Michael H. Warfield wrote:
 > Well, it would help if some of you would read the regulations

Indeed. This seems to be the post that best addresses the actual reality 
of US encryption export control, so I thought it was appropriate to add 
my own comments to it.

IMPORTANT: Note that I am not a lawyer, and this is not legal advice. 
Also note that I'm not speaking officially for mozilla.org; these are my 
personal opinions.

 > (I have).

I can sympathize :-)

 > Those regulations have rather explicit exemptions for
 > open source projects, the binaries that are based on them, and the
 > sites which host them.

Correct. More specifically, open source encryption software falls under 
the "TSU" ("Technology and Software - Unrestricted") export license 
exception, and is (for the most part) exempted from the requirements of 
the encryption export regulations.

 > Specifically, and explicitly, sites which
 > host cryptography in source form or based on freely available sources,
 > are exempt from the "safe harbor" (aka "cover your ass" announcements
 > and due diligence practices) and "know your customer" (identification
 > and tracking) requirements.
 > In other words, you as a site operator, do NOT have to take any
 > measures to restrict who can download from your
 > site or even recognize or know where the downloads are going to.

Correct. This point is worth reemphasizing: If a site in the US puts up 
open source encryption software for general download (e.g., via 
anonymous FTP or unauthenticated HTTP download), so that it gets 
downloaded by someone in Iraq, North Korea, or wherever, the site 
operator has _not_ done anything wrong under US law and regulations 
(provided only that they notified the US government as discussed below).

A more interesting question is whether the person in Iraq, etc., has 
violated any law. To the best of my knowledge the US export regulations 
don't apply to a non-US person downloading the software from outside the 
US for personal use outside the US.

However the person may be subject to local laws relating to encryption, 
and I suspect that a number of the countries on the US "prohibited 
countries" list may have quite severe laws against using encryption 
software. For information on encryption-related laws and regulations in 
countries around the world, see the most recent "Cryptography and 
Liberty" survey published by EPIC:

http://www2.epic.org/reports/crypto2000/

(Note that this report doesn't include information on all of the 
countries on the US-prohibited list.)

 > The
 > only requirements on the ORIGINAL sites hosting cryptography is to
 > send a message to the BXA notifying them that the site is hosting
 > cryptography.  Nothing more.  You don't even have to tell them what
 > cryptography or provide them with copies (unlike the commercial stuff
 > which has much stricter regulations).

Minor correction: You do have to provide BXA either a copy of the 
software or a URL where the software can be obtained.

 > Mirror sites are even exempt
 > from the notification requirements.

Correct, although I'm not sure that this is explicitly mentioned in the 
regulations themselves. This point is addressed in the Mozilla Crypto FAQ:

http://www.mozilla.org/crypto-faq.html#2-1

 > The notice on the Mozilla site
 > is NOT required in any way shape or form in the regulations.  Some
 > lawyers have recommended these notices as sort of a "cover your ass"
 > action but they are not part of the regulations themselves.  If it
 > WERE commercial or encumbered software or if the sources were not
 > available, then it would be a different matter.  That may be why
 > some lawyers are recommending some of these announcements even
 > though they are not required.

I didn't write the notice on the mozilla.org site, but I can give at 
least two reasons for including it:

First, a person downloading the Mozilla software from mozilla.org may be 
working for a US-based company planning to ship a Mozilla-based product. 
If this product is proprietary (i.e., it includes added code that is not 
open source) then the product would fall under the export regulations 
relating to proprietary software, which are more severe than for open 
source software. So we want to put such companies (and their lawyers) on 
notice that Mozilla includes encryption software and is subject to US 
export regulations.

Second, even an individual Mozilla user in the US may run afoul of US 
export regulations. Recall that the exemption granted for open source 
software applies only if you do not "knowingly" export the software to 
people or countries on the prohibited list. But suppose that a US 
citizen or US resident alien puts together a version of Mozilla 
(including the crypto parts) at the request of someone in Iraq, North 
Korea, etc., and  sends it to them via email. (Or they might fulfill the 
request for the software by putting the Mozilla version on a personal 
web site and then sending personal email to the people in Iraq, etc., to 
tell them where to download it.)

This type of export does not necessarily qualify for the exemption 
granted to people who put open source encryption software up for general 
download, because the person would have "knowingly" exported the code to 
prohibited persons and countries. As a BXA representative put it in an 
email message

http://lists.insecure.org/politech/2000/Jan/0046.html

"... if you post some code and Saddam Hussein downloads it, you are not 
liable. If Saddam calls you up and asks you to e-mail him the code, and 
you send the e-mail without applying for and receiving a license, you 
are liable ..."

So this notice is also intended to make individuals in the US aware that 
  Mozilla is not just standard open source software, but does come under 
US export regulations, and that those regulations apply to them as well.

Now, would the US government prosecute someone in the US just for 
emailing someone in Iraq, etc., some open source encryption code? Maybe 
not. But if the person exporting the code were detained for other 
reasons, would government prosecutors add the violation of export 
control regulations to the list of charges threatened against that 
person? I wouldn't bet against that possibility.

 >      While the regulations in total are pretty thick, the sections
 > which apply to open source software are reasonably readable.  I'll
 > posted pointers to the appropriate chapter and vers on the government
 > site later (I don't have the at my finger tips at the moment).

The complete Export Administration Regulations (EAR) can be found at

http://w3.access.gpo.gov/bxa/ear/ear_data.html

The most important language dealing with open source software is at 
740.13(e)(1) through 740.13(e)(4), on page 25 of the following PDF document:

http://w3.access.gpo.gov/bxa/ear/pdf/740.pdf

There are some other sections that are relevant, but this is the best 
place to start.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]


Reply via email to