From: Richard Storey <“cognitus<KILL SPAM>“@earthlink.net>
To: John Young <jya@pipeline.com>
Message Hash: 2279a90f687dd14623e8281bc195133989a4caf8a39b4e2519e1eb7e6e0525c1
Message ID: <35B4FBC9.F5E75026@earthlink.net>
Reply To: <199807211530.LAA08035@camel8.mindspring.com>
UTC Datetime: 1998-07-21 20:34:04 UTC
Raw Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)
From: Richard Storey <"cognitus<KILL SPAM>"@earthlink.net>
Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)
To: John Young <jya@pipeline.com>
Subject: Re: NSA's Long Strong Arm
In-Reply-To: <199807211530.LAA08035@camel8.mindspring.com>
Message-ID: <35B4FBC9.F5E75026@earthlink.net>
MIME-Version: 1.0
Content-Type: text/plain
John Young wrote:
>
> >From a series in Network World, July 20, 1998,
> "The Long, Strong Arm of the NSA," about the
> Agency's methods of enforcing export obedience
> with intimidation, delay and obfuscation:
At http://jya.com/nsa-lsa.htm,
the first article is the most interesting. It demonstrates what I have
always believed, that the state's reason for limiting encryption was
mainly to pressure corporations, who are driven by profits, to adopt the
state's desired encryption features. These NSA-approved products from
American corporations should be seen as contaminated, tainted and
poisoned.
Would you purchase hardware or software that meets the government's
export standards--approved by NSA?
"Never," Davis declared. "My customers come first!"
Richard Storey
Return to July 1998
Return to “[Richard Storey <”cognitus