Interesting People mailing list archives

testimony by Steve Walker on Export controls


From: David Farber <farber () linc cis upenn edu>
Date: Tue, 12 Oct 93 17:08:40 -0400

law to proceed.  The file name of the PEM programs contained in
the "READ ME" file is changed frequently to force the anonymous
user to read the export control caution.  We also installed
filters that automatically refuse requests that are clearly
coming from outside the U.S. or Canada.  But we know that those
filters cannot stop inquiries from foreign sources that have
accounts in the U.S.  To the best of our knowledge, our approach
is as sound as many that others are using and better than most.


Before we put the system on line, though, we sought the approval
of the Department of State and the National Security Agency. 
Initially we got acknowledgements to our phone calls describing
our problem and proposed solution.  We were told orally at one
time that because the PEM software was "free," it was permissible
to proceed this way, implying that if we charged for it, somehow
this process would not be approved.  But as we began to seek
official approval for this process, we received fewer and fewer
responses.  Our inquiries finally took the form of:  "Unless you
tell us not to do this, this is how we intend to proceed." On
June 1, 1993, we put the anonymous FTP process on line, and our
system has responded to hundreds of requests.  We have never
received acknowledgement that the process is either acceptable or
unacceptable to the Government despite being told on several
occasions that we would receive such acknowledgement.


The above described process is patterned after a similar process
that takes place now in software retail stores.  Programs for
sale over the counter containing DES or similar export controlled
software are supposed to be marked with explicit and obvious
labels telling the buyer that these products cannot be taken from
the U.S. or Canada.  The burden of complying with the export laws
rests entirely with the buyer since the seller has no
responsibility to ascertain whether the buyer is a U.S. or
Canadian citizen.  One has to wonder if these prominent notices,
rather than advising buyers to beware, do not guide the foreign
buyer, who is not concerned with violating U.S. export laws,
directly to the product he or she wishes to buy.


A second situation of interest involves a potential major
customer of PEM, the British Ministry of Defence (MoD).  For
several years, TIS has been discussing PEM with officials in the
MoD for use with unclassified information among MoD users and
their industrial suppliers.  TIS has a perfectly good solution to
MoD's problems and could have had it running there years ago. 
Unfortunately, we cannot export PEM even to the British MoD
because PEM uses the DES and RSA encryption algorithms.


Last year, the SPA succeeded in obtaining expedited export
approval for software products that use cryptography so long as
the key length is 40 bits or less.  While this was a significant
accomplishment, since it was the first time that any cryptography
for confidentiality was given general export approval, the
victory was short lived.  Forty-bit key algorithms can be
exhaustively searched in very short times.  If a device could be
built to exhaustively search a 56-bit key space (DES) in 176
years, it would take less than 1 day to search a 40-bit key
space.  Foreign customers for U.S. products who already have DES
readily available laughed at the 40-bit U.S. restriction.  TIS
produced a 40-bit version of Trusted Mail and obtained the
expedited Department of State export approval but to date has
been unable to find a foreign (or domestic) customer willing to
accept the weak 40-bit key length.


After spending much energy searching for plausible solutions to
this problem, our newly formed Trusted Information Systems (UK)
Limited office has contracted with British scientists to
implement a new UK version of PEM based on the same international
specifications and using DES and RSA algorithms that are already
available in the UK.  In a very real sense, this situation
demonstrates that the only accomplishment of U.S. export control
restrictions is the export of U.S. jobs.


To make matters even worse (in the job export sense, at least),
because of provisions in the UK export laws, it appears that we
can import the UK product for sale in the U.S., something we
would never be able to do in reverse.


These examples of problems with the export control process or its
consequences are typical of the situations many U.S. companies
find as they attempt to enter the world of software cryptography.


Industrywide Experiences


Some companies do try to compete and offer excellent DES-based
products in the U.S.  But because of the export restrictions,
they must develop weaker versions for export if they wish to
pursue foreign markets.  Many companies forgo the business rather
than spend extra money to develop another inferior product that
cannot compete with products widely available in the market.


The Government already has a measure of lost sales and
dissatisfied customers in the number of State Department/NSA
export license applications denied, modified, or withdrawn. 
However, it is impossible to estimate accurately the full extent
of lost sales.  Many potential customers know that U.S. companies
cannot meet their demand and thus no longer inquire.  Conversely,
some companies have given up even trying to get export approvals
for DES to meet customer demand.


