This Machine Kills Secrets

Home > Other > This Machine Kills Secrets > Page 41
This Machine Kills Secrets Page 41

by Andy Greenberg


  “Leak at WikiLeaks” Steffen Kraft. Der Freitag, August 25, 2011.

  “That the unreconfigured cables have become public is to be applauded and not condemned” John Young statement on Twitlonger.com, September 2, 2011.

  The Guardian’s David Leigh pointed the finger at WikiLeaks for having published the encrypted file David Leigh, comment on “Swept up and away,” Economist.com, September 9, 2011.

  “any autocratic secret service worth its salt” Christian Stöcker. “A Dispatch Disaster in Six Acts” Der Spiegel, September 1, 2011.

  inexperienced leader in the sway of corrupt president Robert Mugabe’s political party Alex Bell. “Army generals face possible treason charge after WikiLeaks revelations.” The Zimbabwean, September 13, 2011.

  with some calling for manhunts and violence against them Mark Mackinnon. “Leaked cables spark witch-hunt for Chinese ‘rats.’” The Globe and Mail, September 14, 2011.

  Iraqi Anglican church to leave the country for fear of violent reprisal Billy Hallowell. “JEWISH IRAQIS MAY BE IN DANGER FOLLOWING THE RELEASE OF WIKILEAKS CABLES.” TheBlaze.com, October 11, 2011.

  “I love my country and I love my job and it’s a big loss for me” “Ethiopian journalist ID’d in WikiLeaks cable flees country.” Committee to Protect Journalists website, September 14, 2011.

  murdered in inhuman medical experiments Rochelle G. Saidel. “Ravensbruck Women’s Concentration Camp.” Jewish Women’s Archive.

  CONCLUSION: THE MACHINE

  “the whole world is watching” Posted to LiveLeak October 2 , 2011, available at http://www.liveleak.com/view?i=c11_1317570746

  doused with Mace and left blinded and screaming Posted to YouTube September 24, http://www.youtube.com/watch?v=moD2JnGTToA

  “notorious for his previous treatment of protesters” Cryptome.org, September 26, 2011, available at http://cryptome.org/info/bologna-abuser/bologna-abuser.htm

  Bologna was fined six thousand dollars by the department and faced a further inquiry by the Manhattan district attorney “‘I’d do it again,’ says police commander filmed pepper spraying the faces of women at Occupy Wall Street protest.” Daily Mail, October 21, 2011.

  A few of the recordings Jones has obtained are disturbing All OpenWatch recordings are available at http://openwatch.net/all/

  twenty-six million people used the service Benny Evangelista. “Napster files for bankruptcy.” San Francisco Chronicle, June 4, 2002.

  working in the office of his uncle’s Internet start-up Chess.net Farhad Manjoo. “A file-trading ship of fools.” Salon.com, April 21, 2003.

  twenty-billion-dollar lawsuit by the Recording Industry Association of America Rich Menta. “RIAA Sues Music Startup Napster for $20 Billion.” MP3Newswire.net, December 9, 1999.

  bankrupt in 2002 Evangelista.

  single point of failure Anthony J. Howe. “Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols.” University of Victoria, February 28, 2002.

  cut in half since 1999, from $14.6 billion to $7.6 billion Record Industry Association of America website, RIAA.org/faq

  “we will simply not be able to continue by the turn of the new year” Associated Press, October 24, 2011.

  ACKNOWLEDGMENTS

  If I listed the people who helped me write this book in either chronological order or order of importance, my wife, Malika Zouhali-Worrall, would come first. From the night I kept her up imagining Julian Assange on the cover of Forbes magazine, to my last moments of panic trying to meet my publisher’s deadlines fifteen months later, Malika offered endless ideas, advice, support, and close, smart editing, even as she codirected and produced a documentary film over the same time frame that was just as all-consuming—if not more so—than any book.

