1998-07-21 - Re: NSA’s Long Strong Arm

Header Data

From: Richard Storey <“cognitus<KILL SPAM>“@earthlink.net>
To: John Young <jya@pipeline.com>
Message Hash: 2279a90f687dd14623e8281bc195133989a4caf8a39b4e2519e1eb7e6e0525c1
Message ID: <35B4FBC9.F5E75026@earthlink.net>
Reply To: <199807211530.LAA08035@camel8.mindspring.com>
UTC Datetime: 1998-07-21 20:34:04 UTC
Raw Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)

Raw message

From: Richard Storey <"cognitus<KILL SPAM>"@earthlink.net>
Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: NSA's Long Strong Arm
In-Reply-To: <199807211530.LAA08035@camel8.mindspring.com>
Message-ID: <35B4FBC9.F5E75026@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain


John Young wrote:
> 
> >From a series in Network World, July 20, 1998,
> "The Long, Strong Arm of the NSA," about the
> Agency's methods of enforcing export obedience
> with intimidation, delay and obfuscation:

At http://jya.com/nsa-lsa.htm,

the first article is the most interesting. It demonstrates what I have
always believed, that the state's reason for limiting encryption was
mainly to pressure corporations, who are driven by profits, to adopt the
state's desired encryption features. These NSA-approved products from
American corporations should be seen as contaminated, tainted and
poisoned.

Would you purchase hardware or software that meets the government's
export standards--approved by NSA?

"Never," Davis declared. "My customers come first!"


Richard Storey





Thread