S. 4051 (116 th ): Lawful Access to Encrypted Data Act

Save your opinion on this bill on a six-point scale from strongly oppose to strongly support

Add Note All Positions » (Shared on panel .)

Primary Source

Widget for your website

Follow GovTrack on social media for more updates:

Add a Note

Add a note about this bill. Your note is for you and will not be shared with anyone.

Because you are a member of panel , your positions on legislation and notes below will be shared with the panel administrators. (More Info)

The text of the bill below is as of Jun 23, 2020 (Introduced). The bill was not enacted into law.

IN THE SENATE OF THE UNITED STATES

Mr. Graham (for himself, Mr. Cotton , and Mrs. Blackburn ) introduced the following bill; which was read twice and referred to the Committee on the Judiciary

To improve the ability of law enforcement agencies to access encrypted data, and for other purposes.

This Act may be cited as the Lawful Access to Encrypted Data Act .

Table of contents

The table of contents for this Act is as follows:

Sec. 1. Short title.

Sec. 2. Table of contents.

TITLE I—Data at rest

Sec. 101. Data at rest.

TITLE II—Data in motion

Sec. 201. Assistance.

Sec. 202. Capability.

Sec. 203. CALEA amendment.

TITLE III—Assistance capability directives

Sec. 301. Assistance capability directives.

TITLE IV—Pen register and trap and trace amendments

Sec. 401. Capability requirements.

Sec. 402. Defining technical assistance.

TITLE V—FISA amendments

Sec. 501. Electronic surveillance within the United States for foreign intelligence purposes.

Sec. 502. Physical searches within the United States for foreign intelligence purposes.

Sec. 503. Pen register; trap and trace.

Sec. 504. Business records.

Sec. 505. Certain acquisitions inside the United States targeting United States persons outside the United States.

TITLE VI—Prize competition

Sec. 601. Findings.

Sec. 602. Definitions.

Sec. 603. Prize competition.

Sec. 604. Implementation.

Sec. 606. Report to Congress.

Sec. 607. Authorization of appropriations.

Sec. 608. Termination of authority.

TITLE VII—Lawful access training

Sec. 701. Lawful access training program.

Title VIII—Effective date

Sec. 801. Effective date.

Chapter 205 of title 18, United States Code, is amended by adding at the end the following:

Assistance orders to third parties and capability requirements

In this section—

the term means a device that—

may be purchased by a member of the general public; and

can be configured to store 1 gigabyte of data or more;

a district court of the United States (including a magistrate judge of such a court) or a United States court of appeals; and

a court of general criminal jurisdiction of a State authorized by the law of that State to issue search warrants;

the term means a person who designs, manufactures, fabricates, or assembles a finished consumer electronic device;

the term has the meaning given the term in section 2711;

the term means a person who designs, markets, or sells software that—

controls the operation of a consumer electronic device; and

directs the processing of programs on the consumer electronic device (such as by assigning storage space in memory and controlling input and output functions);

the term has the meaning given the term in section 2711; and

the term means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States.

Court order for assistance

A court of competent jurisdiction, in support of a search warrant based upon probable cause issued by the court that authorizes the search of an electronic device or remotely stored electronic information, shall, upon receiving a motion described in paragraph (3) that states reasonable grounds to believe that the assistance required by the order will aid in the execution of the warrant, order a device manufacturer, an operating system provider, a provider of remote computing service, or another person to furnish all information, facilities, and assistance necessary to access information stored on an electronic device or to access remotely stored electronic information, as authorized by the search warrant.

The information, facilities, and assistance ordered to be furnished under paragraph (1) shall include—

isolating the information authorized to be searched;

decrypting or decoding information on the electronic device or remotely stored electronic information that is authorized to be searched, or otherwise providing such information in an intelligible format, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

providing technical support as necessary to ensure effective execution of the warrant for the electronic devices particularly described by the warrant.

An attorney for a governmental entity may move that the court issue an order under this subsection—

after a search warrant that authorizes the search of an electronic device or remotely stored electronic information has been issued; or

concurrently with an application for a search warrant described in subparagraph (A).

Compensation and exemption from liability

Subject to subparagraph (B), a device manufacturer, operating system provider, provider of remote computing service, or other person furnishing information, facilities, or assistance pursuant to an order issued under this subsection—

shall be compensated for reasonable expenses directly incurred in complying with the order; and

may not be held civilly liable to any party for any action taken that is reasonably necessary to comply with the order.

Reasonable expenses under subparagraph (A) may not exceed $300.

Capability To assist

A device manufacturer that sold more than 1,000,000 consumer electronic devices in the United States in 2016 or any calendar year thereafter, or that has received an assistance capability directive under section 3513, shall ensure that the manufacturer has the ability to provide the assistance described in subsection (b)(2) for any consumer electronic device that the manufacturer—

designs, manufactures, fabricates, or assembles; and

intends for sale or distribution in the United States.

Providers of remote computing service; operating system providers

A provider of remote computing service or operating system provider that provided service to more than 1,000,000 subscribers or users in the United States in 2016 or any calendar year thereafter, or that has received an assistance capability directive under section 3513, shall ensure that the provider has the ability to provide the assistance described in subparagraphs (A) and (B) of subsection (b)(2) for any remotely stored data that the provider processes or stores.

A device manufacturer, provider of remote computing service, or operating system provider may satisfy the obligations under this subsection by contracting with any other United States person or entity to provide the required assistance.

A device manufacturer, provider of remote computing service, or operating system provider to which this subsection applies shall bear the costs associated with the development of the capability required under this subsection, including any contracting costs incurred by the device manufacturer, provider of remote computing service, or operating system provider under paragraph (3), unless the manufacturer or provider has received an assistance capability directive under section 3513.

Technical and conforming amendment

The table of sections for chapter 205 of title 18, United States Code, is amended by adding at the end the following:

3119. Assistance orders to third parties and capability requirements.

The obligation under section 3119(c)(1) of title 18, United States Code, as added by subsection (a), shall apply with respect to a consumer electronic device manufactured on or after the effective date in section 801 of this Act.

Section 2518(4) of title 18, United States Code, is amended, in the undesignated matter following paragraph (e), by striking with a minimum of interference with the services that such service provider, landlord, custodian, or person is according the person whose communications are to be intercepted. Any provider of wire or electronic communication service, landlord, custodian or other person furnishing such facilities or technical assistance shall be compensated therefor by the applicant for reasonable expenses incurred in providing such facilities or assistance. and inserting the following:

in a manner designed to uphold the nondisclosure obligations under section 2511(2)(a)(ii).

Such furnishing of information, facilities, and technical assistance shall include—

isolating all communications authorized to be intercepted;

decrypting, decoding, or otherwise providing in an intelligible format the communications authorized to be intercepted, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

delivering all communications authorized to be intercepted securely, reliably, and concurrently with their transmission.

Any provider of wire or electronic communication service, landlord, custodian, or other person furnishing such information, facilities, or technical assistance shall be compensated therefor by the applicant for reasonable expenses directly incurred in providing such information, facilities, or assistance.

Chapter 119 of title 18, United States Code, is amended by adding at the end the following:

A provider of wire or electronic communication service that had more than 1,000,000 monthly active users in the United States in January 2016 or any month thereafter, or has received an assistance capability directive under section 3513, shall ensure that the provider has the ability to provide the information, facilities, and technical assistance described in section 2518(4).

Calculation of monthly active users

For purposes of subsection (a), the number of monthly active users of a wire or electronic communication service shall be calculated by taking the average of the number of individual users or subscribers of the service that are active per month in any calendar year.

A provider of wire or electronic communication service to which subsection (a) applies shall bear any costs associated with the development of the capability required under that subsection, unless the provider has received an assistance capability directive under section 3513.

Technical and conforming amendment

The table of sections for chapter 119 of title 18, United States Code, is amended by adding at the end the following:

2524. Capability requirements.

Section 103(b)(3) of the Communications Assistance for Law Enforcement Act ( 47 U.S.C. 1002(b)(3) ) is amended—

by striking , or ensuring the government’s ability to decrypt, ;

by striking the encryption was provided and inserting the means of encryption or other encoding was implemented by or facilitated ; and

by striking and the carrier possesses the information necessary to decrypt the communication .

Assistance capability directives

Assistance capability directives

Chapter 223 of title 18, United States Code, is amended by adding at the end the following:

Assistance capability directives

The definitions in sections 2510 and 3119 shall apply to this section.

