CRYPTOGRAPHY AND LIBERTY
AN INTERNATIONAL SURVEY OF ENCRYPTION POLICY
Global Internet Liberty Campaign
Survey Results
Reported countries have been grouped into three categories regarding controls on cryptography. A "Green" designation signifies that the country has either expressed support for the OECD Guidelines on Cryptography, which generally favor unhindered legal use of cryptography, or has imposed no omnibus cryptography controls. A "Yellow" designation signifies that the country has proposed new cryptography controls, including domestic use controls, or has shown a willingness to treat cryptographic-enabled software as a dual-use item under Waasenaar. A "Red" designation denotes countries that have instituted sweeping controls on cryptography, including domestic use controls. Some countries do not fit neatly into one of the three categories, but trends may show them as being borderline, i.e., "Yellow/Red."
Anguilla
GREEN
Anguilla is a self-governing British territory in the Caribbean. It has also attracted an off-shore Internet industry which takes advantage of the territory's tax haven status. In an interview with a reporter from Wired magazine, Victor F. Banks, the Anguillan Minister of Finance, gave a pitch for Anguilla as a base for Internet commerce. He said "Here in Anguilla we are well situated for Internet commerce. Our banks are well regulated, clean, secure; we are very vigilant against criminal activity; we have strong rules against money laundering and traffic in illegal drugs. We have mutual legal assistance with the US that allows it to get information from us about any clientele involved in criminal activity, although it can't go on fishing expeditions to find out about tax avoidance."
Offshore Information Services is one company that offers Anguilla domain name services (.ai), e-mail accounts, virtual web sites, and links to encryption programs like Pretty Good Privacy (PGP). It also offers the opportunity to engage in cryptographic civil disobedience. One may send a three-line encryption program to Anguilla. In the United States, this simple harmless act is illegal, a violation of the ITAR. The web address for the civil disobedience campaign is http://online.offshore.com .ai/arms-trafficker/ . By hosting such an operation, Anguilla does not seem to be a country in support of U.S. initiatives on cryptography.
Ref: Charles Platt, "Plotting Away in Margaritaville," Wired (July 1997)
Antigua and Barbuda
GREEN
The Embassy of Antigua and Barbuda in Washington did not respond to our survey. However, perusal of their Free Trade Zone web site yielded the fact that the island nation is trying to compete with Anguilla in luring international data services, including those reliant on the Internet. Several virtual casinos have been established in the Free Trade Zone. It is certain that strong encryption is a high priority for such operations.
Ref: www.candw.ag/~ftpzone/gam elicenced.htmArgentina
YELLOW
Argentina has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic products and technology as dual-use goods. However, the Argentine Ministry of Justice distributes PGP from the following web address: http://www.jus.gov.ar/firma/index. html
Armenia
YELLOW
According to the Second Secretary of the Embassy of Armenia in Washington, Armenia does not currently have a policy on the use of cryptography. However, the Armenian government has recently set up a Department of Information and Publications which, among other things, is planning to initiate legislation concerning the use of cryptography.
Ref: Embassy of the Republic of Armenia letter dated July 31, 1997.
Australia
GREEN/YELLOW
We received a phone call from the Embassy of Australia in Washington, D.C. They said they had received our request for information on Australia's laws on the use, export, and import of cryptographic products but were unsure of what agency of the Australian government to forward our request. We informed the embassy that the Attorney General's Department was the most likely agency possessing the information we desired. The confusion by the embassy on which government department is responsible for cryptography was cited in the government-commissioned Review of Policy relating to Encryption Technologies , authored by former deputy director of the Australia Security Intelligence Organization (ASIO), Gerald Walsh. In what is popularly called the Walsh Report (issued on October 10, 1996 and initially embargoed by the government for public release), Walsh criticizes the government for its lack of coordination in establishing a cryptographic policy:
[The Review found a lack of clarity as to which Minister and which department had responsibility for cryptography policy and the consequent danger of a lack of coordination in policy development. These deficiencies need to be overcome.]
The following is gleaned from the Commerce Department/NSA international encryption report:
Australian legislation controlling the export of cryptography products has existed since at least 1987 when Australia became a member of COCOM. Australian regulations, unlike COCOM, include all cryptographic products under a separate category rather than distinguishing them as dual-use or military. Cryptographic products require Ministry of Defense approval under Regulation 13B and the associated Schedule 13 of the Customs (ProhibitedExports) Regulations. As such, Australian export control regulations exceed both COCOM and Wassenaar guidelines in some areas, most notably in requiring individual export licensing for mass-market applications software and other mass-market software performing cryptographic functions.
With COCOM's revision of the control lists in 1991, Australia adopted the revised lists that included the decontrol of mass-market cryptographic software. However, by November 1994, Australia had specifically excepted cryptographic software from the decontrol permitted by COCOM, again requiring individual licensing on such products. The Commerce/NSA report redacts information from State Department Canberra cables explaining Australia's decision to re-impose individual licensing.
According to the Australian Department of Foreign Trade, as referenced in State Department Canberra Cable 03283-93, Australia has a reasonably advanced commercial encryption industry, mainly focused on protecting commercial data flow via modems, voice scramblers, and mobile phones, and that Australian exports of such products are mainly to the financial industry. Approval or denial of export applications is based on economic factors, the impact on Australian national security, and international obligations. Applications for export of cryptographic equipment are referred to the Defence Signals Directorate (DSD) for technical advice on the impact of export on national security. DSD is the agency responsible for collecting foreign signals intelligence (SIGINT), much of which is shared with the U.S. National Security Agency under the terms of the UK-USA Security Agreement of 1948. DSD is also the agency responsible for the security of all Australian government communications.
In December 1996, Australia amended its export control laws to allow a personal-use exemption for encryption software that remains in the control of Australian users.
According to the Commerce/NSA report, there are no import controls on cryptographic products in Australia.Additionally, according to the Commerce/NSA report, the private use of encryption devices is limited only by the requirement to obtain Austel (Australian Telecommunications Authority) approval for any equipment to be attached to the public switch telephone network. Approval is generally granted provided the equipment does not harm the network. Australia does not appear to use homologation laws to control the private use of encryption. Homologation regulations govern the connection to and use of communications equipment on national telecommunications networks. Some governments use homologation regulations as a pretext to restrict the use of cryptography on telecommunications networks.
The Walsh Report recommends that Australia not establish a key escrow or recovery scheme as advocated by the United States. Its finding on this subject is as follows:
1.2.5 The Review does not support legislative action at this stage to prescribe a form of key management infrastructure accessible by government for purposes of national safety . . .
1.2.8 The Review does not recommend specific options for encryption legislation at this time.
1.2.11 There seems no compelling reason or virtue to move early on regulation or legislation concerning cryptography. Law enforcement and national security agencieshave certainly experienced difficulty where subjects of investigation have refused access to encrypted stored data and it has not been possible for them or other agencies to decrypt this material. It is questionable, though, whether any range of policy decisions concerning key management would have altered this situation materially. For the present, the investigative capability of the agencies is not significantly affected.
1.2.27 Invocation of the principle of non self-incrimination is likely to prove an obstacle to efforts by law enforcement agencies to obtain encryption keys by search warrants or orders made by courts and tribunals.
1.2.39 The ready availability of strong encryption, with no requirement to escrow or register keys, nor to entrust them to any independent entity, is the most effective safeguard of individual privacy.
1.2.50 It would be premature to enter formal negotiations with other countries on access to encrypted data, where public keys are held in those countries, until there is some certainty as to likely key management infrastructures.
1.2.53 There is a high risk of corruption in the third party service provider sector and the Government would be prudent to require integrity screening and registration of those who seek to offer such services to the public.
1.2.56 There seems to be little popular support in or outside the United States for a 'Commercial Key Escrow' system involving government agencies creating as it would significant vulnerability outside of the control of the person or corporation.
In August 1997, Senator Richard Alston, the newly-designated Federal Information Economy Minister, took over responsibility for cryptography policy-making from the Attorney General's department. The Attorney-General's department was criticized for initially suppressing the Walsh report on cryptography in early 1997.
It was reported that the new National Office for the Information Economy (NOIE) would have "significant private sector input", including long- and short-term contracts for staff from business backgrounds, in order to reflect corporate concerns.
Refs: Review of Policy relating to Encryption Technologies (Walsh Report), October 10, 1996.
A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
http://zdnet.com.au /pcweek/content/1001/pcoz0004.htmlAustria
YELLOW
The Embassy of Austria in Washington, D.C. informed us that the Austrian organization responsible for cryptography usage and exports and imports was the Federal Ministry of Foreign Affairs, Section VI, in Vienna. A fax to that agency went unanswered.
According to the Commerce/NSA report, the Austrian government controls all encryption software as a dual-use item, and special licenses are required for its export, transit, or re-export. The legislation governing dual-use items is the Aussenhandelsgesetz 1995 Bundesgesetzblatt 172 , as well as accompanying Bundesgesetzblatt 180/1995 . Licenses are denied to destinations where an armed conflict is ongoing, to countries of concern, and to those against which there are international sanctions. The information was derived from Commerce Department Vienna Cable 004611, June 7, 1995.
