Cryptome

Cryptome
Type of site
Document archive and disclosure
Available in English, but some documents are written in other languages
Owners John Young, Deborah Natsios
Editors John Young, Deborah Natsios
Website Official website
Registration None
Launched June 1996 (1996-06)
Current status Active

Cryptome is a 501(c)(3) private foundation[1] created in 1996 by John Young and Deborah Natsios and sponsored by Natsios-Young Architects.[2][3][4][5][6][7] The site collects information about freedom of expression, privacy, cryptography, dual-use technologies, national security, intelligence, government secrecy.[5]

Cryptome is known for publishing the alleged identity of the CIA analyst who located Osama Bin Laden,[8][9] lists of people allegedly associated with the Stasi,[10] and the PSIA.[11] Cryptome is also known for publishing the alleged identity of British intelligence agent and anti-Irish Republican Army assassin Stakeknife[12] and the disputed internal emails of the Wikileaks organization.[13] Cryptome republished the already public surveillance disclosures of Edward Snowden and announced in June 2014 that they would publish all unreleased Snowden documents later that month[14]

Cryptome has received praise from notable organizations such as the EFF, but has also been the subject of criticism and controversy. Cryptome was accused by WikiLeaks of forging emails[15] and some of Cryptome's posted documents have been called an "invitation to terrorists."[16] The website has also been criticized for posting maps and pictures of "dangerous Achilles' heel[s] in the domestic infrastructure," which the New York Times called a "tip off [to] terrorists."[17] ABC News also criticized Cryptome for posting information that terrorists could use to plan attacks.[18] Cryptome continues to post controversial materials including guides on "how to attack critical infrastructure" in addition to other instructions for illegal hacking "for those without the patience to wait for whistleblowers".[19][20] Cryptome has also received criticism for its handling of private and embarrassing information.[7][21]

People

Cryptome was created by John Young and Deborah Natsios, both highly successful architects.[22][23] Over the four decades of their architectural practice, they have handled multibillion-dollar projects ranging from urban design to forensic services.[24] They have worked as architects, contractors or independent consultants for people and organizations including the Council on Foreign Relations, the Metropolitan Transportation Authority of New York, Columbia University, W Hotels, Reuters, Opus Dei, the Rockefellers, the Mafia, Five Percenters, the Church of Scientology, the Black Panther Party.[25][26][27][28] As a result of their architectural work, they have been invited to speak at prestigious functions like FedCyber, an annual cybersecurity event on critical enterprise and federal government challenges.[24][29]

John Young

John Young was born in 1935. He grew up in West Texas where his father worked on a decommissioned Texas POW,[30] and John later served in the United States Army Corps of Engineers in Germany (1953–56) and earned degrees in philosophy and architecture from Rice University (1957–63). He went on to receive his graduate degree in architecture from Columbia University in 1969. A self-identified radical, he became an activist and helped create community service group Urban Deadline, where his fellow student-activists initially suspected him of being a police spy.[31] Urban Deadline went on to receive citations from the Citizens Union of the City of New York and the New York City Council, and which later evolved into Cryptome. His work earned him a position on the nominating committee for the Chrysler Award for Innovation in Design in 1998.[25][32][33]

He has received citations from the American Society of Mechanical Engineers, the American Society of Civil Engineers and the Legal Aid Society. In 1993, he was awarded the Certificate of Special Congressional Recognition.[32][34][35] He has stated he doesn't "acknowledge the power of the law"[36] and claimed to be a lawyer.[37]

Deborah Natsios

Deborah Natsios grew up in CIA safe houses across Europe, Asia and South America reserved for covert CIA station chiefs.[30] She later received her graduate degree in architecture from Princeton University. She has taught architecture and urban design at Columbia University and Parsons The New School for Design, and held seminars at the Pratt Institute and the University of Texas.[38][39] She is the principal of Natsios Young Architects.[40]

In addition to being co-editor for Cryptome, she is responsible for the associated project Cartome, which was founded in 2011[41] and posts her original critical art and graphical images and other public resources to document sensitive areas. She additionally holds a degree in mathematics from Smith College. She has given talks at the USENIX Annual Technical Conference[42] and Architectures of Fear: Terrorism and the Future of Urbanism in the West,[41] and written on topics ranging from architectural theory[38] to defenses of Jim Bell and assassination politics.[43] She is a notable critic of Edward Snowden.[44]

Family

Deborah Natsios is the daughter of Nicholas Natsios, who served as CIA station chief in Greece from 1948–1956, in Vietnam from 1956–1960, in France from 1960–1962, in South Korea from 1962–1965, in Argentina from 1965–1969, in the Netherlands from 1969–1972, and in Iran from 1972–1974.[22][45][46][47] While stationed in Vietnam, his deputy was William Colby, the future Director of Central Intelligence.[48] His name was included in the 1996 membership directory of the Association of Former Intelligence Officers, which Cryptome helped to publish.[49] Cryptome acknowledged its link to Nicholas Natsios in 2000.[22]

Her cousin is Andrew Natsios.[22] He has served as Administrator of the U.S. Agency for International Development (USAID), U.S. Special Envoy to Sudan, and Vice President of World Vision. Currently, Natsios teaches as Executive Professor at The Bush School of Government and Public Service.[22]

Activities

Digital library

On November 2, 2015, Cryptome stated that their archive contains 99,335 files totaling 42 gigabytes. The USB drive archive includes 112 INSCOM dossiers, and 14,000 files taken from ProEnergy Services.[50] On October 21, 2015, the website announced that about 350,000 Wikileaks documents totaling 70 gigabytes were made available on a separate USB.[51] The combined archives contain 444,000 files totaling 62 gigabytes.[52] Cryptome initially said the archives were free to public libraries, then later called it a prank.[51][53][54] As of November 28, 2015 Cryptome disavowed versions of its archive not hosted on the website.[55][56]

Cryptome's digital library includes series on:

Editorial policy

According to the website's mission statement, "Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those."[5] In a 2013 Associated Press article, Young said Cryptome has an "editorial role in selecting files, but we don't tell people what to think about them."[31]

John Young has said of Cryptome, "We do expect to get false documents but it’s not our job to sort that out."[61] In another interview, John Young promoted skepticism about all sources of information, saying: “Facts are not a trustworthy source of knowledge. Cryptome is not an authoritative source.”[62] When asked about providing context for material, Young said, "We do not believe in 'context.' That is authoritarian nonsense. For the same reason, we do not believe in verification, authentication, background."[63]

The front page of the states that "documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here – or elsewhere if gagged by order."[64] However, documents have been removed at the request of both law enforcement as well as individuals.[36][47][65]

Privacy Policy

We don't willfully disclose, but that's no assurance with the way the Internet is designed for the convenience of its operators which leaves it open to wizard intruders, greedy marketers and evil authorities. We don't know who's snooping our site and logs with intrusive tools. We see that Verio checks this site regularly; while its courteous sysadmins claim they do not snoop who knows what corruption maddens under-rockers.

So we don't promise false assurances of privacy which dissolve through negligence, duress, business deals, bribes and increasingly sophisticated intrusive technology. We believe it's best to try to protect your privacy with trustworthy and up-to-date armaments -- particularly with the use of anonymizers, strongest encryption and vigilance against snooping -- and to distrust disarming statements of privacy policy that are probably out of date and touch. Or stay far away from an Internet seemingly purpose-built for covert surveillance of unwary users.[66]

In 2003, Cryptome informed users that they have been able to delete logs for Cryptome and its predecessor website.[67] In late 2008, Cryptome added a second privacy policy stating, "No user data is collected by Cryptome. Logs are deleted several times a day."[68][69] Cryptome had given a similar statement in an answer to a subpoena several years before.[70] Cryptome later informed users that Network Solutions was logging the website's activity for them and the logs could not be deleted.[71] According to Network Solutions, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[72]

In 2015, it was discovered that Cryptome's USB archives contained web server logs, containing clues to the identities of Cryptome visitors including their IP addresses and what files they had accessed on Cryptome. Cryptome initially stated that they had been faked as part of a disinformation campaign. Several days later, Cryptome confirmed the logs were real and shared their findings. The logs had been mailed out to users who ordered the site's archive since they changed web hosts in 2007, which Cryptome blamed on their current ISP, Network Solutions.[73][74][75] Cryptome later added that "there are no accidental leaks", and that the leak succeeded in its intention of creating scandalous publicity to increase visitors to the website.[76][77] Soon after, Cryptome posted pictures of their logs, showing that they had records spanning the sites' history.[78][79] According to Cryptome, the then nineteen years of logs added up to about one terabyte.[80]

Cryptome has warned users that they do not have technical measures to protect the anonymity of their sources, saying "don’t send us stuff and think that we’ll protect you."[81]

Other activities

Cryptome's trade mark application described its business as "computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices."[82] Another trade mark application by Cryptome described it as providing "electronic storage of electronic media, namely, images, text and audio data" with a focus on "[s]cientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services."[83]

According to emails sent and published by Cryptome, the website has a three step plan for combining social issues with architectural and security issues. Step one is the prevention of the removal of social programs like the Bowery Mission and "to valorize them as far more valuable than the best of the best art institutions." Step two related to Cryptome's Eyeball Series which uses photographs and video recordings to document "national security sensitive infrastructure which handles global and financial communications", and the mass transit system which John Young and Deborah Natsios worked as architectural consultants when they "learned of its appalling insecurity -- which has also been superficially reported, honest coverage denied for alleged security concerns, aka security by obscurity." Cryptome has not publicly discussed step three.[84][85]

Cryptome has stated that it operates at least a dozen domains and claims to initiate new disclosure methods every few months.[86][87][88]

History

This is a dynamic list and may never be able to satisfy particular standards for completeness. You can help by expanding it with reliably sourced entries.

1968: Urban Deadline was created as an extension of the Columbia strike and the Avery Hall occupation.[89] Three decades later, Cryptome evolves out of Urban Deadline.[90]

1993: John and Deborah met and their collaboration begins "some time late in 1993".[22][23] John Young received the Certificate of Special Congressional Recognition.[35]

1994: What became Cryptome began with John and Deborah's participation in the Cypherpunks electronic mailing list and Urban Deadline.[22] Deborah Natsios called this time “seminal” and “transformative” for the internet.[23]

1996: Cryptome was officially created out of their architectural practice.[91]

1999: In May, Cryptome posted a list of alleged MI6 officers found on a mailing list. In response, MI6 allegedly tried to have Cryptome booted off its ISP.[22] In June, Cryptome.org was registered.[92] In October journalist Declan McCullagh wrote about John Young's perusal of the site's access logs.[34]

2000: Cartome was founded.[41] In July, two FBI agents spoke with Cryptome on the phone after Cryptome published a Public Security Intelligence Agency personnel file. The file listed 400 names, birthdates, and titles, notably included Director General Hidenao Toyoshima. The FBI expressed concerns over the file, but admitted it was legal to publish in the United States but not Japan. After speculation that the documents may have come from someone called "Shigeo Kifuji", Cryptome identified the source as Hironari Noda.[11]

2002: In January, Cryptome applied for press credentials with New York City. They were denied because they "could not provide letters of reference" regarding their previous press activities.[93] In December the Attorney General issued a subpoena requiring that John Young appear before a grand jury and turn over "all logs recording the I.P. addresses and/or users" who visited Cryptome. John Young posted a notice online declaring that visitor logs are deleted daily.[94]

2003: In November, Cryptome was visited by two FBI agents from a counter-terrorism office, asking for any information which Cryptome "had a gut feeling" could be a threat to the nation and the purpose of site.[95] Cryptome informed users that they have been able to delete logs for jya.com (Cryptome's predecessor website) and Cryptome.org[67]

2004: New York City removed warning signs around gas mains after Cryptome posts pictures of them, citing security concerns.[96]

2006: Cryptome became one of the early organizers of Wikileaks. John Young revealed that he was approached by Julian Assange and asked to be the public face of Wikileaks; Young agreed and his name was listed on the website's original domain registration form.[97][98][99]

2007: In the early part of the year, John Young and Deborah Natsios left Wikileaks due to concerns about the organizations' finances and fundraising, accusing it of being a "money-making operation" and "business intelligence" scheme, and expressing concern that the amount of money they sought "could not be needed so soon except for suspect purposes."[97][98][99] Cryptome published an archive of the secret, internal electronic mailing list of the Wikileaks organizers, from its inception through Young's departure from the group.[13] On April 20 the website received notice from its hosting company, Verio, that it would be evicted on May 4 for unspecified breaches of their acceptable use policy.[100][101] Cryptome alleged that the shutdown is a censorship attempt in response to posts about the Coast Guard's Deepwater program.[102]

2010: Cryptome added a second privacy policy.[66] Cryptome's Earthlink account was compromised, leading to its website being hacked and Cryptome's data copied. The hackers posted screenshots of the compromised email account. Cryptome confirmed the accuracy of the information taken, but contested specific assertions, claiming they had only about seven gigabytes of data, not the seven terabytes the attackers claimed to copy.[103] In February, Cryptome is briefly shut down by Network Solutions for alleged DMCA violations after it posted a "Microsoft legal spy manual".[104][105][106] Microsoft withdraws the complaint 3 days later and the website is restored.[107] In March, PayPal stopped processing donations to Cryptome and froze the account due to "suspicious activities". The account was restored after an "investigation" by PayPal.[36][108] Cryptome ended on bad terms with Wikileaks, with John Young directly accusing them of selling classified material and calling them "a criminal organization". He called Julian Assange's anti-American rhetoric insincere, saying he was "just a crowd pleaser".[98] In a separate interview, he called Assange a narcissistic and compared him to Henry Kissinger. Young also accused George Soros and the Koch brothers of "backing Wikileaks generously".[109]

2011: In July, Cryptome named the alleged CIA analyst who found Osama Bin Laden.[110] In September, Cryptome published a list of Intelligence and National Security Alliance members, alleging that they were spies.[111] Cryptome stopped cooperating with the production team for We Steal Secrets: The Story of WikiLeaks upon learning it was tentatively titled "Unnamed Wikileaks Project," explaining that "the project appears to have retreated into a narrow-focussed commercial theme, perhaps unavoidable in buzzy-headline Media World."[84]

2012: In February, the Cryptome website was hacked to infect visitors with malware.[112] In August, internet hacktivist The Jester accused Cryptome of running the website Cryptocomb and exposing Mark Owen.[113] Cryptome denied any connection to Cryptocomb or exposing Mark Owen's identity.[114]

2013: In February, Cryptome's website, email and Twitter account were compromised, exposing whistleblowers and sources that had corresponded with Cryptome via email. Cryptome blamed hackers Ruxpin and Sabu, who was an FBI informant at the time.[115][116] In June two US Secret Service agents visited Cryptome to request removal of a former presidential Bush family email allegedly hacked by Guccifer.[36] In August, a complaint about Cryptome's identification of alleged Japanese terrorists led Network Solutions to briefly shut down the site.[6] In October Cryptome informed its users that Network Solutions had generated logs of site's visitors, and that requests to delete the logs were not being honored.[117] (According to Network Solutions's website, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[118]) In December Cryptome reported receiving a letter attempting to blackmail them. The letter demanded money in exchange for the Guccifer archive and claimed to have embarrassing information about Cryptome and Cryptome's email exchanges.[119]

2014: In January, Cryptome uploaded a copy of the Guccifer archive to Google Drive, posting the links on Pastebin and their website.[119] Later that year, Cryptome attempted to raise $100,000 to fund the website and its other disclosure initiatives.[7][120] In June, Cryptome was pulled offline again when malware was found infecting visitors to the site.[121] In July, Cryptome said it would publish the remaining NSA documents taken by Edward Snowden in the "coming weeks".[122] Since then, Cryptome has not published any new Snowden documents.[123]

2015: In September, Cryptome announced that their encryption keys are compromised,[124] then later claimed they are not.[125] A few days later, Cryptome filed for incorporation in New York.[126] Later that month, a GCHQ document leaked by Edward Snowden revealed that the agency is monitoring visits to Cryptome.[127] Cryptome confirmed the information in the slide, stating that logs showed the IP address "visited Cryptome on dates listed for files shown."[128] In October, a sold edition (USB stick) of the Cryptome archive was observed to contain web server logs, containing clues to the identities of Cryptome visitors. The logs had been mailed out to users who ordered the site's archive at least since 2007. Cryptome denied the logs were real, and accused the discoverer of forging the data and other forms of corruption. Cryptome later confirmed they were real.[73][74][75][129] Cryptome later added the comment that "there are no accidental leaks".[76] Cryptome posted pictures of logs dating back to the site's creation, claiming that Cryptome is for sale. Cryptome later claimed that the sale is a parody and that "Cryptome has no logs, never has", noting that their "various ISPs have copious logs of many kinds" along with metadata and that Cryptome tracks these "to see what happens to our files".[101][128][130][131][132] Later in October, Wikileaks launched a searchable version of the Cryptome archive and Cryptome's tweets.[133] In response, Cryptome criticized Wikileaks and called it "click bait to garner user data."[134][135] In November, Cryptome announced it was constructing a SecureDrop system.[136] On November 28, 2015 Cryptome disavowed all copies of its archive, including its USB archives.[55][56]

2016: In April, Cryptome published thousands of credit-card numbers, passwords and personal information allegedly belonging to Qatar National Bank's clients.[137][138] The security team of Cryptome's web host reviewed the files and found they were "malicious with intent for fraud" and ordered their removal from the server.[65] Cryptome removed the files from their server[65] and linked to the files on the WikiLeaks mirror of Cryptome.[139] In July, Cryptome alleged LinkNYC was "tracking Cryptome's movements through the city" after the company responded to Cryptome's social media posts by attempting to prevent them from photographing the company's installations.[140] Later that month, Cryptome was reportedly threatened with arrest by the US Secret Service after sneaking through security at the home of Presidential Candidate Donald Trump.[141][142][143] In October, Cryptome announced that it's Bitcoin account had been "hacked and drained." When asked about the transfers in the ledger for their Bitcoin wallet, Cryptome declared that all the transfers were there, but that "everything has been erased on our account."[144] Later that month, Cryptome advised people not to visit the website[145] and posted what it said was a forged Podesta email from WikiLeaks.[146] In November, Cryptome announced that it was no longer using PGP encryption.[147]

Reception

A 2004 New York Times article assessed Cryptome with the headline, "Advise the Public, Tip Off the Terrorists" in its coverage of the site's gas pipeline maps.[96] Reader's Digest made an even more alarming assessment of the site in 2005, calling it an "invitation to terrorists" and alleging that Young "may well have put lives at risk".[16]

A 2007 Wired article criticized Cryptome for going "overboard".[148]

The Village Voice featured Cryptome in its 2008 Best of NYC feature, citing its hosting of "photos, facts, and figures" of the Iraq War.[149]

Wikileaks accused Cryptome of executing a "smear campaign" in 2010 after Cryptome posted what it alleged were email exchanges with Wikileaks insiders, which Wikileaks disputed.[103][150][151]

Cryptome was awarded the Defensor Libertatis (defender of liberty) award at the 2010 Big Brother Awards, for a "life in the fight against surveillance and censorship" and for providing "suppressed or otherwise censored documents to the global public". The awards committee noted that Cryptome had engaged with "every protagonist of the military-electronic monitoring complex".[152]

In 2012, Steven Aftergood, the director of the Federation of American Scientists Project on Government Secrecy, described John Young and Cryptome as "fearless and contemptuous of any pretensions to authority” and “oblivious to the security concerns that are the preconditions of a working democracy. And he seems indifferent to the human costs of involuntary disclosure of personal information.” Aftergood specifically criticized Cryptome's handling of the McGurk emails, saying "it’s fine to oppose McGurk or anyone else. It wasn’t necessary to humiliate them".[21][153]

In 2013, Cindy Cohn, then the legal director of the Electronic Frontier Foundation, praised Cryptome as "a really important safety valve for the rest of us, as to what our government is up to."[47]

In 2014, Glenn Greenwald praised and criticized Cryptome, saying "There is an obvious irony to complaining that we're profiting from our work while [Cryptome] tries to raise $100,000 by featuring our work. Even though [Cryptome] occasionally does some repellent and demented things - such as posting the home addresses of Laura Poitras, Bart Gellman, and myself along with maps pointing to our homes - [they also do] things that are quite productive and valuable. On the whole, I'm glad there is a Cryptome and hope they succeed in raising the money they want."[7]

Giganews criticized Cryptome for posting unverified allegations which Giganews described as completely false and without evidence. Giganews went on to question Cryptome's credibility and motives, saying "Cryptome's failure to contact us to validate the allegations or respond to our concerns has lessened their credibility. It does not seem that Cryptome is in search for the truth, which leaves us to question what are their true motives."[154]

Peter Earnest, a 36-year veteran of the CIA turned executive director of the International Spy Museum and chairman of the board of directors of the Association for Intelligence Officers criticized Cryptome for publishing the names of spies, saying it does considerable damage and aids people that would do them harm.[22]

See also

References

  1. Internal Revenue Service (October 19, 2015). "Cryptome Tax Exempt".
  2. Patrick Howell O'Neill (May 9, 2014). "Cryptome, the original WikiLeaks, launches $100,000 Kickstarter". The Daily Dot.
  3. Joseph Cox (July 6, 2014). "Why All the Snowden Docs Should Be Public: An Interview with Cryptome". Vice.
  4. "Cryptome claims all Snowden files will be published in July to avert a war". RT. July 1, 2014.
  5. 1 2 3 Alexander J Martin (September 16, 2015). "Cryptome founder revokes PGP keys after weird 'compromise'". The Register.
  6. 1 2 "Cryptome suffers brief take-down over Japanese 'terror' files".
  7. 1 2 3 4 "A Radical Pro-Transparency Website Is Raising Money To Annoy Glenn Greenwald".
  8. "Whistleblowing Website Cryptome Hacked, Conspiracy Theories Do Not Abound".
  9. "How a White House Flickr Fail Outed Bin Laden Hunter 'CIA John'".
  10. Bruce, Gary (2010). The Firm: The Inside Story of the Stasi. Oxford University Press. p. 32. ISBN 9780195392050.
  11. 1 2 McCullagh, Declan (July 21, 2000). "FBI Pressuring Spy Archivist". Wired. Archived from the original on December 28, 2013. Retrieved December 28, 2013.
  12. John Ware and Alasdair Palmer (May 18, 2003). "Is he or isn't he?". The Daily Telegraph.
  13. 1 2 Dan Duray (December 8, 2010). "The Original Wikileaker". The New York Observer..
  14. "More Edward Snowden Leaks on the Way? New York-based site Cryptome says it will publish the remaining NSA documents that Edward Snowden swiped".
  15. "Cryptome Hacked".
  16. 1 2 Crowley, Michael. "That's Outrageous – Let's Shut These Websites Down". Reader's Digest. Archived from the original on December 9, 2006. Retrieved March 9, 2013.
  17. "Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists".
  18. "Web Site Raises Questions About Public Access to Sensitive Government Info". Archived from the original on August 15, 2004.
  19. "How To Attack Critical Infrastructure, No-Bullshit Guide" (PDF).
  20. "HackBack!".
  21. 1 2 "The Man Behind the 'Blue Ball' Emails Scandal That Snared Brett McGurk".
  22. 1 2 3 4 5 6 7 8 9 "Secrets and Lies". Archived from the original on March 24, 2008.
  23. 1 2 3 "Open Source Design 01: The architects of information".
  24. 1 2 "FedCyber Speaker bios" (PDF).
  25. 1 2 "PROJECTS 1963 TO 1998". Archived from the original on December 19, 2005.
  26. "Cryptome Hackers and Consequences".
  27. "Laurence Rockefeller Residence Work, 1991". Archived from the original on December 19, 2005.
  28. "Urban Deadline NYTimes" (PDF).
  29. "FedCyber".
  30. 1 2 "The Whistleblower Architects: surveillance, infrastructure, and freedom of information according to Cryptome (part 1)".
  31. 1 2 "Older, quieter than WikiLeaks, Cryptome perseveres".
  32. 1 2 "John Young CV". Archived from the original on July 16, 1998.
  33. "Bibliography and Awards".
  34. 1 2 "He Digs 'Through' Gov't Muck". Archived from the original on March 1, 2000.
  35. 1 2 "DEBORAH NATSIOS AND JOHN YOUNG BIBLIOGRAPHY".
  36. 1 2 3 4 "A Discussion With Cryptome". Gawker. June 19, 2013. Archived from the original on November 4, 2013. Retrieved November 2, 2013.
  37. "Search Cryptome Archive".
  38. 1 2 "The SAGE Handbook of Architectural Theory".
  39. "Deborah Natsios".
  40. "Library".
  41. 1 2 3 "Natsios Young Research" (PDF).
  42. "Reversing the Panopticon". Archived from the original on October 5, 2011.
  43. "Homeland Defense and the Prosecution of Jim Bell".
  44. "Warum ihr selbst auf die Snowden-Dokumente zugreifen solltet".
  45. "NATSIOS NICHOLAS ANDREW".
  46. "Nicholas Andrew Natsios Obituary".
  47. 1 2 3 "Older, less flashy than WikiLeaks, Cryptome perseveres as a favored site for sharing secrets". Fox News. March 9, 2013.
  48. "CIA and the House of Ngo, Covert Action in South Vietnam, 1954–63" (PDF). National Security Archive.
  49. "Assn. Former Intelligence Officers. Membership Directory. 1996".
  50. "Venezuela-US Corruption 14,000 Files Disclosed".
  51. 1 2 Cryptome. "Cryptome WikiLeaks Archive 2006-2015".
  52. "Cryptome". Archived from the original on November 11, 2015.
  53. "Cryptome Donations".
  54. "Cryptome on Twitter: "Prank: "Get Your Library To Stock the WikiLeaks and Cryptome Archives At No Cost"".
  55. 1 2 "cryptome-nov2015".
  56. 1 2 "Cryptome on Twitter: "Cryptome disavows mirrors of its archive due to tampering with files, hashes, signatures and implant insertion."".
  57. "CARTOME". cryptome.org. Retrieved December 6, 2015.
  58. "Cryptome". Wikileaks.
  59. "Cryptome Nuclear Power Plants and WMD Series". cryptome.org. Retrieved December 6, 2015.
  60. "Cryptome Protest Photos Series". cryptome.org. Retrieved December 6, 2015.
  61. "THE INTERNET: CIRCUMVENTION OF CENSORSHIP?" (PDF). Archived from the original (PDF) on November 13, 2002.
  62. "An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual Godfather Of Online Leaking'".
  63. "LeaksWiki Continues and Cryptome Interview".
  64. "Cryptome".
  65. 1 2 3 "Cryptome on Twitter: "Done."". 2016-04-30. Archived from the original on 2016-04-30. Retrieved 2016-04-30.
  66. 1 2 "Site Secrets".
  67. 1 2 "Verio Un-Balks at Log File Deletion".
  68. "Other Stuff".
  69. "Other Stuff". Archived from the original on September 15, 2008.
  70. "Cryptome Log Subpoenaed".
  71. "Network Solutions Log File Spying".
  72. "How To Enable / Download The Web Logs".
  73. 1 2 "After calling it disinfo, Cryptome admits they leaked their logs".
  74. 1 2 "Leak site Cryptome accidentally leaks its own visitor IP addresses". The Daily Dotaccessdate = October 11, 2015.
  75. 1 2 "Cryptome grudgingly admits to leak of users' ancient IP addresses".
  76. 1 2 "Cryptome on Twitter: "@Dicedotcom @slashdot There are no accidental leaks, denial, fingerpoint, cover-up, confession, award, reward, glory days bore."". Archived from the original on October 20, 2015.
  77. "Cryptome on Twitter: "@Dicedotcom @slashdot Please distribute widely, our visitor accesses have wild-fired as leaks flamethrowers intend."".
  78. "Cryptome Stats 1996".
  79. "Cryptome Logs 2015".
  80. "Cryptome on Twitter: "Cryptome log files over 19 years: ~1TB. At hops 100 times that farmed, fertilized, fancied up, sold. NetSol to say."".
  81. "An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual Godfather Of Online Leaking part 2'".
  82. "CRYPTOME - Trademark Details".
  83. "CRYPTOME - Trademark Details".
  84. 1 2 "We Steal Secrets-The Story of WikiLeaks".
  85. "Eyebal Series".
  86. "Cryptome Kills the Kickstarter: an interview with John Young".
  87. "The Cryptosphere Interview of Cryptome".
  88. "Cryptome Attacked and Censored by Webcom and Network Solutions".
  89. Howard Gillette Jr. Class Divide: Yale ’64 and the Conflicted Legacy of the Sixties.
  90. "Older, quieter than WikiLeaks, Cryptome perseveres".
  91. "Natsios Young Architects". Archived from the original on July 16, 1998.
  92. "Cryptome.org Whois Domain History".
  93. "Cryptome Denied NY Press Credentials".
  94. "Subpoena for Cryptome's logs".
  95. "FBI to Cryptome". November 7, 2003.
  96. 1 2 "Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists". New York Times. August 29, 2004. Retrieved October 3, 2015.
  97. 1 2 "Website for Leaked Data Shines Spotlight on WikiLeaks".
  98. 1 2 3 "WikiLeaks sold classified intel, claims website's co-founder".
  99. 1 2 "Wikileaks' estranged co-founder becomes a critic (Q&A)".
  100. "Who Killed Cryptome.org?". Wired.
  101. 1 2 Gohring, Nancy (April 30, 2007). "Verio dumps controversial Cryptome site". Computerworld. Retrieved March 9, 2013.
  102. "Cryptome to be Terminated by Verio/NTT - Slashdot".
  103. 1 2 "Secret-Spilling Sources at Risk Following Cryptome Breach".
  104. Quigley, Robert (February 24, 2010). "Site Leaks Microsoft Online Surveillance Guide, MS Demands Takedown Under Copyright Law (UPDATE 6)". Geekosystem. Retrieved March 9, 2013.
  105. Diaz, Jesus (February 24, 2010). "The Secret Government Surveillance Document Microsoft Doesn't Want You To See". Gizmodo. Retrieved March 9, 2013.
  106. "Microsoft Online Services Global Criminal Compliance Handbook" (PDF). Wired. February 24, 2010. Retrieved March 9, 2013.
  107. "Cryptome Restored After Microsoft DMCA Takedown". PCMag.com. February 25, 2010. Retrieved March 9, 2013.
  108. "Now PayPal Goes for Cryptome, Suspends Account". Fast Company. March 8, 2010. Retrieved May 14, 2013.
  109. "Wikileaks are for-hire mercenaries - Cryptome".
  110. "How a White House Flickr Fail Outed Bin Laden Hunter 'CIA John'".
  111. "3,000 Intelligence officials' names, emails leaked as 'INSA spies'".
  112. "Breaches galore as Cryptome hacked to infect visitors with malware".
  113. "JESTER ACTUAL on Twitter: "John Young. Runs 'cryptocomb(dot)org', thinks it clever naming SEALs to AlQaeda: See previous tweet for his apology.".
  114. "CRYPTOCOMB - cryptocomb-bombast.pdf" (PDF).
  115. "Cryptome site, Twitter and email account hacked again".
  116. "Cryptome Email, Website and Twitter Account Hacked".
  117. "Network Solutions Log File Spying".
  118. "How To Enable / Download The Web Logs".
  119. 1 2 "Alleged 7GB Guccifer Archive Offered for Sale".
  120. "Cryptome Kills the Kickstarter: an interview with John Young".
  121. "Cryptome pulled OFFLINE due to malware infection: Founder cries foul".
  122. "More Edward Snowden Leaks on the Way?".
  123. "42 Years for Snowden Docs Release, Free All Now".
  124. "Someone Stole the Encryption Keys of WikiLeaks Precursor 'Cryptome'".
  125. John Young. "JYA and Cryptome Passphrase Are Secure". Cypherpunks.
  126. "Cryptome Incorporated in New York, NY - Reviews - Bizapedia Profile". Bizapedia.com. Retrieved October 23, 2015.
  127. "From Radio to Porn, British Spies Track Web Users' Online Identities". The Intercept. Retrieved October 3, 2015.
  128. 1 2 "Cryptome". cryptome.org. Archived from the original on September 26, 2015. Retrieved October 5, 2015.
  129. "Cryptome dataset - 98,900 files".
  130. "Cryptome logs 15-10-14".
  131. "Cryptome stats 1996".
  132. "cryptome-sale-parody.pdf" (PDF). Cypherpunks mailing list. October 16, 2015.
  133. "Search Cryptome Archive - WikiLeaks".
  134. "Cryptome op Twitter: ".@wikileaks is a $5B-50B entity not for free lurid content but for its user data and metadata. Assange's brilliant wikiplan. Ed and Glenn's?"".
  135. "Cryptome on Twitter: "Caution: @WikiLeaks use of "spying related" to its Cryptome search is click bait to garner user data. No salute misleading hype."". Archived from the original on October 20, 2015.
  136. "Cryptome on Twitter: "Cryptome's @SecureDrop under construction Real soon now!"".
  137. Parasie, Nicolas; Fitch, Asa (2016-04-27). "Qatar National Bank Probes Alleged Leak of Clients' Data". Wall Street Journal. ISSN 0099-9660. Retrieved 2016-04-30.
  138. Ragan, Steve. "Examining the leaked passwords and PINs from Qatar National Bank". CSO Online. Retrieved 2016-04-30.
  139. "Cryptome on Twitter". 2016-04-30. Archived from the original on 2016-04-30. Retrieved 2016-04-30.
  140. "The Whistleblower Architects: surveillance, infrastructure, and freedom of information according to Cryptome (part 2)".
  141. https://twitter.com/Cryptomeorg/status/754755604162412544. Missing or empty |title= (help)
  142. https://twitter.com/Cryptomeorg/status/754760058634903553. Missing or empty |title= (help)
  143. https://twitter.com/Cryptomeorg/status/754737256678711296. Missing or empty |title= (help)
  144. https://web.archive.org/web/20161012162439/https:/twitter.com/Cryptomeorg/status/783066403406479360. Missing or empty |title= (help)
  145. https://web.archive.org/web/20161011130446/https:/twitter.com/Cryptomeorg/status/785766057168384000. Missing or empty |title= (help)
  146. https://web.archive.org/web/20161030154038/https:/twitter.com/Cryptomeorg/status/792657877236346880. Missing or empty |title= (help)
  147. https://web.archive.org/web/20161123153527/https:/twitter.com/Cryptomeorg/status/801208748068995072. Missing or empty |title= (help)
  148. "Who Killed Cryptome.org?". Wired.
  149. "John Young and Deborah Natsios". 2008.
  150. "War of the Nerds: The Battle Over Wikileaks". Archived from the original on March 4, 2016.
  151. "WikiLeaks Founder Julian Assange Fights Calls to Step Down".
  152. "Preistraeger". Big Brother Awards.
  153. "Steven Aftergood".
  154. "It's a Gigahoax - Giganews is NOT an FBI Operation".

External links

Official:

Mirrors:

Other:

This article is issued from Wikipedia - version of the 12/3/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.