It is usually assumed that a foreign person outside the United States runs no risks if he posts cryptographic software to the net or otherwise discloses it to other foreign persons, although technically that is a violation of the United States International Traffic in Arms Regulations. I note, however, that in an article entitled ``Export Controls on Encryption Software'' by Ira S. Rubenstein, dated October 17, 1994 (which apparently was distributed at some legal conference) the following passage appears in Section 4(3): ---------------- Finally, foreign employees of those companies or any foreign person who runs afoul of export controls on technology transfers may face severe immigration consequencs.[83] Under the Immigration and Nationality Act,[84] as revised by the immigration act of 1990,[85] an alien who seeks entry to the U.S. to engage in activities that violate or evade export control laws is excludable.[86] Similarly, an alien who has engaged, is engaged, or at any time after entry engages in such activities is deportable.[87] [Notes] [83] For a detailed discussion see generally Rubinstein, ``Export Controls and Immigration Law,'' 93-3 Immigration Briefings (Mar. 1993). [84] Immigration and Nationality Act of 1952, Pub. L. No. 82-414, 66 Stat. 163 (codified as amended at 8 USC \S\S 1101-1524) (hereinafter INA). [85] Immigration Act of 1990, Pub. L. No. 101-649, 104 Stat. 4978 (hereinafter IMMACT 90). [86] INA \S 212(a)(3)(A)(i)(II), 8 USC \S 1182(a)(3)(A)(i)(II). [87] OMA \S 21(a)(4)(A)(i), \S 1251(a)(4)(A)(i). -- Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH Internet: junger@pdj2-ra.f-remote.cwru.edu junger@samsara.law.cwru.edu