10.10.1. "What are the laws and regulations about export of crypto, and where can I find more information?" - "The short answer is that the Department of State, Office of Defense Trade Controls (DOS/DTC) and the National Security Administration (NSA) won't allow unrestricted export (like is being done with WinCrypt) for any encryption program that the NSA can't crack with less than a certain amount (that they are loathe to reveal) of effort. For the long answer, see ftp://ftp.csn.net/cryptusa.txt.gz and/or call DOS/DTC at 703-875-7041." [Michael Paul Johnson, sci.crypt, 1994-07- 08] 10.10.2. "Is it illegal to send encrypted stuff out of the U.S.?" - This has come up several times, with folks claiming they've heard this. - In times of war, real war, sending encrypted messages may indeed be suspect, perhaps even illegal. - But the U.S. currently has no such laws, and many of us send lots of encrypted stuff outside the U.S. To remailers, to friends, etc. - Encrypted files are often tough to distinguish from ordinary compressed files (high entropy), so law enforcement would have a hard time. - However, other countries may have different laws. 10.10.3. "What's the situation about export of crypto?" + There's been much debate about this, with the case of Phil Zimmermann possibly being an important test case, should charges be filed. - as of 1994-09, the Grand Jury in San Jose has not said anything (it's been about 7-9 months since they started on this issue) - Dan Bernstein has argued that ITAR covers nearly all aspects of exporting crypto material, including codes, documentation, and even "knowledge." (Controversially, it may be in violation of ITAR for knowledgeable crypto people to even leave the country with the intention of developing crypto tools overseas.) - The various distributions of PGP that have occurred via anonymous ftp sources don't imply that ITAR is not being enforced, or won't be in the future. 10.10.4. Why and How Crypto is Not the Same as Armaments - the gun comparison has advantages and disadvantages - "right to keep and bear arms" - but then this opens the door wide to restrictions, regulations, comparisons of crypto to nuclear weapons, etc. - + "Crypto is not capable of killing people directly. Crypto consists - entirely of information (speech, if you must) that cannot be - interdicted. Crypto has civilian use. - - - <Robert Krawitz <rlk@think.com>, 4-11-94, sci.crypt> 10.10.5. "What's ITAR and what does it cover?" + ITAR, the International Trafficking in Arms Regulations, is the defining set of rules for export of munitions--and crypto is treated as munitions. - regulations for interpreting export laws + NSA may have doubts that ITAR would hold up in court - Some might argue that this contravenes the Constitution, and hence would fail in court. Again, there have been few if any solid tests of ITAR in court, and some indications that NSA lawyers are reluctant to see it tested, fearing it would not pass muster. - doubts about legality (Carl Nicolai saw papers, since confirmed in a FOIA) - Brooks statement - Cantwell Bill - not fully tested in court + reports of NSA worries that it wouldn't hold up in court if ever challenged - Carl Nicolai, later FOIA results, conversations with Phil + Legal Actions Surrounding ITAR - The ITAR laws may be used to fight hackers and Cypherpunks...the outcome of the Zimmermann indictment will be an important sign. + What ITAR covers - "ITAR 121.8(f): ``Software includes but is not limited to the system functional design, logic flow, algorithms, application programs, operating systems and support software for design, implementation, test, operation, diagnosis and repair.'' [quoted by Dan Bernstein, talk.politics.crypto, 1994-07-14] - joke by Bidzos about registering as an international arms dealer + ITAR and code (can code be published on the Net?) - "Why does ITAR matter?" - Phil Karn is involved with this, as are several others here + Dan Bernstein has some strongly held views, based on his long history of fighting the ITAR - "Let's assume that the algorithm is capable of maintaining secrecy of information, and that it is not restricted to decryption, banking, analog scrambling, special smart cards, user authentication, data authentication, data compression, or virus protection. "The algorithm is then in USML Category XIII(b)(1). "It is thus a defense article. ITAR 120.6. " [Dan Bernstein, posting code to sci.crypt, talk.politics.crypto, 1994-08-22] - "Sending a defense article out of the United States in any manner (except as knowledge in your head) is export. ITAR 120.17(1). "So posting the algorithm constitutes export. There are other forms of export, but I won't go into them here. "The algorithm itself, without any source code, is software." [Dan Bernstein, posting code to sci.crypt, talk.politics.crypto, 1994-08-22] - "The statute is the Arms Export Control Act; the regulations are the International Traffic in Arms Regulations. For precise references, see my ``International Traffic in Arms Regulations: A Publisher's Guide.''" [Dan Bernstein, posting code to sci.crypt, talk.politics.crypto, 1994-08-22] + "Posting code is fine. We do it all the time; we have the right to do it; no one seems to be trying to stop us from doing it." [Bryan G. Olson, posting code to sci.crypt, talk.politics.crypto, 1994-08-20] - Bernstein agrees that few busts have occurred, but warns: "Thousands of people have distributed crypto in violation of ITAR; only two, to my knowledge, have been convicted. On the other hand, the guv'mint is rapidly catching up with reality, and the Phil Zimmermann case may be the start of a serious crackdown." [Dan Bernstein, posting code to sci.crypt, talk.politics.crypto, 1994-08-22] - The common view that academic freedom means one is OK is probably not true. + Hal Finney neatly summarized the debate between Bernstein and Olsen: - "1) No one has ever been prosecuted for posting code on sci.crypt. The Zimmermann case, if anything ever comes of it, was not about posting code on Usenet, AFAIK. "2) No relevant government official has publically expressed an opinion on whether posting code on sci.crypt would be legal. The conversations Dan Bernstein posted dealt with his requests for permission to export his algorithm, not to post code on sci.crypt. "3) We don't know whether anyone will ever be prosecuted for posting code on sci.crypt, and we don't know what the outcome of any such prosecution would be." [Hal Finney, talk.politics.crypto, 1994-008-30] 10.10.6. "Can ITAR and other export laws be bypassed or skirted by doing development offshore and then _importing_ strong crypto into the U.S.?" - IBM is reportedly doing just this: developing strong crypto products for OS/2 at its overseas labs, thus skirting the export laws (which have weakened the keys to some of their network security products to the 40 bits that are allowed). + Some problems: - can't send docs and knowhow to offshore facilities (some obvious enforcement problems, but this is how the law reads) - may not even be able to transfer knowledgeable people to offshore facilities, if the chief intent is to then have them develop crypto products offshore (some deep Constitutional issues, I would think...some shades of how the U.S.S.R. justified denying departure visas for "needed" workers) - As with so many cases invovling crypto, there are no defining legal cases that I am aware of.
Next Page: 10.11 Regulatory Arbitrage
Previous Page: 10.9 Legality of Digital Banks and Digital Cash?
By Tim May, see README
HTML by Jonathan Rochkind