New Articles

OFAC Sanctions Four Ukrainian Officials for Acting on Russia’s Behalf; Additional Russia Sanctions Could Follow

russia

OFAC Sanctions Four Ukrainian Officials for Acting on Russia’s Behalf; Additional Russia Sanctions Could Follow

As tensions run high between Washington and Moscow over a possibly imminent Russian invasion of Ukraine, the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) designated today four (4) current and former Ukrainian officials under Executive Order (“EO”) 14024 dated April 15, 2021. In a press release issued earlier today, OFAC asserted the Russian Federal Security Service (“FSB”) “recruit[s] Ukrainian citizens in key positions to gain access to sensitive information, threaten the sovereignty of Ukraine, and then leverage these Ukrainian officials to create instability in advance of a potential Russian invasion.” OFAC also noted that Russian agents have sought to influence U.S. elections since at least 2016.

In today’s action, OFAC added two (2) current Ukrainian Members of Parliament – Taras Kozak and Oleh Voloshyn – to the Specially Designated Nationals and Blocked Persons List (“SDN List”) and labeled them FSB “pawns”. OFAC accused Kozak of amplifying false narratives regarding the 2020 U.S. elections and Voloshyn of undermining Ukrainian government officials and advocating Russian interests. OFAC also added two (2) former Ukrainian officials to the SDN List – Volodymyr Oliynyk and Vladimir Sivkovich. OFAC asserts Oliynyk gathered information about Ukraine’s critical infrastructure for the FSB and Sivkovich engaged in influence and disinformation campaigns targeting both the Ukraine and the U.S.

All four (4) SDN designations were made pursuant to EO 14024, which authorizes OFAC to impose sanctions on persons who act or purport to act for or on behalf of, directly or indirectly, the Government of the Russian Federation. As a result of the designations, all property and interests in property of these persons in the U.S. or controlled by U.S. persons must be blocked and reported to OFAC. U.S. persons are prohibited from sending or receiving any provision of funds, goods, or services to/from these newly designated SDNs. According to OFAC’s “50% Ownership Rule,” these sanctions also extend to any entities in which these SDNs directly or indirectly hold, either individually or in the aggregate with other SDNs, an ownership interest of 50% or more.

The U.S. has also recently signaled its readiness to impose additional sanctions if Russia proceeds with an invasion of Ukraine, but has not shared many details of its plans. On January 21, 2022, Deputy Secretary of the Treasury Wally Adeyemo in a conversation with Ukraine Minister of Finance Serhiy Marchenko “emphasized that the United States and its allies and partners are prepared to inflict significant costs on the Russian economy if Russia further invades Ukraine.” Some news reports have forecasted that restrictions on semiconductor exports to Russia, sanctions against Russian financial institutions, and controls on foreign-produced goods going to Russia are among the options under consideration by the White House. However, any additional sanctions beyond the four (4) SDN designations reported in this post are purely speculative at this time.

Husch Blackwell’s Export Controls and Economic Sanctions Team continues to monitor U.S. sanctions and export controls against Russia and will provide further updates if additional developments occur.

__________________________________________________________________

Tony Busch is an attorney in Husch Blackwell LLP’s Washington, D.C. office and is a member of the firm’s International Trade & Supply Chain practice team.

Cortney O’Toole Morgan is a Washington D.C.-based partner with the law firm Husch Blackwell LLP. She leads the firm’s International Trade & Supply Chain group.

Grant Leach is an Omaha-based partner with the law firm Husch Blackwell LLP focusing on international trade, export controls, trade sanctions and anti-corruption compliance.

cybersecurity

BIS Delays Implementation of New Cybersecurity Items Interim Final Rule

In an October 21, 2021 interim final rule (“IFR”), the Bureau of Industry and Security (“BIS”) published long-awaited “cybersecurity items” controls in Categories 4 (Computers) and 5, Pt. 1 (Telecommunications) of the Commerce Control List (“CCL”) and followed the IFR up on November 12, 2021 with relevant FAQs. The IFR will impose new export controls on certain “cybersecurity items” that relate to “intrusion software” or “IP network communications surveillance.” The IFR, originally scheduled to become effective on January 19, 2022, will now become effective on March 7, 2022. In the January 12, 2022 notice announcing the delay, BIS stated it “may consider some modifications for the final rule” and indicated it would “provide the public with additional guidance.” Below we describe the IFR as it currently stands. We will update readers when BIS implements any additional edits to the IFR and/or updates its guidance.

