UNITED24 - Make a charitable donation in support of Ukraine!

Intelligence


Congressional Documents

                                     43 310                                 
                                       1997                                  
                          105 th Congress  1st Session                      
                            HOUSE OF REPRESENTATIVES                        
                                  Rept.  105 108                             
                                       Part 3                                 
                                                                         
                       SECURITY AND FREEDOM THROUGH                      
                      ENCRYPTION (SAFE) ACT OF 1997                      
                               R E P O R T                               
                                  OF THE                                 
                      COMMITTEE ON NATIONAL SECURITY                     
                         HOUSE OF REPRESENTATIVES                        
                                    ON                                   
                                 H.R. 695                                
                              together with                              
                    ADDITIONAL AND SUPPLEMENTAL VIEWS                    
       [Including cost estimate of the Congressional Budget Office]      
[Graphic Image Not Available]
                September  12, 1997.--Ordered to be printed              
                            HOUSE COMMITTEE ON NATIONAL SECURITY                  
                                 ONE HUNDRED FIFTH CONGRESS                       
                      FLOYD D. SPENCE, South Carolina,  Chairman               
          BOB STUMP, Arizona                                    RONALD V. DELLUMS, California
          DUNCAN HUNTER, California                             IKE SKELTON, Missouri
          JOHN R. KASICH, Ohio                                  NORMAN SISISKY, Virginia
          HERBERT H. BATEMAN, Virginia                           JOHN M. SPRATT, Jr.,  South Carolina
          JAMES V. HANSEN, Utah                                 SOLOMON P. ORTIZ, Texas
          CURT WELDON, Pennsylvania                             OWEN PICKETT, Virginia
          JOEL HEFLEY, Colorado                                 LANE EVANS, Illinois
          JIM SAXTON, New Jersey                                GENE TAYLOR, Mississippi
          STEVE BUYER, Indiana                                  NEIL ABERCROMBIE, Hawaii
          TILLIE K. FOWLER, Florida                             MARTIN T. MEEHAN, Massachusetts
           JOHN M. McHUGH,  New York                            ROBERT A. UNDERWOOD, Guam
          JAMES TALENT, Missouri                                JANE HARMAN, California
          TERRY EVERETT, Alabama                                 PAUL McHALE,  Pennsylvania
          ROSCOE G. BARTLETT, Maryland                          PATRICK J. KENNEDY, Rhode Island
           HOWARD ``BUCK'' McKEON,  California                  ROD R. BLAGOJEVICH,  Illinois
          RON LEWIS, Kentucky                                   SILVESTRE REYES,  Texas
           J.C. WATTS, Jr.,  Oklahoma                           TOM ALLEN,  Maine
          MAC THORNBERRY, Texas                                 VIC SNYDER,  Arkansas
          JOHN N. HOSTETTLER, Indiana                           JIM TURNER,  Texas
          SAXBY CHAMBLISS, Georgia                               F. ALLEN BOYD, Jr.,  Florida
          VAN HILLEARY, Tennessee                               ADAM SMITH,  Washington
          JOE SCARBOROUGH, Florida                              LORETTA SANCHEZ,  California
           WALTER B. JONES, Jr.,  North Carolina                JAMES H. MALONEY,  Connecticut
          LINDSEY GRAHAM,  South Carolina                        MIKE McINTYRE,  North Carolina
          SONNY BONO,  California                               CIRO D. RODRIGUEZ,  Texas
          JIM RYUN,  Kansas                                      CYNTHIA A. McKINNEY,  Georgia
          MICHAEL PAPPAS,  New Jersey                           
          BOB RILEY,  Alabama                                   
          JIM GIBBONS,  Nevada                                  
          BILL REDMOND,  New Mexico                             
        Andrew K. Ellis,  Staff Director                                       
                                            (II)                                  
                            C O N T E N T S                             
      Legislative History                                                     
        6                                                                       
      Section-by-Section Analysis                                             
        6                                                                       
        Section 1--Short Title                                                  
        6                                                                       
        Section 2--Sale and Use of Encryption                                   
        6                                                                       
        Section 3--Exports of Encryption                                        
        7                                                                       
      Committee Position                                                      
        7                                                                       
      Fiscal Data                                                             
        7                                                                       
        Congressional Budget Office Estimate                                    
        7                                                                       
        Congressional Budget Office Cost Estimate                               
        8                                                                       
        Committee Cost Estimate                                                 
        10                                                                      
        Inflation Impact Statement                                              
        10                                                                      
      Oversight Findings                                                      
        10                                                                      
      Constitutional Authority Statement                                      
        10                                                                      
      Statement of Federal Mandates                                           
        10                                                                      
      Roll Call Vote                                                          
        11                                                                      
      Changes in Existing Law Made by the Bill, as Reported                   
        13                                                                      
      Additional views of Patrick J. Kennedy                                  
        14                                                                      
      Supplemental views of Jane Harman                                       
        16                                                                      
      Supplemental views of Loretta Sanchez                                   
        18                                                                      
                                           (III)                                  
105 th Congress                                                         
 Rept.  105 108                                                         
                                                                             
HOUSE OF REPRESENTATIVES                                                
 1st Session                                                            
Part 3                                                                  
       SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT OF 1997              
  September  12, 1997.--Ordered to be printed                            
  Mr. Spence, from the Committee on National Security, submitted the     
 following                                                               
 R E P O R T                                                             
 together with                                                           
 ADDITIONAL AND SUPPLEMENTAL VIEWS                                       
 [To accompany H.R. 695]                                                 
 [Including cost estimate of the Congressional Budget Office]            
     The Committee on National Security, to whom was referred the bill    
  (H.R. 695) to amend title 18, United States Code, to affirm the rights  
  of United States persons to use and sell encryption and to relax export 
  controls on encryption, having considered the same, report favorably    
  thereon with amendments and recommend that the bill as amended do pass. 
