“Leak at WikiLeaks” Steffen Kraft. Der Freitag, August 25, 2011.
“That the unreconfigured cables have become public is to be applauded and not condemned” John Young statement on Twitlonger.com, September 2, 2011.
The Guardian’s David Leigh pointed the finger at WikiLeaks for having published the encrypted file David Leigh, comment on “Swept up and away,” Economist.com, September 9, 2011.
“any autocratic secret service worth its salt” Christian Stöcker. “A Dispatch Disaster in Six Acts” Der Spiegel, September 1, 2011.
inexperienced leader in the sway of corrupt president Robert Mugabe’s political party Alex Bell. “Army generals face possible treason charge after WikiLeaks revelations.” The Zimbabwean, September 13, 2011.
with some calling for manhunts and violence against them Mark Mackinnon. “Leaked cables spark witch-hunt for Chinese ‘rats.’” The Globe and Mail, September 14, 2011.
Iraqi Anglican church to leave the country for fear of violent reprisal Billy Hallowell. “JEWISH IRAQIS MAY BE IN DANGER FOLLOWING THE RELEASE OF WIKILEAKS CABLES.” TheBlaze.com, October 11, 2011.
“I love my country and I love my job and it’s a big loss for me” “Ethiopian journalist ID’d in WikiLeaks cable flees country.” Committee to Protect Journalists website, September 14, 2011.
murdered in inhuman medical experiments Rochelle G. Saidel. “Ravensbruck Women’s Concentration Camp.” Jewish Women’s Archive.
CONCLUSION: THE MACHINE
“the whole world is watching” Posted to LiveLeak October 2 , 2011, available at http://www.liveleak.com/view?i=c11_1317570746
doused with Mace and left blinded and screaming Posted to YouTube September 24, http://www.youtube.com/watch?v=moD2JnGTToA
“notorious for his previous treatment of protesters” Cryptome.org, September 26, 2011, available at http://cryptome.org/info/bologna-abuser/bologna-abuser.htm
Bologna was fined six thousand dollars by the department and faced a further inquiry by the Manhattan district attorney “‘I’d do it again,’ says police commander filmed pepper spraying the faces of women at Occupy Wall Street protest.” Daily Mail, October 21, 2011.
A few of the recordings Jones has obtained are disturbing All OpenWatch recordings are available at http://openwatch.net/all/
twenty-six million people used the service Benny Evangelista. “Napster files for bankruptcy.” San Francisco Chronicle, June 4, 2002.
working in the office of his uncle’s Internet start-up Chess.net Farhad Manjoo. “A file-trading ship of fools.” Salon.com, April 21, 2003.
twenty-billion-dollar lawsuit by the Recording Industry Association of America Rich Menta. “RIAA Sues Music Startup Napster for $20 Billion.” MP3Newswire.net, December 9, 1999.
bankrupt in 2002 Evangelista.
single point of failure Anthony J. Howe. “Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols.” University of Victoria, February 28, 2002.
cut in half since 1999, from $14.6 billion to $7.6 billion Record Industry Association of America website, RIAA.org/faq
“we will simply not be able to continue by the turn of the new year” Associated Press, October 24, 2011.
ACKNOWLEDGMENTS
If I listed the people who helped me write this book in either chronological order or order of importance, my wife, Malika Zouhali-Worrall, would come first. From the night I kept her up imagining Julian Assange on the cover of Forbes magazine, to my last moments of panic trying to meet my publisher’s deadlines fifteen months later, Malika offered endless ideas, advice, support, and close, smart editing, even as she codirected and produced a documentary film over the same time frame that was just as all-consuming—if not more so—than any book.
My editor, Stephen Morrow, has been one of the most pleasant editors I’ve ever had the opportunity to work with, and put enormous enthusiasm, imagination, and energy into shaping my manuscript. Both he and my literary agent, Eric Lupfer, were patient guides through the tortuous process of writing a first book.
I owe a large debt of gratitude to the staff of Forbes magazine, and particularly Lewis Dvorkin, who has offered me a level of freedom, resources, and support that any journalist would envy. Randall Lane has matched that generosity since his arrival at the magazine. Dan Bigman saw the full potential for this story within seconds of my walking into his office to pitch it in September 2010, and served as its best advocate among the magazine’s editors. Tom Post polished that cover story with care and skill. My colleagues on Forbes’s tech reporting team ably and patiently filled in the gaps left in our coverage while I worked on this book. Eric Savitz, as my direct editor, gave me enormous flexibility to both take time off and to work while traveling. (Often without even asking which country I was in while filing stories.) Susan Radlauer and Kai Falkenberg offered me endless research and legal assistance well beyond their duties at Forbes, and Coates Bateman and Elizabeth Woyke both gave me valuable advice.
