8 July 1998


Date: Wed, 8 Jul 1998 00:59:20 -0700 (PDT)
From: Greg Broiles <gbroiles@netbox.com>
To: cypherpunks@cyberpass.net, cryptography@c2.net
Subject: Initial summary/analysis: Junger v. Daley


The canonical version of the opinion in Junger v. Daley should be
available sometime on July 8 via Prof. Junger's web site at
<http://samsara.law.cwru.edu/comp_law/jvd/>; John Young has prepared an
unoffical advance version at <http://jya.com/pdj11.htm>, and I have
written the following notes based on a quick review of the decision. My
notes are intended as springboard for discussion, not as legal advice. 

--

Peter Junger, the plaintiff in Junger v. Daley, argues that there are five
reasons why the court should have ruled that the EAR's regulation of the
electronic publication and export of cryptographic software was improper:

1.	The EAR's licensing scheme constitutes an unconstitutional "prior
restraint" on protected speech, and thus violates the First Amendment.

2.	The EARs are overbroad (they overreach into areas which do not
need to be regulated in order to reach the regulations' stated purpose)
and they are vague (people potentially subject to the regulations cannot
readily determine whether or not their conduct is controlled by the
regulations). The overbreadth and vagueness of the regulations make it
possible that they will be enforced in an arbitrary way, in violation of
the First and Fifth Amendments.

3.	The EARs discriminate between different types of software
(encrypting vs. non-encrypting) and between different media (Internet and
disks vs. paper) and between encryption software packages (mass-market and
key recovery products vs. others) in a content-sensitive fashion, which is
a violation of the First and Fifth Amendments.

4.	The EARs violate Prof. Junger's right to teach, and his right to
communicate encryption software to others, in violation of the First
Amendment's right to freedom of association.

5.	The IEEPA (International Emergency Economic Powers Act), under
whose authority President Clinton has extended the applicability of the
Export Administration Act (which expired by its own terms in 1994, and has
been extended every year pursuant to the President's declaration of an
"emergency"), did not give the President nor the Department of Commerce
the power to regulate the noncommercial transfer of information via the
EARs, which implement the EAA.

Judge Gwin rejected all of Prof. Junger's arguments, ruling that the EARs
are constitutional, and that they do not overextend the power granted to
the executive branch in the IEEPA. Consequently, Judge Gwin's decision
ends the lawsuit; according to press reports, Prof. Junger plans to appeal
Judge Gwin's ruling to the Sixth Circuit Court of Appeals. 

The heart of the opinion begins with a discussion of whether or not
cryptographic software is entitled to the protections provided for speech
by the First Amendment. Judge Gwin notes that the other two courts to have
addressed the issue of software as protected speech (_Karn_ and
_Bernstein_) reached opposite results. Gwin notes that some software may
be inherently expressive, if it contains an "exposition of ideas"; other
software is "inherently functional", where "users look to the performance
of tasks with scant concern for the methods employed or the software
language used to control such methods". Gwin goes on to conclude that
encryption software is "especially functional" and "inherently
functional", because he believes it carries out the function of
encryption, rather than describing encryption. As such, he reasons that it
is indistinguishable from dedicated encryption hardware. 

Gwin further finds that "In the overwhelming majority of circumstances,
encryption source code is exported to transfer functions, not to
communicate ideas", and hence the value of the software to end users is
its functionality, not its communicative impact. I'm having trouble
finding evidence to support that conclusion in the exhibits and
declarations made part of the record as available online - but I don't
think I've been successful in locating all of the filings. It would be
interesting to determine whether or not this conclusion is supported by
the record, or whether the judge has taken judicial notice of this "fact". 
(Judicial notice is a practice by which judges may decide that a certain
fact is true without admitting evidence on the subject.) 

Judge Gwin notes that Judge Patel, in _Bernstein_, concluded that source
code was both functional and expressive; and that its expressive character
brought it within the First Amendment's protection. Gwin disagrees,
finding that source code is "purely functional" and "rarely expressive",
emphasizing that it is "all but unintelligible to most people". Because he
concludes that the export of source code is conduct which is only
occasionally expressive, he finds that the First Amendment's protection
for communication is not applicable. This conclusion - that the act of
exporting cryptographic source code is not entitled to First Amendment
protection - informs his rulings on Professor Junger's arguments. 

Judge Gwin addressed the arguments as follows:

1. (Prior restraint) Judge Gwin notes the traditional suspicion with which
courts view prior restraint schemes, but reasons that because the export
of encryption source code is not "commonly associated with expression",
regulation of that activity does not amount to a licensing scheme for an
activity integral to, or commonly associated with, expression; and,
consequently, any impact on expressive activity is collateral and
unintended, and, hence, constitutional. 

2. (Overbreadth, vagueness)  The "overbreadth" doctrine allows challengers
to the constitutionality of a statute or regulation to raise defects in
the statute's drafting, even where those defects do not directly affect
the challenger's case, where the law in question "has the potential to
repeatedly chill the exercise of expressive activity by many individuals",
according to Judge Gwin. Gwin reject's Prof. Junger's attempt to raise an
overbreadth argument, ruling that the issues raised in Prof. Junger's
challenge are identical to those which would be raised by other parties
not involved in this action.  Consequently, he does not discuss the merits
of the overbreadth argument. (I've run across case law which suggests that
the overbreadth doctrine is not only applicable in the speech context, but
don't have the cites immediately at hand; if this is of interest to
readers, please let me know and I'll try to dig them up.)

Gwin also ruled summarily that "the Export Regulations are not vague" and
that they "provide adequate notice" to potential violators about what
behavior is and is not within the scope of the regulations, citing the
EAR's mention of "the key length in 'bits' for regulated programs".

3. (Content discrimination) Echoing his earlier analysis, Gwin concludes
that the EARs' different treatment of different types of software and
media is not content based because, citing to President Clinton's
Executive Order 13026, the regulations are based upon the functional
capactity of the controlled item, not its informational content. Gwin
points to the EARs' exclusion of "books, magazines, and other printed
materials" in support of his conclusion that only functional information
about cryptography is controlled, ignoring the EARs' controls on technical
information and assistance related to cryptographic items.

Because he concludes that the EARs are content neutral, Gwin applies an
"intermediate scrutiny" standard to determine whether or not they are
constitutional. He finds that limiting the spread of US-source encryption
to foreign countries is an "important interest" (citing Undersecretary
Reinsch's declaration to the effect that foreign cryptographic prodcuts
are not widely used because of the lack of "an infrastructure to support
key distribution and the interoperability of products"), that the
government's interest in restricting exports is "unrelated" to any
communicative content of the exports, and that the regulations are
"narrowly tailored"  (they are no more speech-restrictive than necessary)
to achieve the government's purpose, pointing to the availability of
low-strength encryption and printed information about cryptography as
indications that the EARs are as minimally restrictive as practically
possible. Since the EARs meet the tests for intermediate scrutiny of
regulations which may incidentally burden speech, they are constitutional. 

4. (Academic/associative freedom) Judge Gwin notes that Junger's briefs
have not addressed this claim (likely due to space constraints imposed by
the Court?), and he treats the argument/claim as waived without further
discussion. 

5. (IEEPA/separation of powers)
Gwin similarly notes the lack of discussion of this issue in the briefs
and some discussion in Junger's reply brief to the effect that this claim
is not appropriate for summary judgement (if he had accepted that
argument, the case would still be pending trial on this claim); he then
goes on to cite a line of cases to the effect that Congress, in failing to
reject or modify the President's extensions and modifications of the EAA,
has acquiesced in those changes and that there has been no violation of
the separation of powers principle.  

In general, I'm disappointed in the judge's failure to dig deeply into the
technical issues; my impression is that he doesn't sufficiently understand
the complicated relationship between source code and object code, and
source code and pseudo code. I think it's a shame that this case didn't
get the careful attention that _ACLU v. Reno_ got, with detailed in-person

testimony from experts familiar with the issues. As far as I can tell,
Judge Gwin reached his conclusions based upon his review of the filings,
and statements made by the attorneys at oral argument. It's very difficult
to convey the nuances of these questions and these arguments in written
declarations, and difficult to explore the legal arguments raised in a
concise brief. I haven't found anything facially implausible or obviously
incorrect in the judge's legal reasoning, but I believe he was too quick
to reach conclusions about the applicable facts in this case; and that his
erroneous factual findings led him to apply valid (but inappropriate)
legal reasoning to the parties' arguments. I'm disappointed that, as in
_Bernstein_, several of the less immediately obvious arguments
(overbreadth, vagueness, IEEPA, freedom of association) didn't receive the
full attention of the parties or of the court.

Unfortunately, it is very difficult to dispute a trial judge's findings of
fact on appeal; appeals are largely centered around arguments about
whether or not the court applied the correct legal reasoning to the body
of facts which were established, not whether or not the court reached the
proper conclusion(s) about the facts based upon the evidence received.
Prof. Junger, in his appeal, will likely find himself bound to accept many
or most of the factual conclusions reached by Judge Gwin, even where those
conclusions appear incorrect to people who work with the EARs and
cryptographic software frequently.

I don't have good research material here at home, but I suspect (hope?) it
may be possible to challenge one of the central factual conclusions
reached by Judge Gwin - that most encryption source code exports occur
because of the functional, not the expressive, character of the software
exported. I'm suspicious that reliable data exists from which the judge or
an affiant could reach such a conclusion; and I'm suspicious that even if
such data exists today, that it's possible to extrapolate from that data
conclusions which would be reliable in the absence of export controls,
since such data would most likely be derived from current legitimate
exports, which are a very tiny subset of the exports which would occur but
for the ITARs and EARs. If the appellate court can be convinced that Judge
Gwin's conclusion on that subject was so unreasonable or so poorly
supported by evidence before him that his finding was an abuse of his
discretion, the court may be willing to adopt another finding on the basis
of the paper record, or to remand the case to Judge Gwin to gather more
evidence. 

I'd be interested to hear other folks' conclusions about the opinion.

--
Greg Broiles
gbroiles@netbox.com