See also Hughes, Eric; May, Tim
Data-Leak Prevention (DLP) industry, 187–90
DC-Net (Dining Cryptographers Network), 68–69
de Vries, Benjamin Spock, 193, 214
Digital Encryption Standard (DES), 86
Dingledine, Roger, 141, 146–48, 149–50, 155
Domscheit-Berg, Anke, 288–90
Domscheit-Berg, Daniel
and the Architect, 287, 294
and Assange, 229, 274–77, 285–88, 295, 296–98, 299, 303, 312–13
background of, 282–85
and Cablegate security breach, 306–8
and Chaos Communication Camp, 273–76, 299
and Chaos Computer Club, 284, 298–99, 301–2, 303, 310
in Iceland, 257–58
marriage of, 288
memoir of, 88, 277, 297, 303
and Müller-Maguhn, 299–300, 301–2
and OpenLeaks, 273–76, 277–82, 309–12
professional appearance of, 286
WikiLeaks’ digital custody dispute with, 178, 297–98, 299–300, 302, 303–4, 307, 310
WikiLeaks tenure of, 229–30, 276, 285–88, 296–98, 300
Donchev, Angel, 233, 270
Drake, Thomas, 220–25
Dreyfus, Suelette, 103, 126
Dubois, Phil, 75, 84, 86
Egypt, 138
Electronic Frontier Foundation, 83–84, 85, 149, 230, 266
Ellsberg, Daniel
activism of, 53–55
attempts to discredit, 41
background of, 15–18
conversion to dissident, 45
copying of documents, 11–13
and ideology of anonymous whistleblowing, 7
and Manning, 14–15, 44, 45
on nature of secrets, 18
and Nixon administration, 40–42, 46
Pentagon Papers released by, 34–37
trial of, 41
and Vietnam War, 21–26
and WikiLeaks, 131
wiretapped phones of, 41
e-mail, 71
encryption and cryptography
and activism, 71, 74–75, 126
and anonymity tools, 6, 80
and Biden’s S.266, 73–74, 84
and censorship circumvention, 149
Chaum’s Mix Network encryption, 79–80, 82
and Chaum’s transaction system, 66–70
and Clipper Chip, 84–85, 86, 88
cryptographers (see Chaum, David; Merritt, Charlie; Zimmermann, Philip R.)
export laws on, 72, 74, 75, 86–87
government regulation of, 72, 73, 75, 83
and May’s BlackNet concept, 89–92
military applications of, 72
one-time pads, 61–62
and political change, 131
private (symmetric) key encryption, 62–63, 145–46
and remailers, 80–81, 82
and Rubberhose code, 126–27
Secure Sockets Layer encryption, 157
vulnerabilities of, 125–26
See also PGP (pretty-good privacy); public key encryption
Espionage Act, 36, 44, 223–25
Facebook, 7, 192, 251, 266
Federal Bureau of Investigation (FBI)
on dangers of encryption, 73
and Hanssen, 191
and Lamo’s hacking, 33
Manning investigation, 42
Pentagon Papers investigation, 37
and Tor, 140
and Young’s Cryptome site, 101, 130
Ferguson, Thomas, 38
Filastò, Arturo, 318–19
file-sharing programs, 317–18
Finney, Hal, 118
First Amendment, 36, 87
Galison, Peter, 5
Gardner, Martin, 62–64, 71, 79
Gates, Robert, 175
Gerard, David, 113
German Privacy Foundation, 278–79
Gilmore, John
and Cypherpunk Mailing List, 81–82, 92
libertarianism of, 255
on May’s influence, 89
and New York Times magazine story, 122
and OpenLeaks, 280
party of, 78
globalization of secrets control, 236
Gonggrijp, Rop, 155, 258, 266–67
Google, 266
Gorman, Siobhan, 222–23
Greenwald, Glenn, 182–83, 215
Guantánamo prison, 14, 39, 285
The Guardian, 262–63, 276, 300, 305, 307
Hackers (Levy), 199
Hackers on Planet Earth conference, 151, 167–68
Hackers Wanted (unreleased documentary), 33–34
Hanssen, Robert, 30, 191, 220
HBGary, 179–83, 187, 192–95, 210–15, 218–20
helicopter airstrike footage. See Collateral Murder video
Helsingius, Johan “Julf,” 114–17, 125–26, 321
Hoglund, Greg, 194–95, 212, 215
Hubbard, L. Ron, 166
Hughes, Eric
and Chaum, 78
code-writing maxim of, 82, 85, 148
and mailing list, 92
manifesto of, 82–83, 122
and May, 78–79
and New York Times magazine story, 122
and origins of Cypherpunks, 79, 80–81
remailer of, 82, 118
Iceland, 226–28, 240–41, 250–52, 255–59, 265–66, 304
Icelandic Digital Freedom Society, 255
Icelandic Modern Media Initiative (IMMI), 228, 235, 236, 240–41, 258, 265–66, 267
information market concept, 59–60, 64–65, 89
Ingólfsson, Mordur, 240–41
insider threats, 189, 209–10, 216–17
Intel, 49–52, 85
intellectual property, 76–77
International Subversives, 106–7, 111–12, 321
International Traffic in Arms Regulations (ITAR), 72, 74, 87
Internet, 255, 268–69
Iraq War
culture of secrecy in, 311
exit of troops from Iraq, 3
Grizzly Plow used in, 95
Iraq War (cont.)
