The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.
From page 15...
... Chapter 3 discusses needs for access to encrypted information and related public policy issues, specifically those related to information gathering for law enforcement and national security purposes. Part II of this report describes the instruments and goals of current U.S.
From page 16...
... . These policy options include alternative export control regimes for cryptography and alternatives for providing exceptional access capabilities when necessary.
This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.