RECOMMENDED FOR FULL-TEXT PUBLICATION
8 Junger v. Daley, et al. No. 98-4045 Pursuant to Sixth Circuit Rule 206
ELECTRONIC CITATION: 2000 FED App. 0117P (6th Cir.)
File Name: 00a0117p.06
Before any level of judicial scrutiny can be applied to the
Regulations, Junger must be in a position to bring a facial
challenge to these regulations. In light of the recent
amendments to the Export Administration Regulations, the UNITED STATES COURT OF APPEALS
district court should examine the new regulations to FOR THE SIXTH CIRCUIT
determine if Junger can bring a facial challenge. _________________
For the foregoing reasons, we REVERSE the district court
;
and REMAND the case to the district court for consideration
of Junger’s constitutional challenge to the amended PETER D. JUNGER,
regulations. Plaintiff-Appellant,
No. 98-4045
v.
>
WILLIAM DALEY, United
States Secretary of
Defendants-Appellees.
Commerce, et al.,
1
Appeal from the United States District Court
for the Northern District of Ohio at Akron.
No. 96-01723—James S. Gwin, District Judge.
Argued: December 17, 1999
Decided and Filed: April 4, 2000
Before: MARTIN, Chief Judge; CLAY, Circuit Judge;
WEBER, District Judge.*
*
The Honorable Herman J. Weber, United States District Judge for
the Southern District of Ohio, sitting by designation.
1
2 Junger v. Daley, et al. No. 98-4045 No. 98-4045 Junger v. Daley, et al. 7
_________________ The Supreme Court has expressed the versatile scope of the
First Amendment by labeling as “unquestionably shielded”
COUNSEL the artwork of Jackson Pollack, the music of Arnold
Schoenberg, or the Jabberwocky verse of Lewis Carroll.
ARGUED: Gino J. Scarselli, ACLU OF OHIO Hurly v. Irish-American Gay, Lesbian and Bisexual Group,
FOUNDATION, Cleveland, Ohio, for Appellant. Scott R. 515 U.S. 557, 569 (1995). Though unquestionably
McIntosh, U.S. DEPARTMENT OF JUSTICE, CIVIL expressive, these things identified by the Court are not
DIVISION, APPELLATE STAFF, Washington, D.C., for traditional speech. Particularly, a musical score cannot be
Appellees. ON BRIEF: Gino J. Scarselli, Raymond Vasvari, read by the majority of the public but can be used as a means
ACLU OF OHIO FOUNDATION, Cleveland, Ohio, Kevin F. of communication among musicians. Likewise, computer
O’Neill, CLEVELAND-MARSHALL COLLEGE OF LAW, source code, though unintelligible to many, is the preferred
Cleveland, Ohio, for Appellant. Scott R. McIntosh, U.S. method of communication among computer programers.
DEPARTMENT OF JUSTICE, CIVIL DIVISION,
APPELLATE STAFF, Washington, D.C., for Appellees. Because computer source code is an expressive means for
David W. Addis, Kurt A. Wimmer, COVINGTON & the exchange of information and ideas about computer
BURLING, Washington, D.C., Robert M. O’Neil, J. Joshua programming, we hold that it is protected by the First
Wheeler, THOMAS JEFFERSON CENTER FOR THE Amendment.
PROTECTION OF FREE EXPRESSION, Charlottesville,
Virginia, Paul F. Gamble, Bloomfield Hills, Michigan, for The functional capabilities of source code, and particularly
Amici Curiae. those of encryption source code, should be considered when
analyzing the governmental interest in regulating the
_________________ exchange of this form of speech. Under intermediate
scrutiny, the regulation of speech is valid, in part, if “it
OPINION furthers an important or substantial governmental interest.”
