<title>10-28-96: Address To the First General
Assembly of the International Association Of Chiefs of Police Conference;
Phoenix, Arizona </title>
1
1
2
3
4
5
6
7
8
9
10 ADDRESS OF THE HONORABLE JANET
RENO,
11 UNITED STATES ATTORNEY
GENERAL,
12 TO THE FIRST GENERAL
ASSEMBLY
13 OF THE INTERNATIONAL
ASSOCIATION
14 OF CHIEFS OF POLICE
CONFERENCE
15 PHOENIX, ARIZONA
16 OCTOBER 28, 1996
17
18
19
20
21
22
23
24
25
2
1 Thank you so much, Chief. I'm very
2
honored to be here with you today.
For in over
3
three-and-a-half years, I've had a chance to visit
4
some of your towns and cities. I
have had a
5
chance to watch you in action or hear of your
6
work, and I have the greatest respect and
7
admiration for what you do for your cities and
8
towns across this nation. You
operate based on
9
old-fashioned principles of trust, and where I see
10 police chiefs succeeding as I do so
often, it's
11 because they build trust. You enforce the law
12 firmly but fairly. You're on the front lines of
13 bringing your community together, and
yet you are
14 so progressive and understanding in
reaching out
15 to understand problems of modern
technology as
16 they impact on crime and as you
develop new and
17 exciting techniques for this next
century. You
18 are on the front line, and this
administration
19 recognizes that. And as I was thinking of what I
20 was going to say, I realized how much
we have
21 relied on police chiefs Tom
Constantine and
22 Eduardo Gonzales and Ray Kelly and Joe
Brannon and
23 Harlan McCune. We know where to go for people who
24 understand what crime is about in
America and we
25 need to do about it.
3
1 One of the people that I have looked
to,
2
I couldn't persuade him to come to the Justice
3
Department, but I regularly brought him to the
4
Justice Department as often as he will come, is
5
Dave Walchak, and it has been such a privilege to
6
work with him. He has such a fine
sense of what
7
policing should be about. He has
such a great
8
understanding of people. And he
has a wonderful
9
understanding of technology. I am
going to ask
10 him to continue to educate me on
those issues. It
11 has been a great honor to work with
you and a real
12 privilege and thank you so much for
all your
13 support during this time.
14 And, Dan, thank you. You're always there
15 speaking for the Association, and we
value your
16 counsel so very much.
17 And Chief Sanders, I look
forward to
18 working with you in every way that I
possibly can.
19 We have in all these efforts
tried to
20 forge a great partnership,
recognizing that you
21 are on the front line and that you
understand your
22 needs and resources in your community
far better
23 than we can in Washington. We have tried to forge
24 a partnership based on a two-way
street where we
25 get information, but we give
information; where we
4
1
provide training, but where we learn from you;
2
where we share understanding of tactics, and we
3
learn from you; where we operate based on
4
principles of federalism, not grabbing cases for
5
headlines or for turf, but providing information
6
so that you may handle the case according to
7
principles of federalism. We've
seen evidence of
8
this partnership and the anti-violence initiative
9
which has been so successful because of your work
10 and your coordination.
11 We have focused on drugs,
and that is a
12 classic example of the
partnership. Tom
13 Constantine has been a leader in
bringing the Cali
14 cartel to its knees. There are more in prison in
15 Colombia than ever before. We have prosecuted and
16 now convicted Garcia Abrego, a major
trafficker,
17 because of the work of so many
concerned. And we
18 see major investigations under way
and indictments
19 announced. But then you start looking at those
20 indictments. They may be federal indictments, but
21 some of the information that started
the whole
22 case, that unrolled the whole
investigation, came
23 from local law enforcement, and you
see what can
24 be done when that partnership is formed. And then
25 we see what has been done with the
METS program,
5
1
again, putting local law enforcement first and
2
doing what we can to support you.
And in
3
community policing with now over 20,000 police
4
officers added to the rolls of policing in America
5
and over 20,000 more authorized.
And the Brady
6
Act, and the ban on assault weapons is an example
7
of what we have done together in securing
8
legislation that can make a difference.
