Interesting People mailing list archives

IP: ASCII of scary bill sent due to importance n[I used to say


From: David Farber <farber () cis upenn edu>
Date: Mon, 15 Sep 1997 13:46:40 -0400

13 September 1997
Source: Hardcopy from Declan McCullagh <declan () well com> of Time Magazine=20


See summary of amendment by Declan McCullagh: http://jya.com/declan7.htm=20


See Netly News column by Declan McCullagh:
http://cgi.pathfinder.com/netly/opinion/0,1042,1385,00.html=20








----------------------------------------------------------------------------
----


From: Congressional Record: September 11, 1997 (Digest)
=20
                        House of Representatives


Committee Meetings


SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT


Permanent Select Committee on Intelligence: Met in executive session=20
and ordered reported amended H.R. 695, Security and Freedom Through=20
Encryption (SAFE) Act.


----------------------------------------------------------------------------
----


Header all pages: F:\SLS\SECURE.002 =A0H.L.C.
Footer all pages: September 10, 1997 (9:06 p.m.)






AMENDMENT IN THE NATURE OF A SUBSTITUTE=20


TO H.R. 695=20


OFFERED BY MR. GOSS AND MR. DICKS=20






Strike all after the enacting clause and insert the following:=20


SECTION 1. SHORT TITLE; TABLE OF CONTENTS=20


(a) Short Title. -- This act may be cited as the "Security and Freedom
Through Encryption ('SAFE') Act of 1997".=20
(b) Table of Contents. -- The table of contents is as follows:=20


Sec. 1. Short title; table of contents.=20


Sec. 2. Statement of policy.=20


TITLE I -- DOMESTIC USES OF ENCRYPTION=20


Sec. 101. Definitions.=20


Sec. 102. Lawful use of encryption=20


Sec. 103. Voluntary private sector participation in key management
infrastructure.=20


Sec. 104. Unlawful use of encryption.=20


TITLE II -- GOVERNMENT PROCUREMENT=20


Sec. 201. Federal purchases of encryption products.=20


Sec. 202. Encryption products purchased with Federal funds.=20


Sec. 203. Networks established with Federal funds.=20


Sec. 204. Product labels.=20


Sec. 205. No private mandate.=20


Sec. 206. Implementation.=20


TITLE III -- EXPORTS OF ENCRYPTION=20


Sec. 301. Exports of encryption.=20


Sec. 302. License exception for certain encryption products.=20


Sec. 303. License exception for telecommunications products.=20


Sec. 304. Review for certain institutions.=20


Sec. 305. Encryption industry and information security board.=20


TITLE IV -- LIABILITY LIMITATIONS=20


Sec. 401. Compliance with court order.=20






----------------------------------------------------------------------------
----


[2]




Sec. 402. Compliance Defense.=20


Sec. 403. Reasonable Care Defense.=20


Sec. 404. Good Faith Defense.=20


Sec. 405. Sovereign Immunity.=20


Sec. 406. Civil Action, Generally.=20


TITLE V -- INTERNATIONAL AGREEMENTS=20


Sec. 501. Sense of Congress.=20


Sec. 502. Failure to Negotiate.=20


Sec. 503. Report to Congress.=20


TITLE VI -- MISCELLANEOUS PROVISIONS=20


Sec. 601. Effect on Law Enforcement Activities.=20


Sec. 602. Interpretation.=20


Sec. 603. Severability.




Amendment to the Amendment, Mr. Skaggs #1=20


Amendment to the Amendment, Mr. Skaggs #2=20


Amendment to the Amendment, Mr. Gibbons=20




SEC 2. STATEMENT OF POLICY=20


It is the policy of the United States to protect public computer networks
through the use of strong encryption technology, to promote and improve the
export of encryption products developd and manufactured in the United
States, and to preserve public safety and national security.




TITLE I - DOMESTIC USES OF ENCRYPTION


SEC. 101. DEFINITIONS=20


For purposes of this Act:=20


(1) ATTORNEY FOR THE GOVERMENT. -- The term "attorney for the Government"
has the meaning given such term in Rule 54(c) of the Federal Rules of
Criminal Procedure, and also includes any duly authorized attorney of a
State who is authorized to prosecute criminal offenses within such State.=20








----------------------------------------------------------------------------
----


3=20


(2) COMMUNICATIONS.-- The term "communications" means any wire
communications or electronic communications as those terms are defined in
paragraphs (1) and (12) of section 2510 of title 18, United States Code.=20


(3) COURT OF COMPETENT JURISDICTION.-- The term "court of competent
jurisdiction" means any court of the United States organized under Article
III of the Constitution of the United States, the court organized under the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.), or
a court of general criminal jurisdiction of a State authorized pursuant to
the laws of such State to enter orders authorizing searches and seizures.=20


(4) DATA NETWORK SERVICE PROVIDER.-- The term "data network service
provider" means a person offering any service to the general public that
provides the users thereof with the ability to transmit or receive data,
including communications.=20


(5) DECRYPTION.-- The term "decryption" means the retransformation or
unscrambling of encrypted data, including communications, to tis readable
plaintext version. To "decrypt" data, including communications, is to
perform decryption.=20






----------------------------------------------------------------------------
----


4=20


(6) DECRYPTION INFORMATION.-- The term "decryption information" means
information or technology that enables one to readily retransform or
unscramble encrypted data from its unreadable and incomprehensible format
to its readable plaintext version.=20


(7) ELECTRONIC STORAGE.-- The term "electronic storage" has the meaning
given that term in section 2510(17) of title 18, United States Code.=20


(8) ENCRYPTION.-- The term "encryption" means the transformation or
scrambling of data, including communications, from plaintext to an
unreadable or incomprehensible format, regardless of the technique utilized
for such transformation or scrambling and irrespective of the medium in
which such data, including communications, occur or can be found, for the
purposes of protecting the content of such data, including communications.
To "encrypt" data, including communications, is to perform encryption.=20


(9) ENCRYPTION PRODUCT.-- The term "encryption product" means any software,
technology, or mechanism, that be used to encrypt or decrypt, or has the
capability of encrypting or decrypting any data, including communications.=
=20






----------------------------------------------------------------------------
----


5=20


(10) FOREIGN AVAILABILITY.-- The term "foreign availability" has the
meaning applied to foreign availability of encryption products subject to
controls under the Export Administration Regulations, as in effect on
September 1, 1997.=20


