UNITED24 - Make a charitable donation in support of Ukraine!

Intelligence


Congressional Documents

                                  42 431                                 
                            105 th Congress                             
                             Rept.  105 108                             
                                                                             
                        HOUSE OF REPRESENTATIVES                        
                              1st Session                               
                                 Part 2                                 
                  SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT           
                  July  25, 1997.--Ordered to be printed                 
  Mr. Gilman , from the Committee on International Relations, submitted  
                             the following                               
                               R E P O R T                               
                              together with                              
                             DISSENTING VIEWS                            
                         [To accompany H.R. 695]                         
      The Committee on International Relations, to whom was referred the   
   bill (H.R. 695) to amend title 18, United States Code, to affirm the    
   rights of United States persons to use and sell encryption and to relax 
   export controls on encryption, having considered the same, report       
   favorably thereon with an amendment and recommend that the bill as      
   amended do pass.                                                        
   The amendment is as follows:                                            
     Strike out all after the enacting clause and insert in lieu thereof  
  the following:                                                          
          SECTION 1. SHORT TITLE.                                                 
     This Act may be cited as the ``Security and Freedom Through          
  Encryption (SAFE) Act''.                                                
          SEC. 2. SALE AND USE OF ENCRYPTION.                                     
     (a) In General.--Part I of title 18, United States Code, is amended  
  by inserting after chapter 121 the following new chapter:               
                  ``CHAPTER 122--ENCRYPTED WIRE AND ELECTRONIC INFORMATION        
      ``2801. Definitions.                                                    
      ``2802. Freedom to use encryption.                                      
      ``2803. Freedom to sell encryption.                                     
      ``2804. Prohibition on mandatory key escrow.                            
      ``2805. Unlawful use of encryption in furtherance of a criminal act.    
          ``2801. Definitions                                                     
   ``As used in this chapter--                                            
       ``(1) the terms `person', `State', `wire communication', `electronic
   communication', `investigative or law enforcement officer', `judge of   
   competent jurisdiction', and `electronic storage' have the meanings     
   given those terms in section 2510 of this title;                        
       ``(2) the terms `encrypt' and `encryption' refer to the scrambling  
   of wire or electronic information using mathematical formulas or        
   algorithms in order to preserve the confidentiality, integrity, or      
   authenticity of, and prevent unauthorized recipients from accessing or  
   altering, such information;                                             
       ``(3) the term `key' means the variable information used in a       
   mathematical formula, code, or algorithm, or any component thereof, used
   to decrypt wire or electronic information that has been encrypted; and  
    ``(4) the term `United States person' means--                          
    ``(A) any United States citizen;                                       
       ``(B) any other person organized under the laws of any State, the   
   District of Columbia, or any commonwealth, territory, or possession of  
   the United States; and                                                  
       ``(C) any person organized under the laws of any foreign country who
   is owned or controlled by individuals or persons described in           
   subparagraphs (A) and (B).                                              
          ``2802. Freedom to use encryption                                       
     ``Subject to section 2805, it shall be lawful for any person within  
  any State, and for any United States person in a foreign country, to use
  any encryption, regardless of the encryption algorithm selected,        
  encryption key length chosen, or implementation technique or medium     
  used.                                                                   
          ``2803. Freedom to sell encryption                                      
     ``Subject to section 2805, it shall be lawful for any person within  
  any State to sell in interstate commerce any encryption, regardless of  
  the encryption algorithm selected, encryption key length chosen, or     
  implementation technique or medium used.                                
          ``2804. Prohibition on mandatory key escrow                             
     ``(a) Prohibition.--No person in lawful possession of a key to       
  encrypted information may be required by Federal or State law to        
  relinquish to another person control of that key.                       
     ``(b) Exception for Access for Law Enforcement Purposes.--Subsection 
  (a) shall not affect the authority of any investigative or law          
  enforcement officer, acting under any law in effect on the effective    
  date of this chapter, to gain access to encrypted information.          
          ``2805. Unlawful use of encryption in furtherance of a criminal act     
     ``Any person who willfully uses encryption in furtherance of the     
  commission of a criminal offense for which the person may be prosecuted 
  in a court of competent jurisdiction--                                  
       ``(1) in the case of a first offense under this section, shall be   
   imprisoned for not more than 5 years, or fined in the amount set forth  
   in this title, or both; and                                             
       ``(2) in the case of a second or subsequent offense under this      
   section, shall be imprisoned for not more than 10 years, or fined in the
   amount set forth in this title, or both.''.                             
     (b) Conforming Amendment.--The table of chapters for part I of title 
  18, United States Code, is amended by inserting after the item relating 
  to chapter 33 the following new item:                                   
         ``122. Encrypted wire and electronic information                       
        2801''.                                                                
          SEC. 3. EXPORTS OF ENCRYPTION.                                          
     (a) Amendment to Export Administration Act of 1979.--Section 17 of   
  the Export Administration Act of 1979 (50 U.S.C. App. 2416) is amended  
  by adding at the end thereof the following new subsection:              
   ``(g)  Certain Consumer Products, Computers, and Related Equipment.--  
       ``(1) General rule.--Subject to paragraphs (2), (3), and (4), the   
   Secretary shall have exclusive authority to control exports of all      
   computer hardware, software, and technology for information security    
   (including encryption), except that                                     
                    which is specifically designed or modified for military use,  
          including command, control, and intelligence applications.              
       ``(2) Items not requiring licenses.--No validated license may be    
   required, except pursuant to the Trading With The Enemy Act or the      
   International Emergency Economic Powers Act (but only to the extent that
   the authority of such Act is not exercised to extend controls imposed   
   under this Act), for the export or reexport of--                        
       ``(A) any consumer product commercially available within the United 
   States or abroad which--                                                
       ``(i) includes encryption capabilities which are inaccessible to the
   end user; and                                                           
    ``(ii) is not designed for military or intelligence end use;           
       ``(B) any component or subassembly designed for use in a consumer   
   product described in subparagraph (A) which itself contains encryption  
   capabilities and is not capable of military or intelligence end use in  
   its condition as exported;                                              
    ``(C) any software, including software with encryption capabilities--  
       ``(i) that is generally available, as is, and is designed for       
   installation by the purchaser;                                          
       ``(ii) that is in the public domain for which copyright or other    
   protection is not available under title 17, United States Code, or that 
   is available to the public because it is generally accessible to the    
   interested public in any form; or                                       
       ``(iii) that is customized for an otherwise lawful use by a specific
   purchaser or group of purchasers;                                       
       ``(D) any computing device solely because it incorporates or employs
   in any form--                                                           
       ``(i) software (including software with encryption capabilities)    
   that is exempted from any requirement for a validated license under     
   subparagraph (C); or                                                    
       ``(ii) software that is no more technically complex in its          
   encryption capabilties than software that is exempted from any          
   requirement for a validated license under subparagraph (C) but is not   
   designed for installation by the purchaser;                             
       ``(E) any computer hardware that is generally available, solely     
   because it has encryption capabilities; or                              
       ``(F) any software or computing device solely on the basis that it  
   incorporates or employs in any form interface mechanisms for interaction
   with other hardware and software, including hardware, and software, with
   encryption capabilities.                                                
       ``(3) Software with encryption capabilities.--The Secretary shall   
   authorize the export or reexport of software with encryption            
   capabilities for nonmilitary end uses in any country to which exports of
   software of similar capability are permitted for use by financial       
   institutions not controlled in fact by United States persons, unless    
   there is substantial evidence that such software will be--              
       ``(A) diverted to a military end use or an end use supporting       
   international terrorism;                                                
    ``(B) modified for military or terrorist end use; or                   
       ``(C) reexported without any authorization by the United States that
   may be required under this Act.                                         
       ``(4) Hardware with encryption capabilities.--The Secretary shall   
   authorize the export or reexport of computer hardware with encryption   
   capabilities if the Secretary determines that a product offering        
   comparable security is commercially available outside the United States 
   from a foreign supplier, without effective restrictions.                
    ``(5)  Definitions.--As used in this subsection--                      
       ``(A) the term `encryption' means the scrambling of wire or         
   electronic information using mathematical formulas or algorithms in     
   order to preserve the confidentiality, integrity, or authenticity of,   
   and prevent unauthorized recipients from accessing or altering, such    
   information;                                                            
    ``(B) the term `generally available' means--                           
       ``(i) in the case of software (including software with encryption   
   capabilities), software that is offered for sale, license, or transfer  
   to any person without restriction, whether or not for consideration,    
   including, but not limited to, over-the-counter retail sales, mail order
   transactions, phone order transactions, electronic distribution, or sale
   on approval; and                                                        
       ``(ii) in the case of hardware with encryption capabilities,        
   hardware that is offered for sale, license, or transfer to any person   
   without restriction, whether or not for consideration, including, but   
   not limited to, over-the-counter retail sales, mail order transactions, 
   phone order transactions, electronic distribution, or sale on approval; 
       ``(C) the term `as is' means, in the case of software (including    
   software with encryption capabilities), a software program that is not  
   designed, developed, or tailored by the software publisher for specific 
   purchasers, except that such purchasers may supply certain installation 
   parameters needed by the software program to function properly with the 
   purchaser's system and may customize the software program by choosing   
   among options contained in the software program;                        
       ``(D) the term `is designed for installation by the purchaser'      
   means, in the case of software (including software with encryption      
   capabilities) that--                                                    
       ``(i) the software publisher intends for the purchaser (including   
   any licensee or transferee), who may not be the actual program user, to 
   install the software program on a computing device and has supplied the 
   necessary instructions to do so, except that the publisher may also     
   provide telephone help line services for software installation,         
   electronic transmission, or basic operations; and                       
       ``(ii) the software program is designed for installation by the     
   purchaser without further substantial support by the supplier;          
       ``(E) the term `computing device' means a device which incorporates 
   one or more microprocessor-based central processing units that can      
   accept, store, process, or provide output of data; and                  
       ``(F) the term `computer hardware', when used in conjunction with   
   information security, includes, but is not limited to, computer systems,
   equipment, application-specific assemblies, modules, and integrated     
   circuits.''.                                                            
     (b) Continuation of Export Administration Act.--For purposes of      
  carrying out the amendment made by subsection (a), the Export           
  Administration Act of 1979 shall be deemed to be in effect.             
          SEC. 4. SENSE OF CONGRESS REGARDING INTERNATIONAL COOPERATION.          
   (a)  Findings.--The Congress finds that--                              
       (1) implementing export restrictions on widely available technology 
   without the concurrence of all countries capable of producing,          
   transshipping, or otherwise transferring that technology is detrimental 
   to the competitiveness of the United States and should only be imposed  
   on technology and countries in order to protect the United States       
   against a compelling national security threat; and                      
       (2) the President has not been able to come to agreement with other 
   encryption producing countries on export controls on encryption and has 
   imposed excessively stringent export controls on this widely available  
   technology.                                                             
     (b) Sense of Congress.--It is the sense of the Congress that the     
  President should immediately take the necessary steps to call an        
  international conference for the purpose of coming to an agreement with 
  encryption producing countries on policies which will ensure that the   
  free use and trade of this technology does not hinder mutual security.  
                                   BACKGROUND AND PURPOSE                         
      H.R. 695, the Security and Freedom Through Encryption (SAFE) Act,    
   represents a strong bipartisan effort to bring U.S. laws on the export  
   of encryption technology into the present and future, by looking at the 
   actual technological developments taking place on the world stage. The  
   SAFE Act enjoys strong support in the House as reflected by the         
   overwhelming number of co-sponsors, including a majority of the Members 
   of the Committee on International Relations.                            
      While differences still remain and the debate continues between U.S. 
   economic and commercial priorities and individual civil liberties, on   
   the one hand, and the needs and concerns of law enforcement and national
   security agencies, the SAFE Act is generating the political will to     
   reform the existing regulatory process to meet today's realities.       
      Encryption has been defined as referring to the use of software or   
   hardware to scramble wire or electronic information using mathematical  
   formulas or algorithms in order to preserve the confidentiality,        
   integrity, or authenticity of, and prevent unauthorized recipients from 
   accessing or altering such information. While anyone can encrypt a      
   message, only an authorized person can convert a scrambled message back 
   into its original form.                                                 
      The basic idea of modern encryption, or cryptography, is that any    
   message can be represented as a set of numbers (the plaintext) used to  
   transform the plaintext into a different set of numbers (the            
   ciphertext). Simply stated, keys consist of a series of ones and zeros  
   (called ``bits'), and are described in terms of their ``length'', which 
   is corresponds to the number of possible combinations that can be used  
   to decode a particular message. A 40-bit key means that the number of   
   possible combinations of ones and zeros equals 2 to the 40th power. It  
   then follows that a 56-bit key is 2 to the 56th power, which means that 
   it is 2 to the 16th power stronger that a 40-bit key.                   
      Once the exclusive domain of the national security and intelligence  
   sectors, encryption now has an expanded application, impacting the      
   everyday lives of millions of Americans. Today, banking systems, stock  
   markets, air traffic control systems, credit bureaus, telephone         
   networks, weather satellites, social security system, television        
   networks, civilian and government payrolls, and the Internet are all    
   directly affected by a flow of data managed by countless computers and  
   telecommunication networks around the world. Computer technology now    
   serves as the nervous system of modern society.                         
      It is increasingly difficult to protect the privacy and              
   confidentiality of transactions at all levels, and increasingly         
   important to do so. The Justice Department has estimated that annual    
   losses related to computer security breaches could be as high as $7     
   billion. If this were adjusted to include the number of undocumented    
   cases by companies reluctant to report such intrusions, the figure could
   be even higher. The National Counterintelligence Center in their        
   ``Annual Report to Congress on Foreign Economic Collection and          
   Industrial Espionage'' concluded that such ``specialized technical      
   operations (including computer intrusions, telecommunications targeting 
   and intercept, and private sector encryption weaknesses) account for the
   largest portion of economic and industrial information lost by          
   corporations.''                                                         
      Therefore, stronger encryption tools are widely viewed as the key to 
   providing security and privacy for the information superhighway.        
      Current U.S. policy restricts the export of ``strong'' encryption    
   hardware or software products with keys greater than 40 bits            
   long--determined to be gravely inadequate by numerous experts. The      
   current Administration proposal, which would allow the export of 56-bit 
   encryption, is viewed as not meeting the needs of U.S. companies to     
   conduct business in a secure manner with their suppliers, their business
   partners, their customers, and even their affiliated companies outside  
   the United States.                                                      
      Supporting the need for higher encryption standards is the fact that,
   on the same day that the companion legislation--the McCain-Kerrey       
   bill--was introduced in the Senate calling for a 56-bit limit on        
   encryption exports, a group of independent programmers and researchers  
   cracked a 56-bit code using computers linked across the Internet. This  
   successful breaking of 56-bit encryption clearly demonstrates the       
   anachronistic nature of current U.S. law and reflects how out-of-touch  
   the Administration's policy is with the needs of the global marketplace.
      The Administration's proposal would only allow the export of 56-bit  
   encryption for those who promise to build in ``key recovery''. ``Key    
   recovery'' or ``key escrow'' essentially means that when stored data or 
   electronic communications are encrypted, a third party has a copy of the
   key needed to decrypt the information. As presented by proponents of    
   this policy, escrowed encryption is intended to provide for encryption  
   protection for legitimate uses but also enable law enforcement officials
   to gain access to the key when it is necessary to decode the plaintext  
   data as part of an investigation.                                       
      This has been interpreted as an attempt to use the export control    
   process to manipulate and control the market for and expansion of       
   encryption technology, by making it easy to export products with key    
   recovery and difficult for those products without. The logical basis for
   this policy is flawed as it is rooted in the wrongful assumption that   
   foreign competitors can be convinced to alter their policy to parallel  
   what U.S. policy is calling for. The current policy is not based on fact
   but on the optimistic view that the U.S. can influence other countries  
   not to export strong encryption without an escrow system.               
      Speculation does not make for good laws. Individually and as a unit, 
   many of our European allies have clearly illustrated their commitment to
   allow market forces and                                                 
                    individual needs to dictate the levels of encryption. In its  
          April 1997 proposal entitled, ``A European Initiative in Electronic     
          Commerce'', the European Union stated as key elements of the Initiative 
          to ensure a framework which ``boosts the trust and confidence of        
          businesses for investments and consumers to make use of electronic      
          commerce by dismantling remaining legal and regulatory barriers and     
          preventing the creation of new obstacles.'' It goes on to say that:     
          ``The use of strong encryption which ensures the confidentiality of both
          sensitive commercial and of personal data is one of the foundation      
          stones of electronic commerce . . . The Community (European Community)  
          shall work at the international level towards the removal of trade      
          barriers for encryption products.''                                     
      Even the more conservative recommendations made in March 1997 by the 
   Council of the Organization for Economic Cooperation and Development,   
   clearly state that: ``Users should have access to cryptography that     
   meets their needs, so that they can trust in the security of information
   and communications systems, and the confidentiality and integrity of    
   data on those systems.'' The Council further underscores that:          
   ``Government controls on cryptographic methods . . . should respect user
   choice to the greatest extent possible . . . and should not be          
   interpreted as implying that governments should initiate legislation    
   which limits user choice.'' Finally, they add: ``The development and    
   provision of cryptographic methods should be determined by the market in
   an open and competitive environment. Such an approach would best ensure 
   that solutions keep pace with changing technology, the demands of users 
   and evolving threats to communications systems security.''              
