1995-11-15 - Re: NSA, ITAR, NCSA and plug-in hooks.

Header Data

From: jimbell@pacifier.com (jim bell)
To: cypherpunks@toad.com
Message Hash: 8f4f88709a7d97c622676104ea2a20fb6182d7ec7e43dcef3a080c78b936b5df
Message ID: <m0tFUJh-00091rC@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-11-15 00:11:07 UTC
Raw Date: Wed, 15 Nov 1995 08:11:07 +0800

Raw message

From: jimbell@pacifier.com (jim bell)
Date: Wed, 15 Nov 1995 08:11:07 +0800
To: cypherpunks@toad.com
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <m0tFUJh-00091rC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain



Scott Brickner <sjb@universe.digex.net> writes:

>Jeff Barber writes:
>>Does anyone know the ostensible justification for this?  What section of
>>the ITARs do they point to when they say "this is illegal"?  I've perused
>>an online copy of ITAR (no, I haven't read all of it -- I have other
>>things I want to do this year :-), but I can't find a section that could
>>be construed to support this contention.
>
>I think it's 121.1, Category XIII paragraph (b) item (5):
>"Ancillary equipment specifically designed or modified for paragraphs (b)
>(1), (2), (3), (4) and (5) of this category;"

Question:  What makes computers in general NOT describable by such a
paragraph?!?






Thread