AP: Cryptome perseveres as a favored site for sharing secrets

Discussion in 'Wikileaks' started by The Wrong Guy, Mar 9, 2013.

  1. The Wrong Guy Member

    Older, less flashy than WikiLeaks, Cryptome perseveres as a favored site for sharing secrets

    By David Crary, The Associated Press, Saturday, March 9

    The FBI came calling after maps of urban rail tunnels and gas lines were posted online. Microsoft aggressively complained following the website’s publication of a confidential handbook on company policies for helping police. Other critics have gone further, warning that some of the postings could aid America’s enemies.

    Yet Cryptome carries on.

    The website, unfamiliar to the general public, is well-known in circles where intelligence tactics, government secrets and whistle-blowing are primary concerns. Since its creation in 1996, Cryptome has amassed more than 70,000 files — including lists of secret agents, high-resolution photos of nuclear power plants, and much more.

    Its co-founder and webmaster, a feisty 77-year-old architect, doesn’t hesitate when asked why.


    “I’m a fierce opponent of government secrets of all kinds,” says John Young. “The scale is tipped so far the other way that I’m willing to stick my neck out and say there should be none.”

    Young describes several exchanges with federal agents over postings related to espionage and potential security breaches, though no charges have ever been filed. And he notes that corporate complaints of alleged copyright violations and efforts to shut Cryptome down have gone nowhere.

    For Young, there’s a more persistent annoyance than these: the inevitable comparisons of Cryptome to WikiLeaks, the more famous online secret-sharing organization launched by Julian Assange and others in 2006.

    Young briefly collaborated with WikiLeaks’ creators but says he was dropped from their network after questioning plans for multimillion-dollar fundraising. Cryptome operates on a minimal budget — less than $2,000 a year, according to Young, who also shuns WikiLeaks-style publicity campaigns.

    “We like the scholarly approach — slow, almost boring,” says Young. He likens Cryptome to a “dusty, dimly lit library.”

    The three-page article is continued at
    • Like Like x 5
  2. Anonymous Member

    awesome site.
    • Like Like x 2
  3. a lot of people left when Julian wanted to sell colateral murder for 250 grand.

    Personal fav "those people deserve to die for collaborating with the us"
  4. Anonymous Member

    Uh, any dox on that?
    • Like Like x 1
  5. 00anon00 Member

    Cryptome routinely get dmca-ed. I'm not sure if there is a standard reply. He seems to leave stuff up in spite of notices.
  6. Anonymous Member

    Hero without the fanfare
    • Like Like x 1
  7. Anonymous Member

  8. Anonymous Member

    John L. Young, the obsessive genius behind Cryptome, has been infuriating governments worldwide for years by assembling a library of sensitive, often classified, information about intelligence-gathering and national security.

    Below is a list of some of his more illuminating chestnuts:
    Dick Cheney's "undisclosed location": Satellite photos and aerial maps of "Site R," a military installation dug into a Pennsylvania mountainside that Young says is Cheney's secret hideaway. He also posted photos he took during a field trip to the site.

    The names and addresses of 2,619 "CIA sources": Young first published this list in December 2000, describing it as a list of CIA sources passed on by an anonymous tipster. It turned out to be the membership directory of the Association for Intelligence Officers, a group largely made up of retired CIA agents. One of the names on the list was Nicholas Natsios, Young's father-in-law, who was a career CIA officer.

    The names of 276 British intelligence agents: Young first published 116 names of agents for MI6, Britain's foreign intelligence arm, in 1999; by 2005 he'd collected 276 names. The British government reportedly tried to get Young's ISP to take the list down; it refused. An MI6 spokesperson told Radar that publishing the names is "unhelpful and dangerous."

    The names of roughly 600 Japanese intelligence agents: After Young published this list of names of operatives for Japan's Public Security Investigation Agency - the Japanese equivalent of the CIA - an FBI agent called Young and asked him to take the names off his site. He refused.
    Satellite photos of CIA director Michael Hayden's home.

    Satellite photos of Donald Rumsfeld's home.

    Photos of the jet fuel tanks and pipelines surrounding John F. Kennedy International Airport, posted immediately after the announcement of a "terrorist plot" to blow them up in June.
    Photos of Bill O'Reilly's Long Island home.

    A roundup of information and photos detailing Secret Service tactics for presidential protection.
    • Like Like x 1
  9. Anonymous Member

  10. The Wrong Guy Member

    • Like Like x 1
  11. Anonymous Member

    • Like Like x 1
  12. The Wrong Guy Member

    Cryptome suffers brief take-down over Japanese 'terror' files | The Register

    Bitten by attack dog, just a flesh wound

    By Richard Chirgwin

    Longstanding whistleblower site is back online after a brief takedown, sparked by its hosting of a list of alleged Japanese terrorists.

    The takedown by host Network Solutions came as a result of a complaint signed Sima Jiro, who complained that the 114 documents in a file identified as contained “lots of personal information, such as named, DOBs, family structures, workplaces, phone numbers. And also containing lots of documents which are probably classified or confidential”.

    The complainant also hoped not to be identified to Cryptome: “I sincerely ask you to refrain from sending my request forward to your customer or administrator of “Cryptome” or the uploader of the ZIP file.”

    Network Solutions initially complied with the request. However – presumably following some discussion between John Young and Network Solutions – it has now been restored.

    Young is no stranger to takedowns. His site, an anonymous drop-box for whistleblowers which documents both corporate and government shenanigans, has been variously attacked with notices from Microsoft (taken down and then restored), Yahoo! (taken down and restored), and PayPal (banned then unbanned).

    Continued with open comments at
    • Like Like x 2
  13. The Wrong Guy Member

    WikiLeaks @wikileaks · 6h
    #Cryptome shutdown by NetSol following malware claim

    Cryptome Attacked and Censored by Webcom and Network Solutions

    25 June 2015. Update:

    Via Twitter @cryptomeorg:

    NetSol rushed to reactivate Cryptome. No deal. Henceforth only SM will be used to exchange information. To hell with arrogant dirty ISPs.

    Cryptome has been dispersed. Files will appear expectedly and unexpectedly at diverse locations online and off.

    Besides pastes, drops, torrent, implants, hides, Cryptome has over a dozen sites for dispersed distribution, more coming. Got means-methods?

    By sites and outlets is not meant only online, current leader of dirty work posing as clean.

    25 June 2014

    Cryptome Attacked and Censored by Webcom and Network Solutions

    Cryptome sees the and NetSol suspension of without prior notice to be as illegal and vicious as an attack by government, corporation, hacker or spy, and the attack is suspected of being on behalf of those who hope to censor and close sites like Cryptome using craven and shallow technical justifications.

    Use of technical rationales to unpremeditatedly attack and censor are now commonplace by telecommunications providers, similar to the technical transgressions against the public by NSA and FBI, blessed by secret FISC orders and willful secret cooperation of service providers. This is an instance of that violation of customer trust.

    On June 23, 2014 at 12:57 PM Cryptome received an email notification of suspension of service from's Network Solutions claiming a single PHP file has been discovered which posed a malware threat:

    Nothing was sent before then about the file, that it should be removed or that a suspension would occur. By time the email was read the site was shut. Immediately after reading the email the PHP file was removed by FTP and a response to NetSol was emailed reporting the removal.

    More at
    • Like Like x 2
  14. The Wrong Guy Member

    Cryptome@Cryptomeorg 3s 2 seconds ago
    Intelligence Community FOIA for Snowden Negotiations

    From: John Young <>
    Subject: FOIA Request

    I request records of the US Intelligence Community on exchanges, inquiries, directives, correspondence, telephone calls, emails, mail, meetings, shipment with the recipients of documents reportedly released by Edward Snowden to Glenn Greenwald, Laura Poitras, Ewan McAllister and Barton Gellman; their representatives, publishers, financiers, agents and attorneys; and any other party involved in consultation and/or communication with the US Intelligence Community concerning what documents to publish or not publish, what to redact in published documents, and any other joint and unilateral determination, prescription and schedule for releasing documents to the public; or for their withholding, return, destruction, for monetary remuneration, ransom, and/or barter for pardon and/or amnesty for Edward Snowden.

    This material will be published on the free public education website I agree to pay for associated cost.

    Thank you.

    John Young
    • Like Like x 3
  15. Disambiguation Global Moderator

  16. The Wrong Guy Member

    Someone Stole the Encryption Keys of WikiLeaks Precursor 'Cryptome' | Motherboard

    The PGP encryption keys of established leaking and archival site Cryptome have reportedly been compromised, according to John Young, one of the owners of the site.

    Yesterday, a message written by Young on read: “I have learned today that all PGP public keys of John Young and Cryptome have been compromised.”

    The message then says that those affected keys have been revoked, meaning that they shouldn't be used, and that two others have been generated in their place.

    PGP, or Pretty Good Privacy, works by using two related encryption keys. When an attacker obtains the secret key, they can attempt to decrypt any communications or files sent to the affected party.

    It is unclear how the keys were compromised, Young told Motherboard in an encrypted email. “Not conclusive yet, but initial review is that an isolated secure storage medium was accessed. Further review should give a better picture with possibility of decoy or diversion from other breach(es).”

    As for why he thinks the Cryptome keys have been compromised, Young said “Encrypted material discovered in plain text. Not ready to reveal where and how discovered, nor nature of the material.”

    Continued here:
    • Like Like x 1

Share This Page

Customize Theme Colors


Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins