Donate for the Cryptome Archive USB of over 70,000 files from June 1996 to July 2013.

Search Cryptome

Cryptome new public key.

New site at ( and replacement)

2013-1678.htm         FBI Probing Colin Powell and Other Email Hacks   December 2, 2013
2013-1677.pdf         NSA G8-G20 Summit SIGINT Directive               December 2, 2013
2013-1676.htm         NSA Snowden Releases Tally Update                December 2, 2013
2013-1675.htm Update  Police Claim Encryption Use Is Illegal           December 1, 2013
2013-1674.pdf         IBM i2 Analyst Notebook (Manning allegedly used) December 1, 2013 (2.1MB)

2013-1673.pdf         IBM i2 Social Media Analyst                      December 1, 2013 (1.6MB)
2013-1672.pdf         IBM i2 Text Chart                                December 1, 2013 (2.1MB)
2013-1671.htm         Snowden Progress                                 December 1, 2013
2013-1670.pdf         Canadian CSEC Spying on Brazil - 18 Slides       November 30, 2013
2013-1669.htm         NSA Snowden Releases Tally Update                November 30, 2013

2013-1668.pdf         Alleged Manning Top Secret/SCI Clearance /via    November 30, 2013 (6.1MB)
2013-1667.pdf         NSA Describes Dutch SIGINT Hack of Internet Fora November 30, 2013
2013-1666.htm         NSA Snowden Releases Tally Update                November 30, 2013
2013-1665.htm         Alleged Manning Downloads Far Exceed Publication November 29, 2013
2013-1664.pdf         Alleged Manning and Assange Jabber Accounts /via November 29, 2013

2013-1663.pdf         Alleged Manning and Assange Chat Log /via        November 28, 2013 (1.1MB)
2013-1662.pdf         EU-US Data Protection Report 13-1127 /via        November 28, 2013
2013-1661.htm         IICT Tiers and NIPF Terrorism Priorities Chart   November 27, 2013
2013-1660.htm         Snowden Related Targets                          November 27, 2013
2013-1659.htm         Bitcoin Doomed                                   November 27, 2013

2013-1658.htm         Alleged CIA Chief of Station Islamabad           November 27, 2013
2013-1657.htm         NSA Snowden Releases Tally Update                November 27, 2013
2013-1656.pdf         NSA Spied on Muslim Porn Viewing                 November 27, 2013 (1.4MB)
2013-1655.pdf         NSA Exploited the Cloud to Target Microsoft?     November 26, 2013
2013-1654.pdf         NSA Targeted Microsoft Like Google and Yahoo?    November 26, 2013

2013-1653.pdf         Navy Strategic Laydown and Disperal              November 26, 2013
2013-1652.pdf         Navy Nuclear Weapons Inspection Unit Bangor      November 26, 2013
2013-1651.pdf         Commune: Shared Ownership in an Agnostic Cloud   November 26, 2013
2013-1650.htm         NSA Boundless Informant and GM-Place             November 26, 2013
2013-1649.htm         NSA BOUNDLESS INFORMANT Explicated               November 25, 2013

2013-1648.pdf         History of Russia Nuclear Weapons Program /via   November 25, 2013 (30.0MB)
2013-1647.htm         Project Heracles Show at the European Parliament November 25, 2013
2013-1646.htm         Glenn Greenwald Names 861 Sources                November 25, 2013
2013-1645.htm         Email Is Unsecurable                             November 25, 2013
2013-1644.pdf         Ron-Shamir: Bitcoin-Silk Road-Pirate-Nakamoto    November 25, 2013 (1.2MB)

2013-1643.pdf         Historians Primary Material in Digital Age       November 25, 2013
2013-1642.doc         Obamacare Run by Human Terrain System Goofs      November 24, 2013
2013-1641.pdf         IAEA-Iran Joint Plan of Action on Nuclear Arms   November 24, 2013
2013-1640.pdf         Decentralized Anonymous Credentials              November 24, 2013 (1.1MB)
2013-1639.htm         NSA TreasureMap                                  November 23, 2013

