hard drugs and weapons, or one of several sites that claim to offer untraceable contract killings Some examples available at the Tor Hidden Service kpvz7ki2v5agwt35.onion/wiki/index.php/main_page (must be running Tor to access this site).
and then extrapolate the addresses of others Stevens Le Blond, Pere Manils, et al. “One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users,” March 2011, available at https://db.usenix.org//events/leet11/tech/full_papers/LeBlond.pdf
recognize and analyze Tor Hidden Services based on fingerprinting those timing differences Steven J. Murdoch. “Hot or Not: Revealing Hidden Services by their Clock Skew,” available here: http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf
and some in-between actors whose truth-telling is utterly unpredictable Raymond Smullyan. What Is the Name of This Book? (Englewood Cliffs, N.J.: Prentice Hall, Inc., 1978).
crawling the entire Chinese-language Web looking for Tor node addresses and blocked nearly all of them Andrew Lewman. “Tor partially blocked in China.” Tor Project blog, available at https://blog.torproject.org/blog/tor-partially-blocked-china
“My hatred of authority was pretty much solidified” Jacob Appelbaum. “Personal experiences bringing technology and new media to disaster areas.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/events/478.en.html
installed a red lightbulb in his bedroom in an effort to regulate his sleep Barrowclough.
activists who would crash in the house rent-free in exchange for working on Assange’s project Khatchadourian.
accept unencrypted documents by post and even scan in reams of paper submissions and convert them to text files E-mail from Julian Assange to WikiLeaks developer list, December 13, 2006, available at http://cryptome.org/wikileaks/wikileaks-leak.htm
“Yes, the guy running the exit node can read the bytes that come in and out there” Bruce Schneier. “Lesson from Tor Hack: Anonymity and Privacy Aren’t the Same.” Wired.com, September 20, 2007.
a member of the project who ran a Tor exit node had noticed Chinese hackers using the relay to hide their tracks Khatchadourian.
“Somewhere between none and a handful of those documents were ever released on WikiLeaks” John Leyden. “Wikileaks denies Tor hacker eavesdropping gave site its start.” TheRegister.co.uk, June 2, 2010.
“When they pull, so do we” E-mail from Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm
thirty times the size of every text article stored on Wikipedia Wikipedia: Database download, available at http://en.wikipedia.org/wiki/Wikipedia:Database_download
“let it flower into something new” Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm
spreading free software like a hacker Johnny Appleseed Jacob Appelbaum. “Personal experiences bringing technology and new media to disaster areas.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/events/478.en.html
“As an American, I found myself feeling pretty awful about what we’d contributed to” Ibid.
grabbed the remote, turned up the volume, and refused to change the channel Ibid.
A man beaten in the shower. Nightly curfews, women raped. Xeni Jardin interview with Jacob Appelbaum. “Katrina: ‘Rape, murder, beatings’ in Astrodome, say evacuees.” BoingBoing.net, September 7, 2005.
“The same thing, over and over again. The disconnection. The lack of humanity.” Jacob Appelbaum. “Personal experiences bringing technology and new media to disaster areas.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/events/478.en.html
transfer the equivalent of $50,000 from a bank to the CCC’s accounts Steve Kettman. “Tribute to Hippie Hacker Holland.” Wired.com, July 31, 2001.
even when authorities are standing over the user, rubber hose in hand, demanding the key Jacob Appelbaum. “A discussion about modern disk encryption systems.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/speakers/165.en.html
“Justice was just too slow to catch you” Ibid.
The handbooks of secret rituals for nine different fraternities All of these are available at the WikiLeaks.org archive: http://www.wikileaks.org/wiki/Category:Analyses.
“smearing and stinging by governments, corporations, persons of all demonics” E-mail from John Young to the WikiLeaks developer mail list, December 20, 2006, http://cryptome.org/wikileaks/wikileaks-leak.htm
“Or is it a clever smear by US intelligence?” “Inside Somalia and the Union of Islamic Courts.” WikiLeaks.org, available at http://wikileaks.org/wiki/Inside_Somalia_and_the_Union_of_Islamic_Courts
reports of currency counterfeiting by the regime’s organized crime connections Xan Rice. “The looting of Kenya.” The Guardian, August 30, 2007.
indiscriminate police killings of thousands of young men “Oscar Foundation letter to Minister for Internal Security over extra-judicial killings in Kenya.” WikiLeaks.org, October 14, 2008, available here: http://wikileaks.org/wiki/Oscar_Foundation_letter_to_Minister_for_Internal_Security_over_extra-judicial_killings_in_Kenya,_14_Oct_2008.
