5 September 1997
Source: Hardcopy from Peter Junger


Tab C

Gino J. Scarselli, Esq.
664 Allison Drive
Richmond Hts., Ohio 44143
gscarsel@mail.multiverse.com
Tel.Fax 216-291-8601

June 12, 1997

Tom Barbour, Esq.
Office of General Counsel
Department of commerce
Bureau of Export Administration
13th & Constitution Ave., NW Room 3839
Washington DC 20230

re: Classification Requests, Junger v. Albright, Case No. 96 CV 1723 (N.D. Ohio)

Dear Mr. Barbour:

1 spoke with Mr. Anthony Coppolino last Friday, and he recommended that I send you our classification requests.

Enclosed are three separate applications for classification requests under § 748.3 of the Export Administration Regulations. Attached to each application are an explanatory letter and attachments containing additional information on specific items. Please forward all of the enclosed information to the appropriate person(s) at the BXA.

As I believe you know, we are presently in litigation with the Commerce Department over the export controls on encryption software and technology. We submit these applications only in the interest of furthering litigation and reserve all of our rights to challenge the controls, including our right to challenge to any form of prepublication review.

If you have any questions, please feel free to contact me at the above number.

Sincerely,

[Signature]

Gino J. Scarselli
Attorney for Peter Junger

cc: Peter D. Junger
Kevin Francis O'Neill, Esq.
Ray Vasvari, Esq.

Enc.


Gino J. Scarselli, Esq.
664 Allison Drive
Richmond Hts., Ohio 44143
gscarsel@mail.multiverse.com
Tel.Fax 216-291-8601

re: APPLICATION NO. 082060

June 12, 1997

Department of Commerce
Bureau of Export Administration

To whomever it may concern:

This letter will serve as additional information for the classification requests in Application No. Z 082060.

My client, Professor Peter D. Junger, is currently in litigation with the Commerce Department over the export controls on encryption under the Export Administration Regulations (EAR). In the interest of furthering the litigation, we seek classification requests under §748.3 of the EAR for the following encryption programs:

1. PGP (versions 2.6.3i and 2.6.3)

2. fiddle in C

3. Twiddle in 8086 Assembly Language

4. A version of the RSA algorithm implemented in Perl

5. A version of the RC4 algorithm implemented in C

We submit these requests to confirm that the above items are subject to the EAR as "Encryption software'' classified under ECCN 5D002, 15 C.F.R. Part 774.

We seek a classification for each item in "electronic form or media" as described in the Notes to paragraphs (b)(2) and (b)(3) following § 734.3 of the EAR. We have included, along with this application, a DOS-formatted disk containing items (2), (4) and (5) and printed copies of items (2) - (5) in case you cannot read the disk.

What follows is additional information on the items.

Item 1

Item I consists of the Pretty Good Privacy (PGP) source code (version 2.6.3i) and a compiled version for Windows (denoted as version 2.6.3).

A compressed file of the source code can be downloaded from

<ftp://ftp.ifi.uio.no/pub/pgp/src/pgp263is.zip>.

A compressed file of the compiled source code for Windows can be download~ed from

<ftp://ftp.ifi.uio.no/pub/pgp/pe/msdos/pgp263a.zip>.


Note on Box 22(i) "Manufacturer" (Author): The original PGP ver. 1.0 was written by Phil Zimmermann. PGP 2.6.3i was put together by Stale Schumacher <stale@hypnotech.com> and others. All questions regarding PGP 2.6.3i should be addressed to <pgp-bugs@ifi.uio.no>. The Windows compiled version, PGP 2.6.3, was compiled by Preston Wilson.

Item 2

Item 2 consists of the "fiddle" program written by Peter Junger in C. A printed copy of the source code for fiddle.c (version 0.1 ) and the source code for the RC2 and RC4 routines that will be implemented in the final version of the program is found in Attachment A. A copy in electronic form is on the diskette marked "082060" file name "fiddle.c."

Item 3

Item 3 consists of the "twiddle" program written hy Peter Junger in MASM 8086 Assembly Language for the DOS operating system. A printed copy of the source code is found in Attachment B.

Item 4

Item 4 consists of an encryption program in Perl implementing the RSA algorithm. A printed copy of the Perl code is found in Attachment C. A copy in electronic form is on the diskette marked "082060'' file name "RSA."

