voir-dire.pdf The Juridical City State of Exception October 27, 2010 (3.4MB)
wikileaks-after.htm After Wikileaks What Next October 27, 2010
virginia-thomas.htm Virginia Thomas Search October 26, 2010
wsj-trap.htm Wall Street Journal Baits a Trap, Bait Bit Now October 26, 2010
nps102710.htm Conjugal Church and State Celebration October 26, 2010
opnav-3120-33b-c5.zip Submarine Engineered Operating Cycle Program October 25, 2010 (785KB)
fincen102610.pdf Transfer-Reorg of Bank Secrecy Act Regulations October 25, 2010 (741KB)
cryptome-punked.htm Cryptome May Be Punked October 25, 2010
dod102510.htm Defense Cargo Riding Gang Members October 25, 2010
obama-protect36.htm Obama Protection 36 October 23, 2010
clsid-list-07.htm CLSID Shit List 7 October 23, 2010
clsid-beyond2.htm CLSID Shitlist Series Beyond - Response October 23, 2010
hts-fail.htm Army Fails to Fix Human Terrain System October 23, 2010
wikileaks-feed.htm Wikileaks Feedback October 23, 2010
DTM-09-007.pdf DoD Full Cost of War Staffing October 23, 2010
DTM-09-032.pdf DoD Open-Air Burn Pits October 23, 2010
doe102510.pdf Megadeath Fun Back End Waste Disposal October 23, 2010
centcom102210.zip CENTCOM List of Files Transferred to NARA October 23, 2010 (1.2MB)
wikileaks-book.htm Wikileaks Conference Booking Form October 22, 2010
cryptome-hack6.htm Cryptome Hackers May Be Feds - Wikileaks Hit Too October 22, 2010
dol102210.htm Definition of the Term Fiduciary October 22, 2010
clsid-beyond.htm CLSID Shitlist Series Beyond October 20, 2010
zachary-chesser.htm South Park Jihadist Pleads Guilty October 20, 2010
wikileaks-feint.htm Wikileaks Feint October 20, 2010
polyhub-spy.htm NSF Polyhub Online Spying October 19, 2010
wikileaks-hook.htm Wikileaks Hook - First Amendment Under Attack October 19, 2010
wikileaks-unlike.htm Wikileaks Unlike Cryptome October 18, 2010
sec101910.pdf Review of Assets Backed Securities Offerings October 18, 2010
acs-spy-fee.pdf ACS Law Firm High Fee for ISP Spy Compliance October 18, 2010
au-merc-10.pdf AU National Security Exercise Mercury 10 October 18, 2010
cryptome-hack5.htm "Xyrix" "Virus" "Null" "Trainreq" Linked October 17, 2010
centcom-sigacts.htm CENTCOM Iraq War SIGACTS - Wikileaks Pre-Empt? October 17, 2010
wikileaks-rich.htm Wikileaks How Rich Update October 17, 2010
fda101810-2.pdf Testing Medical Device Radiation-Emitters October 16, 2010
fda101810.pdf Emergency Plans for Absence of Drugged Workers October 16, 2010
hts-hell.htm Human Terrain System Circles of Hell October 16, 2010
clsid-list-06.htm CLSID Shit List 6 October 15, 2010
[More]
O f f s i t e
ICS-705-1 New Stds for Sensitive Compartmented Info Facs October 27, 2010
ICS-705-2 Stds for Use of Sensitive Compartmented Info October 27, 2010
AF Pork 7000 Afghanistan Reconstruction Contracts October 27, 2010
MC Fool Prince of Monaco Inept Rule October 27, 2010
Fail Safe Failure Shuts Down Squadron of Nuclear Missiles October 27, 2010
WL TC Wikileaks Legal Defense as Press Too Cute? October 27, 2010
WL More Wikileaks to Release Russia, China Logs October 27, 2010
Agee CIA renegade Agees files surface at NYU October 26, 2010
CIA Inc 2 Miles Copeland: CIA Murder Inc 2 October 26, 2010
MC Faith Monaco Masons October 26, 2010
WL Faith Wikileaks And Faith-Based War On Terror October 26, 2010
NBB National Bedbug Blitzkrieg October 26, 2010
MC Thugs 2 Italian Organized Crime in Monaco: Fiorucci October 26, 2010
Lamo Adrian Lamo Logs October 25, 2010
TIP Israel Propaganda for Profit Guide October 25, 2010
MC Thugs 1 Monaco banking and Italian P2 connection October 25, 2010
Nazi Thugs Nazi Sympathizers Exposed October 25, 2010
TOT Seymour Hersh: The Online Threat October 25, 2010
CySec Cyber Security Test Range October 23, 2010
Perp Net Informal International Cops and Spies October 23, 2010
Perl WMD [Joke] Perl and Nuclear Weapons Don't Mix October 23, 2010
NSA Patent Measuring degree of enhancement to voice signal October 22, 2010
NSA Patent Identifying topic of text using nouns October 22, 2010
NSA Patent Method of database searching October 22, 2010