2013-1638.pdf         CIA Analytic Structure Report                    November 23, 2013
2013-1637.htm         NSA Global SIGINT Power to Generate Profits/Pay  November 23, 2013
2013-1636.pdf         CIA Analyst Training Handbook (from 2000)        November 23, 2013 (3.6MB)
2013-1635.htm         NSA Goals for More Power                         November 23, 2013
2013-1634.htm         NSA Snowden Releases Tally Update                November 23, 2013

2013-1633.pdf         NSA Worldwide SIGINT Cryptologic Platform /via   November 23, 2013
2013-1632.pdf         NSA SIGINT Strategy 2012-2016 /via               November 23, 2013
2013-1631.pdf         Al Qaeda Papers: Tips on Avoiding Drones /via    November 22, 2013 (2.4MB)
2013-1630.pdf         Al Qaeda Papers: Feared Weapon SAMs /via         November 22, 2013 (8.4MB)
2013-1629.pdf         Al Qaeda Papers: Human Resources Letter /via     November 22, 2013 (5.0MB)

2013-1628.pdf         Al Qaeda Papers: Sahara War Playbook /via        November 22, 2013 (4.1MB)
2013-1627.pdf         Al Qaeda Papers: Weeding Muslims from Non /via   November 22, 2013 (2.0MB)
2013-1626.pdf         Al Qaeda Papers: State Scholars /via             November 22, 2013 (2.1MB)
2013-1625.pdf         Al Qaeda Papers: How to Win Friends, Govern /via November 22, 2013 (8.1MB)
2013-1624.pdf         Lavabit Reply Brief in Lavabit Appeal /2nd ver   November 22, 2013

2013-1623.htm         NSA Snowden Releases Tally Update                November 22, 2013
2013-1622.pdf         NSA BOUNDLESSINFORMANT Spied Norway 33M          November 22, 2013 (6.3MB)
2013-1621.pdf         New York Resolution to ATT on Spy Data /via      November 21, 2013
2013-1620.htm         US Plan to Kill Online Privacy Rights            November 21, 2013
2013-1619.jpg         JFK Death Leaflet Dropped on South Korea         November 21, 2013 (1.8MB)

2013-1618.pdf         EU Transgovernmental Spy Network and Center      November 21, 2013
2013-1617.htm         NSA Authorized to Spy on British                 November 21, 2013
2013-1616.pdf         Afghanistan-USA Security Agreement               November 21, 2013
2013-1615.pdf         FISC Orders USA to Justify Denial of ACLU Doc    November 20, 2013
2013-1614.htm         How the UK Developed Its Approach to Cyber       November 20, 2013

2013-1613.htm         NSA National Spying Priorities Framework V3      November 20, 2013
2013-1612.htm         BIS End User Certificates for China              November 20, 2013
2013-1611.pdf         FISC USA Spies Deny Release of Doc to ACLU       Nobember 19, 2013
2013-1610.vid         Video: NSA DDIR Inglis at NY Law School 19Nov13  November 19, 2013
2013-1609.htm         Masterspy Releases 38 FISC NSA Docs (968 pages)  November 19, 2013

2013-1103.vid         Meet Me At Your Riser - Cryptome Video           August 31, 2013


O f f s i t e 

2013-00713            Spooky Business: Corporate Spying on NGOs        December 2, 2013

2013-00712            USAF Gateway to Spying                           December 2, 2013
2013-00711            USAF Cyberspace Spying Center                    December 2, 2013
2013-00710            Granite Island Group Hunts/Stops Spies/Leaks     December 2, 2013
2013-00709            Spying & Society                                 December 2, 2013
2013-00708            Interpreting the CSEC Brazil Spying Slides       December 2, 2013

2013-00707            First of Many Snowden Exploitation Books (PT)    December 1, 2013
2013-00705            JFK Killing and 9/11 Compared                    December 1, 2013
2013-00704            Quick Leak                                       December 1, 2013
2013-00703            CIA "George Purvis" Is Peter Chung-Sik Baek      November 30, 2013
2013-00702            Undercover Communication                         November 30, 2013

2013-00701            Fled to US Allegedly Due to WikiLeaks Cable 2    November 30, 2013
2013-00700            Fled to US Allegedly Due to WikiLeaks Cable 1    November 30, 2013
2013-00699            IHS Janes Defense Military Biographies Leaked    November 28, 2013
2013-00698            OpIsrael Hackers Dump 40,000 Resumes             November 28, 2013
2013-00697            32 Anti-Privacy Techs Changing US Into Prison    November 28, 2013

