From Wikipedia, the free encyclopedia
  (Redirected from John Young (Cryptome))
Jump to: navigation, search
Cryptome logo.jpg
Web address
Commercial? Yes
Registration None
Owners John Young, Deborah Natsios
Editors John Young, Deborah Natsios
Launched June 1996; 19 years ago (1996-06)
Current status Active

Cryptome is a 501(c)(3) private foundation[1] created in 1996 by John Young and Deborah Natsios and sponsored by Natsios-Young Architects.[2][3][4][5][6][7][8][9] The site aggregates information about topics including crypto-architecture,[10] freedom of expression, privacy, cryptography, dual-use technologies and military conversion, national security, intelligence, conspiracy theories, government secrecy and protection from electromagnetic radiation.[11][12][13][14]

Cryptome is considered the predecessor of Wikileaks. It is known for publishing the alleged identity of the CIA analyst who located Osama Bin Laden,[15][16] lists of people allegedly associated with the Stasi,[17] and the PSIA,[18] the alleged identity of Irish Republican Army assassin Stakeknife.[19] Cryptome is also known for distributing Stuxnet[20] and the alleged internal emails of the Wikileaks organization[21] Cryptome republished the public surveillance disclosures of Edward Snowden and announced in June 2014 that they would publish all unreleased Snowden documents later that month.[22][23]

Cryptome is controversially known for publishing the location and pictures of vulnerable critical infrastructure and posting guides on "how to attack critical infrastructure" in addition to other instructions for illegal hacking "for those without the patience to wait for whistleblowers".[24][25][26]


Cryptome was created by John Young and Deborah Natsios, both architects by trade. They married just before starting Cryptome.[27][28] The two share editorial duties and both approve all posts.[29] John Young is listed as the principal on Cryptome's trademark application.[30]

John Young[edit]

John Young was born in 1935. He grew up in West Texas, and served in the United States Army Corps of Engineers in Germany (1953–56) and earned degrees in philosophy and architecture from Rice University (1957–63). He went on to receive his graduate degree in architecture from Columbia University in 1969. A self-identified radical, he became an activist and helped create community service group Urban Deadline, where his fellow student-activists initially suspected him of being a police spy.[31] Urban Deadline went on to receive citations from the Citizens Union of the City of New York and the New York City Council, and which later evolved into Cryptome. His work earned him a position on the nominating committee for the Chrysler Award for Innovation in Design in 1998.[32][33][34]

He has worked as an architect, contractor or independent consultant for notable organizations such as the Council on Foreign Relations, the Metropolitan Transportation Authority of New York, Columbia University, W Hotels, Reuters, Opus Dei, the Rockefellers, the Mafia, Five Percenters, the Church of Scientology, the Black Panther Party.[34][35][36][37] According to his CV, in addition to his work as an architect, has worked in space exploration, information distribution and security, as well as safety and health inspection.[38]

He has received citations from the American Society of Mechanical Engineers, the American Society of Civil Engineers and the Legal Aid Society. In 1993, he was awarded the Certificate of Special Congressional Recognition.[32][39][40] He is an anarchist[41] and has stated he doesn't "acknowledge the power of the law."[42]

Deborah Natsios[edit]

Deborah Natsios received her graduate degree in architecture from Princeton University. She has taught architecture and urban design at Columbia University and Parsons The New School for Design, and held seminars at the Pratt Institute and the University of Texas.[43][44] She is the principal of Natsios Young Architects.[45]

In the 1990s, she ran the design studio on Burning Down the White House. In addition to being co-editor for Cryptome, she is responsible for the associated project Cartome, which was founded in in 2011[46] and posts her original critical art and graphical images and other public resources to document sensitive areas. She additionally holds a degree in mathematics from Smith College. She has given talks at the USENIX Annual Technical Conference[47] and Architectures of Fear: Terrorism and the Future of Urbanism in the West,[46] and written on topics ranging from architectural theory[43] and entomofilia,[48] to defenses of Jim Bell and assassination politics.[49]


She is the daughter of Nicholas Natsios, who served as CIA station chief in Greece from 1948-1956, in Vietnam from 1956-1960, in France from 1960-1962, in South Korea from 1962-1965, in Argentina from 1965-1969, in the Netherlands from 1969-1972, and in Iran from 1972-1974.[27][50][51][52][53] While stationed in Vietnam, his deputy was William Colby, the future Director of Central Intelligence.[54] His name was included in the 1996 membership directory of the Association of Former Intelligence Officers, which Cryptome helped to publish.[55][56] Cryptome acknowledged its link to Nicholas four years later, in 2000.[57]

Her cousin is Andrew Natsios.[27] He has served as Administrator of the U.S. Agency for International Development (USAID), U.S. Special Envoy to Sudan, and Vice President of World Vision. Currently, Natsios teaches as Executive Professor at The Bush School of Government and Public Service.


