Cryptomb 1 |
__________________________________________________________________________________
File Topic Date
__________________________________________________________________________________
Cryptome Current documents
Cryptomb 6 Documents July - December 1999
Cryptomb 5 Documents January - June 1999
Cryptomb 4 Documents June - December 1998
Cryptomb 3 Documents January - May 1998
Cryptomb 2 Documents June - December 1997
_______________________________________________________________________________________
whpf86.htm Payne: Embedded Controller Forth for the 8051 Family, May 31, 1997
watoc.htm Wassenaar Arrangement Lists of Dual-Use Goods and Munitions, May 29, 1997
carbon.htm Use of Carbon Fibers to Disable Computers, May 24, 1997
jimbell3.htm May 16 1997 Complaint Against Jim Bell, May 23, 1997
pkplem.htm PKP-Lemcom Crypto License Agreement, May 21, 1997
jimbell2.htm IRS Says Bell Planned Sabotage, May 20, 1997
rsavpgp.txt RSA v. PGP: Complaint Text, Addition May 20, 1997
nistiic.htm Implementation Issues for Cryptography, May 18, 1997
WMD Threat Proliferation: Threat and Response (offsite)
jfk051697.txt Assassination Revelations, May 16, 1997
96wiretap.htm FISA and 1996 Wiretap Report, Rev. May 15, 1997
abi.htm DoJ Report on Bombmaking Information, Rev. May 15, 1997 (193K)
ebomb.htm E-Bomb: Weapon of Electrical Mass Destruction, May 14, 1997 (96K)
rsapgp.htm RSA Sues PGP, Rev. May 14, 1997
wire97.htm Applications for Wiretaps Rise in 1996, May 11, 1997
soi.htm 1997 Investigators Guide to Sources of Information, May 11, 1997 (259K)
ear050997.txt Export Administration Regulations Revisions, May 9, 1997 (123K)
eartoc.htm Export Administration Regulations, Rev. May 9, 1997
dia050797.txt DIA/MSIC: Cancel Capability Briefings, May 7, 1997
fbi050697.htm CALEA Comments and Responses, May 6, 1997
cr022697.txt Terrorist Use of Weapons of Mass Destruction, Rev. May 5, 1997 (111K)
sh.htm Space Handbook - War Fighter's Guide, May 4, 1997
nispom.htm National Industrial Security Program Operating Manual, April 30, 1997
atf042597.txt ATF: List of Explosive Materials, April 30, 1997
bomb.htm ATF: Bomb Threat Planning, April 29, 1997
jta.htm DoD Joint Technical Architecture, Rev. April 26, 1997
aescomm.htm Schneier on Advanced Encryption Standard (AES), April 26, 1997
doc042497.htm DoC on Software Title Verification Office, April 26, 1997
bxa041597.htm BXA on Computer Export Controls, April 26, 1997
fbi041797.htm FBI on Domestic Terrorism, April 26, 1997
dod041697.htm DoD on Emergency Plan for Domestic Terrorism, April 26, 1997
dos042297.htm State Dept On Environmental Diplomacy, April 26, 1997
cwc042597.txt White House on Chemical Weapons Convention, April 26, 1997
doj102996.txt DoJ on Fighting Money Laundering, April 26, 1997
itaasvey.htm ITAA Encryption Survey, April 25, 1997
crowds.htm Reiter/Rubin: New System for Web Anonymity, Rev. April 25, 1997
onion.htm Privacy and Anonymity on the Internet, Rev. April 25, 1997
doc042497.txt New Encryption Advisory Panel, April 24, 1997
don042497.txt Navy Planning and Steering Advisory Committee, April 24, 1997
ndp042497.txt National Defense Panel Meeting, April 24, 1997