2013-00696            NSA Spied G20 in Toronto in 2010 (no docs)       November 28, 2013
2013-00695            NSA Organization Chart                           November 28, 2013
2013-00694            DRTBOX and DRT Spying Systems                    November 27, 2013
2013-00693            CA Security-Spying Review Committee Report       November 25, 2013
2013-00692            @GGreenwald: The Snowden Releases Gatekeepers    November 24, 2013

2013-00691            NSA/CSS Mindmap by Marc Ambinder                 November 24, 2013
2013-00690            NSA BOUNDLESSINFORMANT Screenshots Mislead       November 24, 2013
2013-00689            NSA Infected 50,000 Computers with Spyware       November 23, 2013
2013-00688            OpSaudi Leaks Security On King Abdulaziz Airport November 23, 2013
2013-00687            NSA Seeks More SIGINT Authority                  November 23, 2013

2013-00686            NY Times Editorial on ACLU v. NSA Trial          November 23, 2013
2013-00685            NSA Updated Mitigation Guidance                  November 22, 2013
2013-00684            The Dark Web Where Digital Evil Lurks            November 22, 2013
2013-00683            NSA BoundlessInformant Only Shows Metadata       November 22, 2013
2013-00682            EFF Tally of Snowden NSA Documents               November 22, 2013

2013-00681            Update: CIA Officer Thomas James Sullivan        November 21, 2013
2013-00679            Corporations Use Ex-Spies to Spy NGOs            November 21, 2013
2013-00678            LG TV Sets Spy on Viewers                        November 19, 2013
2013-00677            Shootdown of the Finnish Airliner Kaleva         November 17, 2013
2013-00676            Notes on Just Spying Principles and Ethics       November 17, 2013


Goofed redact at 02:24:15 PM.


Michael Wesley, professor of national security at the Australian National University and a former senior analyst with the Office of National Assessments, told me he thinks the Snowden affair "the most important intelligence crisis and intelligence failure the West has suffered since the end of World War II".

He believes it will have an effect not only on the trust the US and its tight allies enjoy with other countries, but also will substantially affect relations within the "five eyes" intelligence alliance, which consists of the US, Australia, Britain, Canada and New Zealand.

"It will move us back to a culture of intensely protecting intelligence and sharing it only on a strict need-to-know basis," he says. "It will reverse all the advances we have made since 9/11 on intelligence sharing and take us back to the intelligence culture of the early 1990s."


Cryptome: Progress.

These are welcomed, send to cryptome[at]

DoD Instruction O-5505.09, Interception of Wire, Electronic, and Oral Communications for Law Enforcement, November 27, 2013

DoD Instruction S-3604.01, (U) Department of Defense Military Deception, March 11, 2013; Incorporating Change 1, November 5, 2013

DoD Instruction S-4515.17, GATE KEEPER (U), November 18, 2013


131005-N-LE393-138. U.S. Marine Corps Sgt. Jennifer Slown inflates her uniform blouse while treading water during a relay swim race at Camp Lemonnier in Djibouti Oct. 5, 2013. Competitors swam one lap of the pool while wearing their combat uniform and carrying a brick, then performed pushups while their teammates tread water. The race was part of Captain's Cup, a monthlong series of sporting events. (U.S. Navy photo by Mass Communication Specialist 1st Class Eric Dietrich/Released)

Ellsberg: Publishing classified documents is legal; leaking them is illegal. That's why publishing profits from courageous leaks, risk-free.

February 28, 2013. For quick Cryptome submissions whose source may be monitored send to <admin[at]> (note "info" not "org"). Test with a benign message beforehand, expect no response or a bounce. Use infrequently to minimize pattern analysis. Not great comsec but better than covertly targeted, tapped, tricked, tracked and trapped drop boxes, pastes, anonymizers, proxies, spoofs, onions, clouds and sekret one-time spasms. Key security is to protect yourself, not rely on system, authority or disclosure paragons.

Note: For regular email to Cryptome send to cryptome[at] with CC to jya[at]

The mail list below accepts only from subscribers.

