There was the RSA t-shirt which supposedly could be classified as a munition because the source code on the shirt would provide a high enough level of encryption:
PGP released a really nicely bound version of their source code typeset in an OCR font that they exported because a book would theoretically fall under the First Amendment:
Instructions to produce a nuclear bomb also fall under the First Amendment.
There was a contradiction in the laws. That's hardly novel or unprecedented. The higher courts pretty much spend all day dealing with contradictions in laws.
Cryptography is a defensive weapon. Zero-days on the other hand, are an offensive weapon. There are distinctions between helmets and clubs, you know, and the law should recognize these.
There are also laws against defensive items being owned by civilians as well. I disagree with them, but when I had an officer friend tell me my dragon skin armor I bought and used in Iraq was technically illegal now that I am a "civilian", that was one of the moments when I realized how much damage the national security state has done to the constitution.
I expect incoming comments about the LA bank robbery in 3, 2, 1...
I think danielweber is referring to systems designed to intercept and destroy ballistic missiles, not to ballistic missiles used for defensive purposes
>The kind of cryptography that lets people communicate securely?
I don't know of any other kinds of cryptography...
>Belongs on the same list as physical objects that intended to pierce walls and flesh?
War has a lot less to do with shooting people and a lot more to do with information than you seem to appreciate.
The public algorithms are public and there is no need or usefulness in export restrictions now on things known worldwide (and the usefulness of such restrictions was gone for a considerable time before they were lifted).
This seems a bit harsh, perhaps. Bletchley park was still in the minds of many people. It would have been conventional wisdom to keep this stuff away from "bad guys". Recall, gps was spoofed at this stage as well for civilian purposes. The other issue--although perhaps unsaid--is that ultimately this may have hastened tactics to make HW unsecure, and to collect undisclosed/zero day expoits in widespread SW and other things that could compromise a comms system that was perceived to be secure.
I'd also like a more in-depth explanation.