According to a study by the Institute for Applied Information Processing and Communication (IAIK) regulations concerning the use of cryptography within Austria are covered by the law on internal radio transmissions ( Betriebsfunkverordnung - BFV 1995). Encryption is explicitly forbidden because frequencies assigned to certain companies and organizations are considered privileged frequency allocations that can only be used for company-specific internal communications. However, some frequencies are allocated to whole sectors of the economy resulting in the problem that competitors may listen in. Consequently, there is a strong interest from affected companies to change these regulations. The only exceptions are the sub-units of the Ministry of Interior (mainly the police and security forces). Public communication systems (e.g. GSM) may be encrypted. International regulations on amateur radio which demand transmission in clear text (and restrict content very strongly) are enforced in Austria.
On July 8, 1997, Caspar Einem, the Austrian Minister for Science and Transport endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers"will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework atEuropean and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of Austria, Office of the Commercial Counselor fax dated June 24, 1997. A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
http://www.iaik.tu-graz.ac.at/LEHRE/StudProj/HAINZSILLI/crypto.ak.home.html/
http://www2.echo.lu/bonn/confer ence.html/Bahrain
UNKNOWN
We were contacted by telephone by the Embassy of Bahrain in Washington, D.C. and informed that the agency in Manama, Bahrain that was responsible for regulating the use of cryptography was the Directorate of Islamic Affairs, a component of the Ministry of Justice and Islamic Affairs. A direct query to that agency went unanswered.
Belarus
RED
Belarus restricts the manufacture, maintenance, and use of cryptographic products. Licenses are required by the State Security Committee (the Belarussian KGB).
Ref: http://www.iaik.tu-graz.ac.at/LEHRE/StudProj/HAINZSILLI/crypto.ak.home.html/
Belgium
GREEN/YELLOW
Belgium requires those wishing to export cryptography to countries other than the Netherlands and Luxembourg to first obtain an export license. However, the European Union statutes have liberalized these requirements to cover additional EU members and certain non-EU countries.
In December 1994, the Belgian parliament passed a law that would have required escrowed encryption. The law authorized the Belgian Institute for Posts and Telecommunications to establish a mandatory key escrow deposit system. The law contained homologation provisions that permitted the Belgacom, theBelgian PTT, to disconnect a phone that used unescrowed encryption. The law has not yet been implemented because the enabling regulations have not been issued. There is a legislative proposal to amend the law to relax the cryptography restrictions.
On July 8, 1997, Jos Chabert, the Belgian Vice Premier and Minister for Economics for the Brussels Capital Region, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: http://www.iaik.tu-graz.ac.at/LEHRE/StudProj/HAINZSILLI/crypto.ak.home.html
http://www.freenix.fr/netizen/20 5-e.html
http://www2.echo.lu/bonn/confere nce.htmlBelize
GREEN
The Embassy of Belize in Washington, D.C. informed us that they were not aware of any laws in Belize concerning the use of cryptography. They did inform us that cryptography was under the jurisdiction of the Attorney General's Ministry in Belmopan.
Ref: Embassy of Belize fax dated June 20, 1997.
Brazil
GREEN
According to the 1993 NIST survey, Brazil does not impose import restrictions for encryption technology.
The PGP encryption program in Portuguese is available from Brazil via the Internet. The web site is http://www.dca.fee.unicamp.br/pgp.
Ref: NIST Preliminary Results of Study of Non - U.S. Cryptography Laws/Regulations, September 27, 1993.
Bulgaria
GREEN/YELLOW
Bulgaria has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use good.
On July 8, 1997, Antoni Slavinski, the Bulgarian President of the Committee of Posts and Telecommunications and Christo Balarev, the Bulgarian Deputy Minister of Education and Science, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: http://www2.echo.lu/bonn/confere nce.html
Cambodia
UNKNOWN
The Embassy of Cambodia in Washington, D.C. informed us that, although they were not aware of any laws concerning the use of cryptography in Cambodia, the Ministry with responsibility was the Ministry of Posts and Telecommunications in Phnom Penh. A fax to the agency was followed by a coup d'état and no further information was forthcoming.
Ref: Royal Embassy of Cambodia fax dated June 19, 1997.
Campione d'Italia
GREEN
Campione d'Italia is a small Italian enclave on the shores of Lake Lugano. It is totally surrounded by Switzerland. Although technically part of Italy, it's close affiliation with Switzerland, a non-member of the European Union, has made it a virtual "neutral zone" from European laws, including those dealing with taxation. A company developing encryption in this feudal anomaly would face little or no export restrictions because Campione's border with Switzerland is open (there is also unrestricted access to Liechtenstein) and Swiss laws do not apply in the enclave. There is full Internet access via the modern Swiss PTT network. Because Campione has attracted numerous companies and banks, Italy prefers not to apply its laws to the territory.
Ref: Internet search.
Canada
GREEN/YELLOW
According to the Commerce/NSA report, the Export and Import Permits Act (EIPA), theExport Control List (ECL) and the Area Control List (ACL) are the mechanisms by which Canada controls exports. The EIPA authorizes the Government to exercise export controls to ensure that military or strategic goods are not exported to destinations representing a strategic threat to Canada. The Ministry of External Affairs is responsible for implementation of the act.
Canada was a member of COCOM and continues to adhere to the Wassenaar Arrangement. Canada has, therefore, issued guidelines for the exportof information security related equipment and technologies that are reflected in Group 1 of the Export Control List. Accordingly, export licenses are required for export to all destinations except the United States. The Foreign Affairs Export Controls Division works closely with Canada's Communications Security Establishment (CSE), the NSA's Canadian SIGINT partner, regarding export decisions on cryptographic products. The Division stated that the CSE works closely with the NSA, the UK's Government Communications Headquarters (GCHQ), and Australia's DSD on cryptographic export policies.
There are no import controls imposed by Canada and there are no laws restricting the private use of cryptography. Canada's homologation regulations require that cryptographic equipment conform to public network technical requirements.
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
China
RED
According to the NIST survey, China practices a licensing system for importing various commodities. An application must be filed and a license obtained in advance by corporations approved by the State to engage in the business of importing commodities. The licenses are valid for one year and extensions may be applied for.
The Notice of the General Administration of Customs of the People's Republic of China, Sec. 50-305, of November 1, 1987 (List of Prohibited and Restricted Imports and Exports), restricts the importation of voice-encoding devices.
Corporations engaging in the exportation business must file an approval application with the Ministry of Foreign Trade or the foreign trade bureau of the particular province. The Ministry establishes an export control list of prohibited and restricted goods. These regulations are contained in Interim Procedures of the State Import-Export Commission and Ministry of Foreign Trade of the People's Republic of China Concerning the System of Export Licensing of June 3, 1980.
The aforementioned Notice of the General Administration of Customs restricts the exportation of voice-encoding devices.
Ref: NIST Preliminary Results of Study of Non - U.S. Cryptography Laws/Regulations, September 27, 1993.
Croatia
GREEN
The Croatian embassy in Washington did not respond to our survey. However, it is noteworthy that the Cryptographic Reference Center's web page ( http://pgp.rasip.fer.hr ) , which is operated jointly by CARNet, the Croatian Academic and Research Network and FER, the Faculty of Electrical Engineering and Computing, in Zagreb, Croatia, makes PGP 5.0 and other cryptographic programs available on-line.
There are no identifiable laws or regulations governing the import or use of cryptography in Croatia.
Cyprus
GREEN/YELLOW
The Cypriot Embassy in Washington did not respond to our survey. However, Cyprus did endorse an international statement on cryptography in July 1997. On July 8, 1997, Dinos Michaelides, the Cypriot Minister of the Interior, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Czech Republic
GREEN/YELLOW
The Czech Republic has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual use good. However, according to the Commerce/NSA report, some one dozen Czech firms are taking advantage of U.S. export control regulations to develop their own encryption software.
There are no identifiable laws governing the import or domestic use of encryption in the Czech Republic.
On July 8, 1997, Igor Nemec, the Czech Chairman of the Office for the State Information System and Emanuel Ondracek, the Czech Vice Minister for Education, Youth and Sport, endorsed the communiqué ofthe European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
http://www2.echo.lu/bonn/confere nce.htmlDenmark
GREEN
According to Commerce/NSA report, Denmark controls the export and re-export of encryption software pursuant to the Wassenaar Arrangement. There is no evidence that these regulations extend to mass-market software. A validated license is required for exports and to date, none have been denied. Denmark does not differentiate between encryption algorithms of varying strengths.
Denmark regulates the export of strategic goods under a Ministry of Industry executive order dated November 12, 1993. The central element of the executive order is the list of strategic goods that are subject to the export control policy and may only be exported when the Business Policy Ministry has issued a license. The list is composed of products under embargo from the four international control systems, the Missile Technology Control Regime, the Nuclear Nonproliferation Treaty, the Australia Group, and the Wassenaar Arrangement. The executive order has been subsumed by the EU dual-use regulation.
Denmark administratively processes export requests through a board sponsored by the Business Policy Ministry composed of Confederation of Danish Industry representatives and financed by industry. The Confederation of Danish Industry Board stated in response to a query from the U.S. Department of Commerce that individual validated licenses are required for the export of cryptographic equipment and software. The Board stated that no licenses were denied. Thisinformation was contained in Commerce Department Copenhagen Cable 2717, May 31, 1995.
Denmark does not control the import of encryption software. The Commerce/NSA report description of Danish domestic use controls is entirely redacted, a possible result of a classified explanation of Denmark's homologation regulations on its telecommunications network.
