![]() |
|
OTHER STUFF Cryptout Recent Listings Cryptome Forum |
Cryptome DVD. Donate $25 for a DVD of the
Cryptome 10+-years archives of 39,000 files from June 1996 to December
2006 (~4.1 GB). Click Paypal or mail check/MO made out to John Young,
251 West 89th Street, New York, NY 10024. Archives include all files of
cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and
iraq-kill-maim.org.
Cryptome INSCOM DVD. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. Note on Paypal. Due to Paypal's notices being occasionally spam-filtered, please send a separate e-mail with a mailing address: cryptome[at]earthlink.net
Cryptome welcomes |
Espionage involves peeking at the other fellow's hand, marking the cards, cooking the books, poisoning the well, breaking the rules, hitting below the belt, cheating, lying, deceiving, defaming, snooping, eavesdropping, prying, stealing, bribing, suborning, burglarizing, forging, misleading, conducting dirty tricks, dirty pool, skulduggery, blackmail, seduction, everything not sporting, not kosher, not cricket. In short, espionage stands virtue on its head and elevates vice instead.
-- Roosevelt's Secret War: FDR and World War II Espionage, Joseph E. Persico, 2001.
A sigs:
"Every normal man must be tempted at times to spit upon his hands, hoist the black flag, and begin slitting throats." -- H.L. Mencken
Information Battlespace
During the Civil War, the Defenses of Washington (1862) - a circumferential ring of fortified installations - successfully safeguarded the vulnerable city. Since 11 September, 'next-generation' technologies are administering sprawl's unrestrained landscapes. Streets, sidewalks and back yards that shape the suburban imagination are being re-imaged in military-grade surveillance and satellite-based GPS. Constructed in real and near-real time, sprawl's unpredictable legacy of subdivisions, culs-de-sac, big-box retailers, parking lots, fast-food franchises and high-tech corridors are being reconceptualized as 'battlespace,' the multidimensional battlefield constructed by sensor and reporting technologies that conduct intelligence collection, surveillance and reconnaissance. Reconstituted in GIS scene mapping and mission planning softwares, suburban sanctuaries are captive to command-and-control arsenals which have supplanted the omniscient bird's-eye overview.
New technologies reveal latent infrastructures of political control already embedded in suburban landscapes. They expose consumer-driven sprawl as uniquely manipulable information space. The single-family home is a rich lode of sensitive information about debt, cars, credit cards, banking, taxes, travel, school performance and medical history. Data mining's invasive pattern-recognition algorithms - developed from statistics, artificial intelligence and machine learning - scour massive databases on behalf of the government, seeking 'interesting knowledge.' Sprawl's complex information space has become captive to panoptic schemes of 'multiple cartographies of surveillance.'
-- Deborah Natsios, National Security Sprawl, December 27, 2005 (Cartome)
(Note caution on downloading more than 100 files per day)
Cryptout Recent Listings Cryptomb 19 January-June 2006 Cryptomb 18 July-December 2005 Cryptomb 17 January-June 2005 Cryptomb 16 July-December 2004 Cryptomb 15 January-June 2004 Cryptomb 14 July-December 2003 Cryptomb 13 January-June 2003 Cryptomb 12 July-December 2002 Cryptomb 11 January-June 2002 Cryptomb 10 July-December 2001 Cryptomb 9 January-June 2001 Cryptomb 8 July-December 2000 Cryptomb 7 January-June 2000 Cryptomb 6 July-December 1999 Cryptomb 5 January-June 1999 Cryptomb 4 June-December 1998 Cryptomb 3 January-May 1998 Cryptomb 2 June-December 1997 Cryptomb 1 June 1996-May 1997
Eyeball Series
Cryptome CN publishes information,
documents and opinions banned by the People's Republic of China
Iraq-Kill-Maim presents about
4,000 photographs of the Iraq War killing and maiming
| Search |
+ At Cryptome.org | o At
Cryptome2.org |^ At Cartome.org |
* At Natsios Young |
Echelon
|
TEMPEST |
| Mirrors of
Cryptome |
USA v. Bin
Laden | A Caution
on Bots | Cryptome
DVD/CDs |
USA v.
Moussaoui |
| Documents Welcomed |
Free To Travel |
Coast Guard Security Zones
| RSS
Feed |
| AID-NIA Database
| Mil Dead Iraq
| USA v. Lynne Stewart
et al | UK
Secret Bases |
CRYPTOME TEN YEARS
DVD Cryptome offers its archives on a single DVD (CDs no longer offered). Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome INSCOM DVD. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. Note on Paypal. Due to Paypal's notices being occasionally spam-filtered, please send a separate e-mail with a mailing address to: cryptome[at]earthlink.net. Free DVDs will be sent to public and .edu libraries which make a request to Cryptome: cryptome[at]earthlink.net. Requests from the PRC and "rogue nations" invited. |
|
Cryptome welcomes
documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology,
dual-use technologies, national security, intelligence, and secret
governance -- open, secret and classified documents -- but not limited
to those.
Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.
Send by e-mail, fax or mail: April 25, 2002: New PGP 6.5.8 Key: ID: 0xA126BC05 Fingerprint: 4BBD 49A8 9116 52FF 9CF9 C411 443D 0394 A126 BC05 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> mQGiBDzIDV0RBADOVJH14G1R6CV1QzxGSQ79DbkssL848Ua3qm9NPKpyzqv5XPXA oixYh16Hf/yc/ryEDhlgTvbm9X358TxRIpKMVHsZbK7It5AGIPWQVI7g3zGV/G8v Y8d70fgc9ORC+UvEC6CPW4Z2pygX4vo4ye3wgjIhTC2UKfDiXYOiu6x+KQCg/xtQ +JD+nwVSyjFW8oTzVn7IXpkEAI/nCbzV0XTE737mKGK4DBUscfiU2Xc01WNOK5S+ QEE0dor/2QWMCHaNbq1moQv2HBYgkkT6i71XKVWAP2Pzq7Erc5ItYIli2cTNIGUm A3R2MTxC6nFoeEiEv48NjJ0XqjoJ2lvgTAf9ypWB8FFW4wmUwZS7bvyhRNyjh9gN pm29A/9IybcyobfplalyMeAEy0LVEFw1B3exwz+7C4b0SFpLp+DXk3i6lV3VsomY fTMiLqIJfhKjCsj/0taV1n1KbQSSY5d8MokkHjqvDvKGp+cMu/tXFfuXu5UnHpoX LKTQ6ki9a0S6xZenu8b2sH6J2IFFRFNIaGmLdfeHpRdbYJRAJLQdSm9obiBZb3Vu ZyA8anlhQHBpcGVsaW5lLmNvbT6JAE4EEBECAA4FAjzIDV0ECwMCAQIZAQAKCRBE PQOUoSa8BSmpAJ4ofGY8+/B95KIaQEa2iGV/Gu0XPQCg17M5aeom1YeCEJkfj7Oz YyFbymC5BA0EPMgNXRAQAPkYoH5aBmF6Q5CV3AVsh4bsYezNRR8O2OCjecbJ3HoL rOQ/40aUtjBKU9d8AhZIgLUV5SmZqZ8HdNP/46HFliBOmGW42A3uEF2rthccUdhQ yiJXQym+lehWKzh4XAvb+ExN1eOqRsz7zhfoKp0UYeOEqU/Rg4Soebbvj6dDRgjG zB13VyQ4SuLE8OiOE2eXTpITYfbb6yUOF/32mPfIfHmwch04dfv2wXPEgxEmK0Ng w+Po1gr9oSgmC66prrNlD6IAUwGgfNaroxIe+g8qzh90hE/K8xfzpEDp19J3tkIt AjbBJstoXp18mAkKjX4t7eRdefXUkk+bGI78KqdLfDL2Qle3CH8IF3KiutapQvMF 6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33TGSGSfgMg71l6RfUodNQ +PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBhznzJZv8V+bv9kV7HAarT W56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY72 88kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy 1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XrPdYX AAICEACuZswqMS6FfW3ekuj76PB4jn80MGLLoVFYtSv2wclq5auWyBt5c5QXKNk/ T74a+PKcTN5VxoVq7kDDbjnrsdl1yKq7PszRMM62eLWak+6bKMR2kGVMBTp5+8M4 bZUVX4WsQaTqGQthdZQLnHKxCF6by12wUXDdRfmfpomf5O8VDVlNAUhUJ1WpOBFD uXiHuS8KonPrRoHtjWDqyUFvMUvEvlB7y0KxMXsTUIyRYc8CujZZUo2GFs0D2H3H tKu2ate7yAoEBYCuMlvuZWCcgVJUto9bXjHM1kQqHaAGHm+a2jYMcatKlDDkkDp1 h3PNqzQOUI75hUg4vLiwMUeVaSyLqDKtz9YogH8n3gCvAPjNdeF+bdaNfVgzbLEk +stfCIEzRlBUsT70scpfFsyMP2Je/jiYwJNwBrxjUwJ4Ip1Dfc4bX8BRaG8s+fFi URjockN1RXkXicaRNFoxl0ld1kNHGB02PkFEdcTXTRJf4Gi5UQznO01ODpnI6/hv 4wW0+RdPg2sdpRmOVm7t563T+wxh3vSa6o1x4TPdshuDbQyQ63YGHKziB5CNCIvQ xwHrZIIywN/1G6jknr0ajTB/saEZkuNE77H2FjB498Bp7Swggu/+n8a2AC6dSJ57 E1SCHoZJHTP3lIFJXpv38zFiyi2I5IVFVTIExeT4IN/BEhnwmIkARgQYEQIABgUC PMgNXQAKCRBEPQOUoSa8BeBdAKD1J9FP0ubxgdQWkQj5s+7l9erEbACg7dFMejUV JxbAXr+qUgDWS1X10Bg= =QVLR -----END PGP PUBLIC KEY BLOCK----- |
Cartome is a companion site to Cryptome. It is an archive of spatial and geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, climatography, seismography, geography, camouflage, maps, images, drawings, charts, diagrams, imagery intelligence (IMINT) and their reverse-panopticon and counter-deception potential. Administrator is architect Deborah Natsios, longtime Cryptome partner. |
Fight the Bot
To combat rogue bots which waste about 25% of Cryptome's bandwidth, siphoning hundreds, even thousands of files at a time, repeatedly, bypassing means and methods of blocking them, the collection is seeded with a few hidden trojans and viruses -- which cannot be downloaded by conventional access to files. Bots which gulp more than 100 files per day will swallow these gluttony pills and explode. Since the fatheaded users of rogue bots do not read this caution, the file names of the pills will be posted here periodically for respectful downloaders to cleanse any toxins inadvertently grabbed. No published file will be contaminated. The Cryptome DVD will be clean except for the DIRT trojan which is ID'ed on the disk -- and any unknown toxins planted in contributions. |
A caution on bots:
Cryptome is attacked several times a day, like many other sites, nearly always by rogue bots, or bots set by default to siphon everything, including deep links, until a new user learns to trim the wide mouth suck. Java, WGet and Webdup are the worst offenders, but not the only ones, because they come ready to siphon everything until reconfigured. Hog bots suck thousands of files in a session before pole-axed. Prime offenders also are the ravenous searching and indexing engines, which 24/7 roam the web repeatedly gobbling the same files, or trashing with 304s for files already indexed. Because these pigs shutout other readers, Cryptome blocks any address which downloads more than 100 files per session, and that often requires blocking an entire domain for providers which assign a random address per session. About every six months Cryptome lifts all blocks (except for eternal offenders), now about 200. If blocked send a message to cryptome[at]eartlink.net, with affected domain name or IP number. Until the block is lifted, use an anonymizer like anonymizer.com; or many recommend anonymouse.org. Please don't unleash bots, or pinch their gorge. ______________________________ Russia Mirror: http://www.jar2.com/cryptome.ru/ Quintessenz mirror: Sabotage mirror: Thanks to SC for crypto software: http://caunter.ca/crypto.html
|