42 431



                            105 th Congress



                             Rept.  105 108











                        HOUSE OF REPRESENTATIVES



                              1st Session



                                 Part 2











                  SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT











                  July  25, 1997.--Ordered to be printed







  Mr. Gilman , from the Committee on International Relations, submitted

                             the following

                               R E P O R T



                              together with



                             DISSENTING VIEWS



                         [To accompany H.R. 695]





      The Committee on International Relations, to whom was referred the

   bill (H.R. 695) to amend title 18, United States Code, to affirm the

   rights of United States persons to use and sell encryption and to relax

   export controls on encryption, having considered the same, report

   favorably thereon with an amendment and recommend that the bill as

   amended do pass.

   The amendment is as follows:



     Strike out all after the enacting clause and insert in lieu thereof

  the following:



          SECTION 1. SHORT TITLE.



     This Act may be cited as the ``Security and Freedom Through

  Encryption (SAFE) Act''.

          SEC. 2. SALE AND USE OF ENCRYPTION.



     (a) In General.--Part I of title 18, United States Code, is amended

  by inserting after chapter 121 the following new chapter:

                  ``CHAPTER 122--ENCRYPTED WIRE AND ELECTRONIC INFORMATION





      ``2801. Definitions.



      ``2802. Freedom to use encryption.



      ``2803. Freedom to sell encryption.



      ``2804. Prohibition on mandatory key escrow.



      ``2805. Unlawful use of encryption in furtherance of a criminal act.





          ``2801. Definitions



   ``As used in this chapter--



       ``(1) the terms `person', `State', `wire communication', `electronic

   communication', `investigative or law enforcement officer', `judge of

   competent jurisdiction', and `electronic storage' have the meanings

   given those terms in section 2510 of this title;

       ``(2) the terms `encrypt' and `encryption' refer to the scrambling

   of wire or electronic information using mathematical formulas or

   algorithms in order to preserve the confidentiality, integrity, or

   authenticity of, and prevent unauthorized recipients from accessing or

   altering, such information;

       ``(3) the term `key' means the variable information used in a

   mathematical formula, code, or algorithm, or any component thereof, used

   to decrypt wire or electronic information that has been encrypted; and

    ``(4) the term `United States person' means--



    ``(A) any United States citizen;



       ``(B) any other person organized under the laws of any State, the

   District of Columbia, or any commonwealth, territory, or possession of

   the United States; and

       ``(C) any person organized under the laws of any foreign country who

   is owned or controlled by individuals or persons described in

   subparagraphs (A) and (B).

          ``2802. Freedom to use encryption



     ``Subject to section 2805, it shall be lawful for any person within

  any State, and for any United States person in a foreign country, to use

  any encryption, regardless of the encryption algorithm selected,

  encryption key length chosen, or implementation technique or medium

  used.

          ``2803. Freedom to sell encryption



     ``Subject to section 2805, it shall be lawful for any person within

  any State to sell in interstate commerce any encryption, regardless of

  the encryption algorithm selected, encryption key length chosen, or

  implementation technique or medium used.

          ``2804. Prohibition on mandatory key escrow



     ``(a) Prohibition.--No person in lawful possession of a key to

  encrypted information may be required by Federal or State law to

  relinquish to another person control of that key.
     ``(b) Exception for Access for Law Enforcement Purposes.--Subsection

  (a) shall not affect the authority of any investigative or law

  enforcement officer, acting under any law in effect on the effective

  date of this chapter, to gain access to encrypted information.

          ``2805. Unlawful use of encryption in furtherance of a criminal act



     ``Any person who willfully uses encryption in furtherance of the

  commission of a criminal offense for which the person may be prosecuted

  in a court of competent jurisdiction--

       ``(1) in the case of a first offense under this section, shall be

   imprisoned for not more than 5 years, or fined in the amount set forth

   in this title, or both; and

       ``(2) in the case of a second or subsequent offense under this

   section, shall be imprisoned for not more than 10 years, or fined in the

   amount set forth in this title, or both.''.

     (b) Conforming Amendment.--The table of chapters for part I of title

  18, United States Code, is amended by inserting after the item relating

  to chapter 33 the following new item:





         ``122. Encrypted wire and electronic information



        2801''.





          SEC. 3. EXPORTS OF ENCRYPTION.



     (a) Amendment to Export Administration Act of 1979.--Section 17 of

  the Export Administration Act of 1979 (50 U.S.C. App. 2416) is amended

  by adding at the end thereof the following new subsection:

   ``(g)  Certain Consumer Products, Computers, and Related Equipment.--



       ``(1) General rule.--Subject to paragraphs (2), (3), and (4), the

   Secretary shall have exclusive authority to control exports of all

   computer hardware, software, and technology for information security

   (including encryption), except that



                    which is specifically designed or modified for military use,

          including command, control, and intelligence applications.

       ``(2) Items not requiring licenses.--No validated license may be

   required, except pursuant to the Trading With The Enemy Act or the

   International Emergency Economic Powers Act (but only to the extent that

   the authority of such Act is not exercised to extend controls imposed

   under this Act), for the export or reexport of--

       ``(A) any consumer product commercially available within the United

   States or abroad which--

       ``(i) includes encryption capabilities which are inaccessible to the

   end user; and

    ``(ii) is not designed for military or intelligence end use;



       ``(B) any component or subassembly designed for use in a consumer

   product described in subparagraph (A) which itself contains encryption

   capabilities and is not capable of military or intelligence end use in

   its condition as exported;

    ``(C) any software, including software with encryption capabilities--



       ``(i) that is generally available, as is, and is designed for

   installation by the purchaser;

       ``(ii) that is in the public domain for which copyright or other

   protection is not available under title 17, United States Code, or that

   is available to the public because it is generally accessible to the

   interested public in any form; or

       ``(iii) that is customized for an otherwise lawful use by a specific

   purchaser or group of purchasers;

       ``(D) any computing device solely because it incorporates or employs

   in any form--

       ``(i) software (including software with encryption capabilities)

   that is exempted from any requirement for a validated license under

   subparagraph (C); or

       ``(ii) software that is no more technically complex in its

   encryption capabilties than software that is exempted from any

   requirement for a validated license under subparagraph (C) but is not

   designed for installation by the purchaser;

       ``(E) any computer hardware that is generally available, solely

   because it has encryption capabilities; or

       ``(F) any software or computing device solely on the basis that it

   incorporates or employs in any form interface mechanisms for interaction

   with other hardware and software, including hardware, and software, with

   encryption capabilities.

       ``(3) Software with encryption capabilities.--The Secretary shall

   authorize the export or reexport of software with encryption

   capabilities for nonmilitary end uses in any country to which exports of

   software of similar capability are permitted for use by financial

   institutions not controlled in fact by United States persons, unless

   there is substantial evidence that such software will be--

       ``(A) diverted to a military end use or an end use supporting

   international terrorism;

    ``(B) modified for military or terrorist end use; or



       ``(C) reexported without any authorization by the United States that

   may be required under this Act.

       ``(4) Hardware with encryption capabilities.--The Secretary shall

   authorize the export or reexport of computer hardware with encryption

   capabilities if the Secretary determines that a product offering

   comparable security is commercially available outside the United States

   from a foreign supplier, without effective restrictions.

    ``(5)  Definitions.--As used in this subsection--



       ``(A) the term `encryption' means the scrambling of wire or

   electronic information using mathematical formulas or algorithms in

   order to preserve the confidentiality, integrity, or authenticity of,

   and prevent unauthorized recipients from accessing or altering, such

   information;

    ``(B) the term `generally available' means--



       ``(i) in the case of software (including software with encryption

   capabilities), software that is offered for sale, license, or transfer

   to any person without restriction, whether or not for consideration,

   including, but not limited to, over-the-counter retail sales, mail order

   transactions, phone order transactions, electronic distribution, or sale

   on approval; and

       ``(ii) in the case of hardware with encryption capabilities,

   hardware that is offered for sale, license, or transfer to any person

   without restriction, whether or not for consideration, including, but

   not limited to, over-the-counter retail sales, mail order transactions,

   phone order transactions, electronic distribution, or sale on approval;

       ``(C) the term `as is' means, in the case of software (including

   software with encryption capabilities), a software program that is not

   designed, developed, or tailored by the software publisher for specific

   purchasers, except that such purchasers may supply certain installation

   parameters needed by the software program to function properly with the

   purchaser's system and may customize the software program by choosing

   among options contained in the software program;

       ``(D) the term `is designed for installation by the purchaser'

   means, in the case of software (including software with encryption

   capabilities) that--

       ``(i) the software publisher intends for the purchaser (including

   any licensee or transferee), who may not be the actual program user, to

   install the software program on a computing device and has supplied the

   necessary instructions to do so, except that the publisher may also

   provide telephone help line services for software installation,

   electronic transmission, or basic operations; and

       ``(ii) the software program is designed for installation by the

   purchaser without further substantial support by the supplier;

       ``(E) the term `computing device' means a device which incorporates

   one or more microprocessor-based central processing units that can

   accept, store, process, or provide output of data; and

       ``(F) the term `computer hardware', when used in conjunction with

   information security, includes, but is not limited to, computer systems,

   equipment, application-specific assemblies, modules, and integrated

   circuits.''.

     (b) Continuation of Export Administration Act.--For purposes of

  carrying out the amendment made by subsection (a), the Export

  Administration Act of 1979 shall be deemed to be in effect.

          SEC. 4. SENSE OF CONGRESS REGARDING INTERNATIONAL COOPERATION.



   (a)  Findings.--The Congress finds that--



       (1) implementing export restrictions on widely available technology

   without the concurrence of all countries capable of producing,

   transshipping, or otherwise transferring that technology is detrimental

   to the competitiveness of the United States and should only be imposed

   on technology and countries in order to protect the United States

   against a compelling national security threat; and

       (2) the President has not been able to come to agreement with other

   encryption producing countries on export controls on encryption and has

   imposed excessively stringent export controls on this widely available

   technology.

     (b) Sense of Congress.--It is the sense of the Congress that the

  President should immediately take the necessary steps to call an

  international conference for the purpose of coming to an agreement with

  encryption producing countries on policies which will ensure that the

  free use and trade of this technology does not hinder mutual security.



                                   BACKGROUND AND PURPOSE



      H.R. 695, the Security and Freedom Through Encryption (SAFE) Act,

   represents a strong bipartisan effort to bring U.S. laws on the export

   of encryption technology into the present and future, by looking at the

   actual technological developments taking place on the world stage. The

   SAFE Act enjoys strong support in the House as reflected by the

   overwhelming number of co-sponsors, including a majority of the Members

   of the Committee on International Relations.

      While differences still remain and the debate continues between U.S.

   economic and commercial priorities and individual civil liberties, on

   the one hand, and the needs and concerns of law enforcement and national

   security agencies, the SAFE Act is generating the political will to

   reform the existing regulatory process to meet today's realities.

      Encryption has been defined as referring to the use of software or

   hardware to scramble wire or electronic information using mathematical

   formulas or algorithms in order to preserve the confidentiality,

   integrity, or authenticity of, and prevent unauthorized recipients from

   accessing or altering such information. While anyone can encrypt a

   message, only an authorized person can convert a scrambled message back

   into its original form.

      The basic idea of modern encryption, or cryptography, is that any

   message can be represented as a set of numbers (the plaintext) used to

   transform the plaintext into a different set of numbers (the

   ciphertext). Simply stated, keys consist of a series of ones and zeros

   (called ``bits'), and are described in terms of their ``length'', which

   is corresponds to the number of possible combinations that can be used

   to decode a particular message. A 40-bit key means that the number of

   possible combinations of ones and zeros equals 2 to the 40th power. It

   then follows that a 56-bit key is 2 to the 56th power, which means that

   it is 2 to the 16th power stronger that a 40-bit key.

      Once the exclusive domain of the national security and intelligence

   sectors, encryption now has an expanded application, impacting the

   everyday lives of millions of Americans. Today, banking systems, stock

   markets, air traffic control systems, credit bureaus, telephone

   networks, weather satellites, social security system, television

   networks, civilian and government payrolls, and the Internet are all

   directly affected by a flow of data managed by countless computers and

   telecommunication networks around the world. Computer technology now

   serves as the nervous system of modern society.

      It is increasingly difficult to protect the privacy and

   confidentiality of transactions at all levels, and increasingly

   important to do so. The Justice Department has estimated that annual

   losses related to computer security breaches could be as high as $7

   billion. If this were adjusted to include the number of undocumented

   cases by companies reluctant to report such intrusions, the figure could

   be even higher. The National Counterintelligence Center in their

   ``Annual Report to Congress on Foreign Economic Collection and

   Industrial Espionage'' concluded that such ``specialized technical

   operations (including computer intrusions, telecommunications targeting

   and intercept, and private sector encryption weaknesses) account for the

   largest portion of economic and industrial information lost by

   corporations.''

      Therefore, stronger encryption tools are widely viewed as the key to

   providing security and privacy for the information superhighway.

      Current U.S. policy restricts the export of ``strong'' encryption

   hardware or software products with keys greater than 40 bits

   long--determined to be gravely inadequate by numerous experts. The

   current Administration proposal, which would allow the export of 56-bit

   encryption, is viewed as not meeting the needs of U.S. companies to

   conduct business in a secure manner with their suppliers, their business

   partners, their customers, and even their affiliated companies outside

   the United States.
      Supporting the need for higher encryption standards is the fact that,

   on the same day that the companion legislation--the McCain-Kerrey

   bill--was introduced in the Senate calling for a 56-bit limit on

   encryption exports, a group of independent programmers and researchers

   cracked a 56-bit code using computers linked across the Internet. This

   successful breaking of 56-bit encryption clearly demonstrates the

   anachronistic nature of current U.S. law and reflects how out-of-touch

   the Administration's policy is with the needs of the global marketplace.

      The Administration's proposal would only allow the export of 56-bit

   encryption for those who promise to build in ``key recovery''. ``Key

   recovery'' or ``key escrow'' essentially means that when stored data or

   electronic communications are encrypted, a third party has a copy of the

   key needed to decrypt the information. As presented by proponents of

   this policy, escrowed encryption is intended to provide for encryption

   protection for legitimate uses but also enable law enforcement officials

   to gain access to the key when it is necessary to decode the plaintext

   data as part of an investigation.

      This has been interpreted as an attempt to use the export control

   process to manipulate and control the market for and expansion of

   encryption technology, by making it easy to export products with key

   recovery and difficult for those products without. The logical basis for

   this policy is flawed as it is rooted in the wrongful assumption that

   foreign competitors can be convinced to alter their policy to parallel

   what U.S. policy is calling for. The current policy is not based on fact

   but on the optimistic view that the U.S. can influence other countries

   not to export strong encryption without an escrow system.

      Speculation does not make for good laws. Individually and as a unit,

   many of our European allies have clearly illustrated their commitment to

   allow market forces and



                    individual needs to dictate the levels of encryption. In its

          April 1997 proposal entitled, ``A European Initiative in Electronic

          Commerce'', the European Union stated as key elements of the Initiative

          to ensure a framework which ``boosts the trust and confidence of

          businesses for investments and consumers to make use of electronic

          commerce by dismantling remaining legal and regulatory barriers and

          preventing the creation of new obstacles.'' It goes on to say that:

          ``The use of strong encryption which ensures the confidentiality of both

          sensitive commercial and of personal data is one of the foundation

          stones of electronic commerce . . . The Community (European Community)

          shall work at the international level towards the removal of trade

          barriers for encryption products.''