Other people who helped make this book possible include Alby Alkalay, Georgia Cool, Nick Fara, Sam and Lauren Greenberg, Maria Guineva, Kenza and Alex Hagon, Julie Hazan, Stephanie Hitchcock, Birgitta Jónsdóttir, Moxie Marlinspike, Gregory Muccio, Michael Noer, LeeAnn Pemberton, Atanas and Maria Tchobanov, and Assen Yordanov. I’m also particularly grateful to my parents-in-law, Naima Zouhali and Steve Worrall, for their support and for offering me ideal places to live and work at several points during my travel, reporting, and writing.
Finally, I’d like to thank my father, Gary Greenberg, for helping me to find this book’s direction in endless phone conversations, for his close editing of the manuscript, for making my career in journalism possible, and for his tireless and good-natured critical attention to my writing, even if he likes to remind me that my talents as a writer peaked in the sixth grade.
THE PUZZLE CONTAINED IN THIS BOOK
I am grateful for the expertise and generosity of G. Mark Hardy who created the puzzle that is integrated into this book. For more information go to www.thismachinekillssecrets.com.
INDEX
The page numbers in this index refer to the printed version of this book. To find the corresponding locations in the text of this digital version, please use the “search” function on your e-reader. Note that not all terms may be searchable.
Afghan War, 2, 14–15, 175, 295, 296
Al Jazeera, 230, 291
American Indian reservations, 268
Ames, Aldrich, 30, 220
Anderson, Mark, 188
AnonLeaks, 213, 214
AnonNews, 215
anonymity
and “Assassination Politics,” 117, 121–22
Barr on abuse of, 217–18
and Cypherpunk Mailing List, 114
of Ellsberg, 36–37
key role of, 6
of Manning, 39–40, 43, 45–46
required by government agencies, 139
technologies of, 6–7, 39, 66–70, 76–77, 79–80 (see also encryption and cryptography; remailers; Tor)
and whistleblowing, 7
Anonymous
arrests of members, 215–16
on Bologna scandal, 316
and the Church of Scientology, 185–86
described, 183
and HBGary Federal, 192–95, 210–15
leak site of, 213, 214
victims of, 183–84
and WikiLeaks, 184–85
AOL, 266
Appelbaum, Jacob
activism of, 135–38
and Assange, 163–64
background of, 152–56, 160–62
BlockFinder tool of, 137
and Chaos Computer Club, 162–63
on copycat sites, 230
r /> and Cypherpunk Mailing List, 154
on Domscheit-Berg, 288
government harassment of, 151
investigation of, 266–67
keynote address of, 151, 167–68
MAID system of, 163
on May, 91–92
and OpenLeaks, 278
privacy paranoia of, 137, 138
threat of indictment, 151
and Tor, 136, 150–51, 155, 167
and WikiLeaks, 138–39, 151–52
the Architect
anonymity of, 287, 322
and OpenLeaks, 292–94, 297
the Architect (cont.)
WikiLeaks’ digital custody dispute with, 297–98, 299–300, 302, 303–4, 307, 310
WikiLeaks tenure of, 287, 292–98
Assange, Julian
appearance of, 286
and Appelbaum, 163–64
and the Architect, 294–98
background of, 102–8
and BalkanLeaks, 263–64
on bank leak, 1–2, 3–4, 178, 319
and Bourbaki concept, 156, 317
and Cablegate security breach, 305–6
charges against, in youth, 112, 113
“Conspiracy as Governance” essay, 127–29, 300, 312
criticisms of, 320–21
and Cypherpunk Mailing List, 96, 114, 125, 127
and cypherpunks, 96, 98, 113–14
distrust of power, 105–6
and Domscheit-Berg, 229, 274–77, 285–88, 295, 296–98, 299, 303, 312–13
and Domscheit-Berg’s wife, 288–90
early days of WikiLeaks, 156–60, 164–66, 285–86
education of, 94–96, 127
on fear of leaks, 178–79, 189
house arrest of, 177, 320
in Iceland, 257–58
and ideology of anonymous whistleblowing, 7
and IMMI legislation, 228
as inspiring figure, 317
investigation of, 266
jail sentence of, 177
and Jónsdóttir, 257–58
leaks theory of, 128–29, 300
manifesto of, 127–29
and Manning, 4, 39–40, 43
May on, 92
megaleaks of, 2–3, 174–79 (see also Afghan War; Cablegate; Iraq War)
“Mendax” hacker persona of, 103, 106–8, 112
paranoia of, 286–87, 302
Rubberhose, 126–27, 163, 164
sex crimes allegations, 4, 177
and Suburbia ISP, 112–13, 114
threat of indictment, 139, 177, 178, 224, 320
on Tor, 138
Twitter data of, 138–39
and Young, 130–32
and Zatko, 174, 201–2
and Zimmermann, 113
