Cryptome |
DECEMBER 2002 |
doj122602.txt + Beware of Dangerous and Violent Persons December 27, 2002 dot122602.txt + Beware of Dangerous and Violent Materials December 27, 2002 itar122602.txt + Beware of Dangerous and Violent Weapons December 27, 2002 dod122602.htm + Beware of Dangerous and Violent WMD December 27, 2002 treas122602.txt + Beware of Dangerous and Violent Money December 27, 2002 treas122602-2.txt + Beware of Dangerous and Violent Insurance December 27, 2002 af122402.txt + Groom Lake Remains Filthy Dangerous Secret December 24, 2002 niac122402.txt + National Infrastructure Open Telemeet December 24, 2002 tempest-leaks2.htm + TEMPEST Leaks at US Army Signal Battalion December 24, 2002 street-crime.htm + How Wall Street and Its Cops Rob Investors December 24, 2002 tempest-leaks.htm + TEMPEST Leaks at US Army Crypto Facility December 23, 2002 fco-hunt.htm + UK Foreign Office Hunts Internet Leaker December 22, 2002 gilmore-v-usa-drp + Gilmore v. USA - Gov Dismissal Reply December 20, 2002 fco-ivanov.htm + FCO Reports on Russian Sergei Ivanov UK Visit December 19, 2002 dodd3600-1.htm + DoD Propaganda Operations Against Allies December 18, 2002 ussc121802.txt + Sentencing Guidelines of PATRIOT Act December 18, 2002 bop121802.txt + XXX Material Banned from Prisoners December 18, 2002 usa-v-elcom-dt.htm + USA v. Elcom/Dmitry Sklyarov Daily Transcripts December 18, 2002 steen-v-hmg2.htm + HMG Wins Appeal in Steen/Punch/Shayler Case December 14, 2002 gilmore-v-usa-god + Gilmore v. USA - Opposition to Dismissal December 13, 2002 proc121202.txt + Prez ODs December 13, 2002 wmd-race.htm + US Pumps WMD Race December 12, 2002 fru-claimant3.htm + Witness Statement of KF, Force Research Unit December 11, 2002 tia-balk.htm + New Tools for Domestic Spying, and Qualms December 10, 2002 mpaa-v-decss.htm + MPAA Rigs Norway Attack on Jon Johansen December 9, 2002 dvd120502.txt + Avoid Products of DVDCCA Members December 9, 2002 frs120902.txt + Billions for National Security Communications December 9, 2002 uspto120902.txt + RFC on TEACH Overreach of Digital Copyright December 9, 2002 nric120602.htm + Plans to Protect US Info Infrastructure December 7, 2002 dot120302.htm + Bush Hazardous Gas Buddies Warned by NTSB December 3, 2002 tia-eyeball.htm + Eyeballing Total Information Awareness December 2, 2002
O f f s i t e AUN Australia National Security Website /T December 27, 2002 CI Agent Counter Intelligence Agent Home Page December 24, 2002 FTP Voxfux Bushwhacked /S December 24, 2002 Home Sick GAO: Homeland Security SNAFU December 24, 2002 TIA Sci US Homeland Spying Aided by Cyber Scientists December 23, 2002 Biz v. 1A NTT/Verio Caves to Killer Dow December 23, 2002 MI5 MI5 could have stopped the bomb going off /T December 20, 2002 Da Elcomsoft/Sklyarov Crack DMCA/USA December 18, 2002 LEA UK Cops Say Data Retention A Must /I/A December 18, 2002 LEA Mirror Cryptome Mirror of Data Retention Doc Above December 18, 2002 Angel of Death IRA torturer was in the Royal Marines December 14, 2002 VIPS Volunteers In Police Service, Friday 13 December 13, 2002 Snuff Mil Porn of Bombing Running Men (164MB) /R December 4, 2002 Pats The New American Freedom Fighters /D December 2, 2002 UnSpy Eugene OR Rejects UnPatriotic Act Spying /D December 1, 2002 FRU Key secret agent's cover blown in court December 1, 2002
Cryptout Recent Listings |
| Search
(Active) | + At Cryptome.org
| ^ At Cartome.org |
* At Nunce.org | Echelon
| TEMPEST | | Mirrors of Cryptome | USA v. Bin Laden | A Caution on Bots | Cryptome CD | USA v. Moussaoui | | Documents Welcomed | Free To Travel | DIRT Files | Eyeball Series | Coast Guard Security Zones | | AID-NIA Database | |
6 October 2002: JYA.com and some of the other Cryptome archives are temporarily unavailable. |
http://www.libertythink.com/vox.htm
"At 10 oclock this morning (Dec 13) Approximately 40 agents from a joint group of CIA, FBI, And Major Crimes unit. Surrounded my home on Long Island New York (I was not there) and entered and proceeded to conduct a thorough search and removal operation while detaining a tennant who occupuys an apartment on the premises. I am in contact with my counsel (from NYCLU) NY Civil Liberties Union. (Norm Seigel)
I will try to make a further update tommorrow. As for now I wish someone could archive as many of the articles on my voxnyc.com site as possible. I apologize for such a brief note but it has been a terrible moment and I am literally on the run. I do not wish this information to be released until after I have suitable time to consult with my counsul maybe a day or two.
Thank you
-----
Cryptome mirror of Voxfux main page: http://cryptome.org/voxfux.htm
The Foreign Office is conducting an urgent mole hunt to find out how confidential documents are being leaked on to the internet. A secret memo describing meetings between a senior aide to Vladimir Putin, the Russian president, and British security chiefs is the latest to appear on an American website, causing intense embarrassment to Whitehall officials. The memorandum describes highly sensitive meetings between Sergei Ivanov, now the Russian defence minister, and security chiefs at the Foreign Office, Downing Street, the Cabinet Office and the Ministry of Defence. Details of discussions about defence, terrorism and drug trafficking are described in the document.
-- Nicholas Rufford and John Elliott, Mole hunt at Foreign Office to find internet leaker, December 22, 2002
The FCO-Ivanov memo:
http://cryptome.org/fco-ivanov.htm
Top republican terrorist exposed in court documents as a special forces soldier.
He was one of the most feared men inside the Provisional IRA. To rank-and-file 'volunteers', a knock on the door from John Joe Magee was the equivalent of a visit from the Angel of Death.
However, court documents leaked to the Sunday Herald show that Magee, head of the IRA's infamous 'internal security unit', was trained as a member of Britain's special forces. The IRA's 'torturer-in-chief' was in reality one of the UK's most elite soldiers.
The documents, lodged as part of a court action being taken against the British government by a disgruntled military intelligence agent, name Magee as a 'former member of the Special Boat Squadron'.
-- Neil Mackay, IRA Torturer was in the Royal Marines, December 15, 2002
See also: http://cryptome.org/fru-claimant3.htm
15 Q What type of events did you observe taking 16 place at the DEFCON conference? 17 A In various conference rooms had presentations 18 being given. There was also some flea market of 19 sorts with T-shirts and different computer items 20 for sale. There also was a game, king of the hill 21 type of game for hackers where the different 22 attendees were attempting to gain control of the 23 computer and it was a sort of competition taking 24 place throughout the resort. 25 Q And did you observe any evidence that at least 6 1 some of the individuals at DEFCON were cognizant of 2 law enforcement's potential presence at the 3 conference? 4 A This was a game that they played throughout 5 the conference called spot the fed where -- it was 6 a lighthearted game where they attempted to 7 identify whether one attendee or another was an FBI 8 agent or a federal officer. And I was present 9 while that was played on one occasion. 10 Q Did they identify you as a federal officer? 11 A No, they didn't. 12 Q Now, did you observe any speeches given at the 13 Elcomsoft conference? 14 A I observed the Elcomsoft presentation. 15 Q And generally what was the Elcomsoft 16 presentation? 17 A It was primarily a presentation about the 18 Elcomsoft eBook Reader and eBook security in 19 general. 20 Q Who gave that presentation? 21 A That was Mr. Dmitry Sklyarov. 22 Q What language did he give it in? 23 A English. 24 Q Did Mr. Sklyarov indicate whether Elcomsoft 25 was distributing the Advanced eBook Processor 7 1 program? 2 A He was -- he indicated that they had 3 distributed it or were selling it, but they were 4 now giving out a demonstration version while at the 5 conference. 6 Q And what date was the conference? 7 A I believe it was July 15th, 2001. 8 Q Did Mr. Sklyarov indicate whether Elcomsoft 9 had been selling the program? 10 A I believe he said they had priced it at $100. 11 He may have stated that they were not selling it at 12 that time. 13 Q Did he indicate that they had been selling it? 14 A I think he did. 15 Q Did Mr. Sklyarov demonstrate the program? 16 A He did. 17 Q Did Mr. Sklyarov indicate whether the program 18 would remove all protections from an electronic 19 book? 20 A He gave a demonstration in which he showed 21 that that, in fact, happens with the program. 22 Q Now, during this conference did you regard 23 yourself as being undercover? 24 A Yes. 25 Q And did you wear a recorder or any kind of 8 1 recording device? 2 A Yes, I wore a recording device. 3 Q Now, at any point during the conference either 4 before or after Mr. Sklyarov's speech did you have 5 an opportunity to speak with him in person? 6 A I did. 7 Q And how did that occur? 8 A He welcomed questions from the attendees at 9 the conclusion of his speech at which point I went 10 up and engaged him in conversation.
-- Testimony of FBI Agent Kevin McGee, USA v. Elcom, et al, December 5, 2002
|
Cryptome Archives |
|
Cryptout |
Cryptomb 11 |
Cryptomb 10 |
Cryptomb 9 |
Cryptomb 8 |
Cryptomb 7 |
Cryptomb 6 |
Cryptomb 5 |
Cryptomb 4 |
Cryptomb 3 |
Cryptomb 2 |
Cryptomb 1 |
Privacy Alert: To balance the load on Cryptome
automatic mirrors have been established:
http://www.eu.cryptome.org/ -- the main mirror, which has two or more hardly transparent back-ups: Anonymous operators of these mirrors swear no access logs are kept, not even for the usual undisclosed purposes, so be sure to protect yourself there and here and all around the Net. |
A caution on bots:
Blocks on some 300 abusive machines/domains have been lifted, temporarily. Idiot bots are the worst Net trashers, so please don't let them gobble unattended. Boxes gulping more than 100 files per day will be blocked. Anybody -- gov, mil, edu, com, or individual -- can download all the files here, the whole 9,000+ if desired, preferrably limited to a hundred per day. However, malconfigured bots and spiders that repetitively download mindlessly, or generate thousands of error messages for files already downloaded, and in doing so excluding others' access, are not welcome and will be blocked in perpetuity. Innocents affected complain to jya@pipeline.com ______________________________ Thanks to A for mirror: http://www.lessgov.org/cryptome Thanks to SC for crypto software: http://caunter.ca/crypto.html Thanks to AJ for mirrors: http://cryptome.sabotage.org/ the whole shebang is available at: ftp://ftp.zedz.net/pub/varia/Cryptome/ Thanks to mb for mirror: http://while1.org/~xm/cryptome.tgz Thanks to VP for mirror: http://munitions.vipul.net/documents/cryptome/ Thanks to GB: People who want/need a copy of Cryptome as of Sep 16 2001 can get a copy athttp://www.parrhesia.com/cryptome.tgz (248 Mb!) Quintessenz mirror located in Vienna, Austria: Australian mirror: |
Cryptome welcomes
documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy,
cryptology, dual-use technologies, national security, intelligence, and
blast protection -- open, secret and classified documents -- but not
limited to those.
Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order will be published here or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored. Send by e-mail, fax or mail: April 25, 2002: New PGP 6.5.8 Key: ID: 0xA126BC05 Fingerprint: 4BBD 49A8 9116 52FF 9CF9 C411 443D 0394 A126 BC05 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> mQGiBDzIDV0RBADOVJH14G1R6CV1QzxGSQ79DbkssL848Ua3qm9NPKpyzqv5XPXA oixYh16Hf/yc/ryEDhlgTvbm9X358TxRIpKMVHsZbK7It5AGIPWQVI7g3zGV/G8v Y8d70fgc9ORC+UvEC6CPW4Z2pygX4vo4ye3wgjIhTC2UKfDiXYOiu6x+KQCg/xtQ +JD+nwVSyjFW8oTzVn7IXpkEAI/nCbzV0XTE737mKGK4DBUscfiU2Xc01WNOK5S+ QEE0dor/2QWMCHaNbq1moQv2HBYgkkT6i71XKVWAP2Pzq7Erc5ItYIli2cTNIGUm A3R2MTxC6nFoeEiEv48NjJ0XqjoJ2lvgTAf9ypWB8FFW4wmUwZS7bvyhRNyjh9gN pm29A/9IybcyobfplalyMeAEy0LVEFw1B3exwz+7C4b0SFpLp+DXk3i6lV3VsomY fTMiLqIJfhKjCsj/0taV1n1KbQSSY5d8MokkHjqvDvKGp+cMu/tXFfuXu5UnHpoX LKTQ6ki9a0S6xZenu8b2sH6J2IFFRFNIaGmLdfeHpRdbYJRAJLQdSm9obiBZb3Vu ZyA8anlhQHBpcGVsaW5lLmNvbT6JAE4EEBECAA4FAjzIDV0ECwMCAQIZAQAKCRBE PQOUoSa8BSmpAJ4ofGY8+/B95KIaQEa2iGV/Gu0XPQCg17M5aeom1YeCEJkfj7Oz YyFbymC5BA0EPMgNXRAQAPkYoH5aBmF6Q5CV3AVsh4bsYezNRR8O2OCjecbJ3HoL rOQ/40aUtjBKU9d8AhZIgLUV5SmZqZ8HdNP/46HFliBOmGW42A3uEF2rthccUdhQ yiJXQym+lehWKzh4XAvb+ExN1eOqRsz7zhfoKp0UYeOEqU/Rg4Soebbvj6dDRgjG zB13VyQ4SuLE8OiOE2eXTpITYfbb6yUOF/32mPfIfHmwch04dfv2wXPEgxEmK0Ng w+Po1gr9oSgmC66prrNlD6IAUwGgfNaroxIe+g8qzh90hE/K8xfzpEDp19J3tkIt AjbBJstoXp18mAkKjX4t7eRdefXUkk+bGI78KqdLfDL2Qle3CH8IF3KiutapQvMF 6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33TGSGSfgMg71l6RfUodNQ +PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBhznzJZv8V+bv9kV7HAarT W56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY72 88kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy 1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XrPdYX AAICEACuZswqMS6FfW3ekuj76PB4jn80MGLLoVFYtSv2wclq5auWyBt5c5QXKNk/ T74a+PKcTN5VxoVq7kDDbjnrsdl1yKq7PszRMM62eLWak+6bKMR2kGVMBTp5+8M4 bZUVX4WsQaTqGQthdZQLnHKxCF6by12wUXDdRfmfpomf5O8VDVlNAUhUJ1WpOBFD uXiHuS8KonPrRoHtjWDqyUFvMUvEvlB7y0KxMXsTUIyRYc8CujZZUo2GFs0D2H3H tKu2ate7yAoEBYCuMlvuZWCcgVJUto9bXjHM1kQqHaAGHm+a2jYMcatKlDDkkDp1 h3PNqzQOUI75hUg4vLiwMUeVaSyLqDKtz9YogH8n3gCvAPjNdeF+bdaNfVgzbLEk +stfCIEzRlBUsT70scpfFsyMP2Je/jiYwJNwBrxjUwJ4Ip1Dfc4bX8BRaG8s+fFi URjockN1RXkXicaRNFoxl0ld1kNHGB02PkFEdcTXTRJf4Gi5UQznO01ODpnI6/hv 4wW0+RdPg2sdpRmOVm7t563T+wxh3vSa6o1x4TPdshuDbQyQ63YGHKziB5CNCIvQ xwHrZIIywN/1G6jknr0ajTB/saEZkuNE77H2FjB498Bp7Swggu/+n8a2AC6dSJ57 E1SCHoZJHTP3lIFJXpv38zFiyi2I5IVFVTIExeT4IN/BEhnwmIkARgQYEQIABgUC PMgNXQAKCRBEPQOUoSa8BeBdAKD1J9FP0ubxgdQWkQj5s+7l9erEbACg7dFMejUV JxbAXr+qUgDWS1X10Bg= =QVLR -----END PGP PUBLIC KEY BLOCK----- |
Cartome, a companion site to Cryptome. It is an archive of spatial and geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, climatography, seismography, geography, camouflage, maps, images, drawings, charts, diagrams, imagery intelligence (IMINT) and their reverse-panopticon and counter-deception potential. Administrator is architect Deborah Natsios, longtime Cryptome partner. |