tax shelters administered by the Swiss Bank Julius Baer “Bank Julius Baer.” WikiLeaks.org, available here: http://wikileaks.org/wiki/Bank_Julius_Baer
dumping in the Ivory Coast that had been legally prevented from appearing in British media “Ivory Coast toxic dumping report behind secret Guardian gag.” WikiLeaks.org, October 13, 2009 available here: http://wikileaks.org/wiki/Ivory_Coast_toxic_dumping_report_behind_secret_Guardian_gag
Icelandic banking documents that would catalog the country’s financial meltdown “Financial collapse: Confidential exposure analysis of 205 companies each owing above EUR45M to Icelandic bank Kaupthing.” WikiLeaks.org, September 26, 2008 available at http://wikileaks.org/wiki/Financial_collapse:_Confidential_exposure_analysis_of_205_companies_each_owing_above_EUR45M_to_Icelandic_bank_Kaupthing,_26_Sep_2008
And a collection of pager messages from September 11, 2001 “9/11 tragedy pager intercepts.” WikiLeaks.org, available here: http://911.wikileaks.org/
would catch the attention of one young analyst in a dusty base in Iraq Hansen.
“Wikileaks will release several thousand additional pages of Scientology material next week” “Scientology threatens WikiLeaks over secret cult bibles.” WikiLeaks.org, April 7, 2008. No longer online but available at http://Web.archive.org/Web/20080704235334/https://secure.wikileaks.org/wiki/Scientology_threatens_Wikileaks_over_secret_cult_bibles
one of the largest collections of the church’s internal documents stored anywhere in the world. WikiLeaks archive: http://www.wikileaks.org/wiki/Category:Analyses
CHAPTER 5: THE PLUMBERS
Note: Much of the material for this section regarding HBGary Federal and Aaron Barr came from AnonLeaks, a website created to publish the hacked e-mails of the employees of HBGary and HBGary Federal. The site no longer exists, and given that I no longer consider the documents taken from that site to be public, I’ve treated them as my own reporting and haven’t cited them below.
it put the first five GPS satellites into orbit Duncan Graham-Rowe. “Fifty years of DARPA: Hits, misses and ones to watch.” New Scientist.com, May 15, 2008.
developed and flew the first stealth planes Ibid.
organized a series of races of robotic, driverless cars through the desert Ibid.
driven between San Francisco and Los Angeles with no human assistance “Google Cars Drive Themselves, in Traffic” The New York Times, October 9, 2010.
build flying Humvees Clay Dillow. “DARPA’s ‘F
lying Humvee’ Is Moving Ahead, Ready for Prototype.” Popsci.com, October, 25, 2011.
mechanical bats that can suck electricity from power lines Jonathan Fahey. “How to Build a Spy Bat.” Forbes.com, June 26, 2009.
cyborg cockroaches Travis Korte. “Cyborg Insect Breakthrough: Generating Power Through Body Chemistry.” HuffingtonPost.com, January 8, 2012.
roving robots that can switch between liquid and solid form Anne-Marie Corley. “iRobot’s Shape-Shifting Blob ’Bot Takes Its First Steps.” IEEE Spectrum, October 13, 2009.
roving robots that can feed themselves with grass and twigs Noah Shachtman. “Company Denies Its Robots Feed on the Dead.” Wired.com, July 17, 2009.
Iron Man–like exoskeletons that multiply human strength by a factor of ten Larry Greenemeier. “Real-Life Iron Man: A Robotic Suit That Magnifies Human Strength.” Scientific American, April 30, 2008.
surveillance systems designed to watch every moving object in entire cities Noah Shachtman. “Darpa’s Far-Out Dreams on Display.” Wired.com, March 15, 2004.
“might already have on their hands the blood of some young soldier” Adam Levine. “Top military official: WikiLeaks founder may have ‘blood’ on his hands.” CNN.com, July 29, 2010.
said that the exposure hadn’t led to any documented casualties Ellen Nakashima. “Pentagon: Undisclosed Wikileaks documents ‘potentially more explosive.’” Washingtonpost.com, August 11, 2011.
another fifteen thousand civilian deaths that hadn’t been previously documented “Iraq War Logs: What the numbers reveal.” Iraqbodycount.org, October 23, 2010.