And in
9
the improvement of criminal histories.
I get so
10 frustrated when I talk to people
about the
11 improvement of criminal histories and
tell them
12 how important it is and they look at
me blankly.
13 I know I can look out at this
audience and know
14 that I am seeing people who
appreciate it. And
15 together we have got to continue to
work, not to
16 get credit, but to get results.
17 And we're seeing the
results. Violence
18 is down in most cities in this
country. But I
19 know what that's like. In Miami I cheered when
20 violence went down in the early '80s,
and then
21 crack came, and the violence started
up again.
22 And now we look at what
methamphetamine may do
23 today.
24 I look forward to doing
everything I can
25 to forging an even stronger
partnership where we
6
1
look at patterns of crime across this country,
2
where we catch early indicators of what might be
3
happening, that we work together to solve
4
problems, first by preventing them, and then if we
5
can't catch them early, by meeting them head on
6
with vigorous enforcement that can make a
7
difference.
8
The job of police chief is an
9
extraordinarily difficult one.
You are at the
10 heart of community-building. Without a strong
11 police chief, community-building is
not happening
12 in this nation. And yet at the same time, your
13 town or your city is having to focus
on where it
14 exists in a world whose borders are
shrinking and
15 in which technology is bringing us
together as
16 never before, creating new concepts
of community
17 such as Internet chat rooms that I
still have
18 difficulty understanding. With this comes
19 enhanced risk of terrorism,
international
20 organized crime, international
gambling on the
21 Internet, fraud on the Internet, and
international
22 pornography. And it's in our front door if we
23 don't watch out.
24 How do we face these
issues? Some would
25 say that these issues stagger the
imagination and
7
1
convert vanity to prayer, but using prayer, let us
2
move forward and be resolute and not let anything
3
back us down.
4 And in that instance, I'd like to
talk to
5
you about three points. First of
all, youth
6
violence, which I think continues to be one of the
7
major crime problems we face in this country;
8
secondly, terrorism, paramount in our mind; and,
9
third, computer crime.
10 This association has taken
the lead for
11 this country in focusing on youth
violence. Your
12 summit this past year was extraordinary,
and I
13 just wished I could have attended all
the panels
14 because the work that was done was
just splendid.
15 I've had a chance to review the draft
of that
16 report, and it is excellent, and I
commend you.
17 We are seeing results because of what
you are
18 doing on the front line.
19 The juvenile murder rate,
arrest rate, is
20 down for the second time, down
significantly. The
21 youth violence rate is down for the
first time,
22 2.9%.
23 But I remember what
happened. I would
24 cheer in Miami when the violence went
down by one
25 in one year and then the next year it
would be up
8
1
and it would be a blip. We can't
rest on our
2
laurels. We have got to
understand that if we are
3
going to deal with the problem of youth violence,
4
if we're going to deal with the problem of
5
increasing youth usage of drugs, we're going to
6
have to work together as never before, for the
7
number of young people in the age category of 12
8
to 17 is increasing significantly in these next 15
9
years.
10 What are the solutions? You know best,
11 and we need to share. And when you find something
12 that's working, you need to share it
with us so we
13 can let others know. But, clearly, one of the
14 keys to solving the problem of youth
violence is
15 letting young people know that there
is going to
16 be a firm, fair punishment that fits
the crime,
17 and that it's going to be carried
out. We have
18 tried to enforce that by providing
additional
19 dollars for boot camps and drug
courts. But you
20 and I know, and your officers on the
streets know,
21 that if we send an armed robber at
age 14 to two
22 years of appropriate detention,
that's not going
23 to be worth anything if he returns to
the
24 apartment over the open-air drug
market where he
25 got into trouble in the first
place. And we have
9
1
got to galvanize together at every level of
2
government to let everyone know how programs for
3
aftercare and follow-up are very critically
4
important.
5 But we can innovate and be
creative. You
6
have done so much in developing community policing
7
initiatives. Why not reach out in
partnership
8
with probation officers, with parole officers,
9
juvenile offender parole officers, and create
10 partnerships of community probation
officers with
11 community police officers? Why don't we link with
12 the juvenile detention facilities and
the
13 community police officers and build
strong
14 aftercare programs?
