5 September 1997
Source: Hardcopy from Peter Junger
Tab B
GINO J. SCARSELLI
Attorney at Law
Tel/Fax 216-291-8601
January 2, 1997 VIA FACSIMILE AND MAIL Anthony Coppolino, Esq. Department of Justice Civil Division, room 1084 901 E Street, N.W. Washington, D.C. 20530 re: Junger v. Christopher, Case No. 96 CV 1723 (N.D. Ohio) Dear Mr. Coppolino: In light of the new Commerce regulations effective Monday, December 30, 1996, and to narrow the issues before the Court, the plaintiff is seeking clarification from the government. As stated in the complaint and in the plaintiff's declaration, Prof. Junger wants to allow foreign students in his Computers and Law class, wants to exchange cryptographic information with foreign col- leagues, wants to publish articles and his course materials, and wants to post cryptographic information on his web site. The information includes the source codes and machine code representations of his one- time pad and other encryption programs, as well as the underlying algorithms and information on how to use, and where to obtain, encryp- tion programs. As we read the new regulations, some of what Prof. Junger seeks may now be permitted. Section 744.9, "Restrictions on technical assistance by U.S. persons with respect to encryption items," of the new regulations provides an exemption for academic teaching and discussions of cryp- tography. Thus, it appears that in class disclosure of encryption software and technology to foreign students is permitted. Even if there are no restrictions placed on classroom disclosure under the new regulations, we are concerned that there are other restrictions that limit the First Amendment rights of Prof. Junger and others. Notwithstanding § 744.9, the sections exempting publicly avail- able or educational technology and software from the EAR do not apply to encryption software controlled under ECCN 5D002. See 22 C.F.R. §§ 734.3(b)(3), 734.7 and 734.9. However, in the note following § 734.3, printed material that contains encryption source code is not subject to the EAR:
664 Allison Drive Richmond Heights Ohio 11143-2904 USA email: gscarsel@mail.multiverse.com
[2] Note to paragraphs (b)(2) and (b)(3) of this section: A printed book or other printed materi- al setting forth encryption source code is not itself subject to the EAR (see Sec. 734.3(D)(2)). However, notwithstanding Sec. 734.3(b)(2), encryption source code in electronic form or media (e.g., computer diskette or CD ROM) remains subject to the EAR (see 734.3(b)(3)). Apparently, encryption software is not subject to the EAR if it's in printed form, but is subject to the EAR in electronic form. Thus, as we read the regulations, Prof. Junger is prohibited from posting encryption software on his World Wide Web site without a license (subject to the conditions in § 734.2(b)(9)(ii)) ever. if what he posts is an article that contains encryption source code or representations of machine code. Furthermore, it is unclear whether material that contains encryp- tion code if subject to the EAR is treated strictly as encryption software under ECCN 5D002 or may also be treated as technology under ECCN 5E002. In light of the above, we seek the following clarifications from your clients: 1. Is Prof. Junger permitted to disclose in the classroom encryption software and encryption technology to foreign students? Are there any restrictions or, what he may dis- close in class? 2. Are foreign students who take Prof. Junger's class permit- ted to return to their home countries with class materials, which include encryption software or encryption technology? 3. Is Prof. Junger permitted to disclose encryption software or technology to foreign colleagues outside the United States or only within the United States? 4. Do the answers to (2) and (3) depend on whether the materi- al is disclosed in printed form or electronic form (e.g., computer diskette, digital form that can be transferred via the internet) and whether the material is controlled for export as encryption software under ECCN 5D002 or encryp- tion technology under ECCN 5E002? Are encryption source code and object code controlled only as encryption software under ECCN 5D002? 5. Are articles and books, including law review articles, that contain encryption software subject to the EAR if electroni- cally published (e.g., through LEXIS, WESTLAW, file trans- fer protocols, World Wide Web sites)? 6. Are there any restrictions on posting cryptographic informa- tion, other than encryption source code, on a Web site? For example, are there any restrictions on displaying [3] hyperlinks to sites where encryption software can be down- loaded? Since we have a limited time to file findings of facts and conclusions of law, we request responses to our questions before January 9, 1997. It is our intent to file an amended complaint short- ly thereafter. Sincerely, [Signature] Gino J. Scarselli Attorney for the plaintiff cc/ Peter Junger Raymond Vasvari, Esq. Kevin O'Neill, Esq.