Further information about this encryption program and the instructions for using may be obtained from <http://www.dcs.ex.ac.uk/~aba/rsa/>.

Note on Box 22(i) "Manufacturer" (Author): The RSA algorithm was designed by Ron Rivest, Adi Shamir and Leonard Adleman. This RSA perl program was written by Adam Back <aba@dcs.ex.ac.uk>.

Item 5

Item 5 consists of an encryption program in C implementing the RC4 algorithm. A printed copy of the code is found in Attachment D. The program and related files in electronic form is on the diskette marked "082060" directory name "rc4.tar."

Note on Box 22(i) 'Manufacturer'' (Author): The RC4 algorithm was designed by Ron Rivest for RSA Data Security, Inc. We are not sure who wrote this RC4 C program.

Since we are not seeking an Advisory Opinion, as defined in 15 C.F.R. § 748.3, with respect to any of the listed items, the EAR requires a response within fourteen (14) days from the

- 2 -


date the application is received. 15 C.F.R. § 750.2. If you have any questions, please contact me at 216-291-8601.

Sincerely,

[Signature]

Gino J. Scarselli
Attorney for Peter Junger

cc: Professor Peter D. Junger
Kevin Francis O'Neill, Esq.
Ray Vasvari, Esq.

Attachments


[Two-page form]
FORM BXA-748P

MULTIPURPOSE APPLICATION

APPLICATION CONTROL NUMBER
This is NOT and export license number
Z 082060

1. CONTACT PERSON Gino J. Scarselli

2. TELEPHONE 216-291-8601

3. FACSIMILE 216-291-8601

4. DATE OF APPLICATION 6/10/97

5. TYPE OF APPLICATION Classification Request

6. DOCUMENTS SUBMITTED WITH APPLICATION BXA-748P-A; Tech Specs;
                                        Letter of Application

[Snip blanks 7. to 13.]

14. APPLICANT Gino J. Scarselli
              664 Allison Drive
              Richmond Hts.
              OH USA 44143
              SS: XXX-XX-XXXX

[Snip blanks 15. to 21.]

---------------------------------------------------------------------
22.(a) ECCN 5D002

[Snip blanks 22.(b) to 22.(h)]

22.(i) MANUFACTURER see letter

22.(j) TECHNICAL DESCRIPTION The source code and a compiled versions
                             (for windows) of the encryption program
                             "Pretty Good Privacy" (PGP)
---------------------------------------------------------------------
[Snip blank 23.]

24. ADDITIONAL INFORMATION See accompanying letter

[Snip illegible certification statement]

25. SIGNATURE [Signature]
    NAME OF SIGNER Gino J. Scarselli
    TITLE OF SIGNER Attorney for Peter Junger

[Snip illegible notice]


[Form continued] ITEM APPENDIX APPLICATION CONTROL NUMBER Z 082060 --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(i) MANUFACTURER Peter Junger 22.(j) TECHNICAL DESCRIPTION The source code (in C) of the "Fiddle" encryption program. See accompanying letter and Attachment A. See also diskette "082060" /file "fiddle.c" --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(i) MANUFACTURER see letter 22.(j) TECHNICAL DESCRIPTION The source code (in 8086 Assembly Language) of the "Twiddle" encryption program. See accompanying letter and Attachment B. --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(i) MANUFACTURER see letter 22.(j) TECHNICAL DESCRIPTION An encryption program in perl implementing the RSA algorithm. See accompanying letter and Attachment C. See also diskette "082060" /file "rsa" --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(i) MANUFACTURER see letter 22.(j) TECHNICAL DESCRIPTION An encryption program in C implementing the RC4 algorithm. See accompanying letter and Attachment D. See also diskette "082060" /directory "rc4.tar" --------------------------------------------------------------------- [Snip blank balance]


ATTACHMENT A
APPLICATION NO. 082060

[None provided]


ATTACHMENT B
APPLICATION NO. 082060

[Three-page excerpt of Computers and the Law]

1.1.3.2.2 Here Is the Source Code. Here is the source code for my little encryption program. It is written in 8086 assembly language and is intended to be assembled with the MASM assembler.

name TWID
page 55,132
title TWID

[Balance of 3-page TWID code omitted; see http://jya.com/pdj003b.htm]


[No Attachments C and D or diskettes provided]



Gino J. Scarselli, Esq.
664 Allison Drive
Richmond Hts., Ohio 44143
gscarsel@mail.multiverse.com
Tel.Fax 216-291-8601

re: APPLICATION NO. 082061

June 12, 1997

Department of Commerce
Bureau of Export Administration

To whomever it may concern:

This letter will serve as additional information for the classification requests in Application No. Z 082061.

My client, Professor Peter D. Junger, is currently in litigation with the Commerce Department over the export controls on encryption under the Export Administration Regulations (EAR). In the interest of furthering the litigation, we seek classification requests under §748.3 of the EAR for the following items:

1. Instructions for creating TWI.COM

2. Chapter One of Computers and the Law

3. An html page containing hyperlinks to encryption programs overseas

We submit these requests in an effort to determine whether the above items are subject to the Export Administration Regulations (EAR) as "Encryption software" classified under ECCN 5D002 or "Encryption technology" classified under ECCN 5E002. 15 C.F.R. Part 774.

We seek a classification for each item in "electronic forrn or media" as described in the Notes to paragraphs (b)(2) and (b)(3) following § 734.3 of the EAR. We have included a DOS- formatted disk, along with this application, containing item (3) and printed copies of all of the items

What follows is additional information on the items.

Item I

Item I consists of the instructions for creating an executable version of an encryption program using a one-time pad that was written by Peter Junger and that runs on MSDOS machines. These instructions in turn include a hexadecimal representation of the executable code. A printed copy of these instructions is found in Attachment A to this letter.

Item 2

Item 2 consists of part of Chapter One of the casebook written by Professor Junger for his class in Computers and the Law last year. A printed copy of the chapter is found in Attachment B.

- 1 -


It is our position that encryption software embodied in longer texts is not covered under the EAR .

Item 3

Item 3 consists of a page of hypertext written in HTML containing direct links to numerous encryption programs that can be downloaded from sites outside of the United States. Professor Junger wishes to add this page of links, with additional items. to the other pages that are available on his web server at <http://samsara.law.cwru.edu/links/>.

A printed copy of the html page is found in Attachment D to this letter. The html version is included on the diskette marked "082061" file name"cryptolinks.html."

It is our position that links themselves are not covered under the EAR.

Since we are not seeking an Advisory Opinion, as defined in 15 C.F.R. § 748.3, with respect to any of the listed items, the EAR requires a response within fourteen (14) days from the date the application is received. 15 C.F.R. § 750.2. If you have any questions, please contact me at 216-291-8601.

Sincerely,

[Signature]

Gino J. Scarselli
Attorney for Peter Junger

cc: Professor Peter D. Junger
Kevin Francis O'Neill, Esq.
Ray Vasvari, Esq.

Attachments


ATTACHMENT A
APPLICATION NO. 082061

Instructions for TWI.COM

Here are the instructions on how to create the TWI.COM program

     Creating TWI.COM

[CAUTION It apparently would be a violation of the International 
Traffic in Arms Regulations to export or transmit this document 
outside the United States or to disclose its contents to a foreign 
person without first obtaining permission from the Office of Defense 
Trade Controls in the United States Department Or State.]

Here are the instructions on how create TWI.COM, a 111 byte version of 
the TWID one-time-pad encryption program. (The 109 byte version that 
I had planned to use wouldn't run under current versions of DOS until 
I added at the end a pair of bytes each containing a binary 
zero--which is also, of course, a hexidecimal and a decimal zero. I
don't know if both of those bytes were needed, or just one of them, 
but I remembered that I had deleted those two bytes in the process of
of getting TWI.COM down to 109 bytes.  That worked under DOS 3.3. but it
does not seem to work under current versions.)

TWI.COM will only run on MSDOS machines.

These instructions explain how to load a version of TWI.COM into
memory and how to save it on a floppy disk, using the MSDOS DEBUG 
program. What you will be doing is typing in the hexidecimal version
of the machine code of TWI.COM--a process that you will undoubtedly
find slow and painful.  But it isn't that slow and painful.  Actually
entering the machine code--even if it is in a hexidecimal rather than
a binary representation--is reminiscent of the way one programmed
early computers that did not have assemblers or compilers or operating
systems and all the other programs that now reside between the
computer's hardware and the programmer, early machines like the Altair
and IMSAI computers that one programmed by actually flipping a switch
to load each bit into the machine.  Now that was slow and painful.

