Cryptome

JULY 2003

Cryptome CD

For a 2-CD set of the Cryptome archive of 13,400 files from June 1996 to April 2003 (~1.1 GB), click PayPal or send donation (> $100) and mail address to John Young, 251 West 89th Street, New York, NY 10024.

 
 

newport-eyeball.htm + Eyeballing the Newport Chemical Depot            July 9, 2003
anad-eyeball.htm    + Eyeballing the Anniston Chemical Depot           July 9, 2003
msfc-eyeball.htm    + Eyeballing the Marshall Space Flight Center      July 9, 2003
oas-junksec.htm     + OAS Internet Security Junket                     July 9, 2003

911-report.htm      + 9/11 Commission Interim Report                   July 9, 2003
doc070903.txt       + IT Business for Ireland/NI Sought                July 9, 2003
uscg070903.txt      + Maritime Security Panel Formed                   July 9, 2003
dia070903.txt       + Defense Intelligence Panel Meet                  July 9, 2003
buy-spy.htm         + Consumers' Purchases May Spy on Them             July 8, 2003

dhs070803.htm       + US Boosts Financial Spying Capabilities          July 8, 2003
hc-uk-iq.htm        + HoC Conclusions: Decision to go to War in Iraq   July 8, 2003
wh-911-balk.htm     + White House Balks 9/11 Probe                     July 8, 2003
milvax.htm          + Military Vaccination News                        July 8, 2003
tapac070803.txt     + DoD Technology and Privacy Panel Meet            July 8, 2003

istac070803.txt     + Info Sys Technical Panel Meet                    July 8, 2003
niac070803.txt      + National Infrastructure Panel Meet               July 8, 2003
nsa-act59.htm       + National Security Agency Act of 1959             July 7, 2003
intel-laws.htm      + Compilation of US Intelligence Laws & Orders     July 7, 2003
rfid-docs.htm       + Confidential RFID Documents                      July 7, 2003

hud070703.txt       + WTC Memorial Environmental Study                 July 7, 2003
ncta070703.txt      + National Commission on Terrorist Attacks Meet    July 7, 2003
lead-eyeball.htm    + Eyeballing the Letterkenny Army Depot            July 4, 2003
homesec-kyagb.htm   + Homeland Security Guidelines and Standards       July 4, 2003
wtc-path-rfp.htm    + RFQ/RFP for A&E Services for WTC PATH Terminal   July 4, 2003

gao-03-896tni.htm   + Nuclear Security: DOE Faces Post 9/11 Challenges July 3, 2003
spy-spotting.htm    + Surveillance Recognition                         July 3, 2003
web-priv-war.htm    + Web Privacy Firms Battle Government Spies        July 3, 2003
nrc070303.txt       + Nuclear Power Plants Get New Rule                July 3, 2003
dos070303.txt       + China and North Korea Hit for Iran Nuke Help     July 3, 2003

don070303.txt       + Naval Research Secret Meet                       July 3, 2003
tele-trojan.htm     + Telemarketing Opt Out Trojan Horse               July 3, 2003
ca-priv-censor.htm  + Privacy Commissioner of Canada Censored          July 2, 2003
panic-mad.htm       + Panic Attack: Why Our Obsession with Risk        July 2, 2003
fbi070203.txt       + FBI Seeks Renewed Funds for CALEA Wiretap        July 2, 2003

don070203.txt       + Naval Research Secret Meets                      July 2, 2003
gao070203.txt       + GAO Publishes New Government Audit Handbook      July 2, 2003
ispab070203.txt     + Nominations Sought for InfoSec Privacy Board     July 2, 2003
nhtsa070203.txt     + High Theft Vehicle Lines                         July 2, 2003
bis070203.txt       + Materials Export Advisory Meet                   July 2, 2003

icc-screw.htm       + US Turns Screw on International Criminal Court   July 1, 2003
pnr-spy.htm         + EU/US Passenger Name Record Spying Pact          July 1, 2003
dod070103.htm       + DoD Rules for Trials by Military Commissions     July 1, 2003
uscg070103.htm      + US Coast Guard Martime Security Initiatives      July 1, 2003
ussc070103.txt      + Sentencing Commission Needs PROTECT Help         July 1, 2003

