메뉴 건너뛰기




Volumn 32, Issue 1, 1998, Pages

US restrictions on exports of cryptographic equipment and software

Author keywords

[No Author keywords available]

Indexed keywords


EID: 11544276599     PISSN: 10116702     EISSN: None     Source Type: Journal    
DOI: 10.54648/trad1998001     Document Type: Article
Times cited : (1)

References (57)
  • 1
    • 85196214143 scopus 로고    scopus 로고
    • note
    • This article is not, and should not be used as, a substitute for legal advice. The US export control regulations are complex and subject to frequent revisions.
  • 3
    • 11544358729 scopus 로고    scopus 로고
    • The Future of Internet Security
    • February
    • See W.A. Hodkowski, The Future of Internet Security, 13 Computer & High Tech. L.J. 217, 229-31 (February 1997).
    • (1997) Computer & High Tech. L.J. , vol.13 , pp. 217
    • Hodkowski, W.A.1
  • 4
    • 11544255721 scopus 로고    scopus 로고
    • The Dilemma for Future Communication Technologies: How to Constitutionally Dress the Crypto-Genie
    • Winter
    • J. Kerben, The Dilemma for Future Communication Technologies: How to Constitutionally Dress the Crypto-Genie, 5 CommLaw Conspectus 125, 125-26 (Winter 1997).
    • (1997) CommLaw Conspectus , vol.5 , pp. 125
    • Kerben, J.1
  • 5
    • 85196150677 scopus 로고    scopus 로고
    • note
    • As note 2, above, at 63. Thus, for an asymmetric system to be as secure as a symmetric system, the asymmetric system must have a relatively longer key length.
  • 6
    • 85196156767 scopus 로고    scopus 로고
    • note
    • The need for key recovery systems derives from such potential problems as individuals losing or purposely withholding keys to encrypted data.
  • 7
    • 85196170070 scopus 로고    scopus 로고
    • See Statement of Louis J. Freeh, Director of the Federal Bureau of Investigation, Before the Permanent Select Committee on Intelligence of the House of Representatives (available at http://\vww.fbi.gov/congress/ encrypt4/encrypt4.htm).
  • 8
    • 85196146718 scopus 로고    scopus 로고
    • note
    • The establishment of a universal system for the use of "digital signatures" for message authentication is itself considered an important subject of government policy, although the issue has not yet attracted the same level of attention in the United States as it has in Europe. See, for example, European Commission, Communication from the Commission to the European Parliament, Towards a European Framework for Digital Signatures and Encryption: Ensuring Security and Trust in Electronic Communication, COM (97) 503 (1997) (available at http://www.ispo.cec.be/eif/policy).
  • 9
    • 85196183799 scopus 로고    scopus 로고
    • note
    • 22 U.S.C. §§271 et seq. The provisions that specifically authorize the regulation of commercial exports of defence articles and services are contained in 22 U.S.C. § 2778.
  • 10
    • 85196178097 scopus 로고    scopus 로고
    • 22 CFR §§ 120-130
    • 22 CFR §§ 120-130.
  • 11
    • 85196147173 scopus 로고    scopus 로고
    • note
    • 22 CFR § 121. The US Munirions List generally corresponds to the Munitions List of the Wassenaar Arrangement (the successor to the Coordinating Committee on Multilateral Export Controls, which was known as the COCOM).
  • 12
    • 85196151187 scopus 로고    scopus 로고
    • 50 U.S.C. App. §§ 2401 et seq.
    • 50 U.S.C. App. §§ 2401 et seq.
  • 13
    • 85196150284 scopus 로고    scopus 로고
    • 15 CFR §§ 730-774
    • 15 CFR §§ 730-774.
  • 14
    • 85196215611 scopus 로고    scopus 로고
    • note
    • The Export Administration Act actually expired in 1994, and has not yet been renewed because the Congress has been unable to agree on proposed revisions to the law. The President has extended the law by issuing executive orders pursuant to the International Emergency Economic Powers Act (IEEPA), 50 U.S.C §§ 1701 et seq., according to the theory that a lapse in export controls would be a threat to national security. As the "emergency" is the failure of Congress to enact legislation, rather than actions of a hostile foreign nation, there have been questions regarding whether the President's use of the IEEPA in this manner is appropriate. Nonetheless, especially because Congress has repeatedly acquiesced in the President's use of IEEPA to maintain the Export Administration Regulations, the current regulatory regime has withstood the challenge.
  • 15
    • 85196207271 scopus 로고    scopus 로고
    • note
    • The Commerce Control List includes the categories contained in the Wassenaar Arrangement Dual-Use List, plus additional categories that the United States regulates unilaterally.
  • 16