   The amendments are as follows:                                         
   Strike section 3 and insert the following:                             
           SEC. 3. EXPORTS OF ENCRYPTION.                                         
     (a) Export Control of Encryption Products Not Controlled on the      
  United States Munitions List.--The Secretary of Commerce, with the      
  concurrence of the Secretary of Defense, shall have the authority to    
  control the export of encryption products not controlled on the United  
  States Munitions List. Decisions made by the Secretary of Commerce with 
  the concurrence of the Secretary of Defense with respect to exports of  
  encryption products under this section shall not be subject to judicial 
  review.                                                                 
     (b) License Exception For Certain Encryption Products.--Encryption   
  products with encryption strength equal to or less than the level       
  identified in subsection (d) shall be eligible for export under a       
  license exception after a 1-time review, if the encryption product being
  exported does not include features that would otherwise require         
  licensing under applicable regulations, is not destined for countries,  
  end-users, or end-uses that the Secretary of Commerce has determined by 
  regulation, with the concurrence of the Secretary of Defense, are       
  ineligible to receive such products, and is otherwise qualified for     
  export.                                                                 
     (c) One-Time Product Review.--The Secretary of Commerce, with the    
  concurrence of the Secretary of Defense, shall specify the information  
  that must be submitted for the 1-time review referred to in subsection  
  (b).                                                                    
   (d)  Eligible Encryption Levels.--                                     
       (1) Initial eligibility level.--Not later than 30 days after the    
   date of the enactment of this Act, the President shall notify the       
   Congress of the maximum level of encryption strength that could be      
   exported from the United States under license exception pursuant to this
   section without harm to the national security of the United States. Such
   level shall not become effective until 60 days after such notification. 
       (2) Annual review of eligibility level.--Not later than 1 year after
   notifying the Congress of the maximum level of encryption strength under
   paragraph (1), and annually thereafter, the President shall notify the  
   Congress of the maximum level of encryption strength that could be      
   exported from the United States under license exception pursuant to this
   section without harm to the national security of the United States. Such
   level shall not become effective until 60 days after such notification. 
       (3) Calculation of 60-day period.--The 60-day period referred to in 
   paragraphs (1) and (2) shall be computed by excluding--                 
       (A) the days on which either House is not in session because of an  
   adjournment of more than 3 days to a day certain or an adjournment of   
   the Congress sine die; and                                              
       (B) each Saturday and Sunday, not excluded under subparagraph (A),  
   when either House is not in session.                                    
     (e) Excercise of Existing Authorities.--The Secretary of Commerce and
  the Secretary of Defense may exercise the authorities they have under   
  other provisions of law to carry out this section.                      
   Amend the title so as to read:                                         
  A bill to amend title 18, United States Code, to affirm the rights of  
 United States persons to use and sell encryption.                       
                                   PURPOSE AND BACKGROUND                         
      The explosive growth of the internet and the rise in electronic      
   commerce in recent years have led to increased concerns over information
   security. A growing number of individuals and businesses now have access
   to the information superhighway and the capability to transmit volumes  
   of personal and proprietary data from one user to another nearly        
   instantaneously. As technology advances, the risk that the secure       
   transmission of this information may be compromised by computer         
   ``hackers'' is increasing. Industry has responded to this risk by       
   developing products with greater encryption capabilities.               
      Encryption is a means of scrambling or encoding electronic data so   
   that its contents are protected from unauthorized interception or       
   disclosure. Many software application programs already feature          
   encryption capabilities to afford users a degree of privacy and security
   when conducting electronic transactions. For example, Netscape          
   Communications Corporation's world wide web browser can transmit        
   information in a secure, encrypted mode that allows individuals to order
   products and services by credit card over the internet with a reasonable
   expectation that the personal information they send will be protected.  
      Currently, the domestic use of encryption products is unrestricted.  
   When used by law-abiding citizens and companies, encryption can increase
   public confidence in the security of electronic transactions. However,  
   the export of encryption capabilities is controlled for important       
   national security and foreign policy reasons. In the hands of terrorists
   or criminals, the capability to scramble communications or encode       
   information may hinder efforts to thwart planned terrorist acts or      
   apprehend international drug smugglers. Moreover, much of the U.S.      
   military's battlefield advantage relies on information dominance and the
   ability to decipher enemy communications. Unrestricted export of        
   capabilities that make it more difficult for the United States to       
   comprehend the plans and activities of hostile military forces could    
   significantly degrade the technological advantage presently held by U.S.
   combat forces.                                                          
      In particular, the committee notes that the U.S. military has made   
   information warfare a key element of U.S. military strategy and tactics.
   U.S. strategy requires that the United States be able to protect its own
   communications from interception while exploiting the weaknesses in the 
   information systems and communications of potential adversaries. The    
   National Defense University Institute for National Strategic Studies has
   identified seven areas of information warfare that could play decisive  
   roles in combat, including electronic warfare, cyber warfare, command   
   and control warfare, intelligence-based warfare, and so-called          
   ``hacker'' warfare. The Institute's 1996 Strategic Assessment study     
   noted the growing importance of information warfare and the desirability
   for U.S. exploitation of a potential adversary's vulnerabilities. The   
   study declared that ``if the United States could override an enemy's    
   military computers, it might achieve an advantage comparable to         
   neutralizing the enemy's command apparatus.'' In addition, it noted the 
   value of attacking an adversary's commercial computer systems, i.e.,    
   banking, power, telecommunications, and safety systems. The ability to  
   ``wreak havoc'' on these systems, the study noted, ``would be a powerful
   new instrument of power,'' potentially leading to the prompt termination
   of conflict and a reduction in civilian and military casualties.        
   However, the committee is concerned that the proliferation of           
   sophisticated encryption capabilities overseas may make it more         
   difficult for the United States to maintain its military superiority and
   achieve tactical battlefield advantages.                                
      Because of national security implications, the United States has     
   traditionally considered encryption products to be sensitive            
   ``munitions'' items and their export has been carefully controlled by   
   the Department of State. However, in October 1996, the Clinton          
   Administration decided to transfer jurisdiction over the export of      
   commercial encryption products from the Department of State to the      
   Department of Commerce, which is responsible for export controls on     
   ``dual use'' items with military and civilian application. In addition, 
   the Administration agreed to allow the export of encryption products    
   with keys of up to 56 bits in length, beginning in January 1997,        
   provided that the exporting companies develop a ``key recovery'' plan   
   over the next two years that would allow access to the keys by          
   government law-enforcement agents or intelligence officials, if         
   necessary, in order to decode scrambled information.                    
      The capabilities and security of encryption products generally depend
   on the length of the encryption algorithm or electronic ``key'' required
   to decrypt the data, as measured by the number of data ``bits'' in the  
   key. Generally speaking, the longer the key (or number of key bits) the 
   more secure the encryption program and the more difficult it is to      
   ``break the code.'' Prior to this decision, U.S. policy allowed the     
   unrestricted export of encryption software with keys up to 40 bits in   
   length.                                                                 
      In announcing this liberalized export control policy, Vice President 
   Gore stated that it would ``support the growth of electronic commerce,  
   increase the security of the global information (sic.), and sustain the 
   economic competitiveness of U.S. encryption product manufacturers. * *  
   *'' However, an Administration talking points paper on the decision     
   noted that ``this export liberalization poses risks to public safety and
   national security. The Administration is willing to tolerate that risk, 
   for a limited period, in order to accelerate the development of a global
   key management infrastructure.'' In addition, in a letter to Congress in
   November 1996, President Clinton acknowledged that ``the export of      
   encryption products transferred to Department of Commerce control could 
   harm national security and foreign policy interests of the United States
   even where comparable products are or appear to be available from       
   foreign sources.''                                                      
      As received by the committee, H.R. 695 and companion legislation in  
   the Senate represent a further attempt to significantly liberalize U.S. 
   encryption policy. In particular, H.R. 695, as introduced, would have   
   the following effect on encryption export controls:                     
       (1) It would grant the Commerce Department exclusive authority to   
   control exports of all hardware, software, and technology for           
   information security, except that designed for military use, depriving  
   the Secretary of Defense of an appropriate level of involvement on      
   licensing decisions involving national security;                        
       (2) It would prohibit requiring a government-validated license for  
   the export or re-export of commercially-available encryption-capable    
   software or computers using such software; and                          
       (3) It would direct the Secretary of Commerce to allow the export or
   re-export of encryption-capable software for non-military end-uses in   
   any country, or computers using such software based on considerations of
   foreign availability.                                                   
      Importantly, the committee notes that section 3 of H.R. 695 would    
   require the government to approve exports of high performance computers 
   (so-called ``supercomputers'') if those computers contain encryption    
   products or software that are commercially available. In the committee's
   view, this is one of the most serious consequences and flaws of the     
   bill. Under this proposed arrangement, any company would be in a        
   position to force the government to allow the export of even the most   
   powerful supercomputer available in the United States, if they first    
   loaded a piece of foreign-available encryption software on the          
   supercomputer. As confirmed by Secretary Reinsch in his testimony before
   the committee, this provision would overturn the Spence-Dellums         
   amendment to H.R. 1119, the National Defense Authorization Act for      
   Fiscal Year 1997, adopted by the House on June 19, 1997, by a vote of   
   332 88. That amendment would prevent the inadvertent export of          
   supercomputers to questionable end users in countries of proliferation  
   concern.                                                                
      The committee believes that the provisions of H.R. 695, as           
   introduced, in particular those provisions regarding export controls on 
   encryption products, do not adequately address these significant        
   national security concerns. In testimony before the committee on July   
   30, 1997, Under Secretary of Commerce for Export Administration William 
   Reinsch stated that H.R. 695 ``proposes export liberalization far beyond
   what the administration can entertain and which we believe would be     
   contrary to our international export control obligations and detrimental
   to our national security.'' With respect to the bill's national security
   implications, William Crowell, Deputy Director of the National Security 
   Agency (NSA), testified that ``the passage of H.R. 695 would negatively 
   impact NSA's missions. * * * the immediate decontrol of strong          
   encryption products without restriction would make our signals          
   intelligence mission much more difficult and ultimately result in the   
   loss of intelligence. * * * This would greatly complicate our           
   exploitation of foreign targets, including military targets.'' Mr.      
