Home >Policies and Regulations > BIS TAC Site

INFORMATION SYSTEMS TECHNICAL ADVISORY COMMITTEE

November 7-8, 2007

OPEN SESSION ( November 7, 2007 ):

Public Presentations:

ANS Proposal: Roz Thomsen presented an ANS proposal for restructuring Cat 5 Part 2 (C5P2) into a positive list. This proposal uses section 740.17.b.2. of the EAR (encryption export control placed on high-end network infrastructure products) as the starting point for the positive list, and adds the following changes:

– Provides a definition of “network infrastructure” with specific reference to standard “encrypted throughput”.

– Provides a definition of “encrypted throughput”.

– With regard to “air-interface coverage”, removes customer-location equipment that is based on the WiMax standard.

– Removes the provision for controls on Open Cryptographic Interfaces (“OCI”), which is believed to be a uniquely US only control.

– Extends the 740.17.b.2 list by adding 1) managed VoIP infrastructure and 2) network security infrastructure for government use.

Agenda Item Presentations/Discussions:

PUBLIC SESSION (All day on Wednesday, November 7 th)

SEMI: Maggie Hershey of SEMI commented on the state of the industry, VEU and the CCL comprehensive review. Key points were:

– Hot topics in the industry are: 450 mm vs 300 mm prime; solar energy and the resultant silicon shortage; escalating R&D costs; and intellectual property protection.

– VEU aligns well with the industry structure (i.e., repetitive licensing for a small group of customers). Dave Robertson commented that his customers state that they are being advised by the Chinese Gov’t not to apply for VEU status. Don Weadon noted that only the ECCNs associated with VEU authorizations have been released, and that it would be useful to also know the conditions associated with the VEU authorizations.

– SEMI’s recommendations for the CCL comprehensive review include: A new Core List exercise, as the last one was 17 years ago, to be conducted in face-to-face meetings rather than through correspondence and approached as a blank-piece-of-paper. Another recommendation is creation of a new license exception “SEM” that would facilitate export but still provide for a method to track exports.

– The export control workshop at SEMICON was successful and well-attended this year, and is planned to be held again next year.

Raytheon: Jonathan Wise of Agilent talked through a presentation by Jon Goding of Raytheon that had originally been presented at the DEAC meeting in Cambridge, MA on June 19, 2007. The purpose of this was to introduce Raytheon’s issues and suggestions to the ISTAC. It was agreed to defer consideration of these suggestions until next year, due to the large number of encryption-related proposals currently under review. Readers are referred to the minutes of the June 19 DEAC meeting for additional detail of the Raytheon presentation.

History of Encryption Hardware: Noel Matchett of Information Security provided an information/educational overview of encryption technologies, including historical and current encryption hardware, systems, uses and customers. This presentation was well-received and prompted much discussion. As this presentation was educational, no further action was required.

Range and Standards: David Robertson of Analog Devices presented a technical analysis of effective transmission range for various telecommunications standards, with the goal of providing a framework for interpretation and review of the current proposal pertaining to short-range wireless. The presentation began with an overview of the various transmission modes (broadcast, point-to-point, point-to-multipoint, and multipoint-to-multipoint), the various categories of network (PAN, LAN, WAN, MAN), and the underlying IEEE standards. Three general themes were identified: Modulation schemes are becoming increasingly sophisticated; the fact that silicon (hardware) is cheaper than spectrum leads to increased use of sophisticated signal processing; and in any individual link, there is a range/data-rate trade-off that is determined by creating the link and then raising data rate as much as permitted by the actual S/N on that link. The conclusions were: that range is not likely to be useful as a control parameter; that caution is necessary to distinguish between specifications of transmission range and claims of transmission range; that design intent may serve as a useful differentiator for nominal transmission range (e.g., PAN/LAN vs. MAN/WAN).

MIMO Technology Overview: Frank Quick of Qualcomm presented a technology overview of MIMO (Multiple-Input Multiple-Output). MIMO as a technique that uses multiple antennae at both the transmission and reception ends to increase data throughput. A critical requirement for MIMO is slowly-varying channels (i.e, low velocity). Frank opined that MIMO is not of sufficient concern that it warrants consideration by Wassenaar, but suggested that at higher levels (above 4x4) it might be considered for US AT-level controls. Dave Robertson suggested at AT-level controls should not be pursued because MIMO is already commercially deployed in some systems in China.

WA Proposals for 2008: Discussion time for the draft Wassenaar proposals for 2008 was offered, but there were no new proposals and no comments. A summary of the draft Wassenaar proposals for 2008 is in the minutes of the July 27, 2007 ISTAC meeting.

Systematic Review of the CCL: Discussion time for the CCL Comprehensive Review was offered. There were no specific comments regarding the drafts reviews that have already been submitted by the ISTAC to BIS. It was agreed that these drafts would be posted on the ISTAC website. Michael Angelo agreed to provide comments for biometric devices as they pertain to Cat 3 and Cat 4. Roz Thomsen offered to write white papers for encryption proposals that are not forwarded to Wassenaar in 2008.

The open session was adjourned.

 

 

 

 

                                 

                        

 
FOIA | Disclaimer | Privacy Notice | Information Quality | Department of Commerce | Contact Us