Digital library[edit]

On November 2, 2015, Cryptome stated that their archive contains 99,335 files totaling 42 gigabytes. The website states that in addition to the online archive, and the USB drive archive includes 112 INSCOM dossiers, and 14,000 files taken from ProEnergy Services.[58] On October 21, 2015, the website announced that about 350,000 Wikileaks documents totaling 70 gigabytes were made available on a separate USB.[59] The combined archives contain 444,000 files totaling 62 gigabytes.[60] Cryptome initially said the archives were free to public libraries, then later called it a prank.[59][61][62] As of November 28, 2015 Cryptome disavowed all copies of its archive, including the USB archives and library copies.[63][64]

Download policy[edit]

Users of the online archive are limited to downloading 100 files per day. Cryptome claimed that the online archive "is seeded with a few hidden trojans and viruses" which the server sends to "bots, spiders and siphons" that access more than 100 files per day.[11]

Editorial policy[edit]

According to the website, "Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those."[65]

John Young has said of Cryptome, "We do expect to get false documents but it’s not our job to sort that out."[66] In a 2013 Associated Press article, Young said Cryptome has an "editorial role in selecting files, but we don't tell people what to think about them."[31] Earlier that year, Cryptome wrote to an interviewer, "If a document will annoy, and best, deeply anger, believers in authority then it gets published".[67]

In another interview, Young declared: “Facts are not a trustworthy source of knowledge. Cryptome is not an authoritative source. It’s a source of imaginatory material. Don’t trust Cryptome, we lie to you helplessly. Don’t believe anything you see there.”[68] In the same interview he quoted Cryptome's privacy policy, saying "Cryptome is not trustworthy, and lies."[69][70] When asked about providing context for material, Young said, "We do not believe in 'context.' That is authoritarian nonsense. For the same reason, we do not believe in verification, authentication, background."[67]

The front page of the states that "documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here – or elsewhere if gagged by order."[11] However, documents are removed at the request of both law enforcement as well as individuals.[42][52][71]

Privacy Policy[edit]

Cryptome currently has two privacy policies. The first privacy policy states:

We don't willfully disclose, but that's no assurance with the way the Internet is designed for the convenience of its operators which leaves it open to wizard intruders, greedy marketers and evil authorities. We don't know who's snooping our site and logs with intrusive tools. We see that Verio checks this site regularly; while its courteous sysadmins claim they do not snoop who knows what corruption maddens under-rockers.

So we don't promise false assurances of privacy which dissolve through negligence, duress, business deals, bribes and increasingly sophisticated intrusive technology. We believe it's best to try to protect your privacy with trustworthy and up-to-date armaments -- particularly with the use of anonymizers, strongest encryption and vigilance against snooping -- and to distrust disarming statements of privacy policy that are probably out of date and touch. Or stay far away from an Internet seemingly purpose-built for covert surveillance of unwary users.[72]

In 2003, Cryptome informed users that they have been able to delete logs for (Cryptome's predecessor website) and[73] In late 2008, Cryptome added its second privacy policy stating, "No user data is collected by Cryptome. Logs are deleted several times a day."[74][75] Cryptome had given a similar statement in an answer to a subpoena several years before.[76] However, Cryptome later informed users that Network Solutions forced them to log users and would not allow the logs to be deleted.[77] According to Network Solutions, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[78]

In 2015, it was discovered that Cryptome's USB archives contained web server logs, containing clues to the identities of Cryptome visitors including their IP addresses and what files they had accessed on Cryptome. Cryptome initially denied the logs were real, stating that they had been faked as part of a disinformation campaign. Several days later, Cryptome confirmed the logs were real. The logs had been mailed out to users who ordered the site's archive since they changed web hosts in 2007, which Cryptome blamed on their current ISP, Network Solutions.[79][80][81] Cryptome later added that "there are no accidental leaks", that they pay for the internet, and that the leak succeeded in its intention of creating scandalous publicity to increase visitors to the website.[82][83] Soon after, Cryptome posted pictures of their logs, showing that they had records spanning the sites' history.[84][85] According to Cryptome, the then nineteen years of logs added up to about one terabyte.[86]

