Cryptome
Web address | No URL found. Please specify a URL here or add one to Wikidata. |
---|---|
Type of site
|
Document archive and disclosure |
Registration | None |
Available in | English, but some documents are written in other languages |
Owners | John Young, Deborah Natsios |
Editors | John Young, Deborah Natsios |
Launched | June 1996 |
Current status | Active |
Cryptome is a 501(c)(3) private foundation[1] created in 1996 by John Young and Deborah Natsios and sponsored by Natsios-Young Architects.[2][3][4][5][6][7] The site collects information about freedom of expression, privacy, cryptography, dual-use technologies, national security, intelligence, government secrecy.[5]
Cryptome is known for publishing the alleged identity of the CIA analyst who located Osama Bin Laden,[8][9] lists of people allegedly associated with the Stasi,[10] and the PSIA.[11] Cryptome is also known for publishing the alleged identity of Irish Republican Army assassin Stakeknife[12] and the disputed internal emails of the Wikileaks organization.[13] Cryptome republished the public surveillance disclosures of Edward Snowden and announced in June 2014 that they would publish all unreleased Snowden documents later that month[14]
Cryptome has received praise from notable organizations such as the EFF, but has also been the subject of criticism and controversy. Cryptome was accused of forging emails by WikiLeaks[15] and has been called an "invitation to terrorists"[16] and criticized for posting maps and pictures of "dangerous Achilles' heel[s] in the domestic infrastructure," which the New York Times called a "tip off [to] terrorists."[17] Cryptome continues to post controversial materials including guides on "how to attack critical infrastructure" in addition to other instructions for illegal hacking "for those without the patience to wait for whistleblowers".[18][19] Cryptome has also received criticism for its handling of private and embarrassing information.[7][20]
Contents
People
Cryptome was created by John Young and Deborah Natsios, both highly successful architects.[21][22] Over the four decades of their architectural practice, they have handled multibillion-dollar projects ranging from urban design to forensic services.[23] They have worked as architects, contractors or independent consultants for people and organizations including the Council on Foreign Relations, the Metropolitan Transportation Authority of New York, Columbia University, W Hotels, Reuters, Opus Dei, the Rockefellers, the Mafia, Five Percenters, the Church of Scientology, the Black Panther Party.[24][25][26][27] As a result of their architectural work, they have been invited to speak at prestigious functions like FedCyber, an annual cybersecurity event on critical enterprise and federal government challenges.[23][28]
John Young
John Young was born in 1935. He grew up in West Texas, and served in the United States Army Corps of Engineers in Germany (1953–56) and earned degrees in philosophy and architecture from Rice University (1957–63). He went on to receive his graduate degree in architecture from Columbia University in 1969. A self-identified radical, he became an activist and helped create community service group Urban Deadline, where his fellow student-activists initially suspected him of being a police spy.[29] Urban Deadline went on to receive citations from the Citizens Union of the City of New York and the New York City Council, and which later evolved into Cryptome. His work earned him a position on the nominating committee for the Chrysler Award for Innovation in Design in 1998.[24][30][31]
He has received citations from the American Society of Mechanical Engineers, the American Society of Civil Engineers and the Legal Aid Society. In 1993, he was awarded the Certificate of Special Congressional Recognition.[30][32][33] He has stated he doesn't "acknowledge the power of the law."[34]
Deborah Natsios
Deborah Natsios received her graduate degree in architecture from Princeton University. She has taught architecture and urban design at Columbia University and Parsons The New School for Design, and held seminars at the Pratt Institute and the University of Texas.[35][36] She is the principal of Natsios Young Architects.[37]
In addition to being co-editor for Cryptome, she is responsible for the associated project Cartome, which was founded in in 2011[38] and posts her original critical art and graphical images and other public resources to document sensitive areas. She additionally holds a degree in mathematics from Smith College. She has given talks at the USENIX Annual Technical Conference[39] and Architectures of Fear: Terrorism and the Future of Urbanism in the West,[38] and written on topics ranging from architectural theory[35] to defenses of Jim Bell and assassination politics.[40]
Family
Deborah Natsios is the daughter of Nicholas Natsios, who served as CIA station chief in Greece from 1948-1956, in Vietnam from 1956-1960, in France from 1960-1962, in South Korea from 1962-1965, in Argentina from 1965-1969, in the Netherlands from 1969-1972, and in Iran from 1972-1974.[21][41][42][43] While stationed in Vietnam, his deputy was William Colby, the future Director of Central Intelligence.[44] His name was included in the 1996 membership directory of the Association of Former Intelligence Officers, which Cryptome helped to publish.[45] Cryptome acknowledged its link to Nicholas Natsios in 2000.[21]
Her cousin is Andrew Natsios.[21] He has served as Administrator of the U.S. Agency for International Development (USAID), U.S. Special Envoy to Sudan, and Vice President of World Vision. Currently, Natsios teaches as Executive Professor at The Bush School of Government and Public Service.[21]
Activities
Digital library
On November 2, 2015, Cryptome stated that their archive contains 99,335 files totaling 42 gigabytes. The USB drive archive includes 112 INSCOM dossiers, and 14,000 files taken from ProEnergy Services.[46] On October 21, 2015, the website announced that about 350,000 Wikileaks documents totaling 70 gigabytes were made available on a separate USB.[47] The combined archives contain 444,000 files totaling 62 gigabytes.[48] Cryptome initially said the archives were free to public libraries, then later called it a prank.[47][49][50] As of November 28, 2015 Cryptome disavowed versions of its archive not hosted on the website.[51][52]
