[CQ] EMERGENCY ‐ AMATEUR RADIO NEEDS YOUR HELP NOW!

Bruce Perens bruce at perens.com
Wed Jun 26 03:49:04 UTC 2013


  EMERGENCY ‐ AMATEUR RADIO NEEDS YOUR HELP NOW!

Please forward this message to other hams. The most current version of 
this message is at http://hams.com/encryption/ Please use that version.

FCC is currently processing a request for rule-making, RM-11699 
<http://apps.fcc.gov/ecfs/document/view?id=7022424684>, that would allow 
the use of Amateur frequencies in the U.S. for private, 
digitally-encrypted messages.

Encryption is a potential disaster for us because it defeats the 
self-policing nature of ham radio. If hams can't decode messages, we 
can't identify if the communication is appropriate for ham radio or not. 
A potentially worse problem is that encryption destroys the /harmless 
nature/ of Amateur radio. For governments around the world to continue 
to allow Amateur Radio, /it must be percieved as harmless./ There's no 
reason for anyone to believe that encrypted communications are harmless. 
Foreign governments, and maybe even our own, will start to see hams as 
more of a threat. This is likely to have a chilling effect upon 
DXpeditions, which are already often viewed suspiciously by the host 
nations, and perhaps will even lead some countries to take Amateur Radio 
off of the air or limit our privileges in some way.

The last day for you to submit a comment opposing this is JULY 8, so 
it's important for you to act now! Please make a short comment in 
opposition to the proposal at this link 
<http://apps.fcc.gov/ecfs/upload/begin?procName=RM-11699>, or use this 
link <http://apps.fcc.gov/ecfs/upload/?procName=RM-11699> to upload 
longer documents.

We have no way of telling if the content of encrypted messages are 
appropriate for ham radio. While their senders will identify them as 
emergency communications drills, they could be used for crime, operating 
a business, downloading pornography, etc. WiFi-like cards are already 
available for Amateur frequencies, and while hams can build legitimate 
networks with them, none of their vendors check for a license before 
selling them to anyone. Legalizing encryption on the air will make abuse 
of Amateur frequencies provable only after difficult and potentially 
illegal code-breaking.

A small group has almost succeeded in sneaking this change past the 
entire ham community. As I write this, they are almost unopposed, with 
only one comment 
<http://apps.fcc.gov/ecfs/comment_search/execute?proceeding=RM-11699> 
against their proposal submitted to FCC. We only have less than two 
weeks to turn that around!

Unfortunately, ARRL isn't helping. On March 9, the ARRL board of 
directors moved to explore whether they should ask for rule-changes 
authorizing encryption, see their meeting minutes 
<http://www.arrl.org/files/file/About%20ARRL/Board%20Meetings/ecmin498.pdf> 
at paragraph 4.1.3. Before ARRL was scheduled to consider a report on 
the issue, an individual ham filed a request for rule-making with FCC. 
ARRL obviously tracks FCC rule-making and the notices of it in the 
Federal Register, and yet waited until two weeks before the end of the 
commenting period to announce on their web site that this was going on.

What could be a plausible excuse for using encryption on the Amateur 
bands? It's HIPAA <http://en.wikipedia.org/wiki/HIPAA>, a 1996 law that 
requires that doctors, hospitals and other medical services providers 
keep patient data secret. And thus, hospitals have become reluctant to 
use ham communications in emergencies. We effectively broadcast all of 
the information we communicate, and they're afraid that we'll get them 
sued by doing so.

Emergency communications are a critical component of the mission of 
Amateur Radio, and are one of only four purposes that FCC uses to 
justify the existence of the Amateur Service. It may be that encryption 
does become critical to support Amateur emergency services. But that 
time has not yet come. If we are to allow encryption on the air, that 
should come only after the entire ham community has discussed it 
throughly and explored all of the options. And yet, nobody's brought 
this issue before you, before attempting to change the rules behind your 
back.

The folks who support the encryption proposal are, as far as I can tell, 
well-meaning. Many of them are involved in emergency communications. But 
their methods are inappropriate. If they want this change, they must 
discuss the issue throughly at ham conferences and in our publications. 
They must allow hams to become educated about the alternatives before we 
decide as a community if a rule change is necessary.

What are the alternatives? One is changing HIPAA to remove liability 
from the doctors and hospitals for disclosure of information in an 
amateur emergency transmission. Changing laws is not impossible for 
Amateurs. Through lobbying congress, we have recently been able to cause 
changes in ITAR 121, a Department of Defense restriction that made it 
difficult for us to collaborate with other nations in building 
microsats. That's changing now as a result of lobbying by ham 
organizations. If hams can get that done, we can reform HIPAA as well.

Another alternative is to leave the rules as they are today. Many 
emergency organizations have been able to operate without encryption 
despite any reservations by the served organizations regarding HIPAA, 
which has existed since 1996. And many services other than Amateur 
Radio, including MARS, Land Mobile, and Part 15 can provide encryption 
without a rule-change, and might be more appropriate venues for this 
traffic.

If we end up deciding to have encryption on the Amateur bands, we must 
do so only after developing a system of controls that prevent its abuse. 
There is no anti-abuse method sugested in the current request for rule 
making, but I propose this one: Encryption would only be allowed in 
tests and drills that would be authorized and publicly announced by 
accredited ARES or RACES organizations. Logging of encrypted 
transmissions, /including the encryption key,/ would be mandatory. 
Stations would be required to disclose their keys to amateur volunteers 
who would check recorded transmissions for rule-violation, but those 
volunteers would be required to keep any HIPAA-protected patient data 
within the transmission private. Stations that repeatedly failed to 
cooperate in allowing their messages to be decrypted and checked by 
third parties would be subject to penalties.

But we haven't decided any of this yet. And we shouldn't without your 
participation. Thus, please comment now in opposition of the proposal.

Again, the last day for you to submit a comment opposing this is JULY 8, 
so it's important for you to act now! Please make a short comment in 
opposition to the proposal at this link 
<http://apps.fcc.gov/ecfs/upload/begin?procName=RM-11699>, or use this 
link <http://apps.fcc.gov/ecfs/upload/?procName=RM-11699> to upload 
longer documents.

About the Author: Bruce Perens K6BP is one of the founders of the Open 
Source movement in software. He is also the founder of No-Code 
International, the organization that successfully lobbied for the global 
elimination of code testing. More recently, Perens has been a pioneer of 
digital communications over Ham Radio. He started and evangelized the 
Codec2 (http://codec2.org/) project, which has developed a fully open 
and patent-free digital voice codec for Radio Amateurs. That codec is 
now in use in FreeDV (http://freedv.org/), which provides clear digital 
voice communications on HF in half the bandwidth of SSB. You can reach 
Bruce Perens K6BP at +1 510-4PERENS (US Pacific time), or email to bruce 
at perens dot com.

Please forward this message to other hams. The most current version is 
at http://hams.com/encryption/ Please use that version.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.noisebridge.net/pipermail/cq/attachments/20130625/d1884214/attachment-0002.html>


More information about the CQ mailing list