U.S. SENATOR PATRICK LEAHY VERMONT STATEMENT OF PATRICK LEAHY ON THE INTRODUCTION OF "THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1985" MR. PRESIDENT, FOR YEARS THIS BODY HAS TALKED ABOUT THE AND BEGINNING THE PROCESS OF ENSURING THE PRIVACY OF LET ME DESCRIBE A PROBLEM THAT GROWS AS WE SIT HERE. AT THIS MOMENT PHONES ARE RINGING, AND WHEN THEY ARE WHAT IS BY NOW THIS TECHNOLOGY IS NOTHING REMARKABLE. WHEN CONGRESS ENACTED THAT LAW, TITLE III OF THE OMNIBUS SIMILARLY, THERE IS NO ADEQUATE FEDERAL LEGAL PROTECTION PROBLEMS ALSO EXIST WITH REGARD TO THE LEGAL PROTECTION TELECONFERENCING. THERE MAY HAVE BEEN A DAY WHEN GOOD LOCKS ON THE DOOR AND BUT THE NEW INFORMATION TECHNOLOGIES HAVE CHANGED ALL THAT. CONGRESSMAN KASTENMEIER, SENATOR MATHIAS AND I HAVE BEEN 2 THE PRODUCT OF THAT EFFORT IS THE BILL WHICH SENATOR MATHIAS THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1985 CONTAINS A THE ACT AMENDS TITLE III OF THE OMNIBUS CRIME CONTROL AND SAFE DEFINITIONS CONTAINED IN TITLE III ARE AMENDED TO BROADEN PROTECTION OF ONLY COMMON CARRIER TELEPHONE SYSTEMS IS --THE BILL CONTAINS CRIMINAL PENALTIES FOR UNATHORIZED ACCESS TO COMMERCIAL GAIN OR FOR MALICIOUS REASONS, THE CRIME COULD BE -- TO OBTAIN COMMUNICATIONS CONTAINED IN THE COMPUTERS OF AN AN OPERATOR OF AN ELECTRONIC COMMUNICATIONS SYSTEM IS -- AN ELECTRONIC COMMUNICATIONS SYSTEM AND THE USERS OF THE THE BILL DOES NOT AFFECT THE CAREFULLY BALANCED PROVISIONS THESE CHANGES WILL GO A LONG WAY TOWARDS PROVIDING THE LEGAL As I SAID EARLIER, WE HAVE WORKED HARD OVER THE PAST YEAR TO A NUMBER OF TOUGH QUESTIONS REMAIN TO BE ANSWERED. CHIEF BUT RAISING THIS QUESTION SHOULD IN NO WAY SUGGEST THAT IT IS NO SOLUTION TO SAY THAT ANYBODY CONCERNED ABOUT THE ENCRYPTION CAN BE BROKEN. BUT MORE IMPORTANTLY, THE LAW 3 POLICE OFFICER WITHOUT PROBABLE CAUSE OR JUST A PLAIN SNOOP. UNAUTHORIZED ACQUISITION OF INFORMATION IS NOT JUST A THEORETICAL PROBLEM, OR ONE CONFINED TO HARMLESS TEENAGE HACKERS. COMMUNICATIONS COMPANIES HAVE BEEN FACED WITH GOVERNMENT DEMANDS, UNACCOMPANIED BY A WARRANT FOR ACCESS TO THE MESSAGE CONTAINED IN ELECTRONIC MAIL SYSTEMS. AND THE UNWANTED PRIVATE INTRUDER, WHETHER A COMPETITOR OR A MALICIOUS TEENAGER, CAN DO A GREAT DEAL OF DAMAGE BEFORE BEING, OR WITHOUT BEING, DISCOVERED. FROM THE BEGINNING OF OUR HISTORY, FIRST-CLASS MAIL HAS HAD THE REPUTATION FOR PRESERVING PRIVACY, WHILE AT THE SAME TIME PROMOTING COMMERCE. BOTH OF THESE IMPORTANT INTERESTS MUST CONTINUE INTO OUR NEW INFORMATION AGE. WE CANNOT LET ANY AMERICAN FEEL LESS CONFIDENT IN PUTTING INFORMATION INTO AN ELECTRONIC MAIL NETWORK THAN HE OR SHE WOULD IN PUTTING IT INTO AN ENVELOPE AND DROPPING IT OFF AT THE POST OFFICE. THOMAS JEFFERSON ONCE OBSERVED THAT, "LAWS AND INSTITUTIONS MUST GO HAND-IN-HAND WITH THE PROGRESS OF THE HUMAN MIND....As NEW DISCOVERIES ARE MADE... INSTITUTIONS MUST ADVANCE ALSO, AND KEEP PACE WITH THE TIMES. " AMERICAN BUSINESSES HAVE PRODUCED A MARVELOUS ARRAY OF POSSIBILITIES FOR BETTER AND FASTER COMMUNICATION WORLDWIDE. Now IS THE TIME FOR OUR LEGAL INSTITUTIONS TO ALSO ADVANCE AND KEEP PACE WITH THE TIMES. THE PROTECTION OF COMMUNICATIONS PRIVACY CAN GO HAND-IN-HAND WITH PROGRESS. OUR JOB IS TO MAKE BOTH A REALITY. NOW IS THE TIME TO ACT. I ASK UNANIMOUS CONSENT THAT A SUMMARY OF THE BILL AND ITS comprehensive communication pri-that will directly deal with the prob-which to store their records. vacy law. lems of both the unauthorized access to Mr. Kastenmeler said the current "Today we have large-scale elec-data bases and the illegal interception legal deficiencies were exacerbated by tronic mail operations, cellular and of computerized information," he said. the rapid change in the amount and cordless telephones, paging devices, Among the major provisions of the types of governmental surveillance. In miniaturized transmitters for radio proposal is one that would extend the 1984, for example, the Federal Govern surveillance, lightweight, compact current restrictions of law protecting ment undertook more wiretaps television cameras for video survell- telephone conversations to all forms of bugs than in any year since 1978. lance and a dazzling array of digitized electronic communication. At present, Mr. Kastenmeler said a recent study information networks which were little it is a crime for anyone to eavesdrop on by Congress's Office of Technology As more than concepts two decades ago," a telephone conversation except a law. sessment had found that 29 differe enforcement official who has obtained Federal agencies were using Michael F. Cavanagh, executive di- an order from a special court. planned to use television survelliant rector of the Electronic Mail Associa A second provision would require a 20 were using or planned to use radia tion, whose members include industry law-enforcement agency to obtain a scanners, 6 were conducting cellular giants such as the ITT Corporation, the court order before it could gain access telephone interceptions and 15 International Business Machines Cor. to the records held in an electronic employing various kinds of personal poration and the GTE Corporation, communication system operated by an tracking devices.. said his group was pleased by the work organization such as a credit card com Mr. Kastenineler said. done so far on the proposal. "We hope pany or electronic mail service that of EVERY DROP COUNTS: SAVE WATER that we can work out a final vérision fers businesses computer space in |