepting every e-mail that goes on, do they have kind of a physical constraint of how long they can hold that data? Because data storage starts to creep up, and then all of a sudden you basically have a protection there?

David Friedman

Let me go back a step. First, they certainly are not in practice intercepting every e-mail and every phone conversation at present. That would be very costly. On the other hand, one of the ways in which technology makes things worse is that we are getting good at speech-to-text technology, at programs which you speak to the computer and it turns it into words.

If you think about wire tapping, the reason there is so little wire tapping is it’s very expensive. It’s very expensive in labor. Because somebody has to listen to that phone a whole lot of the time. All right? Once you’ve got good speech-to-text, technology that problem disappears. Computers are much, much cheaper by the hour than the FBI agents are.

So it becomes possible to tap a million phones, have it going to computers, the computers do speech-to-text, they then scan for keywords, they throw out 99.999% of the stuff, they tape record the rest, and when the right keywords come up they call a human being over to read it. So that means that one of the privacy threats is the cost of wire tapping is much lower, and that’s especially disturbing if you know that COLEA, the Communications Assistance to Law Enforcement Act, essentially required the phone companies to make it possible for the federal law enforcement to tap very large numbers of phones at once. And the FBI denied they were planning to tap very large numbers of phones at once, they said it was just that they might want to tap 2% of the phones in some tiny area, so they had to have—be able to have the capacity for 2% everywhere, and that’s a lot of phones. But I don’t know if I believe them.

So that’s a disturbing thing. On the other hand it doesn’t do any good to intercept something that’s encrypted, and so what we have to do is to get enough people encrypting so it doesn’t stand out, at which point, they can intercept it if they like to. Who cares? It’s privileged. Yes.

Audience Member #4

I’m interested in one aspect of the enforcement. It’s sort of a transactional hegemon of, for example, the Bank of International Settlements and their interest in getting taxation out of currency transactions. You’ve got your private currencies flying back and forth, and they’ve got enough clout through money to make governments per se write rules to keep the one man out from doing what it is that they’re interested in doing in setting up a Grand Cayman Bank, or whatever the heck it is that’s going to do that. So it’s kind of a game theory question as to how you see that shape.

David Friedman

But I guess the main thing, as in many of these cases, is it only takes one government to let you do it, it takes every government to stop you from doing it. That is, as long as you’ve got one government where people trust the institutions—Switzerland is an obvious candidate—then they can create a e-cache that everybody else can use, they get the seniorage on it, and that gives them an incentive to do it.

So again, I mean, obviously the U.S. government doesn’t like e-cache. I wouldn’t if I were the U.S. government. [Laughter.] But it seems to me not impossible but it’s going to be pretty hard to block it from happening anywhere anytime. That would at least be my reading.

Audience Member #5

This might be off the topic, but what’s your take on Napster?

David Friedman

What’s my take on Napster? I argued, I think, back in my strong privacy piece about six years ago, that copyright in digital intellectual property was not going to be enforceable for much longer, just as a technological fact. You may be able to defend property and intellectual property, but not through copyright laws. That is, there is the possibility that technological protection may work well enough so that you can use the equivalent of barbed wire fences to protect your property. But it seems to me that once you’ve got lots of computer networking it’s going to be very, very hard to prevent widespread piracy of any kind of digital intellectual property, and I think that’s what’s now happening with music.

And Napster, of course, was a bad design because it had a centralized system and therefore could be hit, but my understanding is that some of its competitors don’t, and that with a decentralized system, especially with use of encryption, it becomes very hard to find anybody to sue other than the ultimate users, and you at least are a little reluctant to try to sue a whole lot of 14-year-olds for listening to your music.

So yeah, I mean that would be my view of that, they can win in the short run, but I think they’re going to find that if you want to make money by producing digital IP, you have to either work out an effective barbed wire system, which is what Intertrust, for example, is in the business of trying to do, or you have to make your money indirectly in various ways, that you could, for example, have a song, which is given away for free, but you license a firm that wants to put that song into its advertisement. That firm is a real-space entity, it needs your permission, and so you make it valuable by giving it away and then use it in that way. Or you give away the songs and then charge for the concerts.

I happen to be reading a book that Bill Buckley published a while ago, which was a selection of his speeches over the years, and he comments in the preface that the secret that authors don’t tell is that giving speeches pays much more per hour than writing books. And if you look at the history of people like Mark Twain, that was true then, too. So that’s a case where you use tie-ins, as it were, to get your revenue. And my guess is that’s the direction it’s going.

And of course I’m doing that quite extensively, that is to say, my Web page has got the full text of two books and almost all my published articles—three books actually, one from my hobby that my wife and I wrote. And from my standpoint I’m collecting my revenues not in money, but in spreading ideas I want to spread, getting a reputation, which gets me invitations to talk to nice audiences, and gets me a few free pretzels, and one free book in this case—[Laughter]—and other things of that sort. So I think that’s likely to be what the world is facing. Yes?

Audience Member #6

Is not the interception of these messages by the government a violation of the Constitutional defense, the requirement for search and seizure for warrants?

David Friedman

No. To begin with, there is no Constitutional prohibition to prevent the government of New Zealand from intercepting U.S. phone calls, and the fact that the government of New Zealand happens to be an ally of the government of the U.S. is irrelevant.

The National Security Agency will tell you with a straight face, probably truthfully, that if their people discover that a phone call they have intercepted has one end in America they will throw it away and won’t listen to it. But of course, they have no obligation to make the Australians, New Zealanders and English agents, who are working in the next room to do the same thing.

As far as the FBI is concerned, the FBI’s position in the matter is that Carnivore is working with court orders, and it is just simply a way of implementing a court order that says that they can read certain mail, that’s a warrant.

I’ve in fact constructed an argument which, for all I know, the FBI hasn’t quite made, though they’ve gotten close to it, which is that if you have a computer listening to—tapping phones, you don’t even need a warrant. The argument, which might for all I know fly, I’m not sure, is that as long as it’s only the computer, that’s like a pen register. That’s something where no human being has listened.

So what you do is you have your computers listening to 100,000 phone conversations. Seven of them, the computer reports to you. It doesn’t say anything about what’s in it. It just says it meets our search requirements. And your search requirements are a complicated filter, depending on the words in it. So you then—no human being listens to it. We’re assuming for a moment, the FBI is playing by the rules. You now go to a court, you now go to a judge and you say, “I’ve got these seven recorded messages that no human being has listened to, so I haven’t needed any warrants yet. I now want you to give me the warrant to listen to those messages. What is my probable cause? The fact that my computer beeped, that my computer says it meets those criteria.”

Now I haven’t seen the FBI quite make that argument for Carnivore, but I’m not entirely sure it wouldn’t succeed in a court, because you could argue that this is how you’re deciding which things you want to ask for warrants about. Right?

Audience Member #7

About the model you were discussing in the first part of the talk about enforcing against fraud by using reputation rather than force. It seems to me that the market has already shown it. In the case of cyberspace in particular, that doesn’t work. There have been at least two cases I know of: online casinos in the Caribbean that were well reputed, and did a lot of business, and then all of a sudden closed their doors and disappeared with a lot of their customers’ money, and because they had, as you say, only a cyberspace identity nobody can find who it was and sue them.

David Friedman

Yeah. I’m afraid you have a stronger definition of work than I do. I assume that all human institutions will sometimes produce undesirable results, and I assume that a working system of contract enforcement does not reduce the level of contract violation and fraud to zero, it merely reduces it low enough so that we can have a livable and workable society.

Audience Member #8

That would argue for the use of pooled risk in the guarantor of the reputation, is that – ?

David Friedman

That is—if you think of—there are certainly going to be cases where you’ll want insurance institutions, that’s what you’re saying. Yeah, you might have—just like my bonding case—you might have organizations which themselves have large reputations, and therefore at a price guarantee other people smaller reputations. Yeah?

Audience Member #9

What was the name of that 1971 book?

David Friedman

The Machinery of Freedom. I think it was ‘70, it was written in ’71, I think the publication date is either ’72 or ’73. But the other question. My Web page, www.daviddfriedman.com. All right, all done as one word, daviddfriedman.com. If I’d only applied about two months earlier, I could’ve had davidfriedman.com, alas. So I didn’t buy it—how much—what’d I pay for it? That I don’t know. The question has arisen. But it’s an interesting question.

But in any case, you will find lots of stuff there. Not all of it is political. If any of you are interested in medieval recipes you’ll find quite a lot of those there too. That’s one of my hobbies. But—some poetry, some other things. But among other things, you’ll find most of my published academic articles, all of my price theory text book, all of Law’s Order, although the version that’s current is in the form of gifs, and so it’s about as good resolution as, say, a dot matrix printer, but it’s supporting my system of virtual footnotes, which means that the icons in the margin of Law’s Order, when you go to the Web page those icons are links so they take you to additional stuff, which is—was my idea for that book, and selected chapters from other stuff and lots of articles. So—and even some of my Usenet posts arguing with Objectivists and stuff like that. Thank you. [Applause.]

David Theroux

You can see why David is so admired and well read by many people. One other thing I might mention is that anyone who hasn’t gotten his book [Law’s Order] or had your copy autographed, he’d be happy to, I believe, autograph copies here. There are copies upstairs for those who haven’t purchased one. Also, if I could make another plug for something that we did here, this is a book that we published through New York University Press by one of our fellows, his name is Bruce Benson, called To Serve and Protect, and if you’re interested in the ideas of private law and non-state organization, I think you’ll find this to be quite intriguing. If there are anybody here who would like further information about future events, let me know. I want to thank everyone for joining with us, and good night.

David Friedman

I haven’t read Bruce Benson’s book, but I know Bruce, he’s very good. A while ago he organized a conference at the university he teaches at in Florida, and my comment at the time was that one bomb at that conference would’ve set the anarcho-capitalists back a generation. [Laughter]

David Theroux

There’s a great review from Andy Morris in the University of Chicago Law Review

Audience Member #10

Have you ever considered opening a restaurant serving medieval food?

David Friedman

Yes, but I’m not going to do it. Too much money.

Audience Member #10

Maybe if you have 110% like Sammy Davis, Jr.

David Friedman

Good, I’m glad you liked it.

END OF EVENT



  • Catalyst
  • Beyond Homeless
  • MyGovCost.org
  • FDAReview.org
  • OnPower.org
  • elindependent.org