Militance Oppression Resistance Acceptionism Love Statism by Max

Total Page:16

File Type:pdf, Size:1020Kb

Militance Oppression Resistance Acceptionism Love Statism by Max Militance Oppression Resistance Acceptionism Love Statism By Max Nowak Table of Contents Preface..................................................................................................................................................1 1Genesis................................................................................................................................................2 2 First Interrogation..............................................................................................................................5 3 On Terrorism......................................................................................................................................7 4 Women.............................................................................................................................................13 5 Second Interrogation........................................................................................................................17 6 About the Knife...............................................................................................................................20 7 The Public-Private Partnership and the Other Public-Private Partnership......................................22 8 Acceptionism...................................................................................................................................25 9 Anna and I Get Together..................................................................................................................29 10 Why Act Morally?.........................................................................................................................30 11 ACAB............................................................................................................................................33 12 Life with Anna...............................................................................................................................35 13 In the Business of Making Money.................................................................................................37 14 A Sense of Humor..........................................................................................................................40 15 Anna Comes Home from Congress...............................................................................................46 16 A Positive Outlook.........................................................................................................................50 17 Utopia Is Impossible; Everyone Who Isn't a Utopian Is a Shmuck...............................................54 18 Restorative Justice.........................................................................................................................57 19 The Law in These Parts.................................................................................................................59 20 Emma.............................................................................................................................................62 21 Liebe Statt Angst...........................................................................................................................67 22 How We Live Now........................................................................................................................69 23 The Only Way To Stop a Bad Guy With a Potato Peeler Is a Good Guy With a Nuke.................77 24 MORALS.......................................................................................................................................80 Preface The first thing I want you to know is that this story contains a true account of my young adult life. Minor changes to the story have been made, only to protect the identity of myself and those whom I love. This work is copyrighted. You do not have permission to distribute, alter, or read any part of this work. In addition to me copyrighting this work, this book includes copyrighted material from other authors. The inclusion of their content in this work is in no way approved by them. The original authors of cited texts are credited. Cited text is always distinguishable from my text because it is presented with bars on each side. Example: Cited text. You have no legal right to distribute, alter, or read any part of this work. But then again, I would be the first to tell you: break the law. 96D6 4C2F 61A2 AB65 206E 1734 F4AD 8B4E 0635 F498 1 Genesis Boom, boom, boom. Three firm bounces on my front door awoke me. My computer was still playing gentle music as my heart rate quickly rose. I feared that I already knew who it was, and I was afraid he was looking for trouble. Luckily Anna was not there, but far away at a conference, away from harm. Naked, and still sleepy, I rushed to put on underwear and sneakers. “I'm coming,” I yelled at him as I took a big kitchen knife from the drawer and walked to the entrance of my Kreuzberg apartment. I was thinking, this could be carnage. Looking past the curtains, I saw nobody in front of my door. Another bad sign. I gripped the knife and took one step back, in fear for what might happen next. Before I realized that I had opened the door, I was blown aback by the wave that entered my home. Unprepared for this forceful confrontation, I could only drop the knife and run in blind fear. Did he bring an army?, I thought to myself, Will my sweet Anna find a mutilated body, or no body at all? An army is unexpected. There were many aggressive voices and I was quickly forced to the ground. I didn't struggle, as there were simply too many of them. I couldn't even move my arms. They rose me to my knees to face one of my assailants–a bold, white man. He was around 40 years old and had great excitement in his eyes. As I tried to constrain my panic, I noticed the man was wearing a kevlar vest, as were my other assailants. “Are there any weapons in the house?” the bold man asked. “What?” I thought out lout, “No, there are no weapons in this house. I see you brought guns, but I don't have a weapon.” Then I saw he was holding … a piece of paper? I still couldn't move my arms and discovered my hands were cuffed behind my back. The bold man told me, “You are under arrest on the suspicion of providing material support to a terrorist organization. Are you Max Nowak?” Good god, I thought. It was just the police. As I looked around for confirmation that it was in fact the police, I counted ten of them. Six were wearing vests and were there just for security while two were bringing in forensic gear (computer, photo-camera, containers), and the last two seemed to just be observing. I was relieved to discover it was the police, but wondered what they were arresting me for. “Do you have identification on you?” the bold man asked while I was on my knees, wearing nothing but my underwear and sneakers. “You think I did what?” I replied. The two that had put the metal on my wrists now made me stand. “You are under arrest on the suspicion that you have provided material support to a terrorist organization.” “And so you bust in here on a Sunday night?” I asked. The situation seemed to be under control. The police had me and I was not fighting. We just needed to get to the police station. There, I would ask for a lawyer before speaking with the police. A lawyer won't show up on a Sunday night, and I would be able to leave the station the morning 2 after, around noon. Then it would take 2, maybe 3 months before everything would be cleared up and the paperwork done. “Are you Max Nowak and do you have identification?” the bold man asked again. “Yes, that's me!” I finally answered him. “My wallet with driver's license is in my jeans, next to my bed. I would like to see your identification as well, pro forma” I told him. The word 'pro forma' was a bit difficult for the police officers; they all had to learn it shortly after signing up for the police force. There are some tensions that naturally arise during a home invasion and terrorism related arrest. These tensions arise even with the very best police officers and during arrests for very minor offenses. Although all police officers have voluntarily joined the police force, they are always stressed-out when performing these routine arrests. To ease the tension, I made two remarks: “On a Sunday night?” and “pro forma”. I felt like both remarks were light and slightly humorous while not showing my disrespect. Still, this officer seemed set on keeping an unfriendly atmosphere. He maintained an ugly face and said that he did not have to show his identification to me. I was escorted out of my house towards an undercover police car by the two officers that had been holding my arms since the moment that I hit the ground. One of them sat behind the wheel while the other was nice enough to sit next to me on the backseat. The three of us drove off, presumably towards a police station, although they didn't tell me. Being an outgoing and very optimistic person, I tried one more time. “So there were ten of you in my apartment of 25m2. Can you believe that in three years, I never had so many people over at once!?” My attempt at casual conversation was met with a stare of disbelief and words that did not leave the officer's mouth. At the police station it was the usual routine: counting the money in my wallet, removing my shoe laces, verifying my identity, no allergies, no drugs, no people that immediately depend on me, and a vegan diet. For some reason, the vegan, as well as the vegetarian diet always requires to be explained
Recommended publications
  • Nopf Leday Hing Up
    Fall 2009 THE KNOPF DOUBLEDAY PUBLISHING GROUP DOUBLEDAY The Knopf NAN A. TALESE Doubleday KNOPF Publishing PANTHEON SCHOCKEN Group EVERYMAN’S LIBRARY VINTAGE ANCHOR THE IMPRINTS OF THE KNOPF DOUBLEDAY GROUP AND THEIR COLOPHONS Catalog, Final files_cvr_MM AA.indd 1 3/5/09 6:48:32 PM Fa09_TOC_FINAL_r2.qxp 3/10/09 12:05 PM Page 1 The Knopf Doubleday Publishing Group Fall 2009 Doubleday and Nan A. Talese.............................................................3 Alfred A. Knopf................................................................................43 Pantheon and Schocken ..................................................................107 Everyman’s Library........................................................................133 Vintage and Anchor........................................................................141 Group Author Index .......................................................................265 Group Title Index ...........................................................................270 Foreign Rights Representatives ........................................................275 Ordering Information .....................................................................276 Fa09_TOC_FINAL.qxp:Fa09_TOC 3/6/09 2:13 PM Page 2 Doubleday DdAaYy Nan A. Talese Catalog, Final files_dvdrs_MM AA.indd 3 3/5/09 6:43:33 PM DD-Fa09_FINAL MM.qxp 3/6/09 3:53 PM Page 3 9 0 0 2 L L FA DD-Fa09_FINAL MM.qxp 3/6/09 3:53 PM Page 4 DD-Fa09_FINAL MM.qxp 3/6/09 3:53 PM Page 5 INDEXF O A UTHORS Ackroyd, Peter, THE CASEBOOK Lethem, Jonathan,
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Barrett Brown Is Anonymous
    Case 3:12-cr-00317-L Document 90 Filed 09/04/13 Page 1 of 13 PageID 458 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION ________________________________ UNITED STATES OF AMERICA § § No: 3:12-CR-317-L v. § No: 3:12-CR-413-L § No: 3:13-CR-030-L BARRETT LANCASTER BROWN § MEMORANDUM IN SUPPORT OF DEFENDANT’S OPPOSITION TO GOVERNMENT’S REQUEST FOR A GAG ORDER BARRETT LANCASTER BROWN, through his counsel, respectfully submits this memorandum to set the framework for oral argument on September 4, 2013, and to enter exhibits that Mr. Brown believes are relevant to the courts determination.1 STATEMENT OF FACTS A. Barrett Brown Barrett Lancaster Brown is a thirty-two year old American satirist, author and journalist. His work has appeared in Vanity Fair, the Guardian, Huffington Post, True/Slant, the Skeptical Inquirer and many other outlets. See Summary Chart of Select Publications by Barrett Brown, Exh. A. He is the co-author of a satirical book on creationism entitled Flock of Dodos: Behind Modern Creationism, Intelligent Design and the Easter Bunny. As described by Alan Dershowitz, Felix Frankfurter Professor of Law at Harvard Law School, “Flock of Dodos is in the great tradition of debunkers with a sense of humor, from Thomas Paine to Mark Twain.” See Flock of Dodos (book cover), Exh. B. Indeed, Mr. Brown’s use of sarcasm, humor and 1 Mr. Brown enters these exhibits, mainly consisting of articles and commentary, for limited purpose of assisting the Court’s determination in this matter, and not for the truth of the matter asserted by the statements therein.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Against Authority
    AGAINST AUTHORITY Freedom and The Rise of the Surveillance States by John Twelve Hawks for Thomas Pynchon ©2014 by John Twelve Hawks. All Rights Reserved. A LITTLE BOY IN A ROOM OF MIRRORS Both dogs and humans know when we’ve been caged. We sense instinctually when some other person—or an institution—has the power to direct or control our lives. And our first awareness of this reality occurs at an early age. The older kids on the schoolyard are bigger and stronger. They have the power to knock us down and tell us what to do. When I was growing up in the 1950s, I was quite aware of my own powerlessness. I couldn’t tell anyone what to do—not even a first grader. Although my brain was crammed with a great many words, I had a terrible stutter and couldn’t get the words out. Everyone in my elementary school class laughed when I struggled to speak, and sometimes even my teacher had to conceal her smile. By the time I was eight years old, I started to believe that a demon with a perverse sense of humor was in charge of my lips and tongue. On some days, he was a lazy demon, and I could talk on the phone or answer questions in class. Then the demon would get annoyed with me and I would spit and sputter over every word. On Sundays my family attended a Scotch Presbyterian church headed by a conservative pastor who preached about infant damnation. I was confused about the power of baptism, but I definitely understood the concept of hell.
    [Show full text]
  • Cia-Wikileaks-Task-Force.Pdf
    TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 WikiLeaks Task Force Final Report TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 Memo To: Director, Central Intelligence Agency Deputy Director, Central Intelligence Agency Chief Operating Officer, Central Intelligence Agency From: WikiLeaks Task Force, Subject: WikiLeaks Task Force Final Report Executive Summary WikiLeaks’ announcement on 7 March that it possessed cyber tools from CIA’s Center for Cyber Intelligence (CCI), dubbed “Vault 7,” marked the largest data loss in CIA history. In its initial public disclosure, WikiLeaks provided the names and brief descriptions of multiple tools that CIA developed for cyber operations. Since 7 March, WikiLeaks has published more comprehensive descriptions of 35 tools, including internal CIA documents associated with each tool. — We assess that in spring 2016 a CIA employee stole at least 180 gigabytes to as much as 34 terabytes of information. This is roughly equivalent to 11.6 million to 2.2 billion pages in Microsoft Word. This data loss includes cyber tools that resided on the Center for Cyber Intelligence (CCI) software development network (DevLAN). We cannot determine the precise scope of the loss because, like other mission systemsa at that time, DevLAN did not require user activity monitoring or other safeguards that exist on our enterprise system. — — To date, WikiLeaks has released user and training guides and limited source code from two parts of DevLAN: Stash, a source code repository, and Confluence, a collaboration and communication platform. All of the documents reveal, to varying degrees, CIA’s tradecraft in cyber operations.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • NSA's MORECOWBELL
    NSA's MORECOWBELL: Knell for DNS Christian Grothoff Matthias Wachs Monika Ermert Jacob Appelbaum Inria TU Munich Heise Verlag Tor Project 1 Introduction On the net, close to everything starts with a request to the Domain Name System (DNS), a core Internet protocol to allow users to access Internet services by names, such as www.example.com, instead of using numeric IP addresses, like 2001:DB8:4145::4242. Developed in the \Internet good old times" the contemporary DNS is like a large network activity chart for the visually impaired. Consequently, it now attracts not only all sorts of commercially-motivated surveillance, but, as new documents of the NSA spy program MORECOWBELL confirm, also the National Security Agency. Given the design weaknesses of DNS, this begs the question if DNS be secured and saved, or if it has to be replaced | at least for some use cases. In the last two years, there has been a flurry of activity to address security and privacy in DNS at the Internet Engineering Task Force (IETF), the body that documents the DNS standards. The Internet Architecture Board, peer body of the IETF, just called on the engineers to use encryption everywhere, possibly including DNS. [4] A recent draft [6] by the IETF on DNS privacy starts by acknowledging that the DNS \... is one of the most important infrastructure components of the Internet and one of the most often ignored or misunderstood. Almost every activity on the Internet starts with a DNS query (and often several). Its use has many privacy implications ..." Despite seemingly quick consensus on this assessment, the IETF is not expecting that existing industry solutions will change the situation anytime soon: \It seems today that the possibility of massive encryption of DNS traffic is very remote." [5] From a surveillance perspective, DNS currently treats all information in the DNS database as public data.
    [Show full text]
  • Global Subversion Begets a Question for Ed Snowden Are Covert Ops Compatible with Democracy?
    Global Subversion Begets a Question for Ed Snowden Are Covert Ops Compatible With Democracy? By Bill Blunden, October 12, 2014 It’s part of the public record that the NSA has engaged in an industry-wide campaign to weaken cryptographic protocols and insert back doors into hi-tech products sold by U.S. companies. We also know that NSA officials have privately congratulated each other in successfully undermining privacy and security across the Internet. Hence it’s only logical to assume that the NSA’s numerous subversion programs extend into foreign "commercial entities". Thanks to documents recently disclosed by the Intercept we have unambiguous confirmation. Hi-tech subversion underscores the fact that the whole tired debate regarding cryptographic keys held in escrow for so-called lawful interception (what the Washington Post called “secret golden keys”) only serves to distract the public from programs aimed at wielding covert back doors. In other words, by reviving the zombie idea of an explicit back door the editorial board at the Washington Post is conveniently ignoring all of the clandestine techniques that already exist to sidestep encryption. In a nutshell: zero-day bugs and malware often trump strong crypto. On an aside it’s interesting to observe the citadel of free thinkers at the Electronic Frontier Foundation continue to promote cryptographic tools as a privacy tonic with a faith that’s almost religious while conspicuously neglecting other important aspects of operational security. The EFF cheerfully provides a litany of alleged success stories. Never mind all of the instances in which the users of said cryptographic tools were compromised, even users who specialized in computer security.
    [Show full text]
  • Winning Strategic Competition in the Indo-Pacific
    NATIONAL SECURITY FELLOWS PROGRAM Winning Strategic Competition in the Indo-Pacific Jason Begley PAPER SEPTEMBER 2020 National Security Fellowship Program Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org/NSF Statements and views expressed in this report are solely those of the author and do not imply endorsement by Harvard University, Harvard Kennedy School, the Belfer Center for Science and International Affairs, the U.S. government, the Department of Defense, the Australian Government, or the Department of Defence. Design and layout by Andrew Facini Copyright 2020, President and Fellows of Harvard College Printed in the United States of America NATIONAL SECURITY FELLOWS PROGRAM Winning Strategic Competition in the Indo-Pacific Jason Begley PAPER SEPTEMBER 2020 About the Author A Royal Australian Air Force officer, Jason Begley was a 19/20 Belfer Center National Security Fellow. Trained as a navigator on the P-3C Orion, he has flown multiple intelligence, surveillance and reconnaissance opera- tions throughout the Indo-Pacific region and holds Masters degrees from the University of New South Wales and the Australian National University. His tenure as a squadron commander (2014-2017) coincided with the liberation of the Philippines’ city of Marawi from Islamic State, and the South China Sea legal case between the Philippines and the People’s Republic of China. Prior to his Fellowship, he oversaw surveillance, cyber and information operations at Australia’s Joint Operations Command Headquarters, and since returning to Australia now heads up his Air Force’s Air Power Center. Acknowledgements Jason would like to acknowledge the support of the many professors at the Harvard Kennedy School, particularly Graham Allison who also helped him progress his PhD during his Fellowship.
    [Show full text]
  • CIA's Relationship with Congress, 1946–2004 L. Britt Snider
    THE AGENCY AND THE HILL: CIA’s Relationship with Congress, 1946–2004 L. Britt Snider The Center for the Study of Intelligence CSI was founded in 1974 in response to Director of Central Intelli- gence James Schlesinger’s desire to create within CIA an organiza- tion that could “think through the functions of intelligence and bring the best intellects available to bear on intelligence problems.” The center, comprising professional historians and experienced practitio- ners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence chal- lenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctri- nal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents PO Box 391954 Pittsburgh, PA 15250-7954 Phone (202) 512-1800 E-mail: [email protected] ISBN: 978-1-929667-17-8 GPO Stock#: 04101500257-1 All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official posi- tions of the Central Intelligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the author’s factual statements and interpretations.
    [Show full text]
  • Wikipedia, the Free Encyclopedia
    Cryptome From Wikipedia, the free encyclopedia Note Wikipedia gob-smacked editors: Cryptome is a self-funded free public library, not the melodramatic Cryptome hyperbole tuba-blared here -- get a grip on your eyeball jiggery-pokery. Disclosing sensitive documents for public study is a duty for any library and should not be over-emphasized and monetized like exaggerating Web address cryptome.org media hoopla and scandal mongering leak sites lemminging hungry rodents. Further, wash your mouse (https://cryptome.org/) and keyboard, lurid citations of the family of Deborah Commercial? Yes Natsios -- none involved in Cryptome -- are cheap shots on the order of Glenn Greenwald rhetorical squeals: Registration None "repellent and demented" or WikiLeaks' sanctmoniously Owners John Young, Deborah Natsios chronic belly-ache "smear." Editors John Young, Deborah Natsios We made a few corrections, but the page is still a biased Launched June 1996 narrative aimed at the least intelligent and most addicted to low entertainment. Leave them be awful as they are, Current status Active get a real job hatcheting for WMD-secured governments, over-haired politicians, dissolute oligarchs and pseudo-communist billionaires. Cryptome is a pro-transparency publishing platform and an anonymous drop-box for whistleblowers created in 1996 by John Young and Deborah Natsios.[1][2][3] The site aggregates information about freedom of information, cryptography, spying, and surveillance.[4] The website is best known for exposing the CIA analyst who found Osama Bin Laden.[5][6] Contents 1 People 1.1 John Young 1.2 Deborah Natsios 2 Hosted documents 2.1 Editorial policy 3 History 3.1 2007 3.2 2010 3.3 2012-2014 3.4 2015 4 Governmental investigation 5 Notable criticism 6 See also 7 References 8 External links People Cryptome was created by John Young and Deborah Natsios, architects.
    [Show full text]