From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 8d8befdc37e33abdd596e42c10450859fd3389b692cb288aed6afb2bd8ad5b2e
Message ID: <199606010123.BAA15381@pipe2.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-06-01 04:53:30 UTC
Raw Date: Sat, 1 Jun 1996 12:53:30 +0800
From: jya@pipeline.com (John Young)
Date: Sat, 1 Jun 1996 12:53:30 +0800
To: cypherpunks@toad.com
Subject: NRC Report, 4, 5, 6
Message-ID: <199606010123.BAA15381@pipe2.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Part II Policy Instruments
Chapter 4 Export Controls
http://pwp.usa.pipeline.com/~jya/nrc04.txt (163 kb)
Chapter 5 Escrowed Encryption and Related Issues
http://pwp.usa.pipeline.com/~jya/nrc05.txt (144 kb)
Chapter 6 Other Dimensions of National Cryptography Policy
http://pwp.usa.pipeline.com/~jya/nrc06.txt (85 kb)
---------
Tomorrow:
Part III Policy Options, Findings and Recommendations
Chapter 7 Policy Options of the Future
Chapter 8 Synthesis, Findings and Recommendations
14 Appendices
Return to June 1996
Return to “jya@pipeline.com (John Young)”
1996-06-01 (Sat, 1 Jun 1996 12:53:30 +0800) - NRC Report, 4, 5, 6 - jya@pipeline.com (John Young)