      While U.S. companies are kept at 40-bit encryption or at 56-bit with 
   the condition that they commit to develop key recovery, non-U.S.        
   exporters, particularly the countries of the European Union, are        
   producing packages that include encryption technology using 128 bits    
   leaving American companies far behind in the race to capture new        
   markets.                                                                
      Furthermore, American companies are placed at a competitive          
   disadvantage by being forced to create and deploy two separate systems  
   to meet two separate standards. Because of the nightmare this would     
   create, most U.S. businesses end up making their exportable products    
   subject to the same restrictions as their domestic products. By not     
   allowing U.S. industries to provide secure products in the face of      
   strong foreign competitors who are not restricted by outdated export    
   controls, current law is hurting U.S. businesses. No one will buy       
   encryption products for which the U.S. government can obtain a key. A   
   recent report by the CEOs of 13 large American technology companies     
   concluded that the U.S. computer industry could potentially lose up to  
   $30 60 billion annually by the year 2000 due to these export controls.  
      At a fundamental level, evaluating the value of key recovery systems 
   in and of themselves, eleven of the world's top cryptographers concluded
   that key recovery systems would create new vulnerabilities. A key       
   recovery system would create serious difficulties as it would require a 
   vast infrastructure of recovery agents and oversight entities to manage 
   access to the keys. In their May 1997 report entitled, ``The Risks of   
   Key Recovery, Key Escrow, and Trusted Third Party Encryption'', these   
   experts also determined that ``the field of cryptography has no         
   experience in deploying secure systems of this scope and complexity''   
   and that such systems could potentially cost many billions of dollars.  
      Key recovery systems do not even meet the national security needs on 
   which the policy is based on. The Software Publishers Association has   
   documented hundreds of foreign encryption products already widely       
   available abroad and which criminals, terrorists, and foreign           
   governments have access to. It is the upstanding, law-abiding citizen   
   who suffers.                                                            
      The fact is that strong encryption helps to further the goals of law 
   enforcement and national security, more than key recovery could ever    
   hope to. In its landmark report on encryption policy, the blue-ribbon   
   National Research Council concluded the following about the use of      
   strong encryption:                                                      
                     If cryptography can protect the trade secret and   
          proprietary information of business and thereby reduce        
          economic espionage (which it can), it also supports in a most 
          important manner the job of law enforcement. If cryptography  
          can help protect nationally critical information systems and  
          networks against unauthorized penetration (which it can), it  
          also supports the national security of the United States.     
      In summary, if U.S. laws are not changed soon, not as mandated by the
   Administration's policy or its companion legislation in the Senate, but 
   as H.R. 695 attempts to do, world standards for security technology will
   shift away from the U.S. as customers buy products from foreign         
   manufacturers. The U.S. government will not have a view into the        
   security technology that replaces U.S. technology as the world          
   standards. U.S. industries will lose control of information security    
   technologies which are vital to economic security. It will cost the U.S.
   economy billions of dollars and hundreds of thousands of jobs.          
      On July 7, 1997, German Economics Minister Guenter Rexrodt called for
   the removal of restrictions on encryption technology in his opening     
   remarks for a two-day conference on Internet commerce attended by 40    
   government ministers from the European union, the United States, Russia,
   Japan and Canada. ``Users can only protect themselves against having    
   data manipulated, destroyed or spied on through the use of strong       
   encryption procedures,'' Rexrodt said, ``that is why we have to use all 
   of our powers to promote such procedures instead of blocking them.''    
      Individual Americans and U.S. businesses should be afforded the same 
   protection and the same opportunities as other countries provide their  
   own people and industries.                                              
                    H.R. 695--the SAFE Act--does just that. It is aimed at        
          correcting the unfair and unsafe situation that currently exists under  
          current law as it: prohibits export controls on ``generally available'' 
          commercial encryption except for military end-users or to identified    
          individuals or organizations in specific foreign countries; does not    
          require reporting for companies after export; prohibits mandatory use of
          key recovery; denies liability protection and penalties for key holders;
          denies foreign government access to keys under specified conditions if  
          key holder is used voluntarily; prohibits U.S. government and law       
          enforcement access to keys by court order if key holder is used         
          voluntarily; codifies existing domestic use policy; gives the Secretary 
          of Commerce exclusive jurisdiction over export of commercial encryption 
          except for military end-uses or to identified individuals or            
          organizations in specific foreign countries.                            
      In essence, H.R. 695 prevents economic espionage while protecting    
   hundreds of thousands of American jobs by affording all Americans the   
   freedom to use any type of encryption anywhere in the world; by allowing
   any type of encryption to be sold in the United States; and creates a   
   level playing field by permitting the export of the generally available 
   software, hardware, and other encryption-related computer products.     
      The Committee hopes that other Members realize the need, value, and  
   importance of H.R. 695 as it works its way through the legislative      
   process. In the interest of the American people, of U.S. economic       
   leadership and growth, and of national security, the Committee hopes    
   that the House will pass the SAFE Act.                                  
                                      COMMITTEE ACTION                            
      H.R. 695 was introduced by Representative Goodlatte on February 12,  
   1997, and referred to the Committee on Judiciary and in addition to the 
   Committee on International Relations for a period subsequently to be    
   determined by the Speaker. It was reported to the House by the Committee
   on the Judiciary, amended, on May 22, 1997 (H. Rept. 105-108). On May   
   22, 1995, the referral to the Committee on International Relations was  
   extended through July 11, 1997, and on June 26, 1997, the referral to   
   the Committee on International Relations was extended for a period      
   ending not later than July 25, 1997.                                    
      On June 26, 1997, the bill was referred, in addition, to Committees  
   on Commerce, National Security, and the Permanent Select Committee on   
   Intelligence for a period ending not later than September 5, 1997, for  
   consideration of such provisions of the bill and the amendment reported 
   by the Committee on the Judiciary as fall within the jurisdiction of    
   those committees pursuant to clause 1(3) and (k), rule X and rule       
   XLVIII, respectively.                                                   
      On May 8, 1997, the Subcommittee on International Economic Policy and
   Trade held a hearing entitled: ``Encryption: Individual Right to Privacy
   vs. National Security.'' Witnesses for this hearing included: Hon.      
   William Reinsch, Under Secretary of Commerce, Bureau of Export          
   Administration; Hon. William Crowell, Deputy Director, National Security
   Agency; Hon. Robert Litt, Deputy Assistant Attorney General, Criminal   
   Division, U.S. Department of Justice; Mr. John Gage, Director, Science  
   Office, Sun Microsystems, Inc.; Mr. Humphrey Polanen, General Manager,  
   Network Security Products Group, Sun Microsystems, Inc.; Jerry Berman,  
   Executive Director, Center for Democracy and Technology; Tom Parenty,   
   Director of Security, Sybase Corporation; and Stephen T. Walker,        
   President and CEO, Chairman of the Board of Directors, Trusted          
   Information Systems.                                                    
      On May 29, 1997, the Full Committee held a Members briefing on H.R.  
   695, ``the Security and Freedom through Encryption (SAFE) Act.''        
   Speakers for the briefing included Hon. Louis Freeh, Director, Federal  
   Bureau of Investigation and Hon. William Crowell, Deputy Director,      
   National Security Agency.                                               
      On June 4, 1997, the Subcommittee on International Economic Policy   
   and Trade held a Members Briefing on the future of U.S.-European trade  
   relations. Speakers for the briefing included: Hon. David L. Aaron, U.S.
   Ambassador to the Organization for Economic Cooperation and Development 
   (OECD); H.E. Hugo Paemen, Head of the Delegation to the United States of
   the Commission of the European Union; and Dr. Dominique                 
   vanderMensbrugghe, Senior Economist, OECD Development Center.           
      On June 24, 1997, the Subcommittee on International Economic Policy  
   and Trade held a mark-up of H.R. 695, ``the Security and Freedom through
   Encryption (SAFE) Act''. Witnesses included: Congressman Bob Goodlatte. 