  My editor, Stephen Morrow, has been one of the most pleasant editors I’ve ever had the opportunity to work with, and put enormous enthusiasm, imagination, and energy into shaping my manuscript. Both he and my literary agent, Eric Lupfer, were patient guides through the tortuous process of writing a first book.

  I owe a large debt of gratitude to the staff of Forbes magazine, and particularly Lewis Dvorkin, who has offered me a level of freedom, resources, and support that any journalist would envy. Randall Lane has matched that generosity since his arrival at the magazine. Dan Bigman saw the full potential for this story within seconds of my walking into his office to pitch it in September 2010, and served as its best advocate among the magazine’s editors. Tom Post polished that cover story with care and skill. My colleagues on Forbes’s tech reporting team ably and patiently filled in the gaps left in our coverage while I worked on this book. Eric Savitz, as my direct editor, gave me enormous flexibility to both take time off and to work while traveling. (Often without even asking which country I was in while filing stories.) Susan Radlauer and Kai Falkenberg offered me endless research and legal assistance well beyond their duties at Forbes, and Coates Bateman and Elizabeth Woyke both gave me valuable advice.

  Other people who helped make this book possible include Alby Alkalay, Georgia Cool, Nick Fara, Sam and Lauren Greenberg, Maria Guineva, Kenza and Alex Hagon, Julie Hazan, Stephanie Hitchcock, Birgitta Jónsdóttir, Moxie Marlinspike, Gregory Muccio, Michael Noer, LeeAnn Pemberton, Atanas and Maria Tchobanov, and Assen Yordanov. I’m also particularly grateful to my parents-in-law, Naima Zouhali and Steve Worrall, for their support and for offering me ideal places to live and work at several points during my travel, reporting, and writing.

  Finally, I’d like to thank my father, Gary Greenberg, for helping me to find this book’s direction in endless phone conversations, for his close editing of the manuscript, for making my career in journalism possible, and for his tireless and good-natured critical attention to my writing, even if he likes to remind me that my talents as a writer peaked in the sixth grade.

  THE PUZZLE CONTAINED IN THIS BOOK

  I am grateful for the expertise and generosity of G. Mark Hardy who created the puzzle that is integrated into this book. For more information go to www.thismachinekillssecrets.com.

  INDEX

  The page numbers in this index refer to the printed version of this book. To find the corresponding locations in the text of this digital version, please use the “search” function on your e-reader. Note that not all terms may be searchable.

  Afghan War, 2, 14–15, 175, 295, 296

  Al Jazeera, 230, 291

  American Indian reservations, 268

  Ames, Aldrich, 30, 220

  Anderson, Mark, 188

  AnonLeaks, 213, 214

  AnonNews, 215

  anonymity

  and “Assassination Politics,” 117, 121–22

  Barr on abuse of, 217–18

  and Cypherpunk Mailing List, 114

  of Ellsberg, 36–37

  key role of, 6

  of Manning, 39–40, 43, 45–46

  required by government agencies, 139

  technologies of, 6–7, 39, 66–70, 76–77, 79–80 (see also encryption and cryptography; remailers; Tor)

  and whistleblowing, 7

  Anonymous

  arrests of members, 215–16

  on Bologna scandal, 316

  and the Church of Scientology, 185–86

  described, 183

  and HBGary Federal, 192–95, 210–15

  leak site of, 213, 214

  victims of, 183–84

  and WikiLeaks, 184–85

  AOL, 266

  Appelbaum, Jacob

  activism of, 135–38

  and Assange, 163–64

  background of, 152–56, 160–62

  BlockFinder tool of, 137

  and Chaos Computer Club, 162–63

  on copycat sites, 230
r />   and Cypherpunk Mailing List, 154

  on Domscheit-Berg, 288

  government harassment of, 151

  investigation of, 266–67

  keynote address of, 151, 167–68

  MAID system of, 163

  on May, 91–92

  and OpenLeaks, 278

  privacy paranoia of, 137, 138

  threat of indictment, 151

  and Tor, 136, 150–51, 155, 167

  and WikiLeaks, 138–39, 151–52

  the Architect

  anonymity of, 287, 322

  and OpenLeaks, 292–94, 297

  the Architect (cont.)