(11) GOVERNMENT.-- The term "Government" means the Government of the United
States and any agency or instrumentality thereof, or the government of any
State.=20


(12) INVESTIGATIVE OR LAW ENFORCEMENT OFFICER.-- The term "investigative or
law enforcement officer" has the meaning given that term in section 2510(7)
of title 18, United States Code.=20


(13) NATIONAL SECURITY.-- The term "national security" means the national
defense, foreign relations, or economic interests of the United States.=20


(14) PLAINTEXT.-- The term "plaintext" means the readable or comprehensible
format of data, including communications, prior to its being encrypted or
after it has been decrypted.=20


(15) PLAINVOICE.-- The term "plainvoice" means communication specific
plaintext.=20


(16) SECRETARY.-- The term "secretary" means the Secretary of Commerce,
unless otherwise specifically identified.=20






----------------------------------------------------------------------------
----


6=20


(17) STATE.-- The term "State has the meaning given that term in section
2510(3) of title 18, United States Code.=20


(18) TELECOMMUNICATIONS CARRIER.-- The term "telecommunications carrier"
has the meaning given that term in section 102(8) of the Communications
Assistance for Law Enforcement Act (47 U.S.C. 1001(8)).=20


(19) TELECOMMUNICATIONS SYSTEM.-- the term "telecommunications system"
means any equipment, technology, or related software used in the movement,
switching, interchange, transmission, reception, or internal signaling of
data, including communications over wire, fiber optic, radio frequency, or
other medium.=20


(20) UNITED STATES PERSON.-- The term "United States Person" means --=20


(A) any citizen of the United States;=20
(B) any other person organized under the laws of any State; and=20


(C) any person organized under the laws of any foreign country who is owned
or controlled by individuals or persons described in subparagraphs (A) and
(B).=20






----------------------------------------------------------------------------
----


7=20


SEC. 102. LAWFUL USE OF ENCRYPTION.=20


Except as otherwise provided by this Act or otherwise provided by law, it
shall be lawful for any person within any State and for any United States
person to use any encryption, regardless of encryption algorithm selected,
encryption key length chosen, or implementation technique or medium used.=20


SEC. 103. VOLUNTARY PRIVATE SECTOR PARTICIPATION IN KEY MANAGEMENT
INFRASTRUCTURE=20


(a) USE IS VOLUNTARY.-- The use of registered certificate authorities or
key recovery agents is voluntary.=20
(b) REGULATIONS.-- The Secretary shall promulgate regulations establishing
standards for creating key management infrastructures. Such regulations
should--=20


(1) allow for the voluntary participation by private persons and
non-Federal entities; and=20
(2) promote the development of certificate authorities and key recovery
agents.=20


(c) REGISTRATION OF CERTIFICATE AUTHORITIES AND KEY RECOVERY AGENTS.--
Certificate authorities and key recovery agents meeting the standards
established by the Secretary may be registered by the Secretary if they so
choose, and may identify themselves as meeting the standards of the
Secretary.=20






----------------------------------------------------------------------------
----


8=20


SEC. 104. UNLAWFUL USE OF ENCRYPTION.=20


(a) In General. -- Part I of title 18, United States Code, is amended by
inserting after chapter 121 the following new chapter:=20


"CHAPTER 122 -- ENCRYPTED DATA, INCLUDING=20


COMMUNICATIONS=20


"Sec.=20
"2801. Unlawful use of encryption in furtherance of a criminal act.=20


"2802. Privacy protection.=20


"2803. Unlawful sale of encryption.=20


"2804. Encryption products manufactured and intended for use in the United
States.=20


"2805. Injunctive relief and proceedings.=20


"2806. Court order access to plaintext.=20


"2807. Notification procedures.=20


"2808. Lawful use of plaintext or decryption information.=20


"2809. Identification of decryption information.=20


"2810. Unlawful export of certain encryption products.=20


"2811. Definitions.=20




"=A7 2801. Unlawful use of encryption in furtherance of a criminal act=20


"(a) Prohibited Acts. -- Whoever knowingly uses encryption in furtherance
of the commission of a criminal offense for which the person may be
prosecuted in a district court of the United States shall --=20
"(1) in the case of a first offense under this section, shall be imprisoned
for not more than 5 years, or fined under this title, or both; and=20
"(2) in the case of a second or subsequent offense under this section,
shall be imprisoned for not more than 10 years, or fined under this title,
or both.=20








----------------------------------------------------------------------------
----


9=20


"(b) CONSECUTIVE SENTENCE.-- Notwithstanding any other provision of law,
the court shall not place on probation any person convicted of a violation
of this section, nor shall the term of imprisonment imposed under this
section run concurrently with any other term of imprisonment imposed for
the underlying criminal offense.=20


"(c) PROBABLE CAUSE NOT CONSTITUTED BY USE OF ENCRYPTION.-- The use of
encryption alone shall not constitute probable cause to believe that a
crime is being or has been committed.=20


"=A7 2802. Privacy protection=20


"(a) IN GENERAL.-- It shall be unlawful for any person to intentionally--=20


"(1) obtain or use decryption information without lawful authority for the
purpose of decrypting data, including communications;=20


"(2) exceed lawful authority in decrypting data, including communications;=
=20


"(3) break the encryption code of another person without lawful authority
for the purpose of violating the privacy or security of that person or
depriving that person of any property rights;=20


"(4) impersonate another person for the purpose of obtaining decryption
information of that person without lawful authority;=20








----------------------------------------------------------------------------
----


10




"(5) facilitate or assists in the encryption of data, including
communications, knowing that such data, including communications, are to be
used in furtherance of a crime; or=20


"(6) disclose decryption information in violation of a provision of this
chapter.=20


"(b) CRIMINAL PENALTY.-- Whoever violated this section shall be imprisoned
not more that 10 years, fined under this title, or both.=20


"=A7 2803. Unlawful sale of encryption=20


"Whoever sells in interstate or foreign commerce any encryption product
that does not include features or functions permitting duly authorized
persons immediate access to plaintext or immediate decryption capabilities
shall be imprisoned for not more than 5 years, fined under this title, or
both.=20


"=A7 2804. Encryption products manufactured and intended for use in the
United States=20


"(a) PUBLIC NETWORK SERVICE PROVIDERS.-- Not later than January 31, 2000,
public network service providers offering encryption products or encryption
services shall ensure that such products or services enable the immediate
decryption or access to plaintext of the data, including communications,
encrypted by such products or=20






----------------------------------------------------------------------------
----


11




services on the public network upon receipt of a court order or warrant,
pursuant to section 2806.=20


"(b) MANUFACTURERS, DISTRIBUTORS, AND IMPORTERS.-- Not later than January
31, 2000, it shall be unlawful for any person to manufacture for
distribution, distribute, or import encryption products intended for sale
or use in the United States, unless that product--=20


"(1) includes features or functions that provide an immediate access to
plaintext capability, through any means, mechanism, or technological method
that--=20


"(A) permits immediate decryption of the encrypted data, including
communications, upon the receipt of decryption information by an authorized
party in possession of a facially valid order issued by a court of
competent jurisdiction; and=20


"(B) allows the decryption of encrypted data, including communications,
without the knowledge or cooperation of the person being investigated,
subject to the requirements set forth in section 2806; or=20


"(2) can be used only on systems or networks that include features or
functions that provide an immediate access to plaintext capability, through=
=20








----------------------------------------------------------------------------
----


12






any means, mechanism, or technological method that--=20


"(A) permits immediate decryption of the encrypted data, including
communications, upon the receipt of decryption information by an authorized
party in possession of a facially valid order issued by a court of
competent jurisdiction; and=20
"(B) allows the decryption of encrypted data, including communications,
without the knowledge or cooperation of the person being investigated,
subject to the requirements set forth in section 2806; or=20




"(3) otherwise meets the technical requirements and functional criteria
promulgated by the Attorney General under subsection (c).=20


"(c) ATTORNEY GENERAL CRITERIA.--=20
"(1) PUBLICATION OF REQUIREMENTS.-- Within 180 days after the date of the
enactment of this chapter, the Attorney General shall publish in the
Federal Register technical requirements and functional criteria for
complying with the decryption requirements set forth in this section.=20
"(2) PROCEDURES FOR ADVISORY OPINIONS.-- Within 180 days after the date of
the enactment of=20










----------------------------------------------------------------------------
----


13






this chapter, the Attorney General shall promulgate procedures by which
data network service providers and encryption product manufacturers,
sellers, resellers, distributors, and importers may obtain advisory
opinions as to whether an encryption product intended for sale or use in
the United States after January 1, 2000, meets the requirements and
functional criteria promulgated pursuant to paragraph (1).=20
"(3) PARTICULAR METHODOLOGY NOT REQUIRED.-- Nothing in this chapter or any
other provision of law shall be construed as requiring the implementation
of any particular decryption methodology in order to satisfy the
requirements of subsection (a) and (b) of this section, or the technical
requirements and functional criteria required by the Attorney General under
paragraph (1).=20




"(d) USE OF PRIOR PRODUCTS LAWFUL.-- After January 31, 2000, it shall not
be unlawful to use any encryption product purchased or in use prior to such
date.=20


"=A7 2805. Injunctive relief and proceedings=20


"(a) INJUNCTION.-- Whenever it appears to the Secretary or the Attorney
General that any person is engaged in, or is about to engage in, any act
that constitutes, or=20




----------------------------------------------------------------------------
----


14






would constitute, a violation of section 2804, the Attorney General may
initiate a civil action in a district court of the United States to enjoin
such violation. Upon the filing of the complaint seeking injunctive relief
by the Attorney General, the court shall automatically issue a temporary
restraining order against the party being sued.=20
"(b) BURDEN OF PROOF.-- In a suit brought by the Attorney General under
subsection (a), the burden shall be upon the Government to establish by a
preponderance of the evidence that the encryption product to be
manufactured and distributed for use in the United States does not comport
with the requirements set forth by the Attorney General pursuant to section
2804 providing for immediate access to plaintext by Federal, State, or
local authorities.=20


"(c) CLOSING OF PROCEEDINGS.--=20


"(1) Upon motion of the party against whom injunction is being sought--=20
"(A) any or all of the proceedings under this section shall be closed to
the public; and=20
"(B) public disclosure of the proceedings shall be treated as contempt of
court.=20


"(2) Upon a written finding by the court that public disclosure of
information relevant to the prosecution of the injunction or relevant to a
determination of the factual or legal issues raised in the case would cause
irreparable=20








----------------------------------------------------------------------------
----


15




or financial harm to the party against whom the suit is brought, or would
otherwise disclose proprietary information of any party to the case, all
proceedings shall be closed to members of the public, except the parties to
the suit, and all transcripts, motions, and orders shall be placed under
seal to protect their disclosure to the general public.=20
"(d) ADVISORY OPINION AS DEFENSE.-- It is an absolute defense to a suit
under this subsection that the party against whom suit is brought obtained
an advisory opinion from the Attorney General pursuant to section 2804(c)
and that the product at issue in the suite comports in every aspect with
the requirements announced in such advisory opinion.=20


"(e) BASIS FOR PERMANENT INJUNCTION.-- The court shall issue a permanent
injunction against the distribution of, and any future manufacture of, the
product at issue in the suit filed under subsection (a) if the court finds
by a preponderance of the evidence that the product does not meet the
requirements set forth by the Attorney General pursuant to section 2804
providing for immediate access to plaintext by Federal, State, or local
authorities.=20
"(f) APPEALS.-- Either party may appeal, to the appellate court with
jurisdiction of the case, any adverse ruling by the district court entered
pursuant to this section.=20






----------------------------------------------------------------------------
----


16




For the purposes appeal, the parties shall be governed by the Federal Rules
of Appellate Procedure, except that the Government shall file its notice of
appeal not later than 30 days after the entry of the final order on the
docket of the district court. the appeal of such matter shall be considered
on an expedited basis and resolved as soon as practicable.=20


"=A7 2806. Court order access to plaintext=20


"(a) COURT ORDER.--=20
"(1) A court of competent jurisdiction shall issue an order, ex parte,
granting an investigative or law enforcement officer access to the
plaintext of encrypted data, including communications, or requiring any
person in possession of decryption information to provide such information
to a duly authorized investigative or law enforcement officer--=20
"(A) upon the application by an attorney for the Government that--=20
"(i) is made under oath or affirmation by the attorney for the Government;
and=20
"(ii) provides a factual basis establishing the relevance of the plaintext,
or decryption information, being sought has to a law enforcement or foreign
counterintelligence investigation then being conducted pursuant to lawful
authorities; and=20








----------------------------------------------------------------------------
----


