UNITED24 - Make a charitable donation in support of Ukraine!

Intelligence


Congressional Documents

                                  43 673                                 
                            105 th Congress                             
                             Rept.  105 108                             
                                                                             
                        HOUSE OF REPRESENTATIVES                        
                               1st Session                              
                                 Part 5                                 
            SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT           
   September 29, 1997.--Committed to the Committee of the Whole House on 
 the State of the Union and ordered to be printed                        
 Mr.  Bliley,  from the Committee on Commerce,  submitted the following  
 R E P O R T                                                             
                              together with                              
                     DISSENTING AND ADDITIONAL VIEWS                     
                         [To accompany H.R. 695]                         
       [Including cost estimate of the Congressional Budget Office]      
      The Committee on Commerce, to whom was referred the bill (H.R. 695)  
   to amend title 18, United States Code, to affirm the rights of United   
   States persons to use and sell encryption and to relax export controls  
   on encryption, having considered the same, report favorably thereon with
   an amendment and recommend that the bill as amended do pass.            
                               CONTENTS                                 
         Amendment                                                        2
         Purpose and Summary                                              6
         Background and Need for Legislation                              7
         Hearings                                                         10
         Committee Consideration                                          11
         Rollcall Votes                                                   11
         Committee Oversight Findings                                     15
         Committee on Government Reform and Oversight                     15
         New Budget Authority and Tax Expenditures                        15
         Committee Cost Estimate                                          15
         Congressional Budget Office Estimate                             15
         Federal Mandates Statement                                       19
         Advisory Committee Statement                                     19
         Constitutional Authority Statement                               19
         Applicability to Legislative Branch                              19
         Section-by-Section Analysis of the Legislation                   19
         Changes in Existing Law Made by the Bill, As Reported            23
         Dissenting and Additional Views                                  29, 42
                                         AMENDMENT                                
   The amendment is as follows:                                            
      Strike out all after the enacting clause and insert in lieu thereof  
   the following:                                                          
          SECTION 1. SHORT TITLE.                                                 
     This Act may be cited as the ``Security and Freedom Through          
  Encryption (SAFE) Act''.                                                
          SEC. 2. SALE AND USE OF ENCRYPTION.                                     
     (a) In General.--Part I of title 18, United States Code, is amended  
  by inserting after chapter 123 the following new chapter:               
                  ``CHAPTER 125--ENCRYPTED WIRE AND ELECTRONIC INFORMATION        
      ``2801. Definitions.                                                    
      ``2802. Assistance for law enforcement.                                 
      ``2803. Freedom to sell encryption.                                     
      ``2804. Prohibition on mandatory key escrow.                            
      ``2805. Unlawful use of encryption in furtherance of a criminal act.    
      ``2806. Liability limitations.                                          
          ``2801. Definitions                                                     
   ``As used in this chapter--                                            
       ``(1) the terms `person', `State', `wire communication', `electronic
   communication', and `investigative or law enforcement officer' have the 
   meanings given those terms in section 2510 of this title;               
       ``(2) the terms `encrypt' and `encryption' refer to the scrambling  
   of wire communications, electronic communications, or electronically    
   stored information, using mathematical formulas or algorithms in order  
   to preserve the confidentiality, integrity, or authenticity of, and     
   prevent unauthorized recipients from accessing or altering, such        
   communications or information;                                          
       ``(3) the term `key' means the variable information used in a       
   mathematical formula, code, or algorithm, or any component thereof, used
   to decrypt wire communications, electronic communications, or           
   electronically stored information, that has been encrypted; and         
    ``(4) the term `United States person' means--                          
    ``(A) any United States citizen;                                       
    ``(B) any other person organized under the laws of any State; and      
       ``(C) any person organized under the laws of any foreign country who
   is owned or controlled by individuals or persons described in           
   subparagraphs (A) and (B).                                              
          ``2802. Assistance for law enforcement                                  
   ``(a)  National Electronic Technologies Center.--                      
       ``(1) Establishment.--There is established in the Department of     
   Justice a National Electronic Technologies Center (in this subsection   
   referred to as the `NET Center').                                       
       ``(2) Director.--The NET Center shall have a Director, who shall be 
   appointed by the Attorney General.                                      
    ``(3)  Duties.--The duties of the NET Center shall be--                
       ``(A) to serve as a center for Federal, State, and local law        
   enforcement authorities for information and assistance regarding        
   decryption and other access requirements;                               
       ``(B) to serve as a center for industry and government entities to  
   exchange information and methodology regarding information security     
   techniques and technologies;                                            
       ``(C) to examine encryption techniques and methods to facilitate the
   ability of law enforcement to gain efficient access to plaintext of     
   communications and electronic information;                              
       ``(D) to conduct research to develop efficient methods, and improve 
   the efficiency of existing methods, of accessing plaintext of           
   communications and electronic information;                              
       ``(E) to investigate and research new and emerging techniques and   
   technologies to facilitate access to communications and electronic      
   information, including--                                                
    ``(i) reverse-steganography;                                           
       ``(ii) decompression of information that previously has been        
   compressed for transmission; and                                        
    ``(iii) de-multiplexing; and                                           
       ``(F) to obtain information regarding the most current hardware,    
   software, telecommunications, and other capabilities to understand how  
   to access information transmitted across networks.                      
       ``(4) Equal access.--State and local law enforcement agencies and   
   authorities shall have access to information, services, resources, and  
   assistance provided by the NET Center to the same extent that Federal   
   law enforcement agencies and authorities have such access.              
       ``(5) Personnel.--The Director may appoint such personnel as the    
   Director considers appropriate to carry out the duties of the NET       
   Center.                                                                 
       ``(6) Assistance of other federal agencies.--Upon the request of the
   Director of the NET Center, the head of any department or agency of the 
   Federal Government may, to assist the NET Center in carrying out its    
   duties under this subsection--                                          
       ``(A) detail, on a reimbursable basis, any of the personnel of such 
   department or agency to the NET Center; and                             
       ``(B) provide to the NET Center facilities, information, and other  
   non-personnel resources.                                                
       ``(7) Private industry assistance.--The NET Center may accept, use, 
   and dispose of gifts, bequests, or devises of money, services, or       
   property, both real and personal, for the purpose of aiding or          
   facilitating the work of the Center.                                    
                    Gifts, bequests, or devises of money and proceeds from sales  
          of other property received as gifts, bequests, or devises shall be      
          deposited in the Treasury and shall be available for disbursement upon  
          order of the Director of the NET Center.                                
    ``(8)  Advisory board.--                                               
       ``(A) Establishment.--There is established the Advisory Board of the
   Strategic NET Center for Excellence in Information Security (in this    
   paragraph referred to as the `Advisory Board'), which shall be comprised
   of members who have the qualifications described in subparagraph (B) and
   who are appointed by the Attorney General. The Attorney General shall   
   appoint a chairman of the Advisory Board.                               
       ``(B) Qualifications.--Each member of the Advisory Board shall have 
   experience or expertise in the field of encryption, decryption,         
   electronic communication, information security, electronic commerce, or 
   law enforcement.                                                        
       ``(C) Duties.--The duty of the Advisory Board shall be to advise the
   NET Center and the Federal Government regarding new and emerging        
   technologies relating to encryption and decryption of communications and
   electronic information.                                                 
       ``(9) Implementation plan.--Within 2 months after the date of the   
   enactment of the Security and Freedom Through Encryption (SAFE) Act, the
   Attorney General shall, in consultation and cooperation with other      
   appropriate Federal agencies and appropriate industry participants,     
   develop and cause to be published in the Federal Register a plan for    
   establishing the NET Center. The plan shall--                           
       ``(A) specify the physical location of the NET Center and the       
   equipment, software, and personnel resources necessary to carry out the 
   duties of the NET Center under this subsection;                         
       ``(B) assess the amount of funding necessary to establish and       
   operate the NET Center; and                                             
       ``(C) identify sources of probable funding for the NET Center,      
   including any sources of in-kind contributions from private industry.   
     ``(b) Freedom of Use.--Subject to section 2805, it shall be lawful   
  for any person within any State, and for any United States person in a  
  foreign country, to use any encryption, regardless of the encryption    
  algorithm selected, encryption key length chosen, or implementation     
  technique or medium used. No Federal or State law or regulation may     
  condition the issuance of certificates of authentication or certificates
  of authority for any encryption product upon any escrowing or other     
  sharing of private encryption keys, whether with private agents or      
  government entities, or establish a licensing, labeling, or other       
  regulatory scheme for any encryption product that requires key escrow as
  a condition of licensing or regulatory approval.                        
          ``2803. Freedom to sell encryption                                      
     ``Subject to section 2805, it shall be lawful for any person within  
  any State to sell in interstate commerce any encryption, regardless of  
  the encryption algorithm selected, encryption key length chosen, or     
  implementation technique or medium used.                                
          ``2804. Prohibition on mandatory key escrow                             
     ``(a) Prohibition.--No person in lawful possession of a key to       
  encrypted communications or information may be required by Federal or   
  State law to relinquish to another person control of that key.          
     ``(b) Exception for Access for Law Enforcement Purposes.--Subsection 
  (a) shall not affect the authority of any investigative or law          
  enforcement officer, or any member of the intelligence community as     
  defined in section 3 of the National Security Act of 1947 (50 U.S.C.    
  401a), acting under any law in effect on the effective date of this     
  chapter, to gain access to encrypted communications or information.     
          ``2805. Unlawful use of encryption in furtherance of a criminal act     
     ``Any person who, in the commission of a felony under a criminal     
  statute of the United States, knowingly and willfully encrypts          
  incriminating communications or information relating to that felony with
  the intent to conceal such communications or information for the purpose
  of avoiding detection by law enforcement agencies or prosecution--      
       ``(1) in the case of a first offense under this section, shall be   
   imprisoned for not more than 10 years, or fined in the amount set forth 
   in this title, or both; and                                             
       ``(2) in the case of a second or subsequent offense under this      
   section, shall be imprisoned for not more than 20 years, or fined in the
   amount set forth in this title, or both.                                
          ``2806. Liability limitations                                           
     ``No person shall be subject to civil or criminal liability for      
  providing access to the plaintext of encrypted communications or        
  electronic information to any law enforcement official or authorized    
  government entity, pursuant to judicial process.''.                     
     (b) Study.--Within 6 months after the date of the enactment of this  
  Act, the National Telecommunications and Information Administration     
  shall conduct a study, and prepare and submit to the Congress and the   
  President a report regarding such study, that--                         
       (1) assesses the effect that establishment of a mandatory system for
   recovery of encryption keys for encrypted communications and information
   would have on--                                                         
    (A) electronic commerce;                                               
    (B) data security;                                                     
    (C) privacy in interstate commerce; and                                
    (D) law enforcement authorities and activities; and                    
       (2) assesses other possible methods for providing access to         
   encrypted communications and information to further law enforcement     
   activities.                                                             
     (c) Conforming Amendment.--The table of chapters for part I of title 
  18, United States Code, is amended by inserting after the item relating 
  to chapter 123 the following new item:                                  
         ``125. Encrypted wire and electronic information                       
        2801''.                                                                
          SEC. 3. EXPORTS OF ENCRYPTION.                                          
     (a) Amendment To Export Administration Act of 1979.--Section 17 of   
  the Export Administration Act of 1979 (50 U.S.C. App. 2416) is amended  
  by adding at the end thereof the following new subsection:              
   ``(g)  Computers and Related Equipment.--                              
       ``(1) General rule.--Subject to paragraphs (2), (3), and (4), the   
   Secretary shall have exclusive authority to control exports of all      
   computer hardware, software, and technology for information security    
   (including encryption), except that which is specifically designed or   
   modified for military use, including command, control, and intelligence 
   applications.                                                           
       ``(2) Items not requiring licenses.--No validated license may be    
   required, except pursuant to the Trading With The Enemy Act or the      
   International Emergency Economic Powers Act (but only to the extent that
   the authority of such Act is not exercised to extend controls imposed   
   under this Act), for the export or reexport of--                        
    ``(A) any software, including software with encryption capabilities--  
       ``(i) that is generally available, as is, and is designed for       
   installation by the purchaser; or                                       
       ``(ii) that is in the public domain for which copyright or other    
   protection is not available under title 17, United States Code, or that 
   is available to the public because it is generally accessible to the    
   interested public in any form; or                                       
       ``(B) any computing device solely because it incorporates or employs
   in any form software (including software with encryption capabilities)  
   exempted from any requirement for a validated license under subparagraph
   (A).                                                                    
       ``(3) Software with encryption capabilities.--The Secretary shall   
   authorize the export or reexport of software with encryption            
   capabilities for nonmilitary end uses in any country to which exports of
   software of similar capability are permitted for use by financial       
   institutions not controlled in fact by United States persons, unless    
   there is substantial evidence that such software will be--              
       ``(A) diverted to a military end use or an end use supporting       
   international terrorism;                                                
    ``(B) modified for military or terrorist end use; or                   
       ``(C) reexported without any authorization by the United States that
   may be required under this Act.                                         
       ``(4) Hardware with encryption capabilities.--The Secretary shall   
   authorize the export or reexport of computer hardware with encryption   
   capabilities if the Secretary determines that a product offering        
   comparable security is commercially available outside the United States 
   from a foreign supplier, without effective restrictions.                