In June 1996, the Danish Information Technology Security Council advocated no restrictions on the use of encryption in Denmark, including mandatory key escrow systems. The Council decided that existing judicial search orders were sufficient in gaining access to encryption keys (an opinion also evident in Australia's Walsh Report). The Council also called on the Minister of Research and Information Technology submit to Parliament a Bill on Digital Signatures.
On July 8, 1997, Ms. Jytte Hilden, the Danish Minister of Research and Information Technology, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
http://www.fsk.dk/fsk/presse/970 527.html
http://www2.echo.lu/bonn/confere nce.htmlEstonia
GREEN
In Estonia maintains neither import nor export restrictions on cryptography.
On July 8, 1997, Uno Veering, the Estonian Secretary of State, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: http://www.iaik.tu-graz.ac.at/LEHRE/StudProj/HAINZSILLI/crypto.ak.home.html/
http://www2.echo.lu/bonn/confere nce.html
European Union
GREEN/YELLOW
According to the Commerce/NSA report, in 1992, the European Commission proposed a dual-use regulation as part of the progression to the free market. Since military exports were linked to Member States' national security concerns, control of such exports was deemed to be a matter for individual states. However, with dual-use goods, it was argued that, while military uses were of a national interest, their civil use was in the purview of the European Commission.
Eventually, a compromise was reached. A dual-use Regulation was agreed upon. The basis for the regulation was Article 113 of the Treaty of Rome and a Maastricht-based Common Foreign and Security Policy Joint Action with a series of annexes. The EU's dual-use Regulation (EC No. 3381/94) contains 24 articles and it entered into force on July 1, 1995. Council Decision No. 94/942/CFSP, with 8 articles and 5 annexes, has been appended to it.
The series of regulations, decisions, and annexes state that:
- all Member States recognize the same list of dual-use goods (generally based on the COCOM and Wassenaar lists), destinations, and guidelines.
- the majority of dual-use goods may require, at most, only a general authorization for shipment between member states (and for favored destinations outside the Union - Australia, Canada, Japan, Norway, Switzerland, and the United States).
- a common level of export control should exist throughout the Union.
- an export license issued in one Member State shall normally be valid for the shipment of goods from another Member State.
An October 8, 1997 report by the European Commission's Directorate-General XIII, which is responsible for Telecommunications, Information Market and Exploitation of Research, took issue with the United States' policy of encouraging key escrow and recovery schemes. The report stated that "restricting the use of encryption could well prevent law-abiding companies and citizens from protecting themselves against criminal attacks," adding that key escrow systems "would not . . . totally prevent criminals from using these technologies."On the issue of "back door" mechanisms giving law enforcement and intelligence agencies the right to read the plain text of encrypted messages, the report says that if such systems are required they " should be limited to what is absolutely necessary."
The report was sent by the European Commission to the major bodies of the European Union, including the European Parliament, the Council of Ministers, the Economic and Social Committee and the Committee of the Regions.
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, 1995.
http://www.ispo.cec.be/ei f/policy/97503toc.htmlFalkland Islands
GREEN
According to Mr. D. G. Lang, the Attorney General of the Falkland Islands, there are no laws in the sparsely populated British territory that specificallydeal with the use of cryptography. Mr. Lang informed us that, as Attorney General, he does have legitimate concerns about the possible use of cryptography by criminal organizations in furtherance of international crime or terrorism. However, he said that there is no organized crime on the islands. He did offer his belief that the Falklands government is committed to joining the international effort to combat organized crime and, if the international community were to launch an effort against the use of"uncrackable" cryptography, the Falklands would join in such an effort.
According to the Attorney General, although the Falklands has a Constitutional guarantee respecting the privacy of the individual, this guarantee falls short of an absolute guarantee of privacy. An individual, in the Attorney General's opinion, would probably be unsuccessful in challenging on Constitutional grounds a possible future provision prohibiting or restricting his or her use of cryptographic techniques.
The Attorney General stated that cryptography is used in the Falklands for both business and government operations. He is not opposed to usage by such organizations, but merely the use of cryptography by criminals for criminal purposes.
Since United Kingdom laws do not automatically apply to the territories, the response of the Falkland Islands Attorney General is important in that it may mirror the policies of several of the United Kingdom's remaining territories, including Gibraltar, Bermuda, and the Cayman Islands.
Ref: Attorney General of the Falkland Islands letter dated July 3, 1997.
Finland
GREEN
According to the Ministry of Trade and Industry of Finland:
- Finland has implemented no specific legislation on the domestic use of cryptographic software and hardware. There are no special permit requirements in this respect.
- Finland has implemented no specific legislation on the import of cryptographic software and hardware. There are no import license requirements.
- Finland's national legislation relevant to export controls are:
- Act on the Control of Exports of Dual-Use Goods (562/96).
- Decree on Export Control of Certain Goods (645/96).
- Decision of the Ministry of Trade and Industry on the Goods and Technologies Subject to Export Licensing (645/96).
The national legislation refers to the European export control systems which consists of two legal instruments:
- Council Regulation (EC) No. 3381/94 of 19 December 1994 setting up a Community regime for the control of exports of dual-use goods, with amendment (EC) No. 837/95.
- Council Decision 94/942/CFSP of 19 December 1994 on the joint action adopte by the council on the basis of Article J.3 of the Treaty on European Union concerning the control of exports of dual-use goods (with several amendments - the latest relevant amendment concerning the controls on intra-Community trade of cryptography is 97/419/CFSP of 26 June 1997).
Regulation is directly applicable to all the Member States of the European Union. Finland's control lists (including definitions, general notes, etc.)concerning the export control of cryptographic software and hardware are identical to those agreed to in the Wassenaar Arrangement and the European Union Treaty. The only relevant difference to the controls maintained by the EU is that Finland's national legislation also covers the export of services, including the transfer of intangible technology, e.g., via electronic mail.
- The government agencies responsible for setting policies on the use, importation, and exportation of cryptographic products includethe Ministry of Trade and Industry and the Ministry for Foreign Affairs for export controls and electronic commerce), and the Ministry of Communications, and the Security Police (SUPO) (a component of the Interior Ministry). The Ministry of Finance has started a survey on the need for national information security legislation, including a law on digital signatures. Their work is ongoing.
It is noteworthy to point out the significant differences between the Ministry of Trade and Industry stated policy and that found in the Commerce/NSA report. The report states that "an individual validated license is required to import encryption software." It also states that "Finland regulates the domestic use of cryptography." Based on information contained in State Department Cable Number 3313, 26 May 1995, from the U.S. Embassy in Helsinki, the report states that "export and import regulations on encryption software are not rigorously enforced in Finland."On July 8, 1997, Jan Store of the Finnish Foreign Ministry, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Ministry of Trade and Industry, Helsinki, fax dated July 28, 1997.
http://www2.echo.lu/bonn/confere nce.html
France
RED/YELLOW
The Embassy of France in Washington, D.C. informed us that the Service Central de la Sécurité des Systmes d'Information (SCSSI) is the regulatory body in France as far as cryptography is concerned. SCSSI reports directly to the office of the Prime Minister of France. We contacted that agency in order to ascertain the laws on exports, imports, and domestic usage controls. No response was received.
The Commerce/NSA report states that "France has the most comprehensive cryptologic control and use regime in Europe, and possibly worldwide." On December 29, 1990, France enacted a new law (90-1170) regulating the telecommunications industry. Article 28 of the law specifically addresses encryption and adopts a control and export regime that is far more restrictive than that applied by Wassenaar and its predecessor, COCOM. The law, in order to "preserve the interests of national defense and of internal or external State security" regulates the "supply, export, or use of cryptologic methods or devices." Thus, although foreign cryptographic products may be imported into France without a license they may not be supplied to French users nor used in France without authorization by the Prime Minister.
Based on Decree 92-1358 of December 28, 1992, cryptographic equipment is separated into two categories. The first category includes equipment which "can have no other purpose than authenticating a communication or ensuring the integrity of a transmitted message." Such equipment requires the submission of a statement or declaration to SCSSI. SCSSI routinely allows the supply and use of authentication equipment for use within France and also for export with a minimum of red tape. However, the statement or declaration submitted for supply, use, or export of these devices must provide a "description of the security functions or mechanisms, including a detailed description of the cryptologic algorithm(s) (mathematical formulae) used and the system for the creation, development, and protection of the secret conventions; the software must be provided . . . in the source language."
The second category includes cryptographic methods or devices, which provide for the confidentiality of data or transmissions and cryptologic analysis methods. Supply, use, or export of devices in this category requires prior authorization. The authorization, if provided, will either be a general authorization (i.e., an authorization to supply or export devices to any user) or a private use authorization which restricts supply, export, or use to specifically named individuals or communities. Data that is submitted by the supplier, user, or exporter in order to obtain such authorization is extensive. In general, the information submitted must "describe not only the algorithm for generating a sequence or pseudo-random block, but all the hardware or software facilities, transforming an intelligible plain signal into an unintelligible cryptogram, including generating keys, storing them, managing them, etc."
As far as importing and usingcryptography in France is concerned, there are no restrictions on imports of encryption technology. However, the use and sales must be authorized either through a license application or by a declaration to the office of the Prime Minister, i.e., SCSSI. Users importing encryption software must register the encryption keys with the French government.