   Crowell concluded that H.R. 695 ``will do irreparable harm to national  
   security. * * *''                                                       
      The Administration also has criticized H.R. 695 on broader grounds.  
   For example, the Federal Bureau of Investigation has declared that ``it 
   would be irresponsible for the U.S. to adopt a policy that consciously  
   unleashes widespread, unbreakable, non-key recovery encryption products 
   that undermine law enforcement in the United States and worldwide.''    
   According to the Department of Defense, H.R. 695 would ``have a negative
   impact on national security, effective law enforcement and public       
   safety.'' The Director of the National Security Agency, Lieutenant      
   General Kenneth A. Minihan, has noted that the United States obtains ``a
   substantial amount of significant intelligence information from         
   unencrypted sources'' and that this information is ``likely to become   
   encrypted with the relaxation of crypto export controls.'' In a recent  
   letter to Chairman Spence and Ranking Member Dellums, Secretary of      
   Defense Cohen stated, ``Passage of legislation which effectively        
   decontrols commercial encryption exports would undermine U.S. efforts'' 
   to foster a key recovery infrastructure that will ``preserve            
   governments' abilities to counter worldwide terrorism, narcotics        
   trafficking and proliferation.''                                        
      In response to these concerns, the committee agreed to amend section 
   3 of H.R. 695, the section of the bill dealing with export controls.    
   Given the committee's jurisdictional focus on national security, the    
   committee exclusively limited its actions to this section of the bill   
   and did not address the effects of H.R. 695 on domestic law enforcement 
   capabilities. The committee amendment to section 3 would allow the      
   President, subject to 60 day congressional review, to determine the     
   maximum level of encryption strength that may be exported without a     
   license. Unlicensed export of these products could occur after a        
   one-time review. Products above the threshold could be exported under an
   individually validated license, and the committee's amendment ensures   
   that the concurrence of the Secretary of Defense is obtained prior to   
   the export of such more sophisticated encryption software. The amendment
   also ensures that the appropriateness of the threshold level would be   
   reviewed on an annual basis.                                            
                                    LEGISLATIVE HISTORY                           
      H.R. 695, the ``Security and Freedom through Encryption (SAFE) Act of
   1997,'' was introduced by Representative Robert Goodlatte (R VA) on     
   February 12, 1997. The bill was reported in May 1997 by the House       
   Committee on the Judiciary. The bill was also referred to the Committee 
   on International Relations, the Committee on Commerce, the Permanent    
   Select Committee on Intelligence, and the Committee on National         
   Security. On July 22, 1997, the House International Relations Committee 
   approved the bill with minor amendments.                                
      On July 30, 1997, the Committee on National Security held a hearing  
   on H.R. 695. Testimony was taken from representatives of the Department 
   of Defense, Department of Commerce, and industry witnesses. The focus of
   the hearing was to assess the bill's impact on U.S. national security.  
      On September 9, 1997, the committee held a mark-up session to        
   consider H.R. 695. The committee adopted one amendment to the bill      
   dealing with Section 3 on export controls by a rollcall vote of 45 to 1.
   The amended version of the bill was reported favorably by a voice vote. 
   The individual rollcall result is placed at the end of this report.     
                                SECTION-BY-SECTION ANALYSIS                       
                          Section 1--Short Title                         
      This section would establish a short title of the bill as the        
   ``Security and Freedom Through Encryption (SAFE) Act.''                 
                  Section 2--Sale and Use of Encryption                  
      This section would amend Part I of title 18, United States Code by   
   adding a new chapter on ``Encrypted Wire and Electronic Communications''
   consisting of five sections. This new chapter would define encryption   
   and related terms, legalize the use of any encryption method by U.S.    
   citizens domestically or abroad, and legalize the interstate sale by    
   U.S. citizens of any encryption, regardless of algorithm or key length. 
   The new chapter would also deny any person the right to control a key   
   that is in the lawful possession of another person, except for law      
   enforcement purposes, thereby nullifying the                            
                    government's key escrow plan. Finally, the new chapter would  
          establish penalties for the unlawful use of encryption in furtherance of
          a criminal act.                                                         
                     Section 3--Exports of Encryption                    
      As amended, this section would grant the Secretary of Commerce       
   authority, with the concurrence of the Secretary of Defense, to control 
   exports of encryption technology that is not controlled on the U.S.     
