Donate for the Cryptome archive of files from June 1996 to the present


22 June 2016. Add The Memory Hole 2.

13 October 2014. Thanks to A, update link to PC World archived article on hacking history.

12 October 2014. Updated.

18 December 2010. Updated.

4 September 2010. In progress.


Sensitive Information Security Sources and Breaches

In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:

Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates

Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm

Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger

First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf

Elijah Lovejoy (1830s): http://www.colby.edu/lovejoyaward/past-recipients/2014-lovejoy-award-recipient-james-risen/james-risen-address/

Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell

UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act

Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla

Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi

John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey

Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell

US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917

UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/

UK GCHQ: http://www.gchq.gov.uk/

American Civil Liberties Union (1920): http://www.aclu.org

UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml

Echelon: http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)
Nicky Hager (1996): http://www.nickyhager.info/

Mike Frost: http://www.converge.org.nz/abc/frostspy.htm

Duncan Campbell: http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)

http://cryptome.org/jya/echelon-dc.htm

Federation of American Scientists (1945): http://www.fas.org

Secrecy News (FAS kid): http://www.fas.org/sgp/news/secrecy/

Global Security (FAS kid): http://www.globalsecurity.org

Les Temps modernes (1945: http://en.wikipedia.org/wiki/Les_Temps_modernes

National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947

Central Intelligence Agency (1947): http://www.cia.gov
Emergence of the Intelligence Establishment: http://history.state.gov/historicaldocuments/frus1945-50Intel

Central Intelligence: Origin and Evolution: http://cryptome.org/cia-origin.htm

Philip Agee (1975; CIA kid): http://en.wikipedia.org/wiki/Philip_Agee

CIA FOIA Documents: http://www.foia.cia.gov/

National Security Agency (1952): http://www.nsa.gov

Winslow Peck (1972; NSA kid): http://cryptome.org/jya/nsa-elint.htm

Anonymous AU (1973): http://cryptome.org/jya/nsa-40k.htm

US Senate Church Report (1975): http://cryptome.org/nsa-4th.htm

NIST Information Technology Laboratory: http://www.nist.gov/itl/

US Navy The Onion Router: http://www.torproject.org/

NSA FOIA Documents: http://www.nsa.gov/public_info/declass/index.shtml

Wayne Madsen Report: http://www.waynemadsenreport.com

Simone de Beauvoir (1949, The Second Sex): http://en.wikipedia.org/wiki/The_Second_Sex

I. F. Stone's Weekly (1953-67): http://www.ifstone.org/

Ralph Nader (1965): http://www.nader.org/

Noam Chomsky (1960s): http://www.chomsky.info/; http://en.wikipedia.org/wiki/Noam_Chomsky

The Internet (1960s): http://en.wikipedia.org/wiki/Internet

Usenet Newsgroups (1980s): http://en.wikipedia.org/wiki/News_groups

World Wide Web (1989): http://en.wikipedia.org/wiki/Tim_Berners-Lee

Classified Networks: SIPRNet, .smil, .intel, .nsa, .fbi, et al

Hacking (1960s): https://web.archive.org/web/20060227110037/http://pcworld.about.com/news/Apr102001id45764.htm
Cryptome mirror: http://cryptome.org/0002/pcworld-hacking-history.pdf

2600: http://www.2600.com

Chaos Computer Club (1985): http://www.ccc.de/

PHRACK: http://www.phrack.org/

Freedom of Information Act (1966): http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)

National Archives: http://www.archives.gov

Classified National Security Information: http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html

Presidential Libraries: http://www.archives.gov/presidential-libraries/

The Federal Register: http://www.archives.gov/federal-register/

Library of Congress: http://www.loc.gov

David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)

MapQuest (1967): http://www.mapquest.com

Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm

Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh

FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol 

Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email

Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm

Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/

Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html

Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm

Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie

Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman

Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle

Ronald Rivest: http://people.csail.mit.edu/rivest/

Adi Shamir: http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html

Len Adleman: http://www.usc.edu/dept/molecular-science/fm-adleman.htm

Philip Zimmerman PGP: http://philzimmermann.com/EN/findpgp/
GnuPG: http://www.gnupg.org/

OpenSSL: http://www.openssl.org/

Progressive Magazine Publishes H-Bomb Design 1979: http://www.progressive.org/images/pdf/1179.pdf

Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm

James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford

Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks

Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson

National Security Archive (1985): http://www.gwu.edu/~nsarchiv/

Article 19 (1987): http://www.article19.org/

Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/

Public Interest Research (1989): http://www.namebase.org/staffbl.html

Namebase: http://www.namebase.org/

Google Watch: http://www.google-watch.org

Wikipedia-Watch: http://www.wikipedia-watch.org

Electronic Frontier Foundation (1990): http://www.eff.org

Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)

Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)

Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk

Crypto Rebels: http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
John Gilmore: http://en.wikipedia.org/wiki/John_Gilmore_(activist)

Eric Hughes, A Cypherpunk's Manifesto: http://www.activism.net/cypherpunk/manifesto.html

Timothy C. May: http://en.wikipedia.org/wiki/Timothy_C._May

Timothy C. May Cyphernomicon: http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html

Matt Blaze Crypto: http://www.crypto.com/

Marc Briceno: http://blog.pgp.com/index.php/author/mbriceno/

David Wagner: http://www.cs.berkeley.edu/~daw/

Joel McNamara: http://www.eskimo.com/~joelm/ also:

Joel McNamara Tempest Page: http://www.eskimo.com/~joelm/tempest.html

Cryptography (Cypherpunks kid): http://www.mail-archive.com/cryptography@metzdowd.com/maillist.html

James Dalton Bell (Cypherpunks Kid): Federal Correctional Institution Sheridan also:

Arrest: http://cryptome.org/jya/jimbell.htm
Trial: http://cryptome.org/jya/jdbfiles.htm
Carl Edward Johnson (Bell kid): http://cryptome.org/jya/cejfiles.htm

Cypherpunks Archives 1992-1998 http://cryptome.org/cpunks/cpunks-92-98.zip (83MB)

Cryptome (originally jya.com 1996; Cypherpunks kid): http://www.cryptome.org

Cartome (2001): http://www.cartome.org

Eyeball Series (2002): http://cryptome.org/eyeball/index.html

UK Secret Bases: http://www.secret-bases.co.uk/

Public Sources for Satellite and Aerial Photos and Maps: http://cryptome.org/gis-sources.htm

Wikileaks (2006; Cryptome "spiritual godkid"): http://www.wikileaks.org

Julian Assange on Cypherpunks 1995-2005: http://cryptome.org/0001/assange-cpunks.htm
Julian Assange Best of Security (1995): http://marc.info/?l=best-of-security&r=1&b=199507&w=2
http://www.cultural.com/web/security/mailing.lists/bos.html

Interesting-People Mail List (1993): http://www.interesting-people.org/archives/interesting-people/

Electronic Privacy Information Center (1994): http://www.epic.org

Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about

AltaVista (1995): http://www.altavista.com

The Internet Archive (1996): http://www.archive.org (Generous links to online libraries)

UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto

Ben Laurie (Wikileaks Advisor): http://www.apache-ssl.org/ben.html

Ross Anderson: http://www.cl.cam.ac.uk/~rja14/

Marcus Kuhn: http://www.cl.cam.ac.uk/~mgk25/

Adam Back Cypherspace: http://www.cypherspace.org/adam/

GSM Crypto Cracks (1997-2010): http://cryptome.org/0001/gsm-a5-files.htm

Terraserver USA (1998): http://www.terraserver-usa.com

Bing Maps (2009): http://www.bing.com/maps

Google (1998): http://www.google.com

Google Earth: http://earth.google.com/

Wikipedia (2001): http://www.wikipedia.org

Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard

USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act

NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy

Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness

Daniel Bernstein: http://cr.yp.to/djb.html

Bruce Schneier: http://www.schneier.com/

Cryptography Research: http://www.cryptography.com/

Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)

Cryptography Org: http://www.cryptography.org/ (Generous links)

Scribd: http://www.scribd.com

PGPBoard: http://www.pgpboard.com/

The Memory Hole: http://www.thememoryhole.org [Temporarily down]

The Memory Hole 2 returns: https://thememoryhole2.org

Government Attic (2007; longtime source of FOI to others): http://www.governmentattic.org/

ProPublica (June 2008): http://www.propublica.org/

Public Intelligence: http://publicintelligence.net/

Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)

History Anarchy Blog: http://historyanarchy.blogspot.com/

WikiSpooks: http://www.wikispooks.com

Cryptocomb: http://cryptocomb.org

Leaksource: http://leaksource.info/

The Intercept: https://firstlook.org/theintercept/

The Memory Hole 2: https://thememoryhole2.org