Re: NSA, ITAR, NCSA and plug-in hooks.
Scott Brickner <sjb@universe.digex.net> writes:
Jeff Barber writes:
Does anyone know the ostensible justification for this? What section of the ITARs do they point to when they say "this is illegal"? I've perused an online copy of ITAR (no, I haven't read all of it -- I have other things I want to do this year :-), but I can't find a section that could be construed to support this contention.
I think it's 121.1, Category XIII paragraph (b) item (5): "Ancillary equipment specifically designed or modified for paragraphs (b) (1), (2), (3), (4) and (5) of this category;"
Question: What makes computers in general NOT describable by such a paragraph?!?
jim bell writes:
I think it's 121.1, Category XIII paragraph (b) item (5): "Ancillary equipment specifically designed or modified for paragraphs (b) (1), (2), (3), (4) and (5) of this category;"
Question: What makes computers in general NOT describable by such a paragraph?!?
The referenced paragraphsdescribe cryptographic hardware, software and technical data. Computers in general are not "specifically designed" as cryptographic equipment.
participants (2)
-
jimbell@pacifier.com -
Scott Brickner