ELECTRONIC FRONTIER FOUNDATION
[Join EFF] [Act Now] [Sign Up] [About EFF]

Note: this document was prepared from a draft that appears to be missing some sections of text, and which in places gives alternate text for short passages (in this version, the two phrases will be separated by "/").


 

PRESERVING AMERICA'S PRIVACY AND SECURITY FOR THE NEXT CENTURY: A STRATEGY FOR AMERICA IN CYBERSPACE

A REPORT TO THE PRESIDENT OF THE UNITED STATES

September 16, 1999

William Cohen
Secretary of Defense

Janet Reno
Attorney General

Jacob J. Lew
Director of the Office of Management and Budget

William Daley
Secretary of Commerce
 

 

1. A TIME OF PIVOTAL CHANGE

American history has been punctuated by periods in which the Nation government had to respond to sweeping social, economic and technological developments. When at its best In the best of times, people working together in, government and industry became the engine of progress that shaped the character of the time and facilitated development of a new plateau of prosperity and opportunity for Americans. Three examples illustrate the this point.

Opening the Heartland and expanding the frontier. Beginning with the Louisiana Purchase in 1803, for example, the government initiated a remarkably successful policy to open up a vast new territory area. Over the next five decades, the United States doubled the size of its territory. The first steps were halting and small. TheUnder the government's soon settled on an integrated plan. L, land grants were given to railroads to open the Midwest and in turn to create a future market for rail services. Land was awarded to homesteaders, and yet other parcels were reserved as income sources for institutions of higher education. The Administration and the Congress together created an infrastructure for a new society.

The technological advance of the railroad was literally the engine pulling this growth. From the 1820s to 1900, American railroads added an average of more than 2,000 miles of track each year. By the time Americans finished close of the 19th century, the combination of these factors had served to triple the size of the our nation. The Administration and the Congress, working together and in concert with technology advances, created an infrastructure for a new society.

Industrialization and the Great Depression Produce a New Society. Around the turn of the century, the country was firmly in the Industrial Age. Technical innovations in automation and machinery spurred the growth of factories, assembly lines and mass-production in our nation's cities. The Ford assembly line for the Model T and the Wright brother's flight catapulted us into a mobile society and drove further technological innovations. Telephones became more commonplace and the nation began to shrink as news and information traveled faster. As a nation, we created new opportunities in industries never heard of, and created a new class of wealth, based on opportunity and innovation, not birthright. The economy moved from an agrarian society to an industrial society.

But the growth and prosperity experienced by many halted when the Great Depression gripped the country. In response, the government worked creatively and developed a series of creative policies and programs that brought government and business to the common task of restoring productivity to America. Technology again was a leader of progressWhile there were a number of social programs, government support for technology was key to driving development. For example, the government took a pivotal role in expanding the electrical grids that would become the backbone of our national infrastructure, first with the creation of the Tennessee Valley Authority in 1933 and two years later with the creation of the Rural Electrification Administration. Electrical technology, in the ensuing years, radically altered the capabilities of America's rural farms and industry. Just as important, it created a transmission belt that further disseminated the ideas and technology being generated in the nation's cities.

A World War Produces a Global Community and the American Century. In a third case, World War II shattered the international political system at the same time that it brought an end to 19th century colonialism. The creation of the World Bank, the International Monetary Fund, and the rules for a global trading system became the cornerstones of the emerging global economy.

The urgent need for increased production and the burst of scientific funding associated with the war effort -- sustained by a continuing Federal commitment to new science and technology in the following years -- vaulted the United States into the age of electronics and computers--the beginning of the Information Age.

Advances in telecommunications, such as broad-band carrier systems and switching devices, combined with innovations in the newborn computer industry to give individuals more power than ever to process large amounts of information and transmit that information at ever-greater speeds. Further, this country's goal to reach the moon by the end of the 1960s fueled development of advanced electronics, increased computing power and communications capabilities. At the same time, technological leaps in computer memory and data storage created enabled for the first time enabled the centralized use, (and, unfortunately, misuse), of information to examine or profile individuals, consumers, and groups. As these issues emerged, our legal system responded. Looking back, the "Information Economy" that Americans recognize today could be seen emerging as early as the late 1940s.

Each of these examples was a pivotal episode in American history in which complex social, economic, and technological forces came together. Facing the challenges of the day, America's governmental, societal and technical leaders crafted a new vision of the future, and in the process,created a new plateau of opportunity and promise became pioneers on a new frontier of opportunity and promise.

