Encryption: American As Apple Pie: Founding Fathers Frequently Used It…Helped Win Revolutionary War
http://www.washingtonsblog.com/2015/07/encryption-is-as-american-as-apple-pie-the-founding-fathers-used-it-and-it-helped-win-the-revolutionary-war.htmlSpying v. Privacy: An Ancient Battle
The NSA, FBI and other government agencies are pushing to outlaw encryption...On the other hand, many Americans want privacy. This is the same battle fought by the Founding Fathers more than 2oo years ago. After all, the NSA is doing to modern Americans what King George did to Colonial America which was one of the main reasons the Founders launched the Revolution...And Benjamin Franklin was called a traitor (like Edward Snowden) for blowing the whistle on the governments actions.
Encryption During the Revolution
While encryption might seem like a new affair, it is actually very old school and something which the Founding Fathers extensively used. John Fraser noted in 1997 in the The Virginia Journal of Law and Technology:
***
From the beginnings of the American Revolution in 1775 until the adoption of the United States Constitution, Americans used codes, ciphers and other secret writings to foment, support, and carry to completion a rebellion against the British government. In the words of one author, America was born of revolutionary conspiracy. Moreover, [a]s rebels and conspirators, the young nations leaders turned to codes and ciphers in an effort to preserve the confidentiality of their communications. Americans also continued to use secret communications methods for purely private correspondence, and for political correspondence where a restricted audience was desired. The leading lights of the Revolution and the founding generation were frequent users of secret communications during the Revolution.
George Washington, as commander of the Continental Army, was forced to deal with encryption and espionage issues shortly after taking command of the Army when it was conducting a siege of the British forces in Boston . Washington also was forced, through the circumstances of the War, to deal with encryption and decryption issues on a constant basis.
***
John and Abigail Adams, his wife, used a cipher provided by James Lovell for family correspondence while John Adams was away from home.
***
During the Revolution, [Thomas] Jefferson frequently made recourse to encrypted communications to protect his private thoughts, to convey confidential information, and to protect valuable political insights from prying eyes.
James Monroe took a cipher with him to Paris in 1803, and used the cipher to communicate with Jefferson regarding the progress of negotiations concerning the Louisiana Purchase. A number of the codes that he used in communicating with Jefferson and others have survived.
James Madison was a frequent and extensive user of secret communications during the Revolution, utilizing a number of different ciphers for private correspondence, correspondence with state officials in Virginia, and correspondence with fellow actors in the Revolution.
***
John Jay used a secret code as early as October 1779, and he used a secret code to correspond, evidently on personal matters, while on government business in Europe, and was required to use a cipher for all significant diplomatic correspondence. Jay was instrumental early in the Revolution in obtaining secret ink from his brother James in London.
***
The nomenclator [i.e. cipher] used by [Benjamin] Harrison for correspondence with Madison and others has survived in the Virginia records, and much of the correspondence has been deciphered.
Edmund Randolph and Madison conducted an extensive encrypted correspondence on private matters over a number of years.
William Lee was the brother of Arthur and Richard Henry Lee, discussed infra. For correspondence between the brothers, a dictionary code was used.
***
While in Europe, Arthur Lees encrypted correspondence and reports were repeatedly stolen or reviewed in transit by British espionage officers.
Richard Henry Lee, the third Lee brother in this paper, was a diplomat, Member of the Continental Congress, President of the Continental Congress, and United States Senator. The Lee brothers correspondence and their efforts to maintain secrecy are good examples of the wide knowledge and practical use of encryption from the Revolutionary era. It should also be noted that the Lee brothers enciphered correspondence remained unbroken until the 1920s, due to the complexity of the cipher.
Benjamin Franklin was not only the printer of the 1748 text on ciphers cited above, but was also a prominent diplomat, supporter of the Revolution, and inventor of a homophonic substitution cypher while representing the United States in Paris in 1781. Franklin worked with a number of other codes and ciphers in his international correspondence on behalf of the Continental Congress, and a number of examples of his coded correspondence have survived.
***
One of [Robert R.] Livingstons contributions to the Revolutionary cause was a 1700-part code that he designed for the Foreign Affairs Department in 1781. The same code was used for private correspondence as well as government business. Livingston sent George Washington a 1017-part code in 1782 . While Livingston was in Paris on government business in 1802, Jefferson sent him a private letter and a cipher that could be used for their correspondence.
***
James Lovell designed codes and ciphers for the Continental Congress and for use in private correspondence by members and their families. David Kahn refers to Lovell as the Father of American Cryptanalysis. One of Lovells codes was used by Madison and Randolph to replace a code that was compromised by a mail robbery.
