1995-11-15 - Re: NSA, ITAR, NCSA and plug-in hooks.

Header Data

From: jimbell@pacifier.com (jim bell)
To: Scott Brickner <sjb@universe.digex.net>
Message Hash: c7d7c2337fbad7f449f25122c461749b3d31ea84ef7d12a4ed39f0f133a92c43
Message ID: <m0tFpbT-0008yaC@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-11-15 22:13:15 UTC
Raw Date: Thu, 16 Nov 1995 06:13:15 +0800

Raw message

From: jimbell@pacifier.com (jim bell)
Date: Thu, 16 Nov 1995 06:13:15 +0800
To: Scott Brickner <sjb@universe.digex.net>
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <m0tFpbT-0008yaC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


>jim bell writes:
>>>I think it's 121.1, Category XIII paragraph (b) item (5):
>>>"Ancillary equipment specifically designed or modified for paragraphs (b)
>>>(1), (2), (3), (4) and (5) of this category;"
>>
>>Question:  What makes computers in general NOT describable by such a
>>paragraph?!?
>
>The referenced paragraphsdescribe cryptographic hardware, software and
>technical data.  Computers in general are not "specifically designed"
>as cryptographic equipment.

Great!  Then you must merely ensure that there is at least one
(non-encryption) program around that can use the same hooks.






Thread