Jim, or however can manipulate the reflector:

I think everybody on the mailing list received a copy of my post. Could
you remove it now from the reflector?

Thanks

Laszlo

> -------- Original Message --------
> Subject: RE: Export/Import control
> From: "Matt Ball" <[EMAIL PROTECTED]>
> Date: Tue, May 23, 2006 10:37 am
> To: <[EMAIL PROTECTED]>
> 
> Hi Lazlo,
> 
> You, of course, realize that there is absolutely no way that we can handle 
> this confidentially after it is posted to the public IEEE 1619 e-mail 
> reflector.  There are websites who routinely crawl this e-mail list and post 
> mirrored versions that include advertising.  You've also published this 
> information openly to all the competitors who might care about this 
> information.  But, that being said, I appreciate the information. :)
> 
> -Matt
> 
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> [EMAIL PROTECTED]
> Sent: Tuesday, May 23, 2006 8:22 AM
> To: [EMAIL PROTECTED]
> Subject: Export/Import control
> 
> 
> For Jim's request, I forward the following information I received from
> Seagate's export control officer and from a marketing director. Please
> handle it confidentially.
> 
> Laszlo
> 
> ===
> 
> Most of the local crypto laws are not directly available on the Web.
> There are specialized law firms, which can provide the information,
> regularly updated. One of them is:
> http://rechten.uvt.nl/koops/cryptolaw/
> 
> 
> The associated U.S. export control requirements outlined in the U.S.
> Export Administration Regulations (EAR) are difficult to summarize,
> particularly Sections 740.13, 740.17 and 742.15 which are the principal
> references for the export and reexport of encryption items.  
> 
> From a U.S. export control perspective, Seagate has secured U.S.
> Department of Commerce/Bureau of Industry and Security (BIS) commodity
> classification rulings covering the following FDE disc drives:
> 
> Encrypting Drive utilizing Enova encrypting chip (Triple DES-128 key
> algorithm)
> Encrypting Drive utilizing Seagate encrypting chip (AES-128,
> 1024/2048-bit RSA algorithm)
> Encrypting Drive utilizing integrated Seagate ASIC chip (AES-128,
> 1024/2048-bit RSA algorithm)
> 
> BIS has ruled that these Seagate FDE disc drives fall under Export
> Control Classification Number (ECCN) heading 5A992 (a) and are
> controlled for Anti-Terrorism (AT) reasons.  The FDE disc drives are
> "mass market" eligible items, and can be exported or re-exported to all
> countries without an export license except for those that are subject to
> U.S. embargo and AT controls (i.e., currently Cuba, Iran, North Korea,
> Libya, Sudan, Syria).
> 
> For a comprehensive understanding of all the associated U.S. encryption
> export controls, please refer to the following URL for the U.S.
> Department of Commerce/Bureau of Industry and Security website
> http://www.bis.doc.gov/encryption/default.htm. 
> 
> There are also many other countries that regulate the importation of
> encryption items including China, Russia, Israel, France, Hong Kong,
> Poland and the Czech Republic.  Seagate has substantiated these
> constraints with outside counsel; and, Seagate has directly encountered
> obstacles with our FDE drive manufacturing intentions for Wuxi, China. 
> While the China State Encryption Management Bureau (SEMB) is currently
> reviewing Seagate's manufacturing permit application, all manufactured
> FDE drives will need to be exported, and cannot be sold in China.  The
> SEMB confirmed Seagate's interpretation of the China Encryption
> Regulations that conducting encryption product business in China must
> entail use of the China government approved encryption algorithm, local
> China manufacture of the chip that includes the algorithm, and
> establishing an agent in China to manage the interactions with the
> government.
> 
> > -------- Original Message --------
> > Subject: Re: Next P1619/1619.1 Meeting -> Discussion Doc D0.7
> > From: james hughes <[EMAIL PROTECTED]>
> > Date: Sat, May 20, 2006 1:34 pm
> > To: [EMAIL PROTECTED]
> > Cc: james hughes <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> > 
> > I would like some references to the claims in the introduction. My  
> > reason for asking about such is that it is important that we (IEEE)  
> > standardize what is right, not what is politically in vogue at a  
> > moment in history. The I in IEEE is for International. Additionally,  
> > I am interested in which market? Anyway, references to the claims of  
> > this paragraph should be provided.
> > 
> > > Access control not just can be provided, but it is required by the  
> > > export control authorities,
> > 
> > Reference?
> > 
> > > and also by many local authorities,
> > 
> > Reference?
> > 
> > > where storage devices are sold. If the encrypted data is freely  
> > > accessible, the encryption module can be used as a stand alone,  
> > > high-speed encryption processor, which is prohibited in many markets.
> > 
> > Reference of the regulation and any example of a storage encryption  
> > device where the "encryption module can be used as a stand alone,  
> > high-speed encryption processor" in such a way that it violates a law?
> > 
> > I have looked for information on the web about this kind of  
> > information. There is a summary done in 1998, but I have found  
> > nothing online more recent.
> >     http://www.gilc.org/crypto/crypto-survey.html
> > 
> > 
> > On May 19, 2006, at 6:16 PM, [EMAIL PROTECTED] wrote:
> > 
> > > Here is an update of the non-removable secure storage discussion
> > > document. It does not contain new information, only editorial and
> > > formatting changes, in an attempt to make it easier to understand.
> > > -Laszlo
> > > <Nonremovable Discussions-D07.pdf>

Reply via email to