    • 85196168129 scopus 로고    scopus 로고
    • note
    • Licenses are normally issued on a transaction-by-transaction basis. Accordingly, an exporter submits an application for approval to export a specific quantity and value of specified items to one foreign purchaser. Multiple shipments can be made against the license during its validity period (usually two years).
  • 17
    • 85196222070 scopus 로고    scopus 로고
    • 22 CFR § 122
    • 22 CFR § 122.
  • 18
    • 85196208380 scopus 로고    scopus 로고
    • note
    • This procedure effectively establishes a presumption that the products are regulated under the ITAR, unless the State Department decides otherwise.
  • 19
    • 85196141730 scopus 로고    scopus 로고
    • 22 CFR § 124.15
    • 22 CFR § 124.15.
  • 20
    • 85196162193 scopus 로고    scopus 로고
    • 18 November M-1
    • Memorandum of the President on Encryption Export Policy (15 November 1996), reprinted in BNA Daily Rep. Execs., 18 November 1996 at M-1; Executive Order No. 13026 of 15 November 1996, 61 Fed. Reg. 58767 (19 November 1996).
    • (1996) BNA Daily Rep. Execs.
  • 21
    • 85196212955 scopus 로고    scopus 로고
    • note
    • The Export Administration Regulations contain a procedure by which exporters can request that the Commerce Department evaluate the foreign availability of products subject to licensing requirements. 15 CFR § 730, Supp. No. 2. The Executive Order exempted cryptographic products from this procedure.
  • 22
    • 85196201123 scopus 로고    scopus 로고
    • As note 20, above
    • As note 20, above.
  • 23
    • 85196208276 scopus 로고    scopus 로고
    • 61 Fed. Reg. 68, 572 (30 December 1996)
    • 61 Fed. Reg. 68, 572 (30 December 1996).
  • 24
    • 85196171450 scopus 로고    scopus 로고
    • 15 CFR § 774, Supp. No. 1, ECCNS 5A002 and 5D002
    • 15 CFR § 774, Supp. No. 1, ECCNS 5A002 and 5D002.
  • 25
    • 85196177644 scopus 로고    scopus 로고
    • Those countries are Cuba, Iran, Iraq, Libya, North Korea, Syria and Sudan. See 15 CFR §§ 742.8, 742.9, 742.10 and 746. Even if a cryptographic product is not otherwise controlled or qualifies for export to other countries under a License Exception, exports and re-export to these countries are regulated in most cases
    • Those countries are Cuba, Iran, Iraq, Libya, North Korea, Syria and Sudan. See 15 CFR §§ 742.8, 742.9, 742.10 and 746. Even if a cryptographic product is not otherwise controlled or qualifies for export to other countries under a License Exception, exports and re-export to these countries are regulated in most cases.
  • 26
    • 85196155945 scopus 로고    scopus 로고
    • 15 CFR § 740.13(d)(3)
    • 15 CFR § 740.13(d)(3).
  • 27
    • 85196208401 scopus 로고    scopus 로고
    • 15 CFR § 742, Supp. No. 6
    • 15 CFR § 742, Supp. No. 6.
  • 28
    • 85196152689 scopus 로고    scopus 로고
    • note
    • DES is the Data Encryption Standard, a symmetrical cryptographic algorithm that was published as a US government standard in 1977. As note 2, above, at 417-18.
  • 29
    • 85196193230 scopus 로고    scopus 로고
    • 15 CFR § 742.15(b)(3)
    • 15 CFR § 742.15(b)(3).
  • 30
    • 85196145207 scopus 로고    scopus 로고
    • note
    • As of November 1996, at least 37 companies had submitted key recovery development and marketing plans to the Commerce Department.
  • 31
    • 85196152522 scopus 로고    scopus 로고
    • 15 CFR § 742, Supp. Nos. 4, 5 and 7
    • 15 CFR § 742, Supp. Nos. 4, 5 and 7.
  • 32
    • 85196217444 scopus 로고    scopus 로고
    • 15 CFR § 742.15(b)(4)
    • 15 CFR § 742.15(b)(4).
  • 33
    • 85196188673 scopus 로고    scopus 로고
    • The Commerce Department has proposed, but has not yet implemented, the creation of another category of license exception for cryptographic software dedicated for use in financial transactions. After a one-time review, such software could be exported without restriction regardless of its encryption strength. Commerce Department Press Release, 8 May 1997 (available at http://www.bxa.doc.gov/banks2.htm).
  • 35
    • 85196200911 scopus 로고    scopus 로고
    • Denver Post, 12 January
    • S. Liebs, The Secret Sharer - Why Powerful Encryption Software Has Made Phil Zimmerman an Enemy of the State, Netguide (1 May 1995) at 65; U.S. Drops Probe Boulder Code King Escapes Prosecution, Denver Post, 12 January 1996, at E-01.
    • (1996) U.S. Drops Probe Boulder Code King Escapes Prosecution
  • 36
    • 85196158314 scopus 로고    scopus 로고
    • 925 F. Supp. 1 (D.D.c. 1996)
    • 925 F. Supp. 1 (D.D.c. 1996).
  • 37
    • 85196192984 scopus 로고    scopus 로고
    • note