17




"(B) if the court finds , in writing, that the plaintext or decryption
information being sought is relevant to an ongoing lawful law enforcement
or foreign counterintelligence investigation and the investigative or law
enforcement officer is entitled to such plaintext or decryption information.=
=20
"(2) The order issued by the court under this section shall be placed under
seal, except that a copy may be made available to the investigative or law
enforcement officer authorized to obtain access to the plaintext of the
encrypted information, or authorized to obtain the decryption information
sought in the application. Such order shall also be made available to the
person responsible for providing the plaintext or the decryption
information, pursuant to such order, to the investigative or law
enforcement officer.=20


"(3) Disclosure of an application made, or order issued, under this
section, is not authorized, except as may otherwise be specifically
permitted by this section or another order of the court.=20




"(b) OTHER ORDERS.--=20
(1) An attorney for the Government may apply to a court of competent
jurisdiction for a warrant or order, including the court established by the
Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1801 et seq.), to
obtain immediate access to the=20






----------------------------------------------------------------------------
----


18=20




plaintext of encrypted data, including communications, or to obtain
decryption information that will allow for immediate decryption of
encrypted data, including communications. "=20
(2) An attorney for the Government may make application to a district court
of the United States to obtain access to the plaintext of encrypted data,
including communications, or to obtain decryption information that will
allow for immediate decryption of encrypted data, including communications
upon a request from a foreign country pursuant to a Mutual Legal Assistance
Treaty with such country that is in effect at the time of the request from
such country.=20




[Insert Mr. Skaggs #1 amendment*]=20




"(c) AUTHORITY TO INTERCEPT COMMUNICATIONS NOT INCREASED.-- Nothing in this
chapter shall be construed to enlarge or modify the circumstances or
procedures under which a Government entity is entitled to intercept or
obtain oral, wire, or electronic communications or information.=20
"(d) CONSTRUCTION.-- This chapter shall be strictly construed to apply only
to a Government entity's ability to decrypt data, including communications,
for which it has previously obtained lawful authority to intercept or
obtain pursuant to other lawful authorities that would otherwise remain
encrypted.=20




_______________________=20


* Change made by hand.=20






----------------------------------------------------------------------------
----


19




"=A7 2807.Notification procedures=20


"(a) IN GENERAL.-- Within a reasonable time, but not later that 90 days
after the filing of an application for an order under section 2806 which is
granted, the judge shall cause to be served, on the persons named in the
order or the application, and such other parties whose decryption
information or whose plaintext has been provided to an investigative or law
enforcement officer pursuant to this chapter as the judge may determine in
his or her discretion that is in the interest of justice, an inventory
which shall include notice of--=20
"(1) the fact of the entry of the order or the application;=20
"(2) the date of the entry of the application and issuance of the order; and=
=20


"(3) the fact that the person's decryption information or plaintext data,
including communications, have been provided or accessed by an
investigative or law enforcement officer.=20


The judge, upon the filing of a motion, may in his or her discretion make
available to that person or that person's counsel, for inspection, such
portions of the plaintext, applications, and orders as the judge determines
to be in the interest of justice. On an ex parte showing of good cause to a
judge of competent jurisdiction, the serving of=20








----------------------------------------------------------------------------
----


20




the inventory required by this subsection may be postponed.=20
"(b) ADMISSION INTO EVIDENCE.-- The contents of any encrypted information
that has been pursuant to this chapter or evidence derived therefrom shall
not be received in evidence or otherwise disclosed in any trial, hearing,
or other proceeding in a Federal or State court unless each party, not less
that 10 days before the trial, hearing, or proceeding, has been furnished
with a copy of the order, and accompanying application, under which the
decryption or access to plaintext was authorized or approved. this 10-day
period may be waived by the judge if he finds that it was not possible to
furnish the party with the information described in the preceding sentence
within 10 days before the trail, hearing, or proceeding and that the party
will not be prejudiced by the delay in receiving such information.=20


"(c) CONTEMPT.-- Any violation of the provisions of this subsection may be
punished as contempt of the issuing or denying judge.=20


"(d) MOTION TO SUPPRESS.-- Any aggrieved person in any trial, hearing, or
proceeding in or before any court, department, officer, agency, regulatory
body, or other authority of the United States or a State may move to
suppress the contents of any decrypted data, including com-=20








----------------------------------------------------------------------------
----


21




munications, obtained pursuant to this chapter, or evidence derived
therefrom, on the grounds that --=20
"(1) the plaintext was unlawfully decrypted or accessed;=20
"(2) the order of authorization or approval under which it was decrypted or
accessed is insufficient on its face; or=20


"(iii)[sic] the decryption was not made in conformity with the order of
authorization or approval.=20




Such motion shall be made before the trial, hearing, or proceeding unless
there was no opportunity to make such motion, or the person was not aware
of the grounds of the motion. If the motion is granted, the plaintext of
the decrypted data, including communications, or evidence derived
therefrom, shall be treated as having been obtained in violation of this
chapter. The judge, upon the filing of such motion by the aggrieved person,
may in his or her discretion make available to the aggrieved person or that
person's counsel for inspection such portions of the decrypted plaintext,
or evidence derived therefrom, as the judge determines to be in the
interests of justice.=20


"(e) APPEAL BY UNITED STATES.-- In addition to any other right to appeal,
the United States shall have the right to appeal from an order granting a
motion to suppress made under subsection (d), or the denial of an=20








----------------------------------------------------------------------------
----


22=20




application for an order of approval, if the United States attorney
certifies to the judge or other official granting such motion or denying
such application that the appeal is not taken for purposes of delay. Such
appeal shall be taken within 30 days after the date the order was entered
on the docket and shall be diligently prosecuted.=20
"(f) CIVIL ACTION FOR VIOLATION.-- except as otherwise provided in this
chapter, any person described in subsection (g) may in a civil action
recover from the United States Government the actual damages suffered by
the person as a result of a violation described in that subsection,
reasonable attorney's fees, and other litigation costs reasonably incurred
in prosecuting such claim.=20


"(g) COVERED PERSONS.-- Subsection (f) applies to any person whose
decryption information--=20


"(1) is knowingly obtained without lawful authority by an investigative or
law enforcement officer;=20
"(2) is obtained by an investigative or law enforcement officer with lawful
authority and is knowingly used or disclosed by such officer unlawfully; or=
=20


"(3) is obtained by an investigative or law enforcement officer with lawful
authority and whose decryption information is unlawfully used to disclose
the plaintext of the data, including communications.=20








----------------------------------------------------------------------------
----