       Amendment.-- An en bloc amendment was offered by Ros-Lehtinen,      
   Gejdenson, Campbell and Sherman. The amendment removes the distinction  
   between mass market and customized software thus ensuring that          
   customized software is also subject to liberalized export controls. It  
   expands section 3 on exports of encryption by including consumer        
   products which do not necessarily fall under the umbrella of            
   ``computing'' products but which also require and use encryption. It    
   broadens the scope and definition of ``generally available'' to include 
   hardware with encryption capabilities. The amendment also adds a fourth 
   section to the bill in the form of a sense of Congress regarding        
   international cooperation. The amendment passed by voice vote.          
      A motion to report the bill, as amended, to the Full Committee passed
   by a roll call vote, as follows:                                        
      Voting yes: Ros-Lehtinen, Manzullo, Chabot, Campbell, Blunt, Brady,  
   Rohrabacher, Gejdenson, Danner, Hilliard, Sherman, Rothman, Clement,    
   Luther.                                                                 
   Voting no:  Bereuter.                                                   
   Passed: 14 1.                                                           
      On June 26, 1997, the Full Committee held a classified Members       
   briefing on the impact of H.R. 695, ``the Security and Freedom through  
   Encryption (SAFE) Act'' on national security and law enforcement        
   activities. Speakers for the briefing included: Hon. Louis Freeh,       
   Director, Federal Bureau of Investigation; Hon. William Crowell, Deputy 
   Director, National Security Agency; Hon. William Reinsch, Under         
   Secretary of Commerce, Bureau of Export Administration.                 
      On July 22, 1997, the Full Committee marked up the bill in open      
   session, pursuant to notice. The Committee first adopted the amendment  
   recommended by the Subcommittee on International Economic Policy by     
   unanimous consent, as original text for the purposes of amendment.      
   Representatives Goodlatte and Lofgren and representatives of the        
   Administration (The Hon. William Reinsch, Under Secretary of Commerce;  
   Mr. Jim Kallstrom, Federal Bureau of Investigation; Mr. James R. Taylor,
   National Security Agency; and Mr. Anthony Bocchichio of the Drug        
   Enforcement Agency) responded to questions from members during the      
   course of the markup.                                                   
      After further consideration, on that date, a quorum being present,   
   the Full Committee by voice vote ordered the bill reported to the House 
   with the recommendation that the bill, as amended, do pass.             
                       Rollcall votes on amendments                      
      In compliance with clause (2)(l)(2)(B) of rule XI of the Rules of the
   House of Representatives, the record of committee roll call votes on    
   final passage or amendments during the full committee's consideration of
   H.R. 695 is set out below, as is a report of the full committee's final 
   action on the bill.                                                     
                      Description of Amendment, Motion, Order, or Other Proposition
           (votes during markup of H.R. 695--July 22, 1997)                        
      Vote No. 1.--Gilman amendment provide that certain items could not be
   exported if in the opinion of the President they would endanger the     
   national security.                                                      
      Voting Yes: Gilman, Leach, Bereuter, Gallegly, Fox, Hamilton, Berman,
   Menendez, Brown, Danner, Rothman, Clement, and Davis.                   
      Voting No: Smith, Ros-Lehtinen, Ballenger, Rorhabacher, Manzullo,    
   Royce, King, Chabot, Sanford, Houghton, Campbell, Blunt, Moran, Brady,  
   Gejdenson, Ackerman, Hastings, Hilliard, Capps, Sherman, Wexler, and    
   Luther.                                                                 
   Ayes, 13. Noes, 22.                                                     
      Note: The bill was subsequently ordered reported favorably, amended, 
   by voice vote, a quorum being present, on July 22, 1997.                
                                SECTION-BY-SECTION ANALYSIS                       
                         Section 1.  Short Title                         
      This section states that this Act may be cited as the ``Security and 
   Freedom Through Encryption (SAFE) Act''.                                
                  Section 2.  Sale And Use Of Encryption                 
      This section states that, in general, Part I of Title 18, United     
   States Code, is amended by adding a new chapter after chapter 121.      
      This section also creates ``Chapter 122-Encrypted Wire And Electronic
   Information'' which includes sections; 2801. Definitions., 2802. Freedom
   To Use Encryption., 2803. Freedom to Sell Encryption., 2804. Prohibition
   On Mandatory Key Escrow., 2805. Unlawful Use Of Encryption in the       
   furtherance of a criminal act.                                          
      Section 2801 is titled ``Definitions'' and provides definitions for  
   ``person'' ``State'' ``wire communication'' ``electronic                
   communication'', ``investigative or law enforcement officer'', judge of 
   competent jurisdiction'', ``electronic storage'', ``encrypt'',          
   ``encryption'', ``key'', and ``United States person''. Many of these    
   definitions were taken explicitly from 18 U.S.C. 2810.                  
      New section 2802 states that it is legal for any person in the United
   States or any United States person in a foreign country, to use any form
   of encryption regardless of the algorithm, key length, or technique used
   in the encryption.                                                      
      New section 2803 states that it is legal for any person in the United
   States to sell in interstate commerce encryption products using any form
   of encryption regardless of the algorithm, key length, or technique     
   used. The Committee intends that Sections 2802 and 2803 be read as      
   limitations on government power. They should not be read as overriding  
   otherwise lawful employer policies concerning employee use of the       
   employers computer system, nor as limiting the employer's otherwise     
   lawful means for remedying violations of those policies.                
      New section 2804 specifically prohibits requiring any person in      
   lawful possession of an encryption key to turn that key over to another 
   person. This section prevents any form of mandatory key escrow system   
   with an exception for any law enforcement personnel or a member of the  
   intelligence community.                                                 
      New section 2805 make it a crime to use encryption unlawfully in     
   furtherance of some other crime. This new crime is punishable with a    
   sentence of 5 years for a first offence and 10 years. This section      
   requires that for a person to violate this section that person must be  
   found guilty of some other federal felony crime and was deliberately    
   using encryption to avoid detection of that other federal felony crime. 
      Subsection 2(b) of H.R. 695 provides for a conforming amendment to   
   the table of chapters in Title 18.                                      
                     Section 3.  Export of Encryption                    
      Subsection 3(a) of H.R. 695 amends the Export Administration Act by  
   creating a new subsection (g) entitled ``Computers and Related          
   Equipment,'' to 50 U.S.C. App. 2416.                                    
      New subsection (g)1 place all encryption products, except those      
   specifically designed or modified for military use, under the           
   jurisdiction of the Secretary of Commerce.                              
      New subsection (g)2 allows encryption software that is generally     
   available or in the public domain, like mass-market software products,  
   to be exported freely except pursuant to the Trading With The Enemy Act 
   or the International Emergency Economic Powers Act (but only to the to  
   the extent that the authority of such Act is not exercised to extend    
   controls imposed under this Act.). The Subcommittee on International    
   Economic Policy and Trade, on an amendment offered by Chair Ros-Lehtinen
   and Ranking Member Gejdenson, and others, amended Subsection (g)2 on a  
   voice vote in Subcommittee to include certain other consumer products,  
   or component or subassembly (provided those components are not capable  
   of military or intelligence end use in its condition as exported.),     
   which have encryption capabilities that are inaccessible to the end user
   and which are commercially available within the United States or abroad.
   These product as discussed by the Subcommittee are consumer products    
   such as small dish satellite receivers, digital video disk players,     
   smart cards, Web TV, etc. These products, which are commercially        
   available within the United States or abroad, were viewed by the        
   Subcommittee as being clearly and purely for consumer end-use and not   
   for military purposes. The Ros-Lehtinen amendment also amended (g)2 to  
   include customized software for an otherwise lawful purpose by a        
   specific purchaser or group of purchasers.                              
      New subsection (g)3 requires the Secretary of Commerce to allow other
   encryption software to be exported unless there is substantial evidence 
   that will be put to military or terrorist uses or that it will be       
   reexported without U.S. authorization.                                  