Nouri al-Maliki used “detention squads” in the Iraqi army to harass political rival groups Gregg Carlstrom. “Nouri al-Maliki’s ‘detention squad.’” Al Jazeera, October 24, 2010.
claiming it violated the company’s terms of service David Leigh and Rob Evans. “WikiLeaks says funding has been blocked after government blacklisting.” The Guardian, October 14, 2010.
“Saudi Arabia Urges US Attack on Iran to Stop Nuclear Programme” Ian Black and Simon Tisdall. The Guardian, November 28, 2010.
“China leadership ‘orchestrated Google hacking’” BBC.co.uk, December 4, 2010.
“Did Pfizer Bribe Its Way Out of Criminal Charges in Nigeria?” Walter Armstrong. TheAtlantic.com, December 27, 2010.
“Texas Company Helped Pimp Little Boys To Stoned Afghan Cops” John Nova Lomax. HoustonPress.com, December 7, 2010.
“China ‘ready to abandon North Korea’” Simon Tisdall. The Guardian. November 29, 2010.
“WikiLeaks cables on Afghanistan show monumental corruption” Tim Lister. CNN.com, December 2, 2010.
“Iraqi Children in U.S. Raid Shot In Head” Matthew Schofield. McClatchy Newspapers, August 31, 2011.
“U.S. Bombs Yemen in Secret” Justin Elliott. Salon.com, November 29, 2010.
“US diplomats spied on UN leadership” Robert Booth and Julian Borger. The Guardian, November 28, 2010.
one out of every two issues of The New York Times in 2011 cited a document published by WikiLeaks Caitlin Dickson. “Nearly Half of 2011’s New York Times Issues Rely on WikiLeaks.” Theatlanticwire.com, April 25, 2011.
“closer to being a hi-tech terrorist than the Pentagon Papers” Ewen MacAskill. “Julian Assange like a hi-tech terrorist, says Joe Biden.” The Guardian, December 19, 2010.
“pursued with the same urgency we pursue al-Qaeda and Taliban leaders” “Assange lawyer condemns calls for assassination of WikiLeaks’ founder.” MSNBC.com, December 2, 2010.
undermine the ability of our government and our partners to keep our people safe and to work together to defend our vital interests” “LIEBERMAN CONDEMNS NEW WIKILEAKS DISCLOSURES.” Lieberman .senate.gov, November 28, 2010.
Amazon, which had hosted some WikiLeaks Web servers, banned the group Rachel Slajda. “How Lieberman Got Amazon to Drop WikiLeaks.” Talking Points Memo, December 1, 2010.
Another woman said he had begun having sex with her in her sleep Juha Saarinen. “Documents in Julian Assange Rape Investigation Leak Onto Web.” Wired.com, February 2, 2011.
once housed the writer of his favorite quote on the power of anonymity: Oscar Wilde David Allen Green. “An interview with Julian Assange’s lawyer.” Jack of Kent blog, December 14, 2010.
five gigabytes of data from the megabank Dan Nystedt. “WikiLeaks plans to make the Web a leakier place.” Computerworld.com, October 9, 2009.
“I think it’s great. We have all these banks squirming, thinking maybe it’s them” 60 Minutes, CBS News, January 30, 2011, available at http://www.cbsnews.com/video/watch/?id=7300034n
the bank documents lacked the punch of WikiLeaks’ previous three megaleaks Mark Hosenball. “Assange suggests bank documents are a snore.” Reuters, February 9, 2011.
review millions of possible documents in its archive that might damage the firm if they were leaked Nelson D. Schwartz. “Facing Threat from WikiLeaks, Bank Plays Defense.” The New York Times, January 2, 2011.
Brianmoynihanblows.com and Brianmoynihansucks.com, references to its CEO “Bank of America Wants You to Know Its Executives Don’t Suck.” Domainnamewire.com, December 20, 2010.
included the Tea Party and its billionaire corporate supporters the Koch brothers Clare O’Connor. “FBI Hunting Hackers Who Took Down Koch Brothers’ Websites.” Forbes.com, July 26, 2011.
the antihomosexual extremist Westboro Baptist Church Catharine Smith. “Anonymous Attacks Westboro Church Website During Live Interview.” Huffingtonpost.com, February 25, 2011.
Sony Corporation after it sued a hacker who reverse-engineered the PlayStation 3 Lawrence Latif. “Anonymous takes down Playstation website and Playstation Network.” TheInquirer.net, April 6, 2011.
