Cryptome

Results: 876



#Item
621Torture in the United States / Interrogation techniques / War crimes / Double agents / John Kiriakou / Year of birth missing / Abu Zubaydah / Central Intelligence Agency / Waterboarding / Spies / Torture / Espionage

Case 1:12-mj[removed]JFA Document 1 Filed[removed]Page 1 of 3 PageID# 1 AO 91 (Rev[removed]Criminal Complaint

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2012-03-12 23:19:22
622

Edition: US Sign in Mobile

Add to Reading List

Source URL: cryptome.org

- Date: 2013-06-28 07:43:28
    623

    Der Spiegel, 30 December 2013 http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a[removed]html http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetk

    Add to Reading List

    Source URL: cryptome.org

    - Date: 2013-12-30 07:21:47
      624

      TOP SECRET//COMINT//REL TO USA, FVEY Example of Current Volumes and Limits 5

      Add to Reading List

      Source URL: cryptome.org

      - Date: 2013-12-04 19:54:45
        625United States Intelligence Community / National Intelligence Strategy of the United States of America / Defense Intelligence Agency / Classified information / Security / Government / National security / Central Intelligence Agency / McLean /  Virginia

        T O P S E C R E T / / S I / T K / / N O FO R N FY 2013 Congressional Budget Justification Vo l u m e I

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2013-08-29 19:06:57
        626Network architecture / Tor / Traffic analysis / Proxy server / Onion routing / .onion / Internet Relay Chat / Peer-to-peer / Transmission Control Protocol / Internet privacy / Computing / Internet

        TOP SECRET//COMINT[removed]U//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2013-10-04 18:44:13
        627Network address translation / IP address / Computing / Stain / Internet / Traversal Using Relays around NAT / Network architecture / Digital media / Staining

        Op MULLENIZE and beyond - Staining machines[removed]:13:02 pm, by Categories: MCE, MCD, MISD , 576 words

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2013-10-04 18:44:13
        628Quantum information science / Cryptography / Quantum key distribution / National Security Agency / Quantum computer / Theoretical computer science / Quantum cryptography / Applied mathematics

        Excerpts from the “black budget,” Volume 2, “Combined Cryptologic Program”: (U) RESEARCH & TECHNOLOGY (U) PENETRATING HARD TARGETS (U) Project Description (S//SI//REL TO USA, FVEY) The Penetrating Hard Targets P

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2014-06-12 10:29:41
        629

        PDF Document

        Add to Reading List

        Source URL: cryptome.org

        - Date: 2013-12-12 08:07:49
          630Computing / Internet / Degree of anonymity / Ciphertext indistinguishability / Anonymity / Onion routing / Tor / Differential privacy / Adversary model / Internet privacy / Cryptography / Cryptographic software

          (Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

          Add to Reading List

          Source URL: cryptome.org

          Language: English - Date: 2014-08-14 06:53:59
          UPDATE