SUPPORT WELCOMED By $25 or more generous donation for two DVDs of the Cryptome 14-year archive from June 1996 to April 2010. The archive contains about 56,300 files (~8.5GB) published on Cryptome.org and its related sites along with the companion site Cartome.org and US Army INSCOM Dossiers of about 25,000 pages.The DVDs will be sent anywhere worldwide without extra cost. Email a shipping address to cryptome[at]earthlink.net. How to Donate



voir-dire.pdf         The Juridical City State of Exception            October 27, 2010 (3.4MB)
wikileaks-after.htm   After Wikileaks What Next                        October 27, 2010

virginia-thomas.htm   Virginia Thomas Search                           October 26, 2010
wsj-trap.htm          Wall Street Journal Baits a Trap, Bait Bit Now   October 26, 2010
nps102710.htm         Conjugal Church and State Celebration            October 26, 2010 
opnav-3120-33b-c5.zip Submarine Engineered Operating Cycle Program     October 25, 2010 (785KB)
fincen102610.pdf      Transfer-Reorg of Bank Secrecy Act Regulations   October 25, 2010 (741KB)

cryptome-punked.htm   Cryptome May Be Punked                           October 25, 2010
dod102510.htm         Defense Cargo Riding Gang Members                October 25, 2010
obama-protect36.htm   Obama Protection 36                              October 23, 2010
clsid-list-07.htm     CLSID Shit List 7                                October 23, 2010
clsid-beyond2.htm     CLSID Shitlist Series Beyond - Response          October 23, 2010

hts-fail.htm          Army Fails to Fix Human Terrain System           October 23, 2010
wikileaks-feed.htm    Wikileaks Feedback                               October 23, 2010
DTM-09-007.pdf        DoD Full Cost of War Staffing                    October 23, 2010
DTM-09-032.pdf        DoD Open-Air Burn Pits                           October 23, 2010
doe102510.pdf         Megadeath Fun Back End Waste Disposal            October 23, 2010

centcom102210.zip     CENTCOM List of Files Transferred to NARA        October 23, 2010 (1.2MB)
wikileaks-book.htm    Wikileaks Conference Booking Form                October 22, 2010
cryptome-hack6.htm    Cryptome Hackers May Be Feds - Wikileaks Hit Too October 22, 2010
dol102210.htm         Definition of the Term Fiduciary                 October 22, 2010
clsid-beyond.htm      CLSID Shitlist Series Beyond                     October 20, 2010

zachary-chesser.htm   South Park Jihadist Pleads Guilty                October 20, 2010
wikileaks-feint.htm   Wikileaks Feint                                  October 20, 2010
polyhub-spy.htm       NSF Polyhub Online Spying                        October 19, 2010
wikileaks-hook.htm    Wikileaks Hook - First Amendment Under Attack    October 19, 2010
wikileaks-unlike.htm  Wikileaks Unlike Cryptome                        October 18, 2010

sec101910.pdf         Review of Assets Backed Securities Offerings     October 18, 2010
acs-spy-fee.pdf       ACS Law Firm High Fee for ISP Spy Compliance     October 18, 2010
au-merc-10.pdf        AU National Security Exercise Mercury 10         October 18, 2010
cryptome-hack5.htm    "Xyrix" "Virus" "Null" "Trainreq" Linked         October 17, 2010
centcom-sigacts.htm   CENTCOM Iraq War SIGACTS - Wikileaks Pre-Empt?   October 17, 2010

wikileaks-rich.htm    Wikileaks How Rich Update                        October 17, 2010
fda101810-2.pdf       Testing Medical Device Radiation-Emitters        October 16, 2010
fda101810.pdf         Emergency Plans for Absence of Drugged Workers   October 16, 2010
hts-hell.htm          Human Terrain System Circles of Hell             October 16, 2010
clsid-list-06.htm     CLSID Shit List 6                                October 15, 2010




[More]

O f f s i t e 



ICS-705-1             New Stds for Sensitive Compartmented Info Facs   October 27, 2010

ICS-705-2             Stds for Use of Sensitive Compartmented Info     October 27, 2010 
AF Pork               7000 Afghanistan Reconstruction Contracts        October 27, 2010
MC Fool               Prince of Monaco Inept Rule                      October 27, 2010
Fail Safe             Failure Shuts Down Squadron of Nuclear Missiles  October 27, 2010
WL TC                 Wikileaks Legal Defense as Press Too Cute?       October 27, 2010

WL More               Wikileaks to Release Russia, China Logs          October 27, 2010
Agee                  CIA renegade Agee’s files surface at NYU         October 26, 2010
CIA Inc 2             Miles Copeland: CIA Murder Inc 2                 October 26, 2010
MC Faith              Monaco Masons                                    October 26, 2010
WL Faith              Wikileaks And Faith-Based War On Terror          October 26, 2010

NBB                   National Bedbug Blitzkrieg                       October 26, 2010
MC Thugs 2            Italian Organized Crime in Monaco: Fiorucci      October 26, 2010
Lamo                  Adrian Lamo Logs                                 October 25, 2010
TIP                   Israel Propaganda for Profit Guide               October 25, 2010
MC Thugs 1            Monaco banking and Italian P2 connection         October 25, 2010

Nazi Thugs            Nazi Sympathizers Exposed                        October 25, 2010
TOT                   Seymour Hersh: The Online Threat                 October 25, 2010
CySec                 Cyber Security Test Range                        October 23, 2010
Perp Net              Informal International Cops and Spies            October 23, 2010
Perl WMD  [Joke]      Perl and Nuclear Weapons Don't Mix               October 23, 2010

NSA Patent            Measuring degree of enhancement to voice signal  October 22, 2010
NSA Patent            Identifying topic of text using nouns            October 22, 2010
NSA Patent            Method of database searching                     October 22, 2010
NSA Patent            Eliminating loops from a computer program        October 22, 2010
NSA Patent            Electromagnetic service box                      October 22, 2010

NNUWA                 Neo-Nazis Underground World in America           October 22, 2010
CIA Inc               Miles Copeland: CIA Murder Inc                   October 22, 2010 
MC RC                 Russian Organized Crime in Monaco                October 22, 2010
MC Plot 17            Islamic Militants in Monaco 17                   October 22, 2010
Hard Knock            CIA: Lessons from Khowst                         October 20, 2010

RI and RC             Russian Spies and Russian Criminals Entwined     October 20, 2010
MC Plot 16            Islamic Militants in Monaco 16                   October 18, 2010
Read This!            Bell System Technical Journal 1922-1983          October 17, 2010
MC Plot 15            Islamic Militants in Monaco 15                   October 17, 2010
MC Plot 14            Islamic Militants in Monaco 14                   October 16, 2010

MC Plot 13            Islamic Militants in Monaco 13                   October 16, 2010
MC Plot 12            Islamic Militants in Monaco 12                   October 15, 2010
Cy Grab               Bruce Schneier on Cyberwar Power Grab            October 15, 2010
MC Plot 11            Islamic Militants in Monaco 11                   October 14, 2010
MC Plot 10            Islamic Militants in Monaco 10                   October 14, 2010


[More]

New Cryptome Publication:

New York VOIR DIRE: Interrogating the Juridical City State of Exception
Deborah Natsios / Cryptome, 27 October 2010

http://cryptome.org/cartome/voir-dire.pdf (3.4MB)

Initial version presented 17 April 2010, during panel: "Sovereign spaces: security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG)

http://communicate.aag.org/eseries/aag_org/program/SessionDetail.cfm?SessionID=9569


A sends:

http://www.finemrespice.com/node/93

The [Negative] Net Present Value of Cute

Not only do courts have no patience for cute, technically correct but highly disruptive legal theories involving technologies they barely understand, but the ultimate arbiter of whether the facts suggest that the defendant violated Title X Section Y of this or that statute is probably going to be a group of twelve people who lack the wherewithal to get out of jury duty."

In summary: Don't get cute.

This little ditty applies rather more directly when the matter involves issues of unparalleled weight and import to, for instance, the United States.

Entertainingly, a number of commentators, including Ann Woolner (who despite being the "Legal Affairs Columnist" for Bloomberg seems to apply no legal analysis to the Wikileaks- or any other affairs- in her columns) have gotten awfully cute in predicting exactly what sort of immunity (if any) Wikileaks enjoys with respect to its recent and not so recent dissemination of classified information.

Despite these works, it doesn't appear that any commentators have applied the specific facts (or such of them as are publicly known) surrounding the Wikileaks disclosures to anything like a detailed legal analysis. The fact is that arguments substantially resembling "Oh, the press is protected, remember the Pentagon Papers case back in the 1970s?" are simply too cute by half. Wikileaks may, in fact, be in far deeper water than anyone has bothered to realize.

Cryptome: That is a very impressive article which I hope Wikileaks will ponder, as should Cryptome. It matches what our lawyer and his counsel, an ex-US Attorney, told us over 10 years back. We thanked them for being available when the real stuff hit the fan rather than the usual bluffs which they acknowledged was the customary way to outfox miscreants.

Both said, you know, John, you should never tell a lawyer what you are really up to, officers of the court have higher duties than client confidentiality. We will never advise you to break the law, but welcome you with open arms when you do.

