Complying with Encryption Export Controls Richard L. Matheny III Jacob R. Osborn October 30, 2014 ©2014 Goodwin Procter LLP Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 2 Introduction Why are the Encryption Regulations important? Export of encryption items regulated as dual-use by the Commerce Department’s Bureau of Industry & Security (BIS), under the Export Administration Regulations (EAR). › Why? So that NSA can know who is using what encryption items in order to break communications when the national security requires it. Nature of the problem: › Encryption technology and concepts are complicated. › Despite several rounds of reform, encryption regulations are complicated, scattered across dozens of EAR provisions. › Encryption itself is EVERYWHERE! ▪ Virtually all software contains, enables, leverages, makes calls to, some form of encryption. The Perfect Storm! Goodwin Procter LLP 3 Introduction Violations are common Violation of the EAR’s encryption regulations is the single-most common violation of the export control laws. › E.g., inclusion of public, open-source encryption item in new enterprise business software product does not readily suggest you are making a “dual use” item controlled for national security reasons. But you are. › Even well-intentioned companies struggle with compliance. ▪ Changes in law ▪ Changes in product, types of encryption, how it is used ▪ Reporting obligations, etc. Historically, no penalty for “garden variety” violations. › But this may be changing…. Goodwin Procter LLP 4 Introduction Wind River Systems Wind River Systems, Intel sub, just penalized $750k for unlicensed exports of encryption items between 2008 and 2011. › Embedded software solutions for security, communications, and operating environments › 5D002 software, “ENC restricted” ▪ 51 to foreign “government end-users” in China, Hong Kong, Russia, Israel, South Africa, and South Korea. ▪ 4 to Entity List entities in China. › WRS filed a voluntary self-disclosure in 2012. First ever fine for “garden variety” violation of the encryption regulations—i.e., no OFAC-sanctioned country or SDN. Goodwin Procter LLP 5 Introduction Why did BIS issue a fine? “ENC restricted” › Foreign-government end-users required individual validated license, which WRS did not obtain. Entity List end-users also involved, also require a license. Substantial aggregate value, > $3 million It was an Intel sub! They should know better! BIS wanted to send a message…. Other reasons not made public? Goodwin Procter LLP 6 Introduction What impact from Wind River Systems case? Is BIS really bringing down the hammer? Will BIS pursue a broader category of violations than presented in WRS? Does it matter? Likelihood of greater due-diligence scrutiny in context of investments, acquisitions, and IPOs. › No longer evident that “these types of violations” will not be penalized. ▪ WRS distinguishable from most such violations. But will that really matter to investors and underwriters? › Investors seek indemnity, escrow, etc. › Diligence more expensive. › Deals more complicated. › Remediation and voluntary self-disclosures more common? Goodwin Procter LLP 7 Brief Pause for Questions? Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 9 Encryption Compliance: EAR Framework “Dual-Use” Items EAR controls the export of “dual-use” items, which are items having both commercial and military or proliferation applications › This includes items such as lasers and surreptitious listening devices › This also includes the broad category of software that enables or leverages encryption functionality Goodwin Procter LLP 10 Encryption Compliance: EAR Framework Commerce Control List Controlled items are listed on the “Commerce Control List” (CCL) One can search the CCL index to find an item’s “Export Control Classification Number” (ECCN) Controlled Items Goodwin Procter LLP ECCNs 11 Encryption Compliance: EAR Framework Export Control Classification Numbers EAR99 is the ECCN “catch-all” bucket for decontrolled items but are still “subject to the EAR.” Goodwin Procter LLP 12 Encryption Compliance: EAR Framework Controls After determining the ECCN, one can look up the “reasons for control” that apply to the item › › › › › › › › › › › › › › AT: Anti-Terrorism CB: Chemical & Biological Weapons CC: Crime Control CW: Chemical Weapons Convention EI: Encryption Item FC: Firearms Control MT: Missile Technology NP: Nuclear Proliferation NS: National Security RS: Regional Stability SI: Significant Item SS: Short Supply UN: United Nations SL: Surreptitious Listening Goodwin Procter LLP 13 Encryption Compliance: EAR Framework Commerce Country Chart After determining the controls, one can look on the Commerce Country Chart to determine whether a license is required for export An “x” indicates that a license is required Goodwin Procter LLP 14 Encryption Compliance: EAR Framework License Exceptions One can also use the item’s ECCN to take advantage of License Exceptions that permit export without a license Examples: › Shipments of Limited Value (LVS) › Gift Parcels and Humanitarian Donations (GFT) › Temporary Imports, Exports, Reexports, and Transfers (TMP) › Technology and Software Unrestricted (TSU) › Encryption Commodities, Software and Technology (ENC) Important for encryption software Goodwin Procter LLP 15 Encryption Compliance: EAR Framework Compliance Steps General EAR Compliance Steps: › 1. Determine whether there is EAR jurisdiction › 2. Determine where item falls on CCL › 3. Look up item’s ECCN › 4. Determine controls placed on item › 5. Review Commerce Country Chart to determine whether license is required › 6. Consider applicability of License Exceptions, if necessary › 7. If using License Exception ENC, comply with any filing requirements › 8. If using License Exception TSU, comply with reporting requirement › 9. Comply with any reporting and ongoing obligations, if applicable › 10. If no license exception is available, apply for license from BIS Goodwin Procter LLP 16 Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 17 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction YES › Item located in United States and exported to another country, even if developed/made in another country Software Goodwin Procter LLP 18 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction YES › Item made available for download from the United States, even if from website or app store Software Goodwin Procter LLP 19 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction YES › Item passing through United States Software Software Goodwin Procter LLP 20 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction YES › Reexport of item of U.S. origin Software Goodwin Procter LLP Software 21 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction YES › Item developed or commingled with U.S. technology › Complicated analysis ▪ Direct-product rule ▪ De minimis rule Goodwin Procter LLP 22 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction NO › Items subject to the exclusive jurisdiction of another agency Goodwin Procter LLP 23 EAR Jurisdictional Questions Step #1: Determine EAR Jurisdiction NO › Publicly available source code ▪ Provided reporting obligations of License Exception TSU are met Goodwin Procter LLP 24 Brief Pause for Questions? Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 26 Determining a Product’s ECCN Steps #2-4: Classify the Software Most Common ECCN’s for Encryption Software › 5D002 ▪ (b)(1) ▪ (b)(2) or (b)(3) ▪ (b)(4) › 5D992 ▪ Mass market ▪ Authentication or copy-protection › EAR99 ▪ Note 4 ▪ Banking or medical use Goodwin Procter LLP 27 Determining a Product’s ECCN Steps #2-4: Classify the Software Common Categories for Encryption Software › Category 5 ▪ Part 1 – Telecommunication ▪ Part 2 – Information Security • “information security”: all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes “cryptography”, “cryptographic activation”, “cryptanalysis”, protection against compromising emanations and computer security. Goodwin Procter LLP 28 Determining a Product’s ECCN Steps #2-4: Classify the Software Very Common ECCN: 5D002 › “Software” having the characteristics, or performing or simulating the functions of equipment controlled by 5A002 › 5A002: “Information security” systems, equipment and “components” therefor, as follows: ▪ a. Systems, equipment, application specific “electronic assemblies,” modules and integrated circuits for “information security,” as follows, and “components” therefor “specially designed” for “information security”: • a.1. Designed or modified to use “cryptography” employing digital techniques performing any cryptographic function other than authentication, digital signature, or execution of copy-protected “software,” and having any of the following: › a.1.a. A “symmetric algorithm” employing a key length in excess of 56-bits; or › a.1.b. An “asymmetric algorithm” where the security of the algorithm is based on any of the following:…factorization of integers in excess of 512 bits (e.g., RSA)… Goodwin Procter LLP 29 Determining a Product’s ECCN Steps #2-4: Classify the Software NS controls AT controls EI controls Goodwin Procter LLP 30 Determining a Product’s ECCN Steps #2-4: Classify the Software NS controls Goodwin Procter LLP AT controls 31 Determining a Product’s ECCN Steps #2-4: Classify the Software 5D002 exceptions › Authentication-only encryption › Digital Signature › Copy protection software › Weak encryption ▪ Less than 56-bit symmetric or 512-bit asymmetric If not 5D002: Goodwin Procter LLP 32 Determining a Product’s ECCN Steps #2-4: Classify the Software AT Controls affect: › Cuba › Iran › North Korea › Sudan › Syria Same countries against which the U.S. maintains comprehensive economic sanctions Goodwin Procter LLP 33 Determining a Product’s ECCN Steps #2-4: Classify the Software Common ECCN: 5D992 “mass market” › Requirements: ▪ (1) Generally available to the public by being sold, without restriction, from stock at retail selling points by means of (a) over-the-counter transactions; (b) mail order transactions; (c) electronic transactions; or (d) telephone call transactions. ▪ (2) Cryptographic functionality cannot be easily changed by the user. ▪ (3) Designed for installation by the user without further substantial support by the supplier. ▪ (4) When necessary, details of the item are accessible and will be provided, upon request, to the appropriate authority in the exporter’s country. Goodwin Procter LLP 34 Determining a Product’s ECCN Steps #2-4: Classify the Software “Mass market” examples › Retail software purchased over-the-counter › Apps purchased from an App Store › Software made widely available via website download Goodwin Procter LLP 35 Determining a Product’s ECCN Steps #2-4: Classify the Software Common ECCN: EAR99 “Note 4” treatment (former “ancillary” encryption item) › Requirements: ▪ (1) Primary function or set of function is not any of: (a) “information security”; (b) a computer, including operating system, parts and components therefor; (c) sending, receiving or storing information (except in support of entertainment, mass commercial broadcasts, digital rights management or medical records management); or (d) networking (includes operation administration, management and provisioning). ▪ (2) The cryptographic functionality is limited to supporting their primary function or set of functions. ▪ (3) When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter’s country. Goodwin Procter LLP 36 Determining a Product’s ECCN Steps #2-4: Classify the Software EAR99 “Note 4” Examples › Games and gaming software › Software for household utilities and appliances › Industrial, manufacturing or mechanical systems › Scientific visualization and simulation software › Business process automation software – process planning and scheduling, supply chain management, inventory and delivery Goodwin Procter LLP 37 Determining a Product’s ECCN Steps #2-4: Classify the Software Common ECCN: EAR99 “Specially designed” for medical end-use › Requirements: ▪ Commodities and software “specially designed” for medical end-use that incorporate an item in Category 5, part 2 are not classified in any ECCN in Category 5, part 2. Goodwin Procter LLP 38 Determining a Product’s ECCN Steps #2-4: Classify the Software Common ECCN: EAR99 cryptographic equipment “specially designed” and limited for banking use or ‘money transactions’ Goodwin Procter LLP 39 Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 40 License Exceptions Step #5: Consider Applicability of License Exceptions Most Common License Exceptions › If EAR99, unnecessary to rely on a license exception › ENC ▪ (a)(1) or (a)(2) ▪ (b)(1) ▪ (b)(2) or (b)(3) ▪ (b)(4) ▪ mass market › TSU Goodwin Procter LLP 41 License Exceptions Step #5: Consider Applicability of License Exceptions Technology and Software Unrestricted (TSU) › Entire product source code must be open, not just developed using open-source encryption tools › Reporting obligation outlined in 15 C.F.R. § 740.13 Goodwin Procter LLP 42 License Exceptions Step #5: Consider Applicability of License Exceptions Encryption Commodities, Software and Technology (ENC) › (a)(1): internal development exception ▪ Product must have ECCN of 5A002 or 5D002 ▪ Private sector end users, wherever located, that are headquartered in a country listed in Supplement 3 ▪ Product must be used for internal development or production of new products by that user › (a)(2): exports to U.S. subsidiaries ▪ Product must have ECCN of 5A002 or 5D002 ▪ Export must be made to a U.S. subsidiary, or foreign nationals who are employees, contractors, or interns of a U.S. company or its subsidiaries ▪ Must be for internal company use, including development or production of new products Goodwin Procter LLP 43 License Exceptions Step #5: Consider Applicability of License Exceptions Encryption Commodities, Software and Technology (ENC) › (b)(1) ▪ Almost everything › (b)(2) and (b)(3) ▪ Network infrastructure software ▪ Encryption source code ▪ Crypto is customized for government end users ▪ Quantum crypto ▪ Penetration capabilities ▪ Cryptanalytic items ▪ Cryptographic APIs ▪ Non-standard cryptography ▪ Network forensics › (b)(4) ▪ Short-range wireless encryption; foreign products Goodwin Procter LLP 44 License Exceptions Step #6: Filing Requirements to take advantage of License Exceptions Steps Required to Take Advantage of ENC › “mass market” 5D992 ▪ Encryption Registration ▪ Annual self-classification reporting › (a)(1) & (a)(2) – internal development & use ▪ Nothing › (b)(1) – “catch-all” 5D002 bucket ▪ Encryption Registration ▪ Annual self-classification reporting › (b)(2) & (b)(3) – strongly controlled software ▪ Encryption Registration ▪ Classification Request ▪ Semi-annual export reporting (depends) › (b)(4) – short-range wireless encryption & foreign products ▪ Nothing Goodwin Procter LLP 45 License Exceptions Step #6: Filing Requirements to take advantage of License Exceptions 30 Days After Classification Request is Filed Goodwin Procter LLP 46 Brief Pause for Questions? Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 48 License Applications License Application Process No License Exception Available › Submit License Application on SNAP-R Goodwin Procter LLP 49 Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 50 Common Mistakes Examples Unaware of regulations altogether Assume because using open-source crypto tools, not regulated Unaware that export of software is occurring Multiple products, but only classified a subset of products Wrong classification Changes to product’s encryption functionality Goodwin Procter LLP 51 Roadmap I. Introduction II. Encryption Compliance: EAR Framework III. EAR Jurisdictional Questions IV. Determining a Product’s ECCN V. License Exceptions VI. License Applications VII. Common Mistakes VIII.Brief Word on International Encryption Controls Goodwin Procter LLP 52 Brief Word on International Encryption Controls Jurisdictions Concepts › “Import” vs. “use” controls designates who is responsible for licenses Most aggressively regulating encryption imports: › China, France, Hong Kong, Israel, and Russia › France tightly controls encryption import and supply to third-parties, but not use; applications must be in French and local counsel is recommended Many others do not actively enforce restrictions › E.g., South Africa Some have simple licensing process › E.g., Israel restricts import and use of encryption hardware, software, and technology but licensing is simple process and typically takes < 30 days Some have similar arrangements to U.S. › E.g., Hong Kong has “mass market” and “authentication only” category similar to U.S. although it is not Wassenaar signatory Goodwin Procter LLP 53 Brief Word on International Encryption Controls Resources Crypto Law Survey › http://www.cryptolaw.org › Not authoritative Goodwin Procter LLP 54 Questions? Thank You Richard L. Matheny III (rmatheny@goodwinprocter.com) Jacob R. Osborn (josborn@goodwinprocter.com)