    • The ITAR do not apply to "information" that is in the "public domain". 22 CFR § 125.1. "Public domain" means "information which is published and which is generally accessible or available to the public". 22 CFR § 120.11. Books are usually considered information that is in the public domain.
  • 38
    • 85196219381 scopus 로고    scopus 로고
    • note
    • " "Source code" is computer programming expressed in a "high level" language. Source code must be translated into "object code" (a binary system of 0s and 1s) to be useable by a computer. Programs contained on diskettes or hard drives are in object code.
  • 39
    • 85196216933 scopus 로고    scopus 로고
    • 925 F. Supp. at 5
    • 925 F. Supp. at 5.
  • 40
    • 85196169195 scopus 로고    scopus 로고
    • note
    • The Fifth Amendment provides, inter alia, that no person "shall be deprived of life, liberty, or property without due process of law...".
  • 41
    • 85196205889 scopus 로고    scopus 로고
    • 925 F. Supp. at 13
    • 925 F. Supp. at 13.
  • 42
    • 85196165705 scopus 로고    scopus 로고
    • note
    • The First Amendment provides, inter alia, that "Congress shall make no law... abridging the freedom of speech".
  • 43
    • 85196195283 scopus 로고    scopus 로고
    • 925 F. Supp. at 9
    • 925 F. Supp. at 9.
  • 44
    • 85196159866 scopus 로고    scopus 로고
    • This test for restraints on speech was established by the Supreme Court's ruling in United States v. O'Brien, 391 U.S. 367 (1968)
    • This test for restraints on speech was established by the Supreme Court's ruling in United States v. O'Brien, 391 U.S. 367 (1968).
  • 45
    • 85196156159 scopus 로고    scopus 로고
    • 925 F. Supp. at 11-12
    • 925 F. Supp. at 11-12.
  • 46
    • 85196199441 scopus 로고    scopus 로고
    • 922 F. Supp. 1426 (N.D. Cal. 1996); 945 F. Supp. 1279 (N.D. Cal. 1996); and 974 F. Supp. 1288 (N.D. Cal. 1997)
    • 922 F. Supp. 1426 (N.D. Cal. 1996); 945 F. Supp. 1279 (N.D. Cal. 1996); and 974 F. Supp. 1288 (N.D. Cal. 1997).
  • 47
    • 85196185902 scopus 로고    scopus 로고
    • note
    • Perhaps significantly, Snuffle was a not a finished software product and the parties disagreed as to whether it was actually "software" at all. Although the court asserted that its ruling applied to all forms of cryptographic software, it is not clear that the breadth of the court's decision was necessary or appropriate.
  • 48
    • 85196152355 scopus 로고    scopus 로고
    • 922 F. Supp. at 1435
    • 922 F. Supp. at 1435.
  • 49
    • 85196172196 scopus 로고    scopus 로고
    • 945 F. Supp. at 1289-90
    • 945 F. Supp. at 1289-90.
  • 50
    • 85196217087 scopus 로고    scopus 로고
    • 974 F. Supp. at 1309-10
    • 974 F. Supp. at 1309-10.
  • 51
    • 85196205973 scopus 로고    scopus 로고
    • Security and Freedom Through Encryption (SAFE) Act, H.R. 695, H. Rep. 105-108, 105th Cong., 1st Sess. (22 May 1997)
    • Security and Freedom Through Encryption (SAFE) Act, H.R. 695, H. Rep. 105-108, 105th Cong., 1st Sess. (22 May 1997).
  • 52
    • 85196165606 scopus 로고    scopus 로고
    • Amendment in the Nature of a Substitute to H.R. 695 (11 September 1997)
    • Amendment in the Nature of a Substitute to H.R. 695 (11 September 1997).
  • 53
    • 85196148784 scopus 로고    scopus 로고
    • note
    • The United States currently does not have any restrictions on the domestic use of cryptography.
  • 54
    • 85196155200 scopus 로고    scopus 로고
    • S. 909 (introduced on 16 June 1997)
    • S. 909 (introduced on 16 June 1997).
  • 55
    • 85196168825 scopus 로고
    • A Case Not Closed
    • 1 October
    • See United States v. The Progressive, 467 F. Supp. 990 (W.D. Wis. 1979), a case in which the government obtained a preliminary injunction preventing the publication of an article that allegedly explained how to build a hydrogen bomb. Later, after an unrelated newspaper published the same information, the government dropped the case. A Case Not Closed, Newsweek, 1 October 1979, at 45.
    • (1979) Newsweek , pp. 45
  • 56
    • 85196212853 scopus 로고    scopus 로고
    • Government Pursues Encryption Policy with Showcase of Key Recovery Products
    • 6 November
    • Current pilot projects are focused on key recovery for stored data, rather than electronic communications in transit. Government Pursues Encryption Policy with Showcase of Key Recovery Products, BNA, Daily Rep. for Execs., 6 November 1997, at A-I1.
    • (1997) BNA, Daily Rep. for Execs.
  • 57
    • 85196168455 scopus 로고    scopus 로고
    • note
    • A system that allowed the US government access to encrypted data without the knowledge or approval of the user will obviously not be attractive to a foreign customer.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.