On June 18, 1996, the French legislature passed a new law on cryptography, Loi de réglementation des télécommunications , which amended the 1990 law. The law slightly liberalized the use of authentication-only encryption but also introduced the requirement for trusted third party (TTP) systems. However, the law was never enacted and the new Socialist government of Prime Minister Lionel Jospin seemed to change course on France's strict policies on cryptography usage. On August 29, 1997, Industry Minister Christian Pierret said that France would liberalize its encryption policies. "This liberalization of encrypting technology will allow French companies to fully enter the market of electronic commerce currently dominated by U.S. companies," he said.
On July 8, 1997, Christian Pierret, the French Secretary of State for Industry, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of France fax dated June 23, 1997.
A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
"French Leaders Urge Catchup on Internet,"ZDNet News (August 29, 1997)
http://www2.echo.lu/bonn/confere nce.html
Federal Republic of Germany
GREEN
According to the Embassy of the Federal Republic of Germany in Washington, in Germany there are:
- No controls on the use of encryption software or hardware.
- No controls on the import of encryption.
- Export controls on encryption are comparable to those of the United States as they existed until early in 1997.
- Export controls are overseen by the Federal Exports Office of the Ministry of Economics.
German Economics Minister Guenter Rexrodt told the July 8, 1997 European Ministerial Conference on Global Information Networks in Bonn, which was attended by the European Union, Russia, Japan, Canada, and the United States, that Germany favors keeping software encryption unregulated. Rexrodt; Dr. Wolfgang Botsch, the Federal Minister of Post and Telecommunications; Dr. Jurgen Ruttgers, the Federal Minister for Education, Science, Research, and Technology; and Edzard Schmidt-Jortzig, the Federal Minister of Justice, endorsed the communiqué of the ministers conference. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Germany passed the Digital Signature Law (SigG) on June 11, 1997. The digital signature system mandated uses asymmetric encryption. This system requires a secret key to be held by the signer and a public key that certified by a trusted third party. The encryption algorithm to be used is not defined in the law. A separate Digital Signature Ordinance will more than likely specify the algorithm. The law does not specify trusted third parties, but it requires that such parties be licensed by the government communications authority. This authority will certify trusted third parties and create a digital chain of trust for purposes of public key verification.
Ref: Embassy of the Federal Republic of Germany fax
dated June 19, 1997.
Ref: A Study of the International Market for Computer Software
with Encryption , U.S. Department of Commerce and the
National Security Agency, July 1995.
http://www2.echo.lu
/legal/en/news/9709/capter7.html#1
http://www2.echo.lu/bonn/confere
nce.html
GREEN
The Gibraltar Government Mission in Washington did not respond to our survey. However, the government of this British self-governing territory on the southern tip of Spain hosts an Internet gaming site (called InterKeno). Registration is made via the Internet and credit card details submitted on heavily encrypted pages. The government of Gibraltar receives licensing fees from this operation and it is doubtful that they would support a form of key recovery or escrow in order that might result in disruption of the gaming operations.
Ref: http://www. bet4abetterworld.com/general/geninfo.html#Security Information
GREEN
According to the Embassy of Greece in Washington, Greece has no current or projected legislation concerning the use, import, or export of cryptography. It is obvious that the Greek Embassy is not aware of Greece's presumed obligations to the European Union and Wassenaar governing exports of mass market cryptography software as a dual-use item. Also, see the entry for Mount Athos.
;On July 8, 1997, Charalambos Katanidis, the Greek Minister of Transport and Communications and Emmanuel Fragoulis, the Greek Secretary General for Research and Technology, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal andtechnical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of Greece letter dated July 15, 1997.
http://www2.echo.lu/bonn/confere
nce.html
YELLOW
Import and export of cryptography is regulated by the Import and Export (Strategic Commodities) Regulations. Licenses are required for cryptography imports and exports. Authentication cryptography that not usedfor confidentiality purposes is exempt from this requirement.
It is uncertain whether China's strict import - export controls on cryptographic products have been or will be extended to Hong Kong. Such a development would severely restrict Hong Kong's manufacture and export of GSM cellular telephones with their built-in encryption capabilities. Under the British administration, there was little regulation of the telecommunications and IT sectors.
GREEN/YELLOW
Hungary has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographically-enabled mass market software as a dual-use item.
On July 8, 1997, Dr. Karoly Lotz, the Hungarian Minister of Transport, Telecommunications and Water Management, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: http://www2.echo.lu/bonn/conference.html
GREEN
There are no restrictions on import, export, or domestic use of cryptography in Iceland.
On July 8, 1997, Sveinn Thorgrimsson, the Icelandic Minister of Commerce and Industry, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref:
http://www.iaik.tu-graz.ac.at/LEHRE/StudProj/HAINZSILLI/crypto.ak.home.html/
http://www2.echo.lu/bonn/confere
nce.html
YELLOW/RED
According to the Commerce/NSA report, India has a formidable government structure that has exercised a great deal of control regulating foreign trade in items in short supply, rather than controlling defense-related exports for national security reasons. As of May 1994 India had no publicly available guidelines or formal licensing procedures governing exports of munitions or sensitive dual-use commodities. It was felt that all munitions and military items of concern were produced by defense factories that restricted their export. Therefore, India maintained no formal export licensing system for munitions items. In March 1995, India published a list of strategic raw materials and technologies that are subject to export licensing. The list controls equipment and software for encrypted telemetry systems only (missile technology controls form a major portion of the list). No encryption software is controlled by the list. This information was gleaned from State Department New Delhi Cables 8364, May 24, 1994 and 5852, May 3, 1995.
Under an Indo-U.S. memorandum of understanding on trade in sensitive technologies, the government of India has agreed to "facilitate" the import of items appearing on the U.S. Commodity Control List and the U.S. Munitions List. No information is available on Indian import or domestic use controls for cryptography.
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995.
YELLOW
According to the Embassy of Indonesia in Washington, cryptography regulations for domestic use are an entirely new matter for that country. The Commercial Attaché in Washington has been keeping its parent organization in Jakarta informed of developments on the cryptographic front in the United States.
The embassy also informed us that the agency responsible for setting policy on cryptographic exports and imports is the Directorate General of International Trade, a component of the Ministry of Industry and Trade.
Ref: Embassy of the Republic of Indonesia, Office of the Commercial Attaché letter dated July 7, 1997.
UNKNOWN
The Interests Section of Iran at the Embassy of Pakistan in Washington, D.C. informed us that our request for information on encryption laws in Iran had been forwarded to "the appropriate organization in the Islamic republic of Iran to be reviewed." No further information was forthcoming.
Interests Section of the Islamic Republic of Iran, Embassy of Pakistan, Washington, D.C. letter dated July 7, 1997.
GREEN/YELLOW
Ireland has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use item. However, the Irish web site, http://www.efi.ie/pgp/Welcome.html , facilitates the downloading of PGP via the Internet.
A letter from the Irish Development Agency dated February 21, 1994, stated that Ireland does not impose any export restrictions on computer software. The letter concluded that that was the reason that "over 75 overseas software companies" had established operations in Ireland.
On July 8, 1997, Ronald Long, the Irish Assistant Secretary of Enterprise and Employment, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Irish Development Agency letter dtd. February 21,
1994 to Mr. Will Dwyer of Drath and Dwyer.
http://www2.echo.lu/bonn/confere
nce.html
RED
According to the Commerce/NSA report, Israel, like France, has enacted comprehensive regulations regarding the export, import ,and domestic use of encryption products under a Court Order entitled "The Supervision On Products and Utilities (Dealing With Encryption Means), 1974, based upon the Supervision on Products and Utilities Law of 1957." The court order states that a person will not engage in encryption activities, to include import, export, production or use, unless he is licensed by a national manager appointed by the Minister of Defense.
According to State Department Tel Aviv Cable 11049-93, the
"regulation of import and export of encryption devices and
development of encryption technologies is handledby the Ministry
of Defense, the same as the export of arms. Encryption exports
must receive an export license specifying the end-user. A company
wishing to develop encryption technology must first receive a
license from the Ministry of Defense."
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995.
GREEN/YELLOW
According to the Commerce/NSA report, Italy has two distinct laws regulating the export of cryptographic equipment. The first, Number 185 of July 9, 1990, regulates the export of cryptographic equipment as an armament of war and requires approval for all such equipment. This law requires the company wishing to export equipment to seek approval from the Ministry of Foreign Affairs as well as the Ministry of Defense/Chief of Staff for Defense. Law Number 222 of February 27, 1992, and its supplement, Number 114 of May 18, 1994, also control the export of cryptographic equipment. They essentiallyimplement COCOM and, now, Wassenaar guidelines. Although the Ministry of Foreign Trade has principal administrative authority in this area, decisions on export are made by an inter-Ministry commission that includes members from the Ministry of Foreign Affairs, Ministry of Defense, Ministry of Interior, and the Intelligence Services. Licenses are approved or denied based upon economic considerations, Italian national security, and international commitments.
Law 222/92 implies that there is no registration requirement in Italy for manufacturers of encryption products. Although the law allows for general licenses for certain products and destinations, this is not applicable to cryptographic products, where, if the product is controlled, an individual license is required for all destinations. Italy does comply with the General Software Note which decontrols mass-market software, however, this note only applies to general-purpose software (i.e., word processors, databases, etc.) and not to security-specific software. The majority of exports of cryptographic products from Italy are to financial institutions in Western Europe and Latin America. This information was revealed in State Department Rome Cable 08436-93.
On March 15, 1997, the Italian Parliament passed Law 59/97. Article 15 (2) of the law establishes framework for electronically signed documents using digital signatures. The digital signature system uses asymmetric encryption. The technical standards on the encryption keys were to be implemented under a separate. Certificate authorities are to be licensed by the government and escrowed keys are to be held by notaries public.
There are no import control laws for cryptography nor are there any laws governing the domestic use of encryption. Refer to the entry for Campione d'Italia.
On July 8, 1997, Pier Luigi Bersani, the Italian Minister of Industry, Commerce, and Handicrafts and Antonio Maccanico, the Italian Minister of Post and Telecommunications, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995.
http://www2.echo.l
u/legal/en/news/9710/chapter7.html#2
http://www2.echo.lu/bonn/confere
nce.html
YELLOW
According to the Commerce/NSA report, Japan regulates the export of encryption products according to the Foreign Exchange Foreign Trade Control Law, Japanese Law, 416 (1992), and associated Article 15 (7) of the Export Trade Control Order and the Foreign Exchange Control Order. These Cabinet Orders implement COCOM (and now Wassenaar) guidelines on encryption and include the General Software Note decontrolling mass-market products.
According to the Ministry of International Trade and Industry (MITI), there are no import restrictions on cryptographic equipment in Japan. There are no domestic restrictions on the private use of cryptography in Japan. However, the Ministry of Posts and Telecommunications is responsible for regulating private and commercial encryption usage on the national telecommunications network.
On 24 June 1997, Nikkei America reported that MITI tightened export inspections for products using cryptography. MITI initiated stricter export inspection of products incorporating cryptographic technology. MITI announced that it would inspect such items with an eye to nationalsecurity issues and prevention of terrorist activities. The new policy has reduced the trading volume of computers, software and IC cards. It became necessary for exporters to get MITI permission to export products using cryptography and the inspection time has increased from a few weeks to over a month in some cases, said a spokesman for an electric machinery manufacturer. MITI started stricter inspection after the U.S. government revised its regulations in October 1997. It changed the minimum product price requiring inspection from more than 1 million yen to 50,000 yen.
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995.
http://www.jya.com/mitizeal.txt
YELLOW/RED
The Republic of Korea prohibits the importation of cryptographic products. However, PGP is available in Korean from http://esperosun.chungnam. ac.kr/~hdpark/PGP/
UNKNOWN
The Embassy of Kuwait in Washington, D.C. informed us that the Kuwait Information Office in Washington had the information on cryptography regulations we requested. We contacted that office and no further information was forthcoming.
Ref: Embassy of the Sate of Kuwait letter dated August 4, 1997.
GREEN
There are no restrictions on the import, export, and use of
cryptography in Latvia.
On July 8, 1997, Dr. Andris Virtmanis, the Latvian Minister of
Transport, endorsed the communiqué of the European
Ministerial Conference on Global Information Networks in Bonn,
Germany. The communiqué stated the participating ministers
"will work to achieve international availability and free choice
of cryptography products and interoperable services, subject to
applicable law." The ministers also declared that "if countries
take measures in order to protect legitimate needs of lawful
access, they should be proportionate and effective and respect
applicable provisions relating to privacy." The ministers also
took note of the recently agreed OECD Guidelines on Cryptography
policy as a basis for national policies and international
co-operation. The ministers also emphasized "the need for a legal
and technical framework at European and international levels which
ensures compatibility and creates confidence in digital
signatures."
Ref:
http://www.ja.net/CERT/SIRC
E/legislature.html
http://www2.echo.lu/bonn/confere
nce.html
GREEN
Liechtenstein is a noted tax haven on the Swiss-Austrian border. It is not member of the European Union. It maintains strict confidentiality controls on banking and company information held by its firms. Although it did not respond to the letter sent to its U.N. Mission, its banking laws may yield a clue on its feeling on third-party encryption holders. According to its laws, Liechtenstein authorities will not assist third party inquiries relating to foreign tax obligations.
GREEN
According to the Embassy of Lithuania in Washington, there are no laws in Lithuania governing the use, export, or import of cryptography. The Lithuanian Parliament network was queried for information for any proposed legislation. The results were negative. The Embassy informed us that the policies on the use of cryptography in Lithuania would normally come under the jurisdiction of the Ministry of Communications and Informatics in Vilnius.
On July 8, 1997, Rimantas Pleikys, the Lithuanian Minister of Communications and Informatics and Vaidotas Blaziejus Abraitis, the Lithuanian Vice Minister of Communications and Informatics, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of the Republic of Lithuania fax dated June
30, 1997.
http://www2.echo.lu/bonn/confere
nce.html
GREEN/YELLOW
Luxembourg has acceded to the Wassenaar Arrangement and is
presumably committed to restricting the export of
cryptographic-enabled software products as dual-use items.
On July 8, 1997, Mme. Mady Delvaux-Stehres, the Luxembourg
Minister of Social Security, Transport, and Communications,
endorsed the communiqué of the European Ministerial
Conference on Global Information Networks in Bonn, Germany. The
communiqué stated the participating ministers "will work to
achieve international availability and free choice of cryptography
products and interoperable services, subject to applicable law."
The ministers also declared that "if countries take measures in
order to protect legitimate needs of lawful access, they should be
proportionate and effective and respect applicable provisions
relating to privacy." The ministers also took note of the recently
agreed OECD Guidelines on Cryptography policy as a basis for
national policies and international co-operation. The ministers
also emphasized "the need for a legal and technical framework at
European and international levels which ensures compatibility and
creates confidence in digital signatures."
Ref: http://www2.echo.lu/bonn/confere nce.html
YELLOW
There are no import or export controls on cryptography in Malaysia.
However, in May 1997, the Malaysian parliamentpassed a law on digital signatures that provides a framework of legal certainty for electronic transactions. The law provides for key verification and deposit of public keys with trusted third parties. The government licenses the trusted third parties. The law does not specify the technical details for the key escrow system.
See http://www.geocities.com /Tokyo/9239/digisign.htm l for a copy of the bill, which does not mandate key escrow.
Ref: http://www2.echo.lu /legal/en/news/9709/capter7.html#2
GREEN
According to the NIST survey, the Mexican Institute of Foreign Trade governs imports and exports in Mexico. However, no export or import controls were found to cover encryption technology.
Ref: NIST Preliminary Results of Study of Non - U.S. Cryptography Laws/Regulations, September 27, 1993.
GREEN
The Holy Mount is a self-governed part of the Greek state subject to the Ministry of Foreign Affairs in its political aspect and to the Ecumenical Patriarch of Constantinopole(Istanbul) as regards its religious aspect. It is a sort of Greek Orthodox Vatican City without the diplomatic recognition and without the same degree of independence.
It has taken a strong stance against pan-European law enforcement measures and agreements. The monks who live in this monastic republic are strongly committed to personal privacy. The republic's unique status could make it a cryptographic safe haven in Europe. On June 5, 1997 representatives from 20 monasteries of Mount Athos held an meeting to express their views prior to the Greek Parliament's on the ratification of the pan-European Schengen Agreement on law enforcement. If Athens attempted to implement the agreement, the monks stressed, the state would find itself up against all of Mount Athos' monks "as conscientious objectors."
Ref: Athens News Agency Bulletin (No 1202), June 3,
1997.
http://www-media.dbnet.ece.
ntua.gr/Athos.html
GREEN
According to the Honorary Counsel of Nauru in the United Kingdom, there are no applicable laws in Nauru governing the use, import, or export of cryptography. The responsible office for determining any such future policies is the Secretariat for External Affairs in Nauru. Nauru is an independent island in the central Pacific that is eight square miles with a population of 8,000.
Ref: Republic of Nauru Honorary Counsel, Sevenoaks, UK fax dated June 27, 1997.
GREEN/YELLOW
According to the Commerce/NSA report, The Import and Export Act of 1963 serves as the basis for export regulations in the Netherlands. Specific regulations are found in the Decree on Export of Strategic Goods and its Annex which essentially implements the Wassenaar Arrangement and the strategic control lists. The Ministry of Economic Affairs is the principal agencyin charge of licensing and enforcement of export controls. The export of cryptographic equipment from the Netherlands requires an individual license for all nations except Belgium and Luxembourg.
The National Communications Security Agency (NCSA) has theresponsibility for the determination regarding the impact of any specific export of cryptographic equipment might have on national security. The Commerce/NSA report heavily redacts further information on the activities of the NCSA, although it is known that this agency performs many of the functions of the NSA.
There are no import restrictions for cryptographic products. The Commerce/NSA report totally redacts information on the domestic use prohibitions in the Netherlands. This more than likely is a result of a classified description of the homologation tactics employed by the Netherlands PTT in restricting encryption from the national public communications network.
In March 1994, the Netherlands advanced a parliamentary bill that would have prohibited the possession, use, and marketing of powerful encryption products without a license. After a national outcry, the bill was withdrawn.
On July 8, 1997, Mrs. Annemarie Jorritsma-Lebbink, the Dutch Minister of Transport, Public Works, and Water Management and Dr. Hans Wijers, the Dutch Minister of Economic Affairs, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve internationalavailability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995.
http://www2.echo.lu/bonn/confere
nce.html
GREEN/YELLOW
The Cabinet Minister for the Netherlands Antilles in s'Gravenhage, the Netherlands informed us that the Department of Justice of the Netherlands Antilles located in Willemstad, Curaçao had responsibility for establishing a policy on the use of cryptography.
Ref: Het Kabinet Van De Gevolmachtigde Minister Van De Nederlandse Antillen fax dated June 30, 1997.