      Even the more conservative recommendations made in March 1997 by the

   Council of the Organization for Economic Cooperation and Development,

   clearly state that: ``Users should have access to cryptography that

   meets their needs, so that they can trust in the security of information

   and communications systems, and the confidentiality and integrity of

   data on those systems.'' The Council further underscores that:

   ``Government controls on cryptographic methods . . . should respect user

   choice to the greatest extent possible . . . and should not be

   interpreted as implying that governments should initiate legislation

   which limits user choice.'' Finally, they add: ``The development and

   provision of cryptographic methods should be determined by the market in

   an open and competitive environment. Such an approach would best ensure

   that solutions keep pace with changing technology, the demands of users

   and evolving threats to communications systems security.''

      While U.S. companies are kept at 40-bit encryption or at 56-bit with

   the condition that they commit to develop key recovery, non-U.S.

   exporters, particularly the countries of the European Union, are

   producing packages that include encryption technology using 128 bits

   leaving American companies far behind in the race to capture new

   markets.

      Furthermore, American companies are placed at a competitive

   disadvantage by being forced to create and deploy two separate systems

   to meet two separate standards. Because of the nightmare this would

   create, most U.S. businesses end up making their exportable products

   subject to the same restrictions as their domestic products. By not

   allowing U.S. industries to provide secure products in the face of

   strong foreign competitors who are not restricted by outdated export

   controls, current law is hurting U.S. businesses. No one will buy

   encryption products for which the U.S. government can obtain a key. A

   recent report by the CEOs of 13 large American technology companies

   concluded that the U.S. computer industry could potentially lose up to

   $30 60 billion annually by the year 2000 due to these export controls.

      At a fundamental level, evaluating the value of key recovery systems

   in and of themselves, eleven of the world's top cryptographers concluded

   that key recovery systems would create new vulnerabilities. A key

   recovery system would create serious difficulties as it would require a

   vast infrastructure of recovery agents and oversight entities to manage

   access to the keys. In their May 1997 report entitled, ``The Risks of

   Key Recovery, Key Escrow, and Trusted Third Party Encryption'', these

   experts also determined that ``the field of cryptography has no

   experience in deploying secure systems of this scope and complexity''

   and that such systems could potentially cost many billions of dollars.

      Key recovery systems do not even meet the national security needs on

   which the policy is based on. The Software Publishers Association has

   documented hundreds of foreign encryption products already widely

   available abroad and which criminals, terrorists, and foreign

   governments have access to. It is the upstanding, law-abiding citizen

   who suffers.

      The fact is that strong encryption helps to further the goals of law

   enforcement and national security, more than key recovery could ever

   hope to. In its landmark report on encryption policy, the blue-ribbon

   National Research Council concluded the following about the use of

   strong encryption:



                     If cryptography can protect the trade secret and

          proprietary information of business and thereby reduce

          economic espionage (which it can), it also supports in a most

          important manner the job of law enforcement. If cryptography

          can help protect nationally critical information systems and

          networks against unauthorized penetration (which it can), it

          also supports the national security of the United States.



      In summary, if U.S. laws are not changed soon, not as mandated by the

   Administration's policy or its companion legislation in the Senate, but

   as H.R. 695 attempts to do, world standards for security technology will

   shift away from the U.S. as customers buy products from foreign

   manufacturers. The U.S. government will not have a view into the

   security technology that replaces U.S. technology as the world

   standards. U.S. industries will lose control of information security

   technologies which are vital to economic security. It will cost the U.S.

   economy billions of dollars and hundreds of thousands of jobs.

      On July 7, 1997, German Economics Minister Guenter Rexrodt called for

   the removal of restrictions on encryption technology in his opening

   remarks for a two-day conference on Internet commerce attended by 40

   government ministers from the European union, the United States, Russia,

   Japan and Canada. ``Users can only protect themselves against having

   data manipulated, destroyed or spied on through the use of strong

   encryption procedures,'' Rexrodt said, ``that is why we have to use all

   of our powers to promote such procedures instead of blocking them.''

      Individual Americans and U.S. businesses should be afforded the same

   protection and the same opportunities as other countries provide their

   own people and industries.



                    H.R. 695--the SAFE Act--does just that. It is aimed at

          correcting the unfair and unsafe situation that currently exists under

          current law as it: prohibits export controls on ``generally available''

          commercial encryption except for military end-users or to identified

          individuals or organizations in specific foreign countries; does not

          require reporting for companies after export; prohibits mandatory use of

          key recovery; denies liability protection and penalties for key holders;

          denies foreign government access to keys under specified conditions if

          key holder is used voluntarily; prohibits U.S. government and law

          enforcement access to keys by court order if key holder is used

          voluntarily; codifies existing domestic use policy; gives the Secretary

          of Commerce exclusive jurisdiction over export of commercial encryption

          except for military end-uses or to identified individuals or

          organizations in specific foreign countries.

      In essence, H.R. 695 prevents economic espionage while protecting

   hundreds of thousands of American jobs by affording all Americans the

   freedom to use any type of encryption anywhere in the world; by allowing

   any type of encryption to be sold in the United States; and creates a

   level playing field by permitting the export of the generally available

   software, hardware, and other encryption-related computer products.

      The Committee hopes that other Members realize the need, value, and

   importance of H.R. 695 as it works its way through the legislative

   process. In the interest of the American people, of U.S. economic

   leadership and growth, and of national security, the Committee hopes

   that the House will pass the SAFE Act.

                                      COMMITTEE ACTION



      H.R. 695 was introduced by Representative Goodlatte on February 12,

   1997, and referred to the Committee on Judiciary and in addition to the

   Committee on International Relations for a period subsequently to be

   determined by the Speaker. It was reported to the House by the Committee

   on the Judiciary, amended, on May 22, 1997 (H. Rept. 105-108). On May

   22, 1995, the referral to the Committee on International Relations was

   extended through July 11, 1997, and on June 26, 1997, the referral to

   the Committee on International Relations was extended for a period

   ending not later than July 25, 1997.

      On June 26, 1997, the bill was referred, in addition, to Committees

   on Commerce, National Security, and the Permanent Select Committee on

   Intelligence for a period ending not later than September 5, 1997, for

   consideration of such provisions of the bill and the amendment reported

   by the Committee on the Judiciary as fall within the jurisdiction of

   those committees pursuant to clause 1(3) and (k), rule X and rule

   XLVIII, respectively.

      On May 8, 1997, the Subcommittee on International Economic Policy and

   Trade held a hearing entitled: ``Encryption: Individual Right to Privacy

   vs. National Security.'' Witnesses for this hearing included: Hon.

   William Reinsch, Under Secretary of Commerce, Bureau of Export

   Administration; Hon. William Crowell, Deputy Director, National Security

   Agency; Hon. Robert Litt, Deputy Assistant Attorney General, Criminal

   Division, U.S. Department of Justice; Mr. John Gage, Director, Science

   Office, Sun Microsystems, Inc.; Mr. Humphrey Polanen, General Manager,

   Network Security Products Group, Sun Microsystems, Inc.; Jerry Berman,

   Executive Director, Center for Democracy and Technology; Tom Parenty,

   Director of Security, Sybase Corporation; and Stephen T. Walker,

   President and CEO, Chairman of the Board of Directors, Trusted

   Information Systems.

      On May 29, 1997, the Full Committee held a Members briefing on H.R.

   695, ``the Security and Freedom through Encryption (SAFE) Act.''

   Speakers for the briefing included Hon. Louis Freeh, Director, Federal

   Bureau of Investigation and Hon. William Crowell, Deputy Director,

   National Security Agency.

      On June 4, 1997, the Subcommittee on International Economic Policy

   and Trade held a Members Briefing on the future of U.S.-European trade

   relations. Speakers for the briefing included: Hon. David L. Aaron, U.S.

   Ambassador to the Organization for Economic Cooperation and Development

   (OECD); H.E. Hugo Paemen, Head of the Delegation to the United States of

   the Commission of the European Union; and Dr. Dominique

   vanderMensbrugghe, Senior Economist, OECD Development Center.

      On June 24, 1997, the Subcommittee on International Economic Policy

   and Trade held a mark-up of H.R. 695, ``the Security and Freedom through

   Encryption (SAFE) Act''. Witnesses included: Congressman Bob Goodlatte.

