96 NOV 7 AM 11:23
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF OHIO
EASTERN DIVISION
PETER D. JUNGER, ) CASE NO. 96 CV 1723
) Plaintiff ) ) JUDGE NUGENT v. ) )
WARREN CHRISTOPHER, et al. )
) Defendants. )
STATEMENT OF ISSUES, POINTS AND AUTHORITIES
IN ANTICIPATION OF ORAL ARGUMENTS
GINO J. SCARSELLI (0062327)
664 Allison Dr.
Richmond Hts., OH 44143-2904
(216)291-8601
RAYMOND VASVARI (0055538)
1300 Bank One Center
600 Superior Ave. East
Cleveland,OH 44114-2650
(216)522-1925
KEVIN FRANCIS O'NEILL (0010481)
Professor of Law
Cleveland-Marshall College of Law
1801 Euclid Ave.
Cleveland, OH 44115
(216)687-2286
The regulations cover a wide range of communication, including what passes among students, professors and researchers. Although the government asserts that the regulations do not control academic teaching and research, it has repeatedly criticized Professor Junger for not submitting for review an encryption program, which he wrote and uses to teach law students how cryptography works and why it has important legal and political consequences.1 This is the hallmark of not just a licensing scheme, but a censorship scheme.
Professor Junger argues that the regulations amount to an unconstitutional
system of overbroad and vague prior restraints. They are not sufficiently
clear, vest far too much discretion in administrative officials and do not
provide the minimum safeguards that are necessary whenever the government
licenses speech. Thus, the proper analysis for this case is found in the
Supreme Court decisions addressing licensing and censorship
schemes2 rather than United States v. O'Brien and its
progeny.3
_______________________
1 Defs. First Br. at 8, 10 n.9; Defs.' Second Br. at 11.
2 Freedman v. Maryland, 380 U.S. 51 (1965); City of Lakewood v. Plain Dealer Publishing Co., 486 U.S. 750 (1988); FW/PBS. Inc. v. Dallas, 493 U.S. 215 (1990).
3 United States v. O'Brien, 391 U.S. 367 ( 1968); Clark v. Community for Creative Non-Violence, 468 U.S. 288 (1984); Ward v. Rock Against Racism, 491 U.S. 781 (1989).
1
ISSUES
Prof. Junger challenges those provisions of the ITAR, as written and as would be applied to his conduct, that require a license or some other government approval before disclosing cryptographic software or technical data. The following are principal standing and First Amendment issues that plaintiff respectfully suggests ought to be addressed at oral argument:
Standing Issues
I. Prof. Junger has alleged that he cannot disclose at least some cryptographic information (either cryptographic software or technical data) to foreign persons or place some of the information on the internet without a license. Does Prof. Junger have standing to challenge the regulations? Or must he first apply for a license?
First Amendment Issues
II. As a threshold matter, is source code and object code expression or so closely related to expression that is protected by the First Amendment?III. There is no dispute that certain cryptographic software and technical data is subject to licensing under ITAR. Do the licensing requirements amount to a system of unconstitutional prior restraints?
IV. The government has asserted that export controls on cryptographic software and technical data are necessary to protect its ability to gather foreign intelligence. Do the regulations control a substantial amount of protected expression that is unrelated to the government's stated purpose?
V. Notwithstanding that all statutes and regulations are imbued with some ambiguity, are these regulations sufficiently clear to persons of ordinary intelligence?
2
POINTS AND AUTHORITIES SUPPORTING PLAINTIFF'S ARGUMENTS
I. Prof. Junger has Standing to Challenge the Regulations and He is not Required to Apply for a License.
Prof. Junger is teaching "Computers and the Law" this semester. He has given
his students a copy of his encryption program, or more precisely, a
representation of machine code with instructions on how to create a functioning
program. He has also given his students instructions on how to use it to
encrypt and decrypt messages. His program and the instructions are presumably
subject to licensing. See Crowell Decl. ¶ 14; Lowell Decl. ¶
17.
Notwithstanding the exemption for "general scientific, mathematical or
engineering principles" in 22 C.F.R. 120.10(a)(5), Prof. Junger is not sure
if giving foreign students a copy of his program and the instructions constitutes
the "export" of a defense article, technical data or a defense service. See
22 C.F.R. 120.6, 120.9(a), 120.10(a) and 120.17(a). He wants foreign students
to take the class, but does not want to change what or how he teaches, as
others have. See Pl.'s Ex. U, Blaze Decl. ¶ 15. Yet he cannot
let foreign students enroll if it poses a risk to himself or them. Foreign
students would be at risk if, for example, they disclosed course materials
that include cryptographic software to other foreign students or returned
home with the materials in hand. As a consequence, a foreign student from
Thailand was not allowed to enroll in the class. Significantly, the exclusion
of foreign students from the class is supported by the law school administration.
See Pl.'s Ex. S, Katz Decl., and Ex. T, Leatherberry Decl.
Before the beginning of this semester, Prof. Junger set up a World Wide Web
("Web") site (at http://samsara.law.cwru.edu). He has posted course
materials and other information for his students and anyone else who might
be interested. But he has refrained from posting cryptographic software and
technical data.
Prof. Junger has legitimately refrained, and continues to retrain, from conduct protected by the First Amendment that the government admits might be subject to licensing. See Lowell
3
Decl. ¶ 17. Thus, Prof. Junger has satisfied the constitutional injury requirement.
He has also satisfied the ripeness requirement. He may challenge the regulations facially without having to apply for a license.4 City of Lakewood v. Plain Dealer Publishing Co., 486 U.S. 750, 755-56 (citing Freedman v. Maryland, 380 U.S. 51 , 56 ( 1965)). Moreover, since he challenges the regulations on First Amendment overbreadth grounds, he has standing to raise the rights of third parties not before the Court. See, e.g., Airport Comm'rs v. Jews for Jesus. Inc., 482 U.S.569,574(1987).
II. Source Code and Object Code are Protected by the First Amendment.
There is no dispute that technical data other than what is ordinarily thought of as software, source code and object (machine) code, is protected expression. The threshold question then is whether source code and object code are also protected under the First Amendment. In Bernstein v. Dept. of State, Judge Patel held that source code and object code were speech because they share the expressive characteristics of natural languages and were protected as literary works by copyright law. 922 F.Supp 1426, 1434-36 (N.D. Calif. 1996).
In addition to the reasons given by Judge Patel, code that actually encrypts
deserves First Amendment protection apart from its own expressive content.
Code that actually encrypts can be used to keep other communication secret
and confidential. To the extent that source code and object code have a function,
that function is to protect the secrecy and confidentiality of other
communication. For this reason alone, cryptographic computer code deserves
First Amendment protection. As a means of protecting confidentiality and
furthering other communication. cryptographic code is no different than the
newsracks at issue in Lakewood or the ink and paper at issue in Minneapolis
Star & Tribune Co. v. Comm. of Revenue, 460 U.S. 575 ( 1983).
_________________________
4 As a practical matter, it is not clear how he could petition for a license every time he wants to disclose cryptographic software and technical data in class or on his Web site.
4
III. ITAR's Licensing Scheme is a Classic Prior Restraint.
Any requirement that a person must first seek a license or other government
approval before publishing or disclosing protected expression is a classic
prior restraint. Near v. Minnesota, 283 U.S. 697 (1931).
In the present case. there is no dispute that certain cryptographic software
and technical data is subject to licensing under ITAR. See Defs.' First Br.
at 17; Lowell Decl. ¶¶ 17, 20. Before Prof. Junger (or anyone else)
discloses certain cryptographic software or technical data to foreign persons
or on the internet, he must submit the information to review. In most instances,
he cannot be sure if a particular disclosure is subject to licensing so he
would be forced to file a commodity jurisdiction request. In those instances
where he is reasonably sure, he would have to register, for a fee, and apply
for one of the specific licenses described in Parts 123-25. In either case,
he would have to petition the government or risk violating the law. Thus,
there is no question that ITAR s controls on cryptography amount to a licensing
scheme.
Any licensing scheme--whether content-based or content-neutral--must provide
at least definite and reasonable time restraints within which the licensor
must decide whether to issue a license and expeditious judicial review if
the license is denied. FW/PBS. Inc. v. City of Dallas, 493 U.S. at
215, 227-29. If the licensing scheme is also content-based or vests excessive
discretion in the licensor, then the regulations are presumptively invalid,
and the government has the additional burden of going to court and proving
its case. Id. In this case, the government would have to do more than
assert general national security concerns. The government would have to establish
that a particular disclosure would cause "direct, immediate, and irreparable
harm." New York Times Co. v. United States, 403 U.S. 713, 730 (Stewart,
J., concurring).
The plaintiff has argued that these regulations are content-based and vest
excessive discretion in administrative officials. Pl.'s First Br. at 14,
19-23; Pl.'s Second Br. (Corrected) at
5
22-28. This Court, however, does not need to reach those issues because ITAR does not set any reasonable time limits and does not provide expeditious judicial review.5 Outside of constitutional challenges, 2778(h) of the Arms Export Control Act ("AECA") bars judicial review of agency decisions. Karn v. U.S. Dept. of State, 925 U.S. 1, 7-9 (D.D.C. 1996)(appeal docketed).
The government argues that the restrictions, at least on cryptographic software, are properly analyzed as content-neutral regulations under intermediate scrutiny. But this ignores the Supreme Court's rulings in Lakewood and FW/PBS and the fact that ITAR is a licensing scheme. Following Lakewood and FW/PBS, the proper inquiry regarding content in a licensing case is not whether intermediate or strict scrutiny applies, but whether two or all three of the Freedman safeguards are required. Since the regulations fail to provide any of the three Freedman safeguards, they are unconstitutional.
III. The Regulations are Substantially Overbroad Because They Reach Protected Expression that is Unrelated to the Government's Interest.
Assuming that there is a clear distinction between cryptographic software and technical data and that the decision in United States v. Edler Industries, 579 F.2d 516 (9th Cir. 1978), cured any overbreadth problems with the regulation of technical data, there is still substantial overbreadth in the ITAR.6 The exemptions that are presumably available for technical data do not apply to whatever is labeled "cryptographic software." See Lowell Decl. at 9 n.3.
Thus, the regulations apply to software that a person wants to place in the public domain.
_______________________
5 The lack of reasonable and specific time restraints has adversely effected three of the declarants. See Pl. s Ex. K, Bernstein Decl. ¶¶ 17-41; Pl.'s Ex. O. Johnson Decl. ¶¶ 26-31; Pl.'s Ex. M. Miller Decl. ¶¶ 26-44.6 As noted, this assumption was rejected by the Justice Department' s Office of Legal Counsel in 1984, seven years after Edler, in a memorandum reviewing a proposed draft of the ITAR substantially similar to the present version., See Pl.'s Ex E, OLC Memorandum dated July 5, 1984.
6
There is no satisfactory reason why controls on cryptographic software that is already available on the internet at overseas sites or has nothing to do with military applications threatens the national security interests of the United States. Granted that the export overseas of some cryptographic software would pose a threat to national security, the case cannot be made for the broad controls under ITAR.
IV. The Regulations are Impermissibly Vague such that They Do Not Provide Persons of Ordinary Intelligence Adequate Notice of the Law.
The undue discretion vested in the officials that administer the ITAR is inherent in the way the regulations have been drafted. The plaintiff has argued that vagueness problems are caused by the lack of clarity in the definitions of "software," "export," "general principles" and "public domain" themselves and the circularity of the definitions of "defense article.'' 'technical data" and 'defense service." Pl.'s First Br. at 17-23; Pl.'S Second Br. at 8-13, 32-35. Taken as a whole, the regulations are a circular maze and allow government officials to make distinctions based on the medium of the information, e.g., regulation of the disk but not the book APPLIED CRYPTOGRAPHY, and the manner of disclosure, e.g., regulation of the domestic postings to the internet, that appear nowhere in the regulations.
The regulations must be understandable to persons "of common intelligence." Connally v. General Construction Co., 269 U.S. 385. 391 ( 1926). This is not the case here. As part of its findings, the National Research Council noted the uncertainty regarding the definitions in the ITAR, in particular, the definitions of "export" and "technical data." See Pl.'s Ex. B2. NRC Report at 4-16, 4-30-31.
7
The circularity of the categorical terms, "defense article," "technical data" and "defense service," are not just confusing in their own right. They determine the scope of the other provisions, in particular, the public domain exemption:
What about technical data related to cryptography? Even if cryptographic software requires a license . . ., isn't cryptographic technical data exempt from controls if it is "information in the public domain?" This Argument suffers from two flaws. First, technical data related to cryptography is covered by Category XIII(k). Thus, exports of cryptographic technical data require a license under Part 123 [license requirements for unclassified defense articles]. In effect, Category XIII(k) trumps Section 125.1(a)[license requirements for technical data].Second, even if software were considered information for purposes of Section 125.1(a), Part 124, which controls exports of defense services. recaptures any technical data that might escape control by virtue of the public domain exemption. . . .
. . . Does this mean the [public domain] exemption is entirely empty? No. Presumably, the exemption still applies to general scientific, mathematical, or engineering principles and basic marketing information. But even these types of information are exempt only to the extent that they do not cross over into Category XIII(b) defense articles [i.e.. cryptographic software] or Category XIII(k) related technical data or defense services.
Ira. S. Rubenstein, Export Controls on Encryption Software in COPING WITH U.S. EXPORT CONTROLS, PLI Commercial Law Series No. A-705 at 14-15 (1994) (second emphasis added).
Thus, the regulations are not sufficiently clear to meet the requirements of the First Amendment.
Respectfully submitted,
[Signature]
GINO J. SCARSELLI (0062327)
664 Allison Dr.
Richmond Hts., OH 44143-2904
(216)291-8601
RAYMOND VASVARI (0055538)
1300 Bank One Center
600 Superior Ave. East
Cleveland,OH 44114-2650
(216)522-1925
KEVIN FRANCIS O'NEILL (0010481)
Professor of Law
Cleveland-Marshall College of Law
1801 Euclid Ave.
Cleveland, OH 44115
(216)687-2286
8
CERTIFICATE OF SERVICE
The undersigned hereby certifies that a copy of the foregoing was served on November 6, 1996, upon Anthony J. Coppolino, Department of Justice, Civil Division Room 1084, 901 E Street, N.W., Washington, D.C. 20530 by express mail.
Respectfully submitted,
[Signature]
Gino J. Scarselli (0062327)
664 Allison Drive
Richmond Hts., OH 44143
Tel. 216-291-8601
Fax 216-291-8601
Attorney for the Plaintiff