No doubt prosecutors will favor easiest-to-prove conspiracy charges to lump a host of alleged miscreants with demonized Wikileaks, squeeze those lumped, including volunteers, journalists, lawyers and supporters, to obtain disavowals, naming names and induced confessions, to reinstitute the very successful and lucrative Red Scare or more recently its makeover as the Threat of Global Terrorism. Based on the scramble to get approval from authorities before publication of Wikileaks material that campaign is working predictably. The result will be decreased trust in democratic processes and increased undermining underground. That invisible campaign too is working superbly with attention focusssed on the easily visible decoy.

More on this topic: http://cryptome.org/0002/wikileaks-after.htm


http://en.rian.ru/russia/20101026/161087816.html

WikiLeaks to release secret Russia, China logs - paper

Whistleblower website WikiLeaks, which has published hundreds of U.S. war logs, is preparing to release secret files from Russia and China, a Russian newspaper said on Tuesday. "Russians are going to find out a lot of interesting facts about their country," WikiLeaks spokesman Kristinn Hrafnsson told Kommersant. The main goal of the project was the "despotic regimes in China, Russia and Central Eurasia," WikiLeaks founder Julian Assange wrote to potential investors when he launched the website in 2006.

__________

http://www.kommersant.ru/doc.aspx?fromsearch=a4f1a118-069f-4e5a-b583-f1d177b8c228&docsid=1529249
Google translation. "Julian Essendzh" is Julian Assange. "Potential investors?" That may mean supporters.

[Image]


http://blog.washingtonpost.com/spy-talk/2010/10/cia_renegade_agees_files_surfa.html

CIA renegade Agee’s files surface at NYU

The private papers of Philip Agee, the disaffected CIA operative whose unauthorized publication of agency secrets 35 years ago was arguably far more damaging than anything WikiLeaks has produced, have been obtained by New York University, which plans to make them public next spring.

Cryptome: Keep in touch with:

Spy Talk, Jeff Stein's intelligence for thinking people: http://voices.washingtonpost.com/spy-talk/

Barton Gellmans' Counterspy: http://techland.com/author/gellmanb/?iid=redirect-counterspy


A sends:

Last night the PBS News Hour included a segment that addressed what we've learned from the recently leaked information.

http://www.pbs.org/newshour/bb/military/july-dec10/wikileaks2_10-25.html?print

John Mearsheimer, a West Point graduate, former Air Force officer and professor at the University of Chicago had this to say:

"It's quite clear from the documents that numerous cases are found where Americans were reporting these abuses. The problem is that people further up the chain of command, both the military and civilian individuals, didn't do anything to stop it. There is no question that the Americans knew what was going on. It's not like this was happening in the dark, and we only suspected it and didn't really know about it. We knew about it, and we didn't do anything to stop it. We effectively turned a blind eye. And this was strategically foolish and, I think, morally bankrupt."


Afghan Money for Fun

http://www.nytimes.com/2010/10/26/world/asia/26afghan.html

“They do give us bags of money — yes, yes, it is done,” Mr. Karzai said, responding to questions about a report in The New York Times on Sunday that Iran sends regular cash payments to his chief of staff, Umar Daudzai. “We are grateful to the Iranians for this.”

“Patriotism has a price,” he said.

The Iranian payments are not large, at least compared with the hundreds of billions of dollars the United States has spent to oust the Taliban from power, support Mr. Karzai’s government and fight a tenacious insurgency intent on toppling Mr. Karzai.


http://www.defense.gov/releases/release.aspx?releaseid=14005

IMMEDIATE RELEASE No. 979-10

October 26, 2010

DOD Announces New Chief Information Officer

                 Secretary of Defense Robert M. Gates announced today his appointment of Teri Takai as Department of Defense Chief Information Officer (CIO).  Takai previously served as CIO for the state of California since 2007 and was a past president of the National Association of State CIOs.  Named one of Government Technology's Top 25 "Doers, Dreamers and Drivers," Takai will assume her new duties effective Nov. 7.

                On Aug. 9, 2010, Gates announced the disestablishment of the Assistant Secretary of Defense for Networks and Information Integration (ASD NII) while strengthening the current CIO position.  As one of the country's most significant users of information technology (IT), it is critical that the DoD streamline its IT management and infrastructure to drive increased information security and agility.  Additionally, the billions of dollars that are spent by the DoD every year must be rationalized to ensure IT is used in the most cost-effective manner.  The new CIO position will be central to these efforts as the DoD continues to transform its IT capabilities to meet the enormous mission critical needs of the U.S. military.

                Takai brings her wealth of experience to this critical task and will help lead the effort to disestablish NII and define the successor CIO organization.  Accordingly, Takai will also temporarily serve as the Acting ASD NII during this transition period.


B sends:

The PERL WMD article is an April Fool's joke, as anagramming the author's name will confirm.


Military Casualties

Iraq Civilian Dead Wounded Care War Contracts

October 2010 fincen101510.htm New Bank Secrecy Suspicious Activities Database October 15, 2010 doe101510.htm Fossil Energy Use Reduction in Federal Buildings October 15, 2010 wikileaks-sued.htm Wikileaks Sued in Germany October 14, 2010 thug-mugshots.htm "Xyrix" "Virus" "Null" Hacker-Thug Mug Shots October 14, 2010 boem101410.pdf Outer Continental Shelf Energy Safety Measures 1 October 12, 2010 boem101410-2.pdf Outer Continental Shelf Energy Safety Measures 2 October 12, 2010 cryptome-offer.htm Cryptome Offer to Hackers and Wired October 11, 2010 cryptome-nobreach.htm Cryptome Not "Breached" October 11, 2010 dos101210.htm US Pays Afghan Wed to Taliban Al Qaeda Drugs October 11, 2010 doe100510-2.pdf Smart Grid Data Access and Privacy October 11, 2010 doe100510.pdf Smart Grid Communications Requirements October 11, 2010 perras-hacknot.htm "Justin Perras" Disavows Cryptome Hack Update October 10, 2010 tla-rico.htm TLAs Racketeer To Protect Killer Agent October 10, 2010 hts-contract.htm Sources Sought to Run Human Terrain System October 9, 2010 clsid-list-05.htm CLSID Shit List 5 October 9, 2010 cryptome-hack4.htm Cryptome Hackers and Consequences Update October 9, 2010 dodd-3025-13.pdf DoD Support of the US Secret Service October 9, 2010 DTM-10-018.pdf Law Enforcement Reports of Suspicious Activities October 9, 2010 cryptome-hack3.htm Cryptome Hack 3 Updated October 8, 2010 fhwa100710.htm New Bridge Construction and Repair Materials October 7, 2010 doa100710.htm Army Bountiful Warmaking Business Offered October 7, 2010 dea100610.htm ok Drug Pushers Prescribed October 7, 2010 wired-crime.htm Wired Complicit in Federal Crimes by Hacker October 5, 2010 af-war-women-10-03 Afghanistan Wartime Women March 2010 October 5, 2010 wikileaks-bullied.htm Wikileaks Bullied by AU Attorney General October 5, 2010 doc100510.pdf Internet Copyright Creativity Innovation Inquiry October 4, 2010 ellsberg-wlmail.htm Ellsberg Documentary via Wikileaks Maillist October 4, 2010 af-war-women-10-05 Afghanistan Wartime Women May 2010 October 4, 2010 wikileaks-unpub.htm Wikileaks Upload Unpublished October 4, 2010 europe-alert.htm US Issues Europe Travel Alert October 3, 2010 af-war-women-10-094 Afghanistan Wartime Women Sep 2010 Pt 4 October 3, 2010 af-war-women-10-04 Afghanistan Wartime Women April 2010 October 3, 2010 cia-cryptome.pdf CIA Classifies Cryptome Dossier October 2, 2010 DTM-09-031.pdf Recording Intelligence Interrogations of Persons October 2, 2010 DTM-09-012.pdf DoD Physical Access Control Policy October 2, 2010 DTM-08-004.pdf DoD Physical Access Control Policy Guidance October 2, 2010 soyuz-tma18.htm Soyuz TMA-18 Space Capsule Landing Photos October 1, 2010 myrtus-v-myRTUs.htm Stuxnet Myrtus or MyRTUs? October 1, 2010 cyber092310.pdf Cyber Command House Testimony October 1, 2010 navy-cyber.pdf Navy Cyber Command House Testimony October 1, 2010 marines-cyber.pdf Marines Cyber Command House Testimony October 1, 2010 army-cyber.pdf Army Cyber Command House Testimony October 1, 2010 airforce-cyber.pdf Air Force Cyber Command House Testimony October 1, 2010 doj100110.htm Adobe Apple Google Intel Intuit Pixar Jobs Plot October 1, 2010 nnsa100110.htm LANL WMD Building Revised EIS October 1, 2010 O f f s i t e MC Plot 9 Islamic Militants in Monaco 9 October 14, 2010 MC Plot 8 Islamic Militants in Monaco 8 October 13, 2010 MC Plot 7 Islamic Militants in Monaco 7 October 12, 2010 MC Plot 6 Islamic Militants in Monaco 6 October 12, 2010 MC Plot 5 Islamic Militants in Monaco 5 October 12, 2010 MC Plot 4 Islamic Militants in Monaco 4 October 11, 2010 MC Plot 3 Islamic Militants in Monaco 3 October 10, 2010 DIA Logs Defense Spy Agency's FOIA logs for FYs 2007-2009 October 9, 2010 IR Strike Iran with Capability to Strike US by 2014 October 9, 2010 MC Plot 2 Islamic Militants in Monaco 2 October 9, 2010 FBI SOS FBI Student Tracking Device October 8, 2010 MC Plot 1 Islamic Militants in Monaco 1 October 8, 2010 Cork It Army Warns of Inside Spies for Enemy Media October 5, 2010 Corked Censorship at WikiLeaks event October 4, 2010 NO Leak Norway Media Leaks Latest Wikileaks AF Leak October 1, 2010

Cryptome overview: http://en.wikipedia.org/wiki/Cryptome
Cryptout Recent Listings
Cryptome Archive 1996-Present (closed by bot abuse)
                                      Eyeball Series
Iraq Kill Maim
Cryptome CN
JYA

Other Stuff Contact, Public Key
Cryptome Videos

Cartome
Natsios Young Architects

Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.

Email: cryptome[at]earthlink.net
Mail: John Young, Cryptome, 251 West 89th Street, New York, NY 10024
Checks/Money Orders: Make out to "John Young"
Fax: 212-787-6102 (Call ahead: 212-873-8700)


Cryptome Essays, Deborah Natsios

New Cryptome Publication:

New York VOIR DIRE: Interrogating the Juridical City State of Exception
Deborah Natsios / Cryptome, 27 October 2010

http://cryptome.org/cartome/Natsios-Voir-Dire.pdf (3.4MB)

Initial version presented 17 April 2010, during panel: "Sovereign spaces: security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG)

http://communicate.aag.org/eseries/aag_org/program/SessionDetail.cfm?SessionID=9569

Les Oiseaux Beyond Empire: Schoolgirl Quarantines from Dalat to the rue de Sevres
Not online

Watchlisting the Diaspora
Presented 3 October 2008: Centre de Cultura Contemporània de Barcelona (CCCB)
Targeted Publics: Arts and Technologies of the Security City

http://www.cccb.org/en/curs_o_conferencia-targeted_publics-25780

Expanded and to be published as:

Common Lines of Flight Towards the Open City: Architectural Theory, Security and the Global City
The SAGE Handbook of Architectural Theory, publication May 2011

http://www.sagepub.com/booksProdDesc.nav?prodId=Book231735#tabview=toc

The Geographer in Jules Romains' 'Donogoo Tonka or the Miracles of Science: A Cinematographic Tale'
Commentary and digital film presented at Forum Finale, Temple Hoyn Buell Center for the Study of American Architecture, Graduate School of Architecture, Planning and Preservation, Columbia University, 5 April 2008.

http://cryptome.org/cartome/Natsios-Donogoo-Tonka.pdf

Towards a New Blast Zone
in Architectures of Fear: Terrorism and the Future of Urbanism in the West, Urbanitats, No. 19, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona 2008.

Paper presented 18 May 2007, at the symposium “Architectures of Fear: Terrorism and the Future of Urbanism in the West”, Centre de Cultura Contemporània de Barcelona (CCCB), Barcelona.

http://cryptome.org/cartome/blast-zone/Towards-a-New-Blast-Zone.pdf

National Security Sprawl
In Sensing the 21st Century City: Close-Up and Remote
AD Architectural Design
Vol. 75 No. 6 Nov/Dec 2005
Brian McGrath and Grahame Shane (eds.)
Wiley-Academy (London)

http://cryptome.org/cartome/nss/Natsios-NSS.htm

Jerusalem Sky
In The Next Jerusalem : Sharing the Divided City, Ed. Michael Sorkin
2002 Monacelli Press, New York, NY

http://cryptome.org/cartome/jerusalem-sky/introduction.htm

Parallel Atlas: 38°N
Version 10, May 2002

http://cryptome.org/cartome/parallel-atlas/dmz-intro.htm

Reversing the Panopticon
Invited Talk, 16 August 2001
10th USENIX Security Symposium, Washington, DC.

http://cryptome.org/cartome/reverse-panopticon.htm

Homeland Defense and the Prosecution of Jim Bell
8 June 2001

http://cryptome.org/cartome/homeland.htm

An Aesthetic Theory Based on the Work of Jean-Paul Sartre, John Young, 1962

http://natsios-young.com/sartre-jy-1962.zip (9.4MB)