The materials that Ellsberg leaked were actually of a higher top-secret classification Glenn Greenwald. “The intellectual cowardice of Bradley Manning’s critics.” Salon.com, December 24, 2011.
“I can’t tell you how much that affected me.” Fantz.
CHAPTER 2: THE CRYPTOGRAPHERS
one unit of data switching from a one to a zero or vice versa seemingly of its own accord Daniel S. Morrow. “Craig R. Barrett, Ph.D. Oral History.” Computerworld Honors Program International Archives, October 24, 2002.
“He went off and did something wonderful” Ibid.
“Anonymous networks, digital pseudonyms, reputations, information markets, black markets, collapse of governments” Tim May. “The Crypto-Anarchist Manifesto.” In Peter Ludlow, ed. High Noon on the Electronic Frontier (Cambridge: Massachusetts Institute of Technology, 1996), p. 239.
long-bearded hermit, living in a well-fortified redoubt in the mountains Thomas Fischermann. “Die Piraten des 21. Jahrhunderts.” Die Zeit, December 4, 2003.
covering them with the detached doors of their homes Robert Scheer. With Enough Shovels (New York: Vintage Books, 1983), p. 23.
“We are on strike, we, the men of the mind” Ayn Rand. Atlas Shrugged (New York: Random House, 1957).
one rebel group allows anyone to anonymously spill their secrets over the phone lines Jon Brunner. The Shockwave Rider (Ballantine Books, 1976).
a history of the National Security Agency and its shadowy work James Bamford. The Puzzle Palace (New York: Penguin Books, 1983).
only weakness is the identity that ties them to their frail bodies Vernor Vinge. “True Names.” In True Names and the Opening of the Cyberspace Frontier (New York: Tor, 2001), first published in Dell Binary Star #5, 1981.
M. T. Graves and the Dungeon Steven Levy. Crypto (New York: Penguin Books, 2001), p. 187.
Herbert Zim’s Codes & Secret Writing Ibid.
produce a solution in minutes Levy, p. 188.
remove the pad’s random noise, breaking the ciphers “The Vernon Story,” published by the Center for Cryptologic History, NSA.gov, available at http://www.nsa.gov/about/_files/cryptologic_heritage/publications/coldwar/venona_story.pdf
“Poe’s dictum will be hard to defend in any form” Martin Gardner. Penrose Tiles to Trapdoor Ciphers—and the Return of Dr. Matrix (New York: W. H. Freeman, 1989).
In fact, that was a few zeroes too many Levy, p. 104.
“Security without Identification: Transaction Systems to make Big Brother Obsolete” David Chaum. “Security without Identification: Transaction Systems to make Big Brother Obsolete.” Communications of the Association of Computing Machinery, October 1985.
“the most gee-whiz-whoopie enthusiastic character I had run into” Simson Garfinkel. PGP: Pretty Good Privacy (Sebastopol, Calif.: O’Reilly & Associates, 1994).
MIT was running the program on a mainframe using LISP Levy, p. 189.
the two men spent a week at his whiteboard hashing out crypto-programming Garfinkel, p. 90.
ITAR was choking his business Garfinkel, p. 88.
It is the sense of Congress that providers of electronic communications services Levy, p. 195.
Uncrackable encryption will allow drug lords, spies, terrorists, and even violent gangs to communicate Statement of Louis Freeh, Senate Judiciary Committee Hearing, July 9, 1997, available at the website of the Federation of American Scientists: http://www.fas.org/irp/congress/1997_hr/s970709f.htm
stock up on crypto gear while you can still get it Levy, p. 196.
using pay phones to log on and upload copies of the program to message boards without revealing the program’s source Levy, p. 197.
Phil, I wish you to know: let it never be . . . Statement of Philip Zimmermann, Senate Committee on Commerce, Science, and Transportation, June 26, 1996, available on Philip Zimmermann’s website: http://www.philzimmermann.com/EN/testimony/index.html
A specter is haunting the modern world, the specter of crypto anarchy May in Ludlow, p. 237.
Users of a Mix network . . . David Chaum. “Untraceable electronic mail, return addresses, and digital pseudonyms.” Communications of the Association of Computing Machinery, February 1981.
“Cypherpunks write code” Eric Hughes. “A Cypherpunk’s Manifesto.” As printed in Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow ed. (Cambridge: Massachusetts Institute of Technology, 2001), p. 81.
