Donate for the Cryptome Archive of over 71,000 files from June 1996 to 2 April 2014 on 1 USB  (23.4GB).

Search Cryptome

Cryptome new public key.

New site at ( and replacement)

Cryptome accepts Bitcoins: 1P11b3Xkgagzex3fYusVcJ3ZTVsNwwnrBZ

Unreliable SSL has been uninstalled. All security and privacy policies are unreliable. Protect yourself against security and privacy promise. A sends related: A Security Market for Lemons (from 2007, and now much worse):


2014-0601.pdf         Manning Recounts Her Arc (Compare to Snowden's)  April 20, 2014
2014-0600.vid         Lebbeus Woods Exhibit Video Version 2            April 19, 2014
2014-0613.pdf         US Foreign Propaganda to Be Released Inside US   April 18, 2014

2014-0612.pdf         Terrorism and Electric Power Grid                April 18, 2014 (7.1MB)
2014-0611.pdf         Air Force Spying Operations                      April 18, 2014 (2.2MB)
2014-0610.pdf         Air Force Cyberspace Operations                  April 18, 2014 (1.3MB)
2014-0609.pdf         Air Force Information Operations                 April 18, 2014
2014-0608.pdf         Air Force Targeting                              April 18, 2014 (5.9MB)

2014-0607.pdf         Air Force Nuclear Operations                     April 18, 2014
2014-0606.pdf         Air Force Strategic Attack                       April 18, 2014 (1.5MB)
2014-0605.pdf ok      Air Force Space Operations                       April 18, 2014 (3.5MB)
2014-0604.pdf         Air Force Special Operations                     April 18, 2014
2014-0603.pdf         Air Force Homeland Operations                    April 18, 2014

2014-0602.pdf ok      Air Force Irregular Warfare                      April 18, 2014 (1.2MB)
2014-0601.htm         Brave Cops Assault Women                         April 18, 2014
2014-0600.vid         Lebbeus Woods Exhibit Video                      April 18, 2014
2014-0599.pdf         Lavabit Loses Appeal                             April 17, 2014
2014-0598.pdf         GAO: SEC Information Security Needs Improvement  April 17, 2014

2014-0597.pdf         Eat Your Entropy & Have It-Hacked RNGs Recovered April 17, 2014
2014-0596.pdf         Canadian Police Project BlueBear Facial Spying   April 17, 2014 (1.9MB)
2014-0595.htm         USG Probe: FBI's Seeking Snitch in 9/11 Defense  April 17, 2014
2014-0594.htm         Encyclopedia of Cryptography and Security Review April 16, 2014
2014-0593.pdf         Now for the Long Term of Future Generations      April 16, 2014 (4.1MB)

2014-0592.pdf         Clark-Karber Report on Ukraine Military Needs    April 16, 2014
2014-0591.vid         Pulitzer Prizes Announcement 2014                April 15, 2014
2014-0590.htm         FBI Sought Informant from 9/11 Defense Team      April 15, 2014
2014-0589.htm         US v. Chelsea Manning Graphic Account            April 15, 2014
2014-0588.htm         Pulitzer Prize Pratfall                          April 15, 2014

2014-0587.htm         Home-made Communications and Security            April 15, 2014
2014-0586.htm Repost  Boston Bomb Blasts                               April 14, 2014
2014-0585.htm Repost  Boston Bomb Blasts 2                             April 14, 2014
2014-0584.htm Repost  Boston Blasts: Bystanders Giving Aid             April 14, 2014
2014-0583.htm Repost  First Seconds After Boston Bomb Blast 1          April 14, 2014

2014-0582.htm         Goldman Sachs Steals Open Source, Jails Coder 2  April 14, 2014
2014-0581.pdf         DoD Spying on Non-US Persons Outside US for LEAs April 14, 2014
2014-0580.htm         Martin Kaiser and Kevin Shipp                    April 13, 2014
2014-0579.pdf         Heartbleed of Key        April 13, 2014
2014-0578.vid         Greenwald and Poitras Arrive at Polk Awards      April 12, 2014

2014-0577.vid         Presser Greenwald, Poitras, MacAskill 14-0411    April 12, 2014
2014-0576.vid         Glenn Greenwald Presses Flesh NYC 14-0411        April 12, 2014
2014-0575.vid         Polk: Greenwald, Poitras, MacAskill, Gellman     April 11, 2014
2014-0574.pdf         Andrew 'Weev' Auernheimer Conviction Vacated     April 11, 2014
2014-0573.htm         Message to Polk Awardees                         April 11, 2014

2014-0572.htm         Goldman Sachs Steals Open Source, Jails Coder    April 11, 2014
2014-0571.pdf         Senate Intel Committee Summary of CIA Torture    April 11, 2014
2014-0570.pdf         FISC BR14-01 USG to Retain Spy Data Past 5 Yrs   April 10, 2014
2014-0569.pdf         GAO: Air Force Needs Drone Pilot Management      April 10, 2014 (3.4MB)
2014-0568.pdf         Bradford Bishop Jr Possible Spy 1976             April 10, 2014

2014-0567.pdf         Legal and Illegal Baseball Pitching Positions    April 10, 2014 (1.2MB)
2014-0566.pdf         WMD Mass Fatality Management                     April 10, 2014 (1.6MB)
2014-0565.htm         DoD National Industrial Security Program         April 9, 2014
2014-0564.pdf         Standard for Exam of Documents for Alterations   April 9, 2014
2014-0563.pdf         Defense Policy Board Top Secret Meet             April 9, 2014