America now faces a new time of pivotal change, enormous opportunity, and promise. This new era is one of [missing words]. This time, technology itself presents both an opportunity and a threat to global society increasingly dependent on, and connected by, advanced computing and communications. enormous opportunity and promise, but also one of great risk and danger. Balancing these forces and crafting a new strategy for progress is the challenge of our day.Continuing a balanced strategy that advances our national interests is the challenge of our day.

2. Cyber America: Great Promise and Serious Risks

America today confronts an historic time, one no less fraught with promise and danger than any other time in our history. America now stands on the brink of revolution fueled by machines--computers-- and networks of computers that facilitate the instant exchange of and access to ideas and information. The computer has and will continue to revolutionize virtually all aspects of American society, just as electricity, the power grid and the railroad changed our forefathers' society. The computer today is as revolutionary as the internal combustion engine of our great grandparents or the steam engine of the Industrial Revolution.

The Computer as an Economic Engine. It is well known that the computer, and its application in business, commerce, education and recreation has transformed the American economy. America has becomeis becoming a country of "knowledge workers," with the ubiquitous application of computer technology at its core. America's productivity today is grounded in computer applications and networks. Barcodes speed us through shopping lines and simultaneously facilitate store manager recordkeeping and reordering. Airline reservations can be booked from home computers. Everything from clothes to books to software can be purchased over the Iinternet. American business companies are is discarding its their proprietary communication computer systems and adapting business practices to the Web. using the Internet and the Web to increase productivity, network their entire chain of suppliers, and deliver "just-in-time" training to their employees. American students can conduct original research with colleagues on machines around the world with but a few keystrokes. Travelers can monitor current weather conditions in another country. Scientists can "conference" electronically and transmit astounding volumes of information in seconds to colleagues on other continents.

[in the original a note appears here, reading, "Please add here as necessary."]

As remarkable as is our daytoday's innovations are, the years ahead hold even greater promise. Computers will become virtual partners in all aspects of our lives. [in the original a note appears here, reading, "Again, please add as appropriate."] Homes will be centrally wired to allow integrated alarms, electronics, appliances, telephones, and computers to simplify our lives. Education will become more adaptive to the routines of individual students, and banking, finance, and shopping will increasingly migrate to the home and portable computing devices.

In the processAnd in this process and through networking, computers are creatinghave created the well-known "cyberspace" that transcends eliminates the traditional boundaries of time and place and links governments, businesses, and individuals in the same electronic environment. American students can conduct original research on machines a half a world away with but a few keystrokes. Travelers can monitor current weather conditions in another country. Scientists can "conference" electronically and transmit astounding volumes of information in seconds to colleagues on other continents.

The Dangers of Cyberspace. Like any new tool in previous eras, computers can be used by evil handsthose who prey on the innocent. International narcotics traffickers now routinely communicate with each other via encrypted computer messages. Pedophiles stalk unsuspecting children in computer chat rooms. Hostile governments and even some transnational organizations are establishing cyber-warfare organizationsefforts, assigned the mission of crippling America's domestic infrastructure through computer attacks. Hackers destroy cyber-property by defacing homepages and maliciously manipulating private information. Pedophiles stalk unsuspecting children in computer chat rooms. Individuals post homepages with instructions to manufacture pipebombs, chemical weapons, and even biological agents. Criminals Crooks break into business computers, either stealing funds directly or extorting payments from companies anxious to avoid more expensive disruption. Disgruntled employees, with valid access to their companies' system, can take steps to disrupt the business operations or steal proprietary, sensitive, and financial information. And our personal data is at risk of being unlawfully accessed and read by malicious individuals, without our knowledge, as it resides on or traverses communications and computer networks.

These concerns are not hypothetical. We have seen these types of activities, and other equally dangerous activity, in past and on-going cases. The danger posed by evil individuals using these powerful new tools grows by the day. Just as other technologies have the risk of being abused, it is necessary for us to evaluate how to respond. Without protective action, we will not be safe. America is mustnot safe without preventive action take responsible steps to ensure that this promising electronic environment is safe for law abiding citizens and businesses.

3. Balancing America's Bedrock Values

While these problems seem unprecedented, in fact they represent a return to the bedrock problems faced by America's constitutional founders. American democracy became and remains a new experiment in government--balancing the rights of individuals against the imperatives of society and; limiting the reach of government into personal, private lives, while mandating a government responsibility for public safety and security for all citizens.

Computers are now at the crux center of competing American values. In honest, law abiding citizens' hands, the computer becomes an indispensable tool for education, personal and commercial business, research and development, and communications. In criminal hands, the same computer becomes a tool of extortion and intimidationdestruction and criminality.

Enter encryption. Over the past decade, a new dimension ofanothercomputer information technology has emerged to that amplifiesy this tension - encryption software. Encryption software includes contains special instructions that scramble a clear readable message in unbelievably complex ways that make it unreadable. With the appropriate de-coding software, For the strongest forms of encryption, oonly the intended recipient can unscramble the message and read the original plain text, unless someone else has gained access to the .corresponding decoding software and decryption key.

Originally only available and used by military agencies, strong encryption is now available to many and has become a building block for the new digital economy. It is essential to provide security and privacy for electronic commerce and e-business. Encryption is critical because it allows individuals, businesses, and other organizations to share information privately without it being unlawfully intercepted or accessed by a third party, to establish their identities, and to maintain the integrity of information. Without the use of encryption, it is difficult to establish the trust that people and firms need to do business with each other, or to have confidence to run their business electronically. With the use of encryption:

However, while the majority of users will use encryption for legitimate, lawful purposes, we must recognize that terrorists, pedophiles and drug gangs are increasingly using encryption to conceal their activities. Hence, encryption has posed a serious public policy challenge over the past decade.

Encryption has posed a serious public policy challenge during the past decade. Understandably worried about privacy in the computer age, businesses and citizens have sought encryption software to protect information and privacy. Banks use encryption to protect "dollars" that transit across public phone lines. Individuals seek encryption to access their bank account information from their home computers. But while individuals have used encryption software for honest purposes, criminals, terrorists, pedophiles and drug lords have also used encryption to mask their plans and purposes.

The Federal Government has sought to maintain a balance between privacy and commercial interests on one hand and public safety and national security concerns on the other by limiting the export of strong encryption software so that law enforcement agencies and national security organizations can continue to provide timely warning of threatening activities. This task [missing words]. Preserving this balance has become increasingly difficult with the clear need for strong encryption for electronic commerce, growing sophistication of foreign encryption software products and the proliferation of software vendors, and expanded distribution mechanisms. In the process, all parties have become became less satisfied with the inevitable compromises that have had to be struck. U.S. companies felt/believe their markets were are increasingly threatened by foreign manufacturers in a global market economy where businesses, consumers, and individuals demanded demand that strong encryption be integrated software productsinto computer systems, networks, and applications that included restricted encryption software. National security organizations felt worry that the uncontrolled export of encryption products to presumably "safe" business sectors and trading partners will result in diversion of powerful tools to illicit operations/end users of concern. Law enforcement organizations saw see criminals increasingly adopting tools that put them beyond the reach of lawful surveillance.

At the end of the century, these are the important national interests that must be reconciled. Determining a policy direction for encryption control has become less viable, more complex, and more urgent, for all parties/those affected. A new strategic paradigm that better achieves balance is needed.

4. A New Paradigm to Protect Prosperity, Privacy and Security

As with the other pivotal times in our Nation's history, this time too demands a new approach. America's governmental, social, business and technological leaders must brace a new paradigm to promote America's prosperity and protect its security in a cyberage.

To support America's prosperity and protect her security and safety, we propose a new paradigm to advance our national interests. The new paradigm should be We believe that this new paradigm is comprised of three pillars - new tools forinformation security and privacy, a new new framework regime for export controls, and stronger updated tools for law enforcement. We discuss each in turn.

I. New Tools for Information Security and Privacy. As a nation, we have become increasingly dependent on computers and telecommunications. These new technologies create vast opportunities for personal expression and electronic commerce, while also creating new risks to public safety and national security. Computers and telecommunications rely on open protocols and ultra-accessibility, thus making individuals' and organizations' words and actions vulnerable to outsiders in new and potentially frightening ways. A first pillar of our new paradigm must be to promote information security and privacy--to assure the security and privacy of stored and transmitted data from unauthorized and unlawful access.

The President has recognized the challenge of updating privacy for new technologies: "We've been at this experiment in Government for 223 years now. We started with a Constitution that was rooted in certain basic values and written by some incredibly brilliant people who understood that times would change, and that definitions of fundamental things like liberty and privacy would change, and that circumstances would require people to rise to the challenges of each new era by applying old values in practical ways."

In updating enduring constitutional values for the computer age, we need to assure that our citizens' personal data and communications are appropriately protected. Businesses need to privately communicate with their employees and manufacturing partners without risk that their proprietary information will be compromised through unauthorized access. Encryption is one of the necessary tools that can be used in this technological environment to secure information. Therefore, we encourage the use of strong encryption by American citizens and businesses to protect their personal and commercial information from unauthorized and unlawful access.

We must also recognize the inherent security risks posed by the spread of and dependence on "open systems" and ready accessibility. The Defense Department's situation is typical. Twenty years ago the Defense Department operated largely proprietary communications systems over government owned switches and circuits. DOD software technology was homebuilt and tightly controlled. Today, the U.S. DOD has more computer users than any other organization in the world--2.1 million computers access over 10,000 networks on an average work day. Even so, 95% of DOD's communications occur over public circuits or with commercial software and hardware. The Defense Department's experience reliance on commercial products and services is repeated throughout the country by government agencies and the private sector.

If the Department of Defense is to function safely in cyberspace, it must adopt use strong tools for encryption and identity authentication. It is not just military operations, orders and data that must be protected. All government agencies and all business activities will increasingly need a full set of security tools to insure ensure access, privacy and absolute confidence in business operations that utilize computer technology.

We recognize that information technology is changing rapidly and constantly providing both new security capabilities and challenges and, hence, we will never reach a "perfect solution." Nevertheless, there are many efforts underway throughout the gGovernment to address the need for moresecurity information secure systems. By adopting Adapting commercial approaches, where appropriate, and sponsoring R&D to fill needed capabilities, we believe the Federal gGovernment should, by example, lead the way for America to develop and use the tools and procedures for information security and privacy in the next century.

The Department of Defense, for example, has adopted a policy and allocated over $500 million to develop a comprehensive security management infrastructure. This infrastructure will utilize a range of encryption products (with stronger products for more sensitive applications involving higher levels of classification), and a public key infrastructure (PKI) to identify and authenticate those who use our information networks. The Department is also adopting stronger standards for network configuration and operator qualification and certification, and is taking steps to better detect unauthorized intrusions into DOD networks.

The Federal government must continue to promote the development of stronger encryption technologies for federal use. The advanced encryption standard (AES) is in the final stages of a public selection process. Once promulgated, AES could become as ubiquitous as today's digital encryption standard (DES) which has contributed greatly to the growth of electronic commerce.

In the Federal government, the Department of Defense is a leading proponent of information security through its information assurance initiative, and other agencies are recognizing the need for increased diligence in maintaining adequate security of Federal information and systems. We encourage each agency to vigilantly build security enhancements into their business operations in risk-based and cost-effective ways that enable, not impede, the agency's ability to perform its mission.

Further, we believe that the Congress and Executive Branch should work together to promote both the awareness of information privacy and security and the development of appropriate tools and resources by the private sector, and to consider whether tangible incentives are appropriate. develop legislation that creates tangible incentives for the private sector to invest in information assurance tools and resources Given the rapid changes in technology, we We do not believe and advocate a technology neutral approach. This approach would have the public and private sectors working together to encourage development of a broad range of privacy and security products and processes and share promising practices with one another. Neither do we believe that authentication keys should be mandated for use. Rather, we believe that identity authentication must be a choice, not a requirement. ButWe we believe equally strongly that security infrastructures and the deployment of security products authentication keys -- should neither be mandated nor prohibited. Public and private Organizations organizations must determine their risks and be free to choose their own solutions.

The Federal Government must continue to promote the development of stronger encryption technologies. The advanced encryption standard (AES) is in the final stages of a public selection process. Once promulgated, AES should become as ubiquitous as today's Digital encryption standard (DES) which has contributed greatly to the growth of electronic commerce.

The government's requirement to protect its own sensitive and privacy information is matched by individual's and the private sector's own interests in proper handling of sensitive information. Many in industry and elsewhere are already developing and using sophisticated security and privacy products and processes. Government should act as a facilitator and catalyst and help stimulate the development of commercial products that will help all Americans protect their sensitive information.

In sum, the first pillar of the new strategy paradigm calls on the Federal gGovernment, the Congress and all others to partner to lead-in partnership with the privatein promoting ways to bring information security and privacy to the Information age. Working together, we can sector-in developingdevelop tools and procedures for safe operation in cyberspace, applying enduring constitutional values to our new circumstances. The Government must create incentives for the development and use of security management infrastructures by the private sector.

II. Encryption Export Controls for the New Millennium. At the dawn of the new millennium, technology is advancing at such a rapid pace that attempts to control its global spread under the existing export control regime is need to be regularly reevaluated. Encryption facilitates this security andwill continue to enables new economic realities that must be reflected considered in a new way of thinking aboutbalanced approach to export controls.

Encryption provides much more than just secret messages. These products are and services are needed around the world so that electronic commerce may flourishto provide confidence and security for electronic commerce and business. With the growing demand for security, encryption products are increasingly sold on the commodity market, and encryption features are being embedded into everyday operating systems, spreadsheets, word processors, and cell phones. Encryption has become a vital component of the emerging global information infrastructure and digital economy. In this new economy, American companies are leaders in information technology,innovation and imagination are the engines, and it is economic achievement that underpins America's status in the world and provides the foundation of our national security. We recognize that U.S. information technology companies lead the world in product quality and innovation, and it is an integral part of the Administration's policy of balance to see that they retain their competitive edge in the international market place.

We as a nation must, however, balance the our desire and the need to assist industry with a prudent, objective and consistent steady judgment about how to protect national security; a judgment that acknowledges that technological advantages may add new dimensions to an already complicated problem set. We must ensure that the advantages this technology affords us are not extended to those who wish us ill or who harbor criminal intent. The Administration has taken a fresh look at export controls on encryption in order to develop a policy that will promote U.S. economic competitiveness to the maximum extent possible consistent with the need to protect national security. The Administration recognizes that economic realities do not allow export controls to be structured in the traditional way.This judgment must be informed by both foreign and domestic realities.

While the U.S. is a huge market for telecommunications goods and services, the other nations of the globe present markets much larger than our domestic demand. Our networks are inextricably bound to those of our allies and adversaries alike. Likewise, America's interests do not end at our borders. American diplomats, service men and women, as well as countless business people work and live around the globe. America's interests are served by the ability to send and receive proprietary, personal and classified information to exactly where it is needed around the world. Likewise, America's interests are served daily by shared actions with our allies, which require accurate and authentic information be exchanged. Our policy must acknowledge these vital interests.

But even as we do, it is imperative that we uphold international understandings, and strive with other nations to prevent the acquisition of encryption technology to sponsors of terrorism, international criminal syndicates or those attempting to increase the availability of weapons of mass destruction. We must also meet our responsibilities to support our national decision makers and our military war fighters with intelligence information in time to make a difference.

Accordingly, the Administration has revised its approach to encryption export controls that by emphasizings three simple principles that protect important national security interests: a meaningful technical review of encryption products in advance of sale, a systematic reporting system for export sales of non-mass market softwarestreamlined post-export reporting system that provides us an understanding of where encryption is being exported but is aligned with industry's business and distribution models, and a license process that preserves the right of government to review and, if necessary, deny the sale of strong encryption products to foreign government and military organizations onlyand to nations of concern. With these three principles in place, the Federal Government would remove almost all remove all other export restrictions on encryption products. This new paradigmapproach will provide a stable framework that also will allow U.S. industry to participate in constructing and securing the global networked infrastructureenvironment. This paradigm approach also maintains reasonable national security safeguards by monitoring the availability of encryption products and limiting their use in most danger-proneappropriate situations.

The Administration intends to codify this new paradigm policy in new export regulations procedures with a goal of implementing them not later than the end of this year by December 15, 1999, following consultations on details with affected industries and other private sector organizations.

However, with this new framework for export controls, the national security organizations will need to develop new technical tools and capabilities to deal with the rapid expansion of encrypted communications in support of its mission responsibilities. The Congress will need to support such new tools and technical capabilities through necessary appropriations.

To accommodate this new paradigm, our national security organizations will have to develop new tools to deal with the rapid expansion of encrypted communications. The Congress will need to support these new tools with necessary appropriations.

III. Updated tools for Law Enforcement. Because of the need for and use of strong encryption globally, governments need to develop new tools to deal with the rapid expansion of encrypted communications. Stronger Updated tools for law enforcement that specifically address the challenges of encryption constitute the third pillar of the new strategy. We cannot ignore the fact that encryption will be used in harmful ways - by child pornographers seeking to hide pictures of exploited children, or commercial spies stealing trade secrets from American corporations, or terrorists communicating plans to destroy property and kill innocent civilians. Even more significant, since because cyberspace knows no boundaries and since because it is not immediately clear if a cyberattack involves Americans or foreigners, America's national security which traditionally involves military might now will increasingly depends depend on strong and capable law enforcement organizations. This is because By custom and practice the United States military and intelligence agencies have long been is restricted by law from undertaking defense operations inside the United States against American citizens. As suchAccordingly, America's national defense is now inextricably increasingly reliant on tied to a ensuring that our law enforcement community is capable of protecting America in cyber space.