Gauging the extent of economic harm to companies is an inherently
difficult task because most companies do not want to reveal that
sort of information.  Consequently, there exists only anecdotal
information.  But the accumulation of anecdotal information
collected by the SPA paints a picture of three ways in which the
export controls on cryptographic products are hurting American
high-tech industry.


(1)  First, for many data security companies, every sale is
vital, and the loss of contracts smaller than $1 million can
often mean the difference between life and death for these
companies.  The confusion and uncertainty associated with export
controls on encryption generate severe problems for small firms,
but not as severe as the loss of business they suffer from anti-
competitive export controls.  Examples abound:


     o    One U.S. company reported loss of revenues equal to a
          third of its current total revenues because export
          controls on DES-based encryption closed off a market
          when its customer, a foreign government, privatized the
          function for which the encryption was used, and the
          U.S. company was not permitted to sell to the private
          foreign firm.  The company estimates it loses millions
          of dollars a year because it receives substantial
          orders every month from various European customers but
          cannot fill them because of export controls.


     o    One small firm could not sell to a European company
          because that company sold to clients other than
          financial institutions (for which export controls grant
          an exception).  Later, the software firm received
          reports of sales of pirated copies of its software. 
          This constituted a loss of a $400,000 contract for the
          small U.S. software firm.


     o    Because of existing export restrictions, an American
          company recently found itself unable to export a mass
          market software program that provided encryption using
          Canadian technology based on a Japanese algorithm.  Yet
          other European and Japanese companies are selling
          competing products worldwide using the same Canadian
          technology.


     o    An SPA member's product manager in Europe reported the
          likely loss of at least 50% of its business among
          European financial institutions, defense industries,
          telecommunications companies, and government agencies
          if present restrictions on key size are not lifted.


     o    Yet another SPA member company reported the potential
          loss of a substantial portion of its international
          business if it cannot commit to provide DES in its
          programs.


     o    A German firm that opened a subsidiary in the U.S.
          sought a single source encryption software product for
          both its German and U.S. sites.  A U.S. data security
          firm that bid for the contract lost the business
          because U.S. export controls required that the German
          firm would have to wait approximately six months while
          a license was processed to sell them software with
          encryption for foreign application.  The license could
          only be for one to three years, the three year license
          being more expensive.  Consequently, the German firm
          ended up purchasing a DES-based system from another
          German company, and the U.S. firm lost the business.


     o    A foreign government selected one software company's
          data security product as that government's security
          standard.  The company's application to export the DES
          version was denied, and as a consequence the order was
          lost.  This cost the company a $400,000 order and
          untold millions in future business.


(2)  Second, multinational corporations (MNCs) are a prime source
of business in the expanding international market for encryption
products.  Many U.S.-based firms have foreign subsidiaries or
operations that do not meet export requirements.  While U.S.
products may be competitive in the U.S., many MNCs obtain from
foreign sources encryption systems that will be compatible with
the company's worldwide operations.  Moreover, foreign MNCs
cannot rely on the availability of U.S. products and have been
known to import foreign cryptography for use in their U.S.
operations.


     o    One U.S. firm reports the loss of business from foreign
          MNCs that will not integrate the company's products
          into their U.S. operations because of the export
          restrictions that would prevent them from being
          compatible with their domestic operations.


     o    The Computer Business Equipment Manufacturers
          Association reports that one of its members was denied
          an export license and lost a $60 million sale of
          network controllers and software for encryption of
          financial transactions when the Western European
          customer could not ensure that encryption would be
          limited to financial transactions.


(3)  Third, encryption systems are frequently sold as a component
of a larger system.  These "leveraged" sales offer encryption as
a vital component of a broad system.  Yet the encryption feature
is the primary feature for determining exportability.  Because of
the export restrictions, U.S. firms are losing the business not
just for the encryption product but for the entire system because
of the restrictions on one component of it.


     o    One data security firm has estimated that export
          restrictions constrain its market opportunities by two-
          thirds.  Despite its superior system, it has been
          unable to respond to requests from NATO, the Swedish
          PTT, and British telecommunications companies because
          it cannot export the encryption they demand.  This has
          cost the company millions in foregone business.


     o    One major computer company lost two sales in Western
          Europe within the last 12 months totaling approximately
          $80 million because the file and data encryption in the
          integrated system was not exportable.


One possible solution to the problem of export controls may be
for U.S. companies to relocate overseas.  Some U.S. firms have
considered moving their operations overseas and developing their
technology there to avoid U.S. export restrictions.  Thus, when a
U.S. company with technology that is clearly in demand is kept
from exporting that technology, it may be forced to export jobs
instead.








