22 June 2016. Add The Memory Hole 2.
13 October 2014. Thanks to A, update link to PC World archived article on
hacking history.
12 October 2014. Updated.
18 December 2010. Updated.
4 September 2010. In progress.
Sensitive Information Security Sources and Breaches
In response to Wikileaks background inquiries Cryptome
offers that there are hundreds of online and offline sources of sensitive
information security breaches which preceded Wikileaks beginning about 120
years ago. This outline traces the conflict between technological capabilities
for sensitive information breaches and control by law enforcement when technical
countermeasures are insufficient -- a few examples among many others worldwide:
Socrates (c.400BC, Socratic Method):
http://en.wikipedia.org/wiki/Socrates
Electromagnetic Spying Timeline (Mid-late 1800's):
http://cryptome.org/tempest-time.htm
Peter Zenger Press Freedom Trial (1735):
http://en.wikipedia.org/wiki/John_Peter_Zenger
First Amendment of the US Constitution (1791):
http://www.usconstitution.net/const.pdf
Elijah Lovejoy (1830s):
http://www.colby.edu/lovejoyaward/past-recipients/2014-lovejoy-award-recipient-james-risen/james-risen-address/
Alexander Graham Bell (1876):
http://en.wikipedia.org/wiki/Alexander_Graham_Bell
UK Official Secrets Act (1889):
http://en.wikipedia.org/wiki/Official_Secrets_Act
Nikola Tesla (1894):
http://en.wikipedia.org/wiki/Nikola_Tesla
Guglielmo Marconi (1897):
http://en.wikipedia.org/wiki/Guglielmo_Marconi
John Dewey (1903):
http://en.wikipedia.org/wiki/John_Dewey
Ida Tarbell (1904 The History of the Standard Oil Company):
http://en.wikipedia.org/wiki/Ida_M._Tarbell
US Espionage Act of 1917:
http://en.wikipedia.org/wiki/Espionage_Act_of_1917
UK Communications-Electronics Security Group (1919):
http://www.cesg.gov.uk/
UK GCHQ: http://www.gchq.gov.uk/
American Civil Liberties Union (1920):
http://www.aclu.org
UKUSA Agreement (1940):
http://www.nsa.gov/public_info/declass/ukusa.shtml
Echelon:
http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)
Nicky Hager (1996):
http://www.nickyhager.info/
Mike Frost:
http://www.converge.org.nz/abc/frostspy.htm
Duncan Campbell:
http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)
http://cryptome.org/jya/echelon-dc.htm
Federation of American Scientists (1945):
http://www.fas.org
Secrecy News (FAS kid):
http://www.fas.org/sgp/news/secrecy/
Global Security (FAS kid):
http://www.globalsecurity.org
Les Temps modernes (1945:
http://en.wikipedia.org/wiki/Les_Temps_modernes
National Security Act of 1947:
http://en.wikipedia.org/wiki/National_Security_Act_of_1947
Central Intelligence Agency (1947):
http://www.cia.gov
Emergence of the Intelligence Establishment:
http://history.state.gov/historicaldocuments/frus1945-50Intel
Central Intelligence: Origin and Evolution:
http://cryptome.org/cia-origin.htm
Philip Agee (1975; CIA kid):
http://en.wikipedia.org/wiki/Philip_Agee
CIA FOIA Documents:
http://www.foia.cia.gov/
National Security Agency (1952):
http://www.nsa.gov
Winslow Peck (1972; NSA kid):
http://cryptome.org/jya/nsa-elint.htm
Anonymous AU (1973):
http://cryptome.org/jya/nsa-40k.htm
US Senate Church Report (1975):
http://cryptome.org/nsa-4th.htm
NIST Information Technology
Laboratory: http://www.nist.gov/itl/
US Navy The Onion Router:
http://www.torproject.org/
NSA FOIA Documents:
http://www.nsa.gov/public_info/declass/index.shtml
Wayne Madsen Report:
http://www.waynemadsenreport.com
Simone de Beauvoir (1949, The Second Sex):
http://en.wikipedia.org/wiki/The_Second_Sex
I. F. Stone's Weekly (1953-67):
http://www.ifstone.org/
Ralph Nader (1965): http://www.nader.org/
Noam Chomsky (1960s):
http://www.chomsky.info/;
