Bernstein v. United States

Bernstein v. United States is a set of court cases brought by Daniel J. Bernstein challenging restrictions on the export of cryptography from the United States.

Bernstein I
CourtUnited States District Court for the Northern District of California
Full case name Daniel J. Bernstein et al., v. United States Department of State et al.
DecidedApril 15, 1996
Citation922 F. Supp. 1426
Court membership
Judge sittingMarilyn Hall Patel
Bernstein II
CourtUnited States District Court for the Northern District of California
Full case name Daniel J. Bernstein et al., v. United States Department of State et al.
DecidedDecember 9, 1996
Citation945 F. Supp. 1279
Court membership
Judge sittingMarilyn Hall Patel
Bernstein III
CourtUnited States Court of Appeals for the Ninth Circuit
Full case name Daniel J. Bernstein et al., v. United States Department of State et al.
DecidedMay 6, 1999
Citation176 F.3d 1132
Case history
Prior actionHon. Marilyn Hall Patel ruled for plaintiff in 974 F.Supp. 1288
Court membership
Judges sittingBetty Binns Fletcher, Myron H. Bright, Thomas G. Nelson
Case opinions
Opinion by Fletcher
Concurrence by Bright
Dissent by Nelson

History

edit

The case was first brought in 1995, when Bernstein was a student at University of California, Berkeley, and wanted to publish a paper and associated source code on his Snuffle encryption system. Bernstein was represented by the Electronic Frontier Foundation, who hired outside lawyer Cindy Cohn and also obtained pro bono publico assistance from Lee Tien of Berkeley; M. Edward Ross of the San Francisco law firm of Steefel, Levitt & Weiss; James Wheaton and Elizabeth Pritzker of the First Amendment Project in Oakland; and Robert Corn-Revere, Julia Kogan, and Jeremy Miller of the Washington, DC, law firm of Hogan & Hartson. After four years and one regulatory change, the Ninth Circuit Court of Appeals ruled that software source code was speech protected by the First Amendment and that the government's regulations preventing its publication were unconstitutional.[1] Regarding those regulations, the EFF states:

Years before, the government had placed encryption, a method for scrambling messages so they can only be understood by their intended recipients, on the United States Munitions List, alongside bombs and flamethrowers, as a weapon to be regulated for national security purposes. Companies and individuals exporting items on the munitions list, including software with encryption capabilities, had to obtain prior State Department approval.

— Electronic Frontier Foundation: EFF's History[2]

The government requested en banc review.[3] In Bernstein v. U.S. Dept. of Justice, 192 F.3d 1308 (9th Cir. 1999), the Ninth Circuit ordered that this case be reheard by the en banc court, and withdrew the three-judge panel opinion, Bernstein v. U.S. Dept. of Justice, 176 F.3d 1132 (9th Cir. 1999).[4]

The government modified the regulations again, substantially loosening them, and Bernstein, now a professor at the University of Illinois at Chicago, challenged them again. This time, he chose to represent himself, although he had no formal legal training. On October 15, 2003, almost nine years after Bernstein first brought the case, the judge dismissed it and asked Bernstein to come back when the government made a "concrete threat".[5]

Recent

edit

Apple cited Bernstein v. US in its refusal to hack the San Bernardino shooter's iPhone, saying that they could not be compelled to "speak" (write code).[6]

See also

edit

References

edit
  1. ^ "U.S. Court of Appeals for the Ninth Circuit: Bernstein v. USDOJ". Electronic Privacy Information Center. May 6, 1999. Retrieved April 17, 2019.
  2. ^ "EFF's History". Electronic Frontier Foundation. October 7, 2011. Retrieved May 4, 2012.
  3. ^ Bernstein, Daniel J. "Summary of the case status". cr.yp.to. Retrieved April 17, 2019.
  4. ^ "192 F. 3d 1308 – Daniel Bernstein v. United States Department of Justice". OpenJurist. F3d (192): 1308. 1999. Retrieved April 17, 2019.
  5. ^ Bernstein, Daniel J. "Press Release: Crypto Case on indefinite hold". cr.yp.to. Retrieved April 17, 2019.
  6. ^ Kim Zetter; Brian Barrett. "Apple to FBI: You Can't Force Us to Hack the San Bernardino iPhone". Wired. Retrieved January 6, 2021.
edit