What Can Hold Up Your International Project?

The term “export controls” is enough to send most people either to sleep or running for the hills.  In the cybersecurity world it can have often unforeseen consequences. Let’s take a look at why this is. In Britain, Export Controls apply to cryptography in a very strange way and the impact can be overlooked until that unfortunate call that tells you your goods have been seized by customs.    By David Hayes
 
How the Controls Work
The easiest way to look at the controls is on a “catch and release” basis. 
Start by considering that any item that uses cryptography, effectively with a key length in excess of 56 bits, called a “described security algorithm” for “data confidentiality” is subject to export licensing.
 
It is tempting to dismiss this as being ridiculous – your phone would be export licensable! This is where the releases or “decontrols” come in.  Depending how they are counted, there are around fifteen separate decontrols. 
 
One of the main decontrols is what Americans call “mass market” and the UK calls the “Cryptography Note” or “Note 3”.  The American expression gives a clear indication of what the term means – it is sometimes informally called the “PC World test” in the UK.
 
There are many other, more specific, decontrols, ranging from items designed for a limited to banking or money transactions to devices limited to certain types of remote industrial monitoring. However, many items that cybersecurity professionals encounter daily are subject to export licensing, including many enterprise servers, firewalls, switches etc.
 
There are a number of assumptions that are made by exporters that often result in practical problems: 
  • I am only upgrading my employer’s global network – not selling the equipment, so I don’t need a licence.
  • I can buy this thing on the internet, so it must meet this Note 3 thing
  • It only uses readily available cryptography, like SSL
  • It’s my laptop and I’m carrying it with me

Only one of these, number four, means that the item does not require a licence.  Even then, any technology stored on the laptop, or accessed from overseas by using the clean laptop, may require a licence in its own right.

Note 3: Cryptography Note
The main provision of the Note relates to items that are generally available to the public by being sold, without restriction, from stock at retail selling points by means of any of the following:
  • Over-the-counter transactions;
  • Mail order transactions;
  • Electronic transactions; or
  • Telephone call transactions;
There are other elements, relating to whether the cryptography can easily be changed and to ease of installation but availability is the primary driver.
 
Different EU regulators take very different positions on the cryptography note, with some offering significantly more flexibility to exporters than others. The note is notoriously subjective and the UK’s interpretation is equally notoriously conservative, e.g. most satellite communications items are regarded as being export licensable. 
 
In classifying or decontrolling under Note 3, or more specifically the so-called “Note to Note 3”,  a regulator can take into account any factors it considers relevant - in essence, if the regulator wants an item to be controlled it is controlled.  Factors that may be considered include price and typical user - but not in isolation and not on a level playing field between products.  Product A at £10k may be ruled No Licence Required (NLR) under Note 3, while product B at £7k is ruled controlled, depending on the position of each in the market for that type of product and who are the typical purchasers of each.
 
Cryptography Exports – A suggested approach
Firstly, develop an understanding of your equipment, software and technology against the dual-use control list.  The current UK list can be found at: UK Strategic Export Control Lists
 
Look at Category 5, Part 2 Information Security: If you have a need to export from the UK items that use cryptography with a key length in excess of 56 bits, start from the position that, prima facie, these are export controlled. Can you document a rationale for why the item you are assessing meets a decontrol? If not, your item is licensable.  It may be that you are upgrading your own company infrastructure or exporting temporarily to a trade fair or a multitude of other “innocent” uses; it matters not! 
 
When exporting cryptography, a major arms manufacturer, a supermarket company and the world’s largest manufacturer of rubber ducks are all equals.
 
Finally, when dealing with the plethora of cryptographic items exported from the United States as “mass market”, or with a US Export Control Classification Number of 5*992 (where * is A-E), it is NOT safe to assume that the UK regulator will agree with the US decision.  You may well need a licence. Don’t forget that US origin items are often subject to US law outside the US.  US law ‘attaches’ to the item and compliance with US law by foreign nationals is expected and enforced.
 
David Hayes has many year’s experience in export controls, from the varied perspectives of regulator, Head of Compliance for global companies and is a highly as a successful independent consultant:  https://davidhayes-exportcontrols.com/
 
You Might Also Read:
 
Killer Robots For Export:
 
 
« US Police Display Powerful New Surveillance Tools
Taiwan's Entire Population Database Stolen »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.