      New subsection (g)4 requires the Secretary to allow the export of    
   hardware with encryption capabilities when the Commerce Department finds
   that it is commercially available from foreign suppliers without        
   effective restrictions.                                                 
      New subsection (g)5 provides definitions for this subsection. The    
   subcommittee amendment offered by Chair Ros-Lehtinen, and others also   
   amended this subsection to include the same consumer products added to  
   subsection (g)2.                                                        
      As the Ros-Lehtinen amendment adopted in the Subcommittee on         
   International Economic Policy and Trade stated, the Committee would like
   to reiterate that, with the ever increasing use of computer technology  
   and computer information (hardware and software) in consumer product    
   lines for protection of privacy, information security, and intellectual 
   property interests, it intends this legislation to cover all            
   devices--whether traditional computing devices or convergent consumer   
   products that incorporate encryption. The applications covered by this  
   legislation include video, audio, and data communications systems and   
   telecommunication equipment. Hardware and software containing           
   encryption, such as encoders, decoders, and network terminals, which are
   essential to protect the video signal, are therefore included under     
   section 3(a) of this Act. As well as video, audio, data communications  
   systems containing encryption and decryption capability are used by     
   cable, satellite, and wireless delivery systems. This legislation is    
   also intended to include set-top devices and other terminals where the  
   encryption is not directly available to the user but is used for        
   purposes such as pay per view, and hardware such as network computers,  
   telephones or cable modems, satellite uplinks and downlinks.            
      Subsection 3(b) of H.R. 695 provides that for the purposes of        
   carrying out the amendment made by subsection 3(a), the Export          
   Administration Act shall be deemed to be in effect. This statement is   
   necessary because Congress failed to reauthorize the Export             
   Administration Act and it expired in 1994. The Administration maintains 
   the Export Administration Act policies by executive order. The Committee
   plans to reauthorize the Export Administration Act in this Congress.    
    Section 4.  Sense of Congress Regarding International Cooperation    
      This section asks on the President to call an international          
   conference for the purpose of                                           
                    achieving an agreement among the encryption producing         
          countries on policies which will ensure that the free use and trade of  
          this technology does not hinder mutual technology.                      
                                COMMITTEE OVERSIGHT FINDINGS                      
      In compliance with clause 2(l)(3)(A) of rule XI of the Rules of the  
   House of Representatives, the Committee reports the findings and        
   recommendations of the Committee, based on oversight activities under   
   clause 2(b)(1) of rule X of the Rules of the House of Representatives,  
   are incorporated in the descriptive portions of this report.            
                   COMMITTEE ON GOVERNMENT REFORM AND OVERSIGHT FINDINGS          
      No findings or recommendations of the Committee on Government Reform 
   and Oversight were received as referred to in clause 2(l)(3)(D) of rule 
   XI of the Rules of the House of Representatives.                        
                                ADVISORY COMMITTEE STATEMENT                      
      No advisory committees within the meaning of section 5(b) of the     
   Federal Advisory Committee Act were created by this legislation.        
                          APPLICABILITY TO THE LEGISLATIVE BRANCH                 
      The Committee finds that the legislation does not relate to the terms
   and conditions of employment or access to public services or            
   accommodations within the meaning of section 102(b)(3) of the           
   Congressional Accountability Act.                                       
                             CONSTITUTIONAL AUTHORITY STATEMENT                   
      In compliance with clause 2(l)(4) of rule XI of the Rules of the     
   House of Representatives, the Committee cites the following specific    
   powers granted to the Congress in the Constitution as authority for     
   enactment of H.R. 695 as reported by the Committee: Article I, section  
   8, clause 1 (relating to providing for the common defense and general   
   welfare of the United States); and Article I, section 8, clause 18      
   (relating to making all laws necessary and proper for carrying into     
   execution powers vested by the Constitution in the government of the    
   United States).                                                         
          NEW BUDGET AUTHORITY AND TAX EXPENDITURES, CONGRESSIONAL BUDGET OFFICE  
                                  COST ESTIMATE                                   
      The Committee expects to adopt a cost estimate of the Congressional  
   Budget Office as its submission of any new required information on new  
   budget authority, new spending authority, new credit authority, or an   
   increase or decrease in the national debt, which it expects to provide  
   in a supplemental report.                                               
                                 FEDERAL MANDATES STATEMENT                       
      The Committee adopts as its own the estimate of Federal mandates     
   prepared by the Director of the Congressional Budget Office pursuant to 
   section 423 of the Unfunded Mandates Reform Act.                        
       U.S. Congress,                                                          
       Congressional Budget Office,                                            
       Washington, DC, July 25, 1997.                                          
          Hon.  Benjamin Gilman,                Chairman, Committee on International Relations, 
       House of Representatives, Washington, DC.                               
       Dear Mr. Chairman: The Congressional Budget Office has prepared the 
   enclosed mandates statement for H.R. 695, the Security and Freedom      
   Through Encryption (SAFE) Act. CBO's analysis of the bill's federal     
   costs will be sent to you as soon as it is completed.                   
      If you wish further details on this estimate, we will be pleased to  
   provide them. The CBO staff contacts are Pepper Santalucia (for the     
   state and local impact) and Matt Eyles (for the private-sector impact). 
   Sincerely,                                                              
         Jane E. O'Neill,  Director.                                            
   Enclosure.                                                              
              CONGRESSIONAL BUDGET OFFICE MANDATES STATEMENT             
           H.R. 695--Security and Freedom Through Encryption (SAFE) Act            
      H.R. 695 would allow individuals in the United States to use and sell
   any form of encryption and would prohibit states or the federal         
   government from requiring individuals to relinquish the key to          
   encryption technologies to any third party. The bill also would prevent 
   the Bureau of Export Administration in the Department of Commerce from  
   restricting the export of most nonmilitary encryption products. Finally,
   H.R. 695 would establish criminal penalties and fines for the willful   
   use of encryption technologies in committing criminal offenses.         
      The bill would prohibit states from requiring persons to make        
   encryption keys available to another person or entity. This prohibition 
   would be an intergovernmental mandate as defined in the Unfunded        
   Mandates Reform Act of 1995 (UMRA). However, states would bear no costs 
   as a result of this mandate because none currently require the          
   registration or availability of such keys. H.R. 695 contains no         
   private-sector mandates as defined in UMRA.                             
                   CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED          
     In compliance with clause 3 of rule XIII of the Rules of the House of
  Representatives, changes in existing law made by the bill, as reported, 
  are shown as follows (new matter is printed in italic and existing law  
  in which no change is proposed is shown in roman):                      
                                TITLE 18, UNITED STATES CODE                      
         * * * * * * *                                                           
          PART I--CRIMES                                                          
 Chap.                                                                   
 Sec.                                                                    
         1.   General provisions                                                
        1                                                                      
         * * * * * * *                                                           
         122. Encrypted wire and electronic information                         
        2801                                                                   
         * * * * * * *                                                           
                   CHAPTER 122--ENCRYPTED WIRE AND ELECTRONIC INFORMATION         
      2801. Definitions.                                                      
      2802. Freedom to use encryption.                                        
      2803. Freedom to sell encryption.                                       
      2804. Prohibition on mandatory key escrow.                              
      2805. Unlawful use of encryption in furtherance of a criminal act.      
          2801. Definitions                                                       
   As used in this chapter--                                              
       (1) the terms ``person'', ``State'', ``wire communication'',        
   ``electronic communication'', ``investigative or law enforcement        
   officer'', ``judge of competent jurisdiction'', and ``electronic        
   storage'' have the meanings given those terms in section 2510 of this   
   title;                                                                  
       (2) the terms ``encrypt'' and ``encryption'' refer to the scrambling
   of wire or electronic information using mathematical formulas or        
   algorithms in order to preserve the confidentiality, integrity, or      
   authenticity of, and prevent unauthorized recipients from accessing or  
   altering, such information;                                             
       (3) the term ``key'' means the variable information used in a       
   mathematical formula, code, or algorithm, or any component thereof, used
   to decrypt wire or electronic information that has been encrypted; and  
    (4) the term ``United States person'' means--                          
    (A) any United States citizen;                                         
       (B) any other person organized under the laws of any State, the     
   District of Columbia, or any commonwealth, territory, or possession of  
   the United States; and                                                  
       (C) any person organized under the laws of any foreign country who  
   is owned or controlled by individuals or persons described in           
   subparagraphs (A) and (B).                                              
          2802. Freedom to use encryption                                         
     Subject to section 2805, it shall be lawful for any person within any
  State, and for any United States person in a foreign country, to use any
  encryption, regardless of the encryption algorithm selected, encryption 
  key length chosen, or implementation technique or medium used.          
          2803. Freedom to sell encryption                                        
     Subject to section 2805, it shall be lawful for any person within any
  State to sell in interstate commerce any encryption, regardless of the  
  encryption algorithm selected, encryption key length chosen, or         
  implementation technique or medium used.                                
          2804. Prohibition on mandatory key escrow                               
     (a) Prohibition.--No person in lawful possession of a key to         
  encrypted information may be required by Federal or State law to        
  relinquish to another person control of that key.                       
     (b) Exception for Access for Law Enforcement Purposes.--Subsection   
  (a) shall not affect the authority of any investigative or law          
  enforcement officer, acting under any law in effect on the effective    
  date of this chapter, to gain access to encrypted information.          
          2805. Unlawful use of encryption in furtherance of a criminal act       
     Any person who willfully uses encryption in furtherance of the       
  commission of a criminal offense for which the person may be prosecuted 
  in a court of competent jurisdiction--                                  
       (1) in the case of a first offense under this section, shall be     
   imprisoned for not more than 5 years, or fined in the amount set forth  
   in this title, or both; and                                             
       (2) in the case of a second or subsequent offense under this        
   section, shall be imprisoned for not more than 10 years, or fined in the
   amount set forth in this title, or both.                                
         * * * * * * *                                                           
                     SECTION 17 OF THE EXPORT ADMINISTRATION ACT OF 1979          
    Sec.  17. (a) * * *                                                   
         * * * * * * *                                                           
   (g)  Certain Consumer Products, Computers, and Related Equipment.--    
       (1) General rule.--Subject to paragraphs (2), (3), and (4), the     
   Secretary shall have exclusive authority to control exports of all      
   computer hardware, software, and technology for information security    
   (including encryption), except that which is specifically designed or   
   modified for military use, including command, control, and intelligence 
   applications.                                                           
       (2) Items not requiring licenses.--No validated license may be      
   required, except pursuant to the Trading With The Enemy Act or the      
   International Emergency Economic Powers Act (but only to the extent that
   the authority of such Act is not exercised to extend controls imposed   
   under this Act), for the export or reexport of--                        
       (A) any consumer product commercially available within the United   
   States or abroad which--                                                
       (i) includes encryption capabilities which are inaccessible to the  
   end user; and                                                           
    (ii) is not designed for military or intelligence end use;             
       (B) any component or subassembly designed for use in a consumer     
   product described in subparagraph (A) which itself contains encryption  
   capabilities and is not capable of military or intelligence end use in  
   its condition as exported;                                              
    (C) any software, including software with encryption capabilities--    
       (i) that is generally available, as is, and is designed for         
   installation by the purchaser;                                          
       (ii) that is in the public domain for which copyright or other      
   protection is not available under title 17, United States Code, or that 
   is available to the public because it is generally accessible to the    
   interested public in any form; or                                       
       (iii) that is customized for an otherwise lawful use by a specific  
   purchaser or group of purchasers;                                       
       (D) any computing device solely because it incorporates or employs  
   in any form--                                                           
       (i) software (including software with encryption capabilities) that 
   is exempted from any requirement for a validated license under          
   subparagraph (C); or                                                    
       (ii) software that is no more technically complex in its encryption 
   capabilties than software that is exempted from any requirement for a   
   validated license under subparagraph (C) but is not designed for        
   installation by the purchaser;                                          
       (E) any computer hardware that is generally available, solely       
   because it has encryption capabilities; or                              
       (F) any software or computing device solely on the basis that it    
   incorporates or employs in any form interface mechanisms for interaction
   with other hardware and software, including hardware, and software, with
   encryption capabilities.                                                
       (3) Software with encryption capabilities.--The Secretary shall     
   authorize the export or reexport of software with encryption            
   capabilities for nonmilitary end uses in any country to which exports of
   software of similar capability are permitted for use by financial       
   institutions not controlled in fact by United States persons, unless    
   there is substantial evidence that such software will be--              
       (A) diverted to a military end use or an end use supporting         
   international terrorism;                                                
    (B) modified for military or terrorist end use; or                     
       (C) reexported without any authorization by the United States that  
   may be required under this Act.                                         
       (4) Hardware with encryption capabilities.--The Secretary shall     
   authorize the export or reexport of computer hardware with encryption   
   capabilities if the Secretary determines that a product offering        
   comparable security is commercially available outside the United States 
   from a foreign supplier, without effective restrictions.                
    (5)  Definitions.--As used in this subsection--                        
       (A) the term ``encryption'' means the scrambling of wire or         
   electronic information using mathematical formulas or algorithms in     
   order to preserve the confidentiality, integrity, or authenticity of,   
   and prevent unauthorized recipients from accessing or altering, such    
   information;                                                            
    (B) the term ``generally available'' means--                           
       (i) in the case of software (including software with encryption     
   capabilities), software that is offered for sale, license, or transfer  
   to any person without restriction, whether or not for consideration,    
   including, but not limited to, over-the-counter retail sales, mail order
   transactions, phone order transactions, electronic distribution, or sale
   on approval; and                                                        
       (ii) in the case of hardware with encryption capabilities, hardware 
   that is offered for sale, license, or transfer to any person without    
   restriction, whether or not for consideration, including, but not       
   limited to, over-the-counter retail sales, mail order transactions,     
   phone order transactions, electronic distribution, or sale on approval; 
       (C) the term ``as is'' means, in the case of software (including    
   software with encryption capabilities), a software program that is not  
   designed, developed, or tailored by the software publisher for specific 
   purchasers, except that such purchasers may supply certain installation 
   parameters needed by the software program to function properly with the 
   purchaser's system and may customize the software program by choosing   
   among options contained in the software program;                        
       (D) the term ``is designed for installation by the purchaser''      
   means, in the case of software (including software with encryption      
   capabilities) that--                                                    
       (i) the software publisher intends for the purchaser (including any 
   licensee or transferee), who may not be the actual program user, to     
   install the software program on a computing device and has supplied the 
   necessary instructions to do so, except that the publisher may also     
   provide telephone help line services for software installation,         
   electronic transmission, or basic operations; and                       
       (ii) the software program is designed for installation by the       
   purchaser without further substantial support by the supplier;          
       (E) the term ``computing device'' means a device which incorporates 
   one or more microprocessor-based central processing units that can      
   accept, store, process, or provide output of data; and                  
       (F) the term ``computer hardware'', when used in conjunction with   
   information security, includes, but is not limited to, computer systems,
   equipment, application-specific assemblies, modules, and integrated     
   circuits.                                                               
                                      DISSENTING VIEWS                            
      While well-intentioned, this bill's one-dimensional focus on the     
   decontrol of encryption products would upset the vital balance that U.S.
   policy seeks to strike between the competitiveness of American industry 
   and U.S. national security and law enforcement goals. The bill would    
   prohibit any licensing or review of exports of encrypted software and   
   hardware items. Consequently, its implementation would not only hinder  
   our national security efforts but also undermine the Administration's   
   ability to forge an international consensus on the use and              
   implementation of national key recovery policies.                       
      While SAFE Act advocates correctly point out that the Administration 
   has not yet achieved a multilateral consensus endorsing its preference  
   for a key management infrastructure approach on encryption issues, it   
   should be noted that recent cryptography guidelines adopted by the      
   Organization for Economic Cooperation and Development have stressed the 
   need to balance privacy, law enforcement, national security concerns,   
   and commercial interests. They also underline the fact that failure to  
   coordinate these policies could cripple the global information network  
   and impede international trade.                                         
      A July policy brief published by the Brookings Institution by Kenneth
   Flamm on ``Deciphering the Cryptography Debate'' noted along the same   
   lines that:                                                             
      ``A level playing field, with common global rules of the game, is    
   needed to avoid giving economic rivals competitive advantages over one  
   another. The administration made an important and correct decision in   
   seeking an international consensus on the key recovery approach to      
   strong encryption and must be sure to continue to work hard in seeking  
   this common global approach. While it has yet to achieve such a         
   consensus within the OECD, many of the key players with the technical   
   capability to ship advanced cryptography products and affect global     
   markets--Britain, France and (quietly) Japan--are supporting the U.S.   
   approach, and if a few more (like Germany and Israel) can be brought on 
   board, the critical mass around which the core of an international      
   agreement can be assembled will exist.''                                
      If enacted in its current form, this bill would undermine any        
   prospects for achieving such consensus and would compel a number of the 
   OECD countries to put additional import restrictions in place blocking  
   the entry of our strongest encryption products.                         
