[cryptome] Re: Why cryptome sold web logs to their paying customers?

Michael Best themikebest at gmail.com
Sun Oct 11 14:18:33 PDT 2015


I'm not sure what the links are meant to imply. That the log leak was a
disruption effort by the GCHQ that was planted when NetSol restored the
site?

On Sun, Oct 11, 2015 at 5:03 PM, John Young <jya at pipeline.com> wrote:

> https://cryptome.org/2012/07/gent-forum-spies.htm
>
> 25 February 2014. Related: GCHQ Full-Spectrum Cyber Effects:
>
> http://cryptome.org/2014/02/gchq-cyber-effects.pdf
>
> 24 February 2014. Related: GCHQ Online Deception:
>
> http://cryptome.org/2014/02/gchq-online-deception.pdf
>
> GCHQ DISRUPTION Operational Playbook:
>
> http://cryptome.org/2014/02/gchq-disruption.pdf
>
> 29 January 2014. Related: GCHQ Squeaky Dolphin Psychological Operations:
>
> http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf (18MB)
>
> 4 March 2012. Precursor to this sabotage, OSS Sabotage of Organizations:
>
> http://svn.cacert.org/CAcert/CAcert_Inc/Board/oss/oss_sabotage.html
>
>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1821 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20151011/23af6a29/attachment-0002.txt>


More information about the cypherpunks mailing list