globalization of secrets control, 236
psychological effects of, 18, 225
Secrets (Ellsberg), 12, 24
Secure Sockets Layer encryption, 157
“Security without Identification” (Chaum), 66–67
Shamir, Israel, 262–63, 264, 300
Sheehan, Neil, 35
Shirky, Clay, 7, 235–36
Smith, Vaughan, 177
Soghoian, Chris, 141–42
Somalian leak, 164–65
Soviet Union, 55
SQL injection, 211
Steckman, Matthew, 181–82
Stefanov, Ognyan, 234, 260–61
Sterling, Bruce, 98
Stoev, Georgi, 234
S.266, 73–74, 84
Suburbia ISP, 112–13, 114
Sunde, Peter, 239
Svartholm, Gottfrid, 238–39
Sweden, 236–40, 292
Syverson, Paul, 143–44, 146–47, 156
Tamm, Thomas, 223
Tchobanov, Atanas, 232–35, 241–42, 252–53, 259–65, 269–70
TEMPEST tool of the NSA, 123, 130
text-message terrorism, 252–53
Thinthread, 220–24
Time magazine, 37
Tor
anonymity ensured by, 7, 139–40
and Anonymous, 184
and Appelbaum, 136, 150–51, 155, 167
the Architect on, 292–93
Bivol’s use of, 261
Browser Bundle program, 150
and copycat sites, 230, 231, 233
development of, 139, 144–47, 149
distribution of, 149
government backing of, 139, 140, 144–45, 146, 149, 150–51
Hidden Service feature, 140, 142, 157, 278, 318–19
leakers’ acclimation to, 233
Manning’s use of, 39, 139
mechanics of, 141
MIT Hackfest, 135–36, 139
name of, 141
nodes of, 149, 150, 158–60
and OpenLeaks, 278
political applications of, 149
and satellite modems, 135–37
security of, 141–42
and unencrypted files, 158–59
uses of, 140–41
and U.S. government, 139–43
and WikiLeaks, 138, 157, 158–60, 168
Trailblazer, 221–24
Trax, 107, 112
Tryggvadóttir, Margrét, 252
Trynor, Mark, 192–94
Tsonev, Tsoni, 231
Twitter, 138–39, 266–67
UKUSA agreement, 235, 236
Underground (Assange and Dreyfus), 103, 106–7, 111, 112, 129
University of Melbourne, 94–96, 106, 127
U.S. Army
and helicopter airstrike footage, 28–29, 34, 43, 168, 311
and Lamo, 40, 42
Manning’s acquisition of documents, 14–15
Manning’s arrest by, 43–44
Manning’s career with, 21, 27
security in, 37–39, 46
U.S. Congress, 73–74, 83–84, 189, 207–8
U.S. Defense Advanced Research Projects Agency (DARPA)
CINDER initiative, 173–74, 187–88, 190–91, 216–17, 218–20
cybersecurity research team at, 171–74
and governmental secrets, 139
and Tor, 139, 146, 147, 149
and University of Melbourne, 95
U.S. Department of Homeland Security, 101, 280
U.S. Department of Justice
and Bank of America, 179, 181
ethics violations leaks of, 225
and NSA wiretapping scandal, 223
PGP investigation, 87
and Twitter data, 138–39
and users’ data, 266
U.S. Department of State
and Appelbaum, 139
and crypto-export laws, 86–87
and Tor, 139–40, 149
and Tunisian revolution, 3
See also Cablegate
Usenet, 59, 74, 106, 197
Viborg, Mikael, 239
video clips, 315–16
Vietnam War, 21–26, 36, 54. See also Pentagon Papers
Wall Street Journal, 230
WarGames (1983), 196–97
Weinmann, Ralf-Philipp, 126, 163
WikiLeaks
anonymity of, 6, 157–58
and Anonymous, 184–85
and Appelbaum, 138–39, 151–52
and the Architect, 287, 292–98, 300
archives of, 164–66, 296, 297, 300, 302
and BalkanLeaks, 263–64
beginnings of, 96–98
and Church of Scientology, 166, 186
cloned sites of, 177
and Collateral Murder video, 28–29, 34, 43, 168, 311
copycat sites, 229–35, 290–92, 318–19 (see also OpenLeaks)
cover traffic of, 293
critics of, 4, 295–96
cyberattacks on, 177, 182
and cypherpunks, 102
dismantled state of, 297–98, 302
DNS service provider for, 177
WikiLeaks (cont.)
document repository of, 159
and Domscheit-Berg, 229–30, 276, 285–88, 296–98, 300
donations and funding for, 4, 34, 175, 177, 182, 186, 264, 286, 319–20
early days of, 156–60, 164–66, 285
and HBGary Federal, 179–83, 214
in Iceland, 256–59
and IMMI legislation, 228
leaks left unpublished by, 300, 302–4
leaks released by, 2–3, 174–79, 285, 295–96 (see also Afghan War; Cablegate; Iraq War)
leaks submitted to, 39, 164–66, 293–94, 297, 298, 299–300
nondisclosure agreement of, 300–301
OpenLeakers’ digital custody dispute with, 178, 297–98, 299–300, 301–5, 307, 310
operations of, 286
partial shutdown of, 296–97
prototype for, 113
redactions of names, 295, 296, 309
security breaches at, 300–301, 305–9
servers of, 157, 177, 182, 237, 285, 294, 297
submission system of, 157–58, 168, 230, 238, 297, 298, 300, 302
supporters of, 4, 182–83
and Tor, 138, 157, 158–60, 168
transnational status of, 235–36
web hosting for, 237–41, 294
and Young, 102, 130–32, 157–58, 159–60, 164–65, 285, 321–22
World War II, 311
Yordanov, Assen, 233–35, 241–46, 253–54, 259–65, 270–71
Young, John
and Assange, 130–32
background of, 108–11
and Bell, 123–24, 125
and Cablegate security breach, 307
and cypherpunks, 111, 122–25
interview with, 99–102
libertarianism of, 109
and WikiLeaks, 102, 130–32, 157–58, 159–60, 164–65, 285, 321–22
See also Cryptome
Zatko, Peiter “Mudge”
and Assange, 174, 201–2
background of, 195–202
at Black Hat conference, 216–17
CINDER initiative, 173–74, 187–88, 190–91, 216–17, 218–20
and Forbes article, 202
and L0pht, 206–9
role at Department of Defense, 171–74, 190–91
Zimmermann, Philip R.
activism of, 53–55, 71, 84
and Assange, 113
background of, 60–62
and Bell’s “Assassination Politics,” 122
and Clipper Chip, 85, 88
congressional testimony of, 83
and cypherpunks, 85, 86
encryption engine of, 70–75 (see also PGP)
and export laws, 86–87
interview with, 53
investigation of, 75, 83–84, 86–87
and May, 85, 88
media coverage of, 85–86
and Merritt, 70–72
and New York Times magazine story, 122
This Machine Kills Secrets Page 43