15 In community policing it has
been
16 extraordinary to see what community
after
17 community is doing when police
officers reach out
18 to build trust amongst young
people. You can do
19 so much in truancy prevention. You are working so
20 hard to get guns out of the hands of
kids. You
21 are working to figure out how we can
mediate
22 problems with youngsters who are just
on the verge
23 of getting in trouble.
24 But we need to look
further. Why are
25 young people using drugs more often
these days?
10
1
What's working? What's not
working in terms of
2
prevention? You're on the front
line, and we need
3
to forge a stronger partnership where we hear from
4
you as to what's needed to make a difference.
5
Instead of designing programs in a vacuum, we need
6
to fashion programs that can respond to what your
7
particular community needs in terms of a
8
prevention initiative, in terms of a drug court,
9
in terms of a truancy prevention program or a gang
10 program, and we're going to be
listening to you.
11 The second problem I want to
discuss is
12 terrorism. None of us is immune. All of us will
13 remember April the 19th, 1995. We will remember
14 the World Trade Center. We have seen the impact
15 in Eastern Washington, in
Montana. It is the
16 large city, the city in the heartland
of this
17 country, the smaller town, the more
rural area.
18 None of us is immune.
19 Terrorism is a law
enforcement problem,
20 and like every other law enforcement
problem we
21 have tackled, we must tackle this
together. This
22 is not a federal problem. It is not a state
23 problem. It is not a local problem. It is the
24 problem of every single one in this
room working
25 together.
11
1 Let us not forget that it was an
Oklahoma
2
City patrol officer who spotted the wheel axle
3
containing the VIN number for the vehicle used to
4
bomb the Murrah Federal Building.
Let us not
5
forget it was an Oklahoma Highway Patrol officer
6
who made the first arrest in the case.
7 I can tell you that I have never
been so
8
proud of law enforcement as I was when I visited
9
Oklahoma City just days after the bombing and
10 walked through the command post
finding FBI and
11 ATF agents working side by side with
Oklahoma City
12 police officers, county sheriffs,
highway patrol
13 officers working for one common goal,
not to get a
14 stat but to bring some terrible
criminals to
15 justice.
16 We must respond together,
and our policy
17 in responding to acts of terrorism,
both at home
18 and abroad, should be straightforward
and simple.
19 First, we must work together to do
everything
20 possible to deter and prevent
terrorist attacks.
21 Secondly, when acts of terrorism do
occur, we must
22 respond quickly and decisively and
together with
23 the full range of law enforcement and
other
24 options that are available. And in this process
25 we must work with FEMA and community
agencies to
12
1
reach out to victims and their loved ones and
2
never forget them and respond as quickly as
3
possible to their needs. Thirdly,
we must work
4
with our friends throughout the world to stop
5
terrorism and to ensure that none go unpunished.
6 Within the executive branch we have
7
strengthened relationships between law enforcement
8
and intelligence communities within a framework
9
that fosters greater cooperation while respecting
10 long-standing limitations on direct
intelligence
11 participation in criminal
investigations. In
12 addition, we now use the National Law
Enforcement
13 Telecommunications System or NLETS to
pass
14 unclassified terrorist related
information to
15 state and local law enforcement
agencies. We have
16 formed 12 formal joint terrorism task
forces,
17 including one here in Phoenix with
other cities
18 involved also, New York, Los Angeles,
Atlanta,
19 Chicago, Dallas, Houston, Miami,
Newark,
20 Philadelphia, San Francisco and
Washington. These
21 task forces have played a role in a
number of
22 domestic terrorism investigations. But I am
23 committed to doing everything in my
power to
24 enhance our efforts to reach out to
state and
25 local law enforcement so that not
just in the
13
1
major cities of this country but in every state
2
all of law enforcement knows who to go to, where
3
to go and that there is a comprehensive and
4
coordinated two-way street that can address
5
problems that can ensure an appropriate exchange
6
of information that can provide appropriate
7
training and appropriate techniques and tactics.