***
John Laurens used the codes supplied to him by Robert Livingston while he was in France.
***
Numerous other examples of the use of ciphers and codes during and shortly after the Revolution could be provided, but the materials cited so far should amply demonstrate that the Revolutionary era was a time of intense use of ciphers and codes by the Founders.
Encryption After the Revolution
Fraser shows that the Founding Fathers continued their use of encrypted communication after the Revolutionary War:
***
George Washington and the Marquis de Lafayette, a French nobleman and Brigadier General of the Continental Army under Washington, used a cipher for correspondence while LaFayette was in Paris in 1785.
***
Another example from the period prior to the adoption of the Bill of Rights is compelling evidence of the importance of codes and ciphers to the Founders. While Jefferson was in Paris representing the new Republic, James Madison was a member of the House of Representatives. In the First Session of the First Congress, Madison introduced legislation that, when ratified by the states, became the Bill of Rights. The correspondence between Jefferson and Madison from the period covering the introduction and the Congressional debates over the Bill of Rights is partially enciphered. It is revealing that Jeffersons August 28, 1789 letter to Madison in which he comments on the proposed First Amendment is partially enciphered, and that the comments about the text that became the First Amendment are contained in a paragraph immediately following a partially enciphered paragraph.
Prior to the adoption of the Bill of Rights, Madison and Jefferson also used a 1700-word code for confidential discussion of sensitive personal and political issues.
***
From 1791 through the patenting of Samuel Morses telegraph and beyond there has been widespread and common use of codes, ciphers, and other modes of secret communication. Perhaps the most compelling example of continued use of secret modes of communication is provided by the correspondence of James Madison and Thomas Jefferson during the administration of John Adams, who served as President from 1793 to 1801.
***
There is evidence that Alexander Hamilton and his relatives and political associates used ciphers for secret communications at least between 1800 and 1803. On June 6, 1799, Hamiltons father-in-law General Philip Schuyler wrote to Hamilton promising to send him a cypher for their correspondence. Hamilton wrote to Rufus King on January 5, 1800, conveying some information and indicating that he would wait for a cipher before communicating other information.
***
Aaron Burr, a former Vice President, sent a political code to Congressman Edward Livingston in 1806, and Burr and his associates used secret, enciphered correspondence .
Before taking office as President in 1801, Jefferson invented one of the most sophisticated cipher devices of the Nineteenth Century. It was a cipher cylinder, and has been described as far ahead of its time, and as a device that would have withstood any cryptographic attack of those days.
***
In the years after 1780, Jefferson, James Madison, James Monroe, and a covey of other political leaders in the United States often wrote in code in order to protect their personal views on tense domestic issues confronting the American nation.
***
The need for secrecy and confidential communications has continued throughout American history.
The Courts Have Always Treated Encryption As Lawful
Fraser notes that the courts have always treated encryption as legal:
***
The courts have not treated those persons who have used encryption, ciphers, and codes with any presumption of illegality.
So the government is on the wrong side of history and acting in an extremely anti-American manner.
MULTIPLE SUPPORTING LINKS IN ORIGINAL POST...GO SEE!
Igel
(35,390 posts)King George : defenders of liberty :: President Obama : common Americans.
What's next, accusing Obama of fomenting insurrections, billeting troops in private houses when we're not at war, and issuing bills of retainer? Oh, wait, there are those who accuse him of this. Not so much on this site, though.
Those who have used encryption to hide from the elected US government also include Soviet spies and organized crime, but that's no better an analogy. Since some kinds of encryption have gotten very, very good, the public key/private key strategy that PGP had, allowing access to encrypted files but still ensuring pretty good encryption is a nice compromise. Assuming that you (a) trust the government and (b) don't consider your own communications so impressively important that you're sure that must surely attract attention. Or perhaps both, a bit of the paranoid megalomaniac that lurks in each of us.
Many didn't like the idea of the government, esp. with court order, getting access to encrypted communications and those not so accessible being outlawed, but they really did consider the government (at the time, Clinton's) to be a kind of dictatorship in gestation.
cprise
(8,445 posts)if the courts interpret re-publishing and re-use of works as a form of speech.
cprise
(8,445 posts)The blogger makes the mistake of selecting past encryption users that have instant name recognition and during their most dramatic roles in history. Thus, we get a parade of Presidents and other military/government servants. This makes an interesting point by itself, but doesn't apply directly to encryption in the day-to-day lives of ordinary people.
Its the mundane examples of early cipher use that are the most helpful in this "debate" with police-statists; They demonstrate that civilian use of encryption has long been an accepted norm.
Edit: On that note, I suggest clicking through to this part:
http://www.vjolt.net/vol2/issue/vol2_art2.html#IVB