  WikiLeaks’ digital custody dispute with, 297–98, 299–300, 302, 303–4, 307, 310

  WikiLeaks tenure of, 287, 292–98

  Assange, Julian

  appearance of, 286

  and Appelbaum, 163–64

  and the Architect, 294–98

  background of, 102–8

  and BalkanLeaks, 263–64

  on bank leak, 1–2, 3–4, 178, 319

  and Bourbaki concept, 156, 317

  and Cablegate security breach, 305–6

  charges against, in youth, 112, 113

  “Conspiracy as Governance” essay, 127–29, 300, 312

  criticisms of, 320–21

  and Cypherpunk Mailing List, 96, 114, 125, 127

  and cypherpunks, 96, 98, 113–14

  distrust of power, 105–6

  and Domscheit-Berg, 229, 274–77, 285–88, 295, 296–98, 299, 303, 312–13

  and Domscheit-Berg’s wife, 288–90

  early days of WikiLeaks, 156–60, 164–66, 285–86

  education of, 94–96, 127

  on fear of leaks, 178–79, 189

  house arrest of, 177, 320

  in Iceland, 257–58

  and ideology of anonymous whistleblowing, 7

  and IMMI legislation, 228

  as inspiring figure, 317

  investigation of, 266

  jail sentence of, 177

  and Jónsdóttir, 257–58

  leaks theory of, 128–29, 300

  manifesto of, 127–29

  and Manning, 4, 39–40, 43

  May on, 92

  megaleaks of, 2–3, 174–79 (see also Afghan War; Cablegate; Iraq War)

  “Mendax” hacker persona of, 103, 106–8, 112

  paranoia of, 286–87, 302

  Rubberhose, 126–27, 163, 164

  sex crimes allegations, 4, 177

  and Suburbia ISP, 112–13, 114

  threat of indictment, 139, 177, 178, 224, 320

  on Tor, 138

  Twitter data of, 138–39

  and Young, 130–32

  and Zatko, 174, 201–2

  and Zimmermann, 113

  “Assassination Politics,” 117, 119–22, 123–24, 125, 133–34

  Bahnhof ISP, 237–38

  Baker, Stewart, 101

  BalkanLeaks, 231–35, 261–62, 268–69

  Bank of America, 2, 4, 178, 179, 214, 304

  Barlow, John Perry, 186, 254–56

  Barr, Aaron

  on abuse of anonymity, 217–18

  and Anonymous, 187, 192–95, 210–15

  background of, 202–6

  Paranoia Meter proposal of, 218–20

  social media analysis of, 179–83, 205–6

  Belarus, 300

  Bell, James Dalton

  and Assange, 128

  “Assassination Politics” concept of, 117, 119–22, 123–24, 125, 133–34

  convictions of, 124–25

  interview with, 132–34

  libertarianism of, 119, 120

  and Young, 123–24, 125

  Berg, Daniel. See Domscheit-Berg, Daniel

  BGP (Border Gateway Protocol) hijacking, 207, 208

  Biden, Joe, 73–74, 84, 176

  Binney, Bill, 220–21

  BitTorrent, 318

  Bivol, 231, 233, 241–42, 260–63. See also BalkanLeaks

  black hats, 137–38, 183, 216–17. See also Anonymous

  BlackNet concept, 89–92

  blind signatures, 67–68

  BlockFinder, 137

  Borisov, Boyko, 246, 264–65

  Bright, Arthur, 267

  Brooke, Heather, 300

  Bulgaria, 231–35, 241–46, 252–54, 259–65, 268–71

  Bush (G. W.) administration, 223–24

  Byrne, William, 41

  Cablegate

  and BalkanLeaks, 261–65

  files on Manning’s computer, 39

  influence of, 3

  information leaked by, 28, 176

  Pentagon Papers compared to, 14–15

  responses to, 176–77, 189

  security breach at WikiLeaks, 300, 305–9, 321

  Central Intelligence Agency (CIA), 91

  Chaos Computer Club

  Appelbaum’s participation in, 162–63

  Camp of, 272–74, 276, 277–82, 290–92, 299, 303

  congresses of, 162, 284, 286

  and Domscheit-Berg, 284, 298–99, 301–2, 303, 310

  and OpenLeaks’ penetration test, 274, 276, 278, 292, 303

  Chaum, David

  background of, 65–66

  crypto-conference of, 77

  DigiCash company, 119

  Hughes’s employment with, 78

  Mix Network concept of, 79–80, 82, 117, 118–19, 139, 141

  transaction system of, 66–70, 76, 89, 119

  Cheney, Dick, 101

  China, 150

  Church of Scientology

  Anonymous’ attacks on, 185–86

  and Assange, 114

  and Helsingius’s Penet remailer, 116, 125–26

  and Suburbia ISP, 113, 114

  and WikiLeaks, 166, 186

  CINDER (Cyber Insider Threat) initiative, 173–74, 187–88, 190–91, 216–17, 218–20

  Citizens’ Movement, 251–52

  Clarke, Richard, 206–7

  classified information, 5, 40, 45, 189

  Clinton, Hillary, 140

  Clinton administration, 84–85, 88

  Clipper Chip, 84–85, 86, 88

  Cohen, Bram, 318

  Collateral Murder video

  discussion of, in Soldiers, 311

  at Hackers on Planet Earth conference, 168

  and Jónsdóttir, 258

  Manning’s discovery of, 28–29

  perpetrators of, 43

  release of, 34

  Collins, Susan, 38

  Columbia University Occupation of 1968, 108–9, 110

  Computer Fraud and Abuse Act (1986), 197

  Cottrell, Lance, 118–19, 144

  Crowley, P. J., 31, 308

  “Crypto-Anarchist Manifesto” (May), 76–77, 79, 122

  Crypto Anarchy game, 79–81

  crypto-anarchy movement

  and “Assassination Politics,” 119–22

  and Chaum’s concepts, 69–70, 79–80

  coalescence of, 81 (see also cypherpunks)

  manifesto of, 76–77, 79, 122

  on secrecy, 90–91

  See also cypherpunks; May, Tim

  cryptography. See encryption and cryptography

  Cryptome

  Berg’s support of, 284–85

  on Bologna scandal, 316

  and Cablegate security breach, 307

&n
bsp; Domscheit-Berg’s memoir on, 297

  information leaked by, 100–101, 129–30

  model of, 131

  news featured on, 122, 125

  security of, 101–2

  WikiLeaks’ communications leaked on, 157–58, 159–60, 285

  cybersecurity industry, 187–91

  Cypherpunk Mailing List

  and Appelbaum, 154

  archives of, 92

  Assange’s participation in, 96, 114, 125, 127

  Cypherpunk Mailing List (cont.)

  and “Assassination Politics,” 117

  and evolution of cryptographic anonymity, 114

  Helsingius’s participation in, 115, 116

  and May’s BlackNet concept, 89

  origins of, 81

  cypherpunks

  and Assange, 96, 98, 113–14

  beginnings of, 79, 80–81

  and Clipper Chip, 85, 88

  code-writing maxim of, 82, 118, 148

  Crypto Anarchy game of, 79–81

  legacy of, 321

  libertarian emphasis of, 78, 82, 121

  mailing list of (see Cypherpunk Mailing List)

  manifesto of, 82–83, 122

  and Manning’s documents, 98

  and May’s BlackNet concept, 89–92

  meetings of, 81–82

  remailer of, 82, 92, 118

  shooting club of, 82

  WikiLeaks’ connection to, 102

  and Young, 111, 122–25

  and Zimmermann, 85, 86

 

‹ Prev