HOW ARE U.S. CITIZENS AND BUSINESSES BEING AFFECTED BY ALL THIS?


The answer to this question is painfully simple.  When U.S.
industry forgoes the opportunity to produce products that
integrate good security practices, such as cryptography, into
their products because they cannot export those products to their
overseas markets, U.S. users (individuals, companies, and
Government agencies) are denied access to the basic tools they
need to protect their own sensitive information.  This is where
the greatest frustration sets in.


The U.S. Government established export controls in order to keep
good quality cryptography from proliferating outside the U.S. 
The result has been exactly the opposite effect.  Good quality
cryptography is now available everywhere in the world including
the U.S.  But U.S. customers cannot buy it integrated into the
information system products they normally use because U.S. export
laws discourage U.S. suppliers from developing such products.


We seem caught in a vicious circle that appears to make sense
only to those who do not want to see good quality cryptography
used anywhere.






WHAT EFFECT WILL CLIPPER HAVE?


In the midst of all of this, on April 16, 1993, the President
announced the Clipper initiative to ensure the public's right to
privacy while allowing law enforcement to conduct lawful
wiretaps.


The principal concern of many with Clipper is the potential it
has for violating the privacy of citizens.  In his April 16
announcement, the President stated that "The Administration is
committed to policies that protect all Americans' right to
privacy while also protecting them from those who break the law." 
It would appear that the only way both aspects of this policy can
be carried out is if the individual's right to privacy is
superseded by the Government's right to listen in whenever the
Government chooses.  Many people fear that this isn't much of a
right to privacy.


There are many other concerns that have been expressed about the
Administration's Clipper Initiative and the negative aspects of
key escrow.  But with respect to the issue of export restrictions
on software products, Clipper represents primarily a distraction
only serving to cloud the issues.  Unless Clipper is made
mandatory, its requirement to use hardware and its key escrow
provisions will cause it to have little impact on the software
market.  No one will willingly give up the convenience of
integrated software encryption for an expensive hardware box that
will let the Government listen in.


The international aspects of Clipper are not at all thought out. 
Even if Clipper were exportable, the fact that the U.S.
Government will hold the keys and not share them with other
governments ensures that this will be no more successful overseas
than the 40-bit key length "solution."


Clipper is a major diversion that does not solve any of the
problems discussed above.






WHAT CAN BE DONE?


Many Calls for Action


Many people have been clamoring about the need to relax export
controls on encryption for years.  The National Research Council
has recently issued four reports expressing serious concern in
this area (Attachment 3).


The computer industry has been complaining ever more loudly for
ten years.


The Congressionally chartered Computer System Security and
Privacy Advisory Board has called for a national review of these
issues involving Government (civilian, law enforcement, and
national security interests) and industry (users and vendors). 
The Advisory Board passed resolutions on the need for a national
review and expressing serious concerns about the Clipper
Initiative (Attachment 4).


The Administration has formed an Interagency Review at the
request of the President to look at all aspects of the
cryptography issue including export control.  This review is the
highest level investigation of this problem to date.  Its report
is due out any time, within days or weeks.  Unfortunately, the
review is being conducted from behind closed doors with the only
public input coming through the auspices of the Advisory Board
and such industry groups as the Digital Privacy and Security
Working Group.


Since the Interagency review began with the Clipper announcement
and is being conducted by Government officials who are heavily
committed to Clipper, it is unlikely that its results will assist
business by easing the software cryptography export control
constraints.


President Clinton, in commenting on the North American Free Trade
Agreement, was quoted by the Washington Post, September 16, 1993,
as saying:


     I'm telling you folks, we cannot repeal the force that is
     driving the world economy together.  We can run away from it
     and get beat by it, or we can embrace it, do what we have to
     do and win with it.


If only those who control cryptographic exports understood this.


On September 30, the President announced a significant relaxation
of the export control rules for high performance computer
technology.  It would be good if some of that change could affect
the cryptography export area, but the present export position is
so well entrenched, it is unlikely there will be much change from
the Executive Branch.


The Congress Must Act Now!


The only hope for a recognition of the counterproductive nature
of this situation is in the Congress.  No other organization has
the breadth of constituencies to allow an honest look at all the
concerns and the authority to come to a definitive resolution on
the issue.


We need to recognize that the U.S. public has a right to a
reasonable level of protection for its sensitive information. 
Enabling that right through allowing the export of good quality


Current thread: