Source CRYPTOME
Unauthorized disclosures of secrets are essential for democracy.
In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:
Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates
Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm
Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger
First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf
Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell
UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act
Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla
Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi
John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey
Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell
US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917
UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/
UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml
National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947
I. F. Stone's Weekly (1953-67): http://www.ifstone.org/
Ralph Nader (1965): http://www.nader.org/
Noam Chomsky (1960s): http://www.chomsky.info/;
http://en.wikipedia.org/wiki/Noam_Chomsky
The Internet (1960s): http://en.wikipedia.org/wiki/Internet
National Archives: http://www.archives.gov/
David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)
MapQuest (1967): http://www.mapquest.com/
Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm
Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh
FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol
Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email
Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm
Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/
Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html
Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm
Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie
Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman
Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle
Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm
James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford
Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks
Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson
National Security Archive (1985): http://www.gwu.edu/~nsarchiv/
Article 19 (1987): http://www.article19.org/
Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/
Public Interest Research (1989): http://www.namebase.org/staffbl.html
Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)
Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)
Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk
Electronic Privacy Information Center (1994): http://www.epic.org/
Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about
AltaVista (1995): http://www.altavista.com/
The Internet Archive (1996): http://www.archive.org/ (Generous links to online libraries)
UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto
Terraserver USA (1998): http://www.terraserver-usa.com/
Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act
NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy
Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness
Daniel Bernstein: http://cr.yp.to/djb.html
Bruce Schneier: http://www.schneier.com/
Cryptography Research: http://www.cryptography.com/
Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)
Cryptography Org: http://www.cryptography.org/ (Generous links)
Scribd: http://www.scribd.com/
PGPBoard: http://www.pgpboard.com/
The Memory Hole: http://www.thememoryhole.org [Temporarily down]
ProPublica (June 2008): http://www.propublica.org/
Government Attic (longtime source of FOI to others): http://www.governmentattic.org/
Public Intelligence: http://publicintelligence.net/
Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)
History Anarchy Blog: http://historyanarchy.blogspot.com/
WikiSpooks: http://www.wikispooks.com/
Cryptocomb: http://cryptocomb.org/
29 June 2012
Compedium of the ever-growing leak sites: http://leakdirectory.org/index.php/Leak_Site_Directory
7 July 2012
Project PM: Tracking the Spy Industry: http://wiki.echelon2.org/wiki/Main_Page
Anonymous Analytics: http://anonanalytics.com/
Par:AnoIA - Potentially Alarming Research: Anonymous Intelligence Agency: http://www.par-anoia.net/
http://cryptome.org/0002/siss.htm#Wikileaks
Unauthorized disclosures of secrets are essential for democracy.
In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:
Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates
Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm
Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger
First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf
Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell
UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act
Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla
Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi
John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey
Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell
US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917
UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/
UK GCHQ: http://www.gchq.gov.uk/American Civil Liberties Union (1920): http://www.aclu.org/
UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml
Echelon: http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)Nicky Hager (1996): http://www.nickyhager.info/
Mike Frost: http://www.converge.org.nz/abc/frostspy.htm
Federation of American Scientists (1945): http://www.fas.org/Duncan Campbell: http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)
http://cryptome.org/jya/echelon-dc.htm
Secrecy News (FAS kid): http://www.fas.org/sgp/news/secrecy/
Global Security (FAS kid): http://www.globalsecurity.org/Les Temps modernes (1945: http://en.wikipedia.org/wiki/Les_Temps_modernes
National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947
Central Intelligence Agency (1947): http://www.cia.gov/Emergence of the Intelligence Establishment: http://history.state.gov/historicaldocuments/frus1945-50Intel
Central Intelligence: Origin and Evolution: http://cryptome.org/cia-origin.htm
Philip Agee (1975; CIA kid): http://en.wikipedia.org/wiki/Philip_Agee
Winslow Peck (1972; NSA kid): http://cryptome.org/jya/nsa-elint.htmCIA FOIA Documents: http://www.foia.cia.gov/National Security Agency (1952): http://www.nsa.gov/
Anonymous AU (1973): http://cryptome.org/jya/nsa-40k.htm
US Senate Church Report (1975): http://cryptome.org/nsa-4th.htm
NIST Information Technology Laboratory: http://www.nist.gov/itl/
US Navy The Onion Router: http://www.torproject.org/
NSA FOIA Documents: http://www.nsa.gov/public_info/declass/index.shtml
Simone de Beauvoir (1949, The Second Sex): http://en.wikipedia.org/wiki/The_Second_SexWayne Madsen Report: http://www.waynemadsenreport.com/
I. F. Stone's Weekly (1953-67): http://www.ifstone.org/
Ralph Nader (1965): http://www.nader.org/
Noam Chomsky (1960s): http://www.chomsky.info/;
http://en.wikipedia.org/wiki/Noam_Chomsky
The Internet (1960s): http://en.wikipedia.org/wiki/Internet
Usenet Newsgroups (1980s): http://en.wikipedia.org/wiki/News_groups
World Wide Web (1989): http://en.wikipedia.org/wiki/Tim_Berners-Lee
Classified Networks: SIPRNet, .smil, .intel, .nsa, .fbi, et alHacking (1960s): http://pcworld.about.com/news/Apr102001id45764.htm
2600: http://www.2600.com/
Chaos Computer Club (1985): http://www.ccc.de/
PHRACK: http://www.phrack.org/Freedom of Information Act (1966): http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)
National Archives: http://www.archives.gov/
Classified National Security Information: http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html
Presidential Libraries: http://www.archives.gov/presidential-libraries/
The Federal Register: http://www.archives.gov/federal-register/Library of Congress: http://www.loc.gov/
David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)
MapQuest (1967): http://www.mapquest.com/
Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm
Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh
FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol
Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email
Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm
Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/
Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html
Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm
Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie
Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman
Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle
Ronald Rivest: http://people.csail.mit.edu/rivest/
Adi Shamir: http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html
Len Adleman: http://www.usc.edu/dept/molecular-science/fm-adleman.htm
Progressive Magazine Publishes H-Bomb Design 1979: http://www.progressive.org/images/pdf/1179.pdfPhilip Zimmerman PGP: http://philzimmermann.com/EN/findpgp/GnuPG: http://www.gnupg.org/OpenSSL: http://www.openssl.org/
Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm
James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford
Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks
Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson
National Security Archive (1985): http://www.gwu.edu/~nsarchiv/
Article 19 (1987): http://www.article19.org/
Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/
Public Interest Research (1989): http://www.namebase.org/staffbl.html
Namebase: http://www.namebase.org/
Google Watch: http://www.google-watch.org/
Wikipedia-Watch: http://www.wikipedia-watch.org/Electronic Frontier Foundation (1990): http://www.eff.org/
Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)
Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)
Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk
Crypto Rebels: http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
John Gilmore: http://en.wikipedia.org/wiki/John_Gilmore_(activist)
Eric Hughes, A Cypherpunk's Manifesto: http://www.activism.net/cypherpunk/manifesto.html
Timothy C. May: http://en.wikipedia.org/wiki/Timothy_C._May
Timothy C. May Cyphernomicon: http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html
Matt Blaze Crypto: http://www.crypto.com/
Marc Briceno: http://blog.pgp.com/index.php/author/mbriceno/
David Wagner: http://www.cs.berkeley.edu/~daw/
Joel McNamara: http://www.eskimo.com/~joelm/ also:
Joel McNamara Tempest Page:Cryptography (Cypherpunks kid): http://www.mail-archive.com/cryptography@metzdowd.com/maillist.htmlhttp://www.eskimo.com/~joelm/tempest.html
http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf
James Dalton Bell (Cypherpunks Kid): Federal Correctional Institution Sheridan also:
Arrest: http://cryptome.org/jya/jimbell.htm
Trial: http://cryptome.org/jya/jdbfiles.htmCarl Edward Johnson (Bell kid): http://cryptome.org/jya/cejfiles.htmCypherpunks Archives 1992-1998 http://cryptome.org/cpunks/cpunks-92-98.zip (83MB)
Cryptome (originally jya.com 1996; Cypherpunks kid): http://www.cryptome.org/
Cartome (2001): http://www.cartome.org/
Interesting-People Mail List (1993): http://www.interesting-people.org/archives/interesting-people/Eyeball Series (2002): http://cryptome.org/eyeball/index.html
UK Secret Bases: http://www.secret-bases.co.uk/ Public Sources for Satellite and Aerial Photos and Maps: http://cryptome.org/gis-sources.htmWikileaks (2006; Cryptome "spiritual godkid"): http://www.wikileaks.org/
Julian Assange on Cypherpunks 1995-2005: http://cryptome.org/0001/assange-cpunks.htmJulian Assange Best of Security (1995): http://marc.info/?l=best-of-security&r=1&b=199507&w=2http://www.cultural.com/web/security/mailing.lists/bos.html
Electronic Privacy Information Center (1994): http://www.epic.org/
Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about
AltaVista (1995): http://www.altavista.com/
The Internet Archive (1996): http://www.archive.org/ (Generous links to online libraries)
UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto
Ben Laurie (Wikileaks Advisor): http://www.apache-ssl.org/ben.html
Ross Anderson: http://www.cl.cam.ac.uk/~rja14/GSM Crypto Cracks (1997-2010): http://cryptome.org/0001/gsm-a5-files.htm
Marcus Kuhn: http://www.cl.cam.ac.uk/~mgk25/Adam Back Cypherspace: http://www.cypherspace.org/adam/
Terraserver USA (1998): http://www.terraserver-usa.com/
Bing Maps (2009): http://www.bing.com/mapsGoogle (1998): http://www.google.com/
Google Earth: http://earth.google.com/Wikipedia (2001): http://www.wikipedia.org/
Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act
NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy
Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness
Daniel Bernstein: http://cr.yp.to/djb.html
Bruce Schneier: http://www.schneier.com/
Cryptography Research: http://www.cryptography.com/
Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)
Cryptography Org: http://www.cryptography.org/ (Generous links)
Scribd: http://www.scribd.com/
PGPBoard: http://www.pgpboard.com/
The Memory Hole: http://www.thememoryhole.org [Temporarily down]
ProPublica (June 2008): http://www.propublica.org/
Government Attic (longtime source of FOI to others): http://www.governmentattic.org/
Public Intelligence: http://publicintelligence.net/
Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)
History Anarchy Blog: http://historyanarchy.blogspot.com/
WikiSpooks: http://www.wikispooks.com/
Cryptocomb: http://cryptocomb.org/
29 June 2012
Compedium of the ever-growing leak sites: http://leakdirectory.org/index.php/Leak_Site_Directory
7 July 2012
Project PM: Tracking the Spy Industry: http://wiki.echelon2.org/wiki/Main_Page
Anonymous Analytics: http://anonanalytics.com/
Par:AnoIA - Potentially Alarming Research: Anonymous Intelligence Agency: http://www.par-anoia.net/
http://cryptome.org/0002/siss.htm#Wikileaks