IN THE UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT


DANIEL J. BERNSTEIN			)
					)
		Plaintiff/Appellee,	)
					)
v.					)
					)	No. 97-16686
					)  
UNITED STATES DEPARTMENT OF 		)	C-95-0582 MHP
  STATE et al.,  			)	(N.D. California,
					)	  San Francisco)
					)
		Defendants/Appellants	)
					)

ON APPEAL FROM THE 
UNITED STATES DISTRICT COURT 
FOR THE NORTHERN DISTRICT OF CALIFORNIA
HONORABLE MARILYN HALL PATEL, PRESIDING

APPELLEE'S OPPOSITION TO EMERGENCY MOTION FOR STAY

	CINDY A. COHN, ESQ.; SBN 145997
	McGLASHAN & SARRAIL
	Professional Corporation		
	177 Bovet Road, Sixth Floor		
	San Mateo, CA  94402
	Tel: (415) 341-2585
	Fax: (415) 341-1395

        LEE TIEN, ESQ.; SBN 148216
	1452 Curtis Street			
	Berkeley, CA 94702			
	Tel: (510) 525-0817			 	

 	JAMES WHEATON; SBN 115230
	ELIZABETH PRITZKER; SBN 146267
	FIRST AMENDMENT PROJECT
	1736 Franklin, 8th Floor
	Oakland, CA 94612
	Tel: (510) 208-7744
	
	ROBERT CORN-REVERE, ESQ.
	JONATHAN FRANKLIN, ESQ.	
	Hogan & Hartson, L.L.P.
	555 Thirteenth Street, NW
	Washington, DC 20004
	Tel: (202) 637-5600	

	Attorneys for Appellee
	Daniel J. Bernstein


INTRODUCTION

	After conceding that source code is speech ("It is undeniably true
that encryption source code, such as the source code for Snuffle . . . can
be read and understood by computer scientists and
programmers.")(Appellants' Stay Motion at 15), Appellants still assert
that the prior restraint on this speech undeniably created by their
regulatory scheme should be continued pending appeal.  This request, which
has been denied by the District Court, should again be denied.	

BACKGROUND

	For the past five years the government has restrained the
Plaintiff/Appellee, Professor Daniel Bernstein, from publishing his
academic research and computer source code in the field of cryptography.
The First Amendment to the United States Constitution denies to the
government the ability to impose prior restraints on speech except in
those few "exceptional cases," Near v. Minnesota, 283 U.S. 697, 706
(1931), where publication will cause "direct, immediate and irreparable
harm to the nation."  New York Times Co. v. United States, 403 U.S. 701,
730 (1971) (Stewart, J., joined by White, J. concurring); see also id. at
726-27 (Brennan, J., concurring); id. at 719 (Black, J. and Douglas J.,
concurring).  Nor may the government impose even lesser restrictions on
expressive activity based on "speculation about serious harms."  United
States v. Nat'l Treasury Employees Union, 115 S. Ct. 1003, 1017 (1995).
Instead, the government must "demonstrate that the recited harms are real,
not merely conjectural."  Turner Broadcasting Systems, Inc. v. FCC, 114 S.
Ct. 2445, 2470 (1994).
	
Despite these settled rules of constitutional law, Professor Bernstein has
been precluded from engaging in traditional academic dialogue in his
chosen field since 1992, when he first sought assurance from the
government that he could publish his Snuffle 5.0 encryption software and
related documents.  The government steadfastly denied his request -- just
as it is seeking to do now.  During the intervening years, Professor
Bernstein has been given erroneous information (that subsequently was
disavowed by the government), had an academic paper about Snuffle wrongly
classified as a "munition" (also disavowed by the government), and has
been subjected to unconscionable delays.  Bernstein v. U.S. Department of
State, 922 F.Supp. 1426, 1434 (N.D. Cal. 1996) ("Bernstein I") ("item
defendants now contend could not be subject to regulation was apparently
categorized as a defense article and subject to licensing for nearly two
years").

Professor Bernstein was forced to seek redress in federal court.  The
District Court held, in three separate opinions,  that the Government's
licensing regulations on encryption source code constitute a facial prior
restraint on protected speech.  In two of those opinions, the District
Court held that the prior restraint was unconstitutional.   In the last of
those opinions, issued August 25, 1997, the District Court granted an
injunction to protect Professor Bernstein and others from prosecution for
discussing the science of cryptography, including in the international
electronic forum of the Internet.  This injunction was limited to
Professor Bernstein and those who would interact with him and the
cryptographic ideas he sought to publish and discuss.

Shortly thereafter, in response to the Government's emergency stay motion
in the District Court, that Court reluctantly stayed the injunctive relief
in part, limiting it even further to protect only Professor Bernstein and
only in the electronic publication  of a two-page computer program called
Snuffle 5.0 (Exhibit A filed herewith) and later versions of that program
(hereinafter collectively referred to as "Snuffle") pending appeal.  The
District Court emphasized its extreme reluctance to grant even the partial
stay, given what it felt were facts clearly undermining the Government's
claim of harm.  See Transcript made part of Order.

The Government here challenges the remaining, extremely limited injunction
left after the District Court's partial stay.  They claim, without any
concrete evidence, that electronic publication of Snuffle pending appeal
of the broader question the facial invalidity of the encryption
regulations will do "irreparable harm" to the security of the United
States.  Relying on declarations of government officials that say precious
little about the subject of the instant Motion -- the ability to publish
Snuffle -- Defendants instead base their stay request upon a general
recitation of the history of military cryptography.  "Encryption has long
been a tool in the conduct of military and foreign affairs," Defendants
state, Stay Mot. at 3, and they contend therefore that this Court must
prolong the prior restraint without asking too many questions.  See
Crowell Decl. at para. 10.  At bottom, Defendants assert that a stay is
necessary because:  (1) the District Court erred in holding that Plaintiff
has been improperly restrained from engaging in fully protected speech,
and (2) the nation will be irreparably harmed unless publication is
restrained.

Appellants' essential claim is that the keeping of messages secret is
inherently dangerous.  But "the American Founding Fathers did not believe
codes and ciphers were employed from purposes of evil and cruelty."
Rather, they viewed secret writing as an essential instrument for
protecting critical information not only in wartime, but in peacetime, as
well.   During the period when our Constitution was written, "cipher was
employed extensively not only in public correspondence but in the private
correspondence of public men as well."   Thomas Jefferson was one of the
more prolific users of cryptography among the Constitution's framers.
The use of cryptography, as well as free academic inquiry, have always
been part of America's tradition of free speech.  The government itself
has acknowledged this in the past, concluding that restrictions on the
academic exchange of cryptographic technical data were a prior restraint.
The invention and use of computers does not alter the inherent First
Amendment dimension of this issue.  See Reno v. ACLU, 117 S. Ct. 2329,
2344 (1997).  Here, the government's efforts to downplay the First
Amendment intrusions created by its encryption software regulations are
exceeded only by its attempt to inflate its national security assertions.
Neither of these efforts is sufficient to require the granting of a stay
to prevent the publication of Snuffle.  

ARGUMENT

In order to obtain a stay pending appeal, the Government must demonstrate
either that it will suffer irreparable harm pending appeal combined with
probable success on the merits, or that serious questions exists on appeal
and "the balance of hardships tips sharply in [its] favor."  Tribal
Village of Akutan v. Hodel, 859 F.2d 662, 663 (9th Cir. 1988).  Moreover,
the District Court's denial of a request for a complete stay pending
appeal is entitled to substantial deference. In particular, a District
Court order enjoining unconstitutional government action that violates the
First Amendment may be set aside only if the court abused its discretion.
Christian Science Reading Room v. City and County of San Francisco, 784
F.2d 1010 (9th Cir. 1986), cert. denied, 479 U.S. 1066 (1987);  Regents of
the University of California  v. ABC, Inc., 747 F.2d 511, 522 n.7 (9th
Cir. 1984) (denial of stay request is not an abuse of discretion).

The Government has satisfied neither standard under which a stay could be
issued to prevent the publication of Snuffle.  They have presented only
conclusory allegations that electronic publication of Snuffle will harm
national security in some undefined way -- allegations that only underscore
the Government's lack of concrete justification for the prior restraint it
seeks to impose.  Balanced against these unsupported assertions is the
very real, and necessarily irreparable, harm that Professor Bernstein will
suffer through the continued prior restraint on the publication of his
academic work.  Finally, even if the Government could show that it would
suffer irreparable harm in the absence of a stay, or that the balance of
hardships tips "sharply" in its favor -- which it cannot -- the Government has
failed to show the requisite likelihood of success on the merits.

In sum, the District Court plainly did not abuse its discretion in holding
that a stay should not be granted to prevent the publication of Snuffle
pending appeal.  The Government's regulations significantly impact
Professor Bernstein's free speech rights, and that the Government's prior
restraint contains none of the safeguards required by the First Amendment.
Finally, the public interest -- far from militating in favor of the continued
restraint -- in fact supports the District Court's injunction allowing
Professor Bernstein to continue his academic work without further
Government censorship.  

I.	THE BALANCE OF DEMONSTRATED HARDSHIPS TIPS OVERWHELMINGLY IN
PROFESSOR BERNSTEIN'S FAVOR

	A.	The Government Has Failed To Prove Any Harm From the
Publication of Snuffle, Much Less Irreparable Harm

	The Government cannot receive a stay based on merely speculative
assertions of harm.  See, e.g., Caribbean Marine Servs. Co. v. Baldridge,
844 F.2d 668, 674 (9th Cir. 1988) (preliminary injunction standards).  Yet
the Government has made no concrete showing that the limited injunction
now in place will harm national security in any way.  As the District
Court found, the government has offered nothing more than bare allegations
of harm, which are clearly insufficient to meet the requirements of harm
necessary to justify a prior restraint on speech.  Bernstein III, slip op
at 26:3-20.  This same bare allegation is insufficient here as well, where
the government seeks to stay an injunction based on alleged national
security concerns.  See Armstrong v. Executive Office of the President,
877 F. Supp. 750 (D.D.C. 1995) (National Security Council denied stay
pending appeal where it could not show likelihood of success on the merits
or irreparable injury).  

The Government adds nothing new in their Motion for Stay or the
supporting declarations, merely repeating the conclusory assertions that
the use of encryption "can impede intelligence gathering," "can
jeopardize" foreign policy interests and "can threaten" the safety of U.S.
citizens.  Stay Mem at 19.  Once again, however, the Government offers no
evidence whatsoever that any actual harm has or will result from the
export of encryption programs that are freely available in this country in
any form and freely exportable in paper versions, and it certainly has
demonstrated no specific harm that will result from the posting of Snuffle
on the Internet. Where the deprivation of First Amendment rights is at
issue, it is an abuse of discretion to grant a stay absent a compelling
showing by the government that such a stay is necessary.  See Wildmon v.
Berwick Universal Pictures, 983 F.2d 21, 23-24 (5th Cir. 1992) (stay of
injunctive relief issued to "preserve the status quo" reversed where
district court had granted injunction on First Amendment grounds).  The
Government's conclusory, unsupported allegations of harm merely underscore
the patent invalidity of the prior restraint it seeks to impose on
Professor Bernstein's speech.  It seeks to review in advance, and censor,
the electronic communications of Professor Bernstein and others in his
field, yet presents no evidence of any specific national security
interests that would be harmed by such communications.  

Moreover, it is plain that not even the Government believes its
own assertions here regarding national security concerns for cryptography
on the Internet.  As  Vice Admiral J. M. McConnell of the National
Security Agency testified before Congress, "[e]ncryption software
distribution via Internet, bulletin board or modem does not undermine the
effectiveness of encryption export controls."   Even Appellants' current
declarant, William Crowell, told Congress as recently as last year that
the Internet did not pose a problem for export controls because, "serious
users of security products don't obtain them from the Internet."   The
Government's own testimony therefore confirms that they have failed to
demonstrate irreparable harm from web site postings of encryption software
in general, much less the specific posting of Snuffle.  

The Pentagon Papers case, which the District Court relied on
below, further supports denial of the Government's motion.  See United
States v. New York Times Co., 328 F. Supp. 324, 330 (S.D.N.Y.) (injunction
denied where government could not demonstrate irreparable harm), aff'd,
403 U.S. 713 (1971).  There, the Second Circuit granted a very limited,
three-day stay of the District Court's decision to permit publication of
the Pentagon Papers despite the government's national security
allegations.  Yet the Supreme Court reversed even this short, targeted
restriction on publication.  United States v. New York Times, 444 F.2d 544
(2d Cir. 1971), rev'd, 403 U.S. 713 (1971).  In a parallel case, the D.C.
Circuit declined to overturn the District Court's denial of an injunction
with respect to publication in the Washington Post, and the Supreme Court
upheld that decision.  United States v. The Washington Post Co., 446 F.2d
1327 (D.C. Cir. 1971) (en banc), aff'd, 403 U.S. 713 (1971).   

 It is particularly instructive that the government argued in the
Pentagon Papers case that suppression of speech was necessary to preserve
secrets relating to cryptography.  In a hearing at the U.S. Court of
Appeals for the D.C. Circuit, an NSA official argued that, in its "worst
case" scenario, publication of the Pentagon Papers would reveal that the
United States had the ability to decode North Vietnamese communications.
This assertion, however, was insufficient to support the proposed
restraint.    The Supreme Court similarly found the national security
claims unsubstantiated, holding that the government must demonstrate that
publication would cause direct, immediate and irreparable harm to the
nation.    As in the Pentagon Papers cases, it would be an abuse of
discretion for this Court to grant this stay based upon nothing more than
assertions of a national security interest.  Cf. Clinton v. Jones, 117 S.
Ct. 1636, 1651-2 (1997).

With respect to national security, it should be emphasized that
the injunctive relief presently in force is very narrow.  All that
Professor Bernstein can do under the remaining injunction is to publish
electronically two pages of source code, Exhibit A, as well as any
improvements which he has made to that code in the many years since he
first began asking the government for permission to publish.  No other
person can republish Professor Bernstein's source code, even to comment on
it or improve upon it as part of the normal scientific process.
Furthermore, Professor Bernstein cannot publish any of his other ideas in
the field or comment upon the ideas of others on the Internet.   Even if
the Government could demonstrate harm arising from Professor Bernstein's
publication of cryptographic information in general -- which it cannot -- it
plainly has shown no harm arising from the narrow relief that is presently
at issue.

Moreover, as noted, the Government's claim of irreparable harm
claim is particularly undermined because of the exemption in the
regulations for source code printed on paper.  The District Court found
that this exemption deprived the Government's national security claims of
credibility, holding that:

  Defendants claim that encryption poses unique and serious threats to
  national security, yet the printed matter exception belies this rationale
  by making encryption freely available to only those foreigners are
  technologically sophisticated.  Defendants conceded at oral argument that
  the effect of this dichotomy would be to make it more difficult only for
  the inept.

Bernstein III, slip op. at 25.  This finding was not an abuse of
discretion.  Not only is the distinction between Internet publication and
paper publication clearly untenable in light of the Supreme Court's recent
decision in Reno v. American Civil Liberties Union, 117 S.Ct. 2239 (1997),
but it is not necessary to grant a stay to "preserve the status quo"
where, as here, cryptographic information is freely available to foreign
entities in other forms.

Additionally, the Government's claims are undermined by the fact
that a wide range of cryptographic software is already available overseas.
See Declaration of David Balenson, with cryptography study attached
(Exhibit G).   When 570 cryptographic products are already available
abroad, using strong cryptographic software and algorithms developed first
in the U.S. as well as others developed by foreign sources, the
government's claims of irreparable harm due to the publication of the
simple Snuffle program begin to look quite ridiculous.

Defendants' claim that a stay is necessary to preserve the status
quo rests most uneasily next to their statement that "[o]nce Snuffle is
exported to a person or group abroad, whether via the Internet or in some
other way, it is impossible to control either the persons who receive it
or the use that they make of it."  Stay Mot. at 21.  By their own
assertions, this already is the status quo, since the government has
claimed that Snuffle has been made available on "publicly accessible
computers overseas."  Stay Mot. at 21, Reinch Decl. ¦  8.   Under settled
law, no injunction preventing publication can be retained under these
circumstances, regardless of the government's national security
assertions. 

B.	Professor Bernstein Will Suffer Irreparable Harm to His First
Amendment Rights if the Prior Restraint is Continued Pending Appeal

Professor Bernstein has been restrained from the electronic publication of
his protected expression for more than five years.  And despite the
District Court's December, 1996 holding that the restraint is
unconstitutional and its pending issuance of a final injunction, he has
continued to be restrained.  The continued restraint on him is now plainly
unacceptable.  It is well-settled that " Ô[t]he loss of First Amendment
freedoms, for even minimal periods of time, unquestionably constitutes
irreparable injury.' "  American-Arab Anti-Discrimination Comm. v. Reno,
70 F.3d 1045, 1057 (9th Cir. 1995) (quoting Elrod v. Burns, 427 U.S. 347,
373 (1976) (plurality opinion)).  Accord, Topanga Press, Inc. v. City of
Los Angeles, 989 F.2d 1524, 1528-29 (9th Cir. 1993); San Diego Comm.
Against Registration and the Draft v. Governing Bd. of the Grossmont Union
High School Dist., 790 F.2d 1471, 1473 n.3 (9th Cir. 1986).  Accordingly,
a stay of District Court's injunction pending appeal, regardless of
whether the appeal is expedited, would irreparably harm Professor
Bernstein by preventing him from engaging in activities protected by the
First Amendment.

The Government nevertheless asserts that since it has successfully
restrained Professor Bernstein for so long pending the District Court's
final injunction, continuing that restraint "can hardly be said to impose
a significant burden on Bernstein."  Stay Mot. 22:11.  This argument turns
First Amendment prior restraint doctrine on its head.  The fact that the
Government has been able to censor Professor Bernstein's publications to
date weighs not in favor of further restraint, but rather in favor of
ending the restraint.  Professor Bernstein has been waiting more than five
years to be free from the threat of criminal prosecution for engaging in
protected speech.  Now that the District Court has finally ruled in his
favor, he should not be forced to wait any longer. 

II.	THE GOVERNMENT HAS NOT SHOWN THE REQUISITE LIKELIHOOD OF SUCCESS
ON THE MERITS

The Government's failure to identify any concrete harm that would befall
it in the absence of a stay is fatal to its motion.  See Bernard v. Air
Line Pilots Ass'n, 873 F.2d 213 (9th Cir. 1989).  In addition, the
Government has failed to demonstrate the requisite likelihood of success
on the merits.  The District Court quite properly held that the encryption
regulations are plainly unconstitutional on their face.  They regulate
protected speech; they are a prior restraint and they contain none of the
procedural protections required by Freedman v. Maryland, 380 U.S. 51
(1965), and its progeny.  Nothing in the government's brief casts doubt on
these conclusions.

A.	The Regulations Specifically Target Speech   

Contrary to the government's current claim, the export controls relating
to encryption are "specifically directed at speech protected by the First
Amendment."  Bernstein III, slip op. at 24.  Just as it argued below, the
government now asserts that the export licensing requirements at issue do
not act as a prior restraint because they are not aimed at "preventing the
free exchange of information and ideas" but only at the "functional
capacity" of encryption software.  Stay Mot. at 14, 15.  Defendants' claim
is wrong for several reasons.  First, by their terms, the export
regulations are not limited to controlling only source code or software,
but apply to a range of expressive activities--including here to the
"instructions" for Snuffle written by Professor Bernstein in
English--whether or not they have "functionality."  As noted below, in the
realm of academic speech, restricting the exchange of source code
inherently limits the exchange of "information and ideas."  Moreover, by
singling out software on the subject of cryptography from other software,
the regulations are plainly content-based.  The District Court found that:

  [A]s made explicit by the new regulations, export includes publication
  where the publication is or could be made electronic and even where the
  information to be published is already publicly available.  In fact, in
  spite of the disclaimers regarding functionality and the exception for
  printed materials, the encryption regulations issued by the BXA appear to
  be even less friendly to speech interests than the ITAR.  Here, encryption
  software is singled out and treated differently than other software
  regulated under the EAR.

Bernstein III, slip op. at 24. 


B. 	Encryption Source Code, Like All Source Code, Is Protected
Expression

As noted above, the Government agrees that it is "undeniably true that
encryption source code, such as the source code for Snuffle . . . can be
read and understood by computer scientists and programmers" but asserts
that restricting such academic exchange is not a limitation on speech
because export controls are directed at the "non-expressive function of
cryptographic software" and not at "whatever information may be claimed to
be embodied and conveyed."  Stay Mot. at 15-16.  This is nothing more than
sophistry, and Defendants cite no case law to support this new category of
lesser protected speech they seek to have recognized.  Moreover, as the
District Court held, "functionality" cannot be restricted without
censoring the "information . . . embodied and conveyed":

  By the very terms of the encryption regulations, the most common
  expressive activities of scholars -- teaching a class, publishing their
  ideas, speaking at conferences, or writing colleagues over the Internet --
  are subject to a prior restraint by the export controls when they involve
  cryptographic source code or computer programs.  In the field of applied
  science ideas are not just expressed in abstract, theoretical terms, but
  in precise applications.  Those applications are subject to licensing
  under the encryption regulations and are excluded from the exemptions for
  fundamental research and educational information.

Bernstein III, slip op. at 23.

The District Court's findings are confirmed by M.I.T. computer science
professor and author of the leading introductory textbook on computer
science, Harold Abelson (see Exhibit E), among many others in the
Declarations and exhibits submitted below.  Professor Abelson quoted the
introduction to his textbook:

  First, we want to establish the idea that a computer language is not just
  a way of getting a computer to perform operations but rather that it is a
  novel formal medium for expressing ideas about methodology.  Thus,
  programs must be written for people to read, and only incidentally for
  machines to execute.

Abelson Declaration, Exhibit E, at para. 8, quoting preface to Abelson &
Sussman, "Structure and Interpretation of Computer Programs," MIT Press
and McGraw-Hill Book Company (1985)

Further support is found in scholarly legal analysis and in the fact that
computer programs are protected under copyright law just as other forms of
speech: As the Office of Technology Assessment noted, "Like other
copyrightable works, programs symbolize information to human beings, and
can be read and understood by programmers.  The CONTU report stressed that
programs, like other copyrightable works, communicate to those who can
read them."  Office of Technology Assessment, Intellectual Property Rights
in an Age of Electronics and Information 80 (1986).  Since the first
amendment protects an individual's right to communicate with others, it
must protect a computer programmer's right to communicate with others in a
special language. . . . .

  Just as a mathematics text or written music communicates to a specially
  trained group of readers, a computer program communicates to its own group
  of readers.  When seen in this light, the first amendment implications of
  computer programs are no different from those of many other copyrightable
  texts.

Alfred C. Yen, "A First Amendment Perspective on Idea/Expression Dichotomy
and Copyright in a Work's Total Concept and Feel," 38 Emory L.J. 393, 430
n.190 (1989).  Examples of easily readable source code abound.  See, e.g.,
Exhibit F, Decl. of Bernstein in Opposition to Defendants' Second Motion
for Summary Judgment.  Yet even if lay people are unable to read more
complex programs, just as a lay person may not be able to read a symphony
score, such programs are readable and are read by computer scientists and
others are protected speech.

C.  The Regulations Are A Prior Restraint On Protected Speech

The government acknowledges that its regulations prevent a professor of
mathematics from publishing his own ideas, expressed in computer
programming language, on the Internet.  The government further admits, as
it must, that such publication would be fully protected speech if
accomplished in a book.  Yet despite these admissions, the government
contends that its regulations do not have a close enough nexus to
expression or to conduct commonly associated with expression, to pose a
real and substantial threat of censorship.  City of Lakewood v. Plain
Dealer Publishing Co., 486 U.S. 750 (1988).  Instead, Defendants compare
the encryption controls to restrictions on sitting or lying on a sidewalk,
and cite as their primary authority Roulette v. City of Seattle, 97 F.3d
300 (9th Cir. 1996).

The government made the same assertion below, without success.  The
District Court found that there is no legitimate comparison between the
ordinance in Roulette and the licensing scheme, and it quite properly
rejected the government's reliance on symbolic speech cases.  Bernstein
III, slip op. at 23-24 ("The encryption regulations . . . are much more
like the regulation of newspaper racks than lying or sitting");  Bernstein
I, 922 F. Supp. at 1435 ("A computer program is so unlike flag burning and
nude dancing that defendants' reliance on conduct cases is misplaced.").
Indeed, in every case where this Court has considered a licensing scheme
directed at expression, like the one at issue here, it has applied the
body of law applicable to prior restraints, and not the symbolic speech
cases.     This is nothing more than a straightforward application of the
bedrock principle that the most rigorous First Amendment protections apply
to licensing schemes that vest government officials with authority to
review and limit speech in advance. 

Contrary to the government's assertions here, it is impossible to
separate the communicative from the noncommunicative attributes because
speech about cryptography (e.g., technology and technical data) is
expression, algorithms and source code are an integral part of academic
speech, and, as noted below, encrypted messages are themselves still
speech.  The government's argument is not that these regulations are
unrelated to speech -- it is that encrypted speech, if used by the wrong
people for bad purposes, is too dangerous.  Defendants are free to try to
persuade the Court that this is so, but it will require a far more
rigorous constitutional analysis than that set out in Roulette.

If conduct cases are to be triggered at all here, they can only be
so with the observation that any issues of "speech" and "conduct" are
inseparable.  In cases such as this, the courts have rejected attempts to
uphold licensing schemes despite the argument that the license applied to
"a whole range of easily identifiable and constitutionally proscribable
conduct."   These cases rejected the notion that a licensing scheme could
be upheld by separating the "noncommunicative elements" from the
communicative elements of an activity.  They held that the activities were
"intertwined" so that regulation of one involved regulation of the other.
Riley, 467 U.S. at 963 n.11;  Schaumberg, 444 U.S. at 632;  Gaudiya
Vaishnava Society, 952 F.2d at 1065;  See Lakewood, 486 U.S. at 762
(holding as "meaningless" the distinction of distributing newspapers "by a
machine rather than by hand").

D.	Functional Speech is Still Speech

As noted above, the government's assertions regarding
"functionality" do not diminish the District Court's First Amendment
findings.  Indeed, Defendants made the same arguments below, and the
District Court found that "functionality does not remove [encryption
software] from the realm of speech" or "`negate' its expressiveness."
Bernstein III, slip op. at 34-35 n.20.  See also Bernstein I, 922 F. Supp.
at 1435 ("the functionality of a language does not make it any less like
speech").  Various kinds of instructions, recipes, manuals and technical
information "are often purely functional;  they are also speech."  Id.
For example, "[t]he music inscribed in code on the roll of a player piano
is no less protected for being wholly functional."  Id.

The government here simply assumes that by labelling speech as a
"function" it may dispense with constitutional protections, as if running
an cryptographic program is akin to activating some kind of doomsday
device.  But running an encryption program does not create a weapon;  it
merely makes speech private.  Accordingly, even under Defendants'
analysis, the "function" of an encryption program is to ensure speech is
transmitted only to the audience of the speaker's choosing.  Thus, federal
law describes cryptography as a "method of secret writing,"   and
encryption systems as "[s]peech scramblers [and] privacy devices."    In
the final analysis, encrypted speech is still speech, and the Supreme
Court has held repeatedly that the First Amendment protects private or
anonymous communications.  McIntyre v. Ohio Elections Commission, 115 S.
Ct. 1511, 1516 (1995);  City of Ladue v. Gilleo, 114 S. Ct. 2038, 2046
(1994);  Talley v. California, 362 U.S. 60, 64 (1960).  See Rosen v. City
of Portland, 641 F.2d at 1250-1252.

It is true that speech might be used to further bad ends, and
encrypted speech or source code is no different.  A pen and paper can be
used to scribble a ransom note or a threat to assassinate the President.
Indeed, "[p]aper is a dangerous medium":  "Hitler's `Mein Kampf' was
written on paper."  Michael Kinsley, A Dangerous Medium, Washington Post,
April 16, 1997.  The government's theory of "functionality" would permit
the licensing of typewriters because they might be used to produce
subversive tracts.   Thomas Jefferson's cryptography would certainly be at
risk by virtue of its "functionality."  Or, to take an example that would
resonate with those who crushed the student protests at Tienamen Square,
FAX machines should be controlled because they can function to aid
movements considered dangerous to state security.

Defendants seeks to exploit a fear of computer technology, but
their message is alien to our constitutional traditions.  In upholding
First Amendment protection for anonymous speech, the Supreme Court has
reaffirmed the principle that "our society accords greater weight to the
value of free speech than to the dangers of its misuse."  McIntyre, 115 S.
Ct. at 1524, citing Abrams v. United States, 250 U.S. 616, 630-631 (1919)
(Holmes, J., dissenting).  In addition, the Supreme Court recently held
that distribution of speech over the Internet does not make it more
dangerous or diminish its level of constitutional protection.  Reno v.
ACLU, 117 S. Ct. at 2344.  The District Court correctly applied that
finding here, and found that the export controls, which place special
burdens on communication over the Internet, violate the First Amendment.
Bernstein III, slip op. at 25.  The government's stay request does not
challenge these sound conclusions.

III.	THE PUBLIC INTEREST DOES NOT FAVOR A STAY

Finally, the Government is wrong to contend that the public interest
militates in favor of granting a stay.  In fact, precisely the opposite is
true.  The public interest would be served by preventing the government
from imposing its standardless prior restraint on Professor Bernstein's
speech, not by continuing the restriction.  Indeed, restrictions on the
First Amendment rights of citizens are inherently contrary to the public
interest.  ACLU v. Reno, 929 F. Supp. 824, 851 (E.D. Pa. 1996)(opinion of
Sloviter).

Professor Bernstein is a professor of mathematics who wishes to engage in
scientific discussion and teaching activities in the field of
cryptography, including by use of cryptographic source code and by use of
the speech arena of the Internet.  As the District Court found, the
encryption licensing regulations at issue here impede these scientific
activities.  As the court explained with reference to a statement by the
American Academy for the Advancement of Science, enforcement of the
regulations
  threaten[s] to undermine the essential features of scientific freedom and
  the open exchange of information that are generally acknowledged as
  critical to innovation in science and technology and are responsible in
  large part for the preeminence of America's research and development
  enterprise.

Bernstein III, slip op. at 24:2-4 (quoting AAAS statement).  See also
Declaration of Prof. Appel of Princeton, Exhibit D, paras 11-17 (Internet
publication is important part of scientific development).  Particularly
given that the Government does not -- and cannot -- identify any specific harm
that would arise from Professor Bernstein's publication of his scientific
work, the public interest clearly falls on the side of allowing him to
exercise his First Amendment rights.

CONCLUSION

For the foregoing reasons, the Government's emergency motion for a stay
pending appeal should be denied, and this appeal should be expedited.

                                Respectfully submitted,
				
                                McGLASHAN & SARRAIL
                                Professional Corporation



                                By________________________
                                CINDY A. COHN

Dated:  September 17, 1997	Attorneys for Plaintiff-Appellee