1995-11-15 - Re: NSA, ITAR, NCSA and plug-in hooks.

Header Data

From: “Peter D. Junger” <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
To: pc@pdj2-ra.F-REMOTE.CWRU.Edu
Message Hash: 0ae4069e16fdacce5385eca216bde6ce5852b07fd790dea0c5aa649ed33f8164
Message ID: <9511151255.AA26027@toad.com>
Reply To: <Pine.3.89.9511140929.A25609-0100000@tesla.cc.uottawa.ca>
UTC Datetime: 1995-11-15 13:04:43 UTC
Raw Date: Wed, 15 Nov 1995 21:04:43 +0800

Raw message

From: "Peter D. Junger" <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
Date: Wed, 15 Nov 1995 21:04:43 +0800
To: pc@pdj2-ra.F-REMOTE.CWRU.Edu
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
In-Reply-To: <Pine.3.89.9511140929.A25609-0100000@tesla.cc.uottawa.ca>
Message-ID: <9511151255.AA26027@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


:    It kind of sickens us that we had to do it, but so be it. 
:    
:    Patches that re-implement the PEM code may be available at a foreign
:    site soon. If it does show up, we'll point to it - that can't be
:    illegal! 

I see no reason why they should not be as ``illegal'' as the
crypto-with-a-hole sillyness.  Pointing to software is a pretty
effective way of disclosing it, and disclosing cryptographic
software--apparently including holes--to foreign persons without a
license is a violation of the ITAR.

Of course, the ITAR itself is illegal as it applies to cryptographic
software, but I agree that one does not want to be the defendant in a
criminal case based on those unconstitutional provisions.

--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
Internet:  junger@pdj2-ra.f-remote.cwru.edu    junger@samsara.law.cwru.edu





Thread