Cryptome |
JULY 1999 |
| Echelon | MI6 | + File at Cryptome.org, a pod for big files and such. |
nist071299.txt NIST: Info Tech Security Testing Labs July 12, 1999 treas071299.txt Country Boycott List July 12, 1999 istac071299.txt Info Systems TAC Meet July 12, 1999 fcc071299.txt + Radio Frequency Lighting Devices July 12, 1999 don071299.txt + Navy Rules for Law Practice July 12, 1999 crypto97-ne.htm + Cryptology: Cops/NatSec v. Privacy/E-Commmerce July 11, 1999 osc070999.txt Office of Special Counsel Offed July 9, 1999 hr2413.txt Computer Security Enhancement Act July 9, 1999 O f f s i t e ( M o r e ) GGD-99-101 * Crime Technology: Feds Help Locals July 12, 1999 ECLW59 E-Commerce Law Week 59 July 11, 1999 ECLW58 E-Commerce Law Week 58 July 11, 1999 Bust TEMPEST Bust /JM July 11, 1999 Tony Blair: Back to UK's Old Dark Days /EM July 9, 1999 ______________________________________________________________________________________
"Shalom Shaphyr, arrested earlier this week for allegedly possessing and selling Tempest computer intercept equipment, planned to first falsify the nature of the equipment in export papers, ship it to a U.S. NATO ally, then to Israel, and finally to Vietnam."
-- Bill Pietrucha, TEMPEST Bust, July 9, 1999
"In Australia, it is the lack of the Constitutional protection of civil rights, which can be contrasted with that of the United States, which has resulted in the Wassenaar restrictions potentially having a profoundly larger impact in this country than in the US. Without protected freedom of speech, Australians cannot communicate information about cryptography, or cryptographic processes without running the risk of prosecution. Without the constitutional protection of the right to silence, it is not clear as to whether law enforcement agencies can force defendents to disclose cryptographic keys resulting in self-incrimination. And the accountability of Government in this area of law is dwindling through:
- The ASIO Legislation Amendment Bill 1999 allowing the Attorney-General to grant search warrants, removing judicial review of their necessity;- The "untouchable" DSD working outside the scope of the Freedom of Information Act and judicial review;
- The Wassenaar Arrangement not being a treaty and hence cutting out any review by the legislature;
- The Weapons of Mass Destruction Act having the effect of a driftnet, catching anything slipping through the Customs Act;
- The suppression of reports aimed at bringing the issues surrounding cryptography into the public domain;
- The enforcement of the export controls by stealth - not prosecuting 'offenders' so as to avoid judicial interpretation of the provisions; and
- Putting up a wall of silence in front of anyone who starts asking questions, the author of this paper included.
The law in this area is posing a massive threat to the civil liberties of all Australians. Public awareness of the issues surrounding cryptography is extremely low, and publicity and debate are well overdue. If the Australian Government wants the trust of the people in the digital age, it must dramatically increase transparency and must take these issues to the public, rather than waiting until the public find them on dusty library shelves."
-- Nick Ellsmore, Cryptology: Law Enforcement & National Security vs. Privacy, Security & The Future of Commerce, July 4, 1999
JULY 1999 |
bxa070899.txt New Reg for Computer Exports July 8, 1999 nist070799.htm NIST RFC: Requirements for Key Recovery Product July 8, 1999 uk-secrets.htm UK Crypto Policy Secrets Revealed July 8, 1999 ms-pptpv2.htm New Microsoft PPTP(v2) Vulnerability Paper July 6, 1999 beat-cops.htm Cop Brass: Jobs Not Bucks Beat High-Tech Cops July 4, 1999 nsa-4th-p2.htm + NSA and 4th Amendment Rights Part 2 (Church Rept) July 4, 1999 nsc-docs.htm + US National Security Policy Documents 1961-92 July 3, 1999 hbl-df.htm How to Break The Law July 3, 1999 cn-p3-peril.htm China Sees NatSec Threat in Intel P3 SN July 2, 1999 kw070199.htm Harvard/AntiOnline Nuke Packet Storm Security July 1, 1999 pml062499.htm Reprisals & Retaliation: Speaking Truth to Power July 1, 1999 O f f s i t e Books Ritter's Crypto Bookshop July 5, 1999 CA-Intel Canadian Intel Committee on Crypto, Infowar /DB July 2, 1999
JUNE 1999 |
dod-harass.htm Defense Harasses Defense Witness June 30, 1999 de-crypto-wass.htm German Crypto and Wassenaar Position June 28, 1999 rosewood-rfi.htm Request for Info on Operation Rosewood June 28, 1999 crypto-psycho.htm Encryption Controls - A Psychological Battle? June 28, 1999 fbi-en60399.htm Encryption: Impact on Law Enforcement June 28, 1999 (OK) nsa-4th.htm + The NSA and 4th Amendment Rights (Church Report) June 27, 1999 bpm062599.txt Nigeria Okayed to Boost US Arms Biz June 25, 1999 nssg062599.txt National Security Study Group Secret Meet June 25, 1999 nih062599.txt Report on Electromagnetic Hazards June 25, 1999 nic062599.txt Study of Prisoner Sexual Abuse June 25, 1999 mars-v-tek.htm Crypto IP Case: Mars UK Ltd v. Teknowledge Ltd June 24, 1999 breach-osa.htm Geraghty & Wylde Deny "Irish War" Secrecy Leaks June 23, 1999 gendyn-gte.htm General Dynamics to Acquire GTE Gov Systems June 23, 1999 pgp-dk.htm Denmark Permits Export of PGP June 23, 1999 bmpe062199.htm US Customs on the Black Market Peso Exchange June 23, 1999 doe062299.htm Richardson Testimony of Rudman DOE Spy Report June 23, 1999 atf062399.txt Gun Identification Markings June 23, 1999 kubhlai.htm London Cleans Up After Anti-Capitalist Protest June 22, 1999 bernstein-pet.htm Bernstein v. USA - Gov Petition for Rehearing June 21, 1999 cej060899.htm USA v. Carl Johnson, CEJ's Sentencing Memo June 20, 1999 cej061599.htm USA v. Carl Johnson, Court Docket June 15, 1999 June 19, 1999 usa060899.htm USA v. Carl Johnson, Gov's Sentencing Memo June 19, 1999 ns99181t.htm Combatting Terrorism: $Bs Churned 2 June 19, 1999 ns99135.htm Combatting Terrorism: $Bs Churned 1 June 19, 1999 pfiab-doe.htm + PFIAB Report on Spying at the Energy Dept June 18, 1999 echelon-se2.htm Sweden Investigates Industrial Echelon June 17, 1999 cg061599.htm Crypto-Gram June 15, 1999 June 17, 1999 cia-art-jg.htm Gillogly Cracks CIA Art June 16, 1999 iccss061699.txt New Commission on US Seaport Crime and Security June 16, 1999 tidesnoop.htm Translingual Snooping June 16, 1999 icann-ed.htm Esther Dyson on ICANN and Rebuttal June 15, 1999 50usc421.htm Protection of Identities of US Spies June 14, 1999 50usc413.htm Oversight of US Spying