23




"(h) LIMITATION.-- A civil action under subsection (f) shall be commenced
not later that 2 years after the date on which the unlawful action took
place, or 2 years after the date on which the claimant first discovers the
violation, whichever is later.=20
"(i) EXCLUSIVE REMEDIES.-- The remedies and sanctions described in this
chapter with respect to the decryption of data, including communications,
are the only judicial remedies and sanctions for nonconstitutional
violations of this chapter involving such decryptions.=20


"(j) TECHNICAL ASSISTANCE BY PROVIDERS.-- A provider of encryption
technology or network service that has received an order issued by a court
pursuant to this chapter shall provide to the investigative or law
enforcement officer concerned such technical assistance as is necessary to
execute the order. Such provider may, however, move the court to modify or
quash the order on the ground that its assistance with respect to the
decryption or access to plaintext cannot be performed ina timely or
reasonable fashion. The court, upon notice to the Government, shall decide
such motion expeditiously.=20


"(k) REPORTS TO CONGRESS.--In May of each year, the Attorney General, or an
Assistant Attorney General specifically designated by the Attorney General,
shall report, in writing, to Congress on the number of applications=20








----------------------------------------------------------------------------
----


24




made and orders entered authorizing Federal, State, and local law
enforcement access to decryption information for the purposes of reading
the plaintext of otherwise encrypted data, including communications,
pursuant to this chapter. Such reports shall be submitted to the Committees
on the Judiciary of the House of Representatives and of the Senate, and to
the Permanent Select Committee on Intelligence for the House of
Representatives and the Select Committee on Intelligence for the Senate.=20
"=A7 2808. Lawful use of plaintext or decryption information=20


"(a) AUTHORIZED USE OF DECRYPTION INFORMATION.--=20
"(1) CRIMINAL INVESTIGATIONS.-- An investigative or law enforcement officer
to whom plaintext or decryption information is provided may use such
plaintext or decryption information for the purposes of conducting a lawful
criminal investigation, and for the purposes of preparing for and
prosecuting any criminal violation of law.=20
"(2) CIVIL REDRESS.-- Any plaintext or decryption information provided
under this chapter to an investigative or law enforcement officer may not
be disclosed, except by court order, to any other=20








----------------------------------------------------------------------------
----


25






person for use in a civil proceeding that is unrelated to a criminal
investigation and prosecution for which the plaintext or decryption
information is authorized under paragraph (1). Such order shall only issue
upon a showing by the party seeking disclosure that there is no alternative
means of obtaining the plaintext, or decryption information, being sought
and the court also finds that the interests of justice would not be served
any non-disclosure.=20


"(b) LIMITATION.-- An investigative or law enforcement officer may not use
decryption information obtained under this chapter to determine the
plaintext of any data, including communications, unless it has obtained
lawful authority to obtain such data, including communications, under other
lawful authorities.=20
"(c) RETURN OF DECRYPTION INFORMATION.-- An attorney for the Government
shall, upon the issuance of an order of a court of competent jurisdiction--=
=20


"(1)=20
"(A) return any decryption information to the person responsible for
providing it to an investigative or law enforcement officer pursuant to
this chapter; or=20
"(B) destroy such decryption information, if the court finds that the
interests of justice or public=20










----------------------------------------------------------------------------
----


26




safety require that such decryption information should not be returned to
the provider; and=20
"(2) within 10 days after execution of the court's order to destroy the
decryption information--=20


"(A) certify to the court that the decryption information has either been
returned or destroyed consistent with the court's order; and=20
"(B) notify the provider of the decryption information of the destruction
of such information.=20




"(d) OTHER DISCLOSURE OF DECRYPTION INFORMATION.-- Except as otherwise
provided in section 2806, a key recovery agent may not disclose decryption
information stored with the key recover agent by a person unless the
disclosure is--=20
"(1) to the person, or an authorized agent thereof;=20
"(2) with the consent of the person, including pursuant to a contract
entered into with the person;=20


"(3) pursuant to a court order upon a showing of compelling need for the
information that cannot be accommodated by any other means if--=20








----------------------------------------------------------------------------
----


27




"(A) the person who supplied the information is given reasonable notice, by
the person seeking the disclosure, of the court proceeding relevant to the
issuance of the court order; and=20
"(B) the person who supplied the information is afforded the opportunity to
appear in the court proceeding and context the claim of the person seeking
the disclosure;=20


"(4) pursuant to a determination by a court of competent jurisdiction that
another person is lawfully entitled to hold such decryption information,
including determinations arising from legal proceedings associated with the
incapacity, death, or dissolution of any person; or=20


"(5) otherwise permitted by a provision of this chapter or otherwise
permitted by law.=20




"=A7 2809. Identification of decryption information=20


"(a) IDENTIFICATION.-- to avoid inadvertent disclosure, any person who
provides decryption information to an investigative or law enforcement
officer pursuant to this chapter shall specifically identify that part of
the material provided that discloses decryption information as such.=20
"(b) RESPONSIBILITY OF INVESTIGATIVE OR LAW ENFORCEMENT OFFICER.-- The
investigative or law en-=20








----------------------------------------------------------------------------
----


28




forcment officer receiving any decryption information under this chapter
shall maintain such information in facilities and in a method so as to
reasonably assure that inadvertent disclosure shall not occur.=20


"=A7 2810. Unlawful export of certain encryption products=20


"Whoever knowingly exports an encryption product that does not include
features or functions providing duly authorized persons immediate access to
plaintext or immediate decryption capabilities, as required under law,
shall be imprisoned for not more that 5 years, fined under this title or
both.=20




"=A7 2811. Definitions=20


"The definitions set forth in section 101 of the Security and Freedom
through Encryption ('SAFE') Act of 1997 shall apply to this chapter.=20


[SEC. 104] (b) CONFORMING AMENDMENT.-- The table of chapters for part I of
title 18, United States Code, is amended by inserting after the item
relating to chapter 33 the following new item:=20


"122. Encrypted data,including communications.......2801".=20




----------------------------------------------------------------------------
----


29




TITLE II -- GOVERNMENT PROCUREMENT=20
=A0=20


SEC. 201. FEDERAL PURCHASES OF ENCRYPTION PRODUCTS.=20


After January 1, 1999, any encryption product or service purchased or
otherwise procured by the United States Government to provide the security
service of data confidentiality for a Federal computer system shall include
a technique for enabling immediate decryption by an authorized party
without the knowledge or cooperation of the person using such encryption
products or services.=20