   Munitions List. The section also would allow for a license exception for
   the export of encryption products with a strength at or below the       
   maximum threshold established by the President. Export of these products
   would only occur after a one-time government review. The export of      
   encryption products with a strength above the threshold determined by   
   the President would be allowed subject to existing regulations and      
   procedures. The amendment would not impact the current ability of       
   financial institutions to export encryption products above the threshold
   without limitation, for use exclusively for banking and financial       
   transactions. This section would also direct the President to notify    
   Congress on an annual basis of the appropriate threshold for the        
   strength of encryption products that may be exported without harm to    
   U.S. national security. Current civil and criminal penalties for        
   violation of U.S. export control restrictions would continue to apply,  
   and would cover the procedures established in the committee's amendment.
                                     COMMITTEE POSITION                           
      On September 9, 1997, the Committee on National Security, a quorum   
   being present, approved H.R. 695, as amended, by a voice vote.          
                                        FISCAL DATA                               
      Pursuant to clause 7 of rule XIII of the Rules of the House of       
   Representatives, the committee attempted to ascertain annual outlays    
   resulting from the bill during fiscal year 1998 and the four following  
   fiscal years. The results of such efforts are reflected in the cost     
   estimate prepared by the Director of the Congressional Budget Office    
   under section 403 of the Congressional Budget Act of 1974, which is     
   included in this report pursuant to clause 2(l)(3)(C) of House rule XI. 
                            CONGRESSIONAL BUDGET OFFICE ESTIMATE                  
      In compliance with clause 2(l)(3)(C) of rule XI of the Rules of the  
   House of Representatives, the cost estimate prepared by the             
   Congressional Budget Office and submitted pursuant to section 403(a) of 
   the Congressional Budget Act of 1974 is as follows:                     
        September  11, 1997.                                                   
          Hon.  Floyd Spence,            Chairman, Committee on National Security,
       House of Representatives, Washington, DC.                               
       Dear Mr. Chairman: The Congressional Budget Office has prepared the 
   enclosed cost estimate for H.R. 695, the Security and Freedom Through   
   Encryption (SAFE) Act.                                                  
      If you wish further details on this estimate, we will be pleased to  
   provide them. The CBO staff contacts are Rachel Forward (for federal    
   costs); Alyssa Trzeszkowski (for revenues); and Pepper Santalucia (for  
   the state and local impact).                                            
   Sincerely,                                                              
         June E. O'Neill,  Director.                                            
                CONGRESSIONAL BUDGET COST OFFICE ESTIMATE                
      Summary: H.R. 695 would allow individuals in the United States to use
   or sell any encryption product and would prohibit states or the federal 
   government from requiring individuals to relinquish the key to          
   encryption technologies to any third party. The bill also would         
   authorize the President to determine which encryption products could be 
   granted an export license exception and thus could be exported following
   a one-time product review by the Department of Commerce's Bureau of     
   Export Administration (BXA). Other encryption products would be subject 
   to more stringent export controls imposed by the Secretary of Commerce  
   with the concurrence of the Secretary of Defense. H.R. 695 would        
   establish criminal penalties and fines for the use of encryption        
   technologies to conceal from law enforcement officials incriminating    
   information relating to a crime.                                        
      CBO estimates that implementing this bill would not add to BXA's     
   costs of reviewing encryption products intended for export. Both under  
   current policies and under the provisions of H.R. 695, CBO estimates    
   that spending by BXA for reviewing the export of nonmilitary encryption 
   products would total about $4.5 million over the 1998 2000 period.      
      The bill would affect direct spending and receipts beginning in      
   fiscal year 1998 through the imposition of criminal fines and the       
   resulting spending from the Crime Victims Fund. Therefore, pay-as-you-go
   procedures would apply. CBO estimates, however, that the amounts of     
   additional direct spending and receipts would not be significant.       
      H.R. 695 contains no private-sector mandates as defined in the       
   Unfunded Mandates Reform Act of 1995 (UMRA), but it contains an         
   intergovernmental mandate on state governments. CBO estimates that      
   states would not incur any costs to comply with the mandate.            
           Estimated cost to the Federal Government                                
      In November 1996, the Administration issued an executive order and   
   memorandum that authorized the export of encryption products up to 56   
   bits in length following a one-time product review by BXA, contingent on
   the exporter's commitment to develop a key recovery system. H.R. 695    
   would maintain the President's discretion to determine which encryption 
   products could be exported following a one-time review by BXA and which 
   products would be subject to more stringent export controls by the      
                    agency. Based on information from BXA, CBO expects that the   
          President would not modify the current policy of allowing license       
          exceptions for encryption products of up to 56 bits in length. Thus,    
          enacting this bill would not significantly change the scope of BXA's    
          activities. Assuming appropriation of the necessary amounts, CBO        
          estimates that implementing H.R. 695 would result in costs to BXA of    
          about $900,000 in each fiscal year, totaling about $4.5 million over the
          1998 2002 period, about the same as would be expected under current law.
