Monday, July 9, 2012

From Cryptome




FROM CRYPTOME---------------THANKS JOHN YOUNG!
 Unauthorized disclosures of secrets are essential for democracy.

In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:

Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates

Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm

Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger

First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf

Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell

UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act

Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla

Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi

John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey

Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell

US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917

UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/

    UK GCHQ: http://www.gchq.gov.uk/

American Civil Liberties Union (1920): http://www.aclu.org

UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml

    Echelon: http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)

        Nicky Hager (1996): http://www.nickyhager.info/

        Mike Frost: http://www.converge.org.nz/abc/frostspy.htm

        Duncan Campbell: http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)

            http://cryptome.org/jya/echelon-dc.htm

Federation of American Scientists (1945): http://www.fas.org

    Secrecy News (FAS kid): http://www.fas.org/sgp/news/secrecy/

    Global Security (FAS kid): http://www.globalsecurity.org

Les Temps modernes (1945: http://en.wikipedia.org/wiki/Les_Temps_modernes

National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947

    Central Intelligence Agency (1947): http://www.cia.gov

        Emergence of the Intelligence Establishment: http://history.state.gov/historicaldocuments/frus1945-50Intel

        Central Intelligence: Origin and Evolution: http://cryptome.org/cia-origin.htm

        Philip Agee (1975; CIA kid): http://en.wikipedia.org/wiki/Philip_Agee

        CIA FOIA Documents: http://www.foia.cia.gov/

    National Security Agency (1952): http://www.nsa.gov

        Winslow Peck (1972; NSA kid): http://cryptome.org/jya/nsa-elint.htm

        Anonymous AU (1973): http://cryptome.org/jya/nsa-40k.htm

        US Senate Church Report (1975): http://cryptome.org/nsa-4th.htm

        NIST Information Technology Laboratory: http://www.nist.gov/itl/

        US Navy The Onion Router: http://www.torproject.org/

        NSA FOIA Documents: http://www.nsa.gov/public_info/declass/index.shtml

        Wayne Madsen Report: http://www.waynemadsenreport.com

Simone de Beauvoir (1949, The Second Sex): http://en.wikipedia.org/wiki/The_Second_Sex

I. F. Stone's Weekly (1953-67): http://www.ifstone.org/

Ralph Nader (1965): http://www.nader.org/

Noam Chomsky (1960s): http://www.chomsky.info/; http://en.wikipedia.org/wiki/Noam_Chomsky

The Internet (1960s): http://en.wikipedia.org/wiki/Internet

    Usenet Newsgroups (1980s): http://en.wikipedia.org/wiki/News_groups

    World Wide Web (1989): http://en.wikipedia.org/wiki/Tim_Berners-Lee

    Classified Networks: SIPRNet, .smil, .intel, .nsa, .fbi, et al

Hacking (1960s): http://pcworld.about.com/news/Apr102001id45764.htm

    2600: http://www.2600.com

    Chaos Computer Club (1985): http://www.ccc.de/

    PHRACK: http://www.phrack.org/

Freedom of Information Act (1966): http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)

National Archives: http://www.archives.gov

    Classified National Security Information: http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html

    Presidential Libraries: http://www.archives.gov/presidential-libraries/

    The Federal Register: http://www.archives.gov/federal-register/

Library of Congress: http://www.loc.gov

David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)

MapQuest (1967): http://www.mapquest.com

Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm

Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh

FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol

Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email

Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm

Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/

Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html

Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm

Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie

Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman

Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle

    Ronald Rivest: http://people.csail.mit.edu/rivest/

    Adi Shamir: http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html

    Len Adleman: http://www.usc.edu/dept/molecular-science/fm-adleman.htm

        Philip Zimmerman PGP: http://philzimmermann.com/EN/findpgp/

            GnuPG: http://www.gnupg.org/

        OpenSSL: http://www.openssl.org/

Progressive Magazine Publishes H-Bomb Design 1979: http://www.progressive.org/images/pdf/1179.pdf

Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm

James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford

Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks

Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson

National Security Archive (1985): http://www.gwu.edu/~nsarchiv/

Article 19 (1987): http://www.article19.org/

Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/

Public Interest Research (1989): http://www.namebase.org/staffbl.html

    Namebase: http://www.namebase.org/

    Google Watch: http://www.google-watch.org

    Wikipedia-Watch: http://www.wikipedia-watch.org

Electronic Frontier Foundation (1990): http://www.eff.org

Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)

Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)

Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk

    Crypto Rebels: http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html

    John Gilmore: http://en.wikipedia.org/wiki/John_Gilmore_(activist)

    Eric Hughes, A Cypherpunk's Manifesto: http://www.activism.net/cypherpunk/manifesto.html

    Timothy C. May: http://en.wikipedia.org/wiki/Timothy_C._May

    Timothy C. May Cyphernomicon: http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html

    Matt Blaze Crypto: http://www.crypto.com/

    Marc Briceno: http://blog.pgp.com/index.php/author/mbriceno/

    David Wagner: http://www.cs.berkeley.edu/~daw/

    Joel McNamara: http://www.eskimo.com/~joelm/ also:

        Joel McNamara Tempest Page: http://www.eskimo.com/~joelm/tempest.html
        http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf

    Cryptography (Cypherpunks kid): http://www.mail-archive.com/cryptography@metzdowd.com/maillist.html

    James Dalton Bell (Cypherpunks Kid): Federal Correctional Institution Sheridan also:

        Arrest: http://cryptome.org/jya/jimbell.htm
        Trial: http://cryptome.org/jya/jdbfiles.htm

        Carl Edward Johnson (Bell kid): http://cryptome.org/jya/cejfiles.htm

    Cypherpunks Archives 1992-1998 http://cryptome.org/cpunks/cpunks-92-98.zip (83MB)

    Cryptome (originally jya.com 1996; Cypherpunks kid): http://www.cryptome.org

        Cartome (2001): http://www.cartome.org

        Eyeball Series (2002): http://cryptome.org/eyeball/index.html

            UK Secret Bases: http://www.secret-bases.co.uk/

            Public Sources for Satellite and Aerial Photos and Maps: http://cryptome.org/gis-sources.htm

        Wikileaks (2006; Cryptome "spiritual godkid"): http://www.wikileaks.org

            Julian Assange on Cypherpunks 1995-2005: http://cryptome.org/0001/assange-cpunks.htm

                Julian Assange Best of Security (1995): http://marc.info/?l=best-of-security&r=1&b=199507&w=2

                    http://www.cultural.com/web/security/mailing.lists/bos.html

Interesting-People Mail List (1993): http://www.interesting-people.org/archives/interesting-people/

Electronic Privacy Information Center (1994): http://www.epic.org

Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about

AltaVista (1995): http://www.altavista.com

The Internet Archive (1996): http://www.archive.org (Generous links to online libraries)

UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto

    Ben Laurie (Wikileaks Advisor): http://www.apache-ssl.org/ben.html

    Ross Anderson: http://www.cl.cam.ac.uk/~rja14/

        Marcus Kuhn: http://www.cl.cam.ac.uk/~mgk25/

    Adam Back Cypherspace: http://www.cypherspace.org/adam/

GSM Crypto Cracks (1997-2010): http://cryptome.org/0001/gsm-a5-files.htm

Terraserver USA (1998): http://www.terraserver-usa.com

    Bing Maps (2009): http://www.bing.com/maps

Google (1998): http://www.google.com

    Google Earth: http://earth.google.com/

Wikipedia (2001): http://www.wikipedia.org

Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard

USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act

NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy

Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness

Daniel Bernstein: http://cr.yp.to/djb.html

Bruce Schneier: http://www.schneier.com/

Cryptography Research: http://www.cryptography.com/

Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)

Cryptography Org: http://www.cryptography.org/ (Generous links)

Scribd: http://www.scribd.com

PGPBoard: http://www.pgpboard.com/

The Memory Hole: http://www.thememoryhole.org [Temporarily down]

ProPublica (June 2008): http://www.propublica.org/

Government Attic (longtime source of FOI to others): http://www.governmentattic.org/

Public Intelligence: http://publicintelligence.net/

Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)

History Anarchy Blog: http://historyanarchy.blogspot.com/

WikiSpooks: http://www.wikispooks.com

Cryptocomb: http://cryptocomb.org

29 June 2012

Compedium of the ever-growing leak sites: http://leakdirectory.org/index.php/Leak_Site_Directory

7 July 2012

Project PM: Tracking the Spy Industry: http://wiki.echelon2.org/wiki/Main_Page

Anonymous Analytics: http://anonanalytics.com/

Par:AnoIA - Potentially Alarming Research: Anonymous Intelligence Agency: http://www.par-anoia.net/



No comments:

Post a Comment