June 14, 1999 g8-charney.htm G8 Work Group on High-Tech Crime June 13, 1999 scramdisk-fr.htm French Version of Scramdisk 2.02H-fr June 12, 1999 g8-edicks.htm G8 Exercise: Computer Crime Investigation June 11, 1999 cpi-survey.htm + CPI Survey: Growth of Non-US Crypto Products June 10, 1999 (OK) dod52001r.htm DoD Information Security Regulation June 10, 1999 dod52001.htm DoD Information Security Program June 10, 1999 uk-de-crypto.htm Comparison of UK and German Crypto Policies June 10, 1999 crypto-grow.htm Crypto Found to Grow in Foreign Markets June 10, 1999 weldon-spy.txt Rep. Weldon Adds to Cox Espionage Report June 10, 1999 smith-crypto4.txt Rep. Smith on Crypto Exports June 10, 1999 maloney-safe.txt Rep. Maloney on SAFE Crypto Bill June 10, 1999 gao061099.txt Seized Property and Forfeited Assets System June 10, 1999 fda061099.txt Classification of the Female Condom June 10, 1999 ucita-updates.htm UCITA Updates June 9, 1999 eclw55.htm E-Commerce Law Week, Issue 55 June 9, 1999 pecsenc060999.txt PECSENC Crypto Meet June 9, 1999 au-exports.htm New Australian Export Controls June 8, 1999 wass-dump.htm Cox and Dicks: Dump Wassenaar, Choke Exports June 8, 1999 irish-war.htm The Irish War on Official Secrecy Act June 7, 1999 mouse-iotc.htm Roaring Mouse: DoD's Info Ops Tech Center June 7, 1999 rt-pc93.htm Richard Tomlinson Interview June 7, 1999 de-crypto-all.htm Cornerstones of German Encryption Policy June 7, 1999 nsa-crack.htm NSA Crackability - Crypto Export Controls June 7, 1999 pec060799.txt President's Export Council Meet June 7, 1999 cse-97-98.htm CSE Annual Report 1997-1998 June 5, 1999 prz-pgp.htm Phil Zimmermann on PGP Crypto Integrity June 4, 1999 (OK) freedom-beta.htm Freedom Beta June 4, 1999 (OK) cryptonom.htm Cryptonomicon Review June 4, 1999 (OK) cuba-v-usa.htm Cuba Sues USA for $181 Billion War Damgages June 3, 1999 (OK) cuba-no-war.htm Declaration of the Government of Cuba June 3, 1999 (OK) eclw54.htm E-Commerce Law Week, Issue 54 June 3, 1999 (OK) de-crypto.htm Framework for German Crypto Policy June 3, 1999 (OK) usis060299.htm U.S. Diplomacy Needs More Openness in Info Age June 3, 1999 (OK) ussc032699.htm US Sentencing Commission Finds 0 Crypto Offenses June 2, 1999 800-us-debug.htm US Debug/TSCM Coming Events June 2, 1999 (OK) rtk.htm The Citizens' Right to Know June 1, 1999 O f f s i t e Daro Slip-up Points to Secret American Spy Plane /A June 30, 1999 Anon Anonymous Communication on the Internet /A June 30, 1999 RCED-99-195 * Nuclear Weapons Computing Needs Oversight June 30, 1999 NSIAD-99-110 * National Guard Should Exit Counterterrorism June 27, 1999 (OK) GSM Hack GSM Algo Hacked /DT June 25, 1999 Snoop Law UK Interception of Communications Update /YA June 25, 1999 End Near Congress Nears Consensus on Crypto Regs /WR June 25, 1999 Snoop Mail Echelon is Reading Your E-Mail June 25, 1999 UK Tap UK Aims To Snoop Mobile Phones /HC June 23, 1999 CIPA Fight Defense Lawyer Fights Security Clearance /BD June 23, 1999 ECLW 57 E-Commerce Law Week 57 June 23, 1999 IOCA 99 Interception of Communications in the UK /YA June 23, 1999 NetSec I-Warfare Internet Security Report /AS June 20, 1999 PCCIP Law Legal Foundations: Infrastructure Protection /JM June 20, 1999 CA Spy Echelon Eavesdropping on Canadians /CM June 18, 1999 Menwith Hill Perfectly Echelon, Extra-Legal /MC June 16, 1999 BG Papers Papers On Crypto and InfoSec Policy /BG June 16, 1999 Elliptic PS Elliptic Curves for US Gov Use (PS 323K) June 16, 1999 Elliptic Txt Elliptic Curves for US Gov Use in ASCII June 16, 1999 ECLW 56 E-Commerce Law Week, Issue 56 June 16, 1999 UK Hit Critique of UK Crypto Policy /YA June 16, 1999 EESSI European Electronic Signature Standardization /HN June 14, 1999 Mock UK Information Law Mocks Freedom of Information June 11, 1999 DNA Hide DNA Hides Spy Message /JC June 10, 1999 SPP Street Performer Protocol/Digital Copyrights /BS June 9, 1999 ns99081 * Satellite Control Systems In Trouble June 8, 1999 Crypto 99 EPIC 1999 International Crypto Survey /DB June 8, 1999 OSA UK Official Secrecy Act /YA June 8, 1999 Terr Panel Panel on Domestic WMD Terrorism June 8, 1999 Sans LEDs The Dark TWINKLE /NH June 8, 1999 WCF Why Crypto Systems Fail /RA June 8, 1999 Ross Rock Foundation of CompSec and Crypto /RA/MO June 8, 1999 RT Out Swiss Expel Tomlinson /BD June 7, 1999 AU Exports AU Export Control Regime Report for 1997-98 /GK June 7, 1999 Threat Technology: A Threat to Right of Privacy /PC June 6, 1999 NSA Butt Congress, NSA Butt Heads Over Echelon /RH June 4, 1999 DE to NSA Germany Endorses Strong Crypto /PC June 4, 1999 NSA Hide NSA Rejects Oversight /PP June 4, 1999 UK Hide UK Crypto Policy May Have Hidden Agenda /JI June 4, 1999 NYS Leads Tackling E-Privacy in New York /DM June 4, 1999 Krypto Analyse Analysis of German Crypto Policy /FZ June 2, 1999 Frei Krypto New German Crypto Policy Statement /FZ June 2, 1999 Aralsk-7 Poison Isle: Soviet Killer Germs Survive June 2, 1999 BIB Bytes In Brief June 99 June 2, 1999 Bring It On Online Security Is Pentagon's Latest Battle /DN June 2, 1999 Taps $17M Cost of "Big Brother" Police Tactics / LN June 1, 1999 Wily 3 Net Wily Yellow Peril 3 - Wash Post /DN June 1, 1999
Files here may be retrieved also by FTP: ftp://ftp.jya.com/filename.ext Please report bad links: <jy@jya.com> * URL is temporary for new item; if not available see GAO archive |
||||
nsa102452.htm The National Security Agency Established 1952 nsa-elint.htm U.S. Electronic Espionage: A Memoir 1972 nsa-40k.htm Uncle Sam and His 40,000 Snoopers 1973 esnoop.htm OTA Reports on Electronic Surveillance 1972-96 nsa-4th.htm + The National Security Agency and 4th Amendment Rights-1 1975 nsa-4th-p2.htm + The National Security Agency and 4th Amendment Rights-2 1975 echelon-dc.htm Somebody's Listening (With Bibliography and Links) 1988 stoa-atpc.htm Appraisal of the Technologies of Political Control 1998 ic2000-dc.htm Interception Capabilities 2000 1999 |
||||
mi6-true.htm Is the MI6 Spy List a True List? May 19, 1999 mi6-list.htm List of MI6 Officers May 13, 1999 MI6dir.htm MI6 Directory May 12, 1999 mi6-rt.gz Richard Tomlinson's GeoCities Web Site May 12, 1999 |
||||
Cryptomb
5 Jan-May 1999 |
Cryptomb
4 Jun-Dec 1998 |
Cryptomb
3 Jan-May 1998 |
Cryptomb
2 Jun-Dec 1997 |
Cryptomb
1 To May 1997 |
Jim Thomsen Files | Jim Bell Files | Kevin Mitnick Files | Carl Johnson Files | Al Qaeda Files |
Site Secrets | Fund Junger | Urban Deadline 68-98 | DESIGN-L | Site stats |