Monday, July 9, 2012

Before Wikileaks:Sensitive Information Security Sources and Breaches

Source CRYPTOME



Unauthorized disclosures of secrets are essential for democracy.
 
In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:
 
Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates
 
Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm
 
Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger
 
First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf
 
Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell
 
UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act
 
Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla
 
Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi
 
John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey
 
Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell
 
US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917
 
UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/
UK GCHQ: http://www.gchq.gov.uk/
American Civil Liberties Union (1920): http://www.aclu.org/
 
UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml
Echelon: http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)
Nicky Hager (1996): http://www.nickyhager.info/
Mike Frost: http://www.converge.org.nz/abc/frostspy.htm

Duncan Campbell: http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)
http://cryptome.org/jya/echelon-dc.htm
Federation of American Scientists (1945): http://www.fas.org/
Secrecy News (FAS kid): http://www.fas.org/sgp/news/secrecy/

Global Security (FAS kid): http://www.globalsecurity.org/
Les Temps modernes (1945: http://en.wikipedia.org/wiki/Les_Temps_modernes
National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947
 
Central Intelligence Agency (1947): http://www.cia.gov/
Emergence of the Intelligence Establishment: http://history.state.gov/historicaldocuments/frus1945-50Intel

Central Intelligence: Origin and Evolution: http://cryptome.org/cia-origin.htm

Philip Agee (1975; CIA kid): http://en.wikipedia.org/wiki/Philip_Agee

CIA FOIA Documents: http://www.foia.cia.gov/
National Security Agency (1952): http://www.nsa.gov/
Winslow Peck (1972; NSA kid): http://cryptome.org/jya/nsa-elint.htm
Anonymous AU (1973): http://cryptome.org/jya/nsa-40k.htm

US Senate Church Report (1975): http://cryptome.org/nsa-4th.htm

NIST Information Technology Laboratory: http://www.nist.gov/itl/

US Navy The Onion Router: http://www.torproject.org/

NSA FOIA Documents: http://www.nsa.gov/public_info/declass/index.shtml

Wayne Madsen Report: http://www.waynemadsenreport.com/
Simone de Beauvoir (1949, The Second Sex): http://en.wikipedia.org/wiki/The_Second_Sex
 
I. F. Stone's Weekly (1953-67): http://www.ifstone.org/
 
Ralph Nader (1965): http://www.nader.org/
 
Noam Chomsky (1960s): http://www.chomsky.info/;
 
http://en.wikipedia.org/wiki/Noam_Chomsky
 
The Internet (1960s): http://en.wikipedia.org/wiki/Internet

Usenet Newsgroups (1980s): http://en.wikipedia.org/wiki/News_groups

World Wide Web (1989): http://en.wikipedia.org/wiki/Tim_Berners-Lee

Classified Networks: SIPRNet, .smil, .intel, .nsa, .fbi, et al
Hacking (1960s): http://pcworld.about.com/news/Apr102001id45764.htm


2600: http://www.2600.com/

Chaos Computer Club (1985): http://www.ccc.de/

PHRACK: http://www.phrack.org/
Freedom of Information Act (1966): http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)
 
National Archives: http://www.archives.gov/
Classified National Security Information: http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html

Presidential Libraries: http://www.archives.gov/presidential-libraries/

The Federal Register: http://www.archives.gov/federal-register/
Library of Congress: http://www.loc.gov/
 
David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)
 
MapQuest (1967): http://www.mapquest.com/
 
Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm
 
Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh
 
FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol 
 
Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email
 
Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm
 
Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/
 
Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html
 
Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm
 
Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie
 
Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman
 
Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle
Ronald Rivest: http://people.csail.mit.edu/rivest/

Adi Shamir: http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html
Len Adleman: http://www.usc.edu/dept/molecular-science/fm-adleman.htm

Philip Zimmerman PGP: http://philzimmermann.com/EN/findpgp/
GnuPG: http://www.gnupg.org/
OpenSSL: http://www.openssl.org/
Progressive Magazine Publishes H-Bomb Design 1979: http://www.progressive.org/images/pdf/1179.pdf
 
Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm
 
James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford
 
Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks
 
Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson
 
National Security Archive (1985): http://www.gwu.edu/~nsarchiv/
 
Article 19 (1987): http://www.article19.org/
 
Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/
 
Public Interest Research (1989): http://www.namebase.org/staffbl.html
Namebase: http://www.namebase.org/

Google Watch: http://www.google-watch.org/

Wikipedia-Watch: http://www.wikipedia-watch.org/
Electronic Frontier Foundation (1990): http://www.eff.org/
 
Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)
 
Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)
 
Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk
Crypto Rebels: http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
John Gilmore: http://en.wikipedia.org/wiki/John_Gilmore_(activist)

Eric Hughes, A Cypherpunk's Manifesto: http://www.activism.net/cypherpunk/manifesto.html

Timothy C. May: http://en.wikipedia.org/wiki/Timothy_C._May
Timothy C. May Cyphernomicon: http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html
Matt Blaze Crypto: http://www.crypto.com/

Marc Briceno: http://blog.pgp.com/index.php/author/mbriceno/

David Wagner: http://www.cs.berkeley.edu/~daw/

Joel McNamara: http://www.eskimo.com/~joelm/ also:
Joel McNamara Tempest Page: http://www.eskimo.com/~joelm/tempest.html
http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf
Cryptography (Cypherpunks kid): http://www.mail-archive.com/cryptography@metzdowd.com/maillist.html

James Dalton Bell (Cypherpunks Kid): Federal Correctional Institution Sheridan also:
Arrest: http://cryptome.org/jya/jimbell.htm

Trial: http://cryptome.org/jya/jdbfiles.htm
Carl Edward Johnson (Bell kid): http://cryptome.org/jya/cejfiles.htm
Cypherpunks Archives 1992-1998 http://cryptome.org/cpunks/cpunks-92-98.zip (83MB)
Cryptome (originally jya.com 1996; Cypherpunks kid): http://www.cryptome.org/
Cartome (2001): http://www.cartome.org/

Eyeball Series (2002): http://cryptome.org/eyeball/index.html
UK Secret Bases: http://www.secret-bases.co.uk/ Public Sources for Satellite and Aerial Photos and Maps: http://cryptome.org/gis-sources.htm
Wikileaks (2006; Cryptome "spiritual godkid"): http://www.wikileaks.org/
Julian Assange on Cypherpunks 1995-2005: http://cryptome.org/0001/assange-cpunks.htm
Julian Assange Best of Security (1995): http://marc.info/?l=best-of-security&r=1&b=199507&w=2
http://www.cultural.com/web/security/mailing.lists/bos.html
Interesting-People Mail List (1993): http://www.interesting-people.org/archives/interesting-people/
 
Electronic Privacy Information Center (1994): http://www.epic.org/
 
Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about
 
AltaVista (1995): http://www.altavista.com/
 
The Internet Archive (1996): http://www.archive.org/ (Generous links to online libraries)
 
UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto
Ben Laurie (Wikileaks Advisor): http://www.apache-ssl.org/ben.html

Ross Anderson: http://www.cl.cam.ac.uk/~rja14/
Marcus Kuhn: http://www.cl.cam.ac.uk/~mgk25/
Adam Back Cypherspace: http://www.cypherspace.org/adam/
GSM Crypto Cracks (1997-2010): http://cryptome.org/0001/gsm-a5-files.htm
 
Terraserver USA (1998): http://www.terraserver-usa.com/
Bing Maps (2009): http://www.bing.com/maps
Google (1998): http://www.google.com/
Google Earth: http://earth.google.com/
Wikipedia (2001): http://www.wikipedia.org/
 
Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
 
USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act
 
NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy
 
Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness
 
Daniel Bernstein: http://cr.yp.to/djb.html
 
Bruce Schneier: http://www.schneier.com/
 
Cryptography Research: http://www.cryptography.com/
 
Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)
 
Cryptography Org: http://www.cryptography.org/ (Generous links)
 
Scribd: http://www.scribd.com/
 
PGPBoard: http://www.pgpboard.com/
 
The Memory Hole: http://www.thememoryhole.org [Temporarily down]
ProPublica (June 2008): http://www.propublica.org/
 
Government Attic (longtime source of FOI to others): http://www.governmentattic.org/
 
Public Intelligence: http://publicintelligence.net/
 
Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)
 
History Anarchy Blog: http://historyanarchy.blogspot.com/
 
WikiSpooks: http://www.wikispooks.com/
 
Cryptocomb: http://cryptocomb.org/
 
29 June 2012
Compedium of the ever-growing leak sites: http://leakdirectory.org/index.php/Leak_Site_Directory
 
7 July 2012
Project PM: Tracking the Spy Industry: http://wiki.echelon2.org/wiki/Main_Page
 
Anonymous Analytics: http://anonanalytics.com/
 
Par:AnoIA - Potentially Alarming Research: Anonymous Intelligence Agency: http://www.par-anoia.net/

http://cryptome.org/0002/siss.htm#Wikileaks