Cryptome Mail List

Subscribe to Cryptome Mail List by sending email to


with 'subscribe' in the Subject field OR by visiting the list page at

After subscribing post to Cryptome Mail List by sending email to


"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung, via Tony Gosling

Military Casualties

Iraq Civilian Dead Wounded Care War Contracts

2013-1608.pdf         Jeremy Hammond Judgment                          November 18, 2013
2013-1607.pdf         Jeremy Hammond-Hector Monsegur File Unsealed     November 18, 2013
2013-1606.pdf         NSA USSID SP0018 Spying US Persons Minimization  November 18, 2013 (2.8MB)
2013-1605.pdf         NSA USSID SP0018J Spying Drug Traffic Radio      November 18, 2013
2013-1604.htm         National Security Law and Strategy 19 Nov 2013   November 18, 2013

2013-1603.pdf         Jay Rosen Joins Omidyar, Greenwald 1%            November 18, 2013
2013-1602.pdf         DoD Spy, Detainee, Tactical Interrogations       November 18, 2013
2013-1601.pdf         DoD High-Value Detainee Interrogations Support   November 18, 2013
2013-1600.pdf         DoD Polygraph and Credibility Assessment         November 18, 2013
2013-1599.pdf         DoD Joint Counterspy Training Academy            November 18, 2013

2013-1598.pdf         DoD Combating Terrorism Fellowship               November 18, 2013
2013-1597.htm         Sensing War                                      November 18, 2013
2013-1596.pdf         Lines in the Sand: by Jeremy Hammond w/Sabu /via November 18, 2013
2013-1595.pdf         Sabu Claims Anarchos (Hammond) Wrote Item Above  November 18, 2013
2013-1594.pdf         MAC Address as a Key for Data Encryption         November 18, 2013

2013-1593.pdf         AU DSD 3G Phone Spying                           November 18, 2013
2013-1592.jpg         GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy (EN)   November 17, 2013
2013-1591.pdf         GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy (DE)   November 17, 2013
2013-1590.htm         Iranian Anonymous                                November 17, 2013
2013-1589.htm         Jeremy Hammond Sentencing Statement              November 17, 2013

2013-1588.pdf         The Extraordinary Pierre Omidyar                 November 17, 2013
2013-1587.pdf         New York State Hearing on Bitcoins               November 16, 2013
2013-1586.pdf         Jeremy Hammond: USA Sentencing Memorandum        November 15, 2013
2013-1585.htm         US Threat of Homegrown Violent Extremists        November 15, 2013
2013-1584.pdf         JPMorgan and the Wen Family                      November 15, 2013

2013-1583.pdf         Inside Church of Scientology Flag Building /via  November 15, 2013
2013-1582.pdf         Fukushima Daiichi NPS Unit 1 Vent Pipes          November 15, 2013
2013-1581.pdf         Elliptic Curve Cryptography in Practice          November 14, 2013
2013-1580.pdf         Trans-Pacific Partnership IP Treaty /via         November 14, 2013
2013-1579.pdf         Han-Noggle v. Albuquerque Police Complaint       November 14, 2013

2013-1578.pdf         TRS-80 With A Keccak Sponge Cake                 November 14, 2013
2013-1577.pdf         Introducing Accountability to Anonymity Networks November 14, 2013
2013-1576.pdf         Brazil-Germany UN Digital Privacy Resolution     November 13, 2013
2013-1575.htm         Fukushima Daiichi NPS Unit 4 Spent Fuel Pool     November 13, 2013
2013-1574.pdf         USA Brief in Lavabit Appeal /via                 November 13, 2013

2013-1573.htm         NSA Perry Fellwock Gawker                        November 13, 2013
2013-1572.htm         NSA SIGINT Strategic Mission Chart 2007          November 13, 2013
2013-1571.htm         Julian Assange and MOONLIGHT MAZE                November 12, 2013
2013-1570.htm         Philippines Typhoon Haiyan Photos                November 12, 2013
2013-1569.pdf         EU Nations Mass Spying on Personal Data          November 12, 2013

2013-1568.htm Update  Intel Secret Underground Laboratory              November 12, 2013
2013-1567.pdf         Covert Ephemeral Comms in Named Data Networking  November 12, 2013
2013-1566.pdf         America’s Deep State Waging Absurd Wars          November 12, 2013
2013-1565.pdf         Crypto Module for Baseband/Link Data Comms       November 12, 2013
2013-1564.pdf         PKCS #11: Cryptographic Token Interface Standard November 12, 2013

2013-1563.pdf         Taclane E300 Operation Manual FOUO               November 12, 2013
2013-1562.pdf         DoD UC Framework 2013, General Security Devices  November 12, 2013 (1.2MB)
2013-1561.htm         A Fierce Domain: Cyberspace Conflict 1986-2012   November 11, 2013
2013-1560.pdf         The Embassy House First Chapter (now censored)   November 10, 2013 (2.2MB)
2013-1559.pdf         John McCain on NSA Affair by Der Spiegel (DE)    November 10, 2013

2013-1558.htm Update  Rustle League and GNAA Allegedly CN Military     November 10, 2013
2013-1557.htm         Intel Secret Underground Laboratory              November 8, 2013
2013-1556.pdf         Lawful Hacking: Wiretapping via Internet Vulns   November 8, 2013
2013-1555.pdf         Argentine Military Blacklist - 1982 Secret       November 8, 2013
2013-1554.pdf         Argentine Military Blacklist - 1980 Secret       November 8, 2013

2013-1553.pdf         Argentine Military Blacklist - 1979 Secret       November 8, 2013
2013-1552.pdf         FISA Improvements Act of 2013                    November 7, 2013
2013-1551.pdf         Navy NATO Security Procedures                    November 7, 2013
2013-1550.pdf         FEC: Bitcoins Acceptable Donation, Not to Spend  November 7, 2013
2013-1549.pdf         Spy Funding FY2014                               November 7, 2013

2013-1548.pdf         Veteran Care Facilities Historic Preservation    November 7, 2013 (3.8MB)
2013-1547.htm         Internet Is Greatest Trojan Horse                November 7, 2013
2013-1546.htm         Cyprus: UK-US Middle East Internet Spying        November 7, 2013
2013-1545.pdf         EU Policy on Security, Privacy, Spying           November 7, 2013
2013-1544.pdf         Anti-War Spied by FBI                            November 7, 2013 (2.3MB)

2013-1543.pdf         FISC Apple Amicus to Release Spy Data            November 7, 2013 (1.3MB)
2013-1542.pdf         Google EU Anti-Trust Agreement                   November 7, 2013 (6.9MB)
2013-1541.pdf         John Paul Stevens on Originalism and History     November 7, 2013 (1.4MB)
2013-1540.pdf         Unfunded Pension Obligations-Chapter 9 Remedy?   November 7, 2013 (2.4MB)
2013-1539.htm         National Intelligence Priorities Framework v2    November 5, 2013

2013-1538.pdf         NSA SSO Yahoo Google Exploitation /WaPo          November 4, 2013 (1.4MB)
2013-1537.pdf         NSA SSO Cryptologic Provider /WaPo               November 4, 2013 (1.0MB)
2013-1536.pdf         NSA WINDSTOP 30 Days 100Ms Records Spied /WaPo   November 4, 2013
2013-1535.pdf         SAC Capital Advisors $1.8B Plea Agreement        November 4, 2013 (1.1MB)
2013-1534.pdf         Diffie-Hellman Cryptanlysis of NBS DES 1977      November 4, 2013 (2.3MB)

2013-1533.pdf         173 Cases of Border Patrol Abuse                 November 4, 2013 (2.0MB)
2013-1532.pdf         Differing Special Collection Services-FR and US  November 3, 2013 (3.9MB)
2013-1531.pdf         Snowden Asylum in Germany (DE)                   November 3, 2013
2013-1530.htm         NSA-CIA Special Collection Service in 1995       November 3, 2013
2013-1529.htm         42 Years for Snowden Docs Release, Free All Now  November 3, 2013

2013-1528.pdf         NSA Week of Spying 2009 /NYT                     November 3, 2013
2013-1527.pdf         US SIGINT Strategic Mission 2013 /NYT            November 3, 2013 (2.7MB)
2013-1526.pdf         US SIGINT Strategic Mission 2007 /NYT            November 3, 2013 (2.0MB)
2013-1525.htm         GCHQ Advises Netherlands Spies on TEMPORA        November 3, 2013
2013-1524.pdf         CIA General Counsel Answers Questions            November 3, 2013

2013-1523.pdf         CIA Chile Coup Instructions                      November 3, 2013
2013-1522.pdf         Google Search Warrant                            November 3, 2013 (6.1MB)
2013-1521.pdf         Yahoo Search Warrant                             November 3, 2013 (2.7MB)
2013-1520.pdf         NSA PRISM Slides Guardian 13-1101                November 2, 2013 (3.0MB)
2013-1519.pdf         NSA SSO1 Slide from Guardian 13-1101             November 2, 2013

2013-1518.pdf         NSA SSO2 Slide from Guardian 13-1101             November 2, 2013
2013-1517.htm Update  NSA Spied 125 Billion Phone Calls in a Month     November 2, 2013
2013-1516.pdf         Privacy-Civil Liberties Oversight Board Hearing  November 1, 2013
2013-1515.htm         Masterspy Counsel Overview of Spying             November 1, 2013
2013-1514.htm         TR Prime Minister Plans to Takeover Universities November 1, 2013

2013-1513.pdf         Snowden Responds to DE Parliament Invitation     November 1, 2013
2013-1512.pdf         Winners of Design for Death                      November 1, 2013 (1.5MB)
2013-1511.htm         Cryptome Interview by La Repubblica              November 1, 2013
2013-1510.htm         FedCyber Message from Nest of Spies              November 1, 2013
2013-1509.htm         NSA Claims Call Spying Reports Are False         November 1, 2013

O f f s i t e 

2013-00675            Chomsky Warns of Big Data Abuse                  November 17, 2013
2013-00674            DoJ Overclassification Report                    November 16, 2013
2013-00673            John McCain, Pigs Can Fly (click to enlarge)     November 16, 2013
2013-00672            Five-Eyes, Nine-Eyes and Many More Spy-Eyes      November 16, 2013
2013-00671            Letter to Dutch Senate on NSA and Privacy        November 16, 2013

2013-00670            Intercept What You Can Part 1                    November 16, 2013
2013-00669            Intercept What You Can Part 2                    November 16, 2013
2013-00668            Cryptome: FOIA Has Become a Confidence Game      November 15, 2013
2013-00667            US Spies Collect More Bulk Data Beyond NSA       November 15, 2013
2013-00666            Grant to Explore Ethics of Cyberwarfare          November 14, 2013

2013-00665            Financial Services Info Sharing and Analysis     November 14, 2013
2013-00664            Financial Services Cyber Spying Repository       November 14, 2013
2013-00663            MITRE Cybersecurity Resources                    November 14, 2013
2013-00662            All OSs Expected to Implement Huge ACPI Spec     November 13, 2013
2013-00661            The second OS hiding in every mobile phone       November 13, 2013

2013-00660            Cryptofestival: Tools for a post-PRISM internet  November 13, 2013
2013-00659            Perry Fellwock, the Original NSA Whistleblower   November 12, 2013
2013-00658            PK should focus on COMSEC after NSA-CIA SIGINT   November 12, 2013
2013-00657            Silent Undersea Drones Spy the Oceans (& Cables) November 12, 2013
2013-00656            Leaks Threaten Media Machiavellism               November 12, 2013

2013-00655            Severing Ties with the NSA                       November 12, 2013
2013-00654            Oversight on Dutch SIGINT Is Still Broken        November 10, 2013
2013-00653            What Journalism Is Still Missing                 November 10, 2013
2013-00652            Milan Job CIA Officer Robert Davenport/Kirkland  November 8, 2013
2013-00651            Dylan Davies/Benghazi Meets with FBI and State   November 8, 2013

2013-00650            Able Archer 83 Sourcebook: Avoiding Nuclear War  November 8, 2013
2013-00649            CIA Pays ATT $Millions for Spy Data              November 7, 2013
2013-00648            EU Hearings On NSA                               November 7, 2013
2013-00647            EU Needs Own Spy Service Against NSA 1           November 7, 2013
2013-00646            EU Needs Own Spy Service Against NSA 2           November 7, 2013

2013-00645            Ten Commandments of Internet Law Revisited       November 7, 2013
2013-00644            NSA Vacuums Everything                           November 3, 2013
2013-00643            How NSA Targeted Chancellor Merkel's Phone       November 2, 2013
2013-00642            Nobody Notices/Cares About Gov/Stealth Malware   November 1, 2013
2013-00641            BadBios: Mysterious Malware That Jumps Air Gaps  November 1, 2013

Cryptome overview:
Cryptout Recent Listings

Cryptome CN
Eyeball Series
Iraq Kill Maim
Nuclear Power Plants and WMD Series
Protest Photos Series
Occupy Wall Street Photo and Video Series

Other Stuff Contact, Public Key
Cryptome Videos


Cryptome Public Key 11 June 2013. New PK for cryptome[at]
Key ID: 0x8B3BF75C

Version: PGP Universal 2.9.1 (Build 347)


22 April 2013

Cryptome has signed up for SilentCircle and is open to its use as PGP supplement.

Key below superceded and no longer valid.

22 April 2012
Cryptome Public Key <cryptome[at]>

Fingerprint=5D02 335F 26A1 BD73 BFE3  F519 3755 7319 F9FC 4719

Version: PGP Universal 2.9.1 (Build 347)


Alleged mirrors of the full Cryptome Archive are online including on Torrent, These have not been not examined by Cryptome so none are verified as true copies and clean, not tampered with, entrapment bait or forgery. If the mirrors are true and clean, then more distribution is welcomed.

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.

Email: cryptome[at]
Mail: John Young, Cryptome, 251 West 89th Street, New York, NY 10024
Checks/Money Orders: Make out to "John Young"
Telephone for messages: 212-873-8700

Deborah Natsios and John Young Bibliography

Email: Deborah Natsios & John Young Architects: nya[at]

Cryptome/Cartome Essays, Deborah Natsios and John Young

Cryptome Artworks at Bowery Mission Censored by The New Museum

Exhibit, April 30, 2013 (L), Cryptome; Censored, May 3, 2013 (R), Sukie Park


Cryptome project tracking the political geography of the Cold War as precursor to current national security frameworks:

L'Empire des Oiseaux: Schoolgirl Quarantines from Dalat to the Rue Alexandre de Rhodes

Greece: Irredenta in the Eurozone

Cryptome Tracks the NYPD Ring of Steel

Common Lines of Flight Towards the Open City, The SAGE Handbook of Architectural Theory, publication February 2012

New York VOIR DIRE: Interrogating the Juridical City State of Exception
Deborah Natsios / Cryptome, 20 December 2010

Initial version presented 17 April 2010, during panel: "Sovereign spaces: security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG) (3.4MB)

Watchlisting the Diaspora
Presented 3 October 2008: Centre de Cultura Contemporània de Barcelona (CCCB)
Targeted Publics: Arts and Technologies of the Security City

Expanded and to be published as:

The Geographer in Jules Romains' 'Donogoo Tonka or the Miracles of Science: A Cinematographic Tale'
Commentary and digital film presented at Forum Finale, Temple Hoyn Buell Center for the Study of American Architecture, Graduate School of Architecture, Planning and Preservation, Columbia University, 5 April 2008.

Towards a New Blast Zone
in Architectures of Fear: Terrorism and the Future of Urbanism in the West, Urbanitats, No. 19, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona 2008.

Paper presented 18 May 2007, at the symposium “Architectures of Fear: Terrorism and the Future of Urbanism in the West”, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona.

National Security Sprawl
In Sensing the 21st Century City: Close-Up and Remote
AD Architectural Design
Vol. 75 No. 6 Nov/Dec 2005
Brian McGrath and Grahame Shane (eds.)
Wiley-Academy (London)

Jerusalem Sky
In The Next Jerusalem : Sharing the Divided City, Ed. Michael Sorkin
2002 Monacelli Press, New York, NY

Parallel Atlas: 38°N
Version 10, May 2002

Reversing the Panopticon
Invited Talk, 16 August 2001
10th USENIX Security Symposium, Washington, DC.

Homeland Defense and the Prosecution of Jim Bell
8 June 2001