UNITED STATES DEPARTMENT OF COMMERCE
Bureau of Export Administration
Washington, D C 20230
January 29, 1997
Gino Scarselli, Esq. 664 Allison Drive Richmond Heights, Ohio 44142-2904 Re: January 2, 1997 Letter on Behalf of Peter D. Junger Dear Mr. Scarselli: Mr. Anthony J. Coppolino of the Department of Justice has forwarded to us a copy of your January 2, 1997 letter to him raising various questions concerning the application of the Export Administration Regulations ("EAR") on encryption software and technology to your client, Prof. Peter D. Junqer. As you may know, on November 15, 1996, President Clinton issued Executive Order 13026 (and a related Presidential memorandum) directing that export licensing controls on certain encryption products, including software, designated under Category XIII(b) of the United States Munitions List ("USML"), 22 C.F.R. Part 121, be transferred to the export licensing jurisdiction of the Department of Commerce under the Commerce Control List ("CCL") and EAR.1 On December 30, 1996, the Departments of Commerce and State published regulations, effective on publication, implementing the President's policy and transferring export licensing jurisdiction over encryption commodities and software (including source code), and related technical data, from the State Department to the Commerce Department. 61 Fed. Reg. 68572 et seq. and 68633 (December 30, 1996). Accordingly, the Department of Commerce is now the licensing authority for the export of most encryption items, including software.2 Please be advised that the EAR establishes administrative procedures by which the public can obtain advice on the applicability of the EAR in various cases. Section 748.3 of the EAR establishes the administrative procedures for obtaining a Commodity Classification or an Advisory Opinion as to the ____________________ 1 61 Fed. Reg. 12714 et seq. (March 25, 1996), as amended by the interim rule at 61 Fed. Reg. 68572 et seq. (December 30, 1996) (to be codified at 15 C.F.R. Part 730, et seq.). 2 The Department of State retains licensing jurisdiction over military cryptographic items and software. See 61 Fed. Reg. at 68633 (amending 22 C.F.R. § 121.1, Category XIII(b)). 2 application of the EAR to the export of items or other activities. See 61 Fed. Reg. 12812-13 (March 25, 1996) (to be codified at 15 C.F.R. § 748.3). Because you have not provided BXA with specific information concerning any export activities that Prof. Junger seeks to engage in, BXA lacks the necessary information to enable it to respond to the questions raised in your letter. Based on the information in your letter, we are also unable to provide you with either a Commodity Classification determination regarding the possible application of the EAR to any software or other items Prof. Junger may wish to export or, if it is determined that those activities are subject to the EAR, an Advisory Opinion whether a license is required, or likely to be granted. We can, however, provide you with some guidance in response to your letter regarding the scope of the encryption controls administered by the Department of Commerce pursuant to the regulations issued on December 30, 1996. This information will assist you in determining whether the EAR apply to Prof. Junger and, if it does, whether a license is required for any of his export activities. Otherwise, we will be pleased to review either a Classification request or a request for an Advisory Opinion that includes the information set forth in Section 748.3 of the EAR, such as the actual software he may wish to export. By way of background, in carrying out its responsibilities regarding the transfer of certain encryption products from State export licensing controls to Commerce, Commerce imposed national security and foreign policy controls (~EI" for encryption items) on certain information security items and equipment, cryptographic devices, software and components specifically designed or modified therefor, and related technology. See Section 742.15 of the EAR, 61 Fed. Reg. at 68580 (to be codified at 15 C.F.R. § 742.15). In order to export encryption items subject to EI controls, including software, a license application must be submitted to the Commerce Department, which will grant or deny the application based on a case-by-case determination of "whether the export * * * is consistent with U.S. national security and foreign policy interests." Section 742.15(b) of the EAR, 61 Fed. Reg. at 68581 (to be codified at 15 C.F.R. § 742.15(b)); see also Section § 742.15(b)(4)(ii) of the EAR, 61 Fed. Reg. at 68582 (to be codified at 15 C.F.R. § 742.15(b)(4)(ii)).3 ____________________ 3 Encryption software in either source code and "machine" or object code form, is regulated under ECCN 5D002, not ECCN 5E002. ECCN 5E002 concerns encryption technology as defined in Part 772 of the EAR, 61 Fed. Reg. 12925-37, as amended by 61 Fed. Reg. 68585-86 (to be codified at 15 C.F.R. Part 772), not encryption software. See 61 Fed. Reg. at 68586-87. Certain (continued...) (continued...) 3 In order to assist you in reviewing Prof. Junger's circumstances, which, as we understand it, involve teaching a class on computers and the law and, in connection therewith, posting encryption software on the Internet, note that the provisions of the EAR distinguish for export control purposes between encryption software (including source code and "machine" or object code) and encryption technology. The EAR define the export of encryption software subject to EI controls to mean an actual shipment or transfer out of the United States or to a foreign embassy or affiliate of a foreign government in the United States. See Section 734.2(b)(9)(i)(A) and (B) of the EAR, 61 Fed. Reg. 68578 (to be codified at 15 C.F.R. § 734.2(b)(9)(i)(A) and (B)). Accordingly, in response to your inquiries, the distribution of encryption software subject to EI controls to students in a class in the United States, including foreign students, is not an export under the EAR. However, such software would be subject to the provisions of the EAR and could not be exported from the United States by any person, including any foreiqn student who receives such software in the United States, without a license from the Bureau of Export Administration. You also inquired about other non-software information that might be distributed in Prof. Junger's class. Technology subject to the EAR is defined in Part 772 of the EAR (Definitions). 