2014-0562.pdf         John Kiriakou Letter from Prison 14-0331 via     April 9, 2014 (2.3MB)
2014-0561.htm Updated Jesselyn Radack Emails Glenn Greenwald           April 9, 2014
2014-0560.pdf         Oil and Gas Drilling Cybersecurity               April 9, 2014
2014-0559.pdf         One Weird Trick to Stop Selfish Bitcoin Miners   April 9, 2014
2014-0558.pdf         Certified Bitcoins                               April 9, 2014

2014-0557.pdf         CIA Covert Operations 1951                       April 8, 2014
2014-0556.pdf         CIA Comments on NSA Project CLOISTER 1959        April 8, 2014
2014-0555.pdf         CIA Proposes NSA Directors 1952                  April 8, 2014
2014-0554.pdf         CIA Comments on NSA Legislation 1958             April 8, 2014
2014-0553.htm Updated Jesselyn Radack Emails Glenn Greenwald           April 8, 2014

2014-0552.pdf Mirror  Complete, Unofficial TEMPEST Information Page    April 6, 2014
2014-0551.htm         Obama Daughters Protection                       April 5, 2014
2014-0550.htm         Anja Niedringhaus                                April 5, 2014
2014-0549.pdf         GCHQ Full Spectrum Cyber Effects                 April 5, 2014 (1.1MB)
2014-0548.pdf         NSA 5 Eyes 2009 SIGDEV Conference                April 5, 2014

2014-0547.htm         NSA Snowden Releases Tally Update - *1,378 Pages April 5, 2014
2014-0546.pdf ok      DoD Technical Surveillance Countermeasures       April 5, 2014
2014-0545.pdf         ZunZuneo Fake Cuban Twitter Transcripts          April 4, 2014
2014-0544.pdf         FISC Misc14-01 Center for NatSec Studies Amicus  April 4, 2014
2014-0543.pdf         NSA Withholds 135 Docs (646 Pages) on MS Vista   April 4, 2014

2014-0542.htm Repost  The Traitor Jonathan Pollard by Seymour Hersh    April 3, 2014
2014-0541.pdf         Jonathan Pollard Accused by Caspar Weinberger    April 3, 2014 (1.9MB)
2014-0540.pdf         Caspar Weinberger Accused by Lawrence Korb       April 3, 2014
2014-0539.pdf         USG Response to Jonathan Pollard Offenses        April 3, 2014 (2.5MB)
2014-0538.pdf         Jonathan Pollard Describes Offenses 1            April 3, 2014 (2.7MB)

2014-0537.pdf         Jonathan Pollard Describes Offenses 2            April 3, 2014 (4.1MB)
2014-0536.pdf         Search Warrant Toronto Mayor Rob Ford et al 2    April 3, 2014 (10.2MB)
2014-0535.pdf         Search Warrant Toronto Mayor Rob Ford et al 1    April 3, 2014 (3.6MB)
2014-0534.pdf         DoD Officials Seeking Jobs with Its Contractors  April 3, 2014 (3.1MB)
2014-0533.pdf         Informative Tweets on Tails Security             April 3, 2014

2014-0532.pdf         CRS: Constitutional Challenges to NSA Collection April 3, 2014
2014-0531.htm         Der NSA-Komplex Review                           April 3, 2014
2014-0530.htm         Geoff Stone, Obama's NSA Review Group            April 3, 2014
2014-0529.pdf         Hector 'Sabu' Monsegur Sentencing on 8 May 2014  April 2, 2014
2014-0528.htm         Julian Assange Book: When Google Met WikiLeaks   April 2, 2014

2014-0527.htm         NSA Snowden Releases Tally Update - *1,357 Pages April 2, 2014
2014-0526.htm         The Intercept Comsec                             April 2, 2014
2014-0525.htm Update  Omidyar, First Look, Newconews Comsec            April 2, 2014
2014-0524.pdf         Jonathan Schell Recalled by Bill McKibben        April 2, 2014
2014-0523.pdf         AG-DNI Semi-Annual Report FISA Sec 702 Aug 2013  April 1, 2014 (5.0MB)

2014-0522.pdf         Paper Following Removed from Source              April 1, 2014
2014-0521.pdf         Exploitability of Dual EC in TLS Implementations April 1, 2014
2014-0520.arf         Recorded Future Brings Web Intel to Palantir     April 1, 2014 (42.2MB)
2014-0519.pdf         House Republican Budget FY2015                   April 1, 2014 (2.3MB)
2014-0518.pdf         Julius: Secure Mode of Operation for Auth Crypto April 1, 2014

2013-1103.vid         Meet Me At Your Riser - Cryptome Video           August 31, 2013


O f f s i t e 

2014-00156            Map of Fusion Boondoggle Spy Centers             April 19, 2014
2014-00155            Head of CIA Counterterrorism Michael D'Andrea    April 17, 2014
2014-00154            Lebbeus Woods: A Celebration                     April 17, 2014
2014-00153            Barrett Brown: Keep Rootin' for Putin            April 15, 2014

2014-00152            WikiLeaks Supporters Case Stonewalled by DoJ     April 10, 2014
2014-00151            Mobilities in Cities: From Visible to Invisible  April 10, 2014
2014-00150            US Master Spy Hopes to Stop Leaks                April 9, 2014
2014-00149            Peter Gutmann: Engineering Security              April 9, 2014
2014-00148            Ross Anderson: Security Engineering              April 9, 2014

2014-00147            Yahoo breaks every mailing list in the world     April 9, 2014
2014-00146            Tackling SM Kidnapping Hijack & Hostage Taking   April 9, 2014
2014-00145            SSL/TLS in a Post-PRISM Era                      April 8, 2014
2014-00144            The Heartbleed Bug                               April 8, 2014
2014-00143            History of Risks & Threat Events to CAs and PKI  April 8, 2014