       Amendment.-- An en bloc amendment was offered by Ros-Lehtinen,

   Gejdenson, Campbell and Sherman. The amendment removes the distinction

   between mass market and customized software thus ensuring that

   customized software is also subject to liberalized export controls. It

   expands section 3 on exports of encryption by including consumer

   products which do not necessarily fall under the umbrella of

   ``computing'' products but which also require and use encryption. It

   broadens the scope and definition of ``generally available'' to include

   hardware with encryption capabilities. The amendment also adds a fourth

   section to the bill in the form of a sense of Congress regarding

   international cooperation. The amendment passed by voice vote.

      A motion to report the bill, as amended, to the Full Committee passed

   by a roll call vote, as follows:

      Voting yes: Ros-Lehtinen, Manzullo, Chabot, Campbell, Blunt, Brady,

   Rohrabacher, Gejdenson, Danner, Hilliard, Sherman, Rothman, Clement,

   Luther.



   Voting no:  Bereuter.



   Passed: 14 1.



      On June 26, 1997, the Full Committee held a classified Members

   briefing on the impact of H.R. 695, ``the Security and Freedom through

   Encryption (SAFE) Act'' on national security and law enforcement

   activities. Speakers for the briefing included: Hon. Louis Freeh,

   Director, Federal Bureau of Investigation; Hon. William Crowell, Deputy

   Director, National Security Agency; Hon. William Reinsch, Under

   Secretary of Commerce, Bureau of Export Administration.

      On July 22, 1997, the Full Committee marked up the bill in open

   session, pursuant to notice. The Committee first adopted the amendment

   recommended by the Subcommittee on International Economic Policy by

   unanimous consent, as original text for the purposes of amendment.

   Representatives Goodlatte and Lofgren and representatives of the

   Administration (The Hon. William Reinsch, Under Secretary of Commerce;

   Mr. Jim Kallstrom, Federal Bureau of Investigation; Mr. James R. Taylor,

   National Security Agency; and Mr. Anthony Bocchichio of the Drug

   Enforcement Agency) responded to questions from members during the

   course of the markup.

      After further consideration, on that date, a quorum being present,

   the Full Committee by voice vote ordered the bill reported to the House

   with the recommendation that the bill, as amended, do pass.

                       Rollcall votes on amendments



      In compliance with clause (2)(l)(2)(B) of rule XI of the Rules of the

   House of Representatives, the record of committee roll call votes on

   final passage or amendments during the full committee's consideration of

   H.R. 695 is set out below, as is a report of the full committee's final

   action on the bill.

                      Description of Amendment, Motion, Order, or Other Proposition

           (votes during markup of H.R. 695--July 22, 1997)

      Vote No. 1.--Gilman amendment provide that certain items could not be

   exported if in the opinion of the President they would endanger the

   national security.

      Voting Yes: Gilman, Leach, Bereuter, Gallegly, Fox, Hamilton, Berman,

   Menendez, Brown, Danner, Rothman, Clement, and Davis.

      Voting No: Smith, Ros-Lehtinen, Ballenger, Rorhabacher, Manzullo,

   Royce, King, Chabot, Sanford, Houghton, Campbell, Blunt, Moran, Brady,

   Gejdenson, Ackerman, Hastings, Hilliard, Capps, Sherman, Wexler, and

   Luther.

   Ayes, 13. Noes, 22.



      Note: The bill was subsequently ordered reported favorably, amended,

   by voice vote, a quorum being present, on July 22, 1997.

                                SECTION-BY-SECTION ANALYSIS



                         Section 1.  Short Title



      This section states that this Act may be cited as the ``Security and

   Freedom Through Encryption (SAFE) Act''.

                  Section 2.  Sale And Use Of Encryption



      This section states that, in general, Part I of Title 18, United

   States Code, is amended by adding a new chapter after chapter 121.

      This section also creates ``Chapter 122-Encrypted Wire And Electronic

   Information'' which includes sections; 2801. Definitions., 2802. Freedom

   To Use Encryption., 2803. Freedom to Sell Encryption., 2804. Prohibition

   On Mandatory Key Escrow., 2805. Unlawful Use Of Encryption in the

   furtherance of a criminal act.

      Section 2801 is titled ``Definitions'' and provides definitions for

   ``person'' ``State'' ``wire communication'' ``electronic

   communication'', ``investigative or law enforcement officer'', judge of

   competent jurisdiction'', ``electronic storage'', ``encrypt'',

   ``encryption'', ``key'', and ``United States person''. Many of these

   definitions were taken explicitly from 18 U.S.C. 2810.

      New section 2802 states that it is legal for any person in the United

   States or any United States person in a foreign country, to use any form

   of encryption regardless of the algorithm, key length, or technique used

   in the encryption.

      New section 2803 states that it is legal for any person in the United

   States to sell in interstate commerce encryption products using any form

   of encryption regardless of the algorithm, key length, or technique

   used. The Committee intends that Sections 2802 and 2803 be read as

   limitations on government power. They should not be read as overriding

   otherwise lawful employer policies concerning employee use of the

   employers computer system, nor as limiting the employer's otherwise

   lawful means for remedying violations of those policies.



      New section 2804 specifically prohibits requiring any person in

   lawful possession of an encryption key to turn that key over to another

   person. This section prevents any form of mandatory key escrow system

   with an exception for any law enforcement personnel or a member of the

   intelligence community.

      New section 2805 make it a crime to use encryption unlawfully in

   furtherance of some other crime. This new crime is punishable with a

   sentence of 5 years for a first offence and 10 years. This section

   requires that for a person to violate this section that person must be

   found guilty of some other federal felony crime and was deliberately

   using encryption to avoid detection of that other federal felony crime.

      Subsection 2(b) of H.R. 695 provides for a conforming amendment to

   the table of chapters in Title 18.

                     Section 3.  Export of Encryption



      Subsection 3(a) of H.R. 695 amends the Export Administration Act by

   creating a new subsection (g) entitled ``Computers and Related

   Equipment,'' to 50 U.S.C. App. 2416.

      New subsection (g)1 place all encryption products, except those

   specifically designed or modified for military use, under the

   jurisdiction of the Secretary of Commerce.

      New subsection (g)2 allows encryption software that is generally

   available or in the public domain, like mass-market software products,

   to be exported freely except pursuant to the Trading With The Enemy Act

   or the International Emergency Economic Powers Act (but only to the to

   the extent that the authority of such Act is not exercised to extend

   controls imposed under this Act.). The Subcommittee on International

   Economic Policy and Trade, on an amendment offered by Chair Ros-Lehtinen

   and Ranking Member Gejdenson, and others, amended Subsection (g)2 on a

   voice vote in Subcommittee to include certain other consumer products,

   or component or subassembly (provided those components are not capable

   of military or intelligence end use in its condition as exported.),

   which have encryption capabilities that are inaccessible to the end user

   and which are commercially available within the United States or abroad.

   These product as discussed by the Subcommittee are consumer products

   such as small dish satellite receivers, digital video disk players,

   smart cards, Web TV, etc. These products, which are commercially

   available within the United States or abroad, were viewed by the

   Subcommittee as being clearly and purely for consumer end-use and not

   for military purposes. The Ros-Lehtinen amendment also amended (g)2 to

   include customized software for an otherwise lawful purpose by a

   specific purchaser or group of purchasers.

      New subsection (g)3 requires the Secretary of Commerce to allow other

   encryption software to be exported unless there is substantial evidence

   that will be put to military or terrorist uses or that it will be

   reexported without U.S. authorization.

      New subsection (g)4 requires the Secretary to allow the export of

   hardware with encryption capabilities when the Commerce Department finds

   that it is commercially available from foreign suppliers without

   effective restrictions.

      New subsection (g)5 provides definitions for this subsection. The

   subcommittee amendment offered by Chair Ros-Lehtinen, and others also

   amended this subsection to include the same consumer products added to

   subsection (g)2.

