This Machine Kills Secrets

Home > Other > This Machine Kills Secrets > Page 43
This Machine Kills Secrets Page 43

by Andy Greenberg


  globalization of secrets control, 236

  psychological effects of, 18, 225

  Secrets (Ellsberg), 12, 24

  Secure Sockets Layer encryption, 157

  “Security without Identification” (Chaum), 66–67

  Shamir, Israel, 262–63, 264, 300

  Sheehan, Neil, 35

  Shirky, Clay, 7, 235–36

  Smith, Vaughan, 177

  Soghoian, Chris, 141–42

  Somalian leak, 164–65

  Soviet Union, 55

  SQL injection, 211

  Steckman, Matthew, 181–82

  Stefanov, Ognyan, 234, 260–61

  Sterling, Bruce, 98

  Stoev, Georgi, 234

  S.266, 73–74, 84

  Suburbia ISP, 112–13, 114

  Sunde, Peter, 239

  Svartholm, Gottfrid, 238–39

  Sweden, 236–40, 292

  Syverson, Paul, 143–44, 146–47, 156

  Tamm, Thomas, 223

  Tchobanov, Atanas, 232–35, 241–42, 252–53, 259–65, 269–70

  TEMPEST tool of the NSA, 123, 130

  text-message terrorism, 252–53

  Thinthread, 220–24

  Time magazine, 37

  Tor

  anonymity ensured