O f f s i t e 


Port Sec              Tacoma Port Security System Documents /A         July 9, 2003
X Spy                 Wal-Mart Cancels RFID Venture /J                 July 9, 2003

Vote Fraud            How to Rig An Electronic Election in the US /J   July 8, 2003
FBI Gats 2            FBI Guide to Concealable Weapons /X              July 8, 2003
FBI Gats 1            Report on FBI Guide to Concealable Weapons /X    July 8, 2003
UK-IQ                 HoC Report on UK War on Iraq                     July 8, 2003
911-3                 9/11 Commission 3rd Hearing July 9               July 8, 2003

1A Fear               Dissertation Panics Authorities /D               July 8, 2003
A OK                  Anonymity Doomsday Panic /R                      July 7, 2003
Peek                  Auto ID Session /Z                               July 7, 2003
NRL                   NRLab/Rainbow Release E-mail Crypto /D           July 7, 2003
Voltage               Voltage Unveils Encryption Program               July 7, 2003

GYRE                  Tracking the Next Mil & Tech Revolutions /D      July 6, 2003
NSCP 7.02             Update: NSA Guide to Securing Netscape 7.02      July 5, 2003
GIA                   Government Information Awareness /R              July 4, 2003
HSSG                  Homeland Security Standards and Guidelines       July 4, 2003
HSG                   Homeland Security Guidelines                     July 4, 2003

HSFS                  Homeland Security Fact Sheets                    July 4, 2003
HSMN                  Homeland Security Monitoring Network             July 4, 2003
HSMP                  Homeland Security Monitoring Platform            July 4, 2003
DoD Fix               DoD Spins Military Commissions                   July 3, 2003
USCG I                Coast Guard Seeks Intelligence Head              July 1, 2003

 
Cryptout Recent Listings
 
| Search | + At Cryptome.org  | ^ At Cartome.org | * At Natsios Young | Echelon  | TEMPEST Updated 040303|
| Mirrors of Cryptome | USA v. Bin Laden | A Caution on Bots | Cryptome CD | USA v. Moussaoui |
| Documents Welcomed | Free To Travel | DIRT Files | Eyeball Series | Coast Guard Security Zones |
| AID-NIA Database | IC Black Actions Series |
 


DoD Applications of Auto-ID

Mr. Kimball went on to describe four projects which the DoD is pursuing related to Auto-ID. First, the DoD needs to know the location of material at all stages of its lifecycle, be it in process, in storage, in transit or in use. Second, the DoD is exploring Auto-ID as a solution for predicting the deterioration of explosives, propellants and pyrotechnics. The tags, smaller than the size of a dime, contain the chip, antenna and a 40-year battery. The battery recharges off of ambient radio waves in the air. The tag can be read inside metal and actively tells officers where it is. This application cannot use a passive tag, because the energy emitted by the reader might set off the explosives. The tags are small enough to affix when manufacturing the weapon.

Mr. Kimball also discussed affixing Auto-ID tags to hazardous materials, knowing the chemical weight of the materials of each item and reporting it to the government. EPCRA regulations require that the DoD notify local authorities of any of a number of hazardous materials over a certain threshold. But this implies tracking all the materials, regardless of quantity, in order to know that a given location has not accumulated too much of the regulated materials. Currently, the challenge in this area is being able to read the tags through liquid.

Fourth, tags help the DoD track items in repair, and ensure that parts from one helicopter remain together when that helicopter is reassembled. The benefits include: improved scheduling of repairs, knowing where parts are located, and controlling the configuration of the repaired item.

The DoD is also tagging high-value items and using automatic scanning and locating to eliminate the labor currently associated with tracking down lost items by hand. If an aircraft carrier, which currently requires a complement of 6000 personnel, could function with 5000, the potential labor savings would be significant.

Mr. Kimball also mused on future applications, including a "telepathy tag." Such a tag does not exist -- nor can we guess how it might work -- but the point is that the DoD is careful not to go down a course of action that precludes adoption of a new technology when that technology becomes feasible.