      We recognize that the development of strong encryption can play a    
   vital role in the development of electronic commerce and promoting      
   privacy but the development of key recovery policies is essential to    
   head off a potential crisis in the years ahead for our law enforcement  
   authorities. If strong encryption is in widespread use in the near      
   future, it will make it virtually impossible to decipher encrypted      
   communications. Brute force attacks to crack encryption algorithms in   
   that type of environment are not feasible or realistic, especially in   
   the time sensitive cases where law enforcement needs access to encrypted
   files to save lives.                                                    
      By removing all controls on the export of any software and hardware  
   with encryption capabilities, this bill threatens U.S. national security
   and law enforcement interests.                                          
      With respect to U.S. national security, encrypted communications make
   it more difficult for U.S. intelligence agencies to monitor             
   communications relating to terrorism, weapons proliferation, military   
   operations, and other threats to U.S. national security interests. The  
   Administration does not dispute the contention of U.S. software         
   manufacturers that encryption products are in use around the world.     
      But the Administration also points out that these products are not   
   yet being widely used by individuals, groups, and governments whose     
   activities pose threats to U.S. security and safety. As we understand   
   it, the goal of U.S. export control policy is not to prevent the spread 
   of                                                                      
                    encryption worldwide--something which clearly cannot be       
          done--but to slow down the spread of these products enough to give      
          U.S.-led diplomacy an opportunity to achieve increased multilateral     
          cooperation on common export control policies and on the adoption of a  
          global key management infrastructure. Such an international key         
          management infrastructure would enable U.S. intelligence and law        
          enforcement agencies to cooperate with their counterparts in friendly   
          countries in gaining access to communications that threaten common      
          security and safety interests.                                          
      The elimination of all U.S. controls on encryption exports will also 
   jeopardize domestic law enforcement. We recognize that encryption is    
   essential to the fulfillment of the promise of electronic commerce and  
   to the protection of individual privacy in a networked world. But       
   encryption also complicates the mission of U.S. law enforcement         
   agencies, because it can make it impossible for law enforcement         
   personnel to understand data and communications to which they have been 
   granted access under court order or other proper legal authority.       
      This is why current U.S. policy seeks to promote the adoption of key 
   recovery features in encryption products used in the United States.     
   Export controls are a key component of this policy. Under current       
   practice, U.S. firms are permitted to export powerful encryption        
   products if they already include key recovery features or if they pledge
   to develop such features during the next two years. If we eliminate all 
   U.S. export controls, as this bill would do, the federal government will
   therefore lose one of its most important means for promoting the        
   development of key recovery in the U.S. market. That will harm U.S. law 
   enforcement.                                                            
      Lawful wiretapping and duly authorized court-ordered access to       
   information and materials on a timely basis are essential tools for     
   police and law enforcement authorities. If this legislation were to be  
   enacted in its present form, the resultant proliferation of global and  
   interconnected encryption has the very real potential to deny our local,
   state and federal authorities the timely access they now enjoy to data  
   and other communications, even after a court order has been issued.     
      More than one half the annual court-ordered wire taps are at the     
   state and local level, and of the national total for all such wire taps,
   more than 70% are for drug-related cases. Congressional action on this  
   legislation has the potential to affect our cities and towns where the  
   devastating impact of illicit drugs already causes nearly $70 billion in
   annual societal costs. We ought not to add to that carnage and          
   destruction by denying law enforcement one of the most effective tools  
   against this scourge, timely access to lawful requests for information  
   needed to combat these crimes.                                          
      Attorney General Janet Reno, our nation's chief law enforcement      
   officer, urged the members of our Committee to consider the effects of  
   this legislation in her July 18, 1997, letter to the International      
   Relations Committee. She said that ``* * * the misuse of encryption     
   technology will become a matter of life and death in many instances.    
   That is why we urge you to adopt a balanced approach.'' We invite the   
   attention of Members to correspondence from our Nation's law enforcement
   and national security leaders, appended below.                          
      During the full committee's consideration of H. R. 695, Chairman     
   Gilman offered an amendment which would have helped to create this      
   necessary balance in the bill. It would have provided the President the 
   authorities to control the export and reexport of encrypted items if he 
   determines that they would adversely affect our national security and   
   our ability to fight crimes such as drug trafficking, terrorism and     
   espionage. This amendment was, unfortunately, not adopted.              
      Other Committees of the House including National Security,           
   Intelligence and Commerce will now review this legislation through      
   September 5 before it is considered by the full House later this year.  
   We urge our colleagues on these Committees as well as our colleagues on 
   the International Relations and the Judiciary Committees to review this 
   legislation very carefully and consider its impact on our society and   
   our ability to fight terrorism and protect our national security        
   interests.                                                              
    Benjamin A. Gilman.                                                     
    Lee H. Hamilton.                                                        
    Doug Bereuter.                                                          
       Office of the Attorney General,                                         
       Washington, DC, July 18, 1997.                                          
       Dear Member of Congress: Congress is considering a variety of       
   legislative proposals concerning encryption. Some of these proposals    
   would, in effect, make it impossible for the Federal Bureau of          
   Investigation (FBI), Drug Enforcement Administration (DEA), Secret      
   Service, Customs Service, Bureau of Alcohol, Tobacco and Firearms, and  
   other federal, state, and local law enforcement agencies to lawfully    
   gain access to criminal telephone conversations or electronically stored
   evidence possessed by terrorists, child pornographers, drug kingpins,   
   spies and other criminals. Since the impact of these proposals would    
   seriously jeopardize safety and national security, we collectively urge 
   you to support a different, balanced approach that strongly supports    
   commercial and privacy interests but maintains our ability to           
   investigate and prosecute serious crimes.                               
      We fully recognize that encryption is critical to communications     
   security and privacy, and that substantial commercial interests are at  
   stake. Perhaps in recognition of these facts, all the bills being       
   considered allow market forces to shape the development of encryption   
   products. We, too, place substantial reliance on market forces to       
   promote electronic security and privacy, but believe that we cannot rely
   solely on market forces to protect the public safety and national       
   security. Obviously, the government cannot abdicate its solemn          
   responsibility to protect public safety and national security.          
      Currently, of course, encryption is not widely used, and most data is
   stored, and transmitted, in the clear. As we move from a plain text     
   world to an encrypted one, we have a critical choice to make: we can    
   either (1) choose robust, unbreakable encryption that protects commerce 
   and privacy but gives criminals a powerful new weapons, or (2) choose   
   robust, unbreakable encryption that protects commerce and privacy and   
   gives law enforcement the ability to protect public safety. The choice  
   should be obvious and it would be a mistake of historic proportions to  
   do nothing about the dangers to public safety posed by encryption       
   without adequate safeguards for law enforcement.                        
      Let there be no doubt: without encryption safeguards, all Americans  
   will be endangered. No one disputes this fact; not industry, not        
   encryption users, no one. We need to take definitive actions to protect 
   the safety of the public and security of the nation. That is why law    
   enforcement at all levels of government--including the Justice          
   Department, Treasury Department, the National Association of Attorneys  
   General, International Association of Chiefs of Police, the Major City  
   Chiefs, the National Sheriffs' Association, and the National District   
   Attorneys Association--are so concerned about this issue.               
      We all agree that without adequate legislation, law enforcement in   
   the United States will be severely limited in its ability to combat the 
   worst criminals and terrorists. Further, law enforcement agrees that the
   widespread use of robust non-key recovery encryption ultimately will    
   devastate our ability to fight crime and prevent terrorism.             
      Simply stated, technology is rapidly developing to the point where   
   powerful encryption will become commonplace both for routine telephone  
   communications and for stored computer data. Without legislation that   
   accommodates public safety and national security concerns, society's    
   most dangerous criminals will be able to communicate safely and         
   electronically store data without fear of discovery. Court orders to    
   conduct electronic surveillance and court-authorized search warrants    
   will be ineffectual, and the Fourth Amendment's carefully-struck balance
   between ensuring privacy and protecting public safety will be forever   
   altered by technology. Technology should not dictate public policy, and 
   it should promote, rather than defeat, public safety                    
      We are not suggesting the balance of the Fourth Amendment be tipped  
   toward law enforcement either. To the contrary, we only seek the status 
   quo, not the lessening of any legal standard or the expansion of any law
   enforcement authority. The Fourth Amendment protects the privacy and    
   liberties of our citizens but permits law enforcement to use tightly    
   controlled investigative techniques to obtain evidence of crimes. The   
   result has been the freest country in the world with the strongest      
   economy.                                                                
      Law enforcement has already confronted encryption in high-profile    
   espionage, terrorist, and criminal cases. For example:                  
       An international terrorist was plotting to blow up 11 U.S.-owned    
   commercial airliners in the Far East. His laptop computer, which was    
   seized in Manila, contained encrypted files concerning this terrorist   
   plot;                                                                   
       A subject in a child pornography case used encryption in            
   transmitting obscene and pornographic images of children over the       
   Internet; and                                                           
       A major international drug trafficking subject recently used a      
   telephone encryption device to frustrate court-approved electronic      
   surveillance.                                                           
    And this is just the tip of the iceberg. Convicted spy Aldrich Ames,  
  for example, was told by the Russian Intelligence Service to encrypt    
  computer file information that was to be passed to them.                