_________________ O’Brien, 391 U.S. at 377. In Turner Broadcasting System v.
FCC, 512 U.S. 622, 664 (1994), the Supreme Court noted that
BOYCE F. MARTIN, JR., Chief Judge. This is a although an asserted governmental interest may be important,
constitutional challenge to the provisions of the Export when the government defends restrictions on speech “it must
Administration Regulations, 15 C.F.R. Parts 730-74, that do more than simply ‘posit the existence of the disease sought
regulate the export of encryption software. Peter D. Junger to be cured.’” Id. (quoting Quincy Cable TV, Inc. v. FCC,
appeals the district court’s grant of summary judgment in 768 F.2d 1434, 1455 (D.C. Cir. 1985)). The government
favor of Secretary Daley and the other defendants. “must demonstrate that the recited harms are real, not merely
conjectural, and that the regulation will in fact alleviate these
The district court found that encryption source code is not harms in a direct and material way.” Id. We recognize that
sufficiently expressive to be protected by the First national security interests can outweigh the interests of
Amendment, that the Export Administration Regulations are protected speech and require the regulation of speech. In the
permissible content-neutral restrictions, and that the present case, the record does not resolve whether the exercise
Regulations are not subject to a facial challenge as a prior of presidential power in furtherance of national security
restraint on speech. Subsequent to the district court’s holding interests should overrule the interests in allowing the free
and the oral arguments before this Court, the Bureau of exchange of encryption source code.
Export Administration issued an interim final rule amending
6 Junger v. Daley, et al. No. 98-4045 No. 98-4045 Junger v. Daley, et al. 3
and that the Regulations are not subject to facial challenge on the regulations at issue. See Revisions to Encryption Items,
prior restraint grounds. 65 Fed. Reg. 2492 (2000) (to be codified at 15 C.F.R. Parts
734, 740, 742, 770, 772, 774). Having concluded that the
We review the grant of summary judgment de novo. See First Amendment protects computer source code, we reverse
Smith v. Wal-Mart Stores, Inc., 167 F.3d 286, 289 (6th Cir. the district court and remand this case for further
1999). consideration of Junger’s constitutional claims in light of the
amended regulations.
The issue of whether or not the First Amendment protects
encryption source code is a difficult one because source code ENCRYPTION AND SOFTWARE BACKGROUND
has both an expressive feature and a functional feature. The
United States does not dispute that it is possible to use Encryption is the process of converting a message from its
encryption source code to represent and convey information original form (“plaintext”) into a scrambled form
and ideas about cryptography and that encryption source code (“ciphertext”). Most encryption today uses an algorithm, a
can be used by programmers and scholars for such mathematical transformation from plaintext to ciphertext, and
informational purposes. Much like a mathematical or a key that acts as a password. Generally, the security of the
scientific formula, one can describe the function and design message depends on the strength of both the algorithm and
of encryption software by a prose explanation; however, for the key.
individuals fluent in a computer programming language,
source code is the most efficient and precise means by which Encryption has long been a tool in the conduct of military
to communicate ideas about cryptography. and foreign affairs. Encryption has many civil applications,
including protecting communication and data sent over the
The district court concluded that the functional Internet. As technology has progressed, the methods of
characteristics of source code overshadow its simultaneously encryption have changed from purely mechanical processes,
expressive nature. The fact that a medium of expression has such as the Enigma machines of Nazi Germany, to modern
a functional capacity should not preclude constitutional electronic processes. Today, messages can be encrypted
protection. Rather, the appropriate consideration of the through dedicated electronic hardware and also through
medium’s functional capacity is in the analysis of permitted general-purpose computers with the aid of encryption
government regulation. software.