“Assassination Politics,” 117, 119–22, 123–24, 125, 133–34
Bahnhof ISP, 237–38
Baker, Stewart, 101
BalkanLeaks, 231–35, 261–62, 268–69
Bank of America, 2, 4, 178, 179, 214, 304
Barlow, John Perry, 186, 254–56
Barr, Aaron
on abuse of anonymity, 217–18
and Anonymous, 187, 192–95, 210–15
background of, 202–6
Paranoia Meter proposal of, 218–20
social media analysis of, 179–83, 205–6
Belarus, 300
Bell, James Dalton
and Assange, 128
“Assassination Politics” concept of, 117, 119–22, 123–24, 125, 133–34
convictions of, 124–25
interview with, 132–34
libertarianism of, 119, 120
and Young, 123–24, 125
Berg, Daniel. See Domscheit-Berg, Daniel
BGP (Border Gateway Protocol) hijacking, 207, 208
Biden, Joe, 73–74, 84, 176
Binney, Bill, 220–21
BitTorrent, 318
Bivol, 231, 233, 241–42, 260–63. See also BalkanLeaks
black hats, 137–38, 183, 216–17. See also Anonymous
BlackNet concept, 89–92
blind signatures, 67–68
BlockFinder, 137
Borisov, Boyko, 246, 264–65
Bright, Arthur, 267
Brooke, Heather, 300
Bulgaria, 231–35, 241–46, 252–54, 259–65, 268–71
Bush (G. W.) administration, 223–24
Byrne, William, 41
Cablegate
and BalkanLeaks, 261–65
files on Manning’s computer, 39
influence of, 3
information leaked by, 28, 176
Pentagon Papers compared to, 14–15
responses to, 176–77, 189
security breach at WikiLeaks, 300, 305–9, 321
Central Intelligence Agency (CIA), 91
Chaos Computer Club
Appelbaum’s participation in, 162–63
Camp of, 272–74, 276, 277–82, 290–92, 299, 303
congresses of, 162, 284, 286
and Domscheit-Berg, 284, 298–99, 301–2, 303, 310
and OpenLeaks’ penetration test, 274, 276, 278, 292, 303
Chaum, David
background of, 65–66
crypto-conference of, 77
DigiCash company, 119
Hughes’s employment with, 78
Mix Network concept of, 79–80, 82, 117, 118–19, 139, 141
transaction system of, 66–70, 76, 89, 119
Cheney, Dick, 101
China, 150
Church of Scientology
Anonymous’ attacks on, 185–86
and Assange, 114
and Helsingius’s Penet remailer, 116, 125–26
and Suburbia ISP, 113, 114
and WikiLeaks, 166, 186
CINDER (Cyber Insider Threat) initiative, 173–74, 187–88, 190–91, 216–17, 218–20
Citizens’ Movement, 251–52
Clarke, Richard, 206–7
classified information, 5, 40, 45, 189
Clinton, Hillary, 140
Clinton administration, 84–85, 88
Clipper Chip, 84–85, 86, 88
Cohen, Bram, 318
Collateral Murder video
discussion of, in Soldiers, 311
at Hackers on Planet Earth conference, 168
and Jónsdóttir, 258
Manning’s discovery of, 28–29
perpetrators of, 43
release of, 34
Collins, Susan, 38
Columbia University Occupation of 1968, 108–9, 110
Computer Fraud and Abuse Act (1986), 197
Cottrell, Lance, 118–19, 144
Crowley, P. J., 31, 308
“Crypto-Anarchist Manifesto” (May), 76–77, 79, 122
Crypto Anarchy game, 79–81
crypto-anarchy movement
and “Assassination Politics,” 119–22
and Chaum’s concepts, 69–70, 79–80
coalescence of, 81 (see also cypherpunks)
manifesto of, 76–77, 79, 122
on secrecy, 90–91
See also cypherpunks; May, Tim
cryptography. See encryption and cryptography
Cryptome
Berg’s support of, 284–85
on Bologna scandal, 316
and Cablegate security breach, 307
&n
bsp; Domscheit-Berg’s memoir on, 297
information leaked by, 100–101, 129–30
model of, 131
news featured on, 122, 125
security of, 101–2
WikiLeaks’ communications leaked on, 157–58, 159–60, 285
cybersecurity industry, 187–91
Cypherpunk Mailing List
and Appelbaum, 154
archives of, 92
Assange’s participation in, 96, 114, 125, 127
Cypherpunk Mailing List (cont.)
and “Assassination Politics,” 117
and evolution of cryptographic anonymity, 114
Helsingius’s participation in, 115, 116
and May’s BlackNet concept, 89
origins of, 81
cypherpunks
and Assange, 96, 98, 113–14
beginnings of, 79, 80–81
and Clipper Chip, 85, 88
code-writing maxim of, 82, 118, 148
Crypto Anarchy game of, 79–81
legacy of, 321
libertarian emphasis of, 78, 82, 121
mailing list of (see Cypherpunk Mailing List)
manifesto of, 82–83, 122
and Manning’s documents, 98
and May’s BlackNet concept, 89–92
meetings of, 81–82
remailer of, 82, 92, 118
shooting club of, 82
WikiLeaks’ connection to, 102
and Young, 111, 122–25
and Zimmermann, 85, 86
This Machine Kills Secrets Page 41