helicopter airstrike footage from, 28–29, 34, 43, 168, 311
megaleak of Manning from, 2, 14–15, 175, 295
security in, 37–39
Ivanov, Vassil, 234
Johnson, Lyndon, 22, 25
Jones, Rich, 316–17
Jónsdóttir, Birgitta
on the Architect, 287
and Assange, 257–58
background of, 226–27, 246–52
at Chaos Communication Camp, 273
and Collateral Murder video, 258
and IMMI legislation, 228, 236, 240, 255
investigation of, 266–67
and OpenLeaks, 279, 282
and WikiLeaks, 296, 321
Kapor, Mitch, 255
Karlung, Jon, 237–38
Karn, Phil, 86–87
Kaupthing Bank, 256
Kehler, Randy, 26
Kenyan leaks, 165
Kissinger, Henry, 17–18, 24, 40
Lamo, Adrian
and Appelbaum, 167, 168
background of, 29–30, 32–34
Manning informed on by, 31–32, 40, 42–43, 46, 142, 168
Manning’s conversations with, 34, 37–
39, 42–43
on Manning’s imprisonment, 30–31
Laurie, Ben, 131, 157
Leaks.org, 127
Leavy, Penny, 213–14
Leigh, David, 305, 307
Lewman, Andrew, 140
Libya, 137, 138
Liddy, G. Gordon, 41
Lieberman, Joe, 176–77, 189
L0pht, 198–202, 206–9
MAID (mutually assured information destruction), 163
Manning, Bradley
acquisition of documents, 14–15
anonymity attempted by, 39–40, 43, 45–46
Anonymous’ defense of, 186, 214
army career of, 21, 27
arrest of, 43–44
and Assange, 4, 39–40, 43
background of, 18–21
and Ellsberg, 14–15, 44, 45
and future military leakers, 312
and helicopter airstrike footage, 28–29, 34, 43, 168, 311
imprisonment of, 30–31, 44, 321
investigation of, 266
Lamo’s conversations with, 34, 38–39, 42–43
Lamo’s informing on, 31–32, 40, 42–43, 46, 142, 168
and leaker profile, 26–27, 45
on military security, 37–39
motivation of, 27–29
prosecution of, 224
Tor used by, 39, 139
upload of documents to WikiLeaks, 39
Markov, Georgi, 234
Marshall, Róbert, 251
Mathewson, Nick, 135–36, 147–48, 149, 155
Mati, Mwalimu, 165–66
May, Tim
background of, 55–59
and Bell’s “Assassination Politics,” 121–22
BlackNet concept of, 89–92
career at Intel, 49–52
and Chaum’s transaction system, 65, 69–70
and Clipper Chip, 85
gun interests of, 56, 82
and Hughes, 78–79
and information market, 59–60, 64–65
interview with, 52, 88–89
libertarianism of, 57–58, 70, 76, 91–92
and mailing list, 92
manifesto of, 76–77, 79, 122
and New York Times magazine story, 122
and origins of Cypherpunks, 79, 80–81
writing ambitions of, 76, 77–78
and Zimmermann, 85, 88
Mazzacone, Eric, 216
McCarthy, Smári, 258, 268, 287, 300
McGovern, George, 35, 36–37
McNamara, Robert, 24–25
Meredith, Daniel, 291–92
Merritt, Charlie, 70–72, 75
Metzger, Reiner, 281–82
Microsoft, 101, 200–201
Middle East, freedom fighting in, 135–38
Minerva mainframe system hack, 102–4
MIT, 148
MIT Press, 87
Mixmaster remailer, 118–19, 144
Mix Network concept
and Cottrell’s Mixmaster remailer, 118–19
and Cypherpunk Remailer, 82
described, 79–80
and remailers, 80–81, 82, 117
and Tor, 139, 141, 144, 145–46
Monsegur, Hector Xavier, 215–16
Morozov, Evgeny, 4, 268–69
Mubarak, Hosni, 138
Mullen, Mike, 175
Müller-Maguhn, Andy, 279, 299–300, 301–3, 305–7, 310