61 Fed. Reg. 12925-37, as amended by 61 Fed. Reg. 68585-86 (to be codified at 15 C.F.R. Part 772). However, information which is released by instruction in catalog courses and associated teaching laboratories of academic institutions is not technology subject to the EAR. See Sections 734.3(b)(3)(iii) and 734.9 of the EAR, 61 Fed. Reg. 12747-49, as amended by 61 Fed. Reg. at 68578-79 (to be codified at 15 C.F.R. § 734.3(b)(3)(iii) and § 734.9). See also Supplement No. 1 to Part 734, Section C: Educational Instruction, 61 Fed. Reg. at 12751 (to be codified at 15 C.F.R. Part 734, Supplement No.1). Accordingly, there are no restrictions under the EAR to the disclosure of educational information distributed to students in a catalog course in the United States.4 With respect to discussions with foreign academic colleagues, Section 744.9 of the EAR provides that no person may, without a ____________________ 3(...continued) "mass-market" encryption software may be released from "EI" controls if it meets certain criteria. See Section 742.15(b)(1) of the EAR, 61 Fed. Reg. at 68581 (to be codified at 15 C.F.R. § 742.15(b)(l)). 4 Note that encryption software is controlled under ECCN 5D002 for EI reasons and may not be exported without a license. Section 734.9 of the EAR, 61 Fed. Reg. at 68579 (to be codified at 15 C.F.R. § 734.9). 4 license from the Bureau of Export Administration, "provide technical assistance (including training) to foreign persons with the intent to aid a foreign person in the development or manufacture outside of the United States of encryption commodities and software that, if of United States origin, would be controlled for EI reasons under ECCN 5A002 and 5D002." Section 744.9 of the EAR, 61 Fed. Reg. 68584-5 (December 30, 1996) (to be codified at 15 C.F.R. § 744.9). However, Section 744.9 provides further that the "mere discussion of information about cryptography, including, for example, in an academic setting, by itself would not establish the intent described in this section, even where foreign persons are present." Id. The purpose of this section is to provide assurance that academics like Prof. Junger would not be prohibited by this section from engaging in mere academic discussions of information about cryptography with foreign colleagues -- inside or outside of the United States.5 You also inquired about the posting of encryption software on the Internet. The EAR define the export of encryption source code and object code software controlled for EI reasons under ECCN 5D002 to include downloading, or causing the download of, such software to locations (including electronic bulletin boards, Internet file transfer protocol, and World Wide Web sites) outside the United States, or making such software available for transfer outside the United States, over a variety of media, unless the person making the software available takes precautions adequate to prevent unauthorized transfer of such code outside the United States. See Section 734.2(b)(9)(ii) of the EAR, 61 Fed. Reg. at 68578 (to be codified at 15 C.F.R. § 734.2(b)(9)(ii)). Thus, under the EAR, electronic transmission of encryption software (including source code and "machine" or object code) subject to EI controls by means of the Internet is an export under the EAR, unless the person making the software available takes precautions adequate to prevent unauthorized transfers outside the United States. See id. Also, in response to your inquiry, a printed book or other printed materials setting forth encryption source code is not itself subject to the EAR. See Note to Section 734.3(b)(2) and (3) of the EAR, 61 Fed. Reg. at 68578 (to be codified at 15 C.F.R. § 734.3(b)(2) and (3).6 You also inquired about whether ____________________ 5 Again, encryption software is controlled under ECCN 5D002 for EI controls and may not be exported without a license. See Section 734.7 and 734.8 of the EAR, 61 Fed. Reg. at 68578-79 (to be codified at 15 C.F.R. §§ 734.7 and 734.8). 6 Please note that the administration continues to review whether and to what extent scannable encryption source or object (continued...) 5 "books or articles" that contain encryption software are subject to the EAR if exported in electronic form. We are unable to respond to your inquiry because you have not adequately described the nature of the material Prof. Junger proposes to export. If encryption software subject to EI controls, in source code or object code form, is transmitted abroad in an electronic form, it would be subject to EAR licensing requirements. See Section 734.2(b)(9)(ii) of the EAR, 61 Fed. Reg. at 68578 (to be codified at 15 C.F.R § 734.2(b)(9)(ii)). However, theoretical information or academic discussions of cryptography--as distinct from encryption programming language that could itself ultimately be executed on a computer to encrypt information--would not fall within the definition of cryptographic software subject to the EAR. See Part 772 of the EAR, 61 Fed. Reg. 12925-37, as amended by 61 Fed. Reg. 68S85-86 (to be codified at 15 C.F.R. Part 772). If you have a question regarding whether a particular item in electronic form that contains encryption software is subject to the EAR, the only way that we would be able to make that determination is if you submit the item for a Commodity Classification or Advisory opinion in accordance with the requirements of Section 748.3 of the EAR. Please contact us if we can be of further assistance to you or if you want to obtain a Commodity Classification or Advisory opinion under Section 748.3 of the EAR. Sincerely, [Signature] James A. Lewis Director Office of Strategic Trade and Foreign Policy Controls _____________________ 6(...continued) code in printed form should be subject to the EAR and reserves the option to impose export controls on such software for national security and foreign policy reasons.