      As the Ros-Lehtinen amendment adopted in the Subcommittee on

   International Economic Policy and Trade stated, the Committee would like

   to reiterate that, with the ever increasing use of computer technology

   and computer information (hardware and software) in consumer product

   lines for protection of privacy, information security, and intellectual

   property interests, it intends this legislation to cover all

   devices--whether traditional computing devices or convergent consumer

   products that incorporate encryption. The applications covered by this

   legislation include video, audio, and data communications systems and

   telecommunication equipment. Hardware and software containing

   encryption, such as encoders, decoders, and network terminals, which are

   essential to protect the video signal, are therefore included under

   section 3(a) of this Act. As well as video, audio, data communications

   systems containing encryption and decryption capability are used by

   cable, satellite, and wireless delivery systems. This legislation is

   also intended to include set-top devices and other terminals where the

   encryption is not directly available to the user but is used for

   purposes such as pay per view, and hardware such as network computers,

   telephones or cable modems, satellite uplinks and downlinks.

      Subsection 3(b) of H.R. 695 provides that for the purposes of

   carrying out the amendment made by subsection 3(a), the Export

   Administration Act shall be deemed to be in effect. This statement is

   necessary because Congress failed to reauthorize the Export

   Administration Act and it expired in 1994. The Administration maintains

   the Export Administration Act policies by executive order. The Committee

   plans to reauthorize the Export Administration Act in this Congress.

    Section 4.  Sense of Congress Regarding International Cooperation



      This section asks on the President to call an international

   conference for the purpose of



                    achieving an agreement among the encryption producing

          countries on policies which will ensure that the free use and trade of

          this technology does not hinder mutual technology.

                                COMMITTEE OVERSIGHT FINDINGS



      In compliance with clause 2(l)(3)(A) of rule XI of the Rules of the

   House of Representatives, the Committee reports the findings and

   recommendations of the Committee, based on oversight activities under

   clause 2(b)(1) of rule X of the Rules of the House of Representatives,

   are incorporated in the descriptive portions of this report.

                   COMMITTEE ON GOVERNMENT REFORM AND OVERSIGHT FINDINGS



      No findings or recommendations of the Committee on Government Reform

   and Oversight were received as referred to in clause 2(l)(3)(D) of rule

   XI of the Rules of the House of Representatives.

                                ADVISORY COMMITTEE STATEMENT



      No advisory committees within the meaning of section 5(b) of the

   Federal Advisory Committee Act were created by this legislation.

                          APPLICABILITY TO THE LEGISLATIVE BRANCH



      The Committee finds that the legislation does not relate to the terms

   and conditions of employment or access to public services or

   accommodations within the meaning of section 102(b)(3) of the

   Congressional Accountability Act.

                             CONSTITUTIONAL AUTHORITY STATEMENT



      In compliance with clause 2(l)(4) of rule XI of the Rules of the

   House of Representatives, the Committee cites the following specific

   powers granted to the Congress in the Constitution as authority for

   enactment of H.R. 695 as reported by the Committee: Article I, section

   8, clause 1 (relating to providing for the common defense and general

   welfare of the United States); and Article I, section 8, clause 18

   (relating to making all laws necessary and proper for carrying into

   execution powers vested by the Constitution in the government of the

   United States).

          NEW BUDGET AUTHORITY AND TAX EXPENDITURES, CONGRESSIONAL BUDGET OFFICE

                                  COST ESTIMATE

      The Committee expects to adopt a cost estimate of the Congressional

   Budget Office as its submission of any new required information on new

   budget authority, new spending authority, new credit authority, or an

   increase or decrease in the national debt, which it expects to provide

   in a supplemental report.

                                 FEDERAL MANDATES STATEMENT



      The Committee adopts as its own the estimate of Federal mandates

   prepared by the Director of the Congressional Budget Office pursuant to

   section 423 of the Unfunded Mandates Reform Act.





       U.S. Congress,



       Congressional Budget Office,



       Washington, DC, July 25, 1997.







          Hon.  Benjamin Gilman,                Chairman, Committee on International Relations,



       House of Representatives, Washington, DC.



       Dear Mr. Chairman: The Congressional Budget Office has prepared the

   enclosed mandates statement for H.R. 695, the Security and Freedom

   Through Encryption (SAFE) Act. CBO's analysis of the bill's federal

   costs will be sent to you as soon as it is completed.

      If you wish further details on this estimate, we will be pleased to

   provide them. The CBO staff contacts are Pepper Santalucia (for the

   state and local impact) and Matt Eyles (for the private-sector impact).

   Sincerely,



         Jane E. O'Neill,  Director.



   Enclosure.



              CONGRESSIONAL BUDGET OFFICE MANDATES STATEMENT



           H.R. 695--Security and Freedom Through Encryption (SAFE) Act



      H.R. 695 would allow individuals in the United States to use and sell

   any form of encryption and would prohibit states or the federal

   government from requiring individuals to relinquish the key to

   encryption technologies to any third party. The bill also would prevent

   the Bureau of Export Administration in the Department of Commerce from

   restricting the export of most nonmilitary encryption products. Finally,

   H.R. 695 would establish criminal penalties and fines for the willful

   use of encryption technologies in committing criminal offenses.

      The bill would prohibit states from requiring persons to make

   encryption keys available to another person or entity. This prohibition

   would be an intergovernmental mandate as defined in the Unfunded

   Mandates Reform Act of 1995 (UMRA). However, states would bear no costs

   as a result of this mandate because none currently require the

   registration or availability of such keys. H.R. 695 contains no

   private-sector mandates as defined in UMRA.



                   CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED



     In compliance with clause 3 of rule XIII of the Rules of the House of

  Representatives, changes in existing law made by the bill, as reported,

  are shown as follows (new matter is printed in italic and existing law

  in which no change is proposed is shown in roman):

                                TITLE 18, UNITED STATES CODE



         * * * * * * *



          PART I--CRIMES





 Chap.



 Sec.



         1.   General provisions



        1



         * * * * * * *





         122. Encrypted wire and electronic information



        2801





         * * * * * * *



                   CHAPTER 122--ENCRYPTED WIRE AND ELECTRONIC INFORMATION





      2801. Definitions.



      2802. Freedom to use encryption.



      2803. Freedom to sell encryption.



      2804. Prohibition on mandatory key escrow.



      2805. Unlawful use of encryption in furtherance of a criminal act.





          2801. Definitions



   As used in this chapter--



       (1) the terms ``person'', ``State'', ``wire communication'',

   ``electronic communication'', ``investigative or law enforcement

   officer'', ``judge of competent jurisdiction'', and ``electronic

   storage'' have the meanings given those terms in section 2510 of this

   title;

       (2) the terms ``encrypt'' and ``encryption'' refer to the scrambling

   of wire or electronic information using mathematical formulas or

   algorithms in order to preserve the confidentiality, integrity, or

   authenticity of, and prevent unauthorized recipients from accessing or

   altering, such information;

       (3) the term ``key'' means the variable information used in a

   mathematical formula, code, or algorithm, or any component thereof, used

   to decrypt wire or electronic information that has been encrypted; and

    (4) the term ``United States person'' means--



    (A) any United States citizen;



       (B) any other person organized under the laws of any State, the

   District of Columbia, or any commonwealth, territory, or possession of

   the United States; and

       (C) any person organized under the laws of any foreign country who

   is owned or controlled by individuals or persons described in

   subparagraphs (A) and (B).

          2802. Freedom to use encryption



     Subject to section 2805, it shall be lawful for any person within any

  State, and for any United States person in a foreign country, to use any

  encryption, regardless of the encryption algorithm selected, encryption

  key length chosen, or implementation technique or medium used.

          2803. Freedom to sell encryption



     Subject to section 2805, it shall be lawful for any person within any

  State to sell in interstate commerce any encryption, regardless of the

  encryption algorithm selected, encryption key length chosen, or

  implementation technique or medium used.

          2804. Prohibition on mandatory key escrow



     (a) Prohibition.--No person in lawful possession of a key to

  encrypted information may be required by Federal or State law to

  relinquish to another person control of that key.

     (b) Exception for Access for Law Enforcement Purposes.--Subsection

  (a) shall not affect the authority of any investigative or law

  enforcement officer, acting under any law in effect on the effective

  date of this chapter, to gain access to encrypted information.

          2805. Unlawful use of encryption in furtherance of a criminal act



     Any person who willfully uses encryption in furtherance of the

  commission of a criminal offense for which the person may be prosecuted

  in a court of competent jurisdiction--

       (1) in the case of a first offense under this section, shall be

   imprisoned for not more than 5 years, or fined in the amount set forth

   in this title, or both; and

       (2) in the case of a second or subsequent offense under this

   section, shall be imprisoned for not more than 10 years, or fined in the

   amount set forth in this title, or both.

         * * * * * * *









                     SECTION 17 OF THE EXPORT ADMINISTRATION ACT OF 1979



    Sec.  17. (a) * * *



         * * * * * * *





   (g)  Certain Consumer Products, Computers, and Related Equipment.--



       (1) General rule.--Subject to paragraphs (2), (3), and (4), the

   Secretary shall have exclusive authority to control exports of all

   computer hardware, software, and technology for information security

   (including encryption), except that which is specifically designed or

   modified for military use, including command, control, and intelligence

   applications.

       (2) Items not requiring licenses.--No validated license may be

   required, except pursuant to the Trading With The Enemy Act or the

   International Emergency Economic Powers Act (but only to the extent that

   the authority of such Act is not exercised to extend controls imposed

   under this Act), for the export or reexport of--

       (A) any consumer product commercially available within the United

   States or abroad which--

       (i) includes encryption capabilities which are inaccessible to the

   end user; and

    (ii) is not designed for military or intelligence end use;



       (B) any component or subassembly designed for use in a consumer

   product described in subparagraph (A) which itself contains encryption

   capabilities and is not capable of military or intelligence end use in

   its condition as exported;

    (C) any software, including software with encryption capabilities--



       (i) that is generally available, as is, and is designed for

   installation by the purchaser;

       (ii) that is in the public domain for which copyright or other

   protection is not available under title 17, United States Code, or that

   is available to the public because it is generally accessible to the

   interested public in any form; or

       (iii) that is customized for an otherwise lawful use by a specific

   purchaser or group of purchasers;

       (D) any computing device solely because it incorporates or employs

   in any form--

       (i) software (including software with encryption capabilities) that

   is exempted from any requirement for a validated license under

   subparagraph (C); or

       (ii) software that is no more technically complex in its encryption

   capabilties than software that is exempted from any requirement for a

   validated license under subparagraph (C) but is not designed for

   installation by the purchaser;

       (E) any computer hardware that is generally available, solely

   because it has encryption capabilities; or

       (F) any software or computing device solely on the basis that it

   incorporates or employs in any form interface mechanisms for interaction

   with other hardware and software, including hardware, and software, with

   encryption capabilities.

       (3) Software with encryption capabilities.--The Secretary shall

   authorize the export or reexport of software with encryption

   capabilities for nonmilitary end uses in any country to which exports of

   software of similar capability are permitted for use by financial

   institutions not controlled in fact by United States persons, unless

   there is substantial evidence that such software will be--

       (A) diverted to a military end use or an end use supporting

   international terrorism;

    (B) modified for military or terrorist end use; or



       (C) reexported without any authorization by the United States that

   may be required under this Act.



       (4) Hardware with encryption capabilities.--The Secretary shall

   authorize the export or reexport of computer hardware with encryption

   capabilities if the Secretary determines that a product offering

   comparable security is commercially available outside the United States

   from a foreign supplier, without effective restrictions.

    (5)  Definitions.--As used in this subsection--



       (A) the term ``encryption'' means the scrambling of wire or

   electronic information using mathematical formulas or algorithms in

   order to preserve the confidentiality, integrity, or authenticity of,

   and prevent unauthorized recipients from accessing or altering, such

   information;

    (B) the term ``generally available'' means--



       (i) in the case of software (including software with encryption

   capabilities), software that is offered for sale, license, or transfer

   to any person without restriction, whether or not for consideration,

   including, but not limited to, over-the-counter retail sales, mail order

   transactions, phone order transactions, electronic distribution, or sale

   on approval; and

       (ii) in the case of hardware with encryption capabilities, hardware

   that is offered for sale, license, or transfer to any person without

   restriction, whether or not for consideration, including, but not

   limited to, over-the-counter retail sales, mail order transactions,

   phone order transactions, electronic distribution, or sale on approval;

       (C) the term ``as is'' means, in the case of software (including

   software with encryption capabilities), a software program that is not

   designed, developed, or tailored by the software publisher for specific

   purchasers, except that such purchasers may supply certain installation

   parameters needed by the software program to function properly with the

   purchaser's system and may customize the software program by choosing

   among options contained in the software program;

       (D) the term ``is designed for installation by the purchaser''

   means, in the case of software (including software with encryption

   capabilities) that--

       (i) the software publisher intends for the purchaser (including any

   licensee or transferee), who may not be the actual program user, to

   install the software program on a computing device and has supplied the

   necessary instructions to do so, except that the publisher may also

   provide telephone help line services for software installation,

   electronic transmission, or basic operations; and

       (ii) the software program is designed for installation by the

   purchaser without further substantial support by the supplier;

       (E) the term ``computing device'' means a device which incorporates

   one or more microprocessor-based central processing units that can

   accept, store, process, or provide output of data; and

       (F) the term ``computer hardware'', when used in conjunction with

   information security, includes, but is not limited to, computer systems,

   equipment, application-specific assemblies, modules, and integrated

   circuits.



                                      DISSENTING VIEWS



      While well-intentioned, this bill's one-dimensional focus on the

   decontrol of encryption products would upset the vital balance that U.S.

   policy seeks to strike between the competitiveness of American industry

   and U.S. national security and law enforcement goals. The bill would

   prohibit any licensing or review of exports of encrypted software and

   hardware items. Consequently, its implementation would not only hinder

   our national security efforts but also undermine the Administration's

   ability to forge an international consensus on the use and

   implementation of national key recovery policies.

      While SAFE Act advocates correctly point out that the Administration

   has not yet achieved a multilateral consensus endorsing its preference

   for a key management infrastructure approach on encryption issues, it

   should be noted that recent cryptography guidelines adopted by the

   Organization for Economic Cooperation and Development have stressed the

   need to balance privacy, law enforcement, national security concerns,

   and commercial interests. They also underline the fact that failure to

   coordinate these policies could cripple the global information network

   and impede international trade.

      A July policy brief published by the Brookings Institution by Kenneth

   Flamm on ``Deciphering the Cryptography Debate'' noted along the same

   lines that:

      ``A level playing field, with common global rules of the game, is

   needed to avoid giving economic rivals competitive advantages over one

   another. The administration made an important and correct decision in

   seeking an international consensus on the key recovery approach to

   strong encryption and must be sure to continue to work hard in seeking

   this common global approach. While it has yet to achieve such a

   consensus within the OECD, many of the key players with the technical

   capability to ship advanced cryptography products and affect global

   markets--Britain, France and (quietly) Japan--are supporting the U.S.

   approach, and if a few more (like Germany and Israel) can be brought on

   board, the critical mass around which the core of an international

   agreement can be assembled will exist.''

      If enacted in its current form, this bill would undermine any

   prospects for achieving such consensus and would compel a number of the

   OECD countries to put additional import restrictions in place blocking

   the entry of our strongest encryption products.

      We recognize that the development of strong encryption can play a

   vital role in the development of electronic commerce and promoting

   privacy but the development of key recovery policies is essential to

   head off a potential crisis in the years ahead for our law enforcement

   authorities. If strong encryption is in widespread use in the near

   future, it will make it virtually impossible to decipher encrypted

   communications. Brute force attacks to crack encryption algorithms in

   that type of environment are not feasible or realistic, especially in

   the time sensitive cases where law enforcement needs access to encrypted

   files to save lives.