Napster, 317–18
National Security Agency (NSA)
and Clipper Chip, 84–85, 86, 88
and cryptology, 72
and Drake’s whistleblowing case, 220–24
on leaked material, 101
TEMPEST tool of, 123, 130
wiretapping scandal of, 222–23
and Young’s Cryptome site, 130
Natsios, Deborah, 100, 122
Naval Research Laboratory, 139, 143–45, 149, 151
Neij, Fredrik, 238–39
NetWitness, 189
network forensics, 189
Newsweek, 37, 225, 266, 296
The New Yorker, 159
The New York Times
on AOL users’ data, 266
citing of WikiLeaks documents, 176
on helicopter airstrike, 29
Jónsdóttir quoted in, 296
Kiriakou’s leak to, 224
Lamo’s hacking of, 32–33
on NSA wiretapping program, 222–23
and the Pentagon Papers, 35–36
New York Times magazine, 122
Nikolayeva, Maria, 253–54
1984 Web Hosting, 240–41
Nixon, Richard, 36, 40–42, 46, 54
nuclear weapons, 53–55
Oak Ridge National Laboratories, 90
Obama, Barack, 3, 5, 44–45, 224–25
Occupy Wall Street, 315
Oltsik, Jon, 209–10
onion routing, 143–46, 156. See also Tor
Opasnite Novini (“Dangerous News”) blog, 260–61
OpenLeaks
and the Architect, 292–94, 297
and Chaos Communication Camp, 299
digital custody dispute of, 310
future of, 311
goal of, 275
headquarters of, 309–10
Müller-Maguhn on, 302
origins of, 297
penetration test of, 274, 276, 278, 292, 303
security of, 274–75, 278, 293–94
test launch of, 273–76, 277–82, 310
“owning” a target, 137–38
Paller, Alan, 188
Paradox quarterly magazine, 94, 98
Paranoia Meter, 218–20
Pardew, James, 262
Patriot Act, 268
Penet remailer, 115–17, 321
Pentagon Papers
access to, 24–25, 36, 45
contents of, 24–26
copying of, 11–13
legacy of, 270, 321
release of, 34–37
See also Ellsberg, Daniel
PGP (pretty-good privacy)
and activism, 71, 74–75
distribution of, 74–75
investigation of, 75, 83–84, 86–87
MIT Press’s publication of, 87
origins of, 70–75
passwords for, 306
in remailers, 118
and Young’s Cryptome site, 101
PGP: Source Code and Internals (Zimmermann), 53, 83, 87
Pietrosanti, Fabio, 318–19
Pirate Bay, 238–39, 256, 305, 306, 318
political dissidents, 136–38, 140
PRQ (PeRiQuito AB), 238–40, 294
public key encryption
described, 62–64
Manning’s use of, 34
and May’s BlackNet concept, 89–92
and Mix Network concept, 79–80
RSA, 64, 70, 71, 79
signatures in, 67
and Tor, 145–46
and Young’s Cryptome site, 101
See also PGP (pretty-good privacy)
Qaddafi, Muammar, 3, 137
Radack, Jesselyn, 225
RAND, 11, 22, 24, 34, 36
Reader’s Digest, 101
Reagan administration, 55
remailers
and Chaum’s Mix Network encryption,
80–81, 82, 117
Cottrell’s Mixmaster remailer, 118–19, 144
cypherpunk remailer, 82, 92, 118
Helsingius’s Penet remailer, 115–17
improvements to, 117–18
and Young’s Cryptome site, 102
Rolling Stone, 138
Rosenkranz, Richard, 109, 110
RSA (MIT’s public key encryption), 64, 70, 71, 79
Rubberhose, 126–27, 163, 164
Russo, Tony, 11–13, 37
Salin, Phil, 59–60, 64–65, 89
satellite modems, 135–37
secrets
and crypto-anarchy, 90–91
culture of secrecy, 311
Domscheit-Berg on role of, 312
This Machine Kills Secrets Page 42