Cryptome's digital library includes series on:
- Cartome: An archive of news and spatial / geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence—communicated by imagery systems: cartography, photography, photogrammetry, steganography, camouflage, maps, images, drawings, charts, diagrams, IMINT and their reverse-panopticon and counter-deception potential.[53]
- Cryptome CN: Information, documents and opinions banned by the People's Republic of China.[54]
- Nuclear Power Plants and WMD Series.[55]
- Protest Photos Series.[56]
Editorial policy
According to the website's mission statement, "Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those."[5] In a 2013 Associated Press article, Young said Cryptome has an "editorial role in selecting files, but we don't tell people what to think about them."[29]
John Young has said of Cryptome, "We do expect to get false documents but it’s not our job to sort that out."[57] In another interview, John Young promoted skepticism about all sources of information, saying: “Facts are not a trustworthy source of knowledge. Cryptome is not an authoritative source.”[58] When asked about providing context for material, Young said, "We do not believe in 'context.' That is authoritarian nonsense. For the same reason, we do not believe in verification, authentication, background."[59]
The front page of the states that "documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here – or elsewhere if gagged by order."[60] However, documents have been removed at the request of both law enforcement as well as individuals.[34][43]
Privacy Policy
<templatestyles src="Template:Blockquote/styles.css" />
We don't willfully disclose, but that's no assurance with the way the Internet is designed for the convenience of its operators which leaves it open to wizard intruders, greedy marketers and evil authorities. We don't know who's snooping our site and logs with intrusive tools. We see that Verio checks this site regularly; while its courteous sysadmins claim they do not snoop who knows what corruption maddens under-rockers. So we don't promise false assurances of privacy which dissolve through negligence, duress, business deals, bribes and increasingly sophisticated intrusive technology. We believe it's best to try to protect your privacy with trustworthy and up-to-date armaments -- particularly with the use of anonymizers, strongest encryption and vigilance against snooping -- and to distrust disarming statements of privacy policy that are probably out of date and touch. Or stay far away from an Internet seemingly purpose-built for covert surveillance of unwary users.[61]
In 2003, Cryptome informed users that they have been able to delete logs for Cryptome and its predecessor website.[62] In late 2008, Cryptome added a second privacy policy stating, "No user data is collected by Cryptome. Logs are deleted several times a day."[63][64] Cryptome had given a similar statement in an answer to a subpoena several years before.[65] Cryptome later informed users that Network Solutions was logging the website's activity for them and the logs could not be deleted.[66] According to Network Solutions, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[67]
In 2015, it was discovered that Cryptome's USB archives contained web server logs, containing clues to the identities of Cryptome visitors including their IP addresses and what files they had accessed on Cryptome. Cryptome initially stated that they had been faked as part of a disinformation campaign. Several days later, Cryptome confirmed the logs were real and shared their findings. The logs had been mailed out to users who ordered the site's archive since they changed web hosts in 2007, which Cryptome blamed on their current ISP, Network Solutions.[68][69][70] Cryptome later added that "there are no accidental leaks", and that the leak succeeded in its intention of creating scandalous publicity to increase visitors to the website.[71][72] Soon after, Cryptome posted pictures of their logs, showing that they had records spanning the sites' history.[73][74] According to Cryptome, the then nineteen years of logs added up to about one terabyte.[75]
Cryptome has warned users that they do not have technical measures to protect the anonymity of their sources, saying "don’t send us stuff and think that we’ll protect you."[76]
Other activities
Cryptome's trade mark application described its business as "computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices."[77] Another trade mark application by Cryptome described it as providing "electronic storage of electronic media, namely, images, text and audio data" with a focus on "[s]cientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services."[78]
According to emails sent and published by Cryptome, the website has a three step plan for combining social issues with architectural and security issues. Step one is the prevention of the removal of social programs like the Bowery Mission and "to valorize them as far more valuable than the best of the best art institutions." Step two related to Cryptome's Eyeball Series which uses photographs and video recordings to document "national security sensitive infrastructure which handles global and financial communications", and the mass transit system which John Young and Deborah Natsios worked as architectural consultants when they "learned of its appalling insecurity -- which has also been superficially reported, honest coverage denied for alleged security concerns, aka security by obscurity." Cryptome has not publicly discussed step three.[79][80]
Cryptome has stated that it operates at least a dozen domains and claims to initiate new disclosure methods every few months.[81][82][83]
History
Lua error in package.lua at line 80: module 'strict' not found.
-
This is a dynamic list and may never be able to satisfy particular standards for completeness. You can help by expanding it with reliably sourced entries.
1968: Urban Deadline was created as an extension of the Columbia strike and the Avery Hall occupation.[84] Three decades later, Cryptome evolves out of Urban Deadline.[85]
1993: John and Deborah met and their collaboration begins "some time late in 1993".[21][22] John Young received the Certificate of Special Congressional Recognition.[33]
1994: What became Cryptome began with John and Deborah's participation in the Cypherpunks electronic mailing list and Urban Deadline.[21] Deborah Natsios called this time “seminal” and “transformative” for the internet.[22]
1996: Cryptome was officially created out of their architectural practice.[86]
1999: In May, Cryptome posted a list of alleged MI6 officers found on a mailing list. In response, MI6 allegedly tried to have Cryptome booted off its ISP.[21] In June, Cryptome.org was registered.[87] In October journalist Declan McCullagh wrote about John Young's perusal of the site's access logs.[32]
2000: Cartome was founded.[38] In July, two FBI agents spoke with Cryptome on the phone after Cryptome published a Public Security Intelligence Agency personnel file. The file listed 400 names, birthdates, and titles, notably included Director General Hidenao Toyoshima. The FBI expressed concerns over the file, but admitted it was legal to publish in the United States but not Japan. After speculation that the documents may have come from someone called "Shigeo Kifuji", Cryptome identified the source as Hironari Noda.[11]
2002: In January, Cryptome applied for press credentials with New York City. They were denied because they "could not provide letters of reference" regarding their previous press activities.[88] In December the Attorney General issued a subpoena requiring that John Young appear before a grand jury and turn over "all logs recording the I.P. addresses and/or users" who visited Cryptome. John Young posted a notice online declaring that visitor logs are deleted daily.[89]
2003: In November, Cryptome was visited by two FBI agents from a counter-terrorism office, asking for any information which Cryptome "had a gut feeling" could be a threat to the nation and the purpose of site.[90] Cryptome informed users that they have been able to delete logs for jya.com (Cryptome's predecessor website) and Cryptome.org[62]
2004: New York City removed warning signs around gas mains after Cryptome posts pictures of them, citing security concerns.[91]
2006: Cryptome became one of the early organizers of Wikileaks. John Young revealed that he was approached by Julian Assange and asked to be the public face of Wikileaks; Young agreed and his name was listed on the website's original domain registration form.[92][93][94]
2007: In the early part of the year, John Young and Deborah Natsios left Wikileaks due to concerns about the organizations' finances and fundraising, accusing it of being a "money-making operation" and "business intelligence" scheme, and expressing concern that the amount of money they sought "could not be needed so soon except for suspect purposes."[92][93][94] Cryptome published an archive of the secret, internal electronic mailing list of the Wikileaks organizers, from its inception through Young's departure from the group.[13] On April 20 the website received notice from its hosting company, Verio, that it would be evicted on May 4 for unspecified breaches of their acceptable use policy.[95][96] Cryptome alleged that the shutdown is a censorship attempt in response to posts about the Coast Guard's Deepwater program.[97]
2010: Cryptome added a second privacy policy.[61] Cryptome's Earthlink account was compromised, leading to its website being hacked and Cryptome's data copied. The hackers posted screenshots of the compromised email account. Cryptome confirmed the accuracy of the information taken, but contested specific assertions, claiming they had only about seven gigabytes of data, not the seven terabytes the attackers claimed to copy.[98] In February, Cryptome is briefly shut down by Network Solutions for alleged DMCA violations after it posted a "Microsoft legal spy manual".[99][100][101] Microsoft withdraws the complaint 3 days later and the website is restored.[102] In March, PayPal stopped processing donations to Cryptome and froze the account due to "suspicious activities". The account was restored after an "investigation" by PayPal.[34][103] Cryptome ended on bad terms with Wikileaks, with John Young directly accusing them of selling classified material and calling them "a criminal organization". He called Julian Assange's anti-American rhetoric insincere, saying he was "just a crowd pleaser".[93] In a separate interview, he called Assange a narcissistic and compared him to Henry Kissinger. Young also accused George Soros and the Koch brothers of "backing Wikileaks generously".[104]
2011: In July, Cryptome named the alleged CIA analyst who found Osama Bin Laden.[105] In September, Cryptome published a list of Intelligence and National Security Alliance members, alleging that they were spies.[106] Cryptome stopped cooperating with the production team for We Steal Secrets: The Story of WikiLeaks upon learning it was tentatively titled "Unnamed Wikileaks Project," explaining that "the project appears to have retreated into a narrow-focussed commercial theme, perhaps unavoidable in buzzy-headline Media World."[79]
2012: In February, the Cryptome website was hacked to infect visitors with malware.[107] In August, internet hacktivist The Jester accused Cryptome of running the website Cryptocomb and exposing Mark Owen.[108] Cryptome denied any connection to Cryptocomb or exposing Mark Owen's identity.[109]
2013: In February, Cryptome's website, email and Twitter account were compromised, exposing whistleblowers and sources that had corresponded with Cryptome via email. Cryptome blamed hackers Ruxpin and Sabu, who was an FBI informant at the time.[110][111] In June two US Secret Service agents visited Cryptome to request removal of a former presidential Bush family email allegedly hacked by Guccifer.[34] In August, a complaint about Cryptome's identification of alleged Japanese terrorists led Network Solutions to briefly shut down the site.[6] In October Cryptome informed its users that Network Solutions had generated logs of site's visitors, and that requests to delete the logs were not being honored.[112] (According to Network Solutions's website, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[113]) In December Cryptome reported receiving a letter attempting to blackmail them. The letter demanded money in exchange for the Guccifer archive and claimed to have embarrassing information about Cryptome and Cryptome's email exchanges.[114]
2014: In January, Cryptome uploaded a copy of the Guccifer archive to Google Drive, posting the links on Pastebin and their website.[114] Later that year, Cryptome attempted to raise $100,000 to fund the website and its other disclosure initiatives.[7][115] In June, Cryptome was pulled offline again when malware was found infecting visitors to the site.[116] In July, Cryptome said it would publish the remaining NSA documents taken by Edward Snowden in the "coming weeks".[117] Since then, Cryptome has not published any new Snowden documents.[118]
2015: In September, Cryptome announced that their encryption keys are compromised,[119] then later claimed they are not.[120] A few days later, Cryptome filed for incorporation in New York.[121] Later that month, a GCHQ document leaked by Edward Snowden revealed that the agency is monitoring visits to Cryptome.[122] Cryptome confirmed the information in the slide, stating that logs showed the IP address "visited Cryptome on dates listed for files shown."[123] In October, a sold edition (USB stick) of the Cryptome archive was observed to contain web server logs, containing clues to the identities of Cryptome visitors. The logs had been mailed out to users who ordered the site's archive at least since 2007. Cryptome denied the logs were real, and accused the discoverer of forging the data and other forms of corruption. Cryptome later confirmed they were real.[68][69][70][124] Cryptome later added the comment that "there are no accidental leaks".[71] Cryptome posted pictures of logs dating back to the site's creation, claiming that Cryptome is for sale. Cryptome later claimed that the sale is a parody and that "Cryptome has no logs, never has", noting that their "various ISPs have copious logs of many kinds" along with metadata and that Cryptome tracks these "to see what happens to our files".[96][123][125][126][127] Later in October, Wikileaks launched a searchable version of the Cryptome archive and Cryptome's tweets.[128] In response, Cryptome criticized Wikileaks and called it "click bait to garner user data."[129][130] In November, Cryptome announced it was constructing a SecureDrop system.[131] On November 28, 2015 Cryptome disavowed all copies of its archive, including its USB archives.[52][51]
Reception
A 2004 New York Times article assessed Cryptome with the headline, "Advise the Public, Tip Off the Terrorists" in its coverage of the site's gas pipeline maps.[91] Reader's Digest made an even more alarming assessment of the site in 2005, calling it an "invitation to terrorists" and alleging that Young "may well have put lives at risk".[16]
A 2007 Wired article criticized Cryptome for going "overboard".[132]
The Village Voice featured Cryptome in its 2008 Best of NYC feature, citing its hosting of "photos, facts, and figures" of the Iraq War.[133]
Wikileaks accused Cryptome of executing a "smear campaign" in 2010 after Cryptome posted what it alleged were email exchanges with Wikileaks insiders, which Wikileaks disputed.[98][134][135]
Cryptome was awarded the Defensor Libertatis (defender of liberty) award at the 2010 Big Brother Awards, for a "life in the fight against surveillance and censorship" and for providing "suppressed or otherwise censored documents to the global public". The awards committee noted that Cryptome had engaged with "every protagonist of the military-electronic monitoring complex".[136]
In 2012, Steven Aftergood, the director of the Federation of American Scientists Project on Government Secrecy, described John Young and Cryptome as "fearless and contemptuous of any pretensions to authority” and “oblivious to the security concerns that are the preconditions of a working democracy. And he seems indifferent to the human costs of involuntary disclosure of personal information.” Aftergood specifically criticized Cryptome's handling of the McGurk emails, saying "it’s fine to oppose McGurk or anyone else. It wasn’t necessary to humiliate them".[20][137]
In 2013, Cindy Cohn, then the legal director of the Electronic Frontier Foundation, praised Cryptome as "a really important safety valve for the rest of us, as to what our government is up to."[43]
In 2014, Glenn Greenwald praised and criticized Cryptome, saying "There is an obvious irony to complaining that we're profiting from our work while [Cryptome] tries to raise $100,000 by featuring our work. Even though [Cryptome] occasionally does some repellent and demented things - such as posting the home addresses of Laura Poitras, Bart Gellman, and myself along with maps pointing to our homes - [they also do] things that are quite productive and valuable. On the whole, I'm glad there is a Cryptome and hope they succeed in raising the money they want."[7]
Peter Earnest, a 36-year veteran of the CIA turned executive director of the International Spy Museum and chairman of the board of directors of the Association for Intelligence Officers criticized Cryptome for publishing the names of spies, saying it does considerable damage and aids people that would do them harm.[21]
See also
References
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 5.0 5.1 5.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 6.0 6.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 7.0 7.1 7.2 7.3 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 11.0 11.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 13.0 13.1 Lua error in package.lua at line 80: module 'strict' not found..
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 16.0 16.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 20.0 20.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 21.0 21.1 21.2 21.3 21.4 21.5 21.6 21.7 21.8 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 22.0 22.1 22.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 23.0 23.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 24.0 24.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 29.0 29.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 30.0 30.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 32.0 32.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 33.0 33.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 34.0 34.1 34.2 34.3 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 35.0 35.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 38.0 38.1 38.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 43.0 43.1 43.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 47.0 47.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 51.0 51.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 52.0 52.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 61.0 61.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 62.0 62.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 68.0 68.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 69.0 69.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 70.0 70.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 71.0 71.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 79.0 79.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 91.0 91.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 92.0 92.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 93.0 93.1 93.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 94.0 94.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 96.0 96.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 98.0 98.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 114.0 114.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 123.0 123.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
External links
Official:
- No URL found. Please specify a URL here or add one to Wikidata.
- Cryptome Index
- Natsios Young Research
- YouTube channel
Mirrors:
- WikiLeaks Search of Cryptome Archive and Tweets
- WikiLeaks mirror
- Cryptome dataset - 99,112 files on the Internet Archive
- The Cryptome Archives hosted by The Cthulhu
- Quintessenz mirror
- Sabotage mirror
- Siteprotect.net mirror
Other:
- Why All the Snowden Docs Should Be Public: An Interview with Cryptome (Cox, Joseph, Vice/Motherboard, July 16, 2014)
- Older, quieter than WikiLeaks, Cryptome perseveres (Associated Press, Mar. 9, 2013)
- Wikileaks' estranged co-founder becomes a critic (Q&A)
- Young and Natsios radio interview with Emmanuel Goldstein on Off The Hook. (February 2012, WBAI)
- Open Source Design 01: The architects of information (Domus June 2011)
- An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual Godfather Of Online Leaking' (Greenberg, Andy, September 17, 2012)
Lua error in package.lua at line 80: module 'strict' not found.