Even laws against cryptography reach only so far as a nation’s border and the arm of its violence Ibid., p. 83.
“It was the worst day” Philip Zimmermann’s talk at the University of Illinois at Champaign-Urbana, October 24, 2004, available on Philip Zimmermann’s website at http://www.philzimmermann.com/EN/audiovideo/index.html
cut-rate criminal lawyer that Zimmermann had hired in Boulder Ibid.
A cease-and-desist letter from Intel threatening a suit for trademark infringement eventually kiboshed that guerrilla sticker campaign Levy, p. 252.
“Not ninety-nine percent. One hundred point zero percent” Zimmermann’s University of Illinois talk.
strapping a copy of PGP to a missile and shooting it at Mexico, just to prove a point Ibid.
“When they got that one, I can imagine the blood draining from their faces” Ibid.
Karn sued them in a federal court Ibid.
“I’d like you to also publish the source code to PGP” Ibid.
By 1996, Clipper was sunk Levy, p. 268.
Your name has come to our attention Tim May. “Introduction to BlackNet,” in Ludlow’s High Noon, p. 241.
report any contact with the shadowy organization Tim May. “Untraceable Digital Cash, Information Markets, and BlackNet.” Talk at the Computers Freedom and Privacy conference, 1997.
“Classified classifieds,” so to speak. “No More Secrets” Tim May. “BlackNet Worries,” in ibid., p. 245.
CHAPTER 3: THE CYPHERPUNKS
“was in heaven” Stephen Muirhead. “MUMS the Word: Julian Assange, Wikileaks, and the Fight to End Government Secrecy.” Paradox, August 15, 2010.
insisting that it be replaced with an image of an alien Ibid.
most physicists pathetically lugged about with pride and ignorance Julian Assange’s blog at IQ.org, July 12, 2006 (no longer online but mirrored at http://aworldbeyondborders.com/research-raw-materials/julian-assange-writings/).
inaccurately, according to the department’s staff Muirhead.
rolling over them and burying them alive Nicki Barrowclough. “Keeper of Secrets.” The Age, May 22, 2010.
Assange invented a game: The Puzzle Hunt Muirhead.
Another conundrum involved factoring large numbers into primes Melbourne University Mathematics Society Puzzle Hunt 2004 Puzzles, available at http://www.ms.unimelb.edu.au/~mums/puzzlehunt/2004/puzzles.html
a secret about a secret that is veiled by a secret. Ibid.
“when you have to do something or you’ll lose the game” Barrowclough.
“standing around looking pretty, even making tea” Muirhead.
Hello Puzzle Hunters Ibid.
a political version of the Puzzle Hunt, with great social implications Ibid.
“homemade nitroglycerin in the old cypherpunks blast shack has gone off” Bruce Sterling. “The Blast Shack.” Webstock.org.nz, December 22, 2010
archival footage of Hiroshima Cryptome.org, April 2011 archive, available at http://cryptome.org/cryptomb29.htm
immigration papers for Barack Obama Sr. Ibid.
Wau Holland Foundation Ibid.
“Don’t believe anything you see there” Cryptome.org privacy policy, available at http://cryptome.org/other-stuff.htm
maneuvers by Microsoft to remove his site from the Internet in 2010 Ryan Singel. “Microsoft Takes Down Whistlebl
ower Site, Read the Secret Doc Here.” Wired.com, February 24, 2010.
“Well, I’m actually looking for that information right now” Michael Crowley. “Let’s Shut Them Down. These websites are an invitation to terrorists.” Reader’s Digest, March 2005. Reproduced at http://cryptome.org/Web-threats.htm
all while periodically stomping around the room Dreyfus and Assange, Underground.
splendide mendax, the “nobly untruthful” in Horace’s Odes Raffi Khatchadourian. “No Secrets.” The New Yorker, June 7, 2010.
Assange was determined to access Minerva Dreyfus and Assange.
“Yes, it’s L-U-R-C-H—full stop.” All the above comes from ibid.
“living in a bikini” and “going native” “Julian Assange’s Mother Recalls Magnetic.” Magnetic Times, August 7, 2010.
opossums ran across their beds in the dark George Hirst. “Christine Assange Recalls Her Magnetic Island Days.” Magnetic Times, August 31, 2011.
“There was a sense of safety and security” Ibid.
“I wasn’t sorry to leave when presented with the dental bills of my tormentors” Assange, blog at IQ.org, July 18, 2006.
fifteen different towns and at least as many schools, when he attended school at all Dreyfus and Assange.
“get out of politics” or risk being seen as an “unfit mother” Hans Ulrich Olbrist. “Interview With Julian Assange, Part I.” E-Flux, May 2011.
“Chess is very austere, in that you don’t have many rules, there is no randomness, and the problem is very hard” Khatchadourian.
Therefore its readership remained at three Dreyfus and Assange.
“to enter the depths of the Pentagon’s Eighth Command at the age of seventeen was a liberating experience” Hans Ulrich Obrist.
“and share information” Dreyfus and Assange.
hide his location and identity by routing his modem’s phone traffic through that intermediary Ibid.
Mendax’s career was over All the above in this passage comes from ibid.
“a cross between a mutter and the Oracle of Delphi” Richard Rosenkranz. Across the Barricades (New York/Philadelphia: J.B. Lippincott, 1971), p. 179.
“the Avery Commune was once again a functioning organism” Ibid.
“I approached a condition of human relationships that can usually be found only in the realm of ideas” Ibid., p. 44.
“I think my childhood was just great” Ibid.
“We’re prepared to start right now” John Cook. “Secrets + Lies.” Radar, August 2007.
before he could call his fellow hackers to warn them that he had tipped off the telecom’s security Dreyfus and Assange.
“I am not concerned about using my skills there” All the above in this passage from ibid.
Scientologists believed in communication with plants Andrew Fowler. The Most Dangerous Man in the World (Melbourne: Melbourne University Press, 2011), p. 26.
“True belief only begins with a jackboot the door” Assange’s blog at IQ.org, July 17, 2006.
one demanding user a “dummy” and tells him to “get a life” E-mail from Julian Assange to the Cypherpunk Mailing List, December 24, 1995.
“some research is in order before you go shooting off your mouth” E-mails from Julian Assange to the Cypherpunk Mailing List, January 14, 1996.
“afterschool Tupperware get-together” Ibid., December 30, 1995.
“Your testical, [sic] again Nancy?” and “National Gay Secrecy Unit” Ibid., February 3, 1996.
“The Internet is, by its very nature a censorship free zone” Ibid., December 17, 2003.
Eleven people showed up Fowler, p. 26.
one user with the Penet pseudonym “an144108” Sabine Helmers. “A Brief History of anon.penet.fi, The Legendary Anonymous Remailer.” Computer-Mediated Communication Magazine, September 1997.
“All of them,” answered Jim Jim Bell. “Assassination Politics,” available at http://cryptome.org/ap.htm
botched a series of deals “How DigiCash Blew Everything.” NEXT, January 1999, available in translation from Dutch here: http://cryptome.org/jya/digicrash.htm
It would be an encrypted, anonymous, digital dead pool Bell.
No military? Ibid.
put out anonymous hits on criminals just as easily as politicians Ibid.
murder those who annoy us sufficiently E-mail from anon-remailer@utopia .hacktic.nl to the Cypherpunk Mailing List, January 27, 1996.
“Others won’t” E-mail from Jim Bell to the Cypherpunk Mailing List, January 26, 1996. (The seeming date discrepancy between Bell and the anonymous cypherpunk is caused by time zone differences.)
“I am out to ‘get’ the government” Ibid., January 29, 1996.
by resorting to violence you are no better than the ones you purport to protect us against E-mail from Jim Choate to the Cypherpunk Mailing List, February 6, 1996.
Are you a statist? E-mail from Jim Choate to the Cypherpunk Mailing List, February 10, 1996.
the e-mail that followed his BlackNet experiment more than three years earlier May in “BlackNet Worries.”
leaked data in all directions Wim van Eck. “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?” Computer & Security, December 1985. Republished at http://cryptome.org/jya/emr.pdf
water pipes and sprinkler system around a computer might propagate its electric field and spill its data even further E-mails from Jim Bell and Julian Assange to the Cypherpunk Mailing List, May 29, 1996.
“knowing that reasonable people will think you’re a nut seeking celebrity martyrdom” E-mail from John Young to the Cypherpunk Mailing List, February 11, 1996.