    ``(5)  Definitions.--As used in this subsection--                      
       ``(A) the term `encryption' means the scrambling of wire or         
   electronic information using mathematical formulas or algorithms in     
   order to preserve                                                       
                    the confidentiality, integrity, or authenticity of, and       
          prevent unauthorized recipients from accessing or altering, such        
          information;                                                            
       ``(B) the term `generally available' means, in the case of software 
   (including software with encryption capabilities), software that is     
   offered for sale, license, or transfer to any person without            
   restriction, whether or not for consideration, including, but not       
   limited to, over-the-counter retail sales, mail order transactions,     
   phone order transactions, electronic distribution, or sale on approval; 
       ``(C) the term `as is' means, in the case of software (including    
   software with encryption capabilities), a software program that is not  
   designed, developed, or tailored by the software publisher for specific 
   purchasers, except that such purchasers may supply certain installation 
   parameters needed by the software program to function properly with the 
   purchaser's system and may customize the software program by choosing   
   among options contained in the software program;                        
       ``(D) the term `is designed for installation by the purchaser'      
   means, in the case of software (including software with encryption      
   capabilities) that--                                                    
       ``(i) the software publisher intends for the purchaser (including   
   any licensee or transferee), who may not be the actual program user, to 
   install the software program on a computing device and has supplied the 
   necessary instructions to do so, except that the publisher may also     
   provide telephone help line services for software installation,         
   electronic transmission, or basic operations; and                       
       ``(ii) the software program is designed for installation by the     
   purchaser without further substantial support by the supplier;          
       ``(E) the term `computing device' means a device which incorporates 
   one or more microprocessor-based central processing units that can      
   accept, store, process, or provide output of data; and                  
       ``(F) the term `computer hardware', when used in conjunction with   
   information security, includes, but is not limited to, computer systems,
   equipment, application-specific assemblies, modules, and integrated     
   circuits.''.                                                            
     (b) Continuation of Export Administration Act.--For purposes of      
  carrying out the amendment made by subsection (a), the Export           
  Administration Act of 1979 shall be deemed to be in effect.             
          SEC. 4. TREATMENT OF ENCRYPTION IN INTERSTATE AND FOREIGN COMMERCE.     
     (a) Inquiry Regarding Impediments to Trade.--Within 180 days after   
  the date of the enactment of this Act, the Secretary of Commerce shall  
  complete an inquiry to--                                                
       (1) identify any domestic and foreign impediments to trade in       
   encryption products and services and the manners in which and extent to 
   which such impediments inhibit the development of interstate and foreign
   commerce; and                                                           
       (2) identify import restrictions imposed by foreign nations that    
   constitute unfair trade barriers to providers of encryption products or 
   services.                                                               
    The Secretary shall submit a report to the Congress regarding the     
  results of such inquiry by such date.                                   
     (b) Removal of Impediments to Trade.--Within 1 year after such date  
  of enactment, the Secretary of Commerce, in consultation with the       
  Attorney General, shall prescribe such regulations as may be necessary  
  to reduce the impediments to trade in encryption products and services  
  identified in the inquiry pursuant to subsection (a) for the purpose of 
  facilitating the development of interstate and foreign commerce. Such   
  regulations shall be designed to--                                      
       (1) promote the sale and distribution in foreign commerce of        
   encryption products and services manufactured in the United States; and 
       (2) strengthen the competitiveness of domestic providers of         
   encryption products and services in foreign commerce.                   
   (c)  International Agreements.--                                       
       (1) Report to president.--Upon the completion of the inquiry under  
   subsection (a), the Secretary of Commerce shall submit a report to the  
   President regarding reducing any impediments to trade in encryption     
   products and services that are identified by the inquiry and could, in  
   the determination of the Secretary, require international negotiations  
   for such reduction.                                                     
       (2) Negotiations.--The President shall take all actions necessary to
   conduct negotiations with other countries for the purposes of (A)       
   concluding international agreements on the promotion of encryption      
   products and services, and (B) achieving mutual recognition of          
   countries' export controls, in order to meet the needs of countries to  
   preserve national security, safeguard privacy, and prevent commercial   
   espionage. The President may consider a country's refusal to negotiate  
   such international export and mutual recognition agreements when        
   considering the participation of the United States in any cooperation or
   assistance program with that country. The President shall submit a      
   report to the Congress regarding the status of international efforts    
   regarding cryptography not later than December 31, 2000.                
     (d) Definitions.--For purposes of this section, the following        
  definitions shall apply:                                                
       (1) Communication.--The term ``communication'' includes wire        
   communication and electronic communication.                             
       (2) Decrypt; decryption.--The terms ``decrypt'' and ``decryption''  
   refer to the electronic retransformation of communications or           
   electronically stored information that has been encrypted into the      
   original form of the communication or information.                      
       (3) Electronic communication.--The term ``electronic communication''
   has the meaning given such term in section 2510 of title 18, United     
   States Code.                                                            
       (4) Encrypt; encryption.--The terms ``encrypt'' and ``encryption''  
   have the meanings given such terms in section 2801 of title 18, United  
   States Code (as added by section 2 of this Act).                        
       (5) Encryption product.--The term ``encryption product'' means any  
   product, software, or technology that can be used to encrypt and decrypt
   communications or electronic information and any product, software, or  
   technology with encryption capabilities;                                
       (6) Wire communication.--The term ``wire communication'' has the    
   meaning given such term in section 3 of the Communications Act of 1934  
   (47 U.S.C. 153).                                                        
          SEC. 5. EFFECT ON LAW ENFORCEMENT ACTIVITIES.                           
     (a) Collection of Information by Attorney General.--The Attorney     
  General shall compile, and maintain in classified form, data on the     
  instances in which encryption (as defined in section 2801 of title 18,  
  United States Code) has interfered with, impeded, or obstructed the     
  ability of the Department of Justice to enforce the criminal laws of the
  United States.                                                          
     (b) Availability of Information to the Congress.--The information    
  compiled under subsection (a), including an unclassified summary        
  thereof, shall be made available, upon request, to any Member of        
  Congress.                                                               
                                    PURPOSE AND SUMMARY                           
      The growth of electronic commerce, electronic transactions, and      
   interstate and foreign communications depends ultimately upon the       
   security and privacy of the information or data being transmitted.      
   Encryption and the prolific use of encryption products are essential to 
   facilitate this growth. Accordingly, the Committee on Commerce has an   
   obligation and responsibility to ensure that the use of encryption      
   technologies will have a positive impact on all electronic mediums,     
   including the Internet, and all forms of existing and future electronic 
   commerce. H.R. 695, the Security and Freedom Through Encryption (SAFE)  
   Act, is intended to modernize the encryption policy of the United       
   States. It is also intended to address law enforcement's and national   
   security's needs as strong encryption products become more widely used. 
      In summary, H.R. 695, as amended by the Committee on Commerce,       
   establishes a National Electronic Technologies Center (NET Center) to   
   help Federal, State, and local law enforcement agencies obtain access to
   encrypted communications. H.R. 695 also states that it is lawful to use 
   encryption products within the United States and requires a study       
   assessing the impact that a mandatory key recovery system would have on,
   inter alia, electronic commerce. In addition, H.R. 695 prohibits any    
   person from relinquishing an encryption key and provides penalties for  
   using encryption products to conceal incriminating evidence. With       
   respect to export law, H.R. 695 relaxes U.S. export policies by         
   permitting mass-market encryption products to be exported under a       
   general license exception. It also permits other computer hardware and  
   software products to be exported subject to approval by the Secretary of
   Commerce. Finally, H.R. 695 requires the Secretary of Commerce to study 
   domestic and foreign impediments to trade with respect to encryption    
   products and requires the President to undertake negotiations with other
   countries as necessary to reduce impediments to U.S. encryption exports,
   as well as requiring the Attorney General to compile information        
   regarding instances when law enforcement's efforts have been stymied    
   because of the use of strong encryption products.                       
                            BACKGROUND AND NEED FOR LEGISLATION                   
      Encryption is the commonly-used term to describe the use of          
   cryptography to ensure the confidentiality of messages. Encryption      
   products may be computer software, computer hardware, or another piece  
   of equipment that has the capability to encode or decode messages. These
   products could be used over any electronic medium (e.g., the public     
   switched telephone network or the Internet). The strength of an         
   encryption product, and thus the likelihood that a message will remain  
   confidential as it travels through a network, is measured in terms of   
   bits. For example, a two-bit code results in four possible combinations 
   of messages (00, 01, 10, 11), whereas a 56-bit code results in          
   quadrillions of possible combinations. While encrypting messages was    
   historically the province of the military, the growing use of computers 
   on both public and private networks has led to development of new       
   products designed for non-military purposes.                            
      As commercially-available encryption products have increased in      
   strength over the years, the law enforcement community, led by the      
   Federal Bureau of Investigations (FBI) and National Security Agency, has
   become increasingly concerned with the ability of criminals,            
   international terrorists, and certain countries to gain access to       
   encryption products. Consequently, the Reagan, Bush, and Clinton        
   Administrations have prohibited the export of encryption products with  
   strengths greater than 40-bit key length to limit the proliferation of  
   advanced encryption products that would affect their ability to protect 
   the public safety. In general, a ``key'' is a form of information that  
   is used in a mathematical formula, code, or algorithm to decrypt wire   
   communications, electronic communications, or electronically stored     
   information that has been encrypted. The Federal Government has never   
   limited the use of encryption products domestically.                    
      In 1996, the Administration eased the export restrictions and        
   transferred control of export products from the Department of State to  
   the Department of Commerce. The Department of Commerce's new            
   regulations, which embody the Administration's current encryption export
   policies, can be summarized as follows:                                 
       There are no restrictions on the ability to buy, sell, manufacture, 
   or distribute encryption products within the United States;             
       Encryption items up to 56-bit key length strength without a ``key   
   recovery system'' will be permitted for export and re-export after a    
   one-time review, if the exporter makes satisfactory commitments to build
   and/or market a key recovery system. This relaxation of controls expires
   on December 31, 1998. A key recovery system permits a person to hold and
   maintain sufficient decryption information to allow for the immediate   
   decryption of the encrypted data or communications of another person for
   whom that information is held;                                          
       Weaker encryption products (40-bit key strength or less) or company 
   proprietary software may be exported after a one-time review;           
       Controlled encryption items (such as those items with strengths     
   greater than 56-bit length) may be exported after a one-time review if  
   the items contain key-recovery technology;                              
       Controlled encryption items used by banks and financial institutions
   are generally available for export regardless of whether key recovery is
   used; and                                                               
       In general, there is a prohibition on exporting encryption items to 
   Cuba, Iran, Iraq, Libya, North Korea, Syria, and Sudan.                 
      The Committee on Commerce has been actively following and involved in
   the encryption debate this Congress. For example, in March 1997,        
   Chairman Bliley and Representative White wrote letters to government    
   leaders and the business community asking a series of questions on the  
   Administration's current policies and on pending legislation. The       
   letters and responses highlighted the two fundamental issues regarding  
   encryption debate: (1) should domestic companies be permitted to export 
   encryption products of any strength, thus increasing the availability of
   such products in the global market; and (2) should the United States    
   impose any domestic restrictions on the use of encryption products to   
   assist law enforcement's access to encrypted communications. In general,
   sound encryption policy must balance privacy interests with society's   
   interest to protect the public. To the greatest extent possible, it must
   also be based on free-market principles.                                
      Regarding the arguments in the debate, the business community argues 
   that current U.S. encryption policy harms domestic businesses abroad    
   because they are forced to export weak encryption products that compete 
   with stronger foreign encryption products. Many representatives of the  
   business community also argue that the security of a strong encryption  
   product is jeopardized if it contains a key-recoverable feature. In     
   addition, the business community generally argues that the current      
   policy may impose excessive costs on the industry to the extent they may
   be forced to develop costly, new key recovery products; manufacture two 
   different products (one for the U.S. (strong) and one for abroad        
   (weaker)); and/or be subject to a burdensome licensing process. Instead,
   they maintain that a key-recovery system should be developed only if    
   there is market demand for such products.                               