Cryptome has warned users that they will not protect the anonymity of their sources, saying "don’t send us stuff and think that we’ll protect you."[70]

Other activities[edit]

Cryptome's trade mark application describes its business as "computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices."[87] Another trade mark application by Cryptome describes "electronic storage of electronic media, namely, images, text and audio data" with a focus on "[s]cientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services."[88]

According to emails sent and published by Cryptome, the website has a three step "crypt-architecture" plan for combining social issues with architectural and security issues. Step one is preventing the removal of social programs like the Bowery Mission and "to valorize them as far more valuable than the best of the best art institutions." Step two relates to Cryptome's Eyeball Series which uses photographs and video recordings to document "national security sensitive infrastructure which handles global and financial communications", and the mass transit system which John Young and Deborah Natsios worked as architectural consultants when they "learned of its appalling insecurity -- which has also been superficially reported, honest coverage denied for alleged security concerns, aka security by obscurity." Cryptome has not publicly discussed step three.[89][90] This project runs parallel to Architome.[10]

Cryptome claims to initiate new disclosure methods every few months.[91][92] In 2014, Cryptome stated that it "operates several sites, twelve of them with NetSol, all of them except, as well as sites hosted by other ISPs."[93]


1968: Urban Deadline is created as an extension of the Columbia strike and the Avery Hall occupation.[94] Three decades later, Cryptome evolves out of Urban Deadline.[95]

1993: John and Deborah meet and their collaboration begins "some time late in 1993".[27][28] John Young receives the Certificate of Special Congressional Recognition.[40]

1994: What will become Cryptome begins with John and Deborah's participation in the Cypherpunks electronic mailing list and Urban Deadline.[27] Deborah Natsios called this time “seminal” and “transformative” for the internet.[28]

1995: Architome, a project parallel to Cryptome, is created.[10]

1996: Cryptome officially begins as part of their architectural practice.[96] In an article written by John Cook, "the closest Young comes to explaining to me why he created Cryptome is this: 'I'm a pretty fucking angry guy.'"[27]

1998: Cryptome complains of attempts by their landlord to harassing them in attempts to force them to vacate their apartment, which Cryptome is run out of. They begin to post documentation of this “for education and information on commercial and residential property practices.” The documentation included their correspondence with the company responsible for the building, but does not include documentation of the “building-wide disruptions” or the damages to their apartment that the page said would be added. The page was later taken down.[97]

1999: In May, Cryptome posts a list of alleged MI6 officers found on a mailing list.[98] In June, is registered.[99] In October journalist Declan McCullagh writes about John Young's perusal of the site's access logs.[39][100][101]

2000: Cartome is founded.[46] In July, two FBI agents speak with Cryptome on the phone after Cryptome publishes a Public Security Intelligence Agency personnel file. The file lists 400 names, birthdates, and titles, notably included Director General Hidenao Toyoshima. The FBI expresses concerns over the file, but admits it was legal to publish in the United States but not Japan. After speculation that the documents may have come from someone called "Shigeo Kifuji", Cryptome identifies the source as Hironari Noda.[18][102]

2002: In January, Cryptome applies for press credentials with New York City. They are denied because they "could not provide letters of reference" regarding their previous press activities.[103] In December the Attorney General issues a subpoena requiring that John Young appear before a grand jury and turn over "all logs recording the I.P. addresses and/or users" who visited Cryptome. John Young posts a notice online declaring that visitor logs are deleted daily,[104] a claim which may be contradicted by statements in 2015 (see below).

2003: In November, Cryptome is visited by two FBI agents from a counter-terrorism office, asking for any information which Cryptome "had a gut feeling" could be a threat to the nation and the purpose of site.[105] Cryptome informs users that they have been able to delete logs for (Cryptome's predecessor website) and[73]

2004: New York City removed warning signs around gas mains after Cryptome posts pictures of them, citing security concerns.[106] In October, Cryptome removed their universal block on web robots.[107][108]

2006: Cryptome becomes one of the early organizers of Wikileaks. John Young reveals that he was approached by Julian Assange and asked to be the public face of Wikileaks; Young agreed and his name was listed on the website's original domain registration form.[109][110][111]

2007: In the early part of the year, John Young and Deborah Natsios leave Wikileaks due to concerns about the organizations' finances and fundraising, accusing it of being a "money-making operation" and "business intelligence" scheme, and expressing concern that the amount of money they sought "could not be needed so soon except for suspect purposes."[109][110][111] Cryptome publishes an archive of the secret, internal electronic mailing list of the Wikileaks organizers, from its inception through Young's departure from the group.[21] On April 20 the website receives notice from its hosting company, Verio, that it would be evicted on May 4 for unspecified breaches of their acceptable use policy.[112][113] Cryptome alleges that the shutdown is a censorship attempt in response to posts about the Coast Guard's Deepwater program.[114] In 2015, Cryptome claims that as a result of changing ISPs at this time, they began mailing out copies of site logs that included potentially identifying information about the site's visitors. (See privacy policy)

2010: Cryptome adds its second privacy policy.[72] Cryptome's Earthlink account is compromised, leading to its website being hacked and Cryptome's data copied. The post screenshots of the compromised email account. Cryptome confirms the accuracy of the information taken, but contests specific assertions, claiming they had only about seven gigabytes of data, not the seven terabytes the attackers claimed to copy.[115] In February, Cryptome is briefly shut down by Network Solutions for alleged DMCA violations after it posted a "Microsoft legal spy manual".[116][117][118] Microsoft withdraws the complaint 3 days later and the website is restored.[119] In March, PayPal stops processing donations to Cryptome and freezes the account due to "suspicious activities". The account is restored after an "investigation" by PayPal.[42][120] Cryptome ends on bad terms with Wikileaks, with John Young directly accusing them of selling classified material and calling them "a criminal organization". He calls Julian Assange's anti-American rhetoric insincere, calling him "just a crowd pleaser".[110] In a separate interview, he calls Assange a narcissistic and compares him to Henry Kissinger. Young accuses George Soros and the Koch brothers of "backing Wikileaks generously".[121]

2011: In July, Cryptome names the CIA analyst who found Osama Bin Laden.[122][123] In September, Cryptome publishes a list of Intelligence and National Security Alliance members, alleging that they were spies. Cryptome removes the names of members from the list upon their requests.[124] Cryptome stops cooperating with the production team for We Steal Secrets: The Story of WikiLeaks upon learning its tentatively titled "Unnamed Wikileaks Project," saying that "the project appears to have retreated into a narrow-focussed commercial theme, perhaps unavoidable in buzzy-headline Media World."[89]

2012: In February, the Cryptome website is hacked to infect visitors with malware.[125] In August, internet hacktivist The Jester accuses Cryptome of running the website Cryptocomb and exposing Mark Owen.[126] Cryptome denies any connection to Cryptocomb or exposing Mark Owen's identity.[127]

2013: In February, Cryptome's website, email and Twitter account are compromised, exposing whistleblowers and sources that had corresponded with Cryptome via email. Cryptome blames hackers Ruxpin and Sabu, who was an FBI informant at the time.[128][129] In June two US Secret Service agents visited Cryptome to request removal of a former presidential Bush family email allegedly hacked by Guccifer.[42] In August, a complaint about Cryptome's identification of alleged Japanese terrorsts leads Network Solutions to briefly shut down the site.[7] In October Cryptome informs its users that Network Solutions has generated logs of site's visitors, and that requests to delete the logs are not being honored.[130] (According to Network Solutions's website, logs are deleted after thirty days and Cryptome could choose to prevent the logging.[131]) In December Cryptome reports receiving a letter attempting to blackmail them. The letter demanded money in exchange for the Guccifer archive and claimed to have embarrassing information about Cryptome and Cryptome's email exchanges.[132]

2014: In January, Cryptome uploads a copy of the Guccifer archive to Google Drive, posting the links on Pastebin and their website.[132] Later that year, Cryptome attempts to raise $100,000 to fund the website and its other disclosure initiatives.[8][133] In June, Cryptome is pulled offline again when malware was found infecting visitors to the site.[134] In July, Cryptome says it would publish the remaining NSA documents taken by Edward Snowden in the "coming weeks".[135] Since then, Cryptome has not published any new Snowden documents.[136]

2015: In August, Cryptome complains of “thieving” web robots and posts allegations that the bots are the result of a “whistlebreaker” project run by SAIC. The alleged project targeted Cryptome and other websites using SecureDrop.[137][138] In September, Cryptome announces that their encryption keys are compromised,[139] then later claims they are not.[140] A few days later, Cryptome files for incorporation in New York.[141] Later that month, a GCHQ document leaked by Edward Snowden reveals that the agency is monitoring visits to Cryptome.[142] Cryptome confirmed the information in the slide, stating that logs showed the IP address "visited Cryptome on dates listed for files shown."[143] In October, a sold edition (USB stick) of the Cryptome archive is observed to contain web server logs, containing clues to the identities of Cryptome visitors. The logs had been mailed out to users who ordered the site's archive at least since 2007. Cryptome denied the logs were real, and ccused the discoverer of forging the data and other forms of corruption. Cryptome later confirmed they were real.[79][80][81][144] One of Cryptome's privacy policies at the time said that "No user data is collected by Cryptome. Logs are deleted several times a day," adding the caveat: "Cryptome is not trustworthy, and lies."[69] Cryptome later added the comment that "there are no accidental leaks".[82] Cryptome posted pictures of logs dating back to the site's creation, claiming that Cryptome is for sale. Cryptome later claims that the sale is a parody and that "Cryptome has no logs, never has", noting that their "various ISPs have copious logs of many kinds" along with metadata and that Cryptome tracks these "to see what happens to our files".[113][143][145][146][147] Later in October, Wikileaks launched a searchable version of the Cryptome archive and Cryptome's tweets.[148] In response, Cryptome criticized Wikileaks and called it "misleading hype", "click bait to garner user data" and a possible honeypot.[149][150][151] Cryptome also criticized Wikileaks' Cryptome search for being "a mess of Google and Archive dumpstering."[152] In November, Cryptome announced it was constructing a SecureDrop system.[153] On November 28, 2015 Cryptome disavowed all copies of its archive, including its USB archives.[154][155]


A 2004 New York Times article assessed Cryptome with the headline, "Advise the Public, Tip Off the Terrorists" in its coverage of the site's gas pipeline maps.[106] Reader's Digest made an even more alarming assessment of the site in 2005, calling it an "invitation to terrorists" and alleging that Young "may well have put lives at risk".[156][157]

The Village Voice featured Cryptome in its 2008 Best of NYC feature, citing its hosting of "photos, facts, and figures" of the Iraq War.[158]

Wikileaks accused Cryptome of executing a "smear campaign" in 2010 after Cryptome posted what it alleged were email exchanges with Wikileaks insiders, which Wikileaks disputed.[115][159][160]

Cryptome was awarded the Defensor Libertatis (defender of liberty) award at the 2010 Big Brother Awards, for a "life in the fight against surveillance and censorship" and for providing "suppressed or otherwise censored documents to the global public". The awards committee noted that Cryptome had engaged with "every protagonist of the military-electronic monitoring complex".[161]

In 2012, Steven Aftergood, the director of the Federation of American Scientists Project on Government Secrecy, described John Young and Cryptome as "fearless and contemptuous of any pretensions to authority” and “oblivious to the security concerns that are the preconditions of a working democracy. And he seems indifferent to the human costs of involuntary disclosure of personal information.” Aftergood specifically criticized Cryptome's handling of the McGurk emails, saying "it’s fine to oppose McGurk or anyone else. It wasn’t necessary to humiliate them".[162][163]

In 2013, Cindy Cohn, then the legal director of the Electronic Frontier Foundation, praised Cryptome as "a really important safety valve for the rest of us, as to what our government is up to."[52]

In 2014, Glenn Greenwald praised and criticized Cryptome, saying "There is an obvious irony to complaining that we're profiting from our work while [Cryptome] tries to raise $100,000 by featuring our work. Even though [Cryptome] occasionally does some repellent and demented things - such as posting the home addresses of Laura Poitras, Bart Gellman, and myself along with maps pointing to our homes - [they also do] things that are quite productive and valuable. On the whole, I'm glad there is a Cryptome and hope they succeed in raising the money they want."[8] When asked about it two months later Young criticized Greenwald, saying that he had not "offered to pay for the publicity," calling the journalist a "deadbeat arrogant leech on other people’s work" for capitalizing on the Snowden disclosures.[91][92]

See also[edit]


  1. ^ Internal Revenue Service (2015-10-19). "Cryptome Incorporated". 
  2. ^ Patrick Howell O'Neill (2014-05-09). "Cryptome, the original WikiLeaks, launches $100,000 Kickstarter". The Daily Dot. 
  3. ^ Joseph Cox (2014-07-06). "Why All the Snowden Docs Should Be Public: An Interview with Cryptome". Vice. 
  4. ^ "Cryptome claims all Snowden files will be published in July to avert a war". RT. 2014-07-01. 
  5. ^ Alexander J Martin (2015-09-16). "Cryptome founder revokes PGP keys after weird 'compromise'". The Register. 
  6. ^ "Deborah Natsios and John Young Bibliography". 2011-10-16. Retrieved 2013-03-09. 
  7. ^ a b "Cryptome suffers brief take-down over Japanese 'terror' files". 
  8. ^ a b c "A Radical Pro-Transparency Website Is Raising Money To Annoy Glenn Greenwald". 
  9. ^ "Cryptome JYA Archive". 
  10. ^ a b c "Architome". 
  11. ^ a b c "Cryptome: Other Stuff". Cryptome. 
  12. ^ "Cryptome Exposes CIA Hypnosis Programs". 
  13. ^ "ja-conspiracies.pdf" (PDF). 
  14. ^ "PROJECTS 1963 TO 1998". 
  15. ^ "Whistleblowing Website Cryptome Hacked, Conspiracy Theories Do Not Abound". 
  16. ^ "How a White House Flickr Fail Outed Bin Laden Hunter 'CIA John'". 
  17. ^ Bruce, Gary (2010). The Firm: The Inside Story of the Stasi. Oxford University Press. p. 32. ISBN 9780195392050. 
  18. ^ a b McCullagh, Declan (2000-07-21). "FBI Pressuring Spy Archivist". Wired. Retrieved 2013-12-28. 
  19. ^ John Ware and Alasdair Palmer (2003-05-18). "Is he or isn't he?". The Daily Telegraph. 
  20. ^ "Stuxnet". 
  21. ^ a b Dan Duray (2010-12-08). "The Original Wikileaker". The New York Observer. .
  22. ^ Cryptome (2015-10-05). "26 Years to Release Snowden Docs by The Guardian". 
  23. ^ "More Edward Snowden Leaks on the Way? New York-based site Cryptome says it will publish the remaining NSA documents that Edward Snowden swiped". 
  24. ^ "Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists". 
  25. ^ "How To Attack Critical Infrastructure, No-Bullshit Guide" (PDF). 
  26. ^ "HackBack!". 
  27. ^ a b c d e f "Secrets and Lies". Archived from the original on March 24, 2008. 
  28. ^ a b c "Open Source Design 01: The architects of information". 
  29. ^ "Search Cryptome Archive - WikiLeaks". 
  30. ^ "Trademark Electronic Search System (TESS)". 
  31. ^ a b "Older, quieter than WikiLeaks, Cryptome perseveres". 
  32. ^ a b "John Young CV". 
  33. ^ "Bibliography and Awards". 
  34. ^ a b "PROJECTS 1963 TO 1998". 
  35. ^ "Cryptome Hackers and Consequences". 
  36. ^ "Laurence Rockefeller Residence Work, 1991". 
  37. ^ "Urban Deadline NYTimes" (PDF). 
  38. ^ "John Young Architect Services". 
  39. ^ a b "He Digs 'Through' Gov't Muck". 
  41. ^ The Daily Show. August 20, 2004. 
  42. ^ a b c d "A Discussion With Cryptome". Gawker. 2013-06-19. Retrieved 2013-11-02. 
  43. ^ a b "The SAGE Handbook of Architectural Theory". 
  44. ^ "Deborah Natsios". 
  45. ^ "Library". 
  46. ^ a b c "Natsios Young Research" (PDF). 
  47. ^ "Reversing the Panopticon". 
  48. ^ "EntomofiliaAtlas". 
  49. ^ "Homeland Defense and the Prosecution of Jim Bell". 
  51. ^ "Nicholas Andrew Natsios Obituary". 
  52. ^ a b c "Older, less flashy than WikiLeaks, Cryptome perseveres as a favored site for sharing secrets". 
  53. ^ "Deborah Natsios, Cryptome, City of Redactions, published March 21, 2015, Currently at Dem Passwords Gallery, LA, March 21-April 11, 2015". 
  54. ^ "CIA and the House of Ngo, Covert Action in South Vietnam, 1954-63" (PDF). 
  55. ^ "Assn. Former Intelligence Officers. Membership Directory. 1996". 
  56. ^ "2,619 CIA Sources: The Crowley Files". 
  57. ^ "Cryptome Discloses Ex-CIA Link". 
  58. ^ "Venezuela-US Corruption 14,000 Files Disclosed". 
  59. ^ a b Cryptome. "Cryptome WikiLeaks Archive 2006-2015". 
  60. ^ "Cryptome". 
  61. ^ "Cryptome Donations". 
  62. ^ "Cryptome on Twitter: "Prank: "Get Your Library To Stock the WikiLeaks and Cryptome Archives At No Cost"". 
  63. ^ "cryptome-nov2015". 
  64. ^ "Cryptome on Twitter: "Cryptome disavows mirrors of its archive due to tampering with files, hashes, signatures and implant insertion."". 
  65. ^ "Cryptome". 
  67. ^ a b "LeaksWiki Continues and Cryptome Interview". 
  68. ^ "An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual Godfather Of Online Leaking'". 
  69. ^ a b "Cryptome Other Stuff". Retrieved 2015-10-11. 
  70. ^ a b "An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual Godfather Of Online Leaking part 2'". 
  71. ^ "US Secret Service Visits Cryptome". 
  72. ^ a b "Site Secrets". 
  73. ^ a b "Verio Un-Balks at Log File Deletion". 
  74. ^ "Other Stuff". 
  75. ^ "Other Stuf". 
  76. ^ "Cryptome Log Subpoenaed". 
  77. ^ "Network Solutions Log File Spying". 
  78. ^ "How To Enable / Download The Web Logs". 
  79. ^ a b "After calling it disinfo, Cryptome admits they leaked their logs". 
  80. ^ a b "Leak site Cryptome accidentally leaks its own visitor IP addresses". The Daily Dotaccessdate = 2015-10-11. 
  81. ^ a b "Cryptome grudgingly admits to leak of users' ancient IP addresses". 
  82. ^ a b "Cryptome on Twitter: "@Dicedotcom @slashdot There are no accidental leaks, denial, fingerpoint, cover-up, confession, award, reward, glory days bore."". 
  83. ^ "Cryptome on Twitter: "@Dicedotcom @slashdot Please distribute widely, our visitor accesses have wild-fired as leaks flamethrowers intend."". 
  84. ^ "Cryptome Stats 1996". 
  85. ^ "Cryptome Logs 2015". 
  86. ^ "Cryptome on Twitter: "Cryptome log files over 19 years: ~1TB. At hops 100 times that farmed, fertilized, fancied up, sold. NetSol to, say."". 
  87. ^ "CRYPTOME - Trademark Details". 
  88. ^ "CRYPTOME - Trademark Details". 
  89. ^ a b "We Steal Secrets-The Story of WikiLeaks". 
  90. ^ "Eyebal Series". 
  91. ^ a b "Cryptome Kills the Kickstarter: an interview with John Young". 
  92. ^ a b "The Cryptosphere Interview of Cryptome". 
  93. ^ "Cryptome Attacked and Censored by Webcom and Network Solutions". 
  94. ^ Howard Gillette Jr. Class Divide: Yale ’64 and the Conflicted Legacy of the Sixties. 
  95. ^ "Older, quieter than WikiLeaks, Cryptome perseveres". 
  96. ^ "Natsios Young Architects". 
  97. ^ "A6E FILES". 
  98. ^ "List of MI6 Officers". 
  99. ^ " Whois Domain History". 
  100. ^ "The NSA Bot". 
  101. ^ "The NSA Bot". 
  102. ^ "FBI Requests PSIA Lists Removal". 2000-07-22. Retrieved 2013-03-09. 
  103. ^ "Cryptome Denied NY Press Credentials". 
  104. ^ "Subpoena for Cryptome's logs". 
  105. ^ "FBI Visits Cryptome". 2003-11-08. Retrieved 2013-03-09. 
  106. ^ a b "Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists". New York Times. 2004-08-29. Retrieved 2015-10-03. 
  107. ^ "Robots.txt". 
  108. ^ "Robots.txt". 
  109. ^ a b "Website for Leaked Data Shines Spotlight on WikiLeaks". 
  110. ^ a b c "WikiLeaks sold classified intel, claims website's co-founder". 
  111. ^ a b "Wikileaks' estranged co-founder becomes a critic (Q&A)". 
  112. ^ "Cryptome Shut by Network Solutions". 2012-03-14. Retrieved 2013-03-09. 
  113. ^ a b Gohring, Nancy (2007-04-30). "Verio dumps controversial Cryptome site". Computerworld. Retrieved 2013-03-09. 
  114. ^ "Cryptome to be Terminated by Verio/NTT - Slashdot". 
  115. ^ a b "Secret-Spilling Sources at Risk Following Cryptome Breach". 
  116. ^ Quigley, Robert (2010-02-24). "Site Leaks Microsoft Online Surveillance Guide, MS Demands Takedown Under Copyright Law (UPDATE 6)". Geekosystem. Retrieved 2013-03-09. 
  117. ^ Diaz, Jesus (2010-02-24). "The Secret Government Surveillance Document Microsoft Doesn’t Want You To See". Gizmodo. Retrieved 2013-03-09. 
  118. ^ "Microsoft Online Services Global Criminal Compliance Handbook" (PDF). Wired. 2010-02-24. Retrieved 2013-03-09. 
  119. ^ "Microsoft Demands Takedown of Microsoft Spy Guide". Cryptome. 2010-02-26. Retrieved 2013-03-09. 
  120. ^ "Now PayPal Goes for Cryptome, Suspends Account". Fast Company. 2010-03-08. Retrieved 2013-05-14. 
  121. ^ "Wikileaks are for-hire mercenaries - Cryptome". 
  122. ^ "CIA John Who Hunted Osama bin Laden Photos". 
  123. ^ "How a White House Flickr Fail Outed Bin Laden Hunter 'CIA John'". 
  124. ^ "INSA spies" (PDF). 
  125. ^ "Breaches galore as Cryptome hacked to infect visitors with malware". 
  126. ^ "JESTER ACTUAL on Twitter: "John Young. Runs 'cryptocomb(dot)org', thinks it clever naming SEALs to AlQaeda: See previous tweet for his apology.". 
  127. ^ "CRYPTOCOMB - cryptocomb-bombast.pdf" (PDF). 
  128. ^ "Cryptome site, Twitter and email account hacked again". 
  129. ^ "Cryptome Email, Website and Twitter Account Hacked". 
  130. ^ "Network Solutions Log File Spying". 
  131. ^ "How To Enable / Download The Web Logs". 
  132. ^ a b "Alleged 7GB Guccifer Archive Offered for Sale". 
  133. ^ "Cryptome Kills the Kickstarter: an interview with John Young". 
  134. ^ "Cryptome pulled OFFLINE due to malware infection: Founder cries foul". 
  135. ^ "More Edward Snowden Leaks on the Way?". 
  136. ^ "42 Years for Snowden Docs Release, Free All Now". 
  137. ^ "Statistics for (2015-08) - kill-thieving-bots.pdf" (PDF). 
  138. ^ "SAIC Whistlebreaker". 
  139. ^ "Someone Stole the Encryption Keys of WikiLeaks Precursor 'Cryptome'". 
  140. ^ John Young. "JYA and Cryptome Passphrase Are Secure". Cypherpunks. 
  141. ^ "Cryptome Incorporated in New York, NY - Reviews - Bizapedia Profile". Retrieved 2015-10-23. 
  142. ^ "From Radio to Porn, British Spies Track Web Users’ Online Identities". The Intercept. Retrieved 2015-10-03. 
  143. ^ a b "Cryptome". Archived from the original on 26 September 2015. Retrieved 5 October 2015. 
  144. ^ "Cryptome dataset - 98,900 files". 
  145. ^ "Cryptome logs 15-10-14". 
  146. ^ "Cryptome stats 1996". 
  147. ^ "cryptome-sale-parody.pdf" (PDF). Cypherpunks mailing list. 2015-10-16. 
  148. ^ "Search Cryptome Archive - WikiLeaks". 
  149. ^ "Cryptome op Twitter: ".@wikileaks is a $5B-50B entity not for free lurid content but for its user data and metadata. Assange's brilliant wikiplan. Ed and Glenn's?"". 
  150. ^ "Wikileaks honeypot/SAIC whistlebreaker update". 
  151. ^ "Cryptome on Twitter: "Caution: @WikiLeaks use of "spying related" to its Cryptome search is click bait to garner user data. No salute misleading hype."". 
  152. ^ "Search Cryptome Archive - WikiLeaks:". 
  153. ^ "Cryptome on Twitter: "Cryptome's @SecureDrop under construction Real soon now!"". 
  154. ^ "cryptome-nov2015". 
  155. ^ "Cryptome on Twitter: "Cryptome disavows mirrors of its archive due to tampering with files, hashes, signatures and implant insertion."". 
  156. ^ Crowley, Michael. "That's Outrageous – Let's Shut These Websites Down". Reader's Digest. Archived from the original on December 9, 2006. Retrieved 2013-03-09. 
  157. ^ Young, John; Crowley, Michael; Natsios, Deborah. "Let's Shut Down Dangerous Websites". Cryptome. Cryptome. Retrieved 3 October 2015. 
  158. ^ "John Young and Deborah Natsios". 2008. 
  159. ^ "War of the Nerds: The Battle Over Wikileaks". 
  160. ^ "WikiLeaks Founder Julian Assange Fights Calls to Step Down". 
  161. ^ "Preistraeger". Big Brother Awards. 
  162. ^ "Steven Aftergood". 
  163. ^ "The Man Behind the ‘Blue Ball’ Emails Scandal That Snared Brett McGurk". 

External links[edit]