NSA Patent Eliminating loops from a computer program October 22, 2010
NSA Patent Electromagnetic service box October 22, 2010
NNUWA Neo-Nazis Underground World in America October 22, 2010
CIA Inc Miles Copeland: CIA Murder Inc October 22, 2010
MC RC Russian Organized Crime in Monaco October 22, 2010
MC Plot 17 Islamic Militants in Monaco 17 October 22, 2010
Hard Knock CIA: Lessons from Khowst October 20, 2010
RI and RC Russian Spies and Russian Criminals Entwined October 20, 2010
MC Plot 16 Islamic Militants in Monaco 16 October 18, 2010
Read This! Bell System Technical Journal 1922-1983 October 17, 2010
MC Plot 15 Islamic Militants in Monaco 15 October 17, 2010
MC Plot 14 Islamic Militants in Monaco 14 October 16, 2010
MC Plot 13 Islamic Militants in Monaco 13 October 16, 2010
MC Plot 12 Islamic Militants in Monaco 12 October 15, 2010
Cy Grab Bruce Schneier on Cyberwar Power Grab October 15, 2010
MC Plot 11 Islamic Militants in Monaco 11 October 14, 2010
MC Plot 10 Islamic Militants in Monaco 10 October 14, 2010
[More]
|
|
New Cryptome Publication:
New York VOIR DIRE: Interrogating the Juridical City State of
Exception
Deborah Natsios / Cryptome, 27 October 2010
http://cryptome.org/cartome/voir-dire.pdf
(3.4MB)
Initial version presented 17 April 2010, during panel: "Sovereign spaces:
security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG)
http://communicate.aag.org/eseries/aag_org/program/SessionDetail.cfm?SessionID=9569
A sends:
http://www.finemrespice.com/node/93
The [Negative] Net Present Value of Cute
Not only do courts have no patience for cute, technically correct but highly
disruptive legal theories involving technologies they barely understand,
but the ultimate arbiter of whether the facts suggest that the defendant
violated Title X Section Y of this or that statute is probably going to be
a group of twelve people who lack the wherewithal to get out of jury duty."
In summary: Don't get cute.
This little ditty applies rather more directly when the matter involves issues
of unparalleled weight and import to, for instance, the United States.
Entertainingly, a number of commentators, including Ann Woolner (who despite
being the "Legal Affairs Columnist" for Bloomberg seems to apply no legal
analysis to the Wikileaks- or any other affairs- in her columns) have gotten
awfully cute in predicting exactly what sort of immunity (if any) Wikileaks
enjoys with respect to its recent and not so recent dissemination of classified
information.
Despite these works, it doesn't appear that any commentators have applied
the specific facts (or such of them as are publicly known) surrounding the
Wikileaks disclosures to anything like a detailed legal analysis. The fact
is that arguments substantially resembling "Oh, the press is protected, remember
the Pentagon Papers case back in the 1970s?" are simply too cute by half.
Wikileaks may, in fact, be in far deeper water than anyone has bothered to
realize.
Cryptome: That is a very impressive article which I hope Wikileaks will ponder,
as should Cryptome. It matches what our lawyer and his counsel, an ex-US
Attorney, told us over 10 years back. We thanked them for being available
when the real stuff hit the fan rather than the usual bluffs which they
acknowledged was the customary way to outfox miscreants.
Both said, you know, John, you should never tell a lawyer what you are really
up to, officers of the court have higher duties than client confidentiality.
We will never advise you to break the law, but welcome you with open arms
when you do.
No doubt prosecutors will favor easiest-to-prove conspiracy charges to lump
a host of alleged miscreants with demonized Wikileaks, squeeze those lumped,
including volunteers, journalists, lawyers and supporters, to obtain
disavowals, naming names and induced confessions, to reinstitute the very
successful and lucrative Red Scare or more recently its makeover as the Threat
of Global Terrorism. Based on the scramble to get approval from authorities
before publication of Wikileaks material that campaign is working predictably.
