Cryptome |
JULY 2003 |
|
newport-eyeball.htm + Eyeballing the Newport Chemical Depot July 9, 2003 anad-eyeball.htm + Eyeballing the Anniston Chemical Depot July 9, 2003 msfc-eyeball.htm + Eyeballing the Marshall Space Flight Center July 9, 2003 oas-junksec.htm + OAS Internet Security Junket July 9, 2003 911-report.htm + 9/11 Commission Interim Report July 9, 2003 doc070903.txt + IT Business for Ireland/NI Sought July 9, 2003 uscg070903.txt + Maritime Security Panel Formed July 9, 2003 dia070903.txt + Defense Intelligence Panel Meet July 9, 2003 buy-spy.htm + Consumers' Purchases May Spy on Them July 8, 2003 dhs070803.htm + US Boosts Financial Spying Capabilities July 8, 2003 hc-uk-iq.htm + HoC Conclusions: Decision to go to War in Iraq July 8, 2003 wh-911-balk.htm + White House Balks 9/11 Probe July 8, 2003 milvax.htm + Military Vaccination News July 8, 2003 tapac070803.txt + DoD Technology and Privacy Panel Meet July 8, 2003 istac070803.txt + Info Sys Technical Panel Meet July 8, 2003 niac070803.txt + National Infrastructure Panel Meet July 8, 2003 nsa-act59.htm + National Security Agency Act of 1959 July 7, 2003 intel-laws.htm + Compilation of US Intelligence Laws & Orders July 7, 2003 rfid-docs.htm + Confidential RFID Documents July 7, 2003 hud070703.txt + WTC Memorial Environmental Study July 7, 2003 ncta070703.txt + National Commission on Terrorist Attacks Meet July 7, 2003 lead-eyeball.htm + Eyeballing the Letterkenny Army Depot July 4, 2003 homesec-kyagb.htm + Homeland Security Guidelines and Standards July 4, 2003 wtc-path-rfp.htm + RFQ/RFP for A&E Services for WTC PATH Terminal July 4, 2003 gao-03-896tni.htm + Nuclear Security: DOE Faces Post 9/11 Challenges July 3, 2003 spy-spotting.htm + Surveillance Recognition July 3, 2003 web-priv-war.htm + Web Privacy Firms Battle Government Spies July 3, 2003 nrc070303.txt + Nuclear Power Plants Get New Rule July 3, 2003 dos070303.txt + China and North Korea Hit for Iran Nuke Help July 3, 2003 don070303.txt + Naval Research Secret Meet July 3, 2003 tele-trojan.htm + Telemarketing Opt Out Trojan Horse July 3, 2003 ca-priv-censor.htm + Privacy Commissioner of Canada Censored July 2, 2003 panic-mad.htm + Panic Attack: Why Our Obsession with Risk July 2, 2003 fbi070203.txt + FBI Seeks Renewed Funds for CALEA Wiretap July 2, 2003 don070203.txt + Naval Research Secret Meets July 2, 2003 gao070203.txt + GAO Publishes New Government Audit Handbook July 2, 2003 ispab070203.txt + Nominations Sought for InfoSec Privacy Board July 2, 2003 nhtsa070203.txt + High Theft Vehicle Lines July 2, 2003 bis070203.txt + Materials Export Advisory Meet July 2, 2003 icc-screw.htm + US Turns Screw on International Criminal Court July 1, 2003 pnr-spy.htm + EU/US Passenger Name Record Spying Pact July 1, 2003 dod070103.htm + DoD Rules for Trials by Military Commissions July 1, 2003 uscg070103.htm + US Coast Guard Martime Security Initiatives July 1, 2003 ussc070103.txt + Sentencing Commission Needs PROTECT Help July 1, 2003
O f f s i t e Port Sec Tacoma Port Security System Documents /A July 9, 2003 X Spy Wal-Mart Cancels RFID Venture /J July 9, 2003 Vote Fraud How to Rig An Electronic Election in the US /J July 8, 2003 FBI Gats 2 FBI Guide to Concealable Weapons /X July 8, 2003 FBI Gats 1 Report on FBI Guide to Concealable Weapons /X July 8, 2003 UK-IQ HoC Report on UK War on Iraq July 8, 2003 911-3 9/11 Commission 3rd Hearing July 9 July 8, 2003 1A Fear Dissertation Panics Authorities /D July 8, 2003 A OK Anonymity Doomsday Panic /R July 7, 2003 Peek Auto ID Session /Z July 7, 2003 NRL NRLab/Rainbow Release E-mail Crypto /D July 7, 2003 Voltage Voltage Unveils