SEC. 202. ENCRYPTION PRODUCTS PURCHASED WITH FEDERAL FUNDS.=20


After January 1, 1999, any encryption product or service purchased directly
with Federal funds to provide the security service of data confidentiality
shall include a technique for enabling immediate decryption by an
authorized party without the knowledge or cooperation of the person using
such encryption product or service unless the Secretary of commerce, with
the concurrence of the Attorney General, determines implementing this
requirement would not promote the purposes of this Act.=20


SEC. 203. NETWORKS ESTABLISHED WITH FEDERAL FUNDS.=20


After January 1, 1999, any communications network established with the use
of Federal funds shall use encryption products which include a techniques
for enabling immediate decryption by an authorized party without the
knowledge or cooperation of the person using such encryption products or
services unless the Secretary of commerce, with the concurrence of the
Attorney General, determines implementing this requirement would not
promote the purposes of this Act.=20


SEC. 204. PRODUCT LABELS.=20


An encryption product may be labeled to inform users that the product is
authorized for sale to or for use in transactions and communications with
the United States Government under this title.=20


SEC. 205. NO PRIVATE MANDATE.=20


The United States Government may not mandate the use of encryption
standards for the private sector other than for use with computer systems,
networks or other systems of the United States Government, or systems or
networks created using Federal funds.=20


SEC. 206. IMPLEMENTATION=20


(a) EXCLUSION.-- Nothing in this title shall apply to encryption products
and services used solely for access control, authentication, integrity,
nonrepudiation, digital signatures, or similar purposes.=20
(b) RULEMAKING.-- The Secretary, in consultation with the Attorney General
and other affected agencies,=20






----------------------------------------------------------------------------
----


31




may through rules provide for the orderly implementation of this title and
the effective use of secure public networks.=20




TITLE III - EXPORTS OF ENCRYPTION=20
SEC. 301. EXPORTS OF ENCRYPTION=20


(a) COORDINATION OF EXECUTIVE BRANCH AGENCIES REQUIRED.-- The Secretary, in
close coordination with the Secretary of Defense and other executive branch
department or agency with responsibility for protecting the national
security of the United States, shall have the authority to control the
export of encryption products not controlled on the United States Munitions
List.=20


(b) DECISIONS NOT SUBJECT TO JUDICIAL REVIEW.-- Decisions made by the
Secretary, after coordination with the Secretary of Defense and other
executive branch department or agency with respect to exports of encryption
products under this title shall not be subject to judicial review.=20


SEC. 302. LICENSE EXCEPTION FOR CERTAIN ENCRYPTION PRODUCTS.=20


(a) LICENSE EXCEPTION.-- Beginning January 31, 2000, encryption products,
without regard to encryption strength, shall be eligible for export under a
license exception if such encryption product --=20




----------------------------------------------------------------------------
----


32






(1) is submitted to the Secretary for a 1-time product review;=20
(2) does not include features or functions that would otherwise require
licensing under applicable regulations;=20


(3) is not destined for countries, end users, or end uses that the
Secretary, in coordination with the Secretary of Defense and other
executive branch departments or agencies with responsibility for protecting
the national security of the United States, by regulation, has determined
should be ineligible to receive such products, and is otherwise qualified
for export; and=20


(4)=20


(A) includes features or functions providing an immediate access to
plaintext capability, if there is lawful authority for such immediate
access; or=20
(B) includes features or functions providing an immediate decryption
capability of the encrypted data, including communications, upon the
receipt of decryption information by an authorized party, and such
decryption can be accomplished without unauthorized disclosure.=20




(b) ENABLING DECRYPTION CAPABILITIES.-- The features or functions described
in subsection (a)(4) need not be enabled by the manufacturer at the time of
export=20




----------------------------------------------------------------------------
----


33




for purposes of this title. Such features and functions may be enabled by
the purchaser or end-user.=20
(c) RESPONSIBILITIES OF THE SECRETARY.-- The Secretary, in coordination
with the Secretary of Defense and other executive branch departments or
agencies with responsibility for protecting the national security of the
United States, shall,--=20


(1) specify, by regulation, the information that must be submitted for the
1-time review referred to in this section; and=20
(2) make all export determinations under this title within 30 days
following the date of submission to the Secretary of--=20


(A) the completed application for a license exception; and=20
(B) the encryption product intended for export that shall be reviewed as
required by this section.=20




(d) EXERCISE OF OTHER AUTHORITIES.-- =A0The Secretary, and the Secretary of
Defense, may exercise the authorities they have under other provisions of
law, including the Export Administration Act of 1979, as continued in
effect under the International Emergency Economic Powers Act, to carry out
this section.=20






----------------------------------------------------------------------------
----


34




(e) PRESUMPTION IN FAVOR OF EXPORTS.-- There shall bed a presumption in
favor of export of encryption products under this title.=20
(f) WAIVER AUTHORITY.-- The president may by Executive order waive any
provision of this Act, or the applicability of any such provision to a
person or entity, if the President determines that the waiver is in the
interests of national security or public safety and security. The president
shall submit a report to the relevant committees of the Congress not later
than 15 days after such determination. The report shall include the factual
basis upon which such determination was made. The report may be in
classified format.=20


(g) RELEVANT COMMITTEES.-- The relevant committees of the Congress
described in subsection (f) are the Committee on International Relations,
the Committee on the Judiciary, the Committee on National Security, and the
Permanent Select Committee on Intelligence of the House of Representatives,
and the Committee on Foreign Relations, the Committee on the Judiciary, the
Committee on Armed Services, and the Select Committee on Intelligence of
the Senate.=20






----------------------------------------------------------------------------
----


35




SEC. 303. LICENSE EXCEPTION FOR TELECOMMUNICATIONS PRODUCTS.=20


After a 1-time review as described in section 302, the Secretary shall
authorize for export under a license exception voice encryption products
that do not contain decryption or access to plainvoice features or
functions otherwise required in section 302, if the Secretary, after
consultation with relevant executive branch departments or agencies,
determines that--=20


(1) information recovery requirements for such exports would disadvantage
United States exporters; and=20
(2) such exports under a license exception would not create risk to the
foreign policy, non-proliferation, or national security of the United=
 States.=20




SEC. 304. REVIEW FOR CERTAIN INSTITUTIONS.=20


The Secretary, in consultation with other executive branch departments or
agencies, shall establish a procedure for expedited review of export
license applications involving encryption products for use by qualified
banks, financial institutions, subsidiaries of United States owned and
controlled companies, or other users authorized by the Secretary.=20