8 I think it is imperative that we
work
9
together to identify the critical facilities and
10 structures, to identify people in the
private
11 sector that can be our partners.
12 We have a whole new world
before us. It
13 used to be just buildings that we
worried about.
14 But now with one creative tool, we
can bring down
15 a power grid by throwing a
switch. We can
16 interrupt 911 systems. We can do so much with the
17 technology that also gives us
opportunity at the
18 same time. We need to work together to share the
19 technology that can prevent the
problem in the
20 first place.
21 I will invite Chief Sanders
to work with
22 us in this coming year, work with the
FBI, to make
23 sure that we have the Association's
view of how
24 best we can meet the needs of all of
law
25 enforcement across this land in
joining together
14
1
as one in preventing and combating terrorism.
2 The next issue is computer
crime. We see
3
criminals use computers in one of three ways:
4
First, computers are sometimes targeted.
That is,
5
the actor's conduct is designed to steal
6
information from or cause damage to a computer
7
system. Secondly, computers are
used as tools to
8
facilitate traditional offenses.
For example,
9
individuals are now using the Internet, as I
10 mentioned earlier, to distribute
child
11 pornography. Third, computers are used to store
12 evidence that we as law enforcement
need to
13 access. For example, drug dealers now store their
14 records on computers.
15 When I came to Washington, I
recognized
16 that the information age brought new
challenges to
17 law enforcement, and I have
frequently said that
18 high-tech crime is one of the most
important
19 priorities of the Department of
Justice. The
20 sheer number of intrusions into
computer systems
21 and the magnitude of the dollar
losses would give
22 any law enforcement officer
pause. And for those
23 of you who are from a small rural
town, don't feel
24 too secure. If a man can sit in a kitchen in
25 St. Petersburg, Russia, and with his
computer
15
1
steal from a bank in Chicago, he can steal from
2
your bank too, and we need to understand how we
3
can work together to address these issues.
4
The magnitude of the
problem is indicated
5
by the Computer Emergency Response Team at
6
Carnegie-Mellon University, the 24-hour response
7
team for Internet incidents. It
has reported that
8
the number of security incidents reported to them
9
as increased approximately 500% since 1991 and the
10 number of computer sites affected
worldwide has
11 increased over 700%. One recent survey of 246
12 companies revealed that the monthly
rate of
13 incidents involving the theft of proprietary
14 information has risen 260% since
1985. As
15 alarming as these surveys are,
security experts
16 believe that most computer crimes are
neither
17 detected nor reported. In fact, statistics
18 compiled by the Department of Defense
strongly
19 support this conclusion. To test the security of
20 their own systems, they attacked
their own
21 machines. They attacked 38,000 machines,
22 successfully penetrating the attack
site 65% of
23 the time. Of these successful penetrations, only
24 4% were detected, and of those
detected, only 27%
25 were reported. Put another way, of the 38,000
16
1
machines attacked, almost 25,000 were penetrated,
2
only 988 knew it, and only 267 reported it. We
3
have a long way to go, but we must go together.
4 The FBI has now established three
5
computer crime squads, one in Washington, one in
6
San Francisco and one in New York.
It has
7
established the Computer Investigations and Threat
8
Assessment Center to better identify the nature of
9
the threat and better coordinate the FBI's
10 response.
11 For the Justice Department
as a whole, we
12 have created the Computer Crime and
Intellectual
13 Property Section, a group of 11
high-tech
14 prosecutors devoted full time to
computer crime
15 and intellectual property issues.
16 I've had the chance to see
what happens
17 when we start working together with
state and
18 local law enforcement in the
anti-violence
19 initiatives we have undertaken. We must do the
20 same with respect to high-tech crime.
21 As serious as hacking is,
though, it
22 represents only one aspect of the
computer crime
23 problem. As the use of computers and
24 telecommunications continues to grow
25 exponentially, law enforcement agents
are finding
17
1
that computers hold relevant evidence in almost
2
every type of case. Whether
fraud, narcotics
3
trafficking or even murder, computer evidence may
4
be important. But how do you
execute a warrant in
5
a computerized environment? What
if officers
6
acting with a warrant enter a business and
7
download a critical file only to find out later
8
that this document was stored on a server in
9
another state where the warrant had no force? Or
10 equally troubling, what if the
document was stored
11 in another country and the searched
country takes
12 offense at the execution of the
search? And what
13 are the rules protecting the privacy
of electronic
14 mail and the privacy of computer
users generally?
15 These tricky questions, once
theoretical, are now
16 practical problems for every single
one of us and
17 for our officers in the field.
18 To assist law enforcement
agents, the
19 Department of Justice has issued the
Federal
20 Guidelines for Searching and Seizing
Computers to
21 help provide guidance, and we have
worked with our
22 counterparts at the state, local and
international
23 level to address these difficult
issues. I meet
24 regularly with ministers of justice,
recognizing
25 that if that man in St. Petersburg
can steal from
18
1
your bank, our whole effort at law enforcement
2
must now reach out to include a partnership with
3
our colleagues abroad.
4 Our training on computer crime
related
5
topics is offered to federal, state and local
6
agencies and is a critical component of our
7
computer crime initiative. In the
training
8
context, the generic term "computer crime"
9
includes the investigation and prosecution of
10 computer abuse, electronic search and
seizure, the
11 admissibility of electronic evidence,
wiretapping
12 data networks and constitutional
issues. We
13 provide state and local training in
three ways:
14 One, through DOJ-funded government
organizations
15 such as the National White Collar
Crime Center,
16 which provides state and local
training with
17 monies from the Office of Justice
programs; two,
18 through professional associations
comprised in
19 whole or in part of state and local
law
20 enforcement; and, three, through
individual
21 training sessions sponsored by local,
state and
22 federal agencies.
23 But we must do so much more
to enhance
24 our effort. And I don't want us telling you what
25 we should be teaching you. I want to again create
19
1
a partnership, Chief Sanders, whereby we listen to
2
you and understand what you need to solve the
3
problems of computer crime in your community.
4
We're inviting you to join with high-tech agents
5
and prosecutors in an info-tech training group.
6
We want to develop comprehensive training agendas
7
for all levels of government and continuing
8
training that will serve us well for the
9
cyberworld in the century to come.
10 But to address high-tech
crime, we must
11 also have the ability to seize and
analyze
12 electronic evidence. We have crime labs, but we
13 need new tools in those crime labs,
and in the
14 future we must make sure that the
laboratory
15 resources exist to serve all levels
of law
16 enforcement, and we look forward to
working with
17 you in that effort.
18 But none of this will matter
much if our
19 current law enforcement tools are
rendered
20 useless. That is what we face with respect to
21 data encryption. All of you know and understand
22 that it is possible to encode or
encrypt
23 electronic data. Few of you realize just how
24 easy, just how cheap it is and just
how helpless
25 all of us in law enforcement are if
we can't
20
1
decode the data. I am talking
about far more than
2
electronic surveillance. I'm
talking about drug
3
records which were kept by your local drug dealer
4
in a small black book just five years ago and
5
which today he keeps on the PC which he bought at
6
a local discount store for under a thousand
7
dollars. If the files are
encrypted with the new
8
technology, we may be simply unable to access
9
them.
10 In recent years we have
witnessed a
11 vociferous debate about the use of
encryption.
12 Individuals concerned about privacy,
commerce,
13 computer security, law enforcement
and national
14 security have all voiced strong and
often
15 conflicting opinions regarding the
use and
16 regulation of encryption. But our ability to
17 protect our public safety is
threatened by the
18 spread of unbreakable
encryption. Terrorists will
19 be able to communicate securely and
the value of
20 wiretaps will be lost. Drug dealers will encrypt
21 their records rendering search
warrants useless.
22 Thus, we seek a balanced policy that
takes account
23 of all the competing interests. Our goal is to
24 promote the development and use of
strong
25 encryption which enhances the privacy
of
21
1
communication and stored data while at the same
2
time preserving law enforcement's ability to gain
3
access to evidence as part of a legally authorized
4
search or surveillance.
5 I have so many people tell me,
"Oh,
6
you're getting new powers if you have the ability
7
to access encrypted information."