      By removing all controls on the export of any software and hardware

   with encryption capabilities, this bill threatens U.S. national security

   and law enforcement interests.

      With respect to U.S. national security, encrypted communications make

   it more difficult for U.S. intelligence agencies to monitor

   communications relating to terrorism, weapons proliferation, military

   operations, and other threats to U.S. national security interests. The

   Administration does not dispute the contention of U.S. software

   manufacturers that encryption products are in use around the world.

      But the Administration also points out that these products are not

   yet being widely used by individuals, groups, and governments whose

   activities pose threats to U.S. security and safety. As we understand

   it, the goal of U.S. export control policy is not to prevent the spread

   of



                    encryption worldwide--something which clearly cannot be

          done--but to slow down the spread of these products enough to give

          U.S.-led diplomacy an opportunity to achieve increased multilateral

          cooperation on common export control policies and on the adoption of a

          global key management infrastructure. Such an international key

          management infrastructure would enable U.S. intelligence and law

          enforcement agencies to cooperate with their counterparts in friendly

          countries in gaining access to communications that threaten common

          security and safety interests.

      The elimination of all U.S. controls on encryption exports will also

   jeopardize domestic law enforcement. We recognize that encryption is

   essential to the fulfillment of the promise of electronic commerce and

   to the protection of individual privacy in a networked world. But

   encryption also complicates the mission of U.S. law enforcement

   agencies, because it can make it impossible for law enforcement

   personnel to understand data and communications to which they have been

   granted access under court order or other proper legal authority.

      This is why current U.S. policy seeks to promote the adoption of key

   recovery features in encryption products used in the United States.

   Export controls are a key component of this policy. Under current

   practice, U.S. firms are permitted to export powerful encryption

   products if they already include key recovery features or if they pledge

   to develop such features during the next two years. If we eliminate all

   U.S. export controls, as this bill would do, the federal government will

   therefore lose one of its most important means for promoting the

   development of key recovery in the U.S. market. That will harm U.S. law

   enforcement.

      Lawful wiretapping and duly authorized court-ordered access to

   information and materials on a timely basis are essential tools for

   police and law enforcement authorities. If this legislation were to be

   enacted in its present form, the resultant proliferation of global and

   interconnected encryption has the very real potential to deny our local,

   state and federal authorities the timely access they now enjoy to data

   and other communications, even after a court order has been issued.

      More than one half the annual court-ordered wire taps are at the

   state and local level, and of the national total for all such wire taps,

   more than 70% are for drug-related cases. Congressional action on this

   legislation has the potential to affect our cities and towns where the

   devastating impact of illicit drugs already causes nearly $70 billion in

   annual societal costs. We ought not to add to that carnage and

   destruction by denying law enforcement one of the most effective tools

   against this scourge, timely access to lawful requests for information

   needed to combat these crimes.

      Attorney General Janet Reno, our nation's chief law enforcement

   officer, urged the members of our Committee to consider the effects of

   this legislation in her July 18, 1997, letter to the International

   Relations Committee. She said that ``* * * the misuse of encryption

   technology will become a matter of life and death in many instances.

   That is why we urge you to adopt a balanced approach.'' We invite the

   attention of Members to correspondence from our Nation's law enforcement

   and national security leaders, appended below.

      During the full committee's consideration of H. R. 695, Chairman

   Gilman offered an amendment which would have helped to create this

   necessary balance in the bill. It would have provided the President the

   authorities to control the export and reexport of encrypted items if he

   determines that they would adversely affect our national security and

   our ability to fight crimes such as drug trafficking, terrorism and

   espionage. This amendment was, unfortunately, not adopted.

      Other Committees of the House including National Security,

   Intelligence and Commerce will now review this legislation through

   September 5 before it is considered by the full House later this year.

   We urge our colleagues on these Committees as well as our colleagues on

   the International Relations and the Judiciary Committees to review this

   legislation very carefully and consider its impact on our society and

   our ability to fight terrorism and protect our national security

   interests.



    Benjamin A. Gilman.



    Lee H. Hamilton.



    Doug Bereuter.









       Office of the Attorney General,



       Washington, DC, July 18, 1997.



       Dear Member of Congress: Congress is considering a variety of

   legislative proposals concerning encryption. Some of these proposals

   would, in effect, make it impossible for the Federal Bureau of

   Investigation (FBI), Drug Enforcement Administration (DEA), Secret

   Service, Customs Service, Bureau of Alcohol, Tobacco and Firearms, and

   other federal, state, and local law enforcement agencies to lawfully

   gain access to criminal telephone conversations or electronically stored

   evidence possessed by terrorists, child pornographers, drug kingpins,

   spies and other criminals. Since the impact of these proposals would

   seriously jeopardize safety and national security, we collectively urge

   you to support a different, balanced approach that strongly supports

   commercial and privacy interests but maintains our ability to

   investigate and prosecute serious crimes.

      We fully recognize that encryption is critical to communications

   security and privacy, and that substantial commercial interests are at

   stake. Perhaps in recognition of these facts, all the bills being

   considered allow market forces to shape the development of encryption

   products. We, too, place substantial reliance on market forces to

   promote electronic security and privacy, but believe that we cannot rely

   solely on market forces to protect the public safety and national

   security. Obviously, the government cannot abdicate its solemn

   responsibility to protect public safety and national security.

      Currently, of course, encryption is not widely used, and most data is

   stored, and transmitted, in the clear. As we move from a plain text

   world to an encrypted one, we have a critical choice to make: we can

   either (1) choose robust, unbreakable encryption that protects commerce

   and privacy but gives criminals a powerful new weapons, or (2) choose

   robust, unbreakable encryption that protects commerce and privacy and

   gives law enforcement the ability to protect public safety. The choice

   should be obvious and it would be a mistake of historic proportions to

   do nothing about the dangers to public safety posed by encryption

   without adequate safeguards for law enforcement.

      Let there be no doubt: without encryption safeguards, all Americans

   will be endangered. No one disputes this fact; not industry, not

   encryption users, no one. We need to take definitive actions to protect

   the safety of the public and security of the nation. That is why law

   enforcement at all levels of government--including the Justice

   Department, Treasury Department, the National Association of Attorneys

   General, International Association of Chiefs of Police, the Major City

   Chiefs, the National Sheriffs' Association, and the National District

   Attorneys Association--are so concerned about this issue.

      We all agree that without adequate legislation, law enforcement in

   the United States will be severely limited in its ability to combat the

   worst criminals and terrorists. Further, law enforcement agrees that the

   widespread use of robust non-key recovery encryption ultimately will

   devastate our ability to fight crime and prevent terrorism.

      Simply stated, technology is rapidly developing to the point where

   powerful encryption will become commonplace both for routine telephone

   communications and for stored computer data. Without legislation that

   accommodates public safety and national security concerns, society's

   most dangerous criminals will be able to communicate safely and

   electronically store data without fear of discovery. Court orders to

   conduct electronic surveillance and court-authorized search warrants

   will be ineffectual, and the Fourth Amendment's carefully-struck balance

   between ensuring privacy and protecting public safety will be forever

   altered by technology. Technology should not dictate public policy, and

   it should promote, rather than defeat, public safety

      We are not suggesting the balance of the Fourth Amendment be tipped

   toward law enforcement either. To the contrary, we only seek the status

   quo, not the lessening of any legal standard or the expansion of any law

   enforcement authority. The Fourth Amendment protects the privacy and

   liberties of our citizens but permits law enforcement to use tightly

   controlled investigative techniques to obtain evidence of crimes. The

   result has been the freest country in the world with the strongest

   economy.

      Law enforcement has already confronted encryption in high-profile

   espionage, terrorist, and criminal cases. For example:

       An international terrorist was plotting to blow up 11 U.S.-owned

   commercial airliners in the Far East. His laptop computer, which was

   seized in Manila, contained encrypted files concerning this terrorist

   plot;

       A subject in a child pornography case used encryption in

   transmitting obscene and pornographic images of children over the

   Internet; and



       A major international drug trafficking subject recently used a

   telephone encryption device to frustrate court-approved electronic

   surveillance.

