Recently, the Department of Defense issued  an interim rule that would impose on DOD contractors and subcontractors a contractual duty to provide “adequate security†from “unauthorized access and disclosure†for a broad array of unclassified information Additionally, the interim rule requires DOD contractors and subcontractors to report within 72 hours directly to the appropriate DOD office a “cyber incident†or “malicious software.†A “cyber incident†is defined as an action on a computer network that compromises the network of has an “actual or potentially adverse effect†on the information on the network. Finally, the rule requires contractors to make available “media (or access to covered contractor information systems and equipment)†upon request.
The interim rule, which is immediately effective, applies to all contractors and subcontractors with “covered defense information transiting their information systems.†The “covered defense information†to be safeguarded is extremely broad. It includes information provided to the contractor by or on behalf of DOD in connection with performance of the contract or â€critical†or “controlled information stored by or on behalf of the contractor in support of the performance of the contract.
Of particular emphasis for readers of this blog, “covered defense information†also includes export controlled information, including “items identified in export administration regulations and munitions list,†license applications, and “sensitive nuclear technology information.†Beyond these obvious items, the covered export controlled information includes things not covered by existing export control regimes but “whose [sic] export could reasonably be expected to adversely affect the United States national security and nonproliferation objectives.†We have no idea on earth what this could possibly mean or how any contractor can figure out what information, not covered by the EAR or the ITAR, actually fits in this category.
DOD recognizes that such cyber incident reports or other information provided to DOD under this interim rule may include a contractor’s proprietary information, including personal information relating to its employees. In response, DOD states “the government shall protect against the unauthorized use or release†of such information. Does anyone else see the tremendous irony here? The United States government, which has been hacked left and right by the Chinese, the Russians and others, promises to protect the information. To add to the irony, the new rule only applies to unclassified information, which is precisely the type of information the USG has been unable to protect on its own.
Rest assured that anything that you provide to the DOD will be read almost immediately by the Red Army in China. Perhaps the U.S. Government should get its own cybersecurity house in order before it starts preaching to private industry.
Posted by
Category: 

Once upon a time, and long before the Internet, in a distant and dank corner of Washington, D.C., there lived an obscure agency called the Directorate of Defense Trade Controls (“DDTC”), which, among other things, kept watch, like a jealous dragon, over certain types of information that it believed it was destined to protect, information such as how to build a catapult or the best timber to use for a battering ram or the deadliest method for swinging a mace at an enemy. And it sent out a decree, far and wide, that anyone who should dare to disseminate such information without its permission, except in locked rooms with less than three other citizens present between the hours of midnight and dawn, would be sentenced to immediate gibbeting. Fortunately, there was no Internet, so few, in those days, were seen hanging in cages in Foggy Bottom.![Mozaffar Khazaee [Credit: Essex County Mug Shot Catalog] Mozaffar Khazaee [Credit: Essex County Mug Shot Catalog]](https://www.exportlawblog.com/images/khazaee.jpg)
Meet Charlie and Alice, two self-professed PRC spies who branched out from smuggling crystal meth into the United States to attempting to export airplanes and military technology from the United States to the PRC. Things did not turn out so well for Charlie and Alice who probably should have stuck with drug trafficking. So, find a comfortable chair, grab a bag of popcorn, and prepare to be entertained by the story that unfolds in the
Apparently international research on how best to prevent, contain and treat bird flu is now threatened by international laws restricting export of information relating to potential agents of biological warfare according to 