----------------------------------------------------------------------------
----


36




SEC. 305. ENCRYPTION INDUSTRY AND INFORMATION SECURITY BOARD.=20


(a) ENCRYPTION INDUSTRY AND INFORMATION SECURITY BOARD ESTABLISHED.-- There
is hereby established an Encryption Industry and Information Security
Board. The Board shall undertake an advisory role for the president.=20
(b) PURPOSES.-- The purposes of the Board are--=20


(1) to provide a forum to foster communication and coordination between
industry and the Federal Government on matters relating to the use of
encryption products;=20
(2) to promote the export of encryption products manufactured in the United
States;=20


(3) to encourage research and development of products that will foster
electronic commerce;=20


(4) to recommend policies enhancing the security of public networks;=20


(5) to promote the protection of intellectual property and privacy rights
of individuals using public networks;=20


(6) to enable the United States to effectively and continually understand
the benefits and risks to its national security, law enforcement, and
public safety interests by virtue of the proliferation of strong encryption
on the global market.=20








----------------------------------------------------------------------------
----


37




(7) to evaluate and make recommendations regarding the further development
and use of encryption;=20
(8) to advance the development of international standards regarding
interoperability and global use of encryption products; and=20


(9) to evaluate the foreign availability of encryption products and their
threat to United States industry.=20




(c) MEMBERSHIP.--=20
(1) The Board shall be composed of 11 [13*] members, as follows:=20
(A) The Secretary of Commerce, or the Secretary's designee, who shall chair
the Board.=20
(B) The Attorney General, or the Director of the Federal Bureau of
Investigation, or a respective designee.=20


(C) the Secretary of Defense, or the Secretary's designee.=20


(D) The Director of Central Intelligence, or his or her designee.=20


(E) The Special Assistant to the President for National Security Affairs,
or his or her designee.=20


(F) Six representatives from the [insert Mr. Skaggs #2 amendment*] private
sector who have expertise in the development, operation,=20








----------------------------------------------------------------------------
----


38




marketing, law, or public policy relating to information security or
technology.=20




(2) The six private sector representatives described in paragraph (1)(F)
shall be appointed as follows:=20
(A) Two by the Speaker of the house of Representatives.=20
(B) One by the Minority Leader of the House of Representatives.=20


(C) Two by the Majority Leader of the Senate.=20


(D) One by the Minority Leader of the Senate.=20




[Subsection (d) not used.]=20


(e) MEETINGS.-- The Board shall meet at such times and in such places as
the Secretary may prescribe, but not less frequently than every four
months. The Federal Advisory Committee Act (5 U.S.C. App.) does not apply
to the Board or to meetings held by the Board under this section.=20
(f) FINDINGS AND RECOMMENDATIONS.-- =A0The chair of the board shall convey
the findings and recommendations of the Board to the President [and to the
Congress [Mr. Gibbons]*] within 30 days after each meeting of the Board.
The recommendations of the Board are not binding upon the President.=20


(g) FOREIGN AVAILABILITY.-- The consideration of foreign availability by
the Board shall include computer=20








----------------------------------------------------------------------------
----


39




software that is distributed over the Internet or advertised for sale,
license, or transfer, including over-the-counter retail sales, mail order
transactions, telephone order transactions, electronic distribution, or
sale on approval.=20


TITLE IV -- LIABILITY LIMITATIONS


SEC. 401. COMPLIANCE WITH COURT ORDER=20


(a) NO LIABILITY FOR COMPLIANCE.-- Subject to subsection (b), no civil or
criminal liability under this Act, or under any other provision of law,
shall attach to any person for disclosing or providing--=20
(1) the plaintext of encrypted data, including communications;=20
(2) the decryption information of such encrypted data, including
communications; or=20


(3) technical assistance for access to the plaintext of, or decryption
information for, encrypted data, including communications.=20




(b) EXCEPTION.-- =A0Subsection (a) shall not apply to a person who provides
plaintext or decryption information to another and is not authorized by
court order to disclose such plaintext or decryption information.=20




SEC. 402. COMPLIANCE DEFENSE.=20


Compliance with the provisions of this Act, or any regulations authorized
hereunder, shall provide a complete=20






----------------------------------------------------------------------------
----


40




defense for any non-contractual civil action for damages based upon
activities covered by this Act.=20


SEC. 403. REASONABLE CARE DEFENSE.=20


The participation by any Federal or non-Federal person in the key
management infrastructure established by regulation for United States
Government information security operations under section 103 shall be
treated as evidence of reasonable care or due diligence in any proceeding
where the reasonableness of one's actions is an element of the claim at
issue.=20


SEC. 404. GOOD FAITH DEFENSE.=20


An objectively reasonable reliance on the legal authority provided by this
Act and the amendments made by this Act, requiring or authorizing access to
the plaintext of otherwise encrypted data, including communications, or to
the decryption information that will allow the immediate decryption of
data, including communications, that is otherwise encrypted, shall be a
complete defense to any criminal or civil action that may be brought under
the laws of the United States or and State.=20


SEC. 405. SOVEREIGN IMMUNITY.=20


Except as otherwise specifically provided otherwise, nothing in this Act or
the amendments made by this Act, or any regulations promulgated thereunder,
modifies or=20






----------------------------------------------------------------------------
----


41




amends the sovereign immunity of the United States Government.=20


SEC. 406. CIVIL ACTION, GENERALLY.=20


A civil action may be brought against any person who, regardless of that
person's participation in the key management infrastructure to be
established by regulations promulgated by the Secretary pursuant to section
103, violates or acts in a manner that is inconsistent with or violates the
provisions or intent of this Act.=20




TITLE V - INTERNATIONAL AGREEMENTS=20


SEC. 501. SENSE OF CONGRESS.=20


It is the sense of Congress that --=20


(1) the President should conduct negotiations with foreign governments for
the purposes of mutual recognition of any key management infrastructures,
and their component parts, that exist or are developed; and=20
(2) such mutual recognition agreements will safeguard the privacy of the
citizens of the United States, prevent economic espionage, and enhance the
information security needs of the United States.=20


SEC. 502. FAILURE TO NEGOTIATE.=20


The President may consider a government's refusal to negotiate mutual
recognition agreements described in=20






----------------------------------------------------------------------------
----


42




section 501 when considering the participation of the United States in any
cooperation or assistance program with that country.=20