Encryption Program July 7, 2003 GYRE Tracking the Next Mil & Tech Revolutions /D July 6, 2003 NSCP 7.02 Update: NSA Guide to Securing Netscape 7.02 July 5, 2003 GIA Government Information Awareness /R July 4, 2003 HSSG Homeland Security Standards and Guidelines July 4, 2003 HSG Homeland Security Guidelines July 4, 2003 HSFS Homeland Security Fact Sheets July 4, 2003 HSMN Homeland Security Monitoring Network July 4, 2003 HSMP Homeland Security Monitoring Platform July 4, 2003 DoD Fix DoD Spins Military Commissions July 3, 2003 USCG I Coast Guard Seeks Intelligence Head July 1, 2003
Cryptout Recent Listings |
| Search
| + At Cryptome.org | ^ At
Cartome.org | * At
Natsios Young |
Echelon
|
TEMPEST Updated 040303|
| Mirrors of Cryptome | USA v. Bin Laden | A Caution on Bots | Cryptome CD | USA v. Moussaoui | | Documents Welcomed | Free To Travel | DIRT Files | Eyeball Series | Coast Guard Security Zones | | AID-NIA Database | IC Black Actions Series | |
DoD Applications of Auto-ID
Mr. Kimball went on to describe four projects which the DoD is pursuing related to Auto-ID. First, the DoD needs to know the location of material at all stages of its lifecycle, be it in process, in storage, in transit or in use. Second, the DoD is exploring Auto-ID as a solution for predicting the deterioration of explosives, propellants and pyrotechnics. The tags, smaller than the size of a dime, contain the chip, antenna and a 40-year battery. The battery recharges off of ambient radio waves in the air. The tag can be read inside metal and actively tells officers where it is. This application cannot use a passive tag, because the energy emitted by the reader might set off the explosives. The tags are small enough to affix when manufacturing the weapon.
Mr. Kimball also discussed affixing Auto-ID tags to hazardous materials, knowing the chemical weight of the materials of each item and reporting it to the government. EPCRA regulations require that the DoD notify local authorities of any of a number of hazardous materials over a certain threshold. But this implies tracking all the materials, regardless of quantity, in order to know that a given location has not accumulated too much of the regulated materials. Currently, the challenge in this area is being able to read the tags through liquid.
Fourth, tags help the DoD track items in repair, and ensure that parts from one helicopter remain together when that helicopter is reassembled. The benefits include: improved scheduling of repairs, knowing where parts are located, and controlling the configuration of the repaired item.
The DoD is also tagging high-value items and using automatic scanning and locating to eliminate the labor currently associated with tracking down lost items by hand. If an aircraft carrier, which currently requires a complement of 6000 personnel, could function with 5000, the potential labor savings would be significant.
Mr. Kimball also mused on future applications, including a "telepathy tag." Such a tag does not exist -- nor can we guess how it might work -- but the point is that the DoD is careful not to go down a course of action that precludes adoption of a new technology when that technology becomes feasible.
-- Auto-ID Technology: Transportation and Logistics Adoption Forum, October 28, 2002
Thanks to B.
New TIA / DARPA program called Combat Zones That See (CTS), where 1000s of video cameras will have imbedded algorithms to detect vehicles and people and send the data back to a central command for actionable results.
http://www.villagevoice.com/issues/0328/shachtman.php
http://dtsn.darpa.mil/ixo/solicitations/cts/index.htm
-- Thanks to R.
Subject: Secrecy News -- 07/09/03
From: "Aftergood, Steven" <saftergood@fas.org>
To: <secrecy_news@lists.fas.org>
Date: Wed, 9 Jul 2003 11:29:00 -0400
SECRECY NEWS
from the FAS Project on Government Secrecy
Volume 2003, Issue No. 58
July 9, 2003
** NSA RELEASES USS LIBERTY RECORDS
** COURT UPHOLDS CIA DENIAL OF CUBA RECORDS
** COURT REBUFFS CHENEY ON ENERGY TASK FORCE
** 9-11 COMMISSION REPORTS ON ACCESS PROBLEMS
** THE DECISION TO GO TO WAR IN IRAQ
** HOUSE ENACTS NEW LIMITS ON TIA
NSA RELEASES USS LIBERTY RECORDS
In an extraordinary release of raw intelligence records, the National Security Agency has declassified and disclosed audio intercepts and related documents concerning the 1967 Israeli attack on the U.S.S. Liberty, an American intelligence vessel, that led to the deaths of 34 American sailors during the 1967 Arab-Israeli war.
The release came in the course of a Freedom of Information Act lawsuit filed by A. Jay Cristol, an historian who authored a book on the subject, The Liberty Incident (Brassey's, 2002).
Cristol said the contents of the new release were consistent with the position advanced in his book that the Israeli attack on the Liberty was accidental and unwitting, attributable to the fog of war. Some Liberty survivors and others have contended that the attack was deliberate.
The newly released intercepts record conversations between two Israeli helicopter pilots and their control tower. (No communications from the attacking aircraft or torpedo boats were acquired, the NSA said.)
According to the transcript, the U.S.S. Liberty was initially thought to be Egyptian. Only later, over an hour into the attack, was an American flag spotted on the ship. Even before that, however, the control tower advised oddly that if any rescued survivors spoke English rather than Arabic, they were to be taken to Lod, in Israel, rather than to nearby El Arish.
Whether or not the new release answers all possible questions about the attack on the Liberty, which is unlikely, it appears to be the last known piece of hard evidence. The NSA told a federal court that it has now declassified and released to Cristol "all of the actual recordings and English translations (including summaries of those translations) held by the NSA that relate to the USS Liberty incident."
The NSA releases are posted here in rather large PDF and audio files:
http://www.nsa.gov/docs/efoia/released/liberty.html
The NSA's July 2 letter to Cristol, together with a mirrored copy of the compiled transcripts, may be found here:
http://www.fas.org/irp/nsa/liberty.html
COURT UPHOLDS CIA DENIAL OF CUBA RECORDS
The Central Intelligence Agency is entitled to withhold a multi-volume compendium of information on "Cuban Personalities" that it prepared in 1962, even though the Agency has previously released similar or identical information, a District of Columbia appeals court panel ruled on July 8.
The decision came in a Freedom of Information Act lawsuit against the CIA brought by the Assassination Archives and Research Center. See:
http://www.fas.org/sgp/jud/aarcvcia0703.pdf
COURT REBUFFS CHENEY ON ENERGY TASK FORCE
The DC Court of Appeals rejected a petition from Vice President Dick Cheney that would have shut down a lawsuit brought by Judicial Watch and the Sierra Club concerning the Vice President's secretive Energy Task Force.
A copy of the July 8 ruling is posted here:
http://www.fas.org/sgp/jud/cheney0703.pdf
A Washington Post story, "Cheney Loses Ruling on Energy Panel Records" by Henri E. Cauvin, July 9, puts the matter in perspective:
http://www.washingtonpost.com/wp-dyn/articles/A29486-2003Jul8.html
9-11 COMMISSION REPORTS ON ACCESS PROBLEMS
The National Commission on September 11 has received mixed cooperation from the executive branch in response to its requests for records, it said on July 8.