2014-00142            USG Funded Favorite 'NSA-Proof' Apps             April 8, 2014
2014-00141            Open Technology Fund 2013 Report                 April 8, 2014
2014-00140            State Dept Declassification Exemption Guide      April 7, 2014
2014-00139            'Unbreakable' security codes inspired by nature  April 5, 2014
2014-00138            Security of Things (SECoT!) Forum                April 4, 2014

2014-00137            ACLU Offers NSA Document Search                  April 4, 2014
2014-00136            The Meaning of Security Hype                     April 4, 2014
2014-00135            “Too Mild a Nuclear Option”? NatSec in the 1970s April 3, 2014
2014-00134            Classified Nuclear Weapon Drawings Missing       April 3, 2014
2014-00133            Support Tails, Essential Snowden Reporting Tool  April 2, 2014


Greenwald arrives in New York after long flight from Berlin, first class unwrinkled, barbered and facialed. At right, declassed, grubby friends David and Philip.


How to Eat Your Entropy and Have it Too — Optimal Recovery Strategies for Compromised RNGs

Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, and Daniel Wichs

Abstract. Random number generators (RNGs) play a crucial role in many cryptographic schemes and protocols, but their security proof usually assumes that their internal state is initialized with truly random seeds and remains secret at all times. However, in many practical situations these are unrealistic assumptions: The seed is often gathered after a reset/reboot from low entropy external events such as the timing of manual key presses, and the state can be compromised at unknown points in time via side channels or penetration attacks. The usual remedy (used by all the major operating systems, including Windows, Linux, FreeBSD, MacOS, iOS, etc.) is to periodically replenish the internal state through an auxiliary input with additional randomness harvested from the environment. However, recovering from such attacks in a provably correct and computationally optimal way had remained an unsolved challenge so far. In this paper we formalize the problem of designing an efficient recovery mechanism from state compromise, by considering it as an online optimization problem.

Encyclopedia of Cryptography and Security Review

These deeply informative essays, coupled with David Kahn's magisterial The Codebreakers, Ross Anderson's Security Engineering, Peter Gutmann's Engineering Security (the last two free), among others, would have been, and could still be, invaluable for evaluating and publishing the Edward Snowden-NSA papers at a much more informed and informative scope and depth. To understand Snowden's NSA, its allies, supporters and suppliers, readers should inform themselves of what is lacking in public information and these volumes are unsurpassed foundation. (4.1MB)

Now for the Long Term: The Report of the Oxford Martin Commission for Future Generations


Create a C20-C30-C40 Coalition to counteract climate change; a new coalition made up of G20 countries, 30 companies, and 40 cities. The coalition could accelerate action on climate change, with measurable targets for initiatives that include energy-efficient buildings, faster market penetration of efficient vehicles and tracking emissions.

Establish a Voluntary Taxation and Regulatory Exchange to address tax abuse and avoidance and harmonise company taxation arrangements, promote information sharing, enhance transparency and governance.

Establish sunset clauses for publicly funded international institutions to ensure regular reviews of accomplishments and mandates to ensure they are fit for 21st century purpose.

Introduce CyberEx, a new early warning platform, aimed at promoting a better understanding of common cyber threats, identifying preventative measures, and minimising future attacks for the shared benefit of government, corporate and individual interests.

Remove perverse subsidies on hydrocarbons and agriculture, and redirect support to the poor.

Fight non-communicable diseases with a new action focused, city-based network, “Fit Cities” which would involve food, beverage and alcohol providers, in collaboration with public health and city authorities, as well as civil society, to reduce the burden on health systems.

End discrimination against future generations by revising discounting methods and adjusting them to take account of the uncertainties, risks and ethical implications for the long term.

Set up Worldstat, a specialist agency charged with undertaking quality control on global statistics, assessing domestic practices, regulating misuse and improving data collection.

Invest in Younger Generations: Social protection measures such as conditional cash transfer programmes should be used to break the intergenerational cycle of poverty, whilst youth guarantees would help reduce ‘scars’ of long-term unemployment and disconnection.

The public-service successes wrought by these stories were not inevitable. As explosive as the papers would have been on their own, with no mediation, the shape of the scandal has also been a function of careful journalism. It didn’t have to play out this way: either paper could have bungled it. They had to be judicious and brave. Each has more documents than it has published, and has been scrupulous about what it shares, making sure to give a sense of what the acronyms and connections mean. (In a way, the Pulitzer is also for what the papers have not made public.) Each has also reported out the stories, which includes going to the government for comment—listening to what it has to say, dealing with its pressure sensibly and not reflexively—and then publishing certain things that it has been told it should keep secret. -- Amy Davidson, The New Yorker.

A sends:

Richard Blee was also the CIA Chief of Station in Pakistan from mid 2002 to 2004.


Video of this flesh press: Laura Poitras in center background.

Targeted SMS received on the day of the crackdown Kiev February 18th, 2014
Contributed by Mari Bastashevski, StateBusiness - Apr 10, 2014

English translation welcomed: cryptome[at]

Translation by A2:

SMS Message - in Ukrainian language

From: Private number

Dear user (subscriber), you've been registered as a participant of massive unrests (agitations).


SMS Message - in Russian language

From: Private number

Benderovci "shitted" Kiev, there is no Stalin for you, we would shoot you all. You are simply assholes/ whores, what did you do to Grushevskogo Street? And if you, bitch, will write anything about our President, they will find Yanukovich before you without head in your Zhitomir. I wish you die, slut/bitch.


William Bradford Bishop, Jr., wanted for the brutal murders of his wife, mother, and three sons in Maryland nearly four decades ago, has been named to the Ten Most Wanted Fugitives list. A reward of up to $100,000 is being offered for information leading directly to the arrest of Bishop, a highly intelligent former U.S. Department of State employee who investigators believe may be hiding in plain sight.


Images of Bishop as he might look now:

2014-0565.htm  DoD National Industrial Security Program
    CY 11 total estimated costs for personnel security investigations 
of trustees, proxy holders and outside director are as follows:

    (1) The unit cost for a SECRET clearance (National Agency Check 
with Law and Credit NACLC) is $228.
3 SCA x 2 outside directors x $228/NACLC = $1,368
12 SSA x 3 outside directors x $4005/NACLC = $8,208
(2) The unit cost for a TS (Single Scope Background Investigation--
SSBI) is $4,005
2 SCAs x 3 outside directors x $4,005 = $16,020
4 SSAs x 3 outside directors x $4,005 = $48,060
9 PAs x 3 proxy holders x $4,005 = $108,135

    Therefore, the total estimated investigation cost for outside 
directors and proxy holders under SCAs, SSAs and PAs for CY 11 is 
$181,791. These costs are government costs and not levied on 


City of Redactions: Updated 2 March 2014

Cryptome, 21 January 2014: This is an FOI request to Snowden, Greenwald, Poitras, Gellman, NY Times, for full release of Snowden's de facto declassified USG documents. Send to: Cryptome, 251 West 89th Street, New York, NY 10024. Cost of digital reproduction on USBs will be paid. Public key for encrypting <cryptome[at]>: Fingerprint=5D02 335F 26A1 BD73 BFE3 F519 3755 7319 F9FC 4719

Ellsberg: Publishing classified documents is legal; leaking them is illegal. That's why publishing profits from courageous leaks, risk-free.

February 28, 2013. For quick Cryptome submissions whose source may be monitored send to <admin[at]> (note "info" not "org"). Test with a benign message beforehand, expect no response or a bounce. Use infrequently to minimize pattern analysis. Not great comsec but better than covertly targeted, tapped, tricked, tracked and trapped drop boxes, pastes, anonymizers, proxies, spoofs, onions, clouds and sekret one-time spasms. Key security is to protect yourself, not rely on system, authority or disclosure paragons.

Note: For regular email to Cryptome send to cryptome[at] with CC to jya[at]

The mail list below accepts only from subscribers.

Cryptome Mail List

Subscribe to Cryptome Mail List by sending email to


with 'subscribe' in the Subject field OR by visiting the list page at

After subscribing post to Cryptome Mail List by sending email to


"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung, via Tony Gosling

Military Casualties

Iraq Civilian Dead Wounded Care War Contracts
MARCH 2014

2014-0517.pdf         Informative Tweets on Snowden Redactions Part 2  March 31, 2014
2014-0516.pdf         Jeremy Hammond Sentencing Transcript             March 31, 2014
2014-0515.pdf         NSA NYMROD Spy Chiefs of State                   March 31, 2014
2014-0514.pdf Updated Informative Tweets on Snowden Redactions Part 1  March 31, 2014

2014-0515.pdf         New Mexico State Police Informants-Intelligence  March 30, 2014
2014-0513.htm         Allan Wexler: Breaking Ground                    March 30, 2014
2014-0512.htm         CIA-DoD Chabelly Djibouti Drone Base             March 30, 2014
2014-0511.pdf         The Ultimate Physical Limits of Privacy          March 29, 2014
2014-0510.pdf         NSA Spy Chiefs of State                          March 29, 2014

2014-0509.pdf         Briefs for VOA Reporting WMD Negotiations 1994   March 29, 2014
2014-0508.pdf         Clinton Admin VOA Propaganda Briefs 1994         March 29, 2014 (5.8MB)
2014-0507.pdf         DoD Electronic Warfare Policy                    March 29, 2014
2014-0506.pdf         DoD International Transfer of Dual-Use Material  March 29, 2014
2014-0505.pdf Updated Informative Tweets on Snowden Redactions         March 29, 2014

2014-0504.pdf         DoJ Plan to Hack Cyber-Criminals                 March 28, 2014 (4.6MB)
2014-0503.htm         Lockheed Martin $1B Cyber Spy Business           March 28, 2014
2014-0502.pdf         Fukushima Daiichi NPP Worker Injured             March 28, 2014
2014-0501.pdf         Building Secure-Anonymous Communication Channel  March 28, 2014
2014-0500.pdf         Zorro Break by Linear and Differential Attacks   March 28, 2014

2014-0499.pdf         Boston Marathon Bombings Report Declassified     March 26, 2014 (11.7MB)
2014-0498.pdf         Europol Electronic Evidence Task Plan            March 26, 2014
2014-0497.pdf         Cryptome Images Search 14-0326                   March 26, 2014 (5.5MB)
2014-0496.htm         Ubiquitous Comsec Is a Vulnerability             March 26, 2014
2014-0495.htm         Arlington Hall Station Eyeball                   March 26, 2014

2014-0494.pdf         NSA SID Culture                                  March 25, 2014
2014-0493.htm         NSA Civil Liberties-Privacy Head Becky Richards  March 25, 2014
2014-0492.pdf         HR 4291 FISA Transparency and Modernization Bill March 25, 2014 (1.8MB)
2014-0491.pdf         Ibragim Todashev FBI Kill Report by FL Court     March 25, 2014 (6.9MB)
2014-0489.pdf         Ibragim Todashev FBI Kill Report by FL Attorney  March 25, 2014

2014-0490.pdf         Ibragim Todashev FBI Kill Report by DoJ          March 25, 2014
2014-0488.htm         ICBM and Nuclear Bomber Commanders Eyeball       March 24, 2014
2014-0487.pdf         Matthew Keys Denied Motion to Suppress Evidence  March 24, 2014
2014-0486.pdf         NSA Huawei SHOTGIANT Hardware Exploit Part 2     March 24, 2014
2014-0485.htm         Ballistic Missile Submarine Commanders Eyeball   March 24, 2014

2014-0484.pdf         Huawei Global Cyber Security Assurance           March 23, 2014 (6.5MB)         Huawei Network Migration Tool V100R001C00SPC100  March 23, 2014 (48.7MB)
2014-0482.pdf         Gulf Military Balance - WMDs and Missiles        March 23, 2014 (7.5MB)
2014-0481.pdf         NSA Huawei SHOTGIANT Hardware Exploit Part 1     March 22, 2014
2014-0480.htm         NSA Snowden Releases Tally Update - *1,353 Pages March 22, 2014

2014-0479.htm         Snowden Long Drip Pie Charts                     March 22, 2014
2014-0478.pdf         Europe Natural Gas Map                           March 22, 2014 (12MB)
2014-0477.pdf         DoD Civilian Spy Personnel System 2014           March 22, 2014
2014-0476.pdf         DoD Personnel Security Program 2014              March 22, 2014
2014-0475.pdf         DoD Concussion Care - FOUO in Part               March 22, 2014 (2.0MB)

2014-0477.pdf         FISC BR-14-01 Order to Preserve NSA Metadata     March 21, 2014
2014-0476.pdf         CSE SNOWGLOBE                                    March 21, 2014
2014-0475.htm         NSA Snowden Releases Tally Update - *1,351 Pages March 21, 2014
2014-0474.htm         Compromised Comsec, Sys Admin Hunters and Tor    March 21, 2014
2014-0473.pdf         NSA and Its 40,000 Snoopers Full Article         March 21, 2014 (4.8MB)

2014-0472.htm         NRO Staff Declassified Records of Spy Satellites March 21, 2014
2014-0471.htm         NRO History of Spy Satellites                    March 21, 2014
2014-0470.pdf         NRO Sentry Syllabus                              March 21, 2014 (2.1MB)
2014-0469.pdf         NRO Breach                                       March 21, 2014
2014-0468.pdf         ChipWhisperer Side Channel Analysis Toolbox      March 21, 2014

2014-0467.pdf         NSA Hunt Sysadmins                               March 20, 2014 (1.2MB)
2014-0466.htm         NSA Snowden Releases Tally Update - *1,344 Pages March 20, 2014
2014-0465.pdf         Blind Recognition of Touched-Screen Keys         March 20, 2014
2014-0464.pdf         NSA Counsel Litt Talks Transparency-Secrecy      March 19, 2014
2014-0463.pdf         Pew Report on Youth Opposition to Censorship     March 19, 2014

2014-0462.pdf         Ukraine Document (EN translation)                March 19, 2014
2014-0461.htm         Skype and Crypto Promoted by Snowden a Ploy?     March 19, 2014
2014-0460.htm         JP Morgan Salaries and Bonuses                   March 19, 2014
2014-0459.htm         Major Reviews of the US Secrecy System           March 19, 2014
2014-0458.pdf         Congressional Oversight of Spying                March 19, 2014 (10.6MB)

2014-0457.pdf         Where Spying Secrecy Is Essential                March 19, 2014 (7.7MB)
2014-0456.pdf         NSA Breaking Strong Encryption                   March 19, 2014
2014-0455.htm         NSA Snowden Releases Tally Update - *1,338 Pages March 18, 2014
2014-0454.pdf         Dorian Nakamoto Los Angeles Court Files          March 18, 2014
2014-0453.pdf         NSA SCALAWAG Top Provider of Actionable SIGINT   March 18, 2014   

2014-0452.pdf         NSA MYSTIC Comprehensive Metadata Access         March 18, 2014
2014-0451.htm         JP Morgan Comsec                                 March 18, 2014
2014-0450.htm         Bank of America Comsec                           March 18, 2014
2014-0449.htm         Citibank Comsec                                  March 18, 2014
2014-0448.htm         Wells Fargo Comsec                               March 18, 2014

2014-0447.htm         International Monetary Fund Comsec               March 18, 2014
2014-0446.htm         Washington Post Comsec                           March 18, 2014
2014-0445.htm         ACLU Comsec                                      March 18, 2014
2014-0444.pdf         Thawte: Fraud Alert-New Phishing Tactics         March 18, 2014
2014-0443.pdf         Dorian Satoshi Nakamoto Denies Newsweek Report   March 17, 2014

2014-0442.htm         Snowden in Moscow Eyeball                        March 17, 2014
2014-0441.pdf         EU Sanctions on Russia                           March 17, 2014 (1.0MB)
2014-0440.htm         Comsec Tempest and Crypto Oil                    March 17, 2014
2014-0439.htm         CAESAR Submissions Published                     March 16, 2014
2014-0438.pdf         National Security Sources and Secrets Brief ref  March 16, 2014

2014-0437.pdf         Dorian Nakamoto: Police Report on Stalking       March 16, 2014
2014-0436.pdf         EU Statement on Crimea Referendum                March 16, 2014
2014-0435.pdf         Counterterrorism Calendar 2014                   March 16, 2016 (15MB)
2014-0434.htm         Spy Analyst Salaries                             March 16, 2014
2014-0433.htm         Journalists Shill Sources and Secrets            March 16, 2014

2014-0432.pdf         National Security Information Annual Training    March 16, 2014 (1.5MB)
2014-0431.pdf         National Security Information Initial Brief      March 16, 2014 (1.5MB)
2014-0430.htm         NSA Zologize                                     March 16, 2014
2014-0429.pdf         NSA Kid's Game: Spot the Differences             March 16, 2014
2014-0428.htm         NSA Salaries                                     March 16, 2014

2014-0427.htm         CIA Salaries                                     March 16, 2014
2014-0426.htm         FBI Salaries                                     March 16, 2014
2014-0425.pdf         New York Times Salaries                          March 15, 2014
2014-0424.pdf         DoD Cybersecurity                                March 15, 2014
2014-0423.pdf         DoD Risk Management for Information Technology   March 15, 2014

2014-0422.pdf         DoD Scientific and Technical Information Program March 15, 2014
2014-0421.pdf         Non-Profit Journalism Assets and Compensation    March 14, 2014
2014-0420.pdf         NSA Denies Thousands of Implants (ref)           March 14, 2014
2014-0419.pdf         Breaking POET Crypto                             March 14, 2014
2014-0418.pdf         Crypto Multimedia                                March 14, 2014

2014-0417.pdf         Low Overhead Broadcast Crypto                    March 14, 2014
2014-0416.pdf         Fingerprinting Smart Devices                     March 14, 2014 (3.6MB)
2014-0415.pdf         Security of Browser Extensions                   March 14, 2014
2014-0414.pdf         DC Continuity of Operations Plan 2002 FOUO       March 14, 2014
2014-0413.htm         CIA Caroline Krass Eyeball                       March 14, 2014

2014-0412.htm         Comsec for Earth Water Air Fire Mind Spirit Soul March 14, 2014
2014-0411.htm         NSA Cybercom Michael Rogers Eyeball              March 13, 2014
2014-0410.pdf         Gov-Biz Booz Allen: Spying Disconnect            March 13, 2014 
2014-0409.htm         CIA Robert Eatinger Eyeball                      March 13, 2014
2014-0408.pdf         NSA Third Party Relationships                    March 13, 2014

2014-0407.htm         Comsec as Essential Public Utility               March 13, 2014
2014-0406.htm         NSA Richard Ledgett Eyeball                      March 13, 2014
2014-0405.htm         TAO QUANTUMINSERT Bonanza                        March 13, 2014
2014-0404.htm         Obama Sequestration Order                        March 12, 2014
2014-0403.pdf         FISC BR-14-01 Order to Preserve NSA Metadata     March 12, 2014

2014-0402.pdf         FISC BR-14-01 TRO to Preserve NSA Metadata       March 12, 2014 (4.1MB)
2014-0401.htm         NSA Snowden Releases Tally Update - *1,333 Pages March 12, 2014
2014-0400.pdf         NSA Hammerchant and Hammerstein                  March 12, 2014 (2.1MB)
2014-0399.pdf         NSA UK Views of Mikey and Ibake                  March 12, 2014
2014-0398.pdf         NSA Turbine and Turmoil                          March 12, 2014 (3.2MB)

2014-0397.pdf         NSA Thousands of Implants                        March 12, 2014
2014-0396.pdf         NSA More Than One Way                            March 12, 2014
2014-0395.pdf         NSA GCHQ Quantumtheory                           March 12, 2014 (5.4MB)
2014-0394.pdf         NSA Selector Types                               March 12, 2014
2014-0393.pdf         NSA Quantum Insert                               March 12, 2014 (4.1MB)

2014-0392.pdf         NSA Analysis of Converged Data                   March 12, 2014
2014-0391.pdf         NSA Phishing and MTM Attacks                     March 12, 2014
2014-0390.pdf         NSA Menwith Hill Use of xKeyscore                March 12, 2014
2014-0389.pdf         NSA Industry Exploit                             March 12, 2014
2014-0388.pdf         NSA 5 Eyes Hacking                               March 12, 2014

2014-0387.htm         NSA Snowden Releases Tally Update - *1,298 Pages March 12, 2014
2014-0386.pdf         DoJ National Instant Criminal E-Check FOUO       March 12, 2014 (2.7MB)
2014-0385.pdf         DoD Ecuador Threat Brief FOUO                    March 12, 2014
2014-0384.pdf         CNSS Gap Between FICAM and Secret Nets FOUO      March 12, 2014 (1.2MB)
2014-0383.pdf         Georgia Crime Info Center Operating Manual       March 12, 2014 (2.0MB)

2014-0382.pdf         NSA Policy Manual 1-52 Classification Guide      March 12, 2014 (1.9MB)
2014-0381.htm Update  Massive Twitter Botnet                           March 12, 2014
2014-0380.pdf         NSA Assistance to Dutch Somali Piracy Control    March 12, 2014
2014-0379.pdf         NSA Stellarwind Classification Guide             March 12, 2014 (2.3MB)
2014-0378.pdf         NSA FISA FAA Classification Guide                March 12, 2014

2014-0377.pdf ok      NSA Attorney General Dissemination Procedures    March 12, 2014
2014-0376.pdf         NSA Cryptanalysts FISA Database Sharing          March 12, 2014
2014-0375.pdf         NSA Spying Timeline                              March 12, 2014
2014-0374.htm         Barton Gellman Eyeball                           March 11, 2014
2014-0373.htm Update  Glenn Greenwald Eyeball                          March 11, 2014

2014-0372.htm         Laura Poitras Eyeball                            March 11, 2014
2014-0371.pdf         Sen Feinstein on CIA Interrogation Docs Hack     March 11, 2014
2014-0370.htm ok      John Cook Eyeball                                March 11, 2014
2014-0369.htm Repost  John Cook Radar Spying John Young Cryptome       March 11, 2014
2014-0368.pdf         John Cook, Radar, Smears Cryptome                March 11, 2014

2014-0367.htm         John Cook, Gawker Editor, Joins The Intercept    March 11, 2014
2014-0366.htm Update  Omidyar, First Look, Newconews Comsec            March 11, 2014
2014-0365.htm         Edward Snowden at SXSW                           March 11, 2014
2014-0364.htm         Barton Gellman at SXSW                           March 11, 2014
2014-0363.htm         Etienne Uzac Eyeball                             March 10, 2014

2014-0362.htm         Massive Twitter Botnet                           March 10, 2014
2014-0361.htm         Target Hacker Still Online                       March 10, 2014
2014-0360.htm         Jim Impoco Eyeball                               March 9, 2014
2014-0360.htm         Andrew Leonard Eyeball                           March 9, 2014
2014-0359.htm         Stop Media Glorifying                            March 9, 2014

2014-0358.htm         Leah McGrath Goodman Eyeball                     March 8, 2014
2014-0357.pdf         Cybersecurity of North American Electric Grid    March 8, 2014 (11.5MB)
2014-0356.pdf         DoD Digital Crime Courses (via)                  March 8, 2014
2014-0355.pdf         National Repository Digital Forensic Information March 8, 2014
2014-0354.pdf         DG Shane: Metacity: Origins and Implications     March 8, 2014

2014-0353.pdf         Privacy Civil Liberties Board Meet on Spying     March 8, 2014
2014-0352.pdf         Hearing on Critical Infrastructure Protection    March 8, 2014
2014-0351.pdf         Prez Orders Sanctions on Some Ukraine Meddlers   March 8, 2014
2014-0350.pdf         FISC BR-14-01 Opinion on NSA Spying for FBI      March 8, 2014
2014-0349.pdf         Snowden Testimony to EU Parliament               March 8, 2014

2014-0348.pdf         Congressman Pompeo Protests SXSW Snowden Invite  March 8, 2014
2014-0347.pdf         Irish Inept Pregnancy Data Holder Fined £200K    March 8, 2014
2014-0346.htm         Femen: Stop Putin's War                          March 7, 2014
2014-0345.pdf         NSA Ask Zelda                                    March 7, 2014
2014-0344.htm         NSA Snowden Releases Tally Update - *1,235 Pages March 7, 2014

2014-0343.htm         Belbek Air Base Standoff                         March 7, 2014
2014-0342.pdf         Masterspy Releases $45.6B Budget for FY2015      March 6, 2014
2014-0341.htm         Pros and Cons of Big Data Spying                 March 6, 2014
2014-0340.htm         Ex-NSA Official Warns Tech Firms: Stop Spying    March 6, 2014
2014-0339.pdf         Barrett Brown Moves to Dismiss Counts 1,3-12     March 5, 2014

2014-0338.pdf         Barrett Brown: US Moves to Dismiss Counts 1,3-12 March 5, 2014
2014-0337.htm         Ukraine's Leaders Seek National Socialism        March 4, 2014
2014-0336.htm Update  Amazon and the Apple Macbook Fraud               March 4, 2014
2014-0335.pdf         Barrett Brown Moves to Dismiss Obstruction       March 4, 2014
2014-0334.htm Update  Amazon and the Apple Macbook Fraud               March 4, 2014

2014-0333.pdf         HTTPS Traffic Analysis Risks and Defenses        March 4, 2014
2014-0332.pdf         Nuclear Weapon Pit Production                    March 4, 2014 (2.0MB)
2014-0331.pdf         Failures in Apple iMessage and Beyond            March 3, 2014
2014-0330.pdf         Eat Your Entropy and Have it Too - Recover RNGs  March 3, 2014
2014-0329.pdf         Solomon Northrup - News Report 12 Years a Slave  March 3, 2014

2014-0328.pdf         Canadian Army Fails to Stonewall Reporter        March 3, 2014 (5.7MB)
2014-0327.htm         Amazon and the Apple Macbook Fraud               March 3, 2014
2014-0326.pdf         War on Poverty 50 Years Later                    March 3, 2014 (1.1MB)
2014-0325.pdf         India Electronics Industry Work Conditions 1997  March 3, 2014 (10.4MB)
2014-0324.pdf         Giving Forensic Evidence in Court                March 2, 2014

2014-0323.pdf         Computer Forensics                               March 2, 2014
2014-0322.pdf         Digital Investigations                           March 2, 2014 (1.1MB)
2014-0321.pdf         Forensic Examination of Digital Technology       March 2, 2014
2014-0320.pdf         FISC Order BR-06-05 NSA Spying for FBI           March 2, 2014 (4.1MB)
2014-0319.pdf         FISC Order for NSA Pen Register Trap and Trace   March 2, 2014 (25.9MB)

2014-0318.pdf         FISC Order BR-06-08 NSA Spying for FBI           March 2, 2014
2014-0317.pdf         FISC Bates Opinion on Unconstitutional Spying    March 2, 2014 (2.5MB)
2014-0316.pdf         DoJ AG FISA Pen Registers Trap/Trace 2001 Doc    March 2, 2014 (1.3MB)
2014-0315.pdf         Drone Journalism                                 March 1, 2014 (2.1MB)
2014-0314.pdf         Ghosting Assange                                 March 1, 2014

O f f s i t e 

2014-00132            ProPublica Peddling Data                         March 30, 2014
2014-00131            Ricin Poisoning Is Hard to Do-Breaking Bad Inept March 28, 2014
2014-00130            Hawaii Haiku Stairway to Heaven                  March 28, 2014
2014-00129            British War Office Cypher 1941-43                March 27, 2014

2014-00128            Class and the Young Ricin Lad                    March 26, 2014
2014-00127            Brutal Ageism of Tech                            March 26, 2014
2014-00126            RIPE: Law Enforcement Agency Requests 2013       March 26, 2014
2014-00125            Two Spying Analysis Tools                        March 24, 2014
2014-00124            World's Most Secure Mobile Phones                March 24, 2014

2014-00123            Wash Post-NY Times-USG Censor NSA Data           March 23, 2014
2014-00122            The Cold War That Threatens Democracy            March 21, 2014
2014-00121            Mil Records of Nixon, Salinger, Hendrix, et al   March 20, 2014
2014-00120            CIA Officer Kevin Duffin Identified              March 19, 2014
2014-00119            NL Armed Forces Progress with Cyberwarfare       March 18, 2014

2014-00118            Terrorist Attacks Methods and Tactics            March 16, 2014
2014-00117            World Wide Web for luvvies and VCs-or all of us? March 16, 2014
2014-00116            Watch Rich Journalists Shill Sources and Secrets March 16, 2014
2014-00115            Analysis of Olympia Phone/Net Used for CA Spying March 14, 2014
2014-00114            US Crypto Security Failures in WWII              March 13, 2014

2014-00113            UN SITU Forensic Architecture Drone Probe        March 11, 2014
2014-00112            NSA Observer                                     March 10, 2014
2014-00111            Fake Cockpit Camouflage                          March 10, 2014
2014-00110            Prologue to Fukushima Daiichi Disaster           March 19, 2014
2014-00109            CIA Richard Bissell Speech 1995                  March 10, 2014

2014-00108            India Armaments Making Deficienies               March 7, 2014
2014-00107            Russian Arms Sales to India Leaked               March 7, 2014
2014-00106            Global Espionage's Biggest Investors             March 4, 2014
2014-00105            Barrett Brown Motion to Dismiss Obstruction      March 4, 2014
2014-00104            Barrett Brown Motion to Dismiss Linking          March 4, 2014

Cryptome overview:
Cryptout Recent Listings

Cryptome CN
Eyeball Series
Iraq Kill Maim
Nuclear Power Plants and WMD Series
Protest Photos Series
Occupy Wall Street Photo and Video Series

Other Stuff Contact, Public Key
Cryptome Videos


Cryptome Public Key 11 June 2013. New PK for cryptome[at]
Key ID: 0x8B3BF75C

Version: PGP Universal 2.9.1 (Build 347)


22 April 2013

Cryptome has signed up for SilentCircle and is open to its use as PGP supplement.

Key below superceded and no longer valid.

22 April 2012
Cryptome Public Key <cryptome[at]>

Fingerprint=5D02 335F 26A1 BD73 BFE3  F519 3755 7319 F9FC 4719

Version: PGP Universal 2.9.1 (Build 347)


Alleged mirrors of the full Cryptome Archive are online including on Torrent, These have not been not examined by Cryptome so none are verified as true copies and clean, not tampered with, entrapment bait or forgery. If the mirrors are true and clean, then more distribution is welcomed.

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.

Email: cryptome[at]
Mail: John Young, Cryptome, 251 West 89th Street, New York, NY 10024
Checks/Money Orders: Make out to "John Young"
Telephone for messages: 212-873-8700

Deborah Natsios and John Young Bibliography

Email: Deborah Natsios & John Young Architects: nya[at]

Cryptome/Cartome Essays, Deborah Natsios and John Young

Cryptome Artworks at Bowery Mission Censored by The New Museum

Exhibit, April 30, 2013 (L), Cryptome; Censored, May 3, 2013 (R), Sukie Park


Cryptome project tracking the political geography of the Cold War as precursor to current national security frameworks:

L'Empire des Oiseaux: Schoolgirl Quarantines from Dalat to the Rue Alexandre de Rhodes

Greece: Irredenta in the Eurozone

Cryptome Tracks the NYPD Ring of Steel

Common Lines of Flight Towards the Open City, The SAGE Handbook of Architectural Theory, publication February 2012

New York VOIR DIRE: Interrogating the Juridical City State of Exception
Deborah Natsios / Cryptome, 20 December 2010

Initial version presented 17 April 2010, during panel: "Sovereign spaces: security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG) (3.4MB)

Watchlisting the Diaspora
Presented 3 October 2008: Centre de Cultura Contemporània de Barcelona (CCCB)
Targeted Publics: Arts and Technologies of the Security City

Expanded and to be published as:

The Geographer in Jules Romains' 'Donogoo Tonka or the Miracles of Science: A Cinematographic Tale'
Commentary and digital film presented at Forum Finale, Temple Hoyn Buell Center for the Study of American Architecture, Graduate School of Architecture, Planning and Preservation, Columbia University, 5 April 2008.

Towards a New Blast Zone
in Architectures of Fear: Terrorism and the Future of Urbanism in the West, Urbanitats, No. 19, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona 2008.

Paper presented 18 May 2007, at the symposium “Architectures of Fear: Terrorism and the Future of Urbanism in the West”, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona.

National Security Sprawl
In Sensing the 21st Century City: Close-Up and Remote
AD Architectural Design
Vol. 75 No. 6 Nov/Dec 2005
Brian McGrath and Grahame Shane (eds.)
Wiley-Academy (London)

Jerusalem Sky
In The Next Jerusalem : Sharing the Divided City, Ed. Michael Sorkin
2002 Monacelli Press, New York, NY

Parallel Atlas: 38°N
Version 10, May 2002

Reversing the Panopticon
Invited Talk, 16 August 2001
10th USENIX Security Symposium, Washington, DC.

Homeland Defense and the Prosecution of Jim Bell
8 June 2001