Feeds

Crypto code is protected speech – appellate court

Not inexpressive, just because you can't understand it

  • alert
  • submit to reddit

Intelligent flash storage arrays

The Sixth US Circuit Court of Appeals ruled this week that application source code is protected by the First Amendment because it is a means of communication among programmers, the Associated Press reports. The ruling marks the first time a federal appellate court has ruled that source code is protected by the First Amendment to the US Constitution, American Civil Liberties Union (ACLU) Legal Director for Ohio Raymond Vasvari said. He's not quite right: the Ninth US Circuit Court of Appeals ruled in May, also finding that encryption source code is protected by the First Amendment, but who's counting. "This is a great day for programmers, computer scientists and all Americans who believe that privacy and intellectual freedom should be free from government control," the wire service quotes Vasvari as saying. The recent ruling opens the way for a lawsuit by Case Western Reserve University Law Professor Peter Junger to be reconsidered in federal court. Junger claims the government violated his First Amendment rights by requiring a license to export cryptographic source code. Junger wanted to publish his encryption code on a Web site to help teach his students, his lawyer, Gino Scarselli, said. Such a posting is defined as an export under current US regulations, and the government required him to apply for a license first. Appeals Judges Boyce Martin, Eric Clay and Herman Weber reversed an earlier ruling against Junger which found the government's license requirement not in violation of the First Amendment. "Much like a mathematical or scientific formula, one can describe the function and design of encryption software by a prose explanation; however, for individuals fluent in a computer programming language, source code is the most efficient and precise means by which to communicate ideas about cryptography," the judges wrote. "The [US] Supreme Court has expressed the versatile scope of the First Amendment by labelling as 'unquestionably shielded' the artwork of Jackson Pollack, the music of Arnold Schoenberg, or the Jabberwocky verse of Lewis Carroll," the decision says. "Though unquestionably expressive, these things identified by the Court are not traditional speech. Particularly, a musical score cannot be read by the majority of the public but can be used as a means of communication among musicians. Likewise, computer source code, though unintelligible to many, is the preferred method of communication among computer programmers." "Because computer source code is an expressive means for the exchange of information and ideas about computer programming, we hold that it is protected by the First Amendment," the judges concluded. So again the gavel falls on the side of the First Amendment. If no future court challenge should be successful, then the judges' ruling will stand. These fellows were clearly in need, a week or so ago, of a lecture by FBI Director Louis Freeh and US Attorney General Janet Reno on the overriding interests of kidnapped children; but now, we suppose, it's too late for that. ®

Beginner's guide to SSL certificates

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?