-- Auto-ID Technology: Transportation and Logistics Adoption Forum, October 28, 2002

Thanks to B.


New TIA / DARPA program called Combat Zones That See (CTS), where 1000s of video cameras will have imbedded algorithms to detect vehicles and people and send the data back to a central command for actionable results.

http://www.villagevoice.com/issues/0328/shachtman.php

http://dtsn.darpa.mil/ixo/solicitations/cts/index.htm

-- Thanks to R.


Subject: Secrecy News -- 07/09/03
From: "Aftergood, Steven" <saftergood@fas.org>
To: <secrecy_news@lists.fas.org>
Date: Wed, 9 Jul 2003 11:29:00 -0400

SECRECY NEWS

from the FAS Project on Government Secrecy

Volume 2003, Issue No. 58
July 9, 2003

** NSA RELEASES USS LIBERTY RECORDS
** COURT UPHOLDS CIA DENIAL OF CUBA RECORDS
** COURT REBUFFS CHENEY ON ENERGY TASK FORCE
** 9-11 COMMISSION REPORTS ON ACCESS PROBLEMS
** THE DECISION TO GO TO WAR IN IRAQ
** HOUSE ENACTS NEW LIMITS ON TIA

NSA RELEASES USS LIBERTY RECORDS

In an extraordinary release of raw intelligence records, the National Security Agency has declassified and disclosed audio intercepts and related documents concerning the 1967 Israeli attack on the U.S.S. Liberty, an American intelligence vessel, that led to the deaths of 34 American sailors during the 1967 Arab-Israeli war.

The release came in the course of a Freedom of Information Act lawsuit filed by A. Jay Cristol, an historian who authored a book on the subject, The Liberty Incident (Brassey's, 2002).

Cristol said the contents of the new release were consistent with the position advanced in his book that the Israeli attack on the Liberty was accidental and unwitting, attributable to the fog of war.  Some Liberty survivors and others have contended that the attack was deliberate.

The newly released intercepts record conversations between two Israeli helicopter pilots and their control tower.  (No communications from the attacking aircraft or torpedo boats were acquired, the NSA said.)

According to the transcript, the U.S.S. Liberty was initially thought to be Egyptian.  Only later, over an hour into the attack, was an American flag spotted on the ship.  Even before that, however, the control tower advised oddly that if any rescued survivors spoke English rather than Arabic, they were to be taken to Lod, in Israel, rather than to nearby El Arish.

Whether or not the new release answers all possible questions about the attack on the Liberty, which is unlikely, it appears to be the last known piece of hard evidence.  The NSA told a federal court that it has now declassified and released to Cristol "all of the actual recordings and English translations (including summaries of those translations) held by the NSA that relate to the USS Liberty incident."

The NSA releases are posted here in rather large PDF and audio files:

http://www.nsa.gov/docs/efoia/released/liberty.html

The NSA's July 2 letter to Cristol, together with a mirrored copy of the compiled transcripts, may be found here:

http://www.fas.org/irp/nsa/liberty.html

COURT UPHOLDS CIA DENIAL OF CUBA RECORDS

The Central Intelligence Agency is entitled to withhold a multi-volume compendium of information on "Cuban Personalities" that it prepared in 1962, even though the Agency has previously released similar or identical information, a District of Columbia appeals court panel ruled on July 8.

The decision came in a Freedom of Information Act lawsuit against the CIA brought by the Assassination Archives and Research Center.  See:

http://www.fas.org/sgp/jud/aarcvcia0703.pdf

COURT REBUFFS CHENEY ON ENERGY TASK FORCE

The DC Court of Appeals rejected a petition from Vice President Dick Cheney that would have shut down a lawsuit brought by Judicial Watch and the Sierra Club concerning the Vice President's secretive Energy Task Force.

A copy of the July 8 ruling is posted here:

http://www.fas.org/sgp/jud/cheney0703.pdf

A Washington Post story, "Cheney Loses Ruling on Energy Panel Records" by Henri E. Cauvin, July 9, puts the matter in perspective:

http://www.washingtonpost.com/wp-dyn/articles/A29486-2003Jul8.html

9-11 COMMISSION REPORTS ON ACCESS PROBLEMS

The National Commission on September 11 has received mixed cooperation from the executive branch in response to its requests for records, it said on July 8.