          BXA was authorized to spend $850,000 in fiscal year 1997 to control     
          encryption exports.                                                     
      Enacting H.R. 695 would affect direct spending and receipts through  
   the imposition of criminal fines for encrypting incriminating           
   information related to a felony. CBO estimates that collections from    
   such fines are likely to be negligible, however, because the federal    
   government would probably not pursue many cases under the bill. Any such
   collections would be recorded in the budget as governmental receipts, or
   revenues. They would be deposited in the Crime Victims Fund and spent   
   the following year. Because the increase in direct spending would be the
   same as the amount of fines collected with a one-year lag, the          
   additional direct spending also would be negligible.                    
      The costs of this legislation fall within budget functions 370       
   (commerce and housing credit) and 750 (administration of justice).      
           Pay-as-you-go considerations                                            
      Section 252 of the Balanced Budget and Emergency Deficit Control Act 
   of 1985 sets up pay-as-you-go procedures for legislation affecting      
   direct spending or receipts. H.R. 695 would affect direct spending and  
   receipts through the imposition of criminal fines and the resulting     
   spending from the Crime Victims Fund. CBO estimates, however, that any  
   collections and spending resulting from such fines would not be         
   significant.                                                            
           Estimated impact on state, local, and tribal governments                
      H.R. 695 would prohibit states from requiring persons to make        
   encryption keys available to another person or entity. This prohibition 
   would be an intergovernmental mandate as defined in UMRA. However,      
   states would bear no costs as the result of the mandate because none    
   currently require the registration or availability of such keys.        
           Estimated impact on the private sector                                  
   The bill would impose no new private-sector mandates as defined in UMRA.
           Previous CBO estimate                                                   
      CBO provided cost estimates for H.R. 695 as ordered reported by the  
   House Committee on the Judiciary on May 14, 1997, and as ordered        
   reported by the House Committee on International Relations on July 22,  
   1997. Assuming appropriation of the necessary amounts, CBO estimates    
   that implementing the Judiciary Committee's version of the bill would   
   cost between $5 million and $7 million over the 1998 2002 period and    
   that implementing the International Relations Committee's version would 
   cost about $2.2 million over the same period. The estimated cost under  
   current policies and for the National Security Committee's version is   
   $4.5 million.                                                           
      Estimate prepared by: Federal Costs: Rachel Forward, Revenues: Alyssa
   Trzeszkowski, Impact on State, Local, and Tribal Governments: Pepper    
   Santalucia.                                                             
      Estimate approved by: Robert A. Sunshine, Deputy Assistant Director  
   for Budget Analysis.                                                    
                                  COMMITTEE COST ESTIMATE                         
      Pursuant to Clause 7(a) of rule XIII of the Rules of the House of    
   Representatives, the committee generally concurs with the estimate      
   contained in the report of the Congressional Budget Office.             
                                 INFLATION IMPACT STATEMENT                       
      Pursuant to clause 2(l)(4) of rule XI of the Rules of the House of   
   Representatives, the committee concludes that the bill would have no    
   significant inflationary impact.                                        
                                     OVERSIGHT FINDINGS                           
      With respect to clause 2(l)(3)(A) of rule XI of the Rules of the     
   House of Representatives, this legislation results from hearings and    
   other oversight activities conducted by the committee pursuant to clause
   2(b)(1) of rule X.                                                      
      With respect to clause 2(l)(3)(B) of rule XI of the Rules of the     
   House of Representatives and section 308(a)(1) of the Congressional     
   Budget Act of 1974, this legislation does not include any new spending  
   or credit authority, nor does it provide for any increase or decrease in
   tax revenues or expenditures. The fiscal features of this legislation   
   are addressed in the estimate prepared by the Director of the           
   Congressional Budget Office under section 403 of the Congressional      
   Budget Act of 1974.                                                     
      With respect to clause 2(l)(3)(D) of rule XI of the Rules of the     
   House of Representatives, the committee has not received a report from  
   the Committee on Government Reform and Oversight pertaining to the      
   subject matter of H.R. 695.                                             
                             CONSTITUTIONAL AUTHORITY STATEMENT                   
      Pursuant to clause 2(l)(4) of rule XI of the Rules of the House of   
   Representatives, the committee finds the authority for this legislation 
   in Article I, section 8 of the United States Constitution.              
                               STATEMENT OF FEDERAL MANDATES                      
      Pursuant to section 423 of Public Law 104 4, this legislation        
   contains no federal mandates with respect to state, local, and tribal   
   governments, nor with respect to the private sector. Similarly, the bill
   provides no unfunded federal intergovernmental mandates.                
                                       ROLLCALL VOTE                              
      In accordance with clause 2(l)(2)(B) of rule XI of the Rules of the  
   House of Representatives, a rollcall vote was taken with respect to the 
   committee's consideration of H.R. 695. The record of this vote is       
   attached to this report.                                                
      The committee ordered H.R. 695, as amended, reported to the House    
   with a favorable recommendation by a voice vote, a quorum being present.
   Offset Folio 15 Inserts Here                                            
                   CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED          
      The bill was referred to this committee for consideration of such    
   provisions of the bill as fall within the jurisdiction of this committee
   pursuant to clause 1(k) of rule X of the Rules of the House of          
   Representatives. The changes made to existing law by the amendment      
   reported by the Committee on the Judiciary are shown in the report filed
   by that committee (Rept. 105 108, Part 1). The amendments made by this  
   committee do not make any changes in existing law.                      
                     ADDITIONAL VIEWS OF CONGRESSMAN PATRICK J. KENNEDY           
      Mr. Chairman, as a member of the House National Security Committee   
   for almost three years, I have voted in favor of research and           
   development of advanced technology, I have supported procurement of     
   state of the art weapons systems and I have advocated greater funding   
   for training and educating our armed forces. I am proud of the role our 
   committee plays in working to ensure our men and women in uniform are   
   properly equipped to meet the many challenges and missions our nation   
   asks of them. After having received a classified briefing by the        
   National Security Agency, I now believe that if we support H.R. 695, the
   ``Security and Freedom through Encryption Act'', as introduced, we would
   effectively nullify the many important national security investments    
   made by this committee.                                                 
      Let me be clear, I support providing American businesses the         
   opportunity to be competitive in the export of encryption products but I
   also understand the importance of limited export controls to the        
   intelligence community and to our country's national security. Our      
   national security and our economic interests should not be interpreted  
   as mutually exclusive. I am convinced that any legislation we pass must 
   strike a balance between our national security concerns and our economic
   interests. Unfortunately, H.R. 695, as introduced, fails to strike this 
   balance. Rather than providing a means to assess the impact of          
   encryption exports on our national security, this bill opens the        
   floodgates and threatens to overwhelm our intelligence infrastructure.  
      I do believe that if we make modifications to H.R. 695, it is        
   entirely possible to address some of the more important security and    
   economic concerns The amendment offered today by Mr. Weldon and Mr.     
   Dellums provides us that chance. The Weldon-Dellums amendment does not  
   prevent or stop the export of encryption products. Rather than the      
   immediate decontrol of strong encryption products which would come with 
   H.R. 695, the amendment proposes responsible limits for the export of   
   encryption technology, limits which are in part determined by a         
   product's threat to national security.                                  
      The limits are necessary given the fact that today, a significant    
   portion of the intelligence we collect is not encrypted. That           
   information we glean is vital to threat warning, attack assessment and  
   gaining tactical/information supremacy. Should our adversaries suddenly 
   have access to strong encryption products, our intelligence community   
   would be hampered and severely overwhelmed. Instantly we would put in   
   jeopardy our ability to decode and decipher information from the        
   predominant threats our country faces today: terrorist organizations,   
   rogue nations and drug traffickers.                                     
      It is important to keep in mind that the limits included in the      
   amendment are not permanent. The Administration would be forced to      
   re-evaluate threshold levels every year in order to keep pace with      
   technology. The Congress would then have the opportunity to review the  
   appropriateness of the level and enact legislation to respond should it 
   so choose. By ensuring that the threshold is reviewed on an annual      
   basis, a process is created whereby we can assess the impact of the     
   exports on our intelligence gathering and assessment capabilities while 
   also providing a mechanism to alter the limits when conditions permit.  
      Both Mr. Weldon and Mr. Dellums should be commended for their hard   
   work in crafting a bipartisan amendment to H.R. 695, an amendment which 
   seeks to find that delicate balance between our national security       
   requirements and ensuring our companies are provided the opportunity to 
   compete.                                                                
         Patrick J. Kennedy.                                                    
                           SUPPLEMENTAL VIEWS OF HON. JANE HARMAN                 
      The debate over H.R. 695 and encryption has shed invaluable light on 
   the difficult choices policy makers have to make in fashioning a policy 
   where national security concerns and U.S. international competitiveness 
   come into direct conflict. To be sure, our nation's security must be    
   preeminent, and I don't doubt from the committee's hearings on the bill 
   and from my conversations that the individuals and the companies which  
   comprise the computer software industry designing encryption agree with 
   this assessment.                                                        
      At the same time, policy makers cannot let security concerns unduly  
   restrict the ability of a vibrant and growing segment of our economy to 
   compete on international markets--markets which they currently and      
   rightly dominate. In our zeal to protect technologies which have defense
   and law enforcement implications, we should not adopt policies that     
   stifle our own domestic enterprises and hand the lead to foreign        
   entities beyond our own laws.                                           
      How we balance these competing goals, albeit not equally so, is the  
   objective of the amendment offered by my colleagues, Mr. Weldon and Mr. 
   Dellums, which the committee approved as a substitute to the original   
   title 3 of H.R. 695. I support their objective, but am not persuaded    
   that a revision in our export control policy is the best means of       
   achieving it. In voting for the substitute amendment during the         
   committee's mark-up, I outlined some reservations and would like at this
   time to offer some suggestions that would in my view, improve the       
   approach the bill takes.                                                
      First, encourage, if not direct, the Administration to engage other  
   countries on this issue. Given the availability of this technology      
   abroad, and the ease of its dissemination, a unilateral export control  
   policy on encryption will not work. We must work out a multilateral     
   approach.                                                               
      Second, drop the requirement that the Secretary of Commerce must have
   the concurrence of the Secretary of Defense to grant a license          
   exception. Including this requirement is a step backwards from current  
   policy. Under current export control policy there is a mechanism by     
   which national security agencies like the Department of Defense can     
   raise specific concerns with the Commerce Department as it reviews      
   export license applications. No evidence has been presented to suggest  
   that the current mechanism is broken and it should be used for          
   encryption export licenses as well. Giving the DoD what is in effect a  
   veto may result in the denial of export licenses for otherwise eligible 
   encryption products.                                                    
      Third, provide guidance or outline specific criteria for the         
   President to use in setting the maximum level of encryption below which 
   license exceptions would be granted. Encryption technology develops     
   rapidly and we need to ensure that advances made both domestically and  
   abroad are taken into consideration so that U.S. companies are not      
   penalized by the setting of an artificially low encryption strength     
   level. As such, the committee should at minimum specifically require the
   President to conduct a rigorous assessment of the range and quality of  
   encryption products available in foreign markets and require he explain 
   why that should not be the maximum strength level.                      
      Fourth, set forth a specific period of time within which companies   
   seeking license exceptions for their products can expect to have their  
   application reviewed and either approved or rejected. During this time  
   frame, the relevant federal agencies could examine the encryption       
   technology in question and have the applicant respond to any national   
   security concerns the technology raises. It is important that this      
   period of time be narrowly defined, in order to assure fairness and     
   predictability to U.S. companies seeking to market their technology in a
   timely fashion.                                                         
      Fifth, set forth specific penalties for companies that seek to       
   exploit loopholes or ambiguities or circumvent the limits and ensure    
   their enforcement.                                                      
      I again commend Messrs. Weldon and Dellums for their leadership in   
   fashioning a much improved title 3 for the bill. The suggested changes  
   I've outlined above, and other changes I hope to offer during the course
   of the bill's consideration in the House, will strike an even better    
   balance in this important policy debate.                                
         Jane Harman.                                                           
                         SUPPLEMENTAL VIEWS OF HON. LORETTA SANCHEZ               
      Many of us when we think of encryption imagine the ``ENIGMA'' code   
   breaking machines of World War Two or the American Indian ``code        
   talkers'' that helped us anticipate and defeat Nazi and Imperial        
   Japanese attacks. Those methods were mechanical or human-based, and     
   often depended on simple arithmetical slight of hand to trick the enemy.
   Today, encryption is complex mathematical algorithms that have become an
   entirely new branch of mathematics involving intense academic study.    
      Until recently encryption was limited to governments and large       
   companies through U.S. export limitations and by the limitations of     
   existing hardware and software technologies. All that began to change as
   the desktop computer became more prevalent and the computing power      
   available to the average user jumped by leaps and bounds every year.    
   When discussing the power of the PC observers of the information        
   technology industry often predict that the computing power of           
   microprocessors would double roughly every 18 months.                   
      Because of this the rapidly developing speed and growth of computers,
   the age of the ``unbreakable code'' has long since passed. Manufacturers
   of encryption technology are engaged in a rapidly accelerating race to  
   develop the newest and strongest code that can withstand attacks from   
   the increasingly powerful computers of the day. And it isn't just big   
   companies and governments that have the technology to break codes. Last 
   January, a graduate student broke a 40-bit code in just three-and-a-half
   hours, the toughest code form American companies at the time were       
   allowed to export.                                                      
      Today, American companies are the world leaders in encryption        
   technology, but other companies and nations are catching up. Strong     
   encryption products and knowledge about the science of cryptography is  
   not limited to the United States. A savvy computer user anywhere in the 
   world can with just a few clicks of the mouse find U.S. export-embargoed
   encryption. Many freelancing code hackers maintain off-shore Internet   
   meeting sites to discuss the newest holes in encryption products.       
      The proposed export controls which the Administration argues helps to
   keep strong encryption out of the hands of foreign adversaries will have
   little or no effect. Strong encryption is available abroad and US       
   companies are being put at a competitive disadvantage in the global     
   marketplace.                                                            
      With this bleak and seemingly hopeless picture in mind how do we     
   protect ourselves from the threat of rogue nations and other adversaries
   cloaking their communications from American National Security efforts?  
   The only viable solution is through supporting a robust and aggressively
   competitive cryptography industry in the United States. We must ensure  
   that the United States continues to maintain the deepest pool of        
   cryptographic experts in the world. American export limitations will    
   only serve to create a brain drain of these precious resources as       
   leading scientists leave our shores for more lucrative and accommodating
   surroundings.                                                           
      All of us care about our national security and no one wants to make  
   it any easier for criminals and terrorists to commit criminal acts. But 
   we must also recognize encryption technologies as an increasingly sharp 
   double-edged sword. It can also aid law enforcement and protect national
   security by limiting the threat of industrial espionage and foreign     
   spying, but only when Americans are able to produce the sharpest swords 
   and the strongest encryption.                                           
      I would also like to state for the record that for the reasons stated
   above, I do not support the Dellums-Weldon Amendment to H.R. 695, and   
   would have voted against it.                                            
         Loretta Sanchez.                                                       
                                                                        



NEWSLETTER
Join the GlobalSecurity.org mailing list