It's exactly
8
the same principle as when I go into court to get
9
a court order to wiretap. It is
just as important
10 a law enforcement tool. It is consistent with the
11 Constitution. And your editorial boards, your
12 business leaders and your community
government
13 leaders must hear and understand just
what is at
14 stake. If they are not worried about the drug
15 dealer, then tell them, "What
are you going to do
16 when somebody steals your secrets and
puts them in
17 a computer and we can't trace who's
done it
18 because it's been
encrypted?" Let's get this
19 debate open and above board in a
common sense
20 discussion that can persuade people
that we can
21 protect privacy just as we protect
privacy today
22 for innocent people through
established procedures
23 in wiretapping through procedures of
mitigation
24 while at the same time giving us
access to the bad
25 guys according to principles of due
process in the
22
1
constitution.
2 One method to achieve this balance
is
3
through the use of key recovery products. With
4
such products law enforcement agents can pursuant
5
to lawful process access a key that can then be
6
used to decipher the encrypted information. This
7
solution provides robust cryptography for
8
law-abiding citizens while denying criminals the
9
benefit of encryption. The
administration has
10 undertaken a major initiative to
promote the
11 manufacture and use of key recovery
products over
12 the long term while providing some
temporary
13 relief to U.S. industry which has
been pushing to
14 end restrictions on the export of
strong
15 cryptography. Under the administration's
16 initiative, the export of certain
strong
17 encryption products will be permitted
for two
18 years, but only with industry
commitments to build
19 and market future products that
support key
20 recovery after the two-year
transition period.
21 And I am watching that. I have -- it used to be a
22 little black book. It's now a big black notebook.
23 And this is one of my keys in
watching how this
24 whole effort unfolds to make sure
that we hold
25 them to that promise. It is important to
23
1
understand that if we fail in this effort, law
2
enforcement agents at every level of government
3
will find their job increasingly more difficult
4
because evidence can be hidden and warrants and
5
wiretaps can be effectively nullified.
Law
6
enforcement, therefore, must remain committed to
7
the goal of promoting the development of a key
8
recovery system, and you can be instrumental.
9 When I started, I talked about the
10 old-fashioned trust that you build in
your
11 community with that activist that
comes to a
12 meeting and hollers at you, with the
mayor who is
13 trying to figure out how to handle
his budget,
14 with the young offender who needs a
fresh start
15 after having served an appropriate
sentence. For
16 your rank and file that put their
life on the line
17 day in and day out, for all of these
people and
18 all the citizens you serve in
community after
19 community across this nation, you are
at the heart
20 of building trust. Through that strength that you
21 have in your community it is
important that we let
22 the community know in words that they
can
23 understand how important it is that
we move into
24 this next century, into the
cyberworld, protecting
25 and maintaining our constitution and
law
24
1
enforcement's ability to do its job pursuant to
2
the constitution.
3 For a little over three-and-a-half
4
years I have had an opportunity to travel across
5
this nation. I was raised by
parents who taught
6
me that this was the most wonderful nation in the
7
world, a nation that had great hope for all its
8
people, a nation that faced with adversity could
9
solve its problems by coming together.
But after
10 three-and-a-half years, I will tell
you that my
11 mother didn't quite get it. She told me that
12 American people were wonderful. She sometimes
13 fussed at law enforcement, but she
told me law
14 enforcement was wonderful. And my father, the
15 police reporter, told me day in and
day out what
16 incredible efforts law enforcement
went to to
17 protect the people in the community I
love. But
18 they didn't have it. You all are just miracle
19 workers. You do so very much to bring communities
20 together, to protect this nation, to
build trust,
21 and it is an honor and a privilege to
work with
22 you.
23
24
25
25
1
2
3
4
5
6
7
8
9
10
11
12 I, LAWRENCE L. DRIVER,
hereby certify
13 that the foregoing 24 pages
constitute a full,
14 true and accurate transcript of all
the
15 proceedings had in the foregoing
matter, all done
16 to the best of my skill and ability.
17 DATED at Phoenix, Arizona,
29th day of
18 October, 1996.
19
20
21
________________________
22 Court Reporter
23
24
25