"While thousands of documents are flowing in -- some in boxes and some digitized -- most of the documents we need are still to come," the Commission stated in its first interim report outlining the status of its requests. See:
\http://www.fas.org/irp/news/2003/07/911interim.html
THE DECISION TO GO TO WAR IN IRAQ
The Foreign Affairs Committee of the UK House of Commons produced a new report on "The Decision to Go to War in Iraq" that is cautiously critical of the UK Government's public presentation of intelligence used to justify the war in Iraq. A copy of the report is posted here:
http://www.fas.org/irp/threat/ukiraq0703.pdf
Among other things, the UK report prompted a belated acknowledgment from the Bush Administration this week that it should not have endorsed the claim, based on forged documents, that Iraq was attempting to import uranium from Africa. President Bush presented that discredited claim in the State of the Union address earlier this year.
Rep. Henry Waxman (D-CA) pressed the point in a new release of his correspondence with the International Atomic Energy Agency and with the White House. See:
http://www.house.gov/reform/min/inves_admin/admin_nuclear_evidence.htm
Rep. David Obey (D-WI), ranking member of the House Appropriations Committee, questioned the role and structure of defense intelligence, singling out the controversial Office of Special Plans, in a July 8 statement on the House floor. See:
http://www.fas.org/irp/congress/2003_cr/h070803.html
HOUSE ENACTS NEW LIMITS ON TIA
No government agency may deploy or implement any component of the Terrorism Information Awareness (formerly Total Information Awareness) program without Congressional notification and authorization, according to a provision adopted yesterday by the House of Representatives.
The "Limitation on Deployment of Terrorism Information Awareness Program" was included in the 2004 Defense Appropriations Act that was approved by the House on July 8. See the text of the provision here:
http://www.fas.org/sgp/congress/2003/defapp-tia.html
_______________________________________________
Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.
To SUBSCRIBE to Secrecy News, send email to
secrecy_news-request@lists.fas.org
with "subscribe" in the body of the message.
To UNSUBSCRIBE, send a blank email message to
secrecy_news-remove@lists.fas.org
OR email your request to saftergood@fas.org
Secrecy News is archived at:
http://www.fas.org/sgp/news/secrecy/index.html
_______________________
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web:
www.fas.org/sgp/index.html
email:
saftergood@fas.org
voice: (202) 454-4691
From: Adrian Midgley <akm@92tr.freeserve.co.uk>
To: ukcrypto@chiark.greenend.org.uk
Subject: Re: shroud waving: definition
Date: Wed, 9 Jul 2003 13:50:24 +0000
On Wednesday 09 July 2003 13:02, you wrote:
> Shroud waving is when someone says that anyone who disagrees
> with them is wrong because, "they don't know what I know and
> have not seen what I have seen." I simply short-circuited that
> sort of shroud waving, which is used far too often by special
> interests groups.
No. As a British Medical Association representative I can authoritatively say that shroud waving is when a doctor or group of doctors opposes some change in policy (a reduction in fees, cessation of late night canteen facilities, withdrawal of consultants dining room, closure of teaching hospital, whatever) by saying that this will result in the deaths of patients.
Other special interest groups are nowhere near as good at it and should avoid using this technique, which requires a proper medical qualification to perform safely and effectively, unless of course they retain a medical adviser to wave it for them, at the usual rates.
Curiously enough doctors are thought to know something abut medicine, healthcare and what doctors do, by a significant fraction of the population, some of whom even work in the department of health.
--
From the Linux desktops of Dr Adrian Midgley
http://www.defoam.net/
Radio frequency identification technology is not new. The tiny chips and small antennae already are familiar to workers equipped with security cards that, when waived in front of a receiver, unlock the doors to their offices or relay information about the bearer to a guard. The technology's potential for sending retailers and others information about consumers is already raising privacy concerns, however.
Marc Rotenberg, executive director of a watchdog organization, the Electronic Privacy Information Center, said retailers should be required to disable the tags before a consumer leaves a store. ``Simply stated, I don't think most people want their clothes spying on them,'' Rotenberg said. ``It's also clear that there could be some very invasive uses of these techniques if merchants use the tracking technology to spy on their customers after purchase.''
Researchers developing RFID tags for products so far have focused on the supply chain and limited the range at which a product could be detected. Once their use becomes universal the cost of the tags could be as little as a nickel each, they say. Sanjay Sarma, the lead researcher at the Auto-ID Center in Massachusetts, says that by adding more functions to the chip, installing a battery and attaching a longer antenna, a receiver far away could read all the information on a chip, including its exact location.
Homes equipped with receiver-readers could alert consumers when they are running low on orange juice or their prescription for heart medicine is about to expire. Hooked up to a national network like the Internet, the at-home devices could also provide details to marketers about a family's eating and hygienic habits.
Sarma acknowledges that gigantic privacy concerns the technology raises, saying one way to address them would be letting consumers disable the chips once they leave a checkout counter. ``Any technology can be abused and we've got to be prepared, be watchful for the abuse,'' Sarma said.
Ron Margulis, a spokesman for the National Grocers Association, said the privacy concerns are far outweighed by the benefits of RFID. Retailers, he said, could respond much more quickly to product recalls and prevent people from becoming ill from tainted products. ``You do give up a bit of privacy but the benefit could be that you live,'' said Margulis.
On the Net:
Auto ID Center: http://www.autoidcenter.org/main.asp
-- Associated Press, Packages May Soon Send Data on Consumers, July 8, 2003
Swedish DMCA:
http://www.geocities.com/ichinin/CopyBillTranslation.htm
This next link is primarily for 2600.com:
http://www.geocities.com/Ichinin/0know.htm- Written in honor of the new bill.
-- Thanks to A.
Sean Gorman's professor called his dissertation "tedious and unimportant." Gorman didn't talk about it when he went on dates because "it was so boring they'd start staring up at the ceiling." But since the Sept. 11, 2001, attacks, Gorman's work has become so compelling that companies want to seize it, government officials want to suppress it, and al Qaeda operatives -- if they could get their hands on it -- would find a terrorist treasure map.
Tinkering on a laptop, wearing a rumpled T-shirt and a soul patch goatee, this George Mason University graduate student has mapped every business and industrial sector in the American economy, layering on top the fiber-optic network that connects them.
He can click on a bank in Manhattan and see who has communication lines running into it and where. He can zoom in on Baltimore and find the choke point for trucking warehouses. He can drill into a cable trench between Kansas and Colorado and determine how to create the most havoc with a hedge clipper. Using mathematical formulas, he probes for critical links, trying to answer the question: "If I were Osama bin Laden, where would I want to attack?" In the background, he plays the Beastie Boys.
For this, Gorman has become part of an expanding field of researchers whose work is coming under scrutiny for national security reasons. His story illustrates new ripples in the old tension between an open society and a secure society.
-- Laura Blumfeld, Dissertation Could Be Security Threat: Student's Maps Illustrate Concerns About Public Information, July 8, 2003 (offsite)
Log onto http://www.autoidcenter.org/session.asp to see an HTTP session which shows a cookie for your originating IP address [ HTTP_COOKIE ] as well as the ID of your computer [ LOCAL_ADDR ], along with other site information gathering variables.
-- Thanks to Z.
Item 11 describes a PR campaign to persuade the public that RFID -- radio-frequency ID tagging of products -- is good despite consumer privacy fears. It proposes an academic center for issuing believable public information supported by an "international privacy advisory council:"
Create a Privacy Advisory Council to:provide 3rd party validation to Centers privacy commitment
offer valuable guidance on technology and privacy issues
serve as spokespeople, when necessary Made up of:
well known, credible, and credentialed experts
potentially adversarial advocates Examples of potential members:
Harvard Information Infrastructure Project
Georgetown Center on Law and Technology
Center for Democracy and Technology
Electronic Privacy Information Center
Global Information Infrastructure Commission
Consumer Federation of America
Privacy Officers Association
European Consumers Union
and enlist prominent opinion-makers:
Including, for instance:U.S. Senators Leahy and McCain
U.S. Representatives Dingell and Tauzin
FTC Bureau of Consumer Protection
National Association of Attorneys General
AARP
AFL-CIO
Head of Unit, EC, Information Society
Leaders of European Parliament Industry Committee
-- Confidential RFID Dcouments, July 7, 2003
T. writes:
http://www.sianews.com/modules.php?name=Newsfile=article&sid=1071
In July 2002, eBay bought PayPal, Inc. for $1.45 billion....Sullivan explained that these acquisitions help eBay to provide lawmen with a full picture. "Every book or CD comes with a bar code. So we know who bought what. The acquisition of PayPal helps us to locate people more precisely. In the old days, we had to trace IP addresses ... to locate the buyer, but now Paypal supplies us with the money trail."
NUCLEAR SECURITY: DOE Faces Security Challenges in the Post September 11, 2001, Environment
What GAO Found
With respect to DOE and NNSA's response to September 11, the agencies took immediate steps to improve security in the aftermath of the terrorist attacks. For example, DOE and NNSA moved to a higher level of security, which required, among other things, more vehicle inspections and security patrols. While these steps are believed to have improved DOE and NNSA's security posture, they have been expensive and, until fully evaluated, their effectiveness is uncertain.
The number and capabilities of the terrorists involved in the September 11 attacks rendered obsolete DOE's design basis threat, last issued in 1999. However, DOE's effort to develop and issue a new design basis threat took almost 2 years; it was issued in May 2003. This effort was slowed by, among other things, disagreements over the size of the potential terrorist group that, might attack a DOE or NNSA facility.
Successfully addressing the increased threats will take time and resources, as well as new ways of doing business, sound management, and leadership. Currently, DOE does not have a reliable estimate of the cost to fully protect DOE and NNSA facilities. The fiscal year 2006 budget will probably be the first to show the full budgetary impact of the new design basis threat. Once funds become available, most sites estimate that it will take from 2 to 5 years to fully implement, test, validate, and refine strategies for meeting the requirements of the new design basis threat.
-- GAO, NUCLEAR SECURITY: DOE Faces Security Challenges in the Post September 11, 2001, Environment, June 24, 2003
Law enforcers say they are using increasingly potent technologies, but won't discuss them. "It's not appropriate to get into technological advances," an FBI spokesman says. "It's completely inappropriate. Why would we? That would defeat the whole purpose of surveillance." If federal agents complain about the proliferation of identity-shielding services, they don't do so publicly. Says Angela Haun, a special agent in Washington, "We respect individual rights, and of course companies have their right to free enterprise, though it does make our job a little tougher."
"It's a war," says Grey McKenzie, founder and chief executive of SpyCop Inc., a small South Port, Fla., company that detects and removes spyware programs from a computer. "There's a war going on in your computer and people don't even know."
The latest addition to the federal armory is the FBI's Magic Lantern program, which first came to light in late 2001. Encryption and anonymity services would be useless because this bug would track a user's actions well before the shielding services kick in -- at the user's keyboard, recording every keystroke. While the FBI has generally confirmed its existence, officials haven't said whether the software has ever been employed in an investigation.
The antispyware companies acknowledged that they hadn't prepared their software to deal with the likes of Magic Lantern because they hadn't yet encountered it. But they say they're on it now -- perhaps beginning another round in their sparring match with the FBI.
Some of these companies cooperate with federal law-enforcement officials, and some have designed their systems so that they can't. Steganos says it would comply only with information requests from German courts, but that even then, its ability to provide information about its users' activity is limited. Alex Shahida, founder and chief executive of Primedius Corp., a fast-growing San Jose, Calif., service, says he would cooperate with subpoenas. Services that offer complete anonymity, he says, are open to abuse by spammers, child pornographers and identity thieves.
"Can we make people invisible?" he asks. "Yes. Nobody can do it better than we can. But am I willing to make money at the risk of national security? Absolutely not."
-- Sean Marciniak, Web Privacy Services Complicate Work of Federal Investigators, July 3, 2003
|
Cryptome Archives |
|
Little-requested files are periodically culled. If you get a 404, request restoration of the file to: jya@pipeline.com | |||||
Cryptout |
|||||
Cryptomb
12 |
Cryptomb
11 |
Cryptomb
10 |
Cryptomb
9 |
Cryptomb
8 |
Cryptomb
7 |
Following archives, formerly at jya.com, are temporarily offline. | |||||
Cryptomb
6 |
Cryptomb
5 |
Cryptomb
4 |
Cryptomb
3 |
Cryptomb
2 |
Cryptomb
1 |
Privacy Alert: To balance the load on Cryptome
automatic mirrors have been established:
www.eu.cryptome.org -- the main mirror, which has two or more hardly transparent back-ups: Anonymous operators of these mirrors swear no access logs are kept, not even for the usual undisclosed purposes, so be sure to protect yourself there and here and all around the Net. |
A caution on bots:
Blocks on some 300 abusive machines/domains have been lifted, temporarily. Idiot bots are the worst Net trashers, so please don't let them gobble unattended. Boxes gulping more than 100 files per day will be blocked. Anybody -- gov, mil, edu, com, or individual -- can download all the files here, the whole 9,000+ if desired, preferrably limited to a hundred per day. However, malconfigured bots and spiders that repetitively download mindlessly, or generate thousands of error messages for files already downloaded, and in doing so excluding others' access, are not welcome and will be blocked in perpetuity. Innocents affected complain to jya@pipeline.com ______________________________ Thanks to A for mirror: http://www.lessgov.org/cryptome Thanks to SC for crypto software: http://caunter.ca/crypto.html Thanks to AJ for mirrors: http://cryptome.sabotage.org the whole shebang is available at: ftp://ftp.zedz.net/pub/varia/Cryptome/ Thanks to mb for mirror: http://while1.org/~xm/cryptome.tgz Thanks to VP for mirror: http://munitions.vipul.net/documents/cryptome/ Thanks to GB: People who want/need a copy of Cryptome as of Sep 16 2001 can get a copy athttp://www.parrhesia.com/cryptome.tgz (248 Mb!) Quintessenz mirror located in Vienna, Austria: Australian mirror: |
Cryptome welcomes
documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology,
dual-use technologies, national security, intelligence, and blast
protection -- open, secret and classified documents -- but not limited
to those.
Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.
Send by e-mail, fax or mail: April 25, 2002: New PGP 6.5.8 Key: ID: 0xA126BC05 Fingerprint: 4BBD 49A8 9116 52FF 9CF9 C411 443D 0394 A126 BC05 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> mQGiBDzIDV0RBADOVJH14G1R6CV1QzxGSQ79DbkssL848Ua3qm9NPKpyzqv5XPXA oixYh16Hf/yc/ryEDhlgTvbm9X358TxRIpKMVHsZbK7It5AGIPWQVI7g3zGV/G8v Y8d70fgc9ORC+UvEC6CPW4Z2pygX4vo4ye3wgjIhTC2UKfDiXYOiu6x+KQCg/xtQ +JD+nwVSyjFW8oTzVn7IXpkEAI/nCbzV0XTE737mKGK4DBUscfiU2Xc01WNOK5S+ QEE0dor/2QWMCHaNbq1moQv2HBYgkkT6i71XKVWAP2Pzq7Erc5ItYIli2cTNIGUm A3R2MTxC6nFoeEiEv48NjJ0XqjoJ2lvgTAf9ypWB8FFW4wmUwZS7bvyhRNyjh9gN pm29A/9IybcyobfplalyMeAEy0LVEFw1B3exwz+7C4b0SFpLp+DXk3i6lV3VsomY fTMiLqIJfhKjCsj/0taV1n1KbQSSY5d8MokkHjqvDvKGp+cMu/tXFfuXu5UnHpoX LKTQ6ki9a0S6xZenu8b2sH6J2IFFRFNIaGmLdfeHpRdbYJRAJLQdSm9obiBZb3Vu ZyA8anlhQHBpcGVsaW5lLmNvbT6JAE4EEBECAA4FAjzIDV0ECwMCAQIZAQAKCRBE PQOUoSa8BSmpAJ4ofGY8+/B95KIaQEa2iGV/Gu0XPQCg17M5aeom1YeCEJkfj7Oz YyFbymC5BA0EPMgNXRAQAPkYoH5aBmF6Q5CV3AVsh4bsYezNRR8O2OCjecbJ3HoL rOQ/40aUtjBKU9d8AhZIgLUV5SmZqZ8HdNP/46HFliBOmGW42A3uEF2rthccUdhQ yiJXQym+lehWKzh4XAvb+ExN1eOqRsz7zhfoKp0UYeOEqU/Rg4Soebbvj6dDRgjG zB13VyQ4SuLE8OiOE2eXTpITYfbb6yUOF/32mPfIfHmwch04dfv2wXPEgxEmK0Ng w+Po1gr9oSgmC66prrNlD6IAUwGgfNaroxIe+g8qzh90hE/K8xfzpEDp19J3tkIt AjbBJstoXp18mAkKjX4t7eRdefXUkk+bGI78KqdLfDL2Qle3CH8IF3KiutapQvMF 6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33TGSGSfgMg71l6RfUodNQ +PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBhznzJZv8V+bv9kV7HAarT W56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY72 88kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy 1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XrPdYX AAICEACuZswqMS6FfW3ekuj76PB4jn80MGLLoVFYtSv2wclq5auWyBt5c5QXKNk/ T74a+PKcTN5VxoVq7kDDbjnrsdl1yKq7PszRMM62eLWak+6bKMR2kGVMBTp5+8M4 bZUVX4WsQaTqGQthdZQLnHKxCF6by12wUXDdRfmfpomf5O8VDVlNAUhUJ1WpOBFD uXiHuS8KonPrRoHtjWDqyUFvMUvEvlB7y0KxMXsTUIyRYc8CujZZUo2GFs0D2H3H tKu2ate7yAoEBYCuMlvuZWCcgVJUto9bXjHM1kQqHaAGHm+a2jYMcatKlDDkkDp1 h3PNqzQOUI75hUg4vLiwMUeVaSyLqDKtz9YogH8n3gCvAPjNdeF+bdaNfVgzbLEk +stfCIEzRlBUsT70scpfFsyMP2Je/jiYwJNwBrxjUwJ4Ip1Dfc4bX8BRaG8s+fFi URjockN1RXkXicaRNFoxl0ld1kNHGB02PkFEdcTXTRJf4Gi5UQznO01ODpnI6/hv 4wW0+RdPg2sdpRmOVm7t563T+wxh3vSa6o1x4TPdshuDbQyQ63YGHKziB5CNCIvQ xwHrZIIywN/1G6jknr0ajTB/saEZkuNE77H2FjB498Bp7Swggu/+n8a2AC6dSJ57 E1SCHoZJHTP3lIFJXpv38zFiyi2I5IVFVTIExeT4IN/BEhnwmIkARgQYEQIABgUC PMgNXQAKCRBEPQOUoSa8BeBdAKD1J9FP0ubxgdQWkQj5s+7l9erEbACg7dFMejUV JxbAXr+qUgDWS1X10Bg= =QVLR -----END PGP PUBLIC KEY BLOCK----- |
Cartome is a companion site to
Cryptome. It is an archive of spatial and geographic documents on privacy,
cryptography, dual-use technologies, national security and intelligence --
communicated by imagery systems: cartography, photography, photogrammetry,
steganography, climatography, seismography, geography, camouflage, maps,
images, drawings, charts, diagrams, imagery intelligence (IMINT) and their
reverse-panopticon and counter-deception potential. Administrator is architect
Deborah Natsios, longtime
Cryptome partner.
Design-L A mail list on architecture and design and everything administered by John Young. |