But the TWI program actually relies on the MSDOS operating system, of


which the DEBUG program is a small part, to open and close the file containing the key--the file that is named 'S'--and to redirect standard input to the plaintext file and standard output to the file that contains the encrypted message It would be a much more difficult job to load in a program like TWI.COM, and get it to work, if the MSDOS operating system were not already loaded on the machine. TWI.COM only contains 111 bytes; without having the MSDOS operating system to do all the work the code would have to occupy several thousand more bytes. So loading TWI.COM with DEBUG is much easier than loading a similar program into an Altair box without an operating system. The DEBUG program was not designed to be used to load a new program like TWI.COM into memory. As its name suggests, its intended use is the examination and modification of existing programs, not the creation of new ones. One can use DEBUG to load a new program into memory, but there is no way to save it--that I know of, but I am not an expert on DEBUG--unless one has loaded it in as a modification of some pre-existing file of the same length. So I have prepared a file named TWI.XXX that is exactly 111 bytes long that you can use with DEBUG to create the actual TWI.COM file. TWI.XXX can be downloaded from the samsara web server. The URL is http://samsara/comp_law/twi.xxx When you examine it with a web browser or an editor or using the MSDOS TYPE command, the contents of TWI.XXX look like this: aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaa aaaaaaaaa TWI.XXX contains ten lines consisting of eight representations of the 2 [Balance of 8-page TWI.COM instructions omitted]

ATTACHMENT B
APPLICATION NO. 082061

Computers and the Law

Peter D. Junger

Fall, 19961

1 This still very tentative edition is being assembled as the course is being taught, so the work is a product, not only of the author, but of the students who took the course in Computers and the Law at CWRU Law School in 1993 through 1995 and those who are now taking it in 1996.

[Balance of 28-page textbook excerpt omitted; see partial version: http://jya.com/pdj003b.htm]


ATTACHMENT C
APPLICATION NO. 082061

Links to Cryptographic Software

[11 pages of cryptographic URLs]


[Two-page form]
FORM BXA-748P

MULTIPURPOSE APPLICATION

APPLICATION CONTROL NUMBER
This is NOT and export license number
Z 082061

1. CONTACT PERSON Gino J. Scarselli

2. TELEPHONE 216-291-8601

3. FACSIMILE 216-291-6801 [sic]

4. DATE OF APPLICATION 6/10/97

5. TYPE OF APPLICATION Classification Request

6. DOCUMENTS SUBMITTED WITH APPLICATION BXA-748P-A; Tech Specs;
                                        Letter of Application

[Snip blanks 7. to 13.]

14. APPLICANT Gino J. Scarselli
              664 Allison Drive
              Richmond Hts.
              OH USA 44143
              SS: XXX-XX-XXXX

[Snip blanks 15. to 21.]

---------------------------------------------------------------------
22.(a) ECCN 5D002 and/or 5E002

[Snip blanks 22.(b) to 22.(h)]

22.(i) MANUFACTURER Peter Junger

22.(j) TECHNICAL DESCRIPTION Instructions for creating the executable 
                             encryption program TWI.COM
---------------------------------------------------------------------
[Snip blank 23.]

24. ADDITIONAL INFORMATION See accompanying letter and Attachment A

[Snip illegible certification statement]

25. SIGNATURE [Signature]
    NAME OF SIGNER Gino J. Scarselli
    TITLE OF SIGNER Attorney for Peter Junger

[Snip illegible notice]


[Form continued] ITEM APPENDIX APPLICATION CONTROL NUMBER Z 082061 --------------------------------------------------------------------- 22.(a) ECCN 5D002 not covered see letter 22.(i) MANUFACTURER Peter Junger 22.(j) TECHNICAL DESCRIPTION Chapter One of the Computers and the Law text book. See accompanying letter and Attachment B. --------------------------------------------------------------------- 22.(a) ECCN 5D002 not covered see letter 22.(i) MANUFACTURER Peter Junger 22.(j) TECHNICAL DESCRIPTION An html page containing hyperlinks to encryption programs overseas. See accompanying letter and Attachment C. --------------------------------------------------------------------- [Snip blank balance]


Gino J. Scarselli, Esq.
664 Allison Drive
Richmond Hts., Ohio 44143
gscarsel@mail.multiverse.com
Tel/Fax 216 291-8601

APPLICATION NO. 082062

June 12, 1997

Department of Commerce
Bureau of Export Administration

To whomever it may concern:

This letter will serve as additional information for the classification requests in Application No. Z082062.