Anguilla, Australia, Brazil, Egypt, Israel, Sweden, Tunisia, Turkey, the United States, Venezuela, and Zimbabwe, among others Dean Wilson. “Anonymous hacks Anguilla, Brazil, Zimbabwe and Australia governments.” TheInquirer.net, June 28, 2011.
Paul Wagenseil. “Anonymous ‘hacktivists’ attack Egyptian Websites.” MSNBC .msn.com, January 26, 2011.
Sean-Paul Correll. “’Tis the Season of DDoS—WikiLeaks Edition.” Panda Labs blog, December 4, 2010, available at http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio/
Daren Butler. “Turkish websites attacked by Anonymous before vote.” Reuters, June 9, 2011.
Max Read. “Anonymous Attacks Tunisian Government over Wikileaks Censorship.” Gawker.com, January 3, 2011.
Anshel Pfeffer and Oded Yaron. “Israel government, security services websites down in suspected cyber-attack.” Haaretz, June 11, 2011.
“Swedish prosecutor’s website under cyber attack.” Agence France Presse, December 7, 2010.
“GET YOUR ASS BEHIND A PROXY AND JOIN THE RAID!” Available at http://xo-whs.wikispaces.com/file/view/Anonymous_Propaganda_by_raithesheep.jpg/35922471
leaked video of scientologist star Tom Cruise extolling the church’s virtues Nick Denton. “The Cruise Indoctrination Video Scientology Tried to Suppress.” Gawker.com, January 15, 2008.
nihilistic pranks like hacking an online epilepsy forum to display blinking lights intended to cause seizures Mattathias Schwartz. “The Trolls Among Us.” New York Times Magazine, August 3, 2008.
Hello, Scientology. We are Anonymous. Available here: http://www.youtube.com/watch?v=JCbKv9yiLiQ
harmless wheat germ and cornstarch—mailed to dozens of the church’s addresses “‘Anonymous’ stalks Church of Scientology.” UPI, February 5, 2008.
“The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops.” Sitara Nieves. “Morning Wrap: Mastercard and ‘Anonymous’ Hacker Group—Technological Warfare?” The Takeaway, WNYC, December 8, 2010. www.thetakeaway.org/blogs/takeaway/2010/dec/08/morning-wrap-mastercard-and-hack
er-group-anonymous-technological-warfare
spent hundreds of millions of dollars acquiring companies in the so-called Data-Leak Prevention (DLP) industry Brian Prince. “McAfee Buys Out Data Loss Prevention Specialist Reconnex.” eWeek, July 31, 2008.
implementing leak-focused software, and another third were considering the option Andrew Jaquith. “The Forrester Wave: Data Leak Prevention Suites.” Forrester Research, October 12, 2010.
60 percent of employees admit to taking sensitive data before leaving a job Brian Prince. “Survey: Axed Employees Often Walk Out with Corporate Data.” eWeek, February 2, 2009.
how physical media like CDs could be used on SIPRNet machines Noah Shachtman. Military Bans Disks, Threatens Courts-Martial to Stop New Leaks. Wired.com, December 9, 2010.
“But to me this is putting an ax to a problem that requires a scalpel” Senate Homeland Security and Governmental Affairs Committee hearing, March 10, 2011. Originally broadcast on C-Span, available on YouTube: http://www.youtube.com/watch?v=w_VZ4GANG1o
“dimensions of the mission,” any of which could be strung together and add up to a data leak DARPA-BAA-10-84, Cyber Insider Threat (CINDER) Program, August 25, 2010, available here: https://www.fbo.gov/index?s=opportunity&mode=form&id=cf11e81b7b06330fd249804f4c247606&tab=core&_cview=0
he had once received an informal warning from a “three letter agency” Bruce Gottlieb. “HacK, CouNterHaCk.” New York Times Magazine, October 3, 1999.
“Freak out and beg Microsoft to make the bad man stop” E-mail from Dildog to Bugtraq Mail List, November 10, 1997, available here: http://seclists.org/bugtraq/1997/Nov/79
sniffing the net like an anteater on Dexedrine Pamela Ferdinand. “‘White Hat’ Hackers Probe Pores in Computer Security Blankets.” The Washington Post, April 4, 1998.
But the thieves themselves hid behind layers of proxies that kept them altogether anonymous Nathan Thornburgh. “The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them).” Time, August 29, 2005.
“You were only going to wait half an hour?” Richard A. Clarke. Your Government Failed You (New York: Harper Perennial, 2009), p. 299.
This Machine Kills Secrets Page 39