GREEN/YELLOW
According to the Commerce/NSA report, New Zealand treats encryption software as a dual-use item and requires an export license. The governing legislation is the Export Prohibition Regulations of 1953 and the Customs Act of 1966. Export permits are issued by the Customs Department on the advice of the Ministry of Foreign Affairs and Trade (MFAT). The Customs Act's Section 54, "Prohibited Exports", states that"The Governor-General may from time to time, by Order in Council, prohibit the exportation from New Zealand of any specified goods or goods of a specified class or classes" (followed by a list of specific conditions on prohibitions). The Commerce/NSA report fails to mention the influence of the Government Communications Security Board (GCSB) in approving encryption exports. The GCSB is the NSA's equivalent and partner in New Zealand. The entity within MFAT which handles export controls is the International Security and Arms Control Division. It is advised by the GCSB.
The New Zealand government relies on the United States government's export policies as a guideline for acceptability. No formal licenses have been denied recently, although some license requests have been informally discouraged.
New Zealand has no controls over importation or domestic use of encryption software.
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
UNKNOWN
We were informed that the Center for Exports and Imports (CEI) in Managua, Nicaragua was responsible for cryptography exports and imports in Nicaragua. Follow-up correspondence with that agency yielded no further information.
Ref: Phone call from Mr. Norman Zavala, CEI, Managua, Nicaragua.
GREEN
Norfolk Island is a self-governing Australian territory located in the Tasman Sea east of Australia. It is offering Internet domain registration (.nf) free from government restrictions.
Norfolk Island is selling off Internet domain names on a first come - first served basis. The island is using the proceeds to fund a high-speed link to the Internet from the island. The restriction-free aspect of Norfolk Island makes it yet another attractive cryptographic safe haven.
Ref:
http://www.names.nf
GREEN
According to the Commerce/NSA report, Norway's export controls are based on Act No. 93 of December 18, 1987 (Royal Decree No. 967) relating to the control of the export of strategic goods, services, technology, etc. and Regulation No. 51 of January 10, 1989 relating to the implementation of the control of the export of strategic goods, services, and technology issued by the Ministry of Foreign Affairs. The Ministry of Foreign Affairs, Section for Export and Import Controls is the final authority for the approval or denial of export licenses.
There are no import controls in Norway. The Commerce/NSA report's section on domestic use prohibitions is totally redacted. This may be a result of classified homologation procedures, instituted by the Norwegian PTT, being described.
On July 8, 1997, Bendik Rugaas, the Norwegian Minister of National Planning and Coordination; Nils A. Rohne, the Norwegian Secretaryof State for Trade and Industry; and Torstein Rudihagen, the Norwegian Secretary of State for Transport and Communications, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
The latest version of PGP (ver. 5.0) is available from the Norwegian web site ( http://www.ifi.uio.no/pgp/ ).
Ref: A Study of the International Market for
Computer Software with Encryption , U.S. Department of
Commerce and the National Security Agency, July 1995
http://www2.echo.lu/bonn/confere
nce.html
RED
Pakistan apparently prohibits the use of voice encryption technology.
Ref: Bert-Jaap Koops, "A Survey of Cryptography Laws."
GREEN
The Embassy of Papua New Guinea in Washington informed us that they were not aware of any laws in their country concerning cryptography. However, they informed us that jurisdiction for the technology was under the purview of the Department of the Attorney General.
Ref: Embassy of Papua New Guinea letter dated August 19, 1997.
GREEN
The use of cryptography is not currently controlled by the Philippines.
GREEN/YELLOW
The Embassy of Poland in Washington informed us that they had no information on the use of encryption in Poland.
According to the Commerce/NSA report, trade in encryption
software is controlled as a military item by the Special Turnover
Department of the Ministry of Foreign Economic Relations (MFER).
The Department issues special concessions in coordination with the
Export Control Department of the MFER, which is responsible for
dual-use commodities.
Encryption software is evaluated on a case-by-case basis. Poland
acceded to the Wassenaar Arrangement in July 1996, thereby
presumably agreeing to control the export of cryptography as a
dual use (civilian-military) good.
On July 8, 1997, A. Zielinski, the Polish Minister of Telecommunications and Ms. M. Koslowska, the Polish Undersecretary of State for the State Committee for Scientific Research, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
PGP is available in Polish from
http://pipeta.chemia.pk.ed
u.pl/~kravietz/pgp .
Ref: Embassy of the Republic of Poland fax dated July 18,
1997.
A Study of the International Market for Computer Software with
Encryption , U.S. Department of Commerce and the National
Security Agency, July 1995.
http://www2.echo.lu/bonn/confere
nce.html
GREEN/YELLOW
Portugal has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use item.
On July 8, 1997, Joao Cravinho, the Portuguese Minister for Infrastructure; M. Gago,the Portuguese Minister of Science and Technology; Dr. Leonor Coutinho, the Portuguese Secretary of State for Housing and Telecommunications; and Jose Penedos, the Portuguese Secretary of State for Industry and Economy, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
PGP is available in Portuguese from
http://eunice.dei.uc.pt/pgp
.
Ref:
http://www2.echo.lu/bonn/confere
nce.html
GREEN/YELLOW
Romania has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use item.
On July 8, 1997, Sorin Pantis, the Romanian Minister of Communications; Eugen Constantin Isbasoiu, the Romanian Secretary of State for Education; Mircea Pusca, the Romanian Secretary of State for Research and Technology; Iustin Tanase, the Romanian Secretary of State for the National Commission for Informatics; and Sebastian Vladescu, the RomanianSecretary of State for Commerce and Industry, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need fora legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: http://www2.echo.lu/bonn/confere nce.html
RED
According to the Commerce NSA report, upon the disintegration of the U.S.S.R., the President of Russia issued five degrees of February 22, March 27, April 11, May 12, and July 5, 1992 (Nos. 179,312, 388, 469, and 507), which, together with the Law on Defense Industry Conversion, laid down certain legal foundations for a national armaments and military technologies control system. These decrees were consolidated in 1994 by the "Statute on Controls of Exports from the Russian Federation of Certain Types of Raw and Processed Materials, Equipment, Technology, Scientific and Technical Information Which Can Be Used in the Production of Weapons or Military Equipment" as ratified by the President of the Russian Federation under Decree 74 dated February 11, 1994. Included in this statute is a list of commodities, which require an individually approved license, issued by the Ministry of Foreign Economic Relations for export from Russia. Cryptographic equipment and software (including mass-market) is identifiedin the list of commodities requiring individually approved export licenses.
Section 5 of Edict Number 334, of April 3, 1995, issued by the President of Russia prohibits the import of cryptographic products without a license.
Section 4 of Edict Number 334, of April 3, 1995, issued by the President of Russia prohibits all activities in the development, sale, and use of cryptography without a license issued by the Federal Agency for Government Communications and Information ( FAPSI ), Russia's equivalent of the NSA..
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
GREEN
According to the NIST survey, Saudi Arabia has no import or export controls on cryptography in effect.
Ref: NIST Preliminary Results of Study of Non - U.S. Cryptography Laws/Regulations, September 27, 1993.
RED
According to the Singapore Trade Development Board:
"The import of scrambler, or encryption hardwareor software capable of re-arranging signs, signals, writing, sounds, or intelligence for the purpose of secrecy is controlled by the Trade Development Board (TBD) under the First Schedule of the Regulation of Imports and Exports Regulations 1995."
"Prior written approval from the TDB must be obtained before the import is allowed into Singapore. To apply for the import approval, an importer is required to complete the 'Application to Import Encryption Hardware/Software' and submit it to the TDB for consideration. TDB requires the importer to furnish the technical specifications of the encryptor and to provide the end-user's justification for the use of the encryptor. The importer must be a company incorporated or registered in Singapore."
"TDB will notify the importer in writing of the outcome of his Application. If the importer is allowed, the importer should also apply for a license from the Telecommunications Authority of Singapore (TAS), Licensing Department, to use the encryptor (for hardware only)."
This information was contained in a letter to EPIC from Ms Ruby Goh, Trade Officer in the Imports and Exports Office. No mention was made of export controls. There do not, therefore, seem to be export controls in place in Singapore.
Similarly, no mention was made of domestic use controls, although the rigidity of the import controls indicate that domestic freedom of use is severely restricted.
Ref: Singapore Trade Development Board fax dated August 11, 1997.
GREEN/YELLOW
The Commercial and Economic Section of the Embassy of Slovakia in New York informed us that they had no information on encryption laws being enacted in Slovakia. Oddly, however, they referred us to the Foreign Commercial Service of the U.S. Embassy in Bratislava for information on Slovak laws.
The role of the American Embassy more than likely reflects Slovakia's adherence to the post-COCOM Wassenaar Arrangement, to which Slovakia acceded in July 1996. Wassenaar establishes controls on the export of dual military and civilian use goods. Cryptographic-enabled software is deemed a dual-use item.
On July 8, 1997, Jan Jasovsky, the Slovak Minister of Transport, Posts, and Telecommunications, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of the Slovak Republic, Commercial and
Economic Section, New York fax dated July 25, 1997.
http://www2.echo.lu/bonn/confere
nce.html
GREEN
Our letter to the Slovenian Embassy was not answered. However, PGP is available from the Slovenian web site http://www.e5.ijs.si /security/wwwpks/pks-toplev.html .