The IFR establishes two (2) new export control classification numbers (“ECCNs”) and expands the control text of several additional ECCNs within the CCL. The IFR collectively defines the items falling under these CCL modifications as the “cybersecurity items.” Each “cybersecurity item” covered in the IFR will be destination-controlled for National Security (“NS”) and Anti-Terrorism (“AT”) reasons. The modifications fall under two (2) broad topics:  (i) expanded control text in Category 4 for hardware, software, and technology providing the infrastructure for managing “intrusion software”; and (ii) expanded control text in Category 5, Pt. 1 related to “IP network communications surveillance” items. The IFR also includes notes which clarify that, in the event any commodities or software which qualify as “cybersecurity items” also incorporate “information security” functionality described in any Category 5, Pt. 2 ECCNs (which will often involve encryption or cryptanalysis), then those Category 5, Pt. 2 ECCN classifications will prevail. However, those notes do not cover technology (which has a special definition under the EAR). The notes also specifically state that elements of source code implementing functionality not controlled by Category 5, Pt. 2 may still be subject to the “cybersecurity item” controls implemented by the IFR.  “Cybersecurity items” controlled for Surreptitious Listening (“SL”) reasons under pre-existing ECCNs will also remain under those ECCNs.

The new “intrusion software”-related parameters will control hardware and software specially designed or modified for the generation, command and control, or delivery of “intrusion software,” as well as technology for the “development” or “production” of that hardware or software. The EAR’s pre-existing definition of “intrusion software,” will remain. It is primarily designed to describe exploits or payloads that do not involve encryption but that are nonetheless specially designed or modified to avoid detection by ‘monitoring tools’ or to defeat ‘protective countermeasures’ for the purpose of extracting data or modifying a standard software program execution to allow the execution of externally provided instructions. Importantly, the IFR does not impose export controls on the “intrusion software” itself. “Intrusion software,” when designed for military offensive cyberspace operations, would more appropriately be considered for classification purposes under the International Traffic in Arms Regulations (“ITAR”) as clarified by BIS FAQ #5.

The new “IP network communications surveillance” parameters will control telecommunications equipment capable of servicing a carrier class Internet Protocol (“IP”) network, performing application layer analysis, indexing extracted data, and being “specially designed” to execute searches based on “hard selectors” (i.e., personal data) and mapping relational networks of individuals or groups of people (hereafter referred to in this post as the “Telecommunications Surveillance Equipment”). The new and expanded control text will also control the software equivalents of the Telecommunications Surveillance Equipment as well as the test equipment, software, and technology specially designed or modified for the “development,” “production,” or “use” of the Telecommunications Surveillance Equipment.

The IFR also creates a new License Exception Authorized Cybersecurity Exports (“License Exception ACE”). Although LE ACE is similar to the EAR’s existing License Exception Encryption Commodities, Software, and Technology (“License Exception ENC”), there are some key differences between License Exceptions ACE and ENC. Exporters hoping to use the new License Exception ACE’s authorizations will need to consider the full range of U.S. export controls represented in its terms and conditions:  destination, end-user, and end-use. For instance, License Exception ACE lays out a multi-layered approach where the nature of the end-user (e.g., “U.S. subsidiary,” “non-government end user,” “government end user,” and/or “favorable treatment cybersecurity end user”) must be considered alongside the destination and any knowledge or “reason to know” of an illegitimate end-use (which, without citing the EAR definition, is what is commonly understood as black hat and/or state-sponsored “hacking”).  “Deemed” exports to Country Group D foreign nationals of any Country Group D destination are presumptively not authorized under LE ACE.  However, when an exporter can determine the end-user of the export or “deemed” export is a “non-government end user,” then License Exception ACE will provide authorization to certain Country Group D destinations for (i) exports to “favorable treatment cybersecurity end users”; (ii) exports for “vulnerability disclosure” or “cyber incident response”; and (iii) “deemed” exports to foreign nationals.

A final note on License Exception ACE, especially for those proficient in License Exception ENC, is that License Exception ACE’s definition of “government end user” is far broader than the parallel definition in License Exception ENC.

Some heightened areas of risk under the IFR will include exports and reexports to non-U.S. subsidiaries in Country Group D countries and proper due diligence to meet BIS’ “reason to know” standard for end-use restrictions in License Exception ACE.

___________________________________________________________________

Tony Busch is an attorney in Husch Blackwell LLP’s Washington, D.C. office and is a member of the firm’s International Trade & Supply Chain practice team.

Cortney O’Toole Morgan is a Washington D.C.-based partner with the law firm Husch Blackwell LLP. She leads the firm’s International Trade & Supply Chain group.

Grant Leach is an Omaha-based partner with the law firm Husch Blackwell LLP focusing on international trade, export controls, trade sanctions and anti-corruption compliance.