Contents of directives and procedure for issuing

If the Attorney General makes the applicable finding with respect to a person under paragraph (3), the Attorney General may direct the person to create or maintain any of the assistance capabilities described in section 2518, 2524, 3119, 3127, or 3128.

A directive issued under subparagraph (A) shall be in writing.

Not later than 30 days after the date on which a person receives a directive from the Attorney General under paragraph (1), the person shall report to the Attorney General, or a designee of the Attorney General, on, at a minimum—

any technical capabilities that the person knows or expects to be necessary to implement and comply with an anticipated court order or other lawful authorization under section 2518, 3119, or 3123; and

the timeline of the person for developing and deploying the technical capabilities described in subparagraph (A).

The Attorney General may issue a directive to a person under paragraph (1) only if the Attorney General finds—

in the case of assistance capabilities described in section 2518, 2524, or 3128 that during the preceding calendar year, communications occurring over services the person offers, provides, or has access to were subject to not fewer than 5 court orders issued under—

chapter 119 of this title; or

the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1801 et seq.); or

in the case of assistance capabilities described in section 3119, that, during the preceding calendar year, data stored in any device, service, or operating system sold or licensed by the person was subject to not fewer than 5 Federal or State search warrants.

Release from liability

No civil cause of action shall lie in any court against a person who receives a directive under paragraph (1) for any action or omission reasonably necessary to comply with the directive.

Effective date and expiration date of directives

Subject to subparagraph (B), a directive issued under paragraph (1) shall contain—

a date on which the directive takes effect; and

a date when the directive expires.

A directive issued under paragraph (1) may not—

take effect earlier than 180 days after the date on which the directive is issued; or

expire later than 2 years after the date on which the directive takes effect.

Not later than 30 days after the date on which a directive issued under paragraph (1) takes effect, the Attorney General shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a copy of the directive.

No technical demands

A directive issued to a person under paragraph (1) may not specify technical means by which the person is required to implement the required capabilities.

Challenges of directives and appeal

Not later than 30 days after the date on which the Attorney General issues a directive to a person under subsection (b), the person may file a petition to modify or set aside the directive in the United States District Court for the District of Columbia.

Consideration of petition

The court may grant a petition filed under paragraph (1) only if—

the directive does not meet the requirements of this section;

the person filing the petition demonstrates, by clear and convincing evidence, that it is technically impossible for the person to make any change to the way the hardware, software, or other property of the person behaves in order to comply with the directive; or

the directive is otherwise unlawful.

If none of the bases for granting a petition under subparagraph (A) are met, the court shall deny the petition.

Ex parte review

In considering a petition filed under paragraph (1), the court may review any information that the Attorney General, upon filing an affidavit under oath that disclosure of the information would harm the national security of the United States or harm the enforcement of criminal law, chooses to provide to the court solely for ex parte review.

No waiver of privilege

The exercise of the authority under clause (i) does not waive any applicable privilege.

Not later than 30 days after the date on which a petition is filed under paragraph (1), the court shall conduct an initial review of the petition.

If the court determines that the petition does not consist of claims, defenses, or other legal contentions that are warranted by existing law or by a non-frivolous argument for extending, modifying, or reversing existing law or for establishing new law, the court shall immediately—

deny the petition;

affirm the directive or any part of the directive that is the subject of the petition; and

order the recipient to comply with the directive or part thereof.

Upon making a determination under subparagraph (B) or promptly thereafter, the court shall provide a written statement for the record of the reasons for the determination.

If the court determines that a petition filed under paragraph (1) requires plenary review—

not later than 60 days after the petition is filed, the court shall affirm, modify, or set aside the directive that is the subject of the petition; or

if the court does not set aside the directive by the date specified under clause (i), the court shall immediately, or in any event not later than 5 days thereafter—

affirm or affirm with modifications the directive; and

order the person who received the directive to comply with the directive in its entirety or as modified.

Upon making a determination under subparagraph (A) or promptly thereafter, the court shall provide a written statement for the record of the reasons for the determination.

Right of appeal

The Attorney General or a person who receives a directive under subsection (b) may appeal a final order of the district court under this subsection not later than 30 days after entry of the order.

The United States Court of Appeals for the District of Columbia Circuit shall expedite the consideration of any appeal brought under this paragraph, and the expense or effort required to comply with a directive issued under subsection (b) shall not be a basis for staying a final order of the district court under this subsection pending appeal.