On July 8, 1997, Lojze Marincek, the Slovenian Minister of Science and Technology and Miro Rozman, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref:
http://www2.echo.lu/bonn/confere
nce.html
YELLOW
According to the Commerce/NSA report, the South African government controls encryption as a dual-use item on the General Armaments Control Schedule. Exports of encryption require an individual validated license. The control of encryption is under the jurisdiction of the South African Department of Defense Armaments Development and Protection Act, 1968, No. R. 888, published on May 13, 1994.
An individual validated license is required for the import of encryption software. A valid permitfrom the Armaments Control Division is required for the import or transportation of cryptographic equipment or software. This information is gleaned from State Department Johannesburg Cable 000951, June 23, 1995.
Ref: A Study of the International Market for Computer Software with Encryption , U.S. Department of Commerce and the National Security Agency, July 1995.
YELLOW
According to the Directorate General of Telecommunications in Madrid, Spain has in force administrative and legal measures to implement the European Union Council Resolution of January 17, 1995 on the lawful interception of telecommunications, 9529 / 95 ENFPOL (there are no specific laws in Spain).
In every telecommunications service regulation, service providers (and other agents) are reminded of their obligation to decrypt intercepted communications for the legal authorities. This is called out in Article 579 of the Law on Criminal Investigations.
The government agency responsible for cryptography export and import controls is the Directorate General for Foreign Commerce (within the Ministry of Economics). The department responsible for regulating the domestic use of encryption is the Directorate General of Telecommunications (within the Ministry of Planning).
According to the Commerce/NSA report, Spain adopted export regulations conforming to COCOM on May 28, 1993. Spain later acceded to the Wassenaar Arrangement in 1995. The Spanish law is codified in Royal Decree 824/1993 and its annexes which are dated September 21, 1993. The legislation establishes an inter-governmental committee to review export license applications as well as establish necessary policies in this area. The committee, the Junta Interministerial Reguladora del Comercio de Material de Defensa y Doble Uso (JIMDDU), is presided over by the Secretary General for Commerce and includes representatives of the Defense Directorates and Foreign Affairs and Economic Ministries. Licenses are approved or denied on an individual basis dependent upon the effects on Spanishforeign policy or national defense as well as international commitments.
Most exports from Spain require an individually validated license for all destinations, although the law does make provision for general licenses and distribution licenses. Security products containing confidentiality features require individual licensing, even for European Union and Wassenaar Arrangement member nations. Exceptions may be granted for mass-market software products.
The formulation of national cryptographic policies for Spain is under the authority of the Director General of the Centro Superior de Informacion de la Defensa (CESID), the Spanish intelligence service that comes under the control of the Ministry of Defense.
Import authorizations are also addressed by RoyalDecree 824/1993 and licenses are required for articles listed in Annex 6. Cryptographic products are exempt from licensing although Spain will supply import certificates for cryptographic products if required by the exporting country for delivery certification.
Although no Spanish law specifically regulates the public use of cryptography, a State Department Madrid Cable 120521Z AUG 94 states that, based on discussions with Public Works officials, "The Ministries of Interior, Public Works, and Trade are the key regulators of the private use of encryption. Outside of government agencies and law enforcement and bank data transfer networks, the use of private encryption is not currently authorized." This is at variance with the Planning Ministry's contention that telecommunications providers are obligated provide decrypted communications to legal authorities.
On July 8, 1997 Josep Pique I Camps, the Spanish Minister of Industry and Energy, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers"will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
PGP is available in Catalan from http://diable.upc.es/~marcos/pgp. html .
Ref: Ministry of Planning, Madrid fax dated July 21,
1997.
A Study of the International Market for Computer Software with
Encryption , U.S. Department of Commerce and the National
Security Agency, July 1995.
http://www2.echo.lu/bonn/confere
nce.html
GREEN
According to the Embassy of Swaziland in Washington, the
country does not have policies on the importation, exportation, or
domestic uses of cryptographic hardware or software.
Ref: Embassy of the Kingdom of Swaziland letter dated August 6,
1997.
GREEN
According to the Embassy of Sweden in Washington there are in Sweden:
The Commerce/NSA report concurs that there are no import or
domestic user restrictions in Sweden.
On July 8, 1997 Peter Nygards, the Swedish Secretary of State
for Industry and Trade, endorsed the communiqué of the
European Ministerial Conference on Global Information Networks in
Bonn, Germany. The communiqué stated the participating
ministers "will work to achieve international availability and
free choice of cryptography products and interoperable services,
subject to applicable law." The ministers also declared that "if
countries take measures in order to protect legitimate needs of
lawful access, they should be proportionate and effective and
respect applicable provisions relating to privacy." The ministers
also took note of the recently agreed OECD Guidelines on
Cryptography policy as a basis for national policies and
international co-operation. The ministers also emphasized "the
need for a legal and technical framework at European and
international levels which ensures compatibility and creates
confidence in digital signatures."
Ref: Embassy of Sweden letter dated July 22, 1997.
A Study of the International Market for Computer Software with
Encryption , U.S. Department of Commerce and the National
Security Agency, July 1995.
http://www2.echo.lu/bonn/confere
nce.html
GREEN
The Embassy of Switzerland in Washington responded in quite some detail on its cryptographic policies.
The export and re-export of cryptographic hardware, software, and
technology listed in the aforementioned ordinance requires an
individual validated license. However, deliveries to end-users in
the countries that are members of all the four international
export control regimes (i.e., AG, MTCR, NSG, and WA) are exempted
from the license obligation.
The Swiss Federal Office of Foreign Economic Affairs (FOFEA) is the licensing agency. The specific criteria considered in determining whether to grant a license are those of the WA, namely "to prevent the acquisition of armaments and sensitive dual-use items for military end-uses, if the situation in a region or the behavior of a state is, or becomes, a serious concern for the participating states."
The transit is subject to a limited prohibition. If the country of origin restricts the export of the products listed in the annex (e.g., cryptographic products), their transit is forbidden if it cannot be proven (e.g., with a license) that the transfer to the new country of destination is in accordance with the legislation of the country of origin.
The Commerce/NSA report concurs that there are no import or
domestic use restrictions in Switzerland.
On July 8, 1997 Franz Blankart of the Swiss FOFEA, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers "will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: Embassy of Switzerland letter dated June 31, 1997.
A Study of the International Market for Computer Software with
Encryption , U.S. Department of Commerce and the National
Security Agency, July 1995.
http://www2.echo.lu/bonn/confere
nce.html
YELLOW
We were informed by the Economic Division of the Taipei Economic and Cultural representative Office in Washington (Taiwan's de facto embassy) that the Republic of China's Research, Development, and Evaluation Commission of the Executive Yuan had prepared a report on the "Establishment of a Public Key Infrastructure" in Taiwan. The PKI initiative calls for the setting up of a root Certificate Authority (CA) and the development of national "trust chains." The government's proposal states that "any private or public organization that wishes to act as a CA may do so only after applying for and receiving a license from the designated [government] agency." The responsible agencies are indicated as the Research, Development, and Evaluation Commission of the Executive Yuan, the Ministry of Economic Affairs, and the Ministry of Justice. The proposal also states that "After taking into consideration the needs of national security, economic development, law enforcement, and personal privacy, a feasible 'key escrow and recovery' scheme should be devised on the basis of experience gained in Europe and America." The report also recommends that "to meet the needs of universal electronic commerce and electronic government, a 'national electronic signature authentication system' should be implemented in coordination with the issuance of personal identification cards containing embedded IC [integrated circuit] chips."
According to the Commerce/NSA report, Taiwan is an active importer of encryption software, with the United States claiming fifty-six percent of the market. There are no reported domestic use restrictions, however, Taiwan is a party to the Wassenaar Arrangement and is committed to restricting the export of cryptographic products.
PGP in Chinese is available from Taiwan via the Internet at
http://pgp.tnjc.edu.tw/cpgp.html
.
Ref: Taipei Economic and Cultural Representative Office,
Washington, DC letter dated September 23, 1997.
A Study of the International Market for Computer Software with
Encryption , U.S. Department of Commerce and the National
Security Agency, July 1995.
GREEN
According to the Office of Tibet in London, the Government-in-exile currently does not use cryptography and has no policies in place on its use.
Ref: Office of Tibet e-mail dated July 1, 1997.
YELLOW
Turkey has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use item.
YELLOW
Ukraine has acceded to the Wassenaar Arrangement and is presumably committed to restricting the export of cryptographic-enabled software as a dual-use item.
GREEN/YELLOW
According to the Commerce/NSA report, the United Kingdom exportcontrols of cryptographic products are detailed in Export of Goods Control Orders (EGCO), the latest version of which is dated April 24, 1994. These statutory instruments derive their authority from the Import, Export, and Customs Defence Act of 1939. The EGCO stipulates that no form of information security material, technology, or technique may be exported without an export license. The order makes no distinction between products designated for "government-classified" or "commercial" encryption purposes and makes no specific reference to the Data Encryption Standard (DES) or any other algorithm. It reflects the details of COCOM lists and, subsequently, Wassenaar amendments.
According to the Department of Trade and Industry (DTI), "an export license may be obtained by applying to the DTI. In practice, however, UK vendors of these goods also send a fax of their applications to the Communications and Electronics Security Group (CESG), simultaneously with the transmittal of the application to DTI so as to speed up the decision process. CESG is part of GCHQ, the UK's NSA equivalent, but has a separate identity to facilitate work with unclassified commercial entities. CESG reviews the application and (on paper) advises DTI of its view. In practice, DTI generallyfollows the CESG recommendation and does not approve the export item that CESG finds unacceptable."