My client, Professor Peter D. Junger, is currently in litigation with the Commerce Department over the export controls on encryption under the Export Administration Regulations (EAR). In the interest of furthering the litigation, we seek classification requests under § 748.3 of the EAR for the following encryption programs:

1. Encryption programs that perform the XOR operation on each byte of a file with a key consisting of a single byte

2. Programs that XOR the contents of a file with the contents of a one-time pad

3. Programs that implement the ROT13 algorithm

4. Programs that implement the RC2 algorithm

5. Programs that implement the RSA algorithm

In this set of requests, we seek rulings with respect to each program that implements one of the specified operations or algorithms and that does not fall under the exceptions to ECCN 5A002 or 5D002 of Part 774 of the EAR. It is our position that any program that implements one of the specified operations or algorithms can be used, in executable form, to maintain the secrecy or confidentiality of information and therefore is classified as encryption software under ECCN 5D002, 15 C.F.R. Part 774.

A classification is sought for the programs in electronic form or media as described in the Notes to paragraphs (b)(2) and (b)(3) following § 734.3. Samples of particular programs are included or referred to in this letter, but those programs are only intended to serve as examples.

What follows is additional information on the items.

Item 1

Item 1 consists of any encryption program that can be used to maintain secrecy or confidentiality by XORing each byte of a source file with a key consisting of a single byte. An example of such a program, written in C, is:

-------begin sample program for item 1------------------ 

#include "stdio.h" 
#include "stdlib.h" 

- 1 -

[No other pages provided]


[Two-page form]
FORM BXA-748P

MULTIPURPOSE APPLICATION

APPLICATION CONTROL NUMBER
This is NOT and export license number
Z 082062

1. CONTACT PERSON Gino J. Scarselli

2. TELEPHONE 216-291-8601

3. FACSIMILE 216-291-8601

4. DATE OF APPLICATION 6/10/97

5. TYPE OF APPLICATION Classification Request

6. DOCUMENTS SUBMITTED WITH APPLICATION BXA-748P-A; Tech Specs;
                                        Letter of Application

[Snip blanks 7. to 13.]

14. APPLICANT Gino J. Scarselli
              664 Allison Drive
              Richmond Hts.
              OH USA 44143
              SS: XXX-XX-XXXX

[Snip blanks 15. to 21.]

---------------------------------------------------------------------
22.(a) ECCN 5D002

[Snip blanks 22.(b) to 22.(i)]

22.(j) TECHNICAL DESCRIPTION Encryption programs that perform the XOR
                             operation on each byte of a file with a
                             key consisting of a single byte

---------------------------------------------------------------------
[Snip blank 23.]

24. ADDITIONAL INFORMATION See accompanying letter

[Snip illegible certification statement]

25. SIGNATURE [Signature]
    NAME OF SIGNER Gino J. Scarselli
    TITLE OF SIGNER Attorney for Peter Junger

[Snip illegible notice]


[Form continued] ITEM APPENDIX APPLICATION CONTROL NUMBER Z 082062 --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(j) TECHNICAL DESCRIPTION Encryption programs that XOR the contents of a file with the contents of a one-time pad. See accompanying letter. --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(j) TECHNICAL DESCRIPTION Encryption programs that implement the ROT13 algorithm. See accompanying letter. --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(j) TECHNICAL DESCRIPTION Encryption programs that implement the RC2 algorithm. See accompanying letter. --------------------------------------------------------------------- 22.(a) ECCN 5D002 22.(j) TECHNICAL DESCRIPTION Encryption programs that implement the RSA algorithm. See accompanying letter. --------------------------------------------------------------------- [Snip blank balance]