From The Magazine : Radar Online : Inside Cryptome, the website the CIA doesn’t want you to see

From The Magazine : Radar Online : Inside Cryptome, the website the CIA doesn’t want you to see

During the past few years, Young has published detailed overhead satellite imagery of Site R, a military installation in Pennsylvania that he claims is Vice President Dick Cheney’s undisclosed location. Hours after the FBI announced charges in June against four men for plotting to blow up jet-fuel tanks at John F. Kennedy International Airport in New York, Cryptome ran photos of the airport tank farms, pointing out the exact route of a jet-fuel pipeline buried beneath nearby residential neighborhoods. He regularly publishes satellite photos of the homes of intelligence officials, including CIA Director Michael Hayden’s Washington, D.C., residence. He has exposed the names of what he claims are 276 British agents covertly working for MI6, the names of 400 secret Japanese intelligence agents, and the names and home addresses of what he claims are 2,619 CIA sources.

Young is a mad scientist of secrecy, working with little more than monomaniacal focus and an Internet connection to turn the tables on the spooks and expose what he regards as a worldwide criminal network of intelligence operatives. And the spies don’t like it. After he posted the MI6 list in 1999, the British government reportedly asked his Internet service provider at the time to shut the site down. The company refused, but in May of this year, his hosting service suddenly, without explanation, announced that it would no longer have anything to do with the site. (Young promptly relocated to another service.) He says he has received three visits to his home from the FBI, including one from a pair of agents with the Joint Terrorism Task Force. Young’s enemies have tried to shut the site down with denial-of-service attacks. Officials at the National Security Agency read his site with interest, and everyone wants to know where he gets his information.

This entry was posted in Conspiracy Theories, Security. Bookmark the permalink.

Leave a Reply