Also, as Dorothy Denning observed, protection against abuse would be buttressed by an extensive auditing of the system: "By examining detailed audit records, it will be possible to determine if keys are used only as authorized and to decrypt only communications intercepted during authorized surveillance. Some proponents of this technology, such as Professor Denning, believed that there would be sufficient checks and balances to counter the potential for abuses or fraudulent behavior.