Here are brief introductions to the main sections of our presentation. Feel free to browse them in order, or to find a subject of your specific preference:
Export Control Policy
Current US technology export control policy has been based on legacy laws that carry from World War II. Many laws that were created with nuclear weapons weighing heavily on the mind have facilitated the development of current technology policy. These established laws have defined how military-oriented technology should be controlled for export, as well as "dual-use" technology that can have both civilian and military applications. With the rapid expansion of supercomputers and encryption technology, largely "dual-use", the executive office's ability to make fast policy has largely outlined the overall current export controls on such technology.
Current Situation
Both sides in the battle that rages over export controls
invoke the term ãriskä to make a case for a tightening or
relaxation of current policies. Those who favor heightened trade
restrictions argue that we face a substantial risk to our domestic
security by terrorists, criminals, and hostile nations by exporting
high technology items. Those who favor the loosening of export
controls argue that it is our own technology companies who are at risk
when we tie their hands and prevent them from competing in the global
market by limiting the foreign sale of goods.
Looking Ahead
In an attempt to find solutions to the control over exporting technology, we should look at current ideas. There are several proposals currently being debated with several groups backing them. Each proposal has merit, but each has some flaws. As always, none completely satisfies everyone, but to devise an effective solution, we must understand the current debates.
Conclusion
The creation and maintenance of an export control policy
is a dynamic and difficult process. In this section we would like to
present some of the ethical issues that frame the current export
control debate. In addition we will present our own analysis of
current US policy in light of the changing global situation. Finally,
we will take a quick look at some of the crucial differences between
strong encryption software and supercomputers, and analyze how and why
these differences produce the need for fundamentally different
policies.
|