According to DTI's Export Control Organization Notice STU/1 (Ref: STU/9/3/2 Issue 14, November 1996), the United Kingdom has sanctions and partial or total embargoes in place against Angola, Iraq, Libya, Argentina, Armenia, Azerbaijan, Bosnia and Herzegovina, China, Croatia, Iran, Liberia, Montenegro, Myanmar (Burma), Nigeria, Rwanda, Serbia, Somalia, Taiwan, the states of former Yugoslavia, and Congo (Kinshasa).
There are no import controls on cryptologic products in the United Kingdom. There do not appear to be any domestic use restrictions.
The United Kingdom began a Public Consultation on the regulation of Trusted Third Parties (TTPs) for the provisionof encryption services. This resulted in the release of the DTI Public Consultation Paper on detailed proposals for legislation on the Licensing of TTPs for the provision of encryption service (March 1997). The election of a new Labour government has resulted in a moratorium on the proposed legislation with strong indications that Labour may stand by its campaign pledge of not introducing any controls on the use of encryption in the United Kingdom. Labour's stand on cryptography is spelled out as follows:
The only power we would wish to give to the authorities, in order to pursue a defined legitimate anti-criminal purpose, would be to enable decryption to be demanded under judicial warrant (in the same way that a warrant is required in order to search someone's home).
Attempts to control the use of encryption technology are wrong in principle, unworkable in practice, and damaging to the long-term economic value of the information networks. There is no fundamental difference between an encrypted file and a locked safe. A safe may be effectively impregnable in that the effort taken to open it would destroy the contents. An encryption algorithm, similarly, may be effectively unbreakable.
Furthermore, the rate of change of technology and the ease with which ideas or computer software can be disseminated over the Internet and other networks make technical solutions unworkable. Adequate controls can be put in place based around current laws covering search and seizure and thedisclosure of information. It is not necessary to criminalise a large section of the network-using public to control the activities of a very small minority of law-breakers."
On July 8, 1997 John Battle the British Minister for Science, Energy and Industry, endorsed the communiqué of the European Ministerial Conference on Global Information Networks in Bonn, Germany. The communiqué stated the participating ministers"will work to achieve international availability and free choice of cryptography products and interoperable services, subject to applicable law." The ministers also declared that "if countries take measures in order to protect legitimate needs of lawful access, they should be proportionate and effective and respect applicable provisions relating to privacy." The ministers also took note of the recently agreed OECD Guidelines on Cryptography policy as a basis for national policies and international co-operation. The ministers also emphasized "the need for a legal and technical framework at European and international levels which ensures compatibility and creates confidence in digital signatures."
Ref: A Study of the International Market for Computer
Software with Encryption , U.S. Department of Commerce and
the National Security Agency, July 1995.
http://www.labou
r.org.uk/views/info-highway/content.html
http://www2.echo.lu/bonn/confere
nce.html
YELLOW/RED
In February 1996, the International Traffic in Arms Regulations (ITAR) was amended to permit the temporary export of personal use encryption software. Licenses were waived in these cases, provided the user adequately provided security for the encryption software while traveling overseas.
In 1996, the International Traffic in Arms Regulation governing the export of cryptography was overhauled. Responsibility for cryptography exports was transferred to the Department of Commerce from the Department of State. However, the Department of Justice is now part of the export review process. In addition, the National Security Agency (NSA) remains the final arbiter of whether to grant encryption products export licenses and it has staff assigned to the Commerce Department and many other federal agencies that deal with encryption policy and standards, including the State Department, Justice Department, National Institute for Standards and Technology (NIST), and the Federal Communications Commission. Cryptography that embeds key recovery mechanisms receives favorable treatment in the decision-making process.
Export licenses are considered for different categories of
encryption items. These are:
- mass-market encryption software may be freely exported after a one-time review.
- " key recovery" cryptographic products are eligible for an export license to non-embargoed countries.
- 56-bit cryptography can be granted a six-month export license after a one-time review, provided the exporting vendor commits to incorporating key recovery features within two years. After two years, the export of non- key recovery 56-bit cryptography will be once again prohibited again
- Other encryption items may receive export licenses on a case-by-case basis.
- Encryption"technology" may be licensed for export on a case-by-case basis.
There are no import restrictions on cryptography. There are no
domestic use controls on cryptography.
However, on September 3, 1997, Federal Bureau of Investigation
(FBI) Director Louis Freeh called for congressionalpassage of the
Secure Public Networks Act, which would require all U.S.
encryption products to have a backdoor for law enforcement and
other government access. Freeh stated that "mandatory key
recovery, to the extent that it was implemented, would be the best
law enforcement solution" for the administration.
The FBI sponsored legislation would require all manufacturers of
encryption products and network services to include key recovery
or escrow mechanisms that would that would provide the government
with "immediate decryption of communications or electronic
information encrypted by such products or services on the public
network." The FBI-supported legislation would also empower the
Attorney General to act as final arbiter of whether an encryption
method conforms to government eavesdropping standards. No new
technology with encryption mechanisms would be able to be
manufactured, sold, resold, distributed or imported without the
prior approval of the chief law enforcement official of the United
States.
In California, Senate Bill 1133 (an act relating to encryption) was introduced on Febraury 28, 1997. The bill cautions the Federal government against adopting a mandatory key recovery system. Specifically, the bill states:
"The key recovery period will not solve government of
industry's needs. The administration's current policy will not
solve the concerns of law enforcement and national security, and
there is little or no market demand for key recovery cryptography
(KRC) for
electronic communications. Without a comprehensive multilateral
agreement prohibiting the sale of non-KRC, law enforcement targets
will have access to non-KRC from foreign sources. Customers prefer
non-KRC and are unlikely to use key recovery products when they
can buy non-KRC. The administration's current policy would deny
United
States companies the ability to offer competitive products to the
world market; this will adversely affect jobs and the
economy."
The OECD Recommendation is a non-binding agreement that identifies the basic issues that countries should consider in drawing up cryptography policies at the national and international level.The Recommendation culminates one year of intensive talks to draft the Guidelines.
The OECD Guidelines state "the need for Guidelines emerged from the explosive worldwide growth of information and communications networks and technologies and the requirement for effective protection of the data which is transmitted and stored on those systems. Cryptography is a fundamental tool in a comprehensive data security system. Cryptography can also ensure confidentiality and integrity of data and provide mechanisms for authentication and non-repudiation for use in electronic commerce."
"Governments want to encourage the use of cryptography for its data protection benefits and commercial applications, but they are challenged to draft cryptography policies which balance the various interest at stake, including privacy, law enforcement, national security, technology development and commerce. International consultation and co-operation must drive cryptography policy because of the inherently international nature of information and communications networks and the difficulties of defining and enforcing jurisdictional boundaries in the new global environment."
"The Guidelines are intended to promote the use of cryptography, to develop electronic commerce through a varietyof commercial applications, to bolster user confidence in networks, and to provide for data security and privacy protection."
"Some OECD Member countries have already implemented policies and laws on cryptography, and many countries are still developing them. Failure to co-ordinate these national policies at the international level could introduce obstacles to the evolution of national and global information and communications networks and could impede international trade. OECD governments have recognised the importance of international co-operation, and the OECD has contributed by developing consensus on specific policy and regulatory issues related to cryptography and, more broadly, to information and communications networks and technologies."
The Guidelines set out eight basic Principles for cryptography policy:
1.Cryptographic methods should be trustworthy in order to
generate confidence in the use of information and communications
systems.
2.Users should have a right to choose any cryptographic method,
subject to applicable law.
3.Cryptographic methods should be developed in response to the
needs, demands and responsibilities of individuals, businesses and
governments.
4.Technical standards, criteria and protocols for cryptographic methods should be developed and promulgated at the national and international level.
5.The fundamental rights of individuals to privacy, including
secrecy of communications and protection of personal data, should
be respected in national cryptography policies and in the
implementation and use of cryptographic methods.
6.National cryptography policies may allow lawful access to
plaintext, or cryptographic keys, of encrypted data. These
policies must respect the other principles contained in the
guidelines to the greatest extent possible.
7.Whether established by contract or legislation, the liability of
individuals and entities that offer cryptographic services or hold
or access cryptographic keys should be clearly stated.
8.Governments should co-operate to co-ordinate cryptography policies. As part of this effort, governments should remove, or avoid creating in the name of cryptography policy, unjustified obstacles to trade.
Subject to legal privileges or protection, investigating authorities should have the power to order persons who have data in a computer system under their control to provide all necessary information to enable access to a computer system and the data therein. Criminal procedure law should ensure that a similar order can be given to other persons who have knowledge about the functioning of the computer system or measures applied to secure the data therein.
Specific obligations should be imposed on operators of public and private networks that offer telecommunications services to the public to avail themselves of all necessary technical measures that enable the interception of telecommunications by the investigating authorities.
Specific obligations should be imposed on service providers who offer telecommunications services to the public, either through public or private networks, to provide information to identify the user, when so ordered by the competent investigating authority.
Measures should be considered to minimise the negative effects of the use of cryptography on the investigation of criminal offenses, without affecting its legitimate use more than is strictly necessary.
Ref: http://www.privacy.org/pi/intl_orgs/coe/info_tech_1995.html
Return to the Main Text of the Report