 |
Donate for the Cryptome
Archive of over 82,100 files from June 1996 to 11
November 2014 on 1 USB (25.1GB). Cryptome
public key. (Local search temporarily disabled,
use
Google)
Bitcoin: 1P11b3Xkgagzex3fYusVcJ3ZTVsNwwnrBZ
SiteLock removed after reader
noted it spies
on visitors. A reminder that all site security programs spy on visitors and
the host as does any "security" service, from personal to national and beyond.
|
|
|
2014-1676.pdf NSA Need for Continuity in Cryptanalytic Studies December 5, 2014
2014-1675.pdf NSA Intercept Fabrication December 5, 2014
2014-1674.pdf China's Cybersecurity Strategy via December 5, 2014 (4.3MB)
2014-1673.pdf Do Not Trust Me: Using Malicious IdPs on SSO December 5, 2014
2014-1672.pdf CIA and Journalist Siobhan Gorman Emails via December 4, 2014 (18.2MB)
2014-1671.pdf CIA and Journalist Ken Dilanian Emails via December 4, 2014 (15.1MB)
2014-1670.pdf CIA and Journalists Apuzzo-Goldman Emails via December 4, 2014 (14.4MB)
2014-1669.pdf CIA and Journalist Scott Shane Emails via December 4, 2014 (7.0MB)
2014-1668.pdf CIA and Journalist David Ignatius Emails via December 4, 2014
2014-1667.pdf CIA and Journalist Brian Bennett Email via December 4, 2014
2014-1666.pdf Snowden Commons via December 4, 2014
2014-1665.pdf NSA OPULANT PUP A5/3 Crypt Attack via December 4, 2014
2014-1664.pdf NSA AURORA GOLD et al (63 pages, via) December 4, 2014 (26.8MB)
2014-1663.htm NSA Snowden Releases Tally Update - *2,564 Pages December 3, 2014
2014-1662.pdf War Machine Ramping Up: Media to Pacify Nation December 3, 2014
2014-1661.htm 0-Day NetFlow Analyzer and IT360 December 3, 2014
2014-1660.htm Response to GCHQ GERONTIC NIGELLA Bases Eyed December 3, 2014
2014-1659.htm update What Is Good Encryption Software? December 2, 2014
2014-1658.htm GCHQ GERONTIC NIGELLA Bases Eyed December 2, 2014
2014-1657.pdf FBI File on RU Cavity Microphone (via) December 2, 2014 (3.0MB)
2014-1656.pdf Protecting Computer Screens from Cameras December 2, 2014
2014-1655.pdf Password Cracking and Countermeasures Survey December 1, 2014
2014-1654.pdf Martin Peck Affidavit Supporting Diane Roark December 1, 2014
2014-1653.pdf Diane Roark Cross-Motion Part Summary Judgment Novmeber 30, 2014 (3.5MB)
2014-1652.htm NSA Civil Liberties and Privacy Resources November 30, 2014
2014-1651.pdf FTC Confidentiality Laws US and AU November 30, 2014
2014-1650.pdf DHS Privacy Policy November 30, 2014
2014-1649.pdf Fair Information Practice Principles November 30, 2014
2014-1648.htm Qom Uranium Enrichment and Site R Bunkers November 29, 2014
2014-1647.pdf Single Sign-On BrowserID HTML5 Vulnerabilities November 29, 2014
2014-1646.pdf Cyber Vul Implant: Heartbleed Bug as Cyber Op November 28, 2014
2014-1645.pdf NSA Befriends Kids November 28, 2014
2014-1644.htm update What Is Good Encryption Software? November 28, 2014
2014-1643.pdf DoD Civil Liberties Program November 27, 2014
2014-1642.pdf The Bitcoin Miner's Dilemma November 27, 2014
2014-1641.pdf ok Alleged Mossad Agents via OpIsrael November 27, 2014
2014-1640.pdf Intelligence Science Board on Civil Liberties November 26, 2014
2014-1639.pdf Intelligence Science Board on Interrogation November 26, 2014
2014-1638.pdf Intelligence Science Board on Achieving Change November 26, 2014
2014-1637.pdf Masterspy Denies FOIA Snowden Cohorts Docs November 26, 2014
2014-1636.pdf Hammad Akbar Indictment StealthGenie App (ref) November 26, 2014
2014-1635.pdf Hammad Akbar Plea Agreement StealthGenie App November 26, 2014
2014-1634.pdf Hammad Akbar Statement of Facts StealthGenie November 26, 2014
2014-1633.pdf NSA Technology Transfer Program 2014 November 26, 2014 (3.9MB)
2014-1632.pdf Facebook Calls Its Users Insane November 26, 2014
2014-1631.pdf Barrett Brown Sentencing Reset to 16 Dec 2014 November 26, 2014
2014-1630.pdf CRS The Evolving Congress November 25, 2014
2014-1629.zip ok now Vodafone GCHQ Gerontic Cables and Slides (ref) November 25, 2014
2014-1628.htm NSA Snowden Releases Tally Update - *2,564 Pages November 25, 2014
2014-1627.pdf Warp2 Email Encrypted Addressing and Headers November 25, 2014
2014-1626.pdf NSA on Privacy and Civil Liberties Spying November 24, 2014
2014-1625.pdf FBI Use of Exigent Letters for Telephone Records November 24, 2014 (4.3MB)
2014-1624.htm update Do Snowden Files Have NSA Implants? Part 2 November 24, 2014
2014-1623.htm update Do Snowden Files Have NSA Implants? Part 1 November 24, 2014
2014-1622.pdf Rand Paul Declaration of War on ISIS Resolution November 23, 2014
2014-1621.htm NL Seeks Bulk Intercept for AIVD and MIVD 2 November 23, 2014
2014-1620.pdf FTC Settlement Agreement for TRUSTe Violations November 22, 2014
2014-1619.pdf House Intel Report on Benghazi Attack November 21, 2014 (3.9MB)
2014-1618.htm Google break-up plan emerges from Brussels November 21, 2014
2014-1617.htm NL Seeks Bulk Intercept for AIVD and MIVD November 21, 2014
2014-1616.htm repost US Secret Service Visits Cryptome (Guccifer) November 21, 2014
2014-1615.htm repost Guccifer on Cryptome November 21, 2014
2014-1614.zip NSA Releases 4 Speeches by DIRNSA November 21, 2014
2014-1613.pdf Masterspy Releases Updated 2015 Spy Budget November 21, 2014
2014-1612.pdf Why Documents Matter November 21, 2014 (7.5MB)
2014-1611.htm repost Michael Hayden on NSA Before-After 9/11 - 2006 November 21, 2014
2014-1610.htm repost Michael Hayden on Defense of the Nation - 2006 November 21, 2014
2014-1608.htm repost National Security Surveillance Act of 2006 November 21, 2014
2014-1607.htm repost House Report on NSA Domestic Spying 3 - 2006 November 21, 2014
2014-1606.htm repost House Report on NSA Domestic Spying 2 - 2006 November 21, 2014
2014-1605.htm repost House Report on NSA Domestic Spying 1
2014-1609.htm repost NSA on Surveillance Restricti- 2006 November 21, 2014
2014-1604.htm Snowden Documents Disclosure Inquiry November 20, 2014
2014-1603.pdf CIA 2000 Interview of NSA Hayden Declass 9/10/14 November 20, 2014
2014-1602.pdf Reforming Inmate Calling Services November 20, 2014
2014-1601.pdf Greenwald Blames the Hostage November 20, 2014
2014-1600.htm Mobile Phone Forensics Company Hacked November 20, 2014
2014-1599.pdf Obama Spying Speech November 19, 2014
2014-1598.pdf US Postal Service Testifies on Mail Covers November 19, 2014
2014-1597.htm NL Secret Documents Leaked by Police November 19, 2014
2014-1596.pdf FISC 105B(g)-07-01 US Response to Nov 5 Order November 19, 2014
2014-1595.pdf On a new fast public key cryptosystem November 19, 2014
2014-1594.pdf FISC Court of Review Yahoo Hearing 19 June 2008 November 18, 2014 (5.0MB)
2014-1593.pdf @ War - Rise of the Military-Internet Complex November 18, 2014 (2.4MB)
2014-1592.htm Australian Spy Story November 18, 2014
2014-1591.htm Publish All Snowden Papers? (ref) November 17, 2014
2014-1590.htm offsite Call for publication of all Snowden papers (DE) November 16, 2014
2014-1589.pdf INSA Operational Cyber Spying November 16, 2014
2014-1588.pdf INSA Strategic Cyber Spying Novmeber 16, 2014
2014-1587.pdf INSA Critical Issues for Cyber Assurance November 16, 2014
2014-1586.pdf INSA Expectations of Spying in Info Age November 16, 2014
2014-1585.pdf INSA Spying IT Enterprise CIOs November 16, 2014
2014-1584.pdf INSA Spying IT Enterprise Industry November 16, 2014
2014-1583.pdf Tor Traffic Analysis Attacks and Defenses November 15, 2014 (4.1MB)
2014-1582.pdf Traffic Analysis Against Tor Using Flow Records November 15, 2014 (1.2MB)
2014-1581.htm update Laura Poitras Interview by NRC Handelsblad November 14, 2014
2014-1580.pdf Douglas Williams Indictment for Anti-Polygraph November 14, 2014
2014-1579.pdf Automobile Privacy Principles November 14, 2014
2014-1578.htm Deterrence in the Cyber Age November 13, 2014
2014-1577.pdf CSIS Global Forecast 2015 Crisis-Opportunity November 13, 2014 (8.4MB)
2014-1576.pdf NYPD Secret Role in Baruch College Protest November 13, 2014
2014-1575.pdf Army Trials October 2014 November 13, 2014
2014-1574.htm Rice Bodice Eyeball November 13, 2014
2014-1573.pdf Et tu Poitras? November 13, 2014
2014-1572.pdf P2P Trust Survey November 13, 2014
2014-1571.pdf How to covertly leak data from iOS? November 13, 2014
2014-1570.htm Laura Poitras Interview by NRC Handelsblad November 12, 2014
2014-1569.pdf Army Medical Research on Humans Guidelines November 12, 2014
2014-1568.pdf NSA Kryptographik Lehrbuch Geheimschreibekunst November 12, 2014 (1.3MB)
2014-1567.htm Review: Another Snowden Spy Story November 11, 2014
2014-1566.htm Hardened No. 7 Subway Line Extension in NYC November 11, 2014
2014-1565.pdf Identifying User Behavior Cloud-based Apps November 11, 2014
2014-1564.htm Postal Service Hacked November 10, 2014
2014-1563.htm Lawrence Baldwin Darknet Spy November 10, 2014
2014-1562.pdf Armadeus - The Bigger Picture November 10, 2014 (10MB)
2014-1561.pdf Batch Number-Field System by Dan Bernstein-Tanja November 10, 2014
2014-1560.zip Sabu-Hammond Chat Logs via Dell Cameron November 9, 2014 (4.2MB)
2014-1559.pdf UK Major Incident Procedure Manual November 8, 2014 (1.5MB)
2014-1558.pdf Darknet Sweep Casts Doubt on Tor November 8, 2014
2014-1557.pdf DoD Access to Classified Cryptographic Info November 8, 2014
2014-1556.pdf DNI Releases FISC BR 14-125 Primary Order November 7, 2014 (1.4MB)
2014-1555.pdf Court Orders Unlock of Cellphone November 7, 2014
2014-1554.pdf Wireless Crypto Safe Firearms November 7, 2014 (1.5MB)
2014-1553.pdf Postal Drug Search and Seizure November 7, 2014
2014-1552.pdf Facebook Prostitution Search and Seizure November 7, 2014
2014-1551.pdf Blake Benthall Silk Road 2.0 Initial Filings November 7, 2014
2014-1550.pdf ok DoJ IG Reports on FBI National Security Letters November 7, 2014 (4.1MB)
2014-1549.pdf DoD Cybersecurity Policies and Issuances Chart November 7, 2014
2014-1548.pdf Report on UK Lawyers Spied by UK Spies November 6, 2014 (3.0MB)
2014-1547.htm SiteLock Removed from Cryptome After One Day November 6, 2014
2014-1546.pdf Storms in Mobile Networks November 6, 2014
2014-1545.pdf DoS Attack: Fair Computations Bitcoin Deposits November 6, 2014
2014-1544.pdf German 46 Elementary IT Threats Catalog November 5, 2014
2014-1543.pdf FISC 105b(g) Yahoo Scheduling Order November 5, 2014
2014-1542.pdf FISC 105b(g) Yahoo Lift Stay Scheduling Order November 5, 2014
2014-1541.pdf WSJ on German Demand for US Source Code November 5, 2014 (1.7MB)
2014-1540.pdf DoD Serious Security Incidents Classified Info November 5, 2014
2014-1539.pdf Dod Under Secretary of Defense for Intelligence November 5, 2014
2014-1538.pdf DoD Deviations from Physical Security Program November 5, 2014
2014-1537.pdf DoD Privacy Program November 5, 2014
2014-1536.pdf Bear Attack on New Jersey Hiker Investigation November 5, 2014 (2.4MB)
2014-1535.pdf update How Secure is TextSecure? November 5, 2014 (1.0MB)
2014-1534.htm Tanzania may not get a good deal for gas November 5, 2014
2014-1533.pdf Wind River Security-Cryptography Libraries November 4, 2014
2014-1532.pdf Prez Sets Critical Infrastructure Security Month November 4, 2014
2014-1531.pdf FISC Misc 13-08 Supp Authority NSA Bulk Collect November 4, 2014 (11.5MB)
2014-1530.pdf GCHQ Head Warns of Terrorist Use of Internet November 4, 2014
2014-1529.pdf How to Spy Facebook User Who Hides Identity November 4, 2014 (1.5MB)
2014-1528.pdf Tech-Finance Impacts for Infosec Countermeasures November 4, 2014
2014-1527.pdf Navy Electronic Chart Display and Info System November 4, 2014
2014-1526.pdf Glenn Greenwald on First Look and NSA Reporting November 3, 2014
2014-1525.htm FBI Warns Military of ISIS Homeland SM Threat November 3, 2014
2014-1524.htm repost Crypto War 1: International Crypto Freedom November 3, 2014
2014-1523.htm Crypto War Redux November 3, 2014
2014-1522.htm update Microsoft OneDrive in NSA PRISM November 3, 2014
2014-1521.zip Jamaica Tivoli Gardens Massacre FOIA File 354pp November 3, 2014 (108MB)
2014-1520.pdf Canada CSE-CSIS Spy Budget 2012-2013 November 3, 2014
2014-1519.htm Fondation Louis Vuitton Museum by Frank Gehry November 2, 2014
2014-1518.htm First Look Members November 2, 2014
2014-1517.pdf DHS HSSTAC Sci-Tech Advisory Meeting Minutes November 2, 2014 (1.5MB)
2014-1516.pdf How Secure is TextSecure? November 2, 2014 (1.0MB)
2014-1515.htm Microsoft OneDrive in NSA PRISM November 1, 2014
2013-1103.vid Meet Me At Your Riser - Cryptome Video August 31, 2013
[More]
O f f s i t e
2014-00791 Monica C. Adler Is CIA NOC Caren L. Krystopolski December 5, 2014
2014-00790 NetNoSec 4: Julian Assange on Online Spying December 5, 2014
2014-00789 NetNoSec 3: New Governance Model for Comsec December 5, 2014
2014-00788 NetNoSec 2: Reinventing the Internet December 5, 2014
2014-00787 NetNoSec 1: Hacked vs. Hackers December 5, 2014
2014-00786 Details about the NSA INCENSER program November 30, 2014
2014-00785 NL Gov on ECJs 04/14 Rule EU Data Retention November 26, 2014
2014-00784 Aborted Origins Of First Bin Laden Hunt November 26, 2014
2014-00783 BND Employees on NSA-BND Cooperation Part 1 November 24, 2014
2014-00782 NRO Town Hall Material November 23, 2014
2014-00781 Cryptographic Backdooring (Cryptome Mirror) November 22, 2014
2014-00780 Sean Michael Wiswesser, CIA CoS, Vilnius, LT November 21, 2014
2014-00779 British Typex Cipher Machine November 20, 2014
2014-00778 CIA Agent - Aleksejs Holostovs November 19, 2014
2014-00777 CIA Officer - Terrence Clare Stevens November 19, 2014
2014-00776 German SIGINT-Military Code Words-Abbreviations November 18, 2014
2014-00775 CIA Officer James Hine November 16, 2014
2014-00774 Internet Architecture Board: Encrypt by Default November 14, 2014
2014-00773 Internet Mail, Privacy Fail November 13, 2014
2014-00772 What Americans Think About Privacy November 13, 2014
2014-00771 Cryptome trademark Official Gazette notice November 11, 2014
2014-00770 Telephone of the Dutch Prime Minister November 10, 2014
2014-00769 Hacktivist Community Recommendations Reddit November 7, 2014
2014-00768 DIRNSA on Polygraphy Screening of Insiders November 5, 2014
2014-00767 China Folk Counterspy Manual (need CN-EN trans) November 4, 2014
2014-00766 Decoding Prime Minister Chamberlain 1930s November 3, 2014
2014-00765 DoD Counterspy Advice to Industry November 2, 2014
2014-00764 Former CIA DDO Clair George November 2, 2014
2014-00763 Linking the new ACLU docs on EO12333 to ICREACH November 2, 2014
2014-00762 Lawful Interception-Spy Support Systems November 1, 2014
|