Under existing law and judicial supervision, of course, law enforcement agents are provided with a variety of legal tools to collect evidence of illegal activity. The use of such tools is of course subject to judicial supervision, but Wwith appropriateappropriate court orders, law enforcement may conduct electronic surveillance or search for and seize evidence. In an encrypted world-where the communications, law enforcement may obtain the legal authority to access a suspect's communications or data, but overheard or the data seized is encrypted-these tools are rendered wholly insufficientthe communications or data are rendered worthless, because they cannot be understood and cannot be decoded by law enforcement in a timely manner. In the context of a law enforcement operation, for example, Sstopping a terrorist attack or seeking to recover a kidnapped child may require timely access to plain text, and such access may be defeated by encryption. Hence, law enforcement's legal tools should be updated, consistent with constitutional principles, so that when law enforcement obtains legal authority to access a suspect's data or communications, law enforcement will also be able to read it.

The imperative for judicially-authorized access in a world of ubiquitous encryption means thatQuite simply, even in a world of ubiquitous encryption, law enforcement with court approval must be able to obtain plaintext so that it can protect public safety and national security. Therefore, we must undertake several important and balanced initiatives.

First, we need to give ensure that law enforcement maintains its ability to access to decryption information stored with third parties, but allowed this only pursuant to rules that ensure appropriate privacy protections are in place. To ensure this result, the Administration and the Congress must develop legislation to create a legal framework that enhances privacy over current law and permits decryption information to be safely stored with third parties (by prohibiting, for example, third party disclosure of decryption information), but allows for law enforcement access when permitted by court order or some other appropriate legal authority.

Second, since criminals will not always store keys with third party recovery agents, we must ensure that law enforcement has the personnel, equipment, and technical skillstools necessary to investigate crime in an encrypted world. This requires that the Congress fund the Technical Support Center as proposed by the Administration, and work with the Administration to ensure that the confidentiality of the sources and methods developed by the Technical Support Center can be maintained.

Third, it is well recognized that industry is designing, deploying and maintaining the information infrastructure, as well as providing encryption products for general use. Industry has always expressed support, both in word and in action, for law enforcement, and has itself worked hard to ensure the safety of the public. Clearly, industry must continue to do so, and firms must be in a position to share proprietary information with government without fear of that information's disclosure or that they will be subject to liability. Therefore, the law must protect such information from disclosure whenever appropriateprovide protection for industry and its trade secrets as it works with law enforcement to support public safety and national security. The law must also assure that sensitive investigative techniques remain useful in current and future investigations by protecting them from unnecessary disclosure in litigation. These protections must be consistent with fully protecting defendants' rights to a fair trial under the Constitution's Due Process clause and the Sixth Amendment.

The Administration and the Congress need to work jointly to pass legislation that provides these new updated authorities. The Administration is in the final stages of drafting legislation and will shortly submit it to the Congress for consideration.

It is imperative to emphasize that this the malicious use of encryption is not just a law enforcement issue - it is also a national security issue. The new regime framework for export controls must be complemented by providing updated, but limited authorities to law enforcement.

5. Conclusion

America stands on the pivot point of a crucial time in its ongoing development, and we face once again the on-going debate in this country between individuals' rights and the collective needs of society. The genius of our Constitution is in the balanced way it addressed that debate and in the procedures it created for continuing that discussion as the society and the economy evolved. For our own part, we enter that debate determined to preserve that same balance of the rights and responsibilities that has characterized our country through its history, but we are equally determined not to be thoughtlessly bound to old approaches and old technologies. Our challenge is to adapt our historical approach to the technological challenges we face. We believe the new paradigm described above achieves that objective.

We can now see a future of with great promise and just as great danger- and serious consequences - posed by the same technical developments. How well we handle these problems important challenges will shape the next century. It is far better that we approach these problems from a cooperative perspective. The past years of confrontation must be replaced by an era of collaboration. For only by working together, which is the rich history of this nation, can we ensure our economic viability and protect ourselves from those who would do us harm.


Please send any questions or comments to webmaster@eff.org

Return to   EFF   Welcome Page