SEC. 503. REPORT TO CONGRESS.=20


(a) REPORT TO CONGRESS.-- The President shall report annually to the
Congress on the status of the international effort outlined by section 501.=
=20
(b) FIRST REPORT.--The first report required under subsection (a) shall be
submitted in unclassified form no later that December 15, 1998.=20




TITLE VI - MISCELLANEOUS PROVISIONS=20


SEC. 601. EFFECT ON LAW ENFORCEMENT ACTIVITIES.=20


(a) COLLECTION OF INFORMATION BY ATTORNEY GENERAL.-- The Attorney General
shall compile, and maintain in classified form, data on the instances in
which encryption has interfered with, impeded, or obstructed the ability of
the Department of Justice to enforce criminal laws of the United States.=20
(b) AVAILABILITY OF INFORMATION TO THE CONGRESS.-- The information compiled
under subsection (a), including an unclassified summary thereof, shall be
made available, upon request, to any Member of Congress.=20








----------------------------------------------------------------------------
----


43=20




SEC. 602. INTERPRETATION.=20


Nothing contained in this Act or the amendments made by this Act shall be
deemed to --=20


(1) preempt or otherwise affect the application of the Arms Export control
Act (22 U.S.C. 2751, et seq.), the Export Administration Act of 1979 (50
U.S.C. App. 2401 and following), or the International emergency Economic
Powers Act (50 U.S.C. 1701-06). or any regulations promulgated thereunder;=
=20
(2) affect foreign intelligence activities of the United States; or=20


(3) negate or diminish any intellectual property protections found in the
laws of the United States or any State.=20


SEC. 603. SEVERABILITY.=20


If any provision of this Act, or the application thereof, to any person or
circumstances is held invalid by a court of the United States, the
remainder of this Act, and the application thereof, to other persons or
circumstances shall not be affected thereby.=20






----------------------------------------------------------------------------
----


AMENDMENT TO THE=20
GOSS/DICKS=20
AMENDMENT IN THE NATURE OF A SUBSTITUTE=20
TO H.R. 695=20


OFFERED BY MR. SKAGGS=20
#1=20


(a) At page 18, line 13, after paragraph "(2)", which ends with the words
"such country.", insert the following new subsection:=20


"(c) ELECTRONIC AUDIT TRAIL REQUIRED. -- A verifiable audit trail shall be
utilized so that in the case of access to the plaintext of otherwise
encrypted information, or the provision of decryption information, to an
investigative or law enforcement officer there shall be created an
electronic record, or similar type record, of each instance in which an
investigative or law enforcement officer gains such access or is provided
such information, without the knowledge or consent of the owner of the
data, including communications, who is the user of the encryption product.=
=20
"(d) MAINTENANCE OF AUDIT RECORD.-- The electronic or similar type of
record, described in subsection (c) shall be maintained in a place and a
manner that is not within the custody or control of an investigative of law
enforcement officer gaining the access or provision of decryption=20








----------------------------------------------------------------------------
----




information. It shall be tendered to the court issuing the order described
in this section, upon notice from the court.=20
"(e) DISCOVERY OF AUDIT RECORD.-- The court receiving such electronic or
similar type of record as described pursuant to paragraph (3) shall make
the original and a certified copy of the record available to the attorney
for the government making application under this section, and to the
attorney for, or directly to, the owner of the data, including
communications, who is the user of the encryption product."=20




(b)Redesignate current subsections "(c)" and "(d)" as "(f)" and "(g)",
respectively.=20


2=20






----------------------------------------------------------------------------
----


AMENDMENT TO THE=20
GOSS/DICKS=20
AMENDMENT IN THE NATURE OF A SUBSTITUTE=20
TO H.R. 695=20


OFFERED BY MR. SKAGGS=20
#2=20


(a) At page 37, line 11, strike the words "11 members", and replace with
the words "13 members".=20


(b) Following paragraph "(E)" insert the following new paragraph:=20


"(F) Two private sector individuals, appointed by the President, who have
expertise in consumer and privacy interests relating to or affected by
information security technology."=20
(c) Redesignate current paragraph "(F)" as "(G)".=20








----------------------------------------------------------------------------
----


AMENDMENT TO THE=20
GOSS/DICKS=20
AMENDMENT IN THE NATURE OF A SUBSTITUTE=20
TO H.R. 695=20


OFFERED BY MR. GIBBONS=20


At page 38, line 21, insert the words "and to the Congress", after the
words, "to the President".=20






----------------------------------------------------------------------------
----


[End]=20


Digitized and hypertexted by NYA/Urban Deadline.=20






----------------------------------------------------------------------------
----


Source: http://clerkweb.house.gov/mbrcmtee/cmtees/standing/comassign.htm=20






----------------------------------------------------------------------------
----


[Excerpt]




PERMANENT SELECT COMMITTEE ON INTELLIGENCE=20




Porter J. Goss, FL, Chairman Republicans=20








C. W. Bill Young, FL=20
Jerry Lewis, CA=20
Bud Shuster, PA=20
Bill McCollum, FL=20
Michael N. Castle, DE=20
Sherwood L. Boehlert, NY=20
Charles F. Bass, NH=20
Jim Gibbons, NV=20
Democrats




Norman D. Dicks, WA=20
Julian C. Dixon, CA=20
David E. Skaggs, CO=20
Nancy Pelosi, CA=20
Jane Harman, CA=20
Ike Skelton, MO=20
Sanford D. Bishop, Jr., GA=20


----------------------------------------------------------------------------
----




SUBCOMMITTEES OF THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE=20




----------------------------------------------------------------------------
----




HUMAN INTELLIGENCE, ANALYSIS, AND COUNTERINTELLIGENCE  Republicans


Bill McCollum, FL, Chairman=20
Bud Shuster, PA=20
Michael N. Castle, DE=20
Charles F. Bass, NH  Democrats


Julian C. Dixon, CA=20
David E. Skaggs, CO=20
Nancy Pelosi, CA=20
Sanford D. Bishop, Jr., GA =20






----------------------------------------------------------------------------
----




TECHNICAL AND TACTICAL INTELLIGENCE  Republicans


Jerry Lewis, CA, Chairman=20
C. W. Bill Young, FL=20
Sherwood L. Boehlert, NY=20
Jim Gibbons, NV  Democrats


David E. Skaggs, CO=20
Norman D. Dicks, WA=20
Jane Harman, CA=20
Ike Skelton, MO =20








----------------------------------------------------------------------------
----


Current thread: