What Can Hold Up Your International Project?

The term “export controls” is enough to send most people either to sleep or running for the hills.  In the cybersecurity world it can have often unforeseen consequences. Let’s take a look at why this is. In Britain, Export Controls apply to cryptography in a very strange way and the impact can be overlooked until that unfortunate call that tells you your goods have been seized by customs.    By David Hayes
 
How the Controls Work
The easiest way to look at the controls is on a “catch and release” basis. 
Start by considering that any item that uses cryptography, effectively with a key length in excess of 56 bits, called a “described security algorithm” for “data confidentiality” is subject to export licensing.
 
It is tempting to dismiss this as being ridiculous – your phone would be export licensable! This is where the releases or “decontrols” come in.  Depending how they are counted, there are around fifteen separate decontrols. 
 
One of the main decontrols is what Americans call “mass market” and the UK calls the “Cryptography Note” or “Note 3”.  The American expression gives a clear indication of what the term means – it is sometimes informally called the “PC World test” in the UK.
 
There are many other, more specific, decontrols, ranging from items designed for a limited to banking or money transactions to devices limited to certain types of remote industrial monitoring. However, many items that cybersecurity professionals encounter daily are subject to export licensing, including many enterprise servers, firewalls, switches etc.
 
There are a number of assumptions that are made by exporters that often result in practical problems: 
  • I am only upgrading my employer’s global network – not selling the equipment, so I don’t need a licence.
  • I can buy this thing on the internet, so it must meet this Note 3 thing
  • It only uses readily available cryptography, like SSL
  • It’s my laptop and I’m carrying it with me

Only one of these, number four, means that the item does not require a licence.  Even then, any technology stored on the laptop, or accessed from overseas by using the clean laptop, may require a licence in its own right.

Note 3: Cryptography Note
The main provision of the Note relates to items that are generally available to the public by being sold, without restriction, from stock at retail selling points by means of any of the following:
  • Over-the-counter transactions;
  • Mail order transactions;
  • Electronic transactions; or
  • Telephone call transactions;
There are other elements, relating to whether the cryptography can easily be changed and to ease of installation but availability is the primary driver.
 
Different EU regulators take very different positions on the cryptography note, with some offering significantly more flexibility to exporters than others. The note is notoriously subjective and the UK’s interpretation is equally notoriously conservative, e.g. most satellite communications items are regarded as being export licensable. 
 
In classifying or decontrolling under Note 3, or more specifically the so-called “Note to Note 3”,  a regulator can take into account any factors it considers relevant - in essence, if the regulator wants an item to be controlled it is controlled.  Factors that may be considered include price and typical user - but not in isolation and not on a level playing field between products.  Product A at £10k may be ruled No Licence Required (NLR) under Note 3, while product B at £7k is ruled controlled, depending on the position of each in the market for that type of product and who are the typical purchasers of each.
 
Cryptography Exports – A suggested approach
Firstly, develop an understanding of your equipment, software and technology against the dual-use control list.  The current UK list can be found at: UK Strategic Export Control Lists
 
Look at Category 5, Part 2 Information Security: If you have a need to export from the UK items that use cryptography with a key length in excess of 56 bits, start from the position that, prima facie, these are export controlled. Can you document a rationale for why the item you are assessing meets a decontrol? If not, your item is licensable.  It may be that you are upgrading your own company infrastructure or exporting temporarily to a trade fair or a multitude of other “innocent” uses; it matters not! 
 
When exporting cryptography, a major arms manufacturer, a supermarket company and the world’s largest manufacturer of rubber ducks are all equals.
 
Finally, when dealing with the plethora of cryptographic items exported from the United States as “mass market”, or with a US Export Control Classification Number of 5*992 (where * is A-E), it is NOT safe to assume that the UK regulator will agree with the US decision.  You may well need a licence. Don’t forget that US origin items are often subject to US law outside the US.  US law ‘attaches’ to the item and compliance with US law by foreign nationals is expected and enforced.
 
David Hayes has many year’s experience in export controls, from the varied perspectives of regulator, Head of Compliance for global companies and is a highly as a successful independent consultant:  https://davidhayes-exportcontrols.com/
 
You Might Also Read:
 
Killer Robots For Export:
 
 
« US Police Display Powerful New Surveillance Tools
Taiwan's Entire Population Database Stolen »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.