"While thousands of documents are flowing in -- some in boxes and some digitized -- most of the documents we need are still to come," the Commission stated in its first interim report outlining the status of its requests.  See:

\http://www.fas.org/irp/news/2003/07/911interim.html

THE DECISION TO GO TO WAR IN IRAQ

The Foreign Affairs Committee of the UK House of Commons produced a new report on "The Decision to Go to War in Iraq" that is cautiously critical of the UK Government's public presentation of intelligence used to justify the war in Iraq.  A copy of the report is posted here:

http://www.fas.org/irp/threat/ukiraq0703.pdf

Among other things, the UK report prompted a belated acknowledgment from the Bush Administration this week that it should not have endorsed the claim, based on forged documents, that Iraq was attempting to import uranium from Africa.  President Bush presented that discredited claim in the State of the Union address earlier this year.

Rep. Henry Waxman (D-CA) pressed the point in a new release of his correspondence with the International Atomic Energy Agency and with the White House.  See:

http://www.house.gov/reform/min/inves_admin/admin_nuclear_evidence.htm

Rep. David Obey (D-WI), ranking member of the House Appropriations Committee, questioned the role and structure of defense intelligence, singling out the controversial Office of Special Plans, in a July 8 statement on the House floor.  See:

http://www.fas.org/irp/congress/2003_cr/h070803.html

HOUSE ENACTS NEW LIMITS ON TIA

No government agency may deploy or implement any component of the Terrorism Information Awareness (formerly Total Information Awareness) program without Congressional notification and authorization, according to a provision adopted yesterday by the House of Representatives.

The "Limitation on Deployment of Terrorism Information Awareness Program" was included in the 2004 Defense Appropriations Act that was approved by the House on July 8.  See the text of the provision here:

http://www.fas.org/sgp/congress/2003/defapp-tia.html

_______________________________________________

Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.

To SUBSCRIBE to Secrecy News, send email to

secrecy_news-request@lists.fas.org

with "subscribe" in the body of the message.

To UNSUBSCRIBE, send a blank email message to

secrecy_news-remove@lists.fas.org

OR email your request to saftergood@fas.org

Secrecy News is archived at:

http://www.fas.org/sgp/news/secrecy/index.html

_______________________

Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web:    www.fas.org/sgp/index.html
email:  saftergood@fas.org
voice:  (202) 454-4691


From: Adrian Midgley <akm@92tr.freeserve.co.uk>
To: ukcrypto@chiark.greenend.org.uk
Subject: Re: shroud waving: definition
Date: Wed, 9 Jul 2003 13:50:24 +0000

On Wednesday 09 July 2003 13:02, you wrote:

> Shroud waving is when someone says that anyone who disagrees
> with them is wrong because, "they don't know what I know and
> have not seen what I have seen." I simply short-circuited that
> sort of shroud waving, which is used far too often by special
> interests groups.

No.  As a British Medical Association representative I can authoritatively say that shroud waving is when a doctor or group of doctors opposes some change in policy (a reduction in fees, cessation of late night canteen facilities, withdrawal of consultants dining room, closure of teaching hospital, whatever) by saying that this will result in the deaths of patients.

Other special interest groups are nowhere near as good at it and should avoid using this technique, which requires a proper medical qualification to perform safely and effectively, unless of course they retain a medical adviser to wave it for them, at the usual rates.

Curiously enough doctors are thought to know something abut medicine, healthcare and what doctors do, by a significant fraction of the population, some of whom even work in the department of health.

--

From the Linux desktops of Dr Adrian Midgley
http://www.defoam.net/            


Radio frequency identification technology is not new. The tiny chips and small antennae already are familiar to workers equipped with security cards that, when waived in front of a receiver, unlock the doors to their offices or relay information about the bearer to a guard. The technology's potential for sending retailers and others information about consumers is already raising privacy concerns, however.