The Supreme Court has explained that “all ideas having For a general-purpose computer to encrypt data, it must use
even the slightest redeeming social importance,” including encryption software that instructs the computer’s circuitry to
those concerning “the advancement of truth, science, execute the encoding process. Encryption software, like all
morality, and arts” have the full protection of the First computer software, can be in one of two forms: object code or
Amendment. Roth v. United States, 354 U.S. 476, 484 (1957) source code. Object code represents computer instructions as
(quoting 1 JOURNALS OF THE CONTINENTAL CONGRESS 108 a sequence of binary digits (0s and 1s) that can be directly
(1774)). This protection is not reserved for purely expressive executed by a computer’s microprocessor. Source code
communication. The Supreme Court has recognized First represents the same instructions in a specialized programming
Amendment protection for symbolic conduct, such as draft- language, such as BASIC, C, or Java. Individuals familiar
card burning, that has both functional and expressive features. with a particular computer programming language can read
See United States v. O’Brien, 391 U.S. 367 (1968). and understand source code. Source code, however, must be
converted into object code before a computer will execute the
4 Junger v. Daley, et al. No. 98-4045 No. 98-4045 Junger v. Daley, et al. 5
software’s instructions. This conversion is conducted by definition of “export” also includes publication of the
compiler software. Although compiler software is typically software on the Internet, unless steps are taken to restrict
readily available, some source code may have no compatible foreign access to the Internet site. See 65 Fed. Reg. 2492,
compiler. 2496 (to be codified at 15 C.F.R. § 734.2(b)(9)(ii)).
REGULATORY BACKGROUND FACTUAL BACKGROUND
The Export Administration Regulations create a Peter Junger is a professor at the Case Western University
comprehensive licensing scheme to control the export of School of Law. Junger maintains sites on the World Wide
nonmilitary technology, software, and commodities. In 1996, Web that include information about courses that he teaches,
the President transferred export jurisdiction over nonmilitary including a computers and the law course. Junger wishes to
encryption items from the State Department to the Commerce post on his web site encryption source code that he has
Department’s Bureau of Export Administration. written to demonstrate how computers work. Such a posting
is defined as an export under the Regulations.
The Regulations are structured around the Commodity
Control List, which lists items subject to export control. See On June 12, 1997, Junger submitted three applications to
15 C.F.R. Part 774. Each item on the List is given an Export the Commerce Department, requesting determinations of
Control Classification Number that designates the category of commodity classifications for encryption software programs
the controlled item and the reasons why the government and other items. On July 4, the Export Administration told
controls the item’s export. See 15 C.F.R. § 738.2. The Junger that Classification Number 5D002 covered four of the
reasons for control affect the nature and scope of the export five software programs he had submitted. Although it found
controls. that four programs were subject to the Regulations, the Export
Administration found that the first chapter of Junger’s
Encryption software, including both source code and object textbook, Computers and the Law, was an allowable
code, is regulated under Export Control Classification unlicensed export. Though deciding that the printed book
Number 5D002 for national security reasons. See id. § 772 chapter containing encryption code could be exported, the
Supp. 1. In addition, encryption technology and encryption Export Administration stated that export of the book in
hardware are regulated for national security reasons under electronic form would require a license if the text contained
different Classification Numbers. Generally, the Regulations 5D002 software. Since receiving the classification
require a license for the export of all encryption items to all determination, Junger has not applied for a license to export
foreign destinations, except Canada. See 65 Fed. Reg 2492, his classified encryption source code.
2499 (to be codified at 15 C.F.R. § 742.15(a)). Although the
regulations provide some exceptions, most encryption Junger filed this action to make a facial challenge to the
software in electronic form remains subject to the license Regulations on First Amendment grounds, seeking
requirements for export. Encryption software in printed form, declaratory and injunctive relief that would permit him to
however, is not subject to the Regulations. See 15 C.F.R. engage in the unrestricted distribution of encryption software
§ 734.3(b)(2). through his web site. Junger claims that encryption source
code is protected speech. The district court granted summary
The Regulations define “export” as the “actual shipment or judgment in favor of the defendants, holding that encryption
transmission of items subject to the EAR out of the United source code is not protected under the First Amendment, that
States.” Id. § 734.2(b)(1). For encryption software, the the Regulations are permissible content-neutral regulations,