http://en.wikipedia.org/wiki/Noam_Chomsky
The Internet (1960s):
http://en.wikipedia.org/wiki/Internet
Usenet Newsgroups (1980s):
http://en.wikipedia.org/wiki/News_groups
World Wide Web (1989):
http://en.wikipedia.org/wiki/Tim_Berners-Lee
Classified Networks:
SIPRNet, .smil, .intel,
.nsa, .fbi, et al
Hacking (1960s):
https://web.archive.org/web/20060227110037/http://pcworld.about.com/news/Apr102001id45764.htm
Cryptome mirror:
http://cryptome.org/0002/pcworld-hacking-history.pdf
2600: http://www.2600.com
Chaos Computer Club (1985):
http://www.ccc.de/
PHRACK: http://www.phrack.org/
Freedom of Information Act (1966):
http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)
National Archives:
http://www.archives.gov
Classified National Security Information:
http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html
Presidential Libraries:
http://www.archives.gov/presidential-libraries/
The Federal Register:
http://www.archives.gov/federal-register/
Library of Congress: http://www.loc.gov
David Kahn (1967):
http://en.wikipedia.org/wiki/David_Kahn_(writer)
MapQuest (1967):
http://www.mapquest.com
Urban Deadline (Cryptome precursor, 1968):
http://cryptome.org/0001/cryptome-ud.htm
Seymour Hersh (1969):
http://en.wikipedia.org/wiki/Seymour_Hersh
FTP (ARPANET, 1971):
http://en.wikipedia.org/wiki/File_Transfer_Protocol
Email (ARPANET, 1973):
http://en.wikipedia.org/wiki/Email
Electronic Surveillance 1972-1995:
http://cryptome.org/esnoop.htm
Bob Woodward and Carl Bernstein (1974):
http://www.hrc.utexas.edu/exhibitions/web/woodstein/
Privacy Act (1974):
http://www.gpoaccess.gov/privacyact/index.html
Personal Computer Invention (1976):
http://www.ideafinder.com/history/inventions/compersonal.htm
Whitfield Diffie (1977):
http://en.wikipedia.org/wiki/Whitfield_Diffie
Martin Hellman (1977):
http://en.wikipedia.org/wiki/Martin_Hellman
Ralph Merkle (1977):
http://en.wikipedia.org/wiki/Ralph_Merkle
Ronald Rivest:
http://people.csail.mit.edu/rivest/
Adi Shamir:
http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html
Len Adleman:
http://www.usc.edu/dept/molecular-science/fm-adleman.htm
Philip Zimmerman PGP:
http://philzimmermann.com/EN/findpgp/
GnuPG: http://www.gnupg.org/
OpenSSL: http://www.openssl.org/
Progressive Magazine Publishes H-Bomb Design 1979:
http://www.progressive.org/images/pdf/1179.pdf
Disk Operating System (1980):
http://www.ideafinder.com/history/inventions/compersonal.htm
James Bamford (1983):
http://en.wikipedia.org/wiki/James_Bamford
Forum on Risks to the Public in Computers and Related Systems (1985):
http://catless.ncl.ac.uk/Risks
Jeffrey T. Richelson (1985):
http://en.wikipedia.org/wiki/Jeffrey_T._Richelson
National Security Archive (1985):
http://www.gwu.edu/~nsarchiv/
Article 19 (1987):
http://www.article19.org/
Transactional Records Access Clearinghouse (1989):
http://trac.syr.edu/
Public Interest Research (1989):
http://www.namebase.org/staffbl.html
Namebase: http://www.namebase.org/
Google Watch:
http://www.google-watch.org
Wikipedia-Watch:
http://www.wikipedia-watch.org
Electronic Frontier Foundation (1990):
http://www.eff.org
Gopher (1991):
http://en.wikipedia.org/wiki/Gopher_(protocol)
Lynx (1992):
http://en.wikipedia.org/wiki/Lynx_(web_browser)
Cypherpunks Mail List (1992):
http://en.wikipedia.org/wiki/Cypherpunk
Crypto Rebels:
http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
John Gilmore:
http://en.wikipedia.org/wiki/John_Gilmore_(activist)
Eric Hughes, A Cypherpunk's Manifesto:
http://www.activism.net/cypherpunk/manifesto.html
Timothy C. May:
http://en.wikipedia.org/wiki/Timothy_C._May
Timothy C. May Cyphernomicon:
http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html
Matt Blaze Crypto:
http://www.crypto.com/
Marc Briceno:
http://blog.pgp.com/index.php/author/mbriceno/
David Wagner:
http://www.cs.berkeley.edu/~daw/
Joel McNamara:
http://www.eskimo.com/~joelm/
also:
Joel McNamara Tempest Page:
http://www.eskimo.com/~joelm/tempest.html
Cryptography (Cypherpunks kid):
http://www.mail-archive.com/cryptography@metzdowd.com/maillist.html
James Dalton Bell (Cypherpunks Kid):
Federal
Correctional Institution Sheridan also:
Arrest:
http://cryptome.org/jya/jimbell.htm
Trial:
http://cryptome.org/jya/jdbfiles.htm
Carl Edward Johnson (Bell kid):
http://cryptome.org/jya/cejfiles.htm
Cypherpunks Archives 1992-1998
http://cryptome.org/cpunks/cpunks-92-98.zip
(83MB)
Cryptome (originally jya.com 1996; Cypherpunks kid):
http://www.cryptome.org
Cartome (2001): http://www.cartome.org
Eyeball Series (2002):
http://cryptome.org/eyeball/index.html
UK Secret Bases:
http://www.secret-bases.co.uk/
Public Sources for Satellite and Aerial Photos and Maps:
http://cryptome.org/gis-sources.htm
Wikileaks (2006; Cryptome "spiritual godkid"):
http://www.wikileaks.org
Julian Assange on Cypherpunks 1995-2005:
http://cryptome.org/0001/assange-cpunks.htm
Julian Assange Best of Security (1995):
http://marc.info/?l=best-of-security&r=1&b=199507&w=2
http://www.cultural.com/web/security/mailing.lists/bos.html
Interesting-People Mail List (1993):
http://www.interesting-people.org/archives/interesting-people/
Electronic Privacy Information Center (1994):
http://www.epic.org
Quintessenz (1994):
http://www.quintessenz.at/cgi-bin/index?funktion=about
AltaVista (1995):
http://www.altavista.com
The Internet Archive (1996):
http://www.archive.org (Generous links
to online libraries)
UK Crypto Mail List (1996):
http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto
Ben Laurie (Wikileaks Advisor):
http://www.apache-ssl.org/ben.html
Ross Anderson:
http://www.cl.cam.ac.uk/~rja14/
Marcus Kuhn:
http://www.cl.cam.ac.uk/~mgk25/
Adam Back Cypherspace:
http://www.cypherspace.org/adam/
GSM Crypto Cracks (1997-2010):
http://cryptome.org/0001/gsm-a5-files.htm
Terraserver USA (1998):
http://www.terraserver-usa.com
Bing Maps (2009):
http://www.bing.com/maps
Google (1998): http://www.google.com
Google Earth: http://earth.google.com/
Wikipedia (2001):
http://www.wikipedia.org
Advanced Encryption Standard (2001):
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
USA PATRIOT Act (2001):
http://en.wikipedia.org/wiki/Patriot_act
NSA warrant-less surveillance (2001):
http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy
Total Information Awareness (2002):
http://en.wikipedia.org/wiki/Total_information_awareness
Daniel Bernstein:
http://cr.yp.to/djb.html
Bruce Schneier:
http://www.schneier.com/
Cryptography Research:
http://www.cryptography.com/
Ciphers by Ritter:
http://www.ciphersbyritter.com/
(Generous links)
Cryptography Org:
http://www.cryptography.org/ (Generous
links)
Scribd: http://www.scribd.com
PGPBoard: http://www.pgpboard.com/
The Memory Hole: http://www.thememoryhole.org [Temporarily down]
The Memory Hole 2 returns:
https://thememoryhole2.org
Government Attic (2007; longtime source of FOI to others):
http://www.governmentattic.org/
ProPublica (June 2008):
http://www.propublica.org/
Public Intelligence:
http://publicintelligence.net/
Public Intelligence Blog:
http://www.phibetaiota.net/ (Handy
list of comsec and spy sites)
History Anarchy Blog:
http://historyanarchy.blogspot.com/
WikiSpooks: http://www.wikispooks.com
Cryptocomb: http://cryptocomb.org
Leaksource: http://leaksource.info/
The Intercept:
https://firstlook.org/theintercept/
The Memory Hole 2:
https://thememoryhole2.org
|