Enforcement of directives

Failure to comply

If a person fails to comply with a directive issued under subsection (b), the Attorney General may file a petition for an order to compel the person to comply with the directive in the United States District Court for the District of Columbia, which shall have jurisdiction to review the petition.

Ex parte review

In considering a petition filed under paragraph (1), the court may review any information that the Attorney General, upon filing an affidavit under oath that disclosure of the information would harm the national security of the United States or harm the enforcement of criminal law, chooses to provide to the court solely for ex parte review.

No waiver of privilege

The exercise of the authority under subparagraph (A) does not waive any applicable privilege.

Order to comply

Not later than 30 days after a petition is filed under paragraph (1), the court shall issue an order requiring the person to comply with the directive or any part of the directive, as issued or as modified, if the court finds that the directive meets the requirements of this section and is otherwise lawful.

Upon making a determination under subparagraph (A) or promptly thereafter, the court shall provide a written statement for the record of the reasons for the determination.

Failure to obey an order issued under paragraph (3) shall constitute contempt of court.

Any process under this subsection may be served in any judicial district in which the recipient may be found or does business.

Right of appeal

The Attorney General or a person who receives a directive under subsection (b) may appeal a final order of the district court under this subsection not later than 30 days after entry of the order.

The United States Court of Appeals for the District of Columbia Circuit shall expedite the consideration of any appeal brought under this paragraph, and the expense or effort required to comply with a directive issued under subsection (b) shall not be a basis for staying a final order of the district court order under this subsection pending appeal.

Subject to paragraph (3), a person who receives a directive under subsection (b) shall be compensated therefor by the United States for reasonable expenses directly incurred in complying with the directive.

The amount of compensation provided under paragraph (1)—

shall be mutually agreed upon by the Attorney General and the person complying with the directive; or

in the absence of an agreement under subparagraph (A), shall be determined by the United States District Court for the District of Columbia.

Technical and conforming amendment

The table of sections for chapter 223 of title 18, United States Code, is amended by adding at the end the following:

3513. Assistance capability directives.

Pen register and trap and trace amendments

Chapter 206 of title 18, United States Code, is amended by adding at the end the following:

Pen register capability

A wire or electronic communication service provider that had more than 1,000,000 monthly active users in the United States in January 2016 or any month thereafter shall ensure that the provider has the ability to provide the information described in paragraphs (3) and (7) of section 3127 directly to law enforcement agencies in an intelligible format unobtrusively and in a manner designed to uphold the nondisclosure obligations under section 3123(d)(2).

Calculation of monthly active users

For purposes of paragraph (1), the number of monthly active users of a wire or electronic communication service shall be calculated by taking the average of the number of individual users or subscribers of the service that are active per month in any calendar year.

Trap and trace capability

A provider of wire or electronic communication service that had more than 1,000,000 monthly users in the United States in January 2016 or any month thereafter shall ensure that the provider has the ability to provide the information described in paragraphs (4) and (7) of section 3127 directly to law enforcement agencies in an intelligible format unobtrusively and in a manner designed to uphold the nondisclosure obligations under section 3123(d)(2).

Calculation of monthly active users

For purposes of paragraph (1), the number of monthly active users of a wire or electronic communication service shall be calculated by taking the average of the number of individual users or subscribers of the service that are active per month in any calendar year.

Subject to paragraph (2), a provider of wire or electronic communication service that provides the information described in paragraph (3), (4), or (7) of section 3127 directly to a law enforcement agency shall be compensated for reasonable expenses directly incurred in providing the information.

Reasonable expenses under paragraph (1) may not exceed $150.

Technical and conforming amendment

The table of sections for chapter 206 of title 18, United States Code, is amended by adding at the end the following:

3128. Capability requirements.

Defining technical assistance

Section 3127 of title 18, United States Code, is amended—

in paragraph (5), by striking and at the end;

in paragraph (6), by striking the period at the end and inserting ; and ; and

by adding at the end the following:

the term includes—

isolating all dialing, routing, addressing, and signaling information authorized to be acquired;

decrypting, decoding, or otherwise providing in an intelligible format the dialing, routing, addressing, and signaling information authorized to be acquired, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

delivering all dialing, routing, addressing, and signaling information authorized to be acquired securely, reliably, and concurrently with its transmission.

Electronic surveillance within the United States for foreign intelligence purposes

Title I of the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1801 et seq.) is amended—

in section 101 ( 50 U.S.C. 1801 ), by adding at the end the following:

isolating all communications or information authorized to be acquired;

decrypting, decoding, or otherwise providing in an intelligible format the communications or information authorized to be acquired, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

delivering all communications or information authorized to be acquired securely, reliably, and concurrently with their transmission.

in section 105(c)(2)(B), by striking produce a minimum of interference with the services that such carrier, landlord, custodian, or other person is providing that target of electronic surveillance and inserting in a manner designed to minimize the possibility of alerting the target whose communications are to be intercepted .

Physical searches within the United States for foreign intelligence purposes

Title III of the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1821 et seq.) is amended—

in section 301 ( 50 U.S.C. 1821 ), by adding at the end the following:

isolating all information, material, or property to be seized, reproduced, or altered;

decrypting, decoding, or otherwise providing in an intelligible format the information, material, or property to be seized, reproduced, or altered, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

providing technical support as necessary to ensure effective execution of an order under this title.

in section 304(c)(2)(B) ( 50 U.S.C. 1824(c)(2)(B) ), by striking produce a minimum of interference with the services that such landlord, custodian, or other person is providing the target of the physical search and inserting in a manner designed to minimize the possibility of alerting the target of the physical search .

Pen register; trap and trace

Section 401 of the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1841 ) is amended by adding at the end the following:

The term includes—

isolating all dialing, routing, addressing, and signaling information authorized to be acquired;

decrypting, decoding, or otherwise providing in an intelligible format the dialing, routing, addressing, and signaling information authorized to be acquired, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

delivering all dialing, routing, addressing, and signaling information authorized to be acquired securely, reliably, and concurrently with its transmission.

Section 501(k) of the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1861(k) ) is amended by adding at the end the following:

The term includes—

isolating the tangible things (including call detail records) required to be produced;

decrypting, decoding, or otherwise providing in an intelligible format the tangible things required to be produced, unless the independent actions of an unaffiliated entity make it technically impossible to do so; and

delivering all tangible things required to be produced securely, reliably, and no later than the date on which an order under this title requires their production.

Certain acquisitions inside the United States targeting United States persons outside the United States

Section 703 of the Foreign Intelligence Surveillance Act of 1978 ( 50 U.S.C. 1881b ) is amended by adding at the end the following:

For purposes of this section, the term includes—

isolating all communications or information authorized to be acquired;

decrypting, decoding, or otherwise providing in an intelligible format the communications or information authorized to be acquired, unless the independent actions of an unaffiliated entity make it technically impossible to do so;

delivering the communications or information authorized to be acquired securely, reliably, and concurrently with their transmission; and

providing technical support as necessary to ensure effective execution of an order under this section.

Congress finds the following:

The rapidly growing use of warrant-proof encryption in everyday devices, platforms, and systems allows illegal actors engaged in dangerous criminal activity—including child sexual abuse, terrorism, and international narcotics trafficking—to use encryption to shield their illicit activities from authorities.

Because of warrant-proof encryption, the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order. This provides a lawless space that criminals, terrorists, and other bad actors can exploit for their nefarious ends.

Many service providers, device manufacturers, and application developers who use encryption fail to implement technology that would allow the government to obtain electronic evidence necessary to investigate and prosecute threats to public safety and national security.

The Fourth Amendment to the Constitution of the United States strikes a balance between the individual citizen’s reasonable expectation of privacy on one hand, and on the other, the legitimate need for the government to gain access to the most intimate spaces in citizens’ lives in order to protect the public from criminal actors.

The Framers of the Constitution provided specific barriers to government intrusion into the individual’s private, intimate space—namely, that the government must show by probable cause that evidence of a crime exists in that intimate space, and must have a neutral magistrate, detached from the law enforcement interest, approve law enforcement’s request and issue a warrant.

Once the government satisfies the burden of showing probable cause to a neutral magistrate, the government is entitled to search and seize evidence of a crime in an individual’s private space.

That careful balancing of interests established by the Framers has continued to be calibrated throughout the history of the United States as different challenges have arisen, including, most notably, technological advances in daily life. For example, Congress has imposed additional statutory requirements that the government must meet and that a judge must find satisfied before a court can authorize interception of communications. But the individual’s right to privacy has never been absolute.

If not addressed, criminal anonymity actuated by end-to-end encryption technology will continue to pose a serious risk to the public.

Nevertheless, advances in technology continue without due consideration of issues of lawful access.

Moreover, very little, if any, resources from the private sector or from educational and research institutions are devoted to finding technological solutions to providing lawful access within different encrypted technological platforms.

More resources should be devoted to incentivizing the best minds in the United States to research the issues described in this section and decide how to best provide the most secure products and services to customers while also providing law enforcement access to information the government needs to investigate criminals seeking to do the public harm and to protect national security.

The term means an individual, group of individuals, organization, nonprofit, or university that applies to participate in the prize competition under this title.

Appropriate congressional committees

The term means the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives.

Except as otherwise provided, the term means the Attorney General, acting through the Director of the National Institute of Justice.

The term means a cash prize.

The term means the prize competition established under section 603.

Not later than 180 days after the date of enactment of this Act, the Attorney General shall, subject to the availability of funds appropriated under this title, establish in accordance with section 24 of the Stevenson-Wydler Technology Innovation Act of 1980 ( 15 U.S.C. 3719 ) a prize competition—

to incentivize and encourage research and innovation into solutions providing law enforcement access to encrypted data pursuant to legal process; and

to award one or more prizes, not later than 1 year after the establishment of the prize competition, for technological solutions that provide law enforcement access to encrypted data pursuant to legal process.

Technological solutions described in subsection (a)(2) shall include—

providing maximum security for the device, platform, or system, consistent with the lawful access solution, to reduce the opportunity for unlawful hacking; and

reducing or eliminating broad surveillance capabilities not targeted at specified facilities or individuals pursuant to a warrant or order within the lawful access solution.

To be eligible to win a prize under the prize competition, an applicant—

shall have complied with—

the requirements of the competition as described in the announcement for the competition; and

subsections (g), (h), and (i) of section 24 of the Stevenson-Wydler Technology Innovation Act of 1980 ( 15 U.S.C. 3719 ) (relating to eligibility);

in the case of a private entity, shall be incorporated in the United States and maintain a primary place of business in the United States; and

in the case of an individual, whether participating singly or in a group, shall be a citizen of, or an alien lawfully admitted for permanent residence in, the United States.

The following entities and individuals shall not be eligible to win a prize under the prize competition:

A Federal entity.

A Federal employee acting within the scope of employment.

In selecting the winner or winners of the prize competition, the Attorney General shall give priority to projects that—

incorporate a robust proof of concept model demonstrating the feasibility of the proposed technology achieving the intended goals of the competition as described in paragraph (a); and

include a strategy, submitted with the application or proposal, to move the new technology, hardware, or other processes to market-scale deployment.

In implementing the prize competition, the Attorney General shall—

advertise the prize competition;

use amounts made available under section 607(a)—

to administer the prize competition; and

to award one or more prizes;

develop criteria for the selection of winners;

select judges under section 605 based on criteria developed by the Attorney General;

announce, and award a prize to, one or more winners;

protect against unauthorized use or disclosure of any trade secret or confidential business information of a participant; and

promulgate any rules and regulations necessary to carry out this title, including rules and regulations for submitting and reviewing applications.

Recommendation by judges

After conducting a thorough review of each of the applicant submissions for the prize competition, the judges appointed under section 605 shall—

submit in writing to the Attorney General a recommendation for an award to one or more winners of the prize competition; or

if the judges determine that none of the applicant submissions merit an award, submit in writing to the Attorney General a recommendation that no applicant be awarded a prize, including a detailed explanation stating the reasons why no applicant merits an award.

Selection by Attorney General

Not later than 1 year after the date on which the Attorney General establishes the prize competition, and after reviewing the recommendation submitted under paragraph (1), the Attorney General shall select one or more winners of the prize competition and award a prize to each winner.

Recommendation of no prize

If the judges recommend under paragraph (1)(B) that no applicant be awarded a prize, the Attorney General may—

select one or more award winners, notwithstanding the recommendation of the judges, and award a prize to each winner; or

award no prize to any applicant.

Notification of no prize

If the Attorney General determines not to award a prize to any applicant under subparagraph (B)(ii), the Attorney General shall notify the appropriate congressional committees not later than 90 days after that determination.

Assistance from other parties

Administration by third-party organization

The Attorney General may enter into an agreement, including a grant, contract, or cooperative agreement, with a non-profit or for-profit third-party organization, under which the third-party organization administers the prize competition.

Consultation; division of authority

If the Attorney General enters into a contract with a third-party organization under subparagraph (A), the third-party organization shall consult with the Attorney General on, and the Attorney General shall have the authority to make the final decision with respect to—

the development of criteria for the selection of prize competition winners under subsection (a)(4); and

the selection of judges under section 605.

The Attorney General may solicit and receive non-Federal funds to administer the prize competition and award a prize.

The Attorney General shall appoint not fewer than 3 judges who shall, except as provided in section 604(b)(1)(B), recommend one or more winners of the prize competition.

Each judge appointed under subsection (a) shall—

have subject matter expertise in cryptology and encryption-related technology, including relevant devices, platforms, and systems;

have an understanding of—

protections afforded to United States citizens by the Constitution of the United States against unreasonable searches and seizures by the government; and

the legal authorities that permit the government to search and seize the personal effects of United States citizens, particularly with respect to—

the search and seizure of individuals’ data from technological devices, platforms, or systems; and

the interception of communications over technological devices, platforms, or systems; and

have experience with law enforcement capabilities for lawful access to data and limitations on lawful access to data across various technological devices, platforms, and systems that use encrypted technology.

Report to Congress

Not later than 90 days after the date on which the Attorney General awards one or more prizes under section 604(b)(2), the Attorney General shall submit to the appropriate congressional committees a report on the prize competition that includes—

a statement by the Attorney General that describes the activities carried out by the Attorney General with respect to the duties described in section 604(a);

if the Attorney General has entered into an agreement with a third-party organization under section 604(c)(1), a statement by the Attorney General that describes the activities carried out by the third-party organization with respect to the duties described in section 604(c); and

a statement by the Attorney General explaining the basis on which each winner of the prize competition was selected.

Authorization of appropriations

There are authorized to be appropriated such sums as may be necessary, not to exceed $50,000,000, to carry out this title.

Minimization of administrative expenses

The Attorney General shall make all reasonable efforts to control the administrative expenses of the prize competition so that the majority of the amounts made available under paragraph (1) are used for the prize or prizes awarded to the winner or winners of the prize competition under section 603.

Approval of certain awards

The value of a prize awarded to a winner of the prize competition under section 603 may not exceed $1,000,000 without the approval of the Attorney General or the Director of the National Institute of Justice.

Reimbursement of expenses

A judge appointed under section 605 shall serve without pay, but may be reimbursed for actual and necessary traveling and subsistence expenses.

Termination of authority

The prize competition and all authority provided under this title shall terminate on December 31, 2022.

Lawful access training

Lawful access training program

In this section:

The term means a legal instrument of financial assistance between a Federal awarding agency or pass-through entity and a non-Federal entity, consistent with sections 6302 and 6305 of title 31, United States Code.

a device manufacturer, an operating system provider, and a provider of remote computing service, as those terms are defined in section 3119 of title 18, United States Code, as added by title I of this Act; and

a provider of electronic communication service, as defined in section 2510 of title 18, United States Code.

The term means the lawful access training and assistance program established under subsection (b).

The Attorney General shall establish a lawful access training and real-time assistance program that draws upon the resources of the National Domestic Communications Center (commonly known as the NDCAC ) and other relevant components of the Department of Justice as appropriate.

The primary purpose of the Training Program shall be to provide training and assistance for law enforcement personnel, with a particular emphasis on State and local personnel, on relevant technology and communications platforms, including how to submit appropriately tailored applications for digital evidence, consistent with existing legal requirements and protections for privacy and civil liberties.

The Attorney General may consult with providers regarding the training and assistance under subparagraph (A).

Training and assistance under the Training Program shall include—

designing and providing training to distribute knowledge and expertise, including—

consulting with the most qualified experts in law enforcement and the technology industry to assist in the development of all Training Program materials;

identifying current effective law enforcement training programs and tools;

identifying gaps in current law enforcement training programs and tools;

producing and maintaining training materials and curricula that will be used in classroom training sessions as well as for distribution to law enforcement agencies for reference;

in coordination with providers, delivering information and guidance on accessing digital evidence from specific providers to improve outcomes with regard to particular technology devices, platforms, or systems; and

establishing and promoting the use of a consistent set of clear standards for securing and minimizing data collected by law enforcement;

serving as a centralized repository of knowledge and expertise about provider systems and procedures for submitting requests for data;

coordinating with Federal, State, and international training programs, as well as any private-sector and nonprofit initiatives;

building and maintaining analytic and forensic tools to assist law enforcement agencies in interpreting data that has been obtained from service providers and devices;

hiring and employing technical specialists that can help develop and maintain analytic and forensic tools;

conducting relevant research and analysis to identify the greatest challenges with respect to the ability of law enforcement agencies to access and analyze digital evidence; and

providing a call center for law enforcement officials to seek advice and assistance regarding accessing and analyzing digital evidence.

In carrying out the Training Program, the Attorney General shall develop and coordinate additional functions to improve lawful access to digital evidence, including the following:

Identifying and providing resources

The Attorney General shall—

work with the Office of Justice Programs to identify grants and other grant-making bodies to support law enforcement access to digital evidence; and

include programs in the training activities that inform law enforcement agencies of the grants described in clause (i) and other resources that support—

development and distribution of analytical tools; and

maintenance of crime labs.

Development of authentication system

The Attorney General shall work with providers and law enforcement agencies from Federal, State, and local systems to identify options for, and develop, a system for verifying that an individual requesting data from a provider is a law enforcement official entitled to such access pursuant to lawful authority.

Coordinating international efforts

The Attorney General shall coordinate with international partners to—

help set baseline standards and practices to lawfully access digital evidence;

promote standards to ensure the protection of privacy and civil liberties, and to the extent practical and helpful, harmonize efforts across borders.

Developing master database

The Attorney General shall—

develop a master database to track investigations in the United States in which a law enforcement agency secured the legal authority to access digital data but otherwise cannot gain access to that data in an intelligible format due to encryption; and

through the training activities described in paragraph (1), encourage the robust participation from State and local authorities that is necessary to populate the database described in clause (i) of this subparagraph.

The Attorney General, in carrying out the Training Program, shall provide any additional activities and services determined appropriate by the Attorney General.

Authorization of appropriations

There is authorized to be appropriated to the Attorney General to carry out this section $50,000,000 for fiscal year 2020, which shall remain available until expended.

Not more than 5 percent of the amount appropriated under paragraph (1) may be used to carry out activities under subsection (e)(2).

The Attorney General may enter into a cooperative agreement with providers or other persons to—

provide regular training to law enforcement agencies through the Training Program on information that is potentially available from devices, operating systems, remote computing services, or electronic communication services, and on provider policies, in order to facilitate tailored and specific applications from law enforcement agencies;

maintain up-to-date and comprehensive guidance for law enforcement agencies regarding accessing information from providers;

develop or maintain online mechanisms to—

receive law enforcement requests for data; and

provide dated, electronic confirmation of receipt of a request described in clause (i); and

assist with other tasks as determined necessary by the NDCAC.

The NDCAC may solicit and accept donations for the Training Program from providers or other persons to be used to carry out this section.

Private funding requirement

The NDCAC may not carry out the Training Program during a fiscal year, including fiscal year 2020, unless and until the NDCAC has received funding for that fiscal year under subparagraph (A) in an amount equal to the amount authorized to be appropriated for fiscal year 2020 under subsection (d)(1).

Not later than 1 year after the effective date in section 801 of this Act, and once thereafter not later than 2 years after that effective date, the NDCAC shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report on the Training Program.

The report submitted under paragraph (1) shall include—

ongoing efforts to identify and respond to gaps in training and distribution of technical tools;

the state of cooperation with providers;

novel uses of legal authorities;

any new policies and best practices being seriously considered or adopted; and

funding contributed by private individuals, organizations, and entities.

Titles I through V of this Act, and the amendments made by those titles, shall take effect 1 year after the date of enactment of this Act.

GovTrack helps everyone learn about and track the activities of the United States Congress. Launched more than 20 years ago, we’re one of the oldest government transparency and accountability websites on the Internet.

This is a project of Civic Impulse, LLC. GovTrack.us is not a government website.