      Alternatively, government officials, which include Federal, State,   
   and local law enforcement officials, argue that permitting the export of
   stronger encryption products without a clear mechanism to decrypt a     
   communication or stored information, when necessary and lawful, will    
   jeopardize public safety and national security. They believe that       
   key-recovery systems must be developed, not only to facilitate lawful   
   searches and seizures, but to help users or employers in the event they 
   lose the ``key'' to decrypt a message. They also argue that widespread  
   use of strong encryption without key recovery would end the use of      
   wiretapping as a tool for fighting crime and that lifting the export    
   restrictions will undermine the Administration's effort to develop a    
   global key-management infrastructure. In addition, they counter that    
   most foreign countries view lifting the export restrictions as America's
   attempt to dominate world markets at the expense of other nation's      
   national security, thereby forcing these countries to adopt import      
   restrictions to keep American products out of their countries.          
      The existing encryption policy is premised upon the belief that      
   minimizing the proliferation of U.S. manufactured encryption products   
   worldwide will minimize the use of encryption products overall. Thus,   
   current U.S. encryption policy is based upon the theory of containment  
   rather than access. The Committee is not convinced that reliance on     
   export restrictions provides adequate assistance to law enforcement in  
   their ever increasing need to keep up with the latest technologies. In  
   fact, the Committee finds that the current export rules place our       
   domestic manufacturers of encryption products at a competitive          
   disadvantage with our foreign counterparts without addressing the needs 
   of law enforcement. Thus, at a minimum, current export law is not       
   sustainable and potentially harmful to our domestic manufacturers.      
      At the same time, the needs of law enforcement are not being met by  
   changes in technology. The Fourth Amendment and Title III of the Omnibus
   Crime Control and Safe Streets Act of 1968 permit law enforcement       
   agencies to search, seize, and intercept electronic communications and  
   stored data. With the development of strong encryption technologies,    
   however, law enforcement's efforts are being thwarted because even      
   though they can search, seize, or intercept the information, they cannot
   understand it because it is encoded. Without the necessary tools, law   
   enforcement does not have the ability to prevent and solve crimes.      
      Consequently, legislation is needed to address the needs of law      
   enforcement to access encrypted communications and to ease existing     
   export restrictions that hamper domestic manufacturers of encryption    
   products.                                                               
      As reported by the Committee on Commerce, H.R. 695 takes a           
   significant step towards addressing the concerns of law enforcement. The
   legislation creates a ``National Electronic Technologies Center'' (NET  
   Center) that will assemble experts on encryption technology to develop  
   and advise law enforcement officials on how to access encrypted         
   electronic communications or information. The NET Center also will look 
   to the future and assist law enforcement with decryption techniques as  
   new technologies are introduced. The Committee                          
                    concludes that a partnership between the industry and law     
          enforcement is the best way to help law enforcement protect public      
          safety.                                                                 
      The bill, as reported by the Committee, also addresses the needs of  
   domestic manufacturers of encryption products by granting export relief 
   for certain encryption products. This change in export policy should    
   place the U.S. computer industry in a position where domestic companies 
   can compete on a level playing field with their competitors in a global 
   market. Moreover, H.R. 695 seeks to push for further relief for our     
   manufacturers by directing the Department of Commerce to reduce foreign 
   impediments to trade. The Committee has an obligation, through its      
   jurisdiction over export promotion, to ensure that U.S. companies are   
   not harmed in any way by unnecessary or unjust trade barriers.          
      Overall, the Committee finds that H.R. 695, as reported, strikes the 
   appropriate balance between the needs of law enforcement and those of   
   industry.                                                               
                                          HEARINGS                                
      The Subcommittee on Telecommunications, Trade, and Consumer          
   Protection held a hearing on H.R. 695, the Security and Freedom Through 
   Encryption (SAFE) Act, on September 4, 1997. The Subcommittee received  
   testimony from the following witnesses: The Honorable Bob Goodlatte,    
   U.S. Representative, Sixth District, Commonwealth of Virginia; The      
   Honorable Zoe Lofgren, U.S. Representative, Sixteenth District, State of
   California; The Honorable William A. Reinsch, Under Secretary of        
   Commerce for Export Administration, U.S. Department of Commerce; The    
   Honorable Robert S. Litt, Deputy Assistant Attorney General, Criminal   
   Division, U.S. Department of Justice; Mr. Stephen T. Walker, President  
   and CEO, Trusted Information Systems, Inc.; Mr. Tom Parenty, Director,  
   Data/Communications Security, Sybase, Inc.; Mr. Jerry Berman, Executive 
   Director, Center for Democracy and Technology; and Mr. George A.        
   Keyworth, Chairman, Progress and Freedom Foundation. Prior to hearing   
   from the witnesses, The Honorable William P. Crowell, Deputy Director of
   the National Security Agency, provided an overview on encryption and    
   described some of the common terms used in the encryption debate.       
                                  COMMITTEE CONSIDERATION                         
      On September 24, 1997, the Committee on Commerce met in an open      
   markup session to consider H.R. 695, the Security and Freedom Through   
   Encryption (SAFE) Act. A unanimous consent request by Mr. Bliley to     
   discharge the Subcommittee on Telecommunications, Trade, and Consumer   
   Protection from further consideration and proceed to the immediate      
   consideration of H.R. 695, as reported to the House by the Committee on 
   the Judiciary, was agreed to without objection. The Committee ordered   
   H.R. 695 reported to the House, amended, by a rollcall vote of 44 yeas  
   to 6 nays.                                                              
                                       ROLLCALL VOTES                             
      Clause 2(l)(2)(B) of rule XI of the Rules of the House requires the  
   Committee to list the recorded votes on the motion to report legislation
   and amendments thereto. The following are the recorded votes on the     
   motion to report H.R. 695 and on amendments offered to the measure,     
   including the names of those Members voting for and against.            
   Offset Folios 14 to 16 insert here                                      
            COMMITTEE ON COMMERCE--105TH CONGRESS VOICE VOTES            
   Bill: H.R. 695, Security and Freedom Through Encryption (SAFE) Act      
      Amendment: Amendment in the Nature of a Substitute by Mr. Tauzin. (A 
   unanimous consent request by Mr. Tauzin to have the Amendment in the    
   Nature of a Substitute considered as base text for purposes of further  
   amendment was agreed to without objection.)                             
   Disposition: Agreed to, amended, by a voice vote.                       
      Amendment: Amendment to the Tauzin Amendment in the Nature of a      
   Substitute by Mr. Tauzin re: add a new section to direct the Secretary  
   of Commerce to reduce interstate and foreign impediments to trade of    
   encryption products and services.                                       
   Disposition: Agreed to, by a voice vote.                                
                                COMMITTEE OVERSIGHT FINDINGS                      
      Pursuant to clause 2(l)(3)(a) of rule XI of the Rules of the House of
   Representatives, the Committee held a legislative hearing and made      
   findings that are reflected in this report.                             
                        COMMITTEE ON GOVERNMENT REFORM AND OVERSIGHT              
      Pursuant to clause 2(l)(3)(D) of rule XI of the Rules of the House of
   Representatives, no oversight findings have been submitted to the       
   Committee by the Committee on Government Reform and Oversight.          
                         NEW BUDGET AUTHORITY AND TAX EXPENDITURES                
      In compliance with clause 2(l)(3)(B) of rule XI of the Rules of the  
   House of Representatives, the Committee finds that H.R. 695, the        
   Security and Freedom Through Encryption (SAFE) Act, would result in no  
   new or increased budget authority or tax expenditures or revenues.      
                                  COMMITTEE COST ESTIMATE                         
      The Committee adopts as its own the cost estimate prepared by the    
   Director of the Congressional Budget Office pursuant to section 403 of  
   the Congressional Budget Act of 1974.                                   
                            CONGRESSIONAL BUDGET OFFICE ESTIMATE                  
      Pursuant to clause 2(l)(3)(C) of rule XI of the Rules of the House of
   Representatives, the following is the cost estimate provided by the     
   Congressional Budget Office pursuant to section 403 of the Congressional
   Budget Act of 1974:                                                     
       U.S. Congress,                                                          
       Congressional Budget Office,                                            
       Washington, DC, September 29, 1997.                                     
          Hon.  Tom Bliley,              Chairman, Committee on Commerce,
       House of Representatives, Washington, DC.                               
       Dear Mr. Chairman: The Congressional Budget Office has prepared the 
   enclosed cost estimate for H.R. 695, the Security and Freedom Through   
   Encryption (SAFE) Act.                                                  
      If you wish further details on this estimate, we will be pleased to  
   provide them. The CBO staff contacts are Rachel Forward and Mark        
   Grabowicz (for Federal costs), Alyssa Trzeszkowski (for revenues), and  
   Pepper Santalucia (for the impact on State, local, and tribal           
   governments.                                                            
   Sincerely,                                                              
         June E. O'Neill,  Director.                                            
   Enclosure.                                                              
           H.R. 695--Security and Freedom Through Encryption (SAFE) Act            
      Summary: H.R. 695 would allow individuals in the United States to use
   and sell any form of encryption and would prohibit states or the Federal
   Government from requiring individuals to relinquish the key to          
   encryption products. The bill also would prevent the Bureau of Export   
   Administration (BXA) in the Department of Commerce (DOC) from           
   restricting the export of most nonmilitary encryption products. H.R. 695
   would establish a National Electronic Technologies (NET) Center in the  
   Department of Justice (DOJ) to provide assistance and information on    
   encryption products to law enforcement officials and would require the  
   Attorney General to maintain data on the instances in which encryption  
   impedes or obstructs the ability of DOJ to enforce criminal laws.       
   Finally, the bill would establish criminal penalties and fines for the  
   use of encryption technologies to conceal incriminating information     
   related to a felony.                                                    
      Assuming the appropriation of the necessary amounts, CBO estimates   
   that enacting this bill would result in additional discretionary        
   spending by DOC and DOJ of at least $28 million over the 1998 2002      
   period. Spending by DOC and DOJ for activities required by H.R. 695     
   would total at least $33 million over the next five years. By           
   comparison, CBO estimates that--under current policies--spending by BXA 
   for reviewing the export of nonmilitary encryption products would total 
   about $4.5 million over the same period. (Spending related to encryption
   exports by DOJ is negligible under current law.)                        
      Enacting H.R. 695 also would affect direct spending and receipts.    
   Therefore, pay-as-you-go procedures would apply. CBO estimates, however,
   that the amounts of additional direct spending or receipts would not be 
   significant.                                                            
      H.R. 695 contains no private-section mandates as defined in the      
   Unfunded Mandates Reform Act of 1995 (UMRA). The bill contains          
   intergovernmental mandates on state governments. CBO estimates, however,
   that states would not incur any costs to comply with the mandates.      
      Estimated cost to the Federal Government: Spending Subject to        
   Appropriation--Under current policy, BXA would likely spend about       
   $900,000 a year reviewing exports of encryption products. Assuming      
   appropriation of the necessary amounts, CBO estimates that enacting H.R.
   695 would lower BXA's encryption-related costs to about $500,000 a year.
   In November 1996, the Administration issued an executive order and      
   memorandum that authorized BXA to control the export of all nonmilitary 
   encryption products. If H.R. 695 were enacted, BXA would still be       
   required to review requests to export most computer hardware with       
   encryption capabilities but would not be required to review most        
   requests to export computer software with encryption capabilities. Thus,
   enacting H.R. 695 would reduce the costs to BXA to control the exports  
   of nonmilitary encryption products.                                     
      H.R. 695 would require the Secretary of Commerce to conduct a number 
   of studies on electronic commerce and domestic and foreign impediments  
   to trade in encryption products. Based on information from the          
   Department of Commerce, CBO estimates that completing the required      
   studies would cost about $1 million in fiscal year 1998, assuming       
   appropriation of the necessary amount.                                  
      H.R. 695 would establish within DOJ the NET Center, which generally  
   would assist Federal, State, and local law enforcement agencies with    
   issues involving encryption and information security. The bill would    
   assign the NET Center a broad range of duties, including providing      
   information and assistance, serving as an information clearinghouse, and
   conducting research. The costs to establish and operate the NET Center  
   could depend on the extent to which service would be provided to the law
   enforcement community nationwide. Based on information from DOJ, we     
   estimate that the minimum costs to fulfill the bill's requirements would
   be roughly $5 million annually, but the costs could be much greater. Any
   spending relating to the NET Center would be subject to the availability
   of appropriations.                                                      
      DOJ would also be required to collect and maintain data on the       
   instances in which encryption impedes or obstructs the ability of the   
   agency to enforce criminal laws. CBO projects that collecting and       
   maintaining the data would cost DOJ between $500,000 and $1 million a   
   year, assuming appropriation of the necessary amounts.                  
      Direct Spending and Revenues--Enacting H.R. 695 would affect direct  
   spending and receipts by imposing criminal fines for encrypting         
   incriminating information related to a felony. CBO estimates that       
   collections                                                             
                    from such fines are likely to be negligible, however, because 
          the federal government would probably not pursue many cases under the   
          bill. Any such collections would be recorded in the budget as           
          governmental receipts, or revenues. They would be deposited in the Crime
          Victims Fund and spent the following year. Because the increase in      
          direct spending would be the same as the amount of fines collected with 
          a one-year lag, the additional direct spending also would be negligible.
      Direct spending and revenues also could result from the provision    
   that would allow the NET Center to accept donations to further the work 
   of the office. CBO expects that any contributions (recorded in the      
   budget as revenues) would be used in the same year as they were         
   received. Therefore, we estimate that the net budgetary impact of the   
   gift authority granted to the NET Center would be negligible for all    
   years.                                                                  
      The costs of this legislation fall within budget function 370        
   (commerce and housing credit) and 750 (administration of justice).      
      Pay-as-you-go-considerations: Section 252 of the Balanced Budget and 
   Emergency Control Act of 1985 sets up pay-as-you-go procedures for      
   legislation affecting direct spending or receipts. H.R. 695 would affect
   direct spending and receipts by imposing criminal fines and by allowing 
   the new NET Center to accept donations. CBO estimates that the amounts  
   of additional direct spending and receipts would not be significant.    
      Estimated Impact on State, local, and tribal Governments: H.R. 695   
   would prohibit states from requiring anyone in lawful possession of an  
   encryption key to make that key available to another person or entity.  
   The bill would also prohibit states from conditioning the issuance of   
   certificates of authenticity or certificates of authority for encryption
   products on the sharing of encryption keys Finally, the bill would      
   prohibit states from establishing licensing, labeling, or other         
   regulatory schemes for encryption products that would require the       
   sharing of encryption keys. These prohibitions would be                 
   intergovernmental mandates as defined in UMRA. However, states would    
   bear no costs as a result of these mandates, because none currently have
   laws that would violate these provisions of the bill.                   
      H.R. 695 would also establish a center in the Justice Department that
   would provide information and assistance regarding decryption techniques
   to federal, state, and local law enforcement authorities.               
      Estimated impact on the private sector: The bill would impose no new 
   private-sector mandates as defined in UMRA.                             
      Previous CBO estimates: CBO provided cost estimates for H.R. 695 as  
   ordered reported by the House Committee on the Judiciary on May 14,     
   1997, by the House Committee on International Relations on July 22,     
   1997, by the House Committee on National Security on September 9, 1997, 
   and by the House Committee on Intelligence on September 11, 1997.       
   Assuming appropriation of the necessary amounts, CBO estimates that     
   costs over the 1998 2002 period would total between $5 million and $7   
   million for the Judiciary Committee's version, about $2.2 million for   
   the International Relations Committee's version, about $4.5 million for 
   the National Security Committee's version, and between $9 million and   
   $11.6 million for the Intelligence Committee's version. In comparison,  
   CBO estimates that enacting this version of the bill would cost at least
   $33 million over the 1998 2002 period and that spending under current   
   policies would total $44.5 million over the same period.                
      Estimate prepared by: Federal costs: Rachel Forward and Mark         
   Grabowicz; Revenues: Alyssa Trzeszkowski; Impact on State, local, and   
   tribal governments: Pepper Santalucia.                                  
      Estimate approved by: Robert A. Sunshine, Deputy Assistant Director  
   for Budget Analysis.                                                    
                                 FEDERAL MANDATES STATEMENT                       
      The Committee adopts as its own the estimate of Federal mandates     
   prepared by the Director of the Congressional Budget Office pursuant to 
   section 423 of the Unfunded Mandates Reform Act.                        
                                ADVISORY COMMITTEE STATEMENT                      
      H.R. 695 creates an Advisory Board of the Strategic NET Center for   
   Excellence in Information Security, which is intended to advise the     
   Federal Government on new technologies relating to encryption.          
                             CONSTITUTIONAL AUTHORITY STATEMENT                   
      Pursuant to clause 2(l)(4) of rule XI of the Rules of the House of   
   Representatives, the Committee finds that the Constitutional authority  
   for this legislation is provided in Article I, section 8, clause 3,     
   which grants Congress the power to regulate commerce with foreign       
   nations, among the several States, and with the Indian tribes.          
                            APPLICABILITY TO LEGISLATIVE BRANCH                   
      The Committee finds that the legislation does not relate to the terms
   and conditions of employment or access to public services or            
   accommodations within the meaning of section 102(b)(3) of the           
   Congressional Accountability Act.                                       
                       SECTION-BY-SECTION ANALYSIS OF THE LEGISLATION             
                          SECTION 1. SHORT TITLE                         
      Section 1 provides that H.R. 695 may be cited as the ``Security and  
   Freedom Through Encryption (SAFE) Act.''                                
                  SECTION 2. SALE AND USE OF ENCRYPTION                  
      Subsection 2(a) of H.R. 695 creates a new chapter 125 in title 18 of 
   the United States Code. This chapter 125 would include new sections 2801
   012.                                                                    
           Section 2801. Definitions                                               
      New section 2801 provides for definitions of terms to be used in the 
   chapter. Many of the definitions used are explicitly taken from the     
   definitions in the existing Federal wiretap statute, 18 U.S.C. Sec. 2510
   et seq. Several new definitions are added, however, including           
   ``encrypt'' and ``encryption,'' which generally refer to the encoding of
   a communication using mathematical formulas in order to preserve the    
   confidentiality of such communication.                                  
           Section 2802. Assistance for law enforcement                            
      New section 2802 contains several subsections regarding domestic     
   encryption issues. Subsection 2802(a) establishes within the Department 
   of Justice a National Electronic Technologies Center (referred to as the
   ``NET Center''). The primary purpose of the NET Center is to provide    
   technical assistance to law enforcement agencies so that they may cope  
   with new technology challenges. Specifically, the NET Center will be    
   responsible for serving as a national center for Federal, State, and    
   local law enforcement authorities for information and assistance        
   regarding decryption. It will also serve as a national center where     
   industry and government can gather to exchange information regarding    
   data security. In addition, the NET Center will be required to: (1)     
   examine encryption techniques and methods to facilitate the ability of  
   law enforcement to gain access to plaintext of communications and       
   electronic information; (2) conduct research to improve law             
   enforcement's means of access to encrypted communications; (3) determine
   whether other techniques can be used to help law enforcement access     
   communications and electronic information; and (4) obtain information   
   regarding the most current computer hardware, computer software, and    
   telecommunications equipment to understand how best to access           
   communications.                                                         
      Administratively, the Attorney General will appoint the Director of  
   the NET Center and the Director will be responsible for hiring personnel
   that he or she determines is necessary to carry out the duties of the   
   NET Center. Other Federal Government agencies may also ``loan''         
   personnel to the NET Center or provide facilities, information, and     
   other non-personnel resources. In addition, the NET Center may accept   
   donations in the form of money, services, or property from the private  
   sector to help it function. Such donations shall be deposited in the    
   Treasury and shall be available for disbursement upon order of the      
   Director.                                                               
      Within two months after the date of enactment of this Act, the       
   Attorney General will be required to develop a plan for the             
   establishment of the NET Center. The plan must be published in the      
   Federal Register and must identify: the physical location of the NET    
   Center; equipment, software, and personnel necessary for the NET Center 
   to function; the amount of funding necessary to establish and operate   
   the NET Center; and sources of probable funding for the NET Center.     
      In addition, subsection 2802(a) creates an Advisory Board of the     
   Strategic NET Center for Excellence in Information Security, which is   
   intended to advise the government on new technologies relating to       
   encryption. The Attorney General is required to appoint a chairman of   
   the Advisory Board and members of the Advisory Board must have technical
   expertise in the field of encryption, decryption, electronic            
   communication, information security, electronic commerce, or law        
   enforcement. More specifically, the purpose of the Advisory Board is to 
   advise the NET Center and the Federal Government regarding new and      
   emerging technologies relating to encryption and decryption of          
   communications and electronic information.                              
      Subsection 2802(b) clarifies that it is lawful for any person in the 
   United States to use any encryption product, regardless of the          
   encryption algorithm selected, key length chosen, implementation        
   technique used, or medium used. This subsection also prohibits the      
   adoption of Federal or State law or regulation that would condition the 
   issuance of certificates of authentication for any encryption product   
   upon any escrowing or other sharing of private encryption keys, whether 
   the escrowing is done with private agents or government entities.       
   Domestic laws or regulations also could not establish a licensing,      
   labeling, or other regulatory scheme for any encryption product that    
   requires key escrow as a condition of licensing or regulatory approval. 
           Section 2803. Freedom to sell encryption                                
      New section 2803 states that it is legal for any person in the United
   States to sell in interstate commerce encryption products using any form
   of encryption regardless of the algorithm, key length, or technique     
   used. The Committee intends that sections 2802 and 2803 should be read  
   as limitations on government power. They should not be read as          
   overriding otherwise lawful employer policies concerning employee use of
   the employer's computer system, nor as limiting the employer's otherwise
   lawful means for remedying violations of those policies.                
           Section 2804. Prohibition on mandatory key escrow                       
      New section 2804 states that no person in lawful possession of a key 
   used to encrypt or decrypt a communication or information can be        
   required by Federal or State law to relinquish control of that key to   
   another person. This section is meant to be consistent with subsection  
   2802(b) regarding limitations on the escrowing of keys. An exception is 
   provided, however, for law enforcement. That is, a law enforcement      
   officer or any member of the intelligence community acting pursuant to  
   lawful authority may require a party to release a key in order to gain  
   access to encrypted communications or information.                      
                      Section 2805. Unlawful use of encryption in furtherance of a 
           criminal act                                                            
      New section 2805 makes it a crime to encrypt incriminating           
   communications with the intent to conceal information in order to avoid 
   detection by law enforcement agencies or prosecution. A person found    
   guilty of this offense may be fined, imprisoned for not more than 10    
   years, or both. Second and subsequent offenses may result in a fine,    
   imprisonment of not more than 20 years, or both.                        
           Section 2806. Liability limitations                                     
      New section 2806 protects persons from being subject to criminal or  
   civil liability if they provide access to the plaintext of an encrypted 
   communications or electronic information for the benefit of any law     
   enforcement official or authorized government entity, so long as these  
   entities operate through the appropriate judicial process.              
      Subsection 2(b) requires the National Telecommunications and         
   Information Administration of the Department of Commerce to conduct a   
   study and prepare and submit an encryption report to the Congress and   
   the President. The report must determine what effect a mandatory key    
   recovery system would have on electronic commerce, data security,       
   privacy, and law enforcement activities. The report must also assess    
   other possible methods for providing access to encrypted communications 
   and information to further law enforcement activities.                  
      Subsection 2(c) of H.R. 695 provides for a conforming amendment to   
   the table of chapters in title 18, United States Code.                  
                     SECTION 3. EXPORTS OF ENCRYPTION                    
      Subsection 3(a) of H.R. 695 amends the Export Administration Act of  
   1979 by creating a new subsection (g) to 50 U.S.C. App. Sec. 2416. New  
   subsection (g)(1) would place all encryption products, except those     
   specifically designed or modified for military use, under the exclusive 
   jurisdiction of the Secretary of Commerce (the Secretary).              
      New subsection (g)(2) allows encryption products, such as encryption 
   software and computing devices that include encryption software, that   
   are generally available or in the public domain, such as mass-market    
   products, to be exported pursuant to a general license exception. New   
   subsections (g)(3) and (g)(4) permit the export of encryption products  
   that are not generally considered mass-market products and consequently,
   require a license for export. The Secretary retains the authority to    
   disapprove a license request for the export of software if there is     
   substantial evidence that it will be put to military or terrorist uses  
   or that it will be re-exported without U.S. authorization. New          
   subsection (g)(5) provides definitions.                                 
      Subsection 3(b) of H.R. 695 provides that for purposes of carrying   
   out the amendment made by subsection 3(a), the Export Administration Act
   shall be deemed to be in effect. This statement is necessary because    
   Congress allowed the Export Administration Act to lapse in 1994. To     
   date, it has not been renewed, and its policies have been continued by  
   Executive Order.                                                        
  SECTION 4. TREATMENT OF ENCRYPTION IN INTERSTATE AND FOREIGN COMMERCE  
      Section 4 requires the Secretary of Commerce to undertake certain    
   activities in order to promote the export of U.S. encryption products in
   the global market. Through such instruction to the Secretary of         
   Commerce, the Committee on Commerce intends to promote robust           
   participation by U.S. firms in the development of global electronic     
   commerce.                                                               
      Subsection 4(a) requires the Secretary to complete an inquiry within 
   180 days of the enactment of this Act to identity both domestic and     
   foreign impediments to trade in encryption products and services. Such  
   an inquiry would include the identification of import restrictions      
   maintained by other countries that constitute unfair barriers. The      
   inquiry would also include an examination of U.S. regulations, such as  
   export restrictions, that may actually impede trade in encryption       
   products and services.                                                  
      Subsection 4(b) requires the Secretary to adopt regulations within   
   one year of the Act's enactment that are intended to reduce foreign and 
   domestic impediments to encryption products and services. The           
   regulations must be designed to promote the sale in foreign markets of  
   U.S. encryption products and services, including through strengthening  
   the competitiveness of U.S. providers of such products and services.    
      Subsection 4(c)(1) requires that upon completion of the six-month    
   inquiry into foreign and domestic impediments to trade in encryption    
   products and services, the Secretary shall submit a report to the       
   President on his or her findings. The report must include a             
   determination by the Secretary on what impediments may require          
   international negotiation to reduce.                                    
      Subsection 4(c)(2) requires the President to negotiate with other    
   countries for agreements designed to promote encryption products and    
   services and to achieve mutual recognition of export controls. Export   
   controls may be designed to preserve countries' national security,      
   safeguard privacy interests, and prevent commercial espionage. Mutual   
   recognition of export controls will promote the sale in foreign commerce
   of U.S. encryption products and services by facilitating a common       
   approach by the U.S. and our trading partners. Subsection 4(c)(2) also  
   enables the President to consider a country's refusal to negotiate such 
   agreements when considering U.S. participation in an assistance or      
   cooperation program with that country. Finally, the subsection requires 
   the President to submit a report to the Congress regarding the status of
   his efforts on encryption not later than December 31, 2000.             
   Subsection 4(d) provides definitions.                                   
             SECTION 5. EFFECT ON LAW ENFORCEMENT ACTIVITIES             
      Subsection 5(a) requires the Attorney General to compile information 
   on instances in which encryption has interfered with, impeded, or       
   obstructed the ability of the Department of Justice to enforce Federal  
   criminal law and to maintain that information in classified form.       
   Subsection 5(b) requires that the Attorney General shall make the       
   information compiled under subsection 5(a), including an unclassified   
   summary, available to Members of Congress upon request.                 
                   CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED          
     In compliance with clause 3 of rule XIII of the Rules of the House of
  Representatives, changes in existing law made by the bill, as reported, 
  are shown as follows (new matter is printed in italics and existing law 
  in which no change is proposed is shown in roman):                      
                                TITLE 18, UNITED STATES CODE                      
         * * * * * * *                                                           
          PART I--CRIMES                                                          
 Chap.                                                                   
 Sec.                                                                    
         1.   General provisions                                                
        1                                                                      
         2.   Aircraft and motor vehicles                                       
        31                                                                     
         * * * * * * *                                                           
         125.  Encrypted wire and electronic information                        
        2801                                                                   
         * * * * * * *                                                           
                   CHAPTER 125--ENCRYPTED WIRE AND ELECTRONIC INFORMATION         
      2801. Definitions.                                                      
      2802. Assistance for law enforcement.                                   
      2803. Freedom to sell encryption.                                       
      2804. Prohibition on mandatory key escrow.                              
      2805. Unlawful use of encryption in furtherance of a criminal act.      
      2806. Liability limitations.                                            
          2801. Definitions                                                       
   As used in this chapter--                                              
       (1) the terms ``person'', ``State'', ``wire communication'',        
   ``electronic communication'', and ``investigative or law enforcement    
   officer'' have the meanings given those terms in section 2510 of this   
   title;                                                                  
       (2) the terms ``encrypt'' and ``encryption'' refer to the scrambling
   of wire communications, electronic communications, or electronically    
   stored information, using mathematical formulas or algorithms in order  
   to preserve the confidentiality, integrity, or authenticity of, and     
   prevent unauthorized recipients from accessing or altering, such        
   communications or information;                                          
       (3) the term ``key'' means the variable information used in a       
   mathematical formula, code, or algorithm, or any component thereof, used
   to decrypt wire communications, electronic communications, or           
   electronically stored information, that has been encrypted; and         
    (4) the term ``United States person'' means--                          
    (A) any United States citizen;                                         
    (B) any other person organized under the laws of any State; and        
       (C) any person organized under the laws of any foreign country who  
   is owned or controlled by individuals or persons described in           
   subparagraphs (A) and (B).                                              
          2802. Assistance for law enforcement                                    
   (a)  National Electronic Technologies Center.--                        
       (1) Establishment.--There is established in the Department of       
   Justice a National Electronic Technologies Center (in this subsection   
   referred to as the ``NET Center'').                                     
       (2) Director.--The NET Center shall have a Director, who shall be   
   appointed by the Attorney General.                                      
    (3)  Duties.--The duties of the NET Center shall be--                  
       (A) to serve as a center for Federal, State, and local law          
   enforcement authorities for information and assistance regarding        
   decryption and other access requirements;                               
       (B) to serve as a center for industry and government entities to    
   exchange information and methodology regarding information security     
   techniques and technologies;                                            
       (C) to examine encryption techniques and methods to facilitate the  
   ability of law enforcement to gain efficient access to plaintext of     
   communications and electronic information;                              
       (D) to conduct research to develop efficient methods, and improve   
   the efficiency of existing methods, of accessing plaintext of           
   communications and electronic information;                              
       (E) to investigate and research new and emerging techniques and     
   technologies to facilitate access to communications and electronic      
   information, including--                                                
    (i) reverse-steganography;                                             
       (ii) decompression of information that previously has been          
   compressed for transmission; and                                        
    (iii) de-multiplexing; and                                             
       (F) to obtain information regarding the most current hardware,      
   software, telecommunications, and other capabilities to understand how  
   to access information transmitted across networks.                      
       (4) Equal access.--State and local law enforcement agencies and     
   authorities shall have access to information, services, resources, and  
   assistance provided by the NET Center to the same extent that Federal   
   law enforcement agencies and authorities have such access.              
       (5) Personnel.--The Director may appoint such personnel as the      
   Director considers appropriate to carry out the duties of the NET       
   Center.                                                                 
       (6) Assistance of other federal agencies.--Upon the request of the  
   Director of the NET Center, the head of any department or agency of the 
   Federal Government may, to assist the NET Center in carrying out its    
   duties under this subsection--                                          
       (A) detail, on a reimbursable basis, any of the personnel of such   
   department or agency to the NET Center; and                             
       (B) provide to the NET Center facilities, information, and other    
   non-personnel resources.                                                
       (7) Private industry assistance.--The NET Center may accept, use,   
   and dispose of gifts, bequests, or devises of money, services, or       
   property, both real and personal, for the purpose of aiding or          
   facilitating the work of the Center. Gifts, bequests, or devises of     
   money and proceeds from sales of other property received as gifts,      
   bequests, or devises shall be deposited in the Treasury and shall be    
   available for disbursement upon order of the Director of the NET Center.
    (8)  Advisory board.--                                                 
       (A) Establishment.--There is established the Advisory Board of the  
   Strategic NET Center for Excellence in Information Security (in this    
   paragraph referred to as the ``Advisory Board''), which shall be        
   comprised of members who have the qualifications described in           
   subparagraph (B) and who are appointed by the Attorney General. The     
   Attorney General shall appoint a chairman of the Advisory Board.        
       (B) Qualifications.--Each member of the Advisory Board shall have   
   experience or expertise in the field of encryption, decryption,         
   electronic communication, information security, electronic commerce, or 
   law enforcement.                                                        
       (C) Duties.--The duty of the Advisory Board shall be to advise the  
   NET Center and the Federal Government regarding new and emerging        
   technologies relating to encryption and decryption of communications and
   electronic information.                                                 
       (9) Implementation plan.--Within 2 months after the date of the     
   enactment of the Security and Freedom Through Encryption (SAFE) Act, the
   Attorney General shall, in consultation and cooperation with other      
   appropriate Federal agencies and appropriate industry participants,     
   develop and cause to be published in the Federal Register a plan for    
   establishing the NET Center. The plan shall--                           
       (A) specify the physical location of the NET Center and the         
   equipment, software, and personnel resources necessary to carry out the 
   duties of the NET Center under this subsection;                         
       (B) assess the amount of funding necessary to establish and operate 
   the NET Center; and                                                     
       (C) identify sources of probable funding for the NET Center,        
   including any sources of in-kind contributions from private industry.   
     (b) Freedom of Use.--Subject to section 2805, it shall be lawful for 
  any person within any State, and for any United States person in a      
  foreign country, to use any encryption, regardless of the encryption    
  algorithm selected, encryption key length chosen, or implementation     
  technique or medium used. No Federal or State law or regulation may     
  condition the issuance of certificates of authentication or certificates
  of authority for any encryption product upon any escrowing or other     
  sharing of private encryption keys, whether with private agents or      
  government entities, or establish a licensing, labeling, or other       
  regulatory scheme for any encryption product that requires key escrow as
  a condition of licensing or regulatory approval.                        
          2803. Freedom to sell encryption                                        
     Subject to section 2805, it shall be lawful for any person within any
  State to sell in interstate commerce any encryption, regardless of the  
  encryption algorithm selected, encryption key length chosen, or         
  implementation technique or medium used.                                
          2804. Prohibition on mandatory key escrow                               
     (a) Prohibition.--No person in lawful possession of a key to         
  encrypted communications or information may be required by Federal or   
  State law to relinquish to another person control of that key.          
     (b) Exception for Access for Law Enforcement Purposes.--Subsection   
  (a) shall not affect the authority of any investigative or law          
  enforcement officer, or any member of the intelligence community as     
  defined in section 3 of the National Security Act of 1947 (50 U.S.C.    
  401a), acting under any law in effect on the effective date of this     
  chapter, to gain access to encrypted communications or information.     
          2805. Unlawful use of encryption in furtherance of a criminal act       
     Any person who, in the commission of a felony under a criminal       
  statute of the United States, knowingly and willfully encrypts          
  incriminating communications or information relating to that felony with
  the intent to conceal such communications or information for the purpose
  of avoiding detection by law enforcement agencies or prosecution--      
       (1) in the case of a first offense under this section, shall be     
   imprisoned for not more than 10 years, or fined in the amount set forth 
   in this title, or both; and                                             
       (2) in the case of a second or subsequent offense under this        
   section, shall be imprisoned for not more than 20 years, or fined in the
   amount set forth in this title, or both.                                
          2806. Liability limitations                                             
     No person shall be subject to civil or criminal liability for        
  providing access to the plaintext of encrypted communications or        
  electronic information to any law enforcement official or authorized    
  government entity, pursuant to judicial process.                        
         * * * * * * *                                                           
                     SECTION 17 OF THE EXPORT ADMINISTRATION ACT OF 1979          
                                    EFFECT ON OTHER ACTS                          
    Sec.  17. (a) * * *                                                   
         * * * * * * *                                                           
   (g)  Computers and Related Equipment.--                                
       (1) General rule.--Subject to paragraphs (2), (3), and (4), the     
   Secretary shall have exclusive authority to control exports of all      
   computer hardware, software, and technology for information security    
   (including encryption), except that which is specifically designed or   
   modified for military use, including command, control, and intelligence 
   applications.                                                           
       (2) Items not requiring licenses.--No validated license may be      
   required, except pursuant to the Trading With The Enemy Act or the      
   International Emergency Economic Powers Act (but only to the extent that
   the authority of such Act is not exercised to extend controls imposed   
   under this Act), for the export or reexport of--                        
    (A) any software, including software with encryption capabilities--    
       (i) that is generally available, as is, and is designed for         
   installation by the purchaser; or                                       
       (ii) that is in the public domain for which copyright or other      
   protection is not available under title 17, United States Code, or that 
   is available to the public because it is generally accessible to the    
   interested public in any form; or                                       
       (B) any computing device solely because it incorporates or employs  
   in any form software (including software with encryption capabilities)  
   exempted from any requirement for a validated license under subparagraph
   (A).                                                                    
       (3) Software with encryption capabilities.--The Secretary shall     
   authorize the export or reexport of software with encryption            
   capabilities for nonmilitary end uses in any country to which exports of
   software of similar capability are permitted for use by financial       
   institutions not controlled in fact by United States persons, unless    
   there is substantial evidence that such software will be--              
       (A) diverted to a military end use or an end use supporting         
   international terrorism;                                                
    (B) modified for military or terrorist end use; or                     
       (C) reexported without any authorization by the United States that  
   may be required under this Act.                                         
       (4) Hardware with encryption capabilities.--The Secretary shall     
   authorize the export or reexport of computer hardware with encryption   
   capabilities if the Secretary determines that a product offering        
   comparable security is commercially available outside the United States 
   from a foreign supplier, without effective restrictions.                
    (5)  Definitions.--As used in this subsection--                        
       (A) the term ``encryption'' means the scrambling of wire or         
   electronic information using mathematical formulas or algorithms in     
   order to preserve the confidentiality, integrity, or authenticity of,   
   and prevent unauthorized recipients from accessing or altering, such    
   information;                                                            
       (B) the term ``generally available'' means, in the case of software 
   (including software with encryption capabilities), software that is     
   offered for sale, license, or transfer to any person without            
   restriction, whether or not for consideration, including, but not       
   limited to, over-the-counter retail sales, mail order transactions,     
   phone order transactions, electronic distribution, or sale on approval; 
       (C) the term ``as is'' means, in the case of software (including    
   software with encryption capabilities), a software program that is not  
   designed, developed, or tailored by the software publisher for specific 
   purchasers, except that such purchasers may supply certain installation 
   parameters needed by the software program to function properly with the 
   purchaser's system and may customize the software program by choosing   
   among options contained in the software program;                        
       (D) the term ``is designed for installation by the purchaser''      
   means, in the case of software (including software with encryption      
   capabilities) that--                                                    
       (i) the software publisher intends for the purchaser (including any 
   licensee or transferee), who may not be the actual program user, to     
   install the software program on a computing device and has supplied the 
   necessary instructions to do so, except that the publisher may also     
   provide telephone help line services for software installation,         
   electronic transmission, or basic operations; and                       
       (ii) the software program is designed for installation by the       
   purchaser without further substantial support by the supplier;          
       (E) the term ``computing device'' means a device which incorporates 
   one or more microprocessor-based central processing units that can      
   accept, store, process, or provide output of data; and                  
       (F) the term ``computer hardware'', when used in conjunction with   
   information security, includes, but is not limited to, computer systems,
   equipment, application-specific assemblies, modules, and integrated     
   circuits.                                                               
                                      DISSENTING VIEWS                            
      While we are supportive of the stated goals of H.R. 695, particularly
   with respect to the promotion of U.S. technology exports, we have       
   serious reservations about the bill as reported. It is our view that the
   provisions ultimately agreed to by the Committee with regard to the     
   technological requirements of law enforcement and national security     
   agencies are thoroughly inadequate to the missions at hand.             
      We do not question the importance of encryption technology for       
   purposes of protecting electronic commerce, consumer privacy, and       
   proprietary information, nor do we doubt the value of enhancing U.S.    
   access to foreign markets for these products and services. We have great
   confidence in the ability of American firms to develop the most         
   impenetrable encryption products in the world and market them globally. 
      Indeed, it is our very faith in the technological prowess of U.S.    
   companies which leads us to conclude that authentic law enforcement and 
   national security safeguards must be included in this legislation. It   
   must be recognized that the proliferation of advanced encryption        
   technology poses a dire threat to U.S. anti-crime, anti-terrorism, and  
   counter-espionage efforts. To fail to address this reality is to fail in
   or solemn responsibility to protect the lives and safety of the citizens
   of this country.                                                        
      Powerful encryption, in criminal hands or in the hands of enemies of 
   the United States, can be turned to ill purposes with devastating       
   consequences for members of a free society. An outlaw organization with 
   the ability to communicate and store data without fear of detection is a
   significantly more dangerous entity. Organized crime syndicates, drug   
   cartels, pedophile rings and terrorist organizations have already begun 
   to utilize encryption technology to conceal their activities from       
   investigatory agencies.                                                 
      It is our opinion that an updated U.S. encryption policy must allow  
   for law enforcement and security agency access to the unscrambled text  
   of encrypted communications and data, pursuant to legal authorization.  
   We wish to clarify that we do not seek any additional authority for     
   government agencies. We merely seek to ensure that police departments   
   and security agencies will continue to have intelligible access to      
   evidence to which they are legally entitled.                            
      In the context of H.R. 695, this means that encryption products and  
   services must be made recoverable. There is no other way to ensure      
   timely access to encrypted evidence. Timely recovery is crucial in the  
   investigation and prevention of crime and acts of terror; the bill as   
   reported will not achieve this. Claims to the contrary, unfortunately,  
   are false.                                                              
      Included with these views are letters submitted by organizations and 
   individuals whose sentiments on these matters comport with our own.     
    Thomas J. Manton.                                                       
    J. Dennis Hastert.                                                      
    Michael G. Oxley.                                                       
    Greg Ganske.                                                            
       U.S. Department of Justice,                                             
       Federal Bureau of Investigation,                                        
       Washington, DC, September 24, 1997.                                     
          Hon.  Thomas J. Bliley,  Jr.                Chairman, Committee on Commerce,
       Rayburn House Office Building, Washington, DC.                          
       Dear Mr. Chairman: We are writing you today on behalf of the entire 
   law enforcement community to continue to urge you and the Members of the
   House Commerce Committee to support the Oxley/Manton Amendment to H.R.  
   695 during your Committee's mark-up of the bill today.                  
      In addition, we are aware that Congressmen Markey and White plan to  
   offer an alternative amendment to the Oxley/Manton Amendment during the 
   mark-up that has been represented to meet law enforcement's decryption  
   needs by creating a ``National Electronic Technologies Center'' to      
   foster the ``exchange of information and expertise'' between government 
   and industry. Let us assure you that the adoption of the Markey/White   
   Amendment in lieu of the Oxley/Manton Amendment will not address the law
   enforcement and public safety issues we have raised and would serve to  
   provide an illusion and false sense of security to the American people  
   that law enforcement's public safety needs in this area have been       
   effectively addressed. In reality the adoption of the Markey/White      
   Amendment will actually continue to allow for the proliferation of      
   unbreakable encryption products for use by the general public regardless
   of their adverse impact on public safety and national security.         
      The exchange of ideas between government and industry, which is the  
   purpose of the center, is already occurring and has been for some time. 
   The problem remains that absent an approach like Oxley/Manton, no       
   technical solution for law enforcement is foreseeable. NSA agrees with  
   our assessment. Having a central point of information and expertise     
   might be helpful for sharing what is known but it will not solve the    
   problem. Neither will enhanced criminal penalties.                      
      Law enforcement continues to support the adoption of a balanced      
   encryption policy, one that meets the needs of industry for robust      
   encryption to protect sensitive information and the privacy of          
   communications while at the same time meeting law enforcement's         
   immediate decryption needs to protect public safety when such robust    
   encryption products are used to protect serious criminal activity. Law  
   enforcement is in unanimous agreement that the widespread availability  
   and use of unbreakable robust encryption products for use in the United 
   States will ultimately devastate our ability to protect American        
   citizens from violent criminals, international drug lords and prevent   
   acts of terrorism directed at innocent Americans. It is for this reason 
   that we are calling for a balanced solution to this problem. We believe 
   that the provisions of the Oxley/Manton Amendment strike that balance   
   and we urge your support for its adoption during today's mark-up.       
   Sincerely yours,                                                        
    Thomas Constantine,                                                     
      Administrator, Drug Enforcement Administration.                        
    Raymond W. Kelly,                                                       
      Undersecretary for Enforcement, U.S. Department of the Treasury.       
    Louis J. Freeh,                                                         
      Director.                                                              
       National Sheriffs' Association,                                         
       Alexandria, VA, September 23, 1997.                                     
          Hon.  Thomas J. Bliley,  Jr.                Chairman, Committee on Commerce,
       Rayburn House Office Building, Washington, DC.                          
       Dear Mr. Chairman: I am writing to you today to urge you to support 
   the Oxley Amendment to H.R. 695, the Security and Freedom Through       
   Encryption Act. Without this amendment, H.R. 695 fails to protect the   
   needs of law enforcement.                                               
      As you know, the access to intercepted communications or data when   
   lawful authority exists is a fundamental tool that law enforcement      
   employs in the fight against crime. Representative Oxley's amendment    
   preserves that tool and enables law enforcement to thwart sophisticated 
   criminal intentions. Criminals working with encryption technology can   
   render traditional electronic surveillance methods obsolete and         
   investigations are crippled without the ability to break the code.      
   Meaningful encryption legislation has to ensure that law enforcement can
   gain timely access to the plaintext of encrypted conversations and      
   information by established legal procedures.                            
      The National Sheriffs' Association supports the actions taken by the 
   Committee on National Security and the Permanent Select Committee on    
   Intelligence to give authorities a tool to use against terrorists and   
   other criminals who want to hide information. Without adequate          
   safeguards, H.R. 695 will allow the use of powerful encryption, which   
   will deprive law enforcement of the ability to ensure public safety and 
   create a haven for the computer literate criminal.                      
      Thank you for your consideration and we look forward to working with 
   you to develop sound national policy on encryption. If I can provide you
   with any additional information, please do not hesitate to call on me at
   the National Sheriffs' Association at 1 800 424 7827.                   
   Sincerely,                                                              
         Fred W. Scoralick,  President.                                         
       National District Attorneys Association,                                
       Alexandria, VA, September 19, 1997.                                     
          Hon.  Michael G. Oxley,                Rayburn House Office Building,
       Washington, DC.                                                         
       Dear Congressman Oxley: The National District Attorneys Association 
   has, and continues to oppose H.R. 695, the ``Security and Freedom       
   Through Encryption (SAFE) Act,'' as introduced and now before the       
   Committee for review. As local prosecutors, we are extremely concerned  
   about the serious threat posed by the use of robust encryption products 
   that do not allow for court approved law enforcement access and timely  
   decryption that has been encrypted to carry out criminal activity (court
   authorized wiretaps or court authorized search and seizure). We do      
   support a balanced encryption policy that satisfies both the commercial 
   needs of industry for robust encryption while at the same time          
   satisfying law enforcement's public safety needs. The Amendment offered 
   by you and Mr. Manton achieves this balance.                            
      At the onset, we need to make perfectly clear, both to the Congress  
   and to the American people that we seek no new authorities to intrude on
   Constitutionally protected rights of privacy nor do we seek any new     
   authority to search for and seize evidence. Supporters of an unfettered 
   encryption policy have made much of a fear for abuse of police powers   
   and have lead many to believe that a decryption requirement will lead to
   random eavesdropping by police on our communications. This is far from  
   the truth. Law enforcement does not seek any new authorities; we only   
   seek the technological capability to preserve the current authority.    
      At Federal, State and local levels of law enforcement there are      
   strictly observed sets of judicial and administrative requirements that 
   must be adhered to obtain a judicial authorization to intercept a       
   communication and to continue such interceptions. Among these           
   requirements must be a showing that there is probable cause to believe  
   that criminal enterprise is on going and that all other means of        
   obtaining evidence are to no avail. When a judge does authorize an      
   interception there is frequently a requirement that the authorization   
   must be reviewed periodically by the judge and there is always the      
   mandate that any communications pertaining to criminal activity may not 
   be monitored.                                                           
      We all recognize that encryption technology can be extremely         
   beneficial when used legitimately to protect commercially sensitive     
   information and private communications. The potential use, however, of  
   such encryption products by criminals and terrorists to conceal their   
   criminal communications and information from law enforcement poses an   
   extremely serious threat to the public safety of our country.           
      The introduction of digitally-based telecommunications technologies, 
   as well as the widespread use of computers and computer networks having 
   encryption capabilities, is facilitating the development and production 
   of affordable and robust encryption products for the private sector.    
   American industrial concerns are not misplaced in desiring to enhance   
   markets for their products, but this must never be accomplished at the  
   expense of the lives and safety of the American people.                 
      We are obligated, in the interests of our communities to oppose any  
   efforts that endanger the people we have sworn to protect. Your         
   amendment is an appropriate legislative solution to this complex problem
   in addressing both the needs of industry while at the same time         
   satisfying the requirements of law enforcement as they pertain to       
   protecting the American people. We most strongly urge the members of the
   Commerce Committee to support the Oxley/Manton Amendment.               