Marc Rotenberg, executive director of a watchdog organization, the Electronic Privacy Information Center, said retailers should be required to disable the tags before a consumer leaves a store. ``Simply stated, I don't think most people want their clothes spying on them,'' Rotenberg said. ``It's also clear that there could be some very invasive uses of these techniques if merchants use the tracking technology to spy on their customers after purchase.''

Researchers developing RFID tags for products so far have focused on the supply chain and limited the range at which a product could be detected. Once their use becomes universal the cost of the tags could be as little as a nickel each, they say. Sanjay Sarma, the lead researcher at the Auto-ID Center in Massachusetts, says that by adding more functions to the chip, installing a battery and attaching a longer antenna, a receiver far away could read all the information on a chip, including its exact location.

Homes equipped with receiver-readers could alert consumers when they are running low on orange juice or their prescription for heart medicine is about to expire. Hooked up to a national network like the Internet, the at-home devices could also provide details to marketers about a family's eating and hygienic habits.

Sarma acknowledges that gigantic privacy concerns the technology raises, saying one way to address them would be letting consumers disable the chips once they leave a checkout counter. ``Any technology can be abused and we've got to be prepared, be watchful for the abuse,'' Sarma said.

Ron Margulis, a spokesman for the National Grocers Association, said the privacy concerns are far outweighed by the benefits of RFID. Retailers, he said, could respond much more quickly to product recalls and prevent people from becoming ill from tainted products. ``You do give up a bit of privacy but the benefit could be that you live,'' said Margulis.

On the Net:

Auto ID Center: http://www.autoidcenter.org/main.asp

-- Associated Press, Packages May Soon Send Data on Consumers, July 8, 2003


Swedish DMCA:

http://www.geocities.com/ichinin/CopyBillTranslation.htm

This next link is primarily for 2600.com:

http://www.geocities.com/Ichinin/0know.htm

- Written in honor of the new bill.

-- Thanks to A.


Sean Gorman's professor called his dissertation "tedious and unimportant." Gorman didn't talk about it when he went on dates because "it was so boring they'd start staring up at the ceiling." But since the Sept. 11, 2001, attacks, Gorman's work has become so compelling that companies want to seize it, government officials want to suppress it, and al Qaeda operatives -- if they could get their hands on it -- would find a terrorist treasure map.

Tinkering on a laptop, wearing a rumpled T-shirt and a soul patch goatee, this George Mason University graduate student has mapped every business and industrial sector in the American economy, layering on top the fiber-optic network that connects them.

He can click on a bank in Manhattan and see who has communication lines running into it and where. He can zoom in on Baltimore and find the choke point for trucking warehouses. He can drill into a cable trench between Kansas and Colorado and determine how to create the most havoc with a hedge clipper. Using mathematical formulas, he probes for critical links, trying to answer the question: "If I were Osama bin Laden, where would I want to attack?" In the background, he plays the Beastie Boys.

For this, Gorman has become part of an expanding field of researchers whose work is coming under scrutiny for national security reasons. His story illustrates new ripples in the old tension between an open society and a secure society.

-- Laura Blumfeld, Dissertation Could Be Security Threat: Student's Maps Illustrate Concerns About Public Information, July 8, 2003 (offsite)


Log onto http://www.autoidcenter.org/session.asp to see an HTTP session which shows a cookie for your originating IP address [ HTTP_COOKIE ] as well as the ID of your computer [ LOCAL_ADDR ], along with other site information gathering variables.

-- Thanks to Z.


Item 11 describes a PR campaign to persuade the public that RFID -- radio-frequency ID tagging of products -- is good despite consumer privacy fears. It proposes an academic center for issuing believable public information supported by an "international privacy advisory council:"

• Create a Privacy Advisory Council to:
provide 3rd party validation to Center’s privacy commitment
offer valuable guidance on technology and privacy issues
serve as spokespeople, when necessary

• Made up of:

well known, credible, and credentialed experts
potentially adversarial advocates

• Examples of potential members:

Harvard Information Infrastructure Project
Georgetown Center on Law and Technology
Center for Democracy and Technology
Electronic Privacy Information Center
Global Information Infrastructure Commission
Consumer Federation of America
Privacy Officers Association
European Consumers’ Union

and enlist prominent opinion-makers:

• Including, for instance:
U.S. Senators Leahy and McCain
U.S. Representatives Dingell and Tauzin
FTC Bureau of Consumer Protection
National Association of Attorneys General
AARP
AFL-CIO
Head of Unit, EC, Information Society
Leaders of European Parliament Industry Committee
-- Confidential RFID Dcouments, July 7, 2003


T. writes:

http://www.sianews.com/modules.php?name=Newsfile=article&sid=1071

In July 2002, eBay bought PayPal, Inc. for $1.45 billion....Sullivan explained that these acquisitions help eBay to provide lawmen with a full picture.  "Every book or CD comes with a bar code. So we know who bought what. The acquisition of PayPal helps us to locate people more precisely. In the old days, we had to trace IP addresses ... to locate the buyer, but now Paypal supplies us with the money trail."


NUCLEAR SECURITY: DOE Faces Security Challenges in the Post September 11, 2001, Environment

What GAO Found

With respect to DOE and NNSA's response to September 11, the agencies took immediate steps to improve security in the aftermath of the terrorist attacks. For example, DOE and NNSA moved to a higher level of security, which required, among other things, more vehicle inspections and security patrols. While these steps are believed to have improved DOE and NNSA's security posture, they have been expensive and, until fully evaluated, their effectiveness is uncertain.

The number and capabilities of the terrorists involved in the September 11 attacks rendered obsolete DOE's design basis threat, last issued in 1999. However, DOE's effort to develop and issue a new design basis threat took almost 2 years; it was issued in May 2003. This effort was slowed by, among other things, disagreements over the size of the potential terrorist group that, might attack a DOE or NNSA facility.

Successfully addressing the increased threats will take time and resources, as well as new ways of doing business, sound management, and leadership. Currently, DOE does not have a reliable estimate of the cost to fully protect DOE and NNSA facilities. The fiscal year 2006 budget will probably be the first to show the full budgetary impact of the new design basis threat. Once funds become available, most sites estimate that it will take from 2 to 5 years to fully implement, test, validate, and refine strategies for meeting the requirements of the new design basis threat.

-- GAO, NUCLEAR SECURITY: DOE Faces Security Challenges in the Post September 11, 2001, Environment, June 24, 2003


Law enforcers say they are using increasingly potent technologies, but won't discuss them. "It's not appropriate to get into technological advances," an FBI spokesman says. "It's completely inappropriate. Why would we? That would defeat the whole purpose of surveillance." If federal agents complain about the proliferation of identity-shielding services, they don't do so publicly. Says Angela Haun, a special agent in Washington, "We respect individual rights, and of course companies have their right to free enterprise, though it does make our job a little tougher."

"It's a war," says Grey McKenzie, founder and chief executive of SpyCop Inc., a small South Port, Fla., company that detects and removes spyware programs from a computer. "There's a war going on in your computer and people don't even know."

The latest addition to the federal armory is the FBI's Magic Lantern program, which first came to light in late 2001. Encryption and anonymity services would be useless because this bug would track a user's actions well before the shielding services kick in -- at the user's keyboard, recording every keystroke. While the FBI has generally confirmed its existence, officials haven't said whether the software has ever been employed in an investigation.

The antispyware companies acknowledged that they hadn't prepared their software to deal with the likes of Magic Lantern because they hadn't yet encountered it. But they say they're on it now -- perhaps beginning another round in their sparring match with the FBI.

Some of these companies cooperate with federal law-enforcement officials, and some have designed their systems so that they can't. Steganos says it would comply only with information requests from German courts, but that even then, its ability to provide information about its users' activity is limited. Alex Shahida, founder and chief executive of Primedius Corp., a fast-growing San Jose, Calif., service, says he would cooperate with subpoenas. Services that offer complete anonymity, he says, are open to abuse by spammers, child pornographers and identity thieves.

"Can we make people invisible?" he asks. "Yes. Nobody can do it better than we can. But am I willing to make money at the risk of national security? Absolutely not."

-- Sean Marciniak, Web Privacy Services Complicate Work of Federal Investigators, July 3, 2003


Cryptome CD

For a 2-CD set of the Cryptome archive of 13,400 files from June 1996 to April 2003 (~1.1 GB), click PayPal or send $100 donation and mail address to John Young, 251 West 89th Street, New York, NY 10024.

