This Machine Kills Secrets

Home > Other > This Machine Kills Secrets > Page 42
This Machine Kills Secrets Page 42

by Andy Greenberg


  See also Hughes, Eric; May, Tim

  Data-Leak Prevention (DLP) industry, 187–90

  DC-Net (Dining Cryptographers Network), 68–69

  de Vries, Benjamin Spock, 193, 214

  Digital Encryption Standard (DES), 86

  Dingledine, Roger, 141, 146–48, 149–50, 155

  Domscheit-Berg, Anke, 288–90

  Domscheit-Berg, Daniel

  and the Architect, 287, 294

  and Assange, 229, 274–77, 285–88, 295, 296–98, 299, 303, 312–13

  background of, 282–85

  and Cablegate security breach, 306–8

  and Chaos Communication Camp, 273–76, 299

  and Chaos Computer Club, 284, 298–99, 301–2, 303, 310

  in Iceland, 257–58

  marriage of, 288

  memoir of, 88, 277, 297, 303

  and Müller-Maguhn, 299–300, 301–2

  and OpenLeaks, 273–76, 277–82, 309–12

  professional appearance of, 286

  WikiLeaks’ digital custody dispute with, 178, 297–98, 299–300, 302, 303–4, 307, 310

  WikiLeaks tenure of, 229–30, 276, 285–88, 296–98, 300

  Donchev, Angel, 233, 270

  Drake, Thomas, 220–25

  Dreyfus, Suelette, 103, 126

  Dubois, Phil, 75, 84, 86

  Egypt, 138

  Electronic Frontier Foundation, 83–84, 85, 149, 230, 266

  Ellsberg, Daniel

  activism of, 53–55

  attempts to discredit, 41

  background of, 15–18

  conversion to dissident, 45

  copying of documents, 11–13

  and ideology of anonymous whistleblowing, 7

  and Manning, 14–15, 44, 45

  on nature of secrets, 18

  and Nixon administration, 40–42, 46

  Pentagon Papers released by, 34–37

  trial of, 41

  and Vietnam War, 21–26

  and WikiLeaks, 131

  wiretapped phones of, 41

  e-mail, 71

  encryption and cryptography

  and activism, 71, 74–75, 126

  and anonymity tools, 6, 80

  and Biden’s S.266, 73–74, 84

  and censorship circumvention, 149

  Chaum’s Mix Network encryption, 79–80, 82

  and Chaum’s transaction system, 66–70

  and Clipper Chip, 84–85, 86, 88

  cryptographers (see Chaum, David; Merritt, Charlie; Zimmermann, Philip R.)

  export laws on, 72, 74, 75, 86–87

  government regulation of, 72, 73, 75, 83

  and May’s BlackNet concept, 89–92

  military applications of, 72

  one-time pads, 61–62

  and political change, 131

  private (symmetric) key encryption, 62–63, 145–46

  and remailers, 80–81, 82

  and Rubberhose code, 126–27

  Secure Sockets Layer encryption, 157

  vulnerabilities of, 125–26

  See also PGP (pretty-good privacy); public key encryption

  Espionage Act, 36, 44, 223–25

  Facebook, 7, 192, 251, 266

  Federal Bureau of Investigation (FBI)

  on dangers of encryption, 73

  and Hanssen, 191

  and Lamo’s hacking, 33

  Manning investigation, 42

  Pentagon Papers investigation, 37

  and Tor, 140

  and Young’s Cryptome site, 101, 130

  Ferguson, Thomas, 38

  Filastò, Arturo, 318–19

  file-sharing programs, 317–18

  Finney, Hal, 118

  First Amendment, 36, 87

  Galison, Peter, 5

  Gardner, Martin, 62–64, 71, 79

  Gates, Robert, 175

  Gerard, David, 113

  German Privacy Foundation, 278–79

  Gilmore, John

  and Cypherpunk Mailing List, 81–82, 92

  libertarianism of, 255

  on May’s influence, 89

  and New York Times magazine story, 122

  and OpenLeaks, 280

  party of, 78

  globalization of secrets control, 236

  Gonggrijp, Rop, 155, 258, 266–67

  Google, 266

  Gorman, Siobhan, 222–23

  Greenwald, Glenn, 182–83, 215

  Guantánamo prison, 14, 39, 285

  The Guardian, 262–63, 276, 300, 305, 307

  Hackers (Levy), 199

  Hackers on Planet Earth conference, 151, 167–68

  Hackers Wanted (unreleased documentary), 33–34

  Hanssen, Robert, 30, 191, 220

  HBGary, 179–83, 187, 192–95, 210–15, 218–20

  helicopter airstrike footage. See Collateral Murder video

  Helsingius, Johan “Julf,” 114–17, 125–26, 321

  Hoglund, Greg, 194–95, 212, 215

  Hubbard, L. Ron, 166

  Hughes, Eric

  and Chaum, 78

  code-writing maxim of, 82, 85, 148

  and mailing list, 92

  manifesto of, 82–83, 122

  and May, 78–79

  and New York Times magazine story, 122

  and origins of Cypherpunks, 79, 80–81

  remailer of, 82, 118

  Iceland, 226–28, 240–41, 250–52, 255–59, 265–66, 304

  Icelandic Digital Freedom Society, 255

  Icelandic Modern Media Initiative (IMMI), 228, 235, 236, 240–41, 258, 265–66, 267

  information market concept, 59–60, 64–65, 89

  Ingólfsson, Mordur, 240–41

  insider threats, 189, 209–10, 216–17

  Intel, 49–52, 85

  intellectual property, 76–77

  International Subversives, 106–7, 111–12, 321

  International Traffic in Arms Regulations (ITAR), 72, 74, 87

  Internet, 255, 268–69

  Iraq War

  culture of secrecy in, 311

  exit of troops from Iraq, 3

  Grizzly Plow used in, 95

  Iraq War (cont.)

  helicopter airstrike footage from, 28–29, 34, 43, 168, 311

  megaleak of Manning from, 2, 14–15, 175, 295

  security in, 37–39

  Ivanov, Vassil, 234

  Johnson, Lyndon, 22, 25

  Jones, Rich, 316–17

  Jónsdóttir, Birgitta

  on the Architect, 287

  and Assange, 257–58

  background of, 226–27, 246–52

  at Chaos Communication Camp, 273

  and Collateral Murder video, 258

  and IMMI legislation, 228, 236, 240, 255

  investigation of, 266–67

  and OpenLeaks, 279, 282

  and WikiLeaks, 296, 321

  Kapor, Mitch, 255

  Karlung, Jon, 237–38

  Karn, Phil, 86–87

  Kaupthing Bank, 256

  Kehler, Randy, 26

  Kenyan leaks, 165

  Kissinger, Henry, 17–18, 24, 40

  Lamo, Adrian

  and Appelbaum, 167, 168

  background of, 29–30, 32–34

  Manning informed on by, 31–32, 40, 42–43, 46, 142, 168

  Manning’s conversations with, 34, 37–
39, 42–43

  on Manning’s imprisonment, 30–31

  Laurie, Ben, 131, 157

  Leaks.org, 127

  Leavy, Penny, 213–14

  Leigh, David, 305, 307

  Lewman, Andrew, 140

  Libya, 137, 138

  Liddy, G. Gordon, 41

  Lieberman, Joe, 176–77, 189

  L0pht, 198–202, 206–9

  MAID (mutually assured information destruction), 163

  Manning, Bradley

  acquisition of documents, 14–15

  anonymity attempted by, 39–40, 43, 45–46

  Anonymous’ defense of, 186, 214

  army career of, 21, 27

  arrest of, 43–44

  and Assange, 4, 39–40, 43

  background of, 18–21

  and Ellsberg, 14–15, 44, 45

  and future military leakers, 312

  and helicopter airstrike footage, 28–29, 34, 43, 168, 311

  imprisonment of, 30–31, 44, 321

  investigation of, 266

  Lamo’s conversations with, 34, 38–39, 42–43

  Lamo’s informing on, 31–32, 40, 42–43, 46, 142, 168

  and leaker profile, 26–27, 45

  on military security, 37–39

  motivation of, 27–29

  prosecution of, 224

  Tor used by, 39, 139

  upload of documents to WikiLeaks, 39

  Markov, Georgi, 234

  Marshall, Róbert, 251

  Mathewson, Nick, 135–36, 147–48, 149, 155

  Mati, Mwalimu, 165–66

  May, Tim

  background of, 55–59

  and Bell’s “Assassination Politics,” 121–22

  BlackNet concept of, 89–92

  career at Intel, 49–52

  and Chaum’s transaction system, 65, 69–70

  and Clipper Chip, 85

  gun interests of, 56, 82

  and Hughes, 78–79

  and information market, 59–60, 64–65

  interview with, 52, 88–89

  libertarianism of, 57–58, 70, 76, 91–92

  and mailing list, 92

  manifesto of, 76–77, 79, 122

  and New York Times magazine story, 122

  and origins of Cypherpunks, 79, 80–81

  writing ambitions of, 76, 77–78

  and Zimmermann, 85, 88

  Mazzacone, Eric, 216

  McCarthy, Smári, 258, 268, 287, 300

  McGovern, George, 35, 36–37

  McNamara, Robert, 24–25

  Meredith, Daniel, 291–92

  Merritt, Charlie, 70–72, 75

  Metzger, Reiner, 281–82

  Microsoft, 101, 200–201

  Middle East, freedom fighting in, 135–38

  Minerva mainframe system hack, 102–4

  MIT, 148

  MIT Press, 87

  Mixmaster remailer, 118–19, 144

  Mix Network concept

  and Cottrell’s Mixmaster remailer, 118–19

  and Cypherpunk Remailer, 82

  described, 79–80

  and remailers, 80–81, 82, 117

  and Tor, 139, 141, 144, 145–46

  Monsegur, Hector Xavier, 215–16

  Morozov, Evgeny, 4, 268–69

  Mubarak, Hosni, 138

  Mullen, Mike, 175

  Müller-Maguhn, Andy, 279, 299–300, 301–3, 305–7, 310

  Napster, 317–18

  National Security Agency (NSA)

  and Clipper Chip, 84–85, 86, 88

  and cryptology, 72

  and Drake’s whistleblowing case, 220–24

  on leaked material, 101

  TEMPEST tool of, 123, 130

  wiretapping scandal of, 222–23

  and Young’s Cryptome site, 130

  Natsios, Deborah, 100, 122

  Naval Research Laboratory, 139, 143–45, 149, 151

  Neij, Fredrik, 238–39

  NetWitness, 189

  network forensics, 189

  Newsweek, 37, 225, 266, 296

  The New Yorker, 159

  The New York Times

  on AOL users’ data, 266

  citing of WikiLeaks documents, 176

  on helicopter airstrike, 29

  Jónsdóttir quoted in, 296

  Kiriakou’s leak to, 224

  Lamo’s hacking of, 32–33

  on NSA wiretapping program, 222–23

  and the Pentagon Papers, 35–36

  New York Times magazine, 122

  Nikolayeva, Maria, 253–54

  1984 Web Hosting, 240–41

  Nixon, Richard, 36, 40–42, 46, 54

  nuclear weapons, 53–55

  Oak Ridge National Laboratories, 90

  Obama, Barack, 3, 5, 44–45, 224–25

  Occupy Wall Street, 315

  Oltsik, Jon, 209–10

  onion routing, 143–46, 156. See also Tor

  Opasnite Novini (“Dangerous News”) blog, 260–61

  OpenLeaks

  and the Architect, 292–94, 297

  and Chaos Communication Camp, 299

  digital custody dispute of, 310

  future of, 311

  goal of, 275

  headquarters of, 309–10

  Müller-Maguhn on, 302

  origins of, 297

  penetration test of, 274, 276, 278, 292, 303

  security of, 274–75, 278, 293–94

  test launch of, 273–76, 277–82, 310

  “owning” a target, 137–38

  Paller, Alan, 188

  Paradox quarterly magazine, 94, 98

  Paranoia Meter, 218–20

  Pardew, James, 262

  Patriot Act, 268

  Penet remailer, 115–17, 321

  Pentagon Papers

  access to, 24–25, 36, 45

  contents of, 24–26

  copying of, 11–13

  legacy of, 270, 321

  release of, 34–37

  See also Ellsberg, Daniel

  PGP (pretty-good privacy)

  and activism, 71, 74–75

  distribution of, 74–75

  investigation of, 75, 83–84, 86–87

  MIT Press’s publication of, 87

  origins of, 70–75

  passwords for, 306

  in remailers, 118

  and Young’s Cryptome site, 101

  PGP: Source Code and Internals (Zimmermann), 53, 83, 87

  Pietrosanti, Fabio, 318–19

  Pirate Bay, 238–39, 256, 305, 306, 318

  political dissidents, 136–38, 140

  PRQ (PeRiQuito AB), 238–40, 294

  public key encryption

  described, 62–64

  Manning’s use of, 34

  and May’s BlackNet concept, 89–92

  and Mix Network concept, 79–80

  RSA, 64, 70, 71, 79

  signatures in, 67

  and Tor, 145–46

  and Young’s Cryptome site, 101

  See also PGP (pretty-good privacy)

  Qaddafi, Muammar, 3, 137

  Radack, Jesselyn, 225

  RAND, 11, 22, 24, 34, 36

  Reader’s Digest, 101

  Reagan administration, 55

  remailers

  and Chaum’s Mix Network encryption,
80–81, 82, 117

  Cottrell’s Mixmaster remailer, 118–19, 144

  cypherpunk remailer, 82, 92, 118

  Helsingius’s Penet remailer, 115–17

  improvements to, 117–18

  and Young’s Cryptome site, 102

  Rolling Stone, 138

  Rosenkranz, Richard, 109, 110

  RSA (MIT’s public key encryption), 64, 70, 71, 79

  Rubberhose, 126–27, 163, 164

  Russo, Tony, 11–13, 37

  Salin, Phil, 59–60, 64–65, 89

  satellite modems, 135–37

  secrets

  and crypto-anarchy, 90–91

  culture of secrecy, 311

  Domscheit-Berg on role of, 312

 

‹ Prev