    And this is just the tip of the iceberg. Convicted spy Aldrich Ames,

  for example, was told by the Russian Intelligence Service to encrypt

  computer file information that was to be passed to them.

      Further, today's international drug trafficking organizations are the

   most powerful, ruthless and affluent criminal enterprises we have ever

   faced. We know from numerous past investigations that they have utilized

   their virtually unlimited wealth to purchase sophisticated electronic

   equipment to facilitate their illegal activities. This has included

   state of the art communication and encryption devices. They have used

   this equipment as part of their command and control process for their

   international criminal operations. We believe you share our concern that

   criminals will increasingly take advantage of developing technology to

   further insulate their violent and destructive activities.

      Requests for cryptographic support pertaining to electronic

   surveillance interceptions from FBI Field Offices and other law

   enforcement agencies have steadily risen over the past several years.

   There has been an increase in the number of instances where the FBI's

   and DEA's court-authorized electronic efforts were frustrated by the use

   of encryption that did not allow for law enforcement access.

      There have also been numerous other cases where law enforcement,

   through the use of electronic surveillance, has not only solved and

   successfully prosecuted serious crimes but has also been able to prevent

   life-threatening criminal acts. For example, terrorists in New York were

   plotting to bomb the United Nations building, the Lincoln and Holland

   Tunnels, and 26 Federal Plaza as well as conduct assassinations of

   political figures. Court-authorized electronic surveillance enabled the

   FBI to disrupt the plot as explosives were being mixed. Ultimately, the

   evidence obtained was used to convict the conspirators. In another

   example, electronic surveillance was used to stop and then convict two

   men who intended to kidnap, molest, and kill a child. In all of these

   cases, the use of encryption might have seriously jeopardized public

   safety and resulted in the loss of life.

      To preserve law enforcement's abilities, and to preserve the balance

   so carefully established by the Constitution, we believe any encryption

   legislation must accomplish three goals in addition to promoting the

   widespread use of strong encryption. It must establish:

       A viable key management infrastructure that promotes electronic

   commerce and enjoys the confidence of encryption users;

       A key management infrastructure that supports a key recovery scheme

   that will allow encryption users access to their own data should the

   need arise, and that will permit law enforcement to obtain lawful access

   to the plain text of encrypted communications and data; and

       An enforcement mechanism that criminalizes both improper use of

   encryption key recovery information and the use of encryption for

   criminal purposes.

      Only one bill, S. 909 (the McCain/Kerrey/Hollings bill), comes close

   to meeting these core public safety, law enforcement, and national

   security needs. The other bills being considered by Congress, as

   currently written, risk great harm to our ability to enforce the laws

   and protect our citizens. We look forward to working to improve the

   McCain/Kerrey/Hollings bill.

      In sum, while encryption is certainly a commercial interest of great

   importance to this Nation, it is not solely a commercial or business

   issue. Those of us charged with the protection of public safety and

   national security, believe that the misuse of encryption technology will

   become a matter of life and death in many instances. That is why we urge

   you to adopt a balanced approach that accomplishes the goals mentioned

   above. Only this approach will allow police departments, attorneys

   general, district attorneys, sheriffs, and federal authorities to

   continue to use their most effective investigative techniques, with

   court approval, to fight crime and espionage and prevent terrorism.

   Sincerely your,



          Janet Reno, Attorney General; Louis Freeh, Director, Federal Bureau

     of Investigation; Thomas A. Constantine, Director, Drug Enforcement

     Administration; Raymond W. Kelly, Undersecretary for Enforcement, U.S.

     Department of Treasury; John W. Magaw, Director, Bureau of Alcohol,

     Tobacco and Firearms; Barry McCaffrey, Director, Office of National Drug

     Control Policy; Lewis C. Merletti, Director, United States Secret

     Service; George J. Weise, Commissioner, United States Customs Service.







       The Secretary of Defense,



       Washington, DC, July 21, 1997.



       Dear Member of Congress: Recently you received a letter from the

   nation's senior law enforcement officials regarding US encryption

   policies. I am writing today to express my strong support for their

   views on this important issue.

      As you know, the Department of Defense is involved on a daily basis

   in countering international terrorism, narcotics trafficking, and the

   proliferation of weapons of mass destruction. The spread of unbreakable

   encryption, as a standard feature of mass market communication products,

   presents a significant threat to the ability of the US and its allies to

   monitor the dangerous groups and individuals involved in these

   activities. Passage of legislation which effectively decontrols

   commercial encryption exports would undermine U.S. efforts to foster the

   use of strong key recovery encryption domestically and abroad. Key

   recovery products will preserve governments' abilities to counter

   worldwide terrorism, narcotics trafficking and proliferation.

      It is also important to note that the Department of Defense relies on

   the Federal Bureau of Investigation for the apprehension and prosecution

   of spies. Sadly, there have been over 60 espionage convictions of

   federal employees over the last decade. While these individuals

   represent a tiny minority of government employees, the impact of

   espionage activities on our nation's security can be enormous. As the

   recent arrests of Nicholson, Pitts and Kim clearly indicate, espionage

   remains a very serious problem. Any policies that detract from the FBI's

   ability to perform its vital counterintelligence function, including the

   ability to perform wiretaps, inevitably detract from the security of the

   Department of Defense and the nation.

      Encryption legislation must also address the nation's domestic

   information security needs. Today, approximately 95% of DoD

   communications rely on public networks; other parts of government, and

   industry, are even more dependent on the trustworthiness of such

   networks. Clearly, we must ensure that encryption legislation addresses

   these needs. An approach such as the one contained in S. 909 can go a

   long way toward balancing the need for strong encryption with the need

   to preserve national security and public safety. I hope that you will

   work with the Administration to enact legislation that addresses these

   national security concerns as well as the rights of the American people.

   I appreciate your consideration of these views.



   Sincerely,



         Bill Cohen.







       International Association of Chiefs of Police,



       Alexandria, VA, July 21, 1997.



       Dear Member of Congress: Enclosed is a letter sent to you by the

   Attorney General, the Director of National Drug Control Policy and all

   the federal law enforcement heads concerning encryption legislation

   being considered by congress. Collectively we, the undersigned,

   represent over 17,000 police departments including every major city

   police department, over 3,000 sheriffs departments, nearly every

   district attorney in the United States and all of the state Attorneys

   General. We fully endorse the position taken by our federal counterparts

   in the enclosed letter. As we have stated many times, Congress must

   adopt a balanced approach to encryption that fully addresses public

   safety concerns or the ability of state and local law enforcement to

   fight crime and drugs will be severely damaged.

      Any encryption legislation that does not ensure that law enforcement

   can gain timely access to the plaintext of encrypted conversations and

   information by established legal procedures will cause grave harm to

   public safety. The risk cannot be left to the uncertainty of market

   forces or commercial interests as the current legislative proposals

   would require. Without adequate safeguards, the unbridled use of

   powerful encryption soon will deprive law enforcement of two of its most

   effective tools, court authorized electronic surveillance and the search

   and seizure of information stored in computers. This will substantially

   tip the balance in the fight against crime towards society's most

   dangerous criminals as the information age develops.

      We are in unanimous agreement that congress must adopt encryption

   legislation that requires the development, manufacture, distribution and

   sale of only key recovery products and we are opposed to the bills that

   do not do so. Only the key recovery approach will ensure that law

   enforcement can continue to gain timely access to the plaintext of

   encrypted conversations and other evidence of crimes when authorized by

   a court to do so. If we lose this ability--and the bills you are

   considering will have this result--it will be a substantial set back for

   law enforcement at the direct expense of public safety.

   Sincerely yours,



    Darrell L. Sanders,



      President, International Association of Chiefs of Police.



    James E. Doyle,



      President, National Association of Attorneys General.



    Fred Scoralic,



      President, National Sheriffs' Association.



    William L. Murphy,



      President, National District Attorneys Association.