“I may be one of the system’s first victims” E-mail from Jim Bell to the Cypherpunk Mailing List, February 11, 1996.
federal agents who seized his computers, his car, three assault rifles, and a .44 Magnum handgun “Criminal complaint against Jim Bell,” May 16, 1997, available at http://cryptome.org/jya/jimbell3.htm
find its way into the building’s computers and short out their wiring Ibid.
dumping a chemical called mercaptan on the rug outside an IRS office in Vancouver, Washington Ibid.
“They are all either crooks or they tolerate crooks or they are aware of crooks among their numbers” Declan McCullagh. “Crypto-Convict Won’t Recant.” Wired.com, April 14, 2000.
where he spent his days demolishing computer monitors for forty-six cents an hour Declan McCullagh, “Jim Bell Update.” Wired.com, May 25, 2002.
a groundbreaking work in “government accountability systems” Letter from John Young to Vikki Hardy, July 11, 1998, available at http://cryptome.org/jya/chrysler98.htm
“Jim Bell . . . lives . . . on . . . in . . . Hollywood!” E-mail from Julian Assange to the Cypherpunk Mailing List, January 9, 1998.
He called it Marutukku E-mail from Julian Assange to Firewalls Mail List, June 4, 1997.
would soon rename it, simply, “Rubberhose” Suelette Dreyfus. “The Idiot Savant’s Guide to Rubberhose,” available at http://namcub.accela-labs.com/pdf/maruguide.pdf
“Our motto is ‘let’s make a little trouble’” Ibid.
“Alice certainly isn’t in for a very nice time of it. (Although she’s far more likely to protect her data.)” E-mail from Julian Assange to mgraffam@mhv .net, March 27, 1998, available at http://cryptome.org/0001/assange-cpunks.htm
In 1999, he registered Leaks.org Barrowclough.
“one to be cherished and the other to be destroyed” E-mail from Julian Assange to [email protected], March 23, 2002, available here: http://cryptome.org/0001/assange-cpunks.htm
posted it to his blog with the name “Conspiracy as Governance” Available here: http://cryptome.org/0002/ja-conspiracies.pdf
create powerful incentiv
es for more humane forms of governance. Ibid.
“the result of mental inclinations honed for the preliterate societies in which our species evolved” Ibid.
resulting in decreased ability to hold onto power as the environment demands adaption. From Julian Assange’s blog at IQ.org, Available here: http://cryptome.org/0002/ja-conspiracies.pdf
“secretive or unjust systems are nonlinearly hit relative to open, just systems” Ibid.
“Man is least himself when he talks in his own person. Give him a mask and he’ll tell you the truth.” Dreyfus and Assange.
The NSA first denied his request but gave in on appeal Letter from William Black to John Young, December 18, 2000, available at http://cryptome.org/nsa-foia-app2.htm
listed 116 names of MI6 officials sent to the newsweekly, along with locations and dates showing their movements across the globe Available at http://cryptome.org/mi5-lis-uk.htm
the source, a PSIA agent named Hironari Noda, revealed his identity within days Available at http://cryptome.org/psia-lists.htm
a trove of files by an ex-CIA agent to be published at his death Available at http://cryptome.org/cia-2619.htm
“. . . Will you be that person?” E-mail from Julian Assange to John Young, October 4, 2006, http://cryptome.org/wikileaks/wikileaks-leak.htm
Then he unsubscribed John Young from the list All the above quotes from ibid.
Jim Bell was scheduled for release from prison on March 12, 2012 Federal Bureau of Prisons Website http://www.bop.gov/iloc2/LocateInmate.jsp
CHAPTER 4: THE ONION ROUTERS
those are the systems required or used by the current government oppressors Jacob Appelbaum writing on Twitter, February 19, 2011.
“the Arab dictator’s favorite uplink” Ibid.
“I wanted to meet interesting and stimulating people of an ancient culture . . . and own them” Ibid.
“It’s ethical to own them” Ibid., February 18, 2011.
“if you’ve got them, I’ll track them” Ibid., January 28, 2011.
“Good luck with that, you son of a bitch!” Ibid.
“Jake has been a tireless promoter behind the scenes of our cause” Nathaniel Rich. “The American WikiLeaks Hacker,” RollingStone.com, December 1, 2010.
This Machine Kills Secrets Page 38