The result will be decreased trust in democratic processes and increased
undermining underground. That invisible campaign too is working superbly
with attention focusssed on the easily visible decoy.
More on this topic:
http://cryptome.org/0002/wikileaks-after.htm
http://en.rian.ru/russia/20101026/161087816.html
WikiLeaks to release secret Russia, China logs - paper
Whistleblower website WikiLeaks, which has published hundreds of U.S. war
logs, is preparing to release secret files from Russia and China, a Russian
newspaper said on Tuesday. "Russians are going to find out a lot of interesting
facts about their country," WikiLeaks spokesman Kristinn Hrafnsson told
Kommersant. The main goal of the project was the "despotic regimes
in China, Russia and Central Eurasia," WikiLeaks founder Julian Assange wrote
to potential investors when he launched the website in 2006.
__________
http://www.kommersant.ru/doc.aspx?fromsearch=a4f1a118-069f-4e5a-b583-f1d177b8c228&docsid=1529249
Google translation. "Julian Essendzh" is Julian Assange. "Potential
investors?" That may mean supporters.
http://blog.washingtonpost.com/spy-talk/2010/10/cia_renegade_agees_files_surfa.html
CIA renegade Agees files surface at NYU
The private papers of Philip Agee, the disaffected CIA operative whose
unauthorized publication of agency secrets 35 years ago was arguably far
more damaging than anything WikiLeaks has produced, have been
obtained
by New York University, which plans to make them public next spring.
Cryptome: Keep in touch with:
Spy Talk, Jeff Stein's intelligence for thinking people:
http://voices.washingtonpost.com/spy-talk/
Barton Gellmans' Counterspy:
http://techland.com/author/gellmanb/?iid=redirect-counterspy
A sends:
Last night the PBS News Hour included a segment that addressed what we've
learned from the recently leaked information.
http://www.pbs.org/newshour/bb/military/july-dec10/wikileaks2_10-25.html?print
John Mearsheimer, a West Point graduate, former Air Force officer and professor
at the University of Chicago had this to say:
"It's quite clear from the documents that numerous cases are found where
Americans were reporting these abuses. The problem is that people further
up the chain of command, both the military and civilian individuals, didn't
do anything to stop it. There is no question that the Americans knew what
was going on. It's not like this was happening in the dark, and we only suspected
it and didn't really know about it. We knew about it, and we didn't do anything
to stop it. We effectively turned a blind eye. And this was strategically
foolish and, I think, morally bankrupt."
Afghan Money for Fun
http://www.nytimes.com/2010/10/26/world/asia/26afghan.html
They do give us bags of money yes, yes, it is done, Mr.
Karzai said, responding to questions about a report in The New York Times
on Sunday that Iran sends regular cash payments to his chief of staff, Umar
Daudzai. We are grateful to the Iranians for this.
Patriotism has a price, he said.
The Iranian payments are not large, at least compared with the hundreds of
billions of dollars the United States has spent to oust the Taliban from
power, support Mr. Karzais government and fight a tenacious insurgency
intent on toppling Mr. Karzai.
http://www.defense.gov/releases/release.aspx?releaseid=14005
IMMEDIATE RELEASE No. 979-10
October 26, 2010
DOD Announces New Chief Information Officer
Secretary of Defense Robert M. Gates announced today his appointment of Teri
Takai as Department of Defense Chief Information Officer (CIO). Takai
previously served as CIO for the state of California since 2007 and was a
past president of the National Association of State CIOs. Named one
of Government Technology's Top 25 "Doers, Dreamers and Drivers," Takai will
assume her new duties effective Nov. 7.
On Aug. 9, 2010, Gates announced the disestablishment of the Assistant Secretary
of Defense for Networks and Information Integration (ASD NII) while strengthening
the current CIO position. As one of the country's most significant
users of information technology (IT), it is critical that the DoD streamline
its IT management and infrastructure to drive increased information security
and agility. Additionally, the billions of dollars that are spent by
the DoD every year must be rationalized to ensure IT is used in the most
cost-effective manner. The new CIO position will be central to these
efforts as the DoD continues to transform its IT capabilities to meet the
enormous mission critical needs of the U.S. military.
Takai brings her wealth of experience to this critical task and will help
lead the effort to disestablish NII and define the successor CIO
organization. Accordingly, Takai will also temporarily serve as the
Acting ASD NII during this transition period.
B sends:
The PERL
WMD article is an April Fool's joke, as anagramming the author's name
will confirm.
|
October 2010
fincen101510.htm New Bank Secrecy Suspicious Activities Database October 15, 2010
doe101510.htm Fossil Energy Use Reduction in Federal Buildings October 15, 2010
wikileaks-sued.htm Wikileaks Sued in Germany October 14, 2010
thug-mugshots.htm "Xyrix" "Virus" "Null" Hacker-Thug Mug Shots October 14, 2010
boem101410.pdf Outer Continental Shelf Energy Safety Measures 1 October 12, 2010
boem101410-2.pdf Outer Continental Shelf Energy Safety Measures 2 October 12, 2010
cryptome-offer.htm Cryptome Offer to Hackers and Wired October 11, 2010
cryptome-nobreach.htm Cryptome Not "Breached" October 11, 2010
dos101210.htm US Pays Afghan Wed to Taliban Al Qaeda Drugs October 11, 2010
doe100510-2.pdf Smart Grid Data Access and Privacy October 11, 2010
doe100510.pdf Smart Grid Communications Requirements October 11, 2010
perras-hacknot.htm "Justin Perras" Disavows Cryptome Hack Update October 10, 2010
tla-rico.htm TLAs Racketeer To Protect Killer Agent October 10, 2010
hts-contract.htm Sources Sought to Run Human Terrain System October 9, 2010
clsid-list-05.htm CLSID Shit List 5 October 9, 2010
cryptome-hack4.htm Cryptome Hackers and Consequences Update October 9, 2010
dodd-3025-13.pdf DoD Support of the US Secret Service October 9, 2010
DTM-10-018.pdf Law Enforcement Reports of Suspicious Activities October 9, 2010
cryptome-hack3.htm Cryptome Hack 3 Updated October 8, 2010
fhwa100710.htm New Bridge Construction and Repair Materials October 7, 2010
doa100710.htm Army Bountiful Warmaking Business Offered October 7, 2010
dea100610.htm ok Drug Pushers Prescribed October 7, 2010
wired-crime.htm Wired Complicit in Federal Crimes by Hacker October 5, 2010
af-war-women-10-03 Afghanistan Wartime Women March 2010 October 5, 2010
wikileaks-bullied.htm Wikileaks Bullied by AU Attorney General October 5, 2010
doc100510.pdf Internet Copyright Creativity Innovation Inquiry October 4, 2010
ellsberg-wlmail.htm Ellsberg Documentary via Wikileaks Maillist October 4, 2010
af-war-women-10-05 Afghanistan Wartime Women May 2010 October 4, 2010
wikileaks-unpub.htm Wikileaks Upload Unpublished October 4, 2010
europe-alert.htm US Issues Europe Travel Alert October 3, 2010
af-war-women-10-094 Afghanistan Wartime Women Sep 2010 Pt 4 October 3, 2010
af-war-women-10-04 Afghanistan Wartime Women April 2010 October 3, 2010
cia-cryptome.pdf CIA Classifies Cryptome Dossier October 2, 2010
DTM-09-031.pdf Recording Intelligence Interrogations of Persons October 2, 2010
DTM-09-012.pdf DoD Physical Access Control Policy October 2, 2010
DTM-08-004.pdf DoD Physical Access Control Policy Guidance October 2, 2010
soyuz-tma18.htm Soyuz TMA-18 Space Capsule Landing Photos October 1, 2010
myrtus-v-myRTUs.htm Stuxnet Myrtus or MyRTUs? October 1, 2010
cyber092310.pdf Cyber Command House Testimony October 1, 2010
navy-cyber.pdf Navy Cyber Command House Testimony October 1, 2010
marines-cyber.pdf Marines Cyber Command House Testimony October 1, 2010
army-cyber.pdf Army Cyber Command House Testimony October 1, 2010
airforce-cyber.pdf Air Force Cyber Command House Testimony October 1, 2010
doj100110.htm Adobe Apple Google Intel Intuit Pixar Jobs Plot October 1, 2010
nnsa100110.htm LANL WMD Building Revised EIS October 1, 2010
O f f s i t e
MC Plot 9 Islamic Militants in Monaco 9 October 14, 2010
MC Plot 8 Islamic Militants in Monaco 8 October 13, 2010
MC Plot 7 Islamic Militants in Monaco 7 October 12, 2010
MC Plot 6 Islamic Militants in Monaco 6 October 12, 2010
MC Plot 5 Islamic Militants in Monaco 5 October 12, 2010
MC Plot 4 Islamic Militants in Monaco 4 October 11, 2010
MC Plot 3 Islamic Militants in Monaco 3 October 10, 2010
DIA Logs Defense Spy Agency's FOIA logs for FYs 2007-2009 October 9, 2010
IR Strike Iran with Capability to Strike US by 2014 October 9, 2010
MC Plot 2 Islamic Militants in Monaco 2 October 9, 2010
FBI SOS FBI Student Tracking Device October 8, 2010
MC Plot 1 Islamic Militants in Monaco 1 October 8, 2010
Cork It Army Warns of Inside Spies for Enemy Media October 5, 2010
Corked Censorship at WikiLeaks event October 4, 2010
NO Leak Norway Media Leaks Latest Wikileaks AF Leak October 1, 2010
Cryptome welcomes documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology,
dual-use technologies, national security, intelligence, and secret governance
-- open, secret and classified documents -- but not limited to those. Documents
are removed from this site only by order served directly by a US court having
jurisdiction. No court order has ever been served; any order served will
be published here -- or elsewhere if gagged by order. Bluffs will be published
if comical but otherwise ignored.
Email: cryptome[at]earthlink.net
Mail: John Young, Cryptome, 251 West 89th Street, New York, NY 10024
Checks/Money Orders: Make out to "John Young"
Fax: 212-787-6102 (Call ahead: 212-873-8700)
Cryptome Essays, Deborah Natsios
New Cryptome Publication:
New York VOIR DIRE: Interrogating the Juridical City State of
Exception
Deborah Natsios / Cryptome, 27 October 2010
http://cryptome.org/cartome/Natsios-Voir-Dire.pdf
(3.4MB)
Initial version presented 17 April 2010, during panel: "Sovereign spaces:
security after the war on terror"
2010 Annual Meeting, Association of American Geographers (AAG)
http://communicate.aag.org/eseries/aag_org/program/SessionDetail.cfm?SessionID=9569
Les Oiseaux Beyond Empire: Schoolgirl Quarantines from Dalat to the rue
de Sevres
Not online
Watchlisting the Diaspora
Presented 3 October 2008: Centre de Cultura Contemporània de Barcelona
(CCCB)
Targeted Publics: Arts and Technologies of the Security City
http://www.cccb.org/en/curs_o_conferencia-targeted_publics-25780
Expanded and to be published as:
Common Lines of Flight Towards the Open City: Architectural Theory, Security
and the Global City
The SAGE Handbook of Architectural Theory, publication May 2011
http://www.sagepub.com/booksProdDesc.nav?prodId=Book231735#tabview=toc
The Geographer in Jules Romains' 'Donogoo Tonka or the Miracles of Science:
A Cinematographic Tale'
Commentary and digital film presented at Forum Finale, Temple Hoyn Buell
Center for the Study of American Architecture, Graduate School of Architecture,
Planning and Preservation, Columbia University, 5 April 2008.
http://cryptome.org/cartome/Natsios-Donogoo-Tonka.pdf
Towards a New Blast Zone
in Architectures of Fear: Terrorism and the Future of Urbanism in the
West, Urbanitats, No. 19, Centre de Cultura Contemporània de Barcelona
(CCCB), Barcelona 2008.
Paper presented 18 May 2007, at the symposium Architectures of Fear:
Terrorism and the Future of Urbanism in the West, Centre de Cultura
Contemporània de Barcelona (CCCB), Barcelona.
http://cryptome.org/cartome/blast-zone/Towards-a-New-Blast-Zone.pdf
National Security Sprawl
In Sensing the 21st Century City: Close-Up and Remote
AD Architectural Design
Vol. 75 No. 6 Nov/Dec 2005
Brian McGrath and Grahame Shane (eds.)
Wiley-Academy (London)
http://cryptome.org/cartome/nss/Natsios-NSS.htm
Jerusalem Sky
In The Next Jerusalem : Sharing the Divided City, Ed. Michael Sorkin
2002 Monacelli Press, New York, NY
http://cryptome.org/cartome/jerusalem-sky/introduction.htm
Parallel Atlas: 38°N
Version 10, May 2002
http://cryptome.org/cartome/parallel-atlas/dmz-intro.htm
Reversing the Panopticon
Invited Talk, 16 August 2001
10th USENIX Security Symposium, Washington, DC.
http://cryptome.org/cartome/reverse-panopticon.htm
Homeland Defense and the Prosecution of Jim Bell
8 June 2001
http://cryptome.org/cartome/homeland.htm
An Aesthetic Theory Based on the Work of Jean-Paul Sartre, John Young,
1962
http://natsios-young.com/sartre-jy-1962.zip
(9.4MB)
|
|
|
|