Author Archive


Dec

18

Name That Country!


Posted by at 6:31 pm on December 18, 2013
Category: BISDoJSanctionsSyria

Dell HQ http://www.dell.com/downloads/global/corporate/imagebank/hq/hq_rr1.jpg [Fair Use]The Securities and Exchange Commission just released on Monday, according to this article, correspondence that it had with Dell regarding an on-going  investigation by Dell, the DOJ, and the Bureau of Industry and Security (“BIS”) regarding sales of Dell computers to Syria.  These sales were made by a Dell distributor based in the U.A.E. In that correspondence, Dell indicated that it was conducting an internal investigation with outside counsel into sales by one of its Dubai-based distributors, was regularly communicating with the U.S. Attorney regarding that investigation, and had responded to a BIS subpoena requesting information about the sales in question. The company said that the investigation was not yet complete so that the company could not yet respond to the SEC’s questions as to whether Dell had any liability under U.S. export and sanctions law arising from the distributor’s sales to Syria.

The company, however, did try to suggest that it might not be liable because of a clause it cited in its distribution agreement:

Distributor acknowledges that Products licensed or sold hereunder or in respect of which services (including Dell Branded Services) are provided, which may include software, technical data and technology, are subject to the export control laws and regulations of the USA, the European Union, the Territory in which Distributor operates and the territory from which they were supplied, and that Distributor will abide by such laws and regulations. Distributor confirms that it will not export, re-export or trans-ship the Products, directly or indirectly, … to … any countries that are subject to the USA’s or those other relevant territories’ export restrictions or any national thereof … .

To paraphrase someone else, I guess you go to war with the language you have — that is to say, this language is hardly ideal. It relies on the distributor to know what countries are subject to U.S. export restrictions. Do you really think that a distributor in the U.A.E. is aware of the details of U.S. sanctions programs or even which countries are on the current U.S. bad country list? Probably not.

I certainly do not mean to imply that Dell has criminal or civil liability because of this drafting issue. Rather, my point only is that companies should be explicit in these clauses about which countries are subject to sanctions and to affirmatively advise distributors in writing when those countries change. Don’t count on your distributor to know who the U.S. has sanctioned anymore than you would count on him to know the name of last year’s winner of American Idol.

Permalink Comments (2)

Bookmark and Share


Copyright © 2013 Clif Burns. All Rights Reserved.
(No republication, syndication or use permitted without my consent.)

Dec

10

More Details Emerge on Multilateral Export Controls on Cybersecurity Items


Posted by at 8:11 pm on December 10, 2013
Category: BISCyber WeaponsWassenaar

Photo: Harland Quarrington/MOD [see page for license], via Wikimedia Commons http://commons.wikimedia.org/wiki/File%3ACyber_Security_at_the_Ministry_of_Defence_MOD_45153616.jpgLast week we posted on reports that the Wassenaar Plenary was considering adding certain cybersecurity hardware and software products to the list of items that members of the Wassenaar Arrangement, which includes the United States, have agreed to subject to export controls. A press release today from Privacy International purports to provide details and operative language for the new controls, the first control to be on certain types of intrusion software and the second on certain types of deep packet inspection (“DPI”). Both of the proposed new controls are somewhat narrower than we first thought might be the case before we saw this language.

The controls on intrusion software originate from a U.K. proposal. It would control software designed to bypass security and detection systems in order to collect data or modify the execution of software on the targeted device:

“Software” specially designed or modified to avoid detection by ‘monitoring tools’, or to defeat ‘protective countermeasures’, of a computer or network capable device, and performing any of the following:
a. The extraction of data or information, from a computer or network capable device, or the modification of system or user data; or
b. The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions.

The target seems to be malware and rootkits used by government agencies to spy on its citizens, such as FinFisher software which we previously discussed here. Of course, the language is broad enough to cover exports of most malware and might give governments additional enforcement tools against domestic hackers and distributors of malware. Although I don’t believe that anti-virus software is the intended target, the language might wind up covering such software as well since it is designed to defeat the countermeasures of viruses and malware and to extract data about the malware from a computer or network.

The second new controls will target “IP network surveillance systems.” Specifically, the language, as proposed by France, is narrower than the title suggests and reads as follows:

5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the following:
1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone):
a. Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1));
b. Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and
c. Indexing of extracted data; and
2. Being specially designed to carry out all of the following:
a. Execution of searches on the basis of ‘hard selectors’; and
b. Mapping of the relational network of an individual or of a group of people.

When I previously posted about possible added controls on DPI software and hardware, I noted that the “deep” in DPI could mean many things. This language clarifies that by only covering inspection at OSI Layer 7, the so-called application layer. Moreover, it only captures items that in addition to capturing the traffic contents also index that software and analyze it for relational data among individuals. The biggest ambiguity is what is meant by a “carrier class IP network,” a term likely to be defined differently by the various members of the Wassenaar arrangement.

Permalink Comments (1)

Bookmark and Share


Copyright © 2013 Clif Burns. All Rights Reserved.
(No republication, syndication or use permitted without my consent.)

Dec

5

It’s Déjà Vu All Over Again


Posted by at 5:00 pm on December 5, 2013
Category: Anti-Boycott

TMX Shipping [Source: Google Maps]
ABOVE: TMX Shipping Office


Here’s the thing: you can save yourself money if you read this blog. You can certainly avoid paying money to the Office of Antiboycott Compliance (“OAC”) at the Bureau of Industry and Security (“BIS”) if you read this blog. TMX Shipping could have saved itself the $36,800 penalty, announced here, that it paid OAC if it had read this blog.

The OAC is a vestigial appendage over at BIS which arguably had no further right to exist after the expiration and non-renewal of the Export Administration Act. It is doubtful that the President can rely on any emergency to justify resurrecting OAC from the dead by an executive order under IEEPA as each president has done since the EAA expired. Accordingly, OAC keeps a low profile and never fines anyone enough to make it financially worthwhile for an exporter to pop into court and challenge its statutory authority. And, it seems that OAC fines exporters for one simple, but obscure, violation over and over and over. We have reported on this many times, including here and here.

The grave sin at issue involves certifications that ships are entitled to enter certain ports. Some Arab League countries don’t permit ships to enter their ports if the ship has previously entered a port in Israel. The thing is there are exceptions from the non-compliance and reporting requirements precisely for such certifications. Under Supplement 1 to the antiboycott rules:

the owner, charterer, or master of a vessel may certify that the vessel is “eligible” or “otherwise eligible” to enter into the ports of a boycotting country in conformity with its laws and regulations.

And under section 760.5(a)(5)(viii) of the antiboycott rules, an exporter need not report:

A request to supply a certificate by the owner, master, charterer, or any employee thereof, that a vessel, aircraft, truck or any other mode of transportation is eligible, otherwise eligible, permitted, or allowed to enter, or not restricted from entering, a particular port, country, or group of countries pursuant to the laws, rules, or regulations of that port, country, or group of countries.

The catch here is that only an owner, master or charterer of the vessel may supply that information. An agent of the owner, master or charterer may not supply that information and a request that an agent supply that information (even if it is ultimately supplied by the owner, master, or charterer) must be reported.

TMX Shipping was charged with two violations. The first involved TMX itself certifying, as a freight forwarder, on four occassions that a vessel was allowed to enter the ports of Kuwait, the ports of Bahrain, all Arab Ports, and the “port of destination.” The second involved receiving, and not reporting, eleven letters of credit that demanded a certification from the “captain, owner or agent” (or similar language) that the vessel was allowed to enter various ports of boycotting countries. Once again, the company got in trouble for not knowing that a freight forwarder couldn’t supply the information and that a request for an agent of the ship owner to supply the information was reportable.

This is just about all that OAC nails people for anymore, so repeat after me: “Agents can’t certify that ships are allowed to enter Arab Ports.” Now say that to everyone in your company. If everybody gets this message, the folks at OAC will have nothing left to do but play Words With Friends and update their Facebook pages.

And just to make my point that this vessel certification anti-boycott issue is one that occurs over and over again, you may have the feeling that you read this post already. And you have: this is an exact copy of a post that appeared on August 28, 2012 with the exception of the paragraph above in italics where the facts surrounding the identical Polk Audio violation described in the 2012 post have been changed to the facts surrounding the TMX Shipping violation recently reported by OAC. I’ve said it before and I’ll say it again (and again). “Agents and freight forwarders cannot certify that ships are allowed to enter boycotting Arab ports; only the owner, charterer or master can.” Here’s an idea: at this year’s holiday party, don’t give anyone a drink unless they first memorize and repeat that sentence to the bartender, okay?

UPDATE: My colleague Stan Marcuss astutely pointed out that while BIS provides that under its rules the “owner, charterer or master” of a vessel may certify that a vessel is eligible to enter into the port of a boycotting country, such a certification might in fact violate IRS rules under Section 999 of the Internal Revenue Code. (See Guideline M-10 of the IRS’s guidelines relating to international boycotts.)  In those cases, companies making the certification permitted by BIS might be deprived of certain tax benefits under IRS rules.  So remember this: just because one agency says you may do something does not mean another agency might not punish you for doing it.

Permalink Comments (3)

Bookmark and Share


Copyright © 2013 Clif Burns. All Rights Reserved.
(No republication, syndication or use permitted without my consent.)

Dec

4

U.S. and Allies Mull Export Licenses for Network Equipment and Software


Posted by at 6:55 pm on December 4, 2013
Category: BISCyber WeaponsWassenaar

Photo: Harland Quarrington/MOD [see page for license], via Wikimedia Commons http://commons.wikimedia.org/wiki/File%3ACyber_Security_at_the_Ministry_of_Defence_MOD_45153616.jpgWe can only assume that exporters have been very bad this year because they may find a big lump of coal left in their export reform stocking by jolly old St. Nick or, perhaps more accurately, Good King Wassenaar (to continue torturing this extended metaphor.) The jolly old elves who negotiate the Wassenaar Agreement are meeting in Vienna this week, and according to this Financial Times article, they are likely to impose new controls on cybersecurity hardware and software. When the U.S. implements these changes, it means that some network equipment and software that did not previously require licenses will now require them.

The details of the changes are still not fully known. Obviously, many things could be classified as “cybersecurity” software and/or hardware, so the scope of these controls could be significant. The Financial Times article singles out deep packet inspection as one area of cybersecurity likely to be subject to export controls:

Particularly sensitive areas include so-called “deep package inspection” technologies which allow users to screen data for hidden viruses, malware or surveillance programmes. Western intelligence agencies are particularly concerned about such technologies falling into enemy hands, because they could enable them to foil cyber attacks or gain an intimate understanding of Western screening systems and their fallibilities.

Deep packet inspection is commonly used to refer to network software and hardware that looks beyond the headers of IP packet transiting a network to examine the data payload in the packet. DPI technologies vary in the degree to which the data payload is inspected, particularly given constraints on inline processing as the data streams through the network. Some DPI may look for patterns or signatures indicating viruses or attacks (to block the packet), the type of traffic , e.g., (P2P vs VOIP ( to prioritize the traffic), or even the actual content of unencrypted traffic for censorship or law enforcement purposes. Given that there are varieties of “deep” in Deep Packet Inspection and varieties of purposes to which DPI could be put, a one-size-fits-all license requirement for DPI would certainly seem to be overkill.

But the biggest nightmare will be how these license requirements will seep into the deemed export rules. Any company that employs network engineers (in other words, any company but the Asian Lithuanian Taco and Waffle Truck on the corner) will encounter real difficulties in hiring and managing foreign employees working on their networks. Let’s just hope that these negotiations at Wassenaar fizzle (but I’m not holding my breath).

Permalink Comments (1)

Bookmark and Share


Copyright © 2013 Clif Burns. All Rights Reserved.
(No republication, syndication or use permitted without my consent.)

Nov

26

Stormy Weatherford, Just Can’t Get Its Poor Self Together After Mega-Fine


Posted by at 11:33 pm on November 26, 2013
Category: General

Source: Weatherford International http://www.weatherford.com/weatherford/images/wftinterim/img/PH_Why-Weatherford.jpg [Fair Use]Another round in the fine proliferation race between OFAC, BIS and DDTC was played out today as the the BIS website trumpeted in headline typeface usually reserved for announcing the end of the world by impending asteroid collision (WORLD ENDS TOMORROW!!) the following news:

Texas Company to Pay $100 Million for Export Violations to

Iran, Syria, Cuba, and Other Countries

Fine is largest civil penalty ever levied by the Bureau of Industry and Security

You can almost see the Wild West sheriffs at BIS blow the smoke away from the barrels of their pistols before re-holstering them, pocketing their own $50 million share of the fine, and striding into the saloon to slam down a shot of celebratory whiskey. “That oughta show them fellers at OFAC who are the real tough guys around this town,” you can hear them muttering. (The other $50 million is going to pay criminal fines imposed as part of a deferred prosecution agreement with the U.S. Attorneys’ Office for the Southern District of Texas.)

But seriously, what is the point in boasting about the size of the fine as if this were a contest or a sports event? Is somebody giving out prizes for the largest fish caught each year?

The company involved was Weatherford International, and we’ve been writing about their export woes and this investigation since 2007. See here and here.

OFAC also announced its penalty against Weatherford today, albeit in much more restrained tones. The announcement details $60 million in sales to Cuba and $23 million in sales to Iran. It also paints a picture of a company that was wilfully unconcerned with its obligations under U.S. export and sanctions laws.

Interestingly, and perhaps as a gesture of noblesse oblige to their colleagues at BIS, OFAC noted that payment of the $100 million in fines to BIS and under the deferred prosecution agreement would satisfy the $91,026,450 fine separately imposed under the terms of the settlement agreement between Weatherford and OFAC.

(And my apologies to Harold Arlin and Ted Koehler for the title of this post. . . )

Permalink Comments (1)

Bookmark and Share


Copyright © 2013 Clif Burns. All Rights Reserved.
(No republication, syndication or use permitted without my consent.)