bxa042397.txt BXA Technical Advisory Committee Meeting, April 24, 1997
dsb042397.txt Defense Science Board Meeting, April 24, 1997
bxahouse.htm BXA Report to Congress on Encryption Controls, April 23, 1997
dodspace.htm National Security Space Organization and Management, April 23, 1997
dod21war.htm Technology for 21st Century Warfare, April 23, 1997
don55104.htm DoN: Militarily Critical Technology (1986), April 21, 1997
mctl08.htm MCTL Section 8 - Information Systems Technology, Rev. April 21, 1997
mcsec08.pdf MCTL Section 8 - Information Systems Technology, April 21, 1997 (305K)
mclocatr.pdf MCTL Master Locator, April 21, 1997 (32K)
mcsec09.pdf MCTL Section 9 - Information Warfare Technology, April 19, 1997 (122K)
c4ir96.htm DoD C4IR Report for 1996, April 19, 1997
fortleaf.htm NSA: FORTEZZA's LEAF Support Removed, April 19, 1997
aesmeet.htm Schneier: AES Workshop Report, April 15, 1997
harmonix.htm Harmonics Electrical Hazards, April 14, 1997
tufte.htm Edward Tufte on Information Design, April 13, 1997
intelink.htm Rapid Expansion of Intelink, April 13, 1997
emskey.htm EMS: Key to Success in Future Conflicts, April 13, 1997
nsagak.htm NSA: InfoSec in a 3rd Wave Society, April 13, 1997
dod52001.htm DoD Information Security Program, April 12, 1997
dcid_17.htm Security Controls of Intelligence, April 12, 1997
gcl.htm German Crypto Laws, April 12, 1997
epa040997.txt EPA/Lotus Notes/RSA/MD-2/RC-4/, April 11, 1997
nscexprt.htm NSC: Nonproliferation and Export Controls, April 10, 1997
fac041097.txt North Korean Payments, April 10, 1997
issb.htm Information Systems Security Board, April 10, 1997
chips.htm Money Laundering Through CHIPS and SWIFT, April 9, 1997
50usc2405.txt Export Regulation: Foreign Policy Controls, April 8, 1997 (51K)
spab040897.txt Security Policy Board Meeting, April 8, 1997
ndp040897.txt Quadrennial Defense Review, April 8, 1997
aucat_5.htm Wassenaar Crypto Regulations, April 7, 1997
brokat.htm Strong Crypto: Brokat Informationssysteme, April 7, 1997
jmic.htm Joint Military Intelligence College, April 6, 1997
dia020597.htm Global Threats To the United States, April 6, 1997
ens.htm The Environment and National Security, April 6, 1997
scarch.htm Space Communications Architecture, April 6, 1997
dodsa.htm DoD Space Architect, April 6, 1997
pdj.htm Crypto Suit: Junger v. Secretary of State, Rev. April 4, 1997
jimbell.htm IRS Raids a Cypherpunk, April 3, 1997
ap.htm Bell: Assassination Politics, April 3, 1997
mycyblaw.txt Malaysia Sets Cyber Laws, April 3, 1997
tcmcnc.htm May: Criminalization of Noncompliant Crypto, March 31, 1997
kmimeet.txt Key Management Infrastructure Meeting, March 31, 1997
netgov.htm Ruthowski: Models of Net Governance, March 30, 1997 (offsite)
ttpgak.htm Broiles: Survey of Crypto/TTP/GAK Regs, March 30, 1997 (offsite)
oecdnope.txt OECD Rebuffs USG Crypto Plan, March 27, 1997
emp.htm EMP and TEMPEST Protection, March 26, 1997
nrotips.htm NRO/NRL TiPS Tether Dynamics, March 25, 1997
bxa032597.txt BXA Info Systems Meeting, March 25, 1997
nsacrowell.htm NSA on SAFE Crypto, March 25, 1997
nsaquery.htm NSA Queried by Congress on Crypto, March 24, 1997
cia020597.htm CIA on National Security Threats, March 24, 1997
fbi032097.htm FBI on International Training, March 24, 1997
fbi031997.htm FBI on Computer Crimes, March 24, 1997
doj031797.txt FBI/Chinese/Congress/White House/CIA/DoS/DoJ, March 24, 1997
dia032497.txt Current Critical Intelligence, March 24, 1997
dsb032497-3.txt Transnational Threats, March 24, 1997
dsb032497-2.txt Underground Facilities, March 24, 1997
dsb032497-1.txt Innovative Support Structures, March 24, 1997
ndp032497.txt Deep Attack Weapons, March 24, 1997
ukttp.htm UK/DTI TTP Encryption Services, March 21, 1997 (100K)
onita.htm Naval Intel/Traffic Analysis/PGP, March 21, 1997
bruce.htm Schneier Rebuts CTIA, March 20, 1997
ctia.htm CTIA Nays Cellphone Code Crack, March 20, 1997
nsanay.htm NSA Nays Cell Phone Code, March 20, 1997
fbi032097.txt FBI Wiretap Payments, March 20, 1997 (177K)
nda98.htm National Defense Authorization FY 1998-99, March 19, 1997 (176K)
nima.htm National Imagery, March 19, 1997
octt.txt Organized Crime and Technology Trends, March 18, 1997
cpunk.txt Secret Agents: Cypherpunks, March 17, 1997
nro031797.txt NRO FOI, March 17, 1997
dia031797.txt DIA Stealth, March 17, 1997
dsb031797.txt DSB Stealth, March 17, 1997
ndp031797.txt NDP Stealth, March 17, 1997
mirror.txt Hacker Stealth, March 17, 1997
wmd022797.txt WMD Report, March 14, 1997 (19K)
no111496.txt POTUS on Proliferation of WMD, March 14, 1997 (36K)
wmd092796.txt WMD Report, March 14, 1997 (76K)
wmd092995.txt WMD Report, March 14, 1997 (25K)
wmd060995.txt WMD Report, March 14, 1997 (108K)
wmd100694.txt WMD Report, March 14, 1997 (61K)
dmvv.htm Champions of Encryption, March 14, 1997
compcrim.txt CSI/FBI Computer Crime Report, March 13, 1997
doswas03.txt BXA/TWA Requests, March 12, 1997
atasect6.htm US Army ATA Info Sec, March 11, 1997
ciaami.txt Der Spiegel on US Spying, March 11, 1997 (ref. despon.txt)
itc031197.txt Bytes for Booze Tax Swap, March 11, 1997
dnfsf971.txt Safe Storage of Uranium-233, March 11, 1997
usa-iss.htm US Army Info Sys Security, March 10, 1997
wassnr52.htm The Wassenaar Arrangement, Cat.5, Pt. 2, March 9, 1997
wassenr4.htm The Wassenaar Arrangement Initial Elements, Rev. March 9, 1997
doe-mais.htm DoE Master Info Sys Security, March 9, 1997 (190K)
nsa-sun.htm NSA and Crypto AG, March 8, 1997
whp1.htm Cryptographer William H. Payne, March 8, 1997
nsasuit2.txt NSA Sued by Cryptographer 2, Rev. March 8, 1997
nsasuit.txt NSA Sued by Cryptographer 1, Rev. March 8, 1997
haarp.htm HAARP in Alaska, March 8, 1997
fow.htm The Future of Warfare, March 8, 1997
pklogin2.txt NSA Public Key Login Protocol, March 8, 1997
otr030797.txt WTO Dispute on Computer Tariff, March 7, 1997
eo13035.txt HPCC Advisory Committee, March 6, 1997
ncs030697.txt National Security Telecomm, March 6, 1997
iso030697.txt Information Security Oversight, March 6, 1997
cno030697.txt CNO Executive Panel, March 6, 1997
no030597.txt Continuation of Iran Emergency, March 6, 1997
secrecy.htm Report of the Commission on Protecting and
Reducing Government Secrecy, March 5, 1997
s376.txt Encrypted Comm Privacy Act, March 5, 1997
fac030597.txt Drug Trafficking Sanctions, March 5, 1997 (66K)
dia030597.txt DIA Advisory Board, March 5, 1997
50usc401.txt National Security Intelligence, March 5, 1997
hri.htm Hiding Routing Information, March 3, 1997
nsacrypt.txt NSA Cryptologia, March 1, 1997
hr538.txt Taggants in Explosives, March 1, 1997
itar091796.txt ITAR Amendment, March 1, 1997
eu-fbi.txt News: EU-FBI Wiretap Pact, Update February 28, 1997
eu-fbi.htm Report: EU-FBI Wiretap Pact, February 27, 1997
bxapctoc.htm HTML Comments on Encryption Transfers, Rev. February 27, 1997
bxacommt.htm PDF Comments on Encryption Transfers, Rev. February 27, 1997
ncc022797.txt National Counterintelligence Center, February 27, 1997
herson.htm SOGIS Head on EU Crypto, February 26, 1997
casm.htm Securing E-mail in HMG, February 26, 1997
bxa021297-2.txt Commercial Encryption Items, Revised February 25, 1997
doc022197.txt Wassenaar and Crypto, February 24, 1997
fis.htm Foreign Intel Surveillance, February 23, 1997 (108K)
50usc402a.txt Coord of Counterintelligence, February 23, 1997
50usc438.txt Access to Classified Info, February 23, 1997
18usc794.txt Espionage and Censorship, February 23, 1997
18usc2511.txt Communications Intercepts, February 23, 1997
18usc2709.txt Electronic Records Access, February 23, 1997
15usc1681u.txt Disclosures to FBI, February 23, 1997
12usc3414.txt Right to Financial Privacy, February 23, 1997
daley.htm DoC Sec on Export Controls, February 22, 1997
reinsch1.htm Convergence of Crypto Controls, February 22, 1997
nsaleash.htm NSA Unleashed on Cyberspace, February 22, 1997
acda.htm Arms Control Essays, February 22, 1997
wassenr3.htm The Wassenaar Arrangement, February 22, 1997
ukeep.htm UK Crypto Export Policy, February 21, 1997
10usc421.txt Foreign Cryptologic Support, February 21, 1997
9724.htm Exporting Dual-Use Items, February 20, 1997
fatf8.htm OECD Money Laundering Report, February 19, 1997
jcs.htm Redefining Security/JSC, February 18, 1997
fips196.txt Entity Auth. Using PK Crypto, February 18, 1997
secacro.htm Security Acronyms (ref. jcs.htm)
rusigint.htm Russian Sigint, February 16, 1997
bxa021297.txt Export Licensing/CCL Revisions, February 12, 1997
ml-ec.htm UNCITRAL Model Law on Electronic Commerce, February 16, 1997
dos012497.txt Global Law on Digital Sigs, February 16, 1997
pdf417-1.htm Printed Ecash decoder, February 16, 1997
fbi100.htm Telcos Balk at FBI Wiretap Plan, February 15, 1997
safety.htm Safety-Critical Systems, February 15, 1997
nsamat.htm NSA Material at NARA, Revised February 15, 1997
nsazeal.htm NSA Influence on NZ Crypto, Revised February 14, 1997
usacm.htm USACM Critiques Crypto Export Rule, February 14, 1997
aes010297.txt Update: FIPS for Advanced Encryption, February 11, 1997
elaguide.htm Encryption Licensing Guide, February 11, 1997
crguide.htm Classification Request for EI, February 11, 1997
qshake.htm Brassard: Grover's Quantum Shake, February 7, 1997
bxa020797.txt BXA Encryption Regs, February 7, 1997
howwire.htm Building Surveillance, February 6, 1997
nowire.txt Wireless Surveillance, February 5, 1997
fortcert.htm New Fortezza Requirements, February 5, 1997
fuckit.htm Filling Power Vacuums, February 3, 1997
taggants.htm NRC on Tagging Explosives, January 24, 1997
bugs.htm Update on Bugging Devices, January 30, 1997
fbi011497.txt Comm Assist for Law Enforce 2, January 14, 1997
fbi051096.txt Comm Assist for Law Enforce 1, May 10, 1996
cave.htm CAVE Algorithm, Revised, January 26, 1997
tr453.htm TR45.3, Revised, January 26, 1997
googol.txt The Challenge of Large Numbers, February, 1997
kahnak.txt David Kahn on Key Escrow, January 22, 1997
whathe.txt Seismic Warfare, January 21, 1997
defsec.txt Defense Industrial Security, January 21, 1997
ecospy.txt Economic Espionage, January 21, 1997
invade.txt New-tech Eavesdropping, January 19, 1997
esnoop.htm Electronic Surveillance, January 9, 1997
iwd.htm DSB/DoD InfoWar-Defense, January 8, 1997
tcmlog.txt Net Surveillance, January 6, 1997
rcmp1.htm RCMP Guide to InfoSec 1, December 31, 1996
rcmp2.htm RCMP Guide to InfoSec 2, December 31, 1996
lawdno.txt E-Cash Laws, December 29, 1996
bxa123096.txt Crypto Export Rule, December 30, 1996
itar123096.txt ITAR Rule, December 30, 1996
puzzle.htm Barlow on TR45.3 (1992), December 28, 1996
otapub.htm OTA Publications, December 28, 1996
kmitac.htm KMI Advisory Committee, December 27, 1996
ssnsii.txt FRB Studies Privacy, December 26, 1996
winnemr.htm Schwartau on EMR, 1994
mdtspy.txt Mobile Phone Snooping, December 23, 1996
nissc96.htm NISSC96 Security Papers, December 22, 1996
rs232.pdf Eavesdropping On RS232 Cables, 1990 (367K)
ke121396.htm Key Escrow Export Rule, December 13, 1996
appf.htm Cryptanalysis Support Program, September, 1990
dbwin.htm Text of Bernstein Decision, December 19, 1996
bernstein.htm Report on Bernstein Decision, December 19, 1996
bits.htm More on Van Eck's EMR Eavesdropping, 1988
tempest.htm Seline on TEMPEST Laws, 1989
emr.pdf Van Eck on EMR Eavesdropping, 1985 (720K)
fortezza.htm Fortezza Crypto, December 14, 1996
See bxa123096.txt
eo-export.txt Exec Orders on Export/Crypto, 1970-1996
commerce.htm Draft Crypto Export Regs, December 9, 1996
pr-eo13026.htm Release of Crypto Order, November 15, 1996
eo13026.htm Exec Order on Crypto Export, November 15, 1996
no081496.htm Notice on Export, August 14, 1996
eo12981.htm Exec Order on Crypto Export, December 5, 1995
eo12924.htm Exec Order on Crypto Export, August 19, 1994
dtn1095.htm Defense Trade News, October, 1995
dtn0794.htm Defense Trade News, July/October, 1994
dtn0494.htm Defense Trade News, April, 1994
dtn0194.htm Defense Trade News, January, 1994
dtn0193.htm Defense Trade News, January/April, 1993
cast.html Symmetric Ciphers/CAST Design
fipsmeet.htm FIPS/KMI Meeting, December 5-6, 1996
mr789.htm The Advent of Netwar, 1996
ip149.htm Info War and the Air Force, March, 1996
quisee.htm Quisquater on SEE, November 30, 1996
unravl.txt Biz Hits Gov on Crypto, December 6, 1996
openup.txt BSA Hits Gov on Crypto, December 3, 1996
taxpolicy.htm US Net Tax Policy, November 22, 1996
oecdcrypto.htm OECD Crypto Guidelines, November 21, 1996
akdfa.txt Anderson/Kuhn's Improved DFA, November 20, 1996
halicf.htm Finney on HP's ICF, November 18, 1996
declan.htm Reports on HP's ICF, November 18, 1996
nrcnidx.htm NRC Crypto Docs, November 13, 1996
ibag2.htm IBAG on Crypto 2, November 12, 1996 [?]
ibag1.htm IBAG on Crypto 1, December, 1995
radfa.htm Anderson: DES Weakness, November 1, 1996
pkdfa.htm Kocher: Fault Analysis, November 1, 1996
nsatypo.htm NSA Corrections, November 1, 1996
nsamint.htm NSA on E-Cash, November 1, 1996
bis_emoney.html BIS on E-Money, October, 1996
belsecwp.htm Better Check Context, October 31, 1996
smart.pdf Better Check Calculations, Oct 31, 1996 (115K)
quikey.htm Quisquater's Fast Hack 3, October 23, 1996
isghak.htm NUG Smartcard Hack 2, October 23, 1996
dfa.htm Biham-Shamir DFA, October 18, 1996
sunsyn.txt Sun Dams Flood, October 15, 1996
belcor.txt Bellcore Smartcard Hack 1, October 7, 1996
dimacs.txt DIMACS Abstracts, September 30, 1996
eccpow.txt ECC Crypto and Pow!, August 15, 1996
bcisys.txt Battlefield Combat ID System, July 27, 1996
lattice.htm Lattice Locks, August 23, 1996
nrcindex.htm NRC Crypto Report, May 30, 1996
kmi.txt Key Management Infra, May 20, 1996
clipper3.htm Clipper 3, May 20, 1996
datasec.htm Data Security in Buildings, March, 1995
OFF-SITE
EAR Notices Federal Register Notices Affecting the EAR
PCCIP Survey Survey: President's Commission on Critical Infrastructure
Protection, May 8, 1997
DD-CP.htm Denning: Crypto Policy, April 16, 1997
DD-IW.htm InfoWar: Terrorism, Crime, and Nat Sec, April 16, 1997
Kuner.htm Law of Electronic and Internet Commerce in Germany, April 16, 1997
Koops.htm Survey of Crypto Laws and Regulations, April 16, 1997
Koopsetal.htm Fraud-detectible Alternative to Key Escrow, April 16, 1997
Camenisch.ps Efficient Solution to Money Laundering, April 16, 1997
natsecpubs FAS: Nat Sec Pubs on the Net, April 13, 1997
cia032797 CIA: Advanced Information Processing, April 8, 1997
cia032097 CIA: Sharing Secrets With Lawmakers, April 8, 1997
parrhesia The Wassenaar Arrangement, April 5, 1997
TTP Projects Information on any of the current TTP projects can be
obtained from David Herson (DG XIII/7) at the European
Commission (e-mail david.herson@bxl.dg13.cec.be) or
from the Commission Web site. (Ref. ukttp.htm)
Kim-Spy Intelligence and Counterintelligence, March 8, 1997
Other Sites For Export Controls, March 6, 1997
Jaycor Security Engineering Services, March 2, 1997
TCCSecure.com Voice Encryption Methods, February 28, 1997
Peter Gutmann Security and Encryption-related Resources and Links
FOND Russian Legal Data Base, February 11, 1997
New Cycle of Arab-Israeli Terrorism and U/W, January 22, 1997
CAVE/TR45.3 CAVE Algorithm, December 30, 1996
Matt Blaze Crypto and the Info Economy, December 26, 1996
Chris Kuner German E-commerce/Crypto, December 25, 1996
Carl Ellison The Unending Crypto Debate, December 24, 1996
Bruce Schneier Why Crypto Is Hard, December 23, 1996
Joel McNamara TEMPEST Information Page, December 17, 1996
Goldberg/Wagner Cryptanalytic Hardware, May 8, 1996
Terry Ritter Voice/Video Crypto, August, 1992 (re: cave.htm)
Michael Froomkin Crypto Law and ...
Bert-Jaap Koop Crypto Law Survey
ITAR International Traffic in Arms Regulations
AECA Arms Export Control Act excerpt
__________________________________________________________________________________