  Cryptome Archives

   

| Echelon |     MI6     | TEMPEST | DVD-DeCSS |     GSM     |    PGP     |

Little-requested files are periodically culled. If you get a 404, request restoration of the file to: jya@pipeline.com

Cryptout
Jan-Jun 2003

Cryptomb 12
Jul-Dec 2002

Cryptomb 11
Jan-Jun 2002

Cryptomb 10
Jul-Dec 2001

Cryptomb 9
Jan-Jun 2001

Cryptomb 8
Jun-Dec 2000

Cryptomb 7
Jan-May 2000

Following archives, formerly at jya.com, are temporarily offline.

Cryptomb 6
Jul-Dec 1999

Cryptomb 5
Jan-Jun 1999

Cryptomb 4
Jun-Dec 1998

Cryptomb 3
Jan-May 1998

Cryptomb 2
Jun-Dec 1997

Cryptomb 1
To May 1997

Privacy Alert: To balance the load on Cryptome automatic mirrors have been established:
www.eu.cryptome.org -- the main mirror, which has two or more hardly transparent back-ups:
www.nl.cryptome.org
www.at.cryptome.org

Anonymous operators of these mirrors swear no access logs are kept, not even for the usual undisclosed purposes, so be sure to protect yourself there and here and all around the Net.


A caution on bots:

Blocks on some 300 abusive machines/domains have been lifted, temporarily. Idiot bots are the worst Net trashers, so please don't let them gobble unattended. Boxes gulping more than 100 files per day will be blocked.

Anybody -- gov, mil, edu, com, or individual -- can download all the files here, the whole 9,000+ if desired, preferrably limited to a hundred per day. However, malconfigured bots and spiders that repetitively download mindlessly, or generate thousands of error messages for files already downloaded, and in doing so excluding others' access, are not welcome and will be blocked in perpetuity. Innocents affected complain to jya@pipeline.com

______________________________

Thanks to A for mirror:

http://www.lessgov.org/cryptome

Thanks to SC for crypto software:

http://caunter.ca/crypto.html

Thanks to AJ for mirrors:

http://cryptome.sabotage.org

ftp://ftp.zedz.net/pub/varia/Cryptome/cryptome.org/

the whole shebang is available at:
ftp://ftp.zedz.net/pub/varia/Cryptome/

Thanks to mb for mirror:

http://while1.org/~xm/cryptome.tgz

Thanks to VP for mirror:

http://munitions.vipul.net/documents/cryptome/

Thanks to GB:

People who want/need a copy of Cryptome as of Sep 16 2001 can get a copy at
http://www.parrhesia.com/cryptome.tgz (248 Mb!)

or bit-by-bit at

http://www.parrhesia.com/cryptome/

For people who can do FTP, which usually transfers faster than HTTP, it's also at

ftp://bivens.parrhesia.com/cryptome.tgz

Quintessenz mirror located in Vienna, Austria:

http://cryptome.lo-res.org/

Australian mirror:

http://www.infosecwest.com/cryptome/

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and blast protection -- open, secret and classified documents -- but not limited to those.

Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.

Send by e-mail, fax or mail:
Cryptome Administrator: John Young
E-mail: jya@pipeline.com
Tel: (US) 212-873-8700
Fax: (US) 212-787-6102
Mail: 251 West 89th Street, New York, NY 10024

April 25, 2002: New PGP 6.5.8 Key:

ID: 0xA126BC05
Fingerprint:
4BBD 49A8 9116 52FF 9CF9 C411 443D 0394 A126 BC05

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
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=QVLR
-----END PGP PUBLIC KEY BLOCK-----

Cartome is a companion site to Cryptome. It is an archive of spatial and geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, climatography, seismography, geography, camouflage, maps, images, drawings, charts, diagrams, imagery intelligence (IMINT) and their reverse-panopticon and counter-deception potential. Administrator is architect Deborah Natsios, longtime Cryptome partner.

Design-L A mail list on architecture and design and everything administered by John Young.