Professional Documents
Culture Documents
public document.
[The material follows:]
268
Assistant Attorney General
Office of Legal Counsel
Department of Justice
Washington, DC 20530
11 May 78
http://www.jya.com/itar082180.txt
12/28/2010
Page 8 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 9 of 23
S. 123.05(c).
http://www.jya.com/itar082180.txt
12/28/2010
Page 10 of 23
imposes.
- 4 272
The First Amendment Issues
The ITAR requirement of a license as a prerequisite to "exports" of
cryptographic information clearly raises First Amendment questions
of prior restraint.[n.8] As far as we have been able to determine, the
First Amendment implications of the ITAR have received scant
judicial attention.
The Ninth Circuit presently has a case under consideration which
squarely presents a First Amendment challenge to the ITAR and
could serve as a vehicle for the first comprehensive judicial analysis
of its constitutionality. In that case, United States v. Edler, No. 763370, the defendants, Edler Industries, Inc. and Vernon Edler its
president, were charged with exporting without a license technical
data and assistance relating to the fabrication of missile components.
Although the State Department had denied defendants an export
license to provide technical data and assistance to a French aerospace
firm, the government alleged that defendants nonetheless delivered
data and information to the French during meetings in both France
and the United States. Defendants were tried before a Jury and found
guilty. The trial court, the United States District Court for the Central
District of California, did not issue an opinion in the case. On appeal,
the defendants contend that the ITAR is both overbroad and
establishes an unconstitutional prior restraint. The government's
rejoinder to those claims is that the ITAR licensing provisions involve
conduct not speech and that any effect upon First Amendment
freedoms is merely incidental
=========
[n.8] In addition, the regulatory provisions present questions of
overbreadth and vagueness. "Overbreadth" is a First Amendment
doctrine invalidating statutes which encompass, in a substantial
number of their applications, both protected and unprotected
activity. The "vagueness" concept, on the other hand, originally
derives from the due process guarantee, and applies where language
of a statute is insufficiently clear to provide notice of the activity
prohibited. The same statute or regulation may raise overlapping
questions under both doctrines.
=========
- 5 273
and therefore valid. We anticipate that the resolution of these issues
by the Ninth Circuit may provide substantial guidance as to the First
Amendment implications of the ITAR. [n.9]
The only published decision addressing a First Amendment challenge
to the ITAR of which we are aware is United States v. Donas-Botto,
363 F.Supp. 191 (E.D. Mich. 1973), aff'd sub nom. United States v.
Van Hee, 531 F.2d 352 (6th Cir. 1976). The defendants in that case
were charged with conspiracy to export technical data concerning a
Munitions List item without first obtaining an export license or
written State Department approval. The exports by the defendants
http://www.jya.com/itar082180.txt
12/28/2010
Page 11 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 12 of 23
Id. at 1313. The general principle we derive from the case is that a
prior restraint on disclosure of information generated by or obtained
from the government is justifiable under the First Amendment only
to the extent that the information is properly classified or
classifiable.
=========
[n.11] It is not clear from reading the district court's opinion on what
First Amendment ground or grounds the defendants based their
unsuccessful motion to dismiss.
=========
- 7 275
Our research into areas in which the government has restricted
disclosure of nongovernmental information provided little additional
guidance. Perhaps the closest analog to controls over public
cryptography are the controls over atomic energy research. [n.12]
Under the Atomic Energy Act of 1954, 42 U.S.C. S 2011 et seq.
(1970), all atomic energy information, whether developed by the
government or by private researchers, is automatically classified at
its creation and subjected to strict nondisclosure controls. [n.13]
Although neither the Atomic Energy Act nor its accompanying
regulations establish formal procedures for prior review of proposed
atomic energy publications, the Atomic Energy Commission (whose
functions are now divided
=========
[n.12] Atomic energy research is similar in a number of ways to
cryptographic research. Development in both fields has been
dominated by government. The results of government created or
sponsored research in both fields have been automatically classified
because of the imminent danger to national security flowing from
disclosure. Yet meaningful research in the fields may be done
without access to government information. The results of both atomic
energy and cryptographic research have significant nongovernmental
uses in addition to military use. The principal difference between the
fields is that many atomic energy researchers must depend upon the
government to obtain the radioactive source materials necessary in
their research. Cryptographers, however, need only obtain access to
an adequate computer.
[n.13] See Green, Information Control and Atomic Power
Development, 21 Law and Contemporary Problems 91 (1956)
Newman, Control of Information Related to Atomic Energy, 56 Yale
L.J. 769 (1947). The Atomic Energy Act uses the term "Restricted
Data" to describe information which the government believes
requires protection in the interest of national security. "Restricted
data" is defined in 42 U.S.C. s. 2014(4). The information control
provisions of the Act are set out at 42 U.S.C. ss. 2161-2164.
=========
- 8 276
between the Nuclear Regulatory Commission and the Department of
Energy) has been empowered to maintain control over publications
http://www.jya.com/itar082180.txt
12/28/2010
Page 13 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 14 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 15 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 16 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 17 of 23
==========
[n.19] In stressing the differences between cryptographic
information and other forms of expression we do not mean to imply
that the protections of the First Amendment are not applicable to
cryptographic information or that they are confined to the exposition
of ideas. See Winters v. New York, 333 U.S. 507, 510 (1948). We
recognize that the scope of the amendment is broad. It encompasses,
for example, purely commercial speech, Virginia State Board of
Pharmacy v. Virginia Citizens Consumer Council, Inc. 425 U.S. 748
(1976), and communicative conduct, Cohen v. California 403 U.S. 15
(1971). We believe, however, that the extent of First Amendment
protection may vary depending upon the nature of communication at
issue. It is established in the area of commercial speech that greater
governmental regulation may be tolerated due to the special
attributes of that form of speech. Virginia State Board of Pharmacy v.
Virginia Citizens Consumer Council, supra at 770-71 and n.24. Speech
in the labor context also presents special First Amendment
considerations. See e.g. N.L.R.B. v. Gissel Packing Co., 395 U.S. 575
(1969). And obscene communications have received specialized
treatment from the courts. See, e.g., Roth v. United States, 354 U.S.
476 (1957).
==========
- 14 282
general observations are in order. First, we wish to emphasize our
doubts that the executive branch may validly provide for licensing or
prior review of exports of cryptographic information without more
explicit Congressional authorization. The scope of the existing
delegation of authority from Congress to the President, as we note
above, is somewhat unclear. Before imposing a prior restraint on
exports of public cryptographic information, we believe that a more
clear cut indication of Congressional judgment concerning the need
for such a measure is in order. See United States v. Robel, 389 U.S.
248, 26Y (1967) (concurring opinion of Mr. Justice Brennan); cf.
Yakus v. United States, 321 U.S. 414 (1944).
Second, further Congressional authorization would obviously be
necessary in order to extend governmental controls to domestic as
well as foreign disclosures of public cryptographic information. Such
an extension might well be necessary to protect valuable
cryptographic information effectively. Indeed, limiting controls to
exports while permitting unregulated domestic publication of
cryptographic research would appear to undermine substantially the
government's position that disclosure of cryptographic information
presents a serious and irremediable threat to national security. [n.20]
=========
[n.20] A question which would arise from complete governmental
control over cryptographic information is whether the government
would be required under the Fifth Amendment to pay just
compensation for the ideas it had effectively "condemned." For
example, the patent and invention provisions of the Atomic Energy
Act require the government to pay for patents which it revokes or
declares to be affected with the public interest. 42 U.S.C. 55 21812190. A cryptographic algorithm, however, would not appear to be a
patentable process. See Gottschalk v. Benson, 409 U.S. 63 (1972). And
it is unresolved whether copyright protection is available for
computer software. See Nimmer on Copyright, s. 13.1 (Supp. 1976).
http://www.jya.com/itar082180.txt
12/28/2010
Page 18 of 23
http://www.jya.com/itar082180.txt
12/28/2010
Page 19 of 23
http://www.jya.com/itar082180.txt
12/28/2010