Export Controls
- Encryption -

International Traffic in Arms Regulations (ITAR)

ITAR encryption controls are located in three primary Categories on the US Munitions List (USML). They are:

  • Category XI - Military Electronics
    • Subparagraph (b) - Encryption software designed or modified to:
      • Generate spreading code for spread spectrum or hopping code for frequency agility (does not include fixed code techniques);
      • Use "burst" (time compression) techniques;
      • Use "burst" (time compression) techniques;
      • Suppress compromising emanations of information bearing signals.
  • Category XIII - Auxiliary Military Equipment
    • Subparagraph (b) - Encryption software designed or modified for:
      • Military information security systems (including key management);
      • Tracking, Telemetry and Control (TT&C) including decryption;
      • Generating spreading or hopping codes for military spread spectrum systems or equipment;
      • Military cryptanalytic systems;
      • Military information systems providing certified or certifiable multi-level security or user isolation exceeding class B2 of TCSEC.
  • Category XV - Spacecraft Systems and Associated Equipment
    • Subparagraph (b) - Encryption software designed or modified for
      • Ground control stations for telemetry, tracking and control of spacecraft or satellites.
    • Subparagraph (c) - Global Positioning System (GPS) receiving equipment:
      • Designed for encryption or decryption (i.e. Y-Code) of GPS precise position service (PPS) signals.

NOTE:  The citations provided above are intended as general summaries and are not authoritative. Researchers are responsible for consulting the USML for encryption software specifically designed or developed for a military, intelligence or space application.


"This material is adapted from the basic design and content of Stanford University's Decision Tree. We appreciate Stanford in granting us permission to use its content for the benefit of the University of Vermont".