   Sincerely,                                                              
         William L. Murphy,  President.                                         
                          NATIONAL DISTRICT ATTORNEYS ASSOCIATION                 
                          resolution--encryption                         
    Whereas, the introduction of digitally-based telecommunications       
  technologies as well as the widespread use of computers and computer    
  networks having encryption capabilities are facilitating the development
  and production of strong, affordable encryption products and services   
  from private sector use; and                                            
    Whereas, on one hand the use of strong encryption products and        
  services are extremely beneficial when used legitimately to protect     
  commercially sensitive information and communications. On the other     
  hand, the potential use of strong encryption products and services that 
  do not allow for timely law enforcement decryption by a vast array of   
  criminals and terrorist to conceal their criminal communications and    
  information from law enforcement poses an extremely serious threat to   
  public safety; and                                                      
    Whereas, the law enforcement community is extremely concerned about   
  the serious threat posed by the use of these strong encryption products 
  and services that do not allow for authorization (court-authorized      
  wiretaps or court-authorized search and seizure); and                   
    Whereas, law enforcement fully supports a balanced encryption policy  
  that satisfies both the commercial needs of industry for strong         
  encryption while at the same tie satisfying law enforcement's public    
  safety needs for the timely decryption of encrypted criminal            
  communications and information; and                                     
    Whereas, law enforcement has found that strong, key recovery          
  encryption products and services are clearly the best way, and perhaps  
  the only way, to achieve both the goals of industry and law enforcement;
  and                                                                     
    Whereas, government representatives have been working with industry to
  encourage the voluntary development, sale, and use of key recovery      
  encryption products and services in its pursuit of a balanced encryption
  policy;                                                                 
       Be it resolved, that the National District Attorneys Association    
   supports and encourages the development and adoption of a balanced      
   encryption policy that encourages the development, sale, and use of key 
   recovery encryption products and services, both domestically and abroad.
   We believe that this approach represents a policy that appropriately    
   addresses both the commercial needs of industry while at the same time  
   satisfying law enforcement's public safety needs.                       
   Adopted by the Board of Directors, November 16, 1996, Naples, Florida.  
       International Association of Chiefs of Police,                          
       Alexandria, VA, September 22, 1997.                                     
          Hon.  Michael G. Oxley,                 Rayburn House Office Building, House of Representatives,
       Washington, DC.                                                         
       Dear Representative Oxley: On behalf of the International           
   Association of Chiefs of Police (IACP), I am writing to express our     
   strong support for your amendment to H.R. 695, the Security and Freedom 
   though Encryption (SAFE) Act. Your amendment, by requiring that no      
   encryption technology be sold unless it contains features that would    
   provide for immediate access no encrypted information, protects the     
   ability of law enforcement agencies to perform court authorized         
   electronic surveillance and the search and seizure of information stored
   in computers.                                                           
      Throughout the debate on encryption legislation, IACP has stressed   
   that need for provisions that would provide law enforcement with the    
   ability to gain timely access to encrypted conversations and            
   information. In its current form, II.R. 695 does not meet this standard.
   The passage of H.R. 695, without the adoption of the Oxley/Manton       
   amendment, would severely weaken the ability of law enforcement to      
   combat society's most dangerous criminals.                              
      Thank you for your leadership on this issue of vital importance to   
   law enforcement. If IACP can be of further assistance on this issue,    
   please call IACP's Legislative Department at 703/836 6767 ext. 211.     
   Sincerely,                                                              
         Darrell L. Sanders,  President.                                        
       International Association of Chiefs of Police,                          
       Alexandria, VA, September 24, 1997.                                     
       Dear Commerce Committee Member: It is the understanding of the      
   International Association of Chiefs of Police (IACP) that an amendment  
   may be offered at today's mark-up of H.R. 695 that would call for the   
   establishment of a commission to study the issue of law enforcement     
   access to encrypted information. IACP is strongly opposed to any        
   amendment that would delay providing law enforcement with access to     
   encrypted criminal information. Any delay is a victory for those        
   elements in society who wish to use encryption technology for criminal  
   purposes.                                                               
      IACP believes that action must be taken immediately to prevent the   
   further proliferation of inaccessible encryption technology. The        
   establishment of a commission will serve no purpose other than to       
   exacerbate an already troubling situation facing law enforcement.       
      IACP strongly supports the Oxley/Manton Amendment. The Oxley/Manton  
   Amendment, by requiring that no encryption technology be sold unless it 
   contains features that provide for immediate access to information      
   encrypted in the furtherance of criminal activity, protects the ability 
   of law enforcement agencies to perform court authorized electronic      
   surveillance and the search and seizure of information stored in        
   computers.                                                              
      Throughout the debate on encryption legislation, IACP has stressed   
   that need for provisions that would provide law enforcement with the    
   ability to gain timely access to encrypted conversations and information
   that threaten public safety. In its current form, H.R. 695 does not meet
   this standard. The passage of H.R. 695, without the adoption of the     
   Oxley/Manton amendment would severely weaken the ability of law         
   enforcement to combat society's most dangerous criminals. Therefore,    
   IACP urges you to support the Oxley/Manton amendment when H.R. 695 is   
   considered by the House Commerce Committee.                             
      Once again, IACP urges you to oppose any attempt to delay law        
   enforcement access to encrypted information and to support the          
   Oxley/Manton Amendment                                                  
   Thank you for your support.                                             
   Sincerely,                                                              
         Darrell L. Sanders,  President.                                        
       Major Cities Chiefs,                                                    
       September 23, 1997.                                                     
          Hon.  Michael G. Oxley,                House of Representatives, Rayburn House Office Building, 
       Washington, DC.                                                         
       Dear Congressman Oxley: The Major Cities Chiefs, an association of  
   police executives representing 48 of the nation's largest jurisdictions,
   strongly supports the proposed Oxley/Manton amendments to H.R. 695.     
   These amendments, which are scheduled to be considered by the Commerce  
   Committee this week, would require both manufacturers of encryption     
   devices and purveyors of encryption services to include features that   
   would allow law enforcement access to encrypted information being used  
   for illegal purposes.                                                   
      Essentially, these amendments are intended to protect the limited,   
   judicially sanctioned wiretap privileges already in effect for law      
   enforcement agencies. They are not intended to enlarge in any way the   
   scope of these privileges. Without these amendments, a criminal suspect 
   could avoid an otherwise-legal wiretap merely by using an encrypted form
   of communication. The legality of a wiretap should be based on the      
   evidence against a suspect, not on the form of communication the suspect
   uses.                                                                   
      Pursuant to these amendments, the Attorney General of the United     
   States would be required to establish a rulemaking procedure within one 
   year of their enactment. This would allow due consideration for he many 
   legitimate uses of encryption. However, we must not compromise a law    
   enforcement tool which has proved invaluable against major drug         
   trafficking operations and other forms of organized crime.              
   Sincerely,                                                              
         Matt L. Rodriguez,  Chairman.                                          
       September 23, 1997.                                                     
          Hon.  Michael G. Oxley,                Committee on Commerce, Rayburn H.O.B.,
       Washington, DC.                                                         
       Dear Mike: As your committee considers the Goodlatte encryption bill
   I would request that you support the Oxley/Manton Amendment.            
      The Goodlatte bill (H.R. 695) was drafted by and for the software    
   industry at the expense of the national security and public safety needs
   of the American people.                                                 
      In order to protect national security and public safety, I would ask 
   that you support the Manton/Oxley amendment which would require the     
   crucial key recovery language similar to the provisions adopted by the  
   Intelligence Committee. If this language is not incorporated into the   
   bill, as the Chairman of the House Rules Committee I will not move the  
   bill to the House floor!                                                
      Thank your for your time and courtesy. Please contact me if you have 
   any questions regarding this matter.                                    
   Sincerely,                                                              
         Gerald B.H. Solomon,  Member of Congress.                              
       Illinois Association of Chiefs of Police,                               
       Springfield, IL, September 23, 1997.                                    
          Hon.  J. Dennis Hastert,                U.S. Representative, 14th District--Yorkville, IL,
       Rayburn House Office Building, Washington, DC.                          
       Dear Congressman Hastert: On Thursday, September 25, 1997, the      
   Committee on Commerce will hear legislation regarding encryption of     
   electronically stored information. The Illinois Association of Chiefs of
   Police membership strongly urges you to vote for the Oxley/Manton       
   Amendment which would allow for the manufacture of encryption products  
   that include features accessible by lawful court ordered interceptions  
   of wire and electronic communications. Such ability is absolutely       
   necessary in this day of international and domestic terrorism, espionage
   and kidnapping.                                                         
   On behalf of the membership, I thank you in advance for your support.   
   Very truly yours,                                                       
         George F. Koertge,  Executive Director.                                
        California Peace Officers' Association,                                
       Sacramento, CA, September 19, 1997.                                     
          Hon.  Michael G. Oxley,                Member, House of Representatives,
       Rayburn House Office Building, Washington, DC.                          
        Re H.R. 695.                                                           
       Dear Congressman Oxley: The House Commerce Committee is scheduled to
   soon hold a mark-up concerning Congressman Goodlatte's Encryption Bill  
   (H.R. 695). As currently drafted, this bill does not address law        
   enforcement's public safety concerns and needs regarding encryption.    
   Your plan to propose an amendment requiring manufacturers of encryption 
   procedures in the United States to include features that would allow for
   immediate access to the plaintext of encrypted data should these        
   products be used for illegal purposes is sincerely appreciated. The     
   Federal Bureau of Investigation needs such a provision to fulfill their 
   criminal investigative mission. Law enforcement agencies can not afford 
   to allow modern technology to outdistance their ability to combat       
   sophisticated criminal enterprises.                                     
      The California Peace Officers' Association supports your proposed    
   amendment. Please feel free to include this letter in any official      
   record of support that you may deem appropriate.                        
   Very truly yours,                                                       
         Greg Cowart,  President.                                               
       Florida Department of Law Enforcement,                                  
       Tallahassee, FL, September 24, 1997.                                    
          Congressman  Michael Oxley,                Rayburn House Office Building,
       Washington, DC.                                                         
        Re H.R. 695 (``Security and Freedom Through Encryption {SAFE} Act'')   
       Dear Congressman Oxley: Attached is a copy of a letter I have sent  
   this morning to Congressman Tom Bliley, Chairman of the House Committee 
   on Commerce supporting your proposed amendment to H.R. 695. The ability 
   of law enforcement to decrypt encrypted communications must be assured  
   in order to help law enforcement remain effective as we deal with the   
   ``age of encryption.''                                                  
      Your position statement found at your Internet site does an excellent
   job of identifying the problem and stressing law enforcement's need for 
   decryption. Given the pending 3:30 p.m. ``markup'' on H.R. 695 this     
   afternoon, I will not expand upon my comments as noted on the attached  
   letter. Suffice it to say that if Congress does not provide for the     
   decryption as needed, the scales of justice will be tilted significantly
   in favor of the criminal element.                                       
      Please do not hesitate to contact me at (850) 488 8771 should you    
   desire additional comment or information from this Department.          
   Sincerely,                                                              
         James T. Moore,  Commissioner.                                         
       Florida Department of Law Enforcement,                                  
       Tallahassee, FL, September 24, 1997.                                    
          Congressman  Tom Bliley,                Chairman, Committee on Commerce, Rayburn House Office Building, Washington, DC.
        Re ``Markup'' at 3:30 p.m. today and H.R. 695                          
       Dear Chairman Bliley: As Executive Director of the Florida          
   Department of Law Enforcement, I am responsible for assuring that our   
   investigations of organized criminal activity, be it drug-trafficking,  
   money laundering, domestic terrorism, or predatory sexual conduct, be   
   conducted legally and with effort focused upon bringing those involved  
   in such conduct to justice.                                             
      Congress, and the legislature of the State of Florida, have both     
   recognized that law enforcement must have the ability to intercept      
   communications of criminals in order to penetrate their criminal        
   enterprises and develop the evidence essential to obtaining a           
   conviction. Both federal and Florida state law currently authorize      
   court-ordered interceptions of wire, oral or electronic communications. 
   The process to obtain such court orders establishes a high level of law 
   enforcement justification, including probable cause to believe a crime  
   has been committed and that the communications will be evidence of the  
   crime, as well as requiring a showing that other less-intrusive         
   investigative techniques have been exhausted or will not produce the    
   necessary evidence. Indeed, the current law has reached a good balance  
   between privacy protections and the need for law enforcement to have the
   tools it must use to effectively fight crime.                           
      Unless the H.R. 695 (the ``Security and Freedom Through Encryption   
   (SAFE) Act'') is modified to provide law enforcement access to encrypted
   materials when law enforcement has obtained court authorization to do   
   so, the ability of law enforcement at the federal and state level to    
   effectively investigate organized criminal enterprises and activity will
   be severely damaged. Encryption is readily available today. Our         
   Department's own experience with encrypted computer evidence is that,   
   absent having access to encryption codes to ``break'' encrypted         
   material, we can decypher only a very small portion of encrypted        
   material. That which remains encrypted cannot be used as evidence       
   against the criminals utilizing the encryption.                         
      Congressmen Oxley and Manton have offered an amendment to H.R. 695   
   that will be considered by your Committee today which will allow real   
   time decryption of encrypted conversations when authorized by a court   
   order and would require at all encryption products manufactured, sold,  
   or imported into the United States be capable of providing decryption of
   communications upon the court-ordered request of law enforcement, while 
   also limiting the release of the seized communications, much like       
   present law provides when a wire, oral or electronic intercept has been 
   made.                                                                   
      The proposed amendment makes no change of Federal (or State) policy. 
   Congress has wisely authorized the interception of communications by    
   court order. The proposed amendment will simply assure that law         
   enforcement may continue to do so in this age of electronic encryption. 
      I urge you and the Committee to support this amendment. To allow law 
   enforcement the real and effective access to decryption of encrypted    
   communications is absolutely essential to the continued effectiveness of
   investigative efforts. Let me be clear, if decryption is not provided   
   for, Federal and State law enforcement agencies will be unable to       
   effectively develop the crucial evidence of conspiracies and other      
   violations of law that have been instrumental in addressing organized   
   crime in its various forms. I trust that the importance and the value of
   the proposed amendment will be recognized by you and the Committee      
   members.                                                                
      Should you desire additional information from me, please do not      
   hesitate to call me at (850) 488 8771. I ask that you share this letter 
   with the Committee as it meets in ``markup'' this afternoon and whenever
   you consider H.R. 695.                                                  
   Sincerely,                                                              
         James T. Moore,  Commissioner.                                         
       City of Cincinnati,                                                     
       Division of Police,                                                     
       September 23, 1997.                                                     
          Congressman  Michael G. Oxley,                Committee on Commerce, Rayburn House Office Bldg.,
       Washington, DC.                                                         
       Dear Congressman: I urge you to strongly consider the needs of law  
   enforcement with respect to H.R. 695 when it comes before your committee
   on September 26, 1997. As it is written, H.R. 695 would permit the      
   marketing of encryption products that would severely impair law         
   enforcement's ability to lawfully gain access to criminal telephone     
   conversations and electronically stored evidence.                       
      Law enforcement recognizes that encryption is necessary for          
   communications security and privacy. We also understand that commercial 
   interests are at stake in marketing of these products. Adequate         
   legislation is the key to satisfying these needs and maintain the       
   ability of law enforcement to combat serious crime. The use of non-key  
   recovery encryption would severely hamper our efforts.                  
      The amended version of H.R. 695, offered by Congressman Oxley, Ohio  
   and Congressman Manton, New York, requires manufacturers to include some
   form of recovery feature in encryption products sold in the United      
   States. This would allow law enforcement the opportunity to gather      
   criminal information when legally authorized to do so.                  
      Your consideration in this matter is of the utmost importance to the 
   continued effort of maintaining public safety.                          
   Sincerely,                                                              
         Michael C. Snowden,  Police Chief.                                     
       City of Phoenix,                                                        
       Office of the Police Chief,                                             
       September 24, 1997.                                                     
          Hon.  Michael G. Oxley,                 Committee on Commerce, Rayburn House Office Building,
       Washington, DC.                                                         
       Dear Mr. Oxley: I am aware that you are presently considering a     
   variety of legislative proposals concerning the encryption of electronic
   information. While I recognize the need to encrypt communications for   
   reasons of personal security, privacy, and safe electronic commerce, it 
   is imperative that law enforcement be provided a feature that allows us,
   upon presentation of a court order, to gain timely access to plain text 
   data through decryption. It is an undeniable fact that unrestricted use 
   of strong encryption will cripple law enforcement's ability to use      
   wiretaps and other measures to catch criminals and terrorists. Loss of  
   this essential ability at a time when international drug trafficking,   
   white collar crime, and terrorist activities are on the rise, would be  
   disastrous.                                                             
      It should be noted that law enforcement's current judicially         
   controlled wiretap capabilities have not resulted in misuse because     
   adequate checks and balances prevail.                                   
      I believe that any attempt to adopt a voluntary key recovery system  
   is unacceptable. If only one vendor of a strong encryption product opts 
   not to participate, or if unrestricted foreign products are imported, it
   will take time for these products to become the products of choice for  
   criminal activities.                                                    
      Other countries have, and will continue to, develop strong encryption
   software that does not allow for key recovery. Little will be gained    
   from restricting U.S. vendors from marketing competitive products to    
   these countries. If however, any country establishes a key recovery     
   requirement, as we should in the U.S., a ban with accompanying legal    
   penalties should apply to the use and import of all non-compliant       
   products.                                                               
      Clearly, law enforcement must have the ability to collect and        
   decipher evidence of criminal and terrorist activities. We solicit your 
   support in preserving law enforcement's ability to protect the public   
   from serious crime.                                                     
   Sincerely,                                                              
         Dennis A. Garrett,   Police Chief.                                     
       The Secretary of Defense,                                               
       Washington, DC, July 21, 1997.                                          
       Dear Members of Congress: Recently you received a letter from the   
   nation's senior law enforcement officials regarding U.S. encryption     
   policies. I am writing today to express my strong support for their     
   views on this important issue.                                          
      As you know, the Department of Defense is involved on a daily basis  
   in countering international terrorism, narcotics trafficking, and the   
   proliferation of weapons of mass destruction. The spread of unbreakable 
   encryption, as a standard feature of mass market communication products,
   presents a significant threat to the ability of the U.S. and its allies 
   to monitor the dangerous groups and individuals involved in these       
   activities. Passage of legislation which effectively decontrols         
   commercial encryption exports would undermine U.S. efforts to foster the
   use of strong key recovery encryption domestically and abroad. Key      
   recovery products will preserve governments' abilities to counter       
   worldwide terrorism, narcotics trafficking and proliferation.           
      It is also important to note that the Department of Defense relies on
   the Federal Bureau of Investigation for the apprehension and prosecution
   of spies. Sadly, there have been over 60 espionage convictions of       
   federal employees over the last decade. While these individuals         
   represent a tiny minority of government employees, the impact of        
   espionage activities on our nation's security can be enormous. As the   
   recent arrests of Nicholson, Pitts and Kim clearly indicate, espionage  
   remains a very serious problem. Any policies that detract from the FBI's
   ability to perform its vital counterintelligence function, including the
   ability to perform wiretaps, inevitably detract from the security of the
   Department of Defense and the nation.                                   
      Encryption legislation must also address the nation's domestic       
   information security needs. Today, approximately 95% of DoD             
   communications rely on public networks; other parts of government, and  
   industry, are even more dependent on the trustworthiness of such        
   networks. Clearly, we must ensure that encryption legislation addresses 
   these needs. An approach such as the one contained in S. 909 can go a   
   long way toward balancing the need for strong encryption with the need  
   to preserve national security and public safety. I hope that you will   
   work with the Administration to enact legislation that addresses these  
   national security concerns as well as the rights of the American people.
   I appreciate your consideration of these views.                         
   Sincerely,                                                              
         Bill Cohen.                                                            
                                      ADDITIONAL VIEWS                            
      The stated intent of H.R. 695, the removal of barriers to the        
   competitiveness of U.S. high technology exports, is a goal with which   
   few Members of Congress, the business community, or our law enforcement 
   organizations could disagree. As reported by the Committee on Commerce, 
   however, H.R. 695 inadequately addresses the legitimate public safety   
   concerns surrounding the proliferation of strong encryption technology  
   within our own borders.                                                 
      The bombings this decade alone at the Alfred P. Murrah Federal       
   Building in Oklahoma City, Oklahoma and at New York's World Trade Center
   attest to the present dangers terrorist attacks pose to our citizens.   
   The high tech world increasing presents the committed men and women who 
   keep our nation safe with new and more daunting challenges in their     
   fight against domestic and foreign criminals. The decisions Congress    
   makes at the doorstep of the digital age will have serious repercussions
   lasting long past our own tenures in Congress and must be guided by more
   than economics.                                                         
      New encryption technologies have the potential to provide Americans  
   with a level of security in telecommunications and electronic commerce  
   never before available. At the same time, however, the widespread       
   availability of such technology could render sophisticated criminals    
   invisible to the lawful surveillance efforts of federal, state and local
   law enforcement.                                                        
      Congress need not provide government agencies with an increased      
   ability to access the communications of suspected criminals to overcome 
   the challenges posed by encryption. Congress need only ensure that the  
   thoughtful and painstaking procedures law enforcement officials must    
   presently abide by before commencing any surveillance operation continue
   to yield an ability to monitor the activities of those who threaten the 
   safety of the American people.                                          
      In our opinion, Congress must balance the needs of American's        
   technological entrepreneurs with its fundamental duty to ensure public  
   safety. We believe the goal of further promoting U.S. technology exports
   can be achieved in a version of H.R. 695 that does not threaten the     
   safety of the American people. Though not entirely satisfied with H.R.  
   695 as reported out of the Commerce Committee, we look forward to       
   addressing the bill's deficiencies on the House floor this Congress.    
    Edolphus Towns.                                                         
    Frank Pallone,  Jr.                                                     
    Rick C. Lazio.                                                          
    Bart Stupak.                                                            
                          ADDITIONAL VIEWS OF HON. JOHN D. DINGELL                
      Historically, encryption was used almost exclusively by the military 
   and intelligence communities to protect secrets of defense and national 
   security. But in the Information Age, businesses and consumers need a   
   way to secure valuable trade and financial information that increasingly
   flows through wires and over the air.                                   
      H.R. 695 attempts to accomplish these important goals by bringing    
   export law in line with current domestic encryption policy.             
   Unfortunately, such a change in the law does not come without a cost.   
   While strong encryption can make interstate and foreign commerce more   
   secure, its unrestricted use can make national security and law         
   enforcement less so.                                                    
      It is clear that widespread use of unbreakable encryption poses      
   serious problems for law enforcement in carrying out its duty to protect
   the public. Even in the post-cold war era, the wars against             
   international terrorism, drug cartels, and violations of human rights   
   continue.                                                               
      The law enforcement community advocates the use of key recovery      
   systems on strong encryption products. Unfortunately, these system will 
   work only if everybody uses them, including sophisticated criminals. And
   we know that there will continue to be a proliferation of encryption    
   products available around the would without key recovery systems,       
   regardless of U.S. Government law or policy.                            
      I am not convinced that the law enforcement approach will solve the  
   problem the authorities correctly identify. But until a better solution 
   is proposed that both protects the public against terrorism and removes 
   barriers to the growth of electronic commerce around the world, I       
   strongly believe it is in the public interest to err on the side of     
   caution.                                                                
      This bill adopts the approach preferred by business and privacy      
   advocates which, unfortunately, also contains flaws. Removing all       
   government controls over encryption is tantamount to sending our troops 
   to war without necessary arms or protective gear. The committee         
   attempted to balance the important competing interests at stake, but    
   failed to find the elusive middle ground. H.R. 695, as amended by this  
   committee, simply adds window dressing in the form of a technology lab. 
   This begs more questions than it answers.                               
      The American public has no assurance that a technology lab will be   
   effective in providing law enforcement with the tools necessary to      
   protect them. Without possessing a key to encrypted messages, the only  
   way to unlock the door is through brute force. A brute force attack on  
   today's encryption products requires both enormous computing power and a
   good deal of time. Law enforcement authorities possess neither luxury   
   when confronted with an imminent, real-time threat to public safety. A  
   technology lab will not change that reality.                            
      Some producers of encryption products have offered informally to     
   provide the lab with technical assistance and perhaps some amount of    
   private funding. But we have no specific commitment with regard to      
   either offer, nor can we be sure that any such contribution would be    
   sufficient to achieve the lab's purpose. The industry has specifically  
   rejected the notion of providing source code for its encryption products
   to the lab, which is arguably the best hope for giving law enforcement a
   leg up on cracking these codes without a key.                           
      I appreciate that these issues have been the subject of intense      
   debate for more than four years of government, industry, individual     
   citizens, and academia alike. To date, no effective solution has been   
   found. But the difficulty of the task does not mean that we should      
   conduct the legislative equivalent of a coin toss. The simple fact that 
   four other committees have reported this bill in such radically         
   different forms should be evidence enough that while this issue may be  
   ripe, the solution certainly is not.                                    
      In my judgment, this bill is not ready for prime time. More work     
   needs to be done. I urge all committees that have reported versions of  
   this bill and the bipartisan leadership to continue working with        
   industry and law enforcement to find an effective and balanced solution 
   before this bill reaches the floor for consideration.                   
         John D. Dingell.                                                       
                                                                        



NEWSLETTER
Join the GlobalSecurity.org mailing list