1996-06-01 - NRC Report, 4, 5, 6

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 8d8befdc37e33abdd596e42c10450859fd3389b692cb288aed6afb2bd8ad5b2e
Message ID: <199606010123.BAA15381@pipe2.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-06-01 04:53:30 UTC
Raw Date: Sat, 1 Jun 1996 12:53:30 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Sat, 1 Jun 1996 12:53:30 +0800
To: cypherpunks@toad.com
Subject: NRC Report, 4, 5, 6
Message-ID: <199606010123.BAA15381@pipe2.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   Part II    Policy Instruments 
 
    
   Chapter 4  Export Controls 
 
      http://pwp.usa.pipeline.com/~jya/nrc04.txt  (163 kb) 
 
 
   Chapter 5  Escrowed Encryption and Related Issues 
 
      http://pwp.usa.pipeline.com/~jya/nrc05.txt  (144 kb) 
 
 
   Chapter 6  Other Dimensions of National Cryptography Policy 
 
      http://pwp.usa.pipeline.com/~jya/nrc06.txt  (85 kb) 
 
   --------- 
 
   Tomorrow: 
 
   Part III   Policy Options, Findings and Recommendations 
 
   Chapter 7  Policy Options of the Future 
   Chapter 8  Synthesis, Findings and Recommendations 
    
   14 Appendices 
 
 
 





Thread