I believe that with the current approach it will be extremely difficult if not impossible for anyone, including the government, to improperly access Clipper-encrypted communications, and that unauthorized use of Clipper keys will be detectable through auditing.