From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: bea3b47bf56fc13d238e575ab9bffe7786ecaba673b58b8dd65405e9da6597d7
Message ID: <1.5.4.32.19970104053335.0069ccd8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-01-04 05:37:51 UTC
Raw Date: Fri, 3 Jan 1997 21:37:51 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Fri, 3 Jan 1997 21:37:51 -0800 (PST)
To: cypherpunks@toad.com
Subject: EAR Doc
Message-ID: <1.5.4.32.19970104053335.0069ccd8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We've prepared a hyperlinked version of the Export
Administration Regulations (EAR) to assist analysis,
evaluation and commentary on interim rules for
encryption export:
http://jya.com/eartoc.htm
It's sobering to study the EAR and see the lethal
weapons to which encryption is wed -- the most
mass-murderous of high-technology calmly described
as commercial warfare for the commonweal.
Ponder the Commerce Control list to see the mayhem
elite minds concoct.
Return to January 1997
Return to “John Young <jya@pipeline.com>”