      Further, today's international drug trafficking organizations are the
   most powerful, ruthless and affluent criminal enterprises we have ever  
   faced. We know from numerous past investigations that they have utilized
   their virtually unlimited wealth to purchase sophisticated electronic   
   equipment to facilitate their illegal activities. This has included     
   state of the art communication and encryption devices. They have used   
   this equipment as part of their command and control process for their   
   international criminal operations. We believe you share our concern that
   criminals will increasingly take advantage of developing technology to  
   further insulate their violent and destructive activities.              
      Requests for cryptographic support pertaining to electronic          
   surveillance interceptions from FBI Field Offices and other law         
   enforcement agencies have steadily risen over the past several years.   
   There has been an increase in the number of instances where the FBI's   
   and DEA's court-authorized electronic efforts were frustrated by the use
   of encryption that did not allow for law enforcement access.            
      There have also been numerous other cases where law enforcement,     
   through the use of electronic surveillance, has not only solved and     
   successfully prosecuted serious crimes but has also been able to prevent
   life-threatening criminal acts. For example, terrorists in New York were
   plotting to bomb the United Nations building, the Lincoln and Holland   
   Tunnels, and 26 Federal Plaza as well as conduct assassinations of      
   political figures. Court-authorized electronic surveillance enabled the 
   FBI to disrupt the plot as explosives were being mixed. Ultimately, the 
   evidence obtained was used to convict the conspirators. In another      
   example, electronic surveillance was used to stop and then convict two  
   men who intended to kidnap, molest, and kill a child. In all of these   
   cases, the use of encryption might have seriously jeopardized public    
   safety and resulted in the loss of life.                                
      To preserve law enforcement's abilities, and to preserve the balance 
   so carefully established by the Constitution, we believe any encryption 
   legislation must accomplish three goals in addition to promoting the    
   widespread use of strong encryption. It must establish:                 
       A viable key management infrastructure that promotes electronic     
   commerce and enjoys the confidence of encryption users;                 
       A key management infrastructure that supports a key recovery scheme 
   that will allow encryption users access to their own data should the    
   need arise, and that will permit law enforcement to obtain lawful access
   to the plain text of encrypted communications and data; and             
       An enforcement mechanism that criminalizes both improper use of     
   encryption key recovery information and the use of encryption for       
   criminal purposes.                                                      
      Only one bill, S. 909 (the McCain/Kerrey/Hollings bill), comes close 
   to meeting these core public safety, law enforcement, and national      
   security needs. The other bills being considered by Congress, as        
   currently written, risk great harm to our ability to enforce the laws   
   and protect our citizens. We look forward to working to improve the     
   McCain/Kerrey/Hollings bill.                                            
      In sum, while encryption is certainly a commercial interest of great 
   importance to this Nation, it is not solely a commercial or business    
   issue. Those of us charged with the protection of public safety and     
   national security, believe that the misuse of encryption technology will
   become a matter of life and death in many instances. That is why we urge
   you to adopt a balanced approach that accomplishes the goals mentioned  
   above. Only this approach will allow police departments, attorneys      
   general, district attorneys, sheriffs, and federal authorities to       
   continue to use their most effective investigative techniques, with     
   court approval, to fight crime and espionage and prevent terrorism.     
   Sincerely your,                                                         
          Janet Reno, Attorney General; Louis Freeh, Director, Federal Bureau
     of Investigation; Thomas A. Constantine, Director, Drug Enforcement     
     Administration; Raymond W. Kelly, Undersecretary for Enforcement, U.S.  
     Department of Treasury; John W. Magaw, Director, Bureau of Alcohol,     
     Tobacco and Firearms; Barry McCaffrey, Director, Office of National Drug
     Control Policy; Lewis C. Merletti, Director, United States Secret       
     Service; George J. Weise, Commissioner, United States Customs Service.  
       The Secretary of Defense,                                               
       Washington, DC, July 21, 1997.                                          
       Dear Member of Congress: Recently you received a letter from the    
   nation's senior law enforcement officials regarding US encryption       
   policies. I am writing today to express my strong support for their     
   views on this important issue.                                          
      As you know, the Department of Defense is involved on a daily basis  
   in countering international terrorism, narcotics trafficking, and the   
   proliferation of weapons of mass destruction. The spread of unbreakable 
   encryption, as a standard feature of mass market communication products,
   presents a significant threat to the ability of the US and its allies to
   monitor the dangerous groups and individuals involved in these          
   activities. Passage of legislation which effectively decontrols         
   commercial encryption exports would undermine U.S. efforts to foster the
   use of strong key recovery encryption domestically and abroad. Key      
   recovery products will preserve governments' abilities to counter       
   worldwide terrorism, narcotics trafficking and proliferation.           
      It is also important to note that the Department of Defense relies on
   the Federal Bureau of Investigation for the apprehension and prosecution
   of spies. Sadly, there have been over 60 espionage convictions of       
   federal employees over the last decade. While these individuals         
   represent a tiny minority of government employees, the impact of        
   espionage activities on our nation's security can be enormous. As the   
   recent arrests of Nicholson, Pitts and Kim clearly indicate, espionage  
   remains a very serious problem. Any policies that detract from the FBI's
   ability to perform its vital counterintelligence function, including the
   ability to perform wiretaps, inevitably detract from the security of the
   Department of Defense and the nation.                                   
      Encryption legislation must also address the nation's domestic       
   information security needs. Today, approximately 95% of DoD             
   communications rely on public networks; other parts of government, and  
   industry, are even more dependent on the trustworthiness of such        
   networks. Clearly, we must ensure that encryption legislation addresses 
   these needs. An approach such as the one contained in S. 909 can go a   
   long way toward balancing the need for strong encryption with the need  
   to preserve national security and public safety. I hope that you will   
   work with the Administration to enact legislation that addresses these  
   national security concerns as well as the rights of the American people.
   I appreciate your consideration of these views.                         
   Sincerely,                                                              
         Bill Cohen.                                                            
       International Association of Chiefs of Police,                          
       Alexandria, VA, July 21, 1997.                                          
       Dear Member of Congress: Enclosed is a letter sent to you by the    
   Attorney General, the Director of National Drug Control Policy and all  
   the federal law enforcement heads concerning encryption legislation     
   being considered by congress. Collectively we, the undersigned,         
   represent over 17,000 police departments including every major city     
   police department, over 3,000 sheriffs departments, nearly every        
   district attorney in the United States and all of the state Attorneys   
   General. We fully endorse the position taken by our federal counterparts
   in the enclosed letter. As we have stated many times, Congress must     
   adopt a balanced approach to encryption that fully addresses public     
   safety concerns or the ability of state and local law enforcement to    
   fight crime and drugs will be severely damaged.                         
      Any encryption legislation that does not ensure that law enforcement 
   can gain timely access to the plaintext of encrypted conversations and  
   information by established legal procedures will cause grave harm to    
   public safety. The risk cannot be left to the uncertainty of market     
   forces or commercial interests as the current legislative proposals     
   would require. Without adequate safeguards, the unbridled use of        
   powerful encryption soon will deprive law enforcement of two of its most
   effective tools, court authorized electronic surveillance and the search
   and seizure of information stored in computers. This will substantially 
   tip the balance in the fight against crime towards society's most       
   dangerous criminals as the information age develops.                    
      We are in unanimous agreement that congress must adopt encryption    
   legislation that requires the development, manufacture, distribution and
   sale of only key recovery products and we are opposed to the bills that 
   do not do so. Only the key recovery approach will ensure that law       
   enforcement can continue to gain timely access to the plaintext of      
   encrypted conversations and other evidence of crimes when authorized by 
   a court to do so. If we lose this ability--and the bills you are        
   considering will have this result--it will be a substantial set back for
   law enforcement at the direct expense of public safety.                 
   Sincerely yours,                                                        
    Darrell L. Sanders,                                                     
      President, International Association of Chiefs of Police.              
    James E. Doyle,                                                         
      President, National Association of Attorneys General.                  
    Fred Scoralic,                                                          
      President, National Sheriffs' Association.                             
    William L. Murphy,                                                      
      President, National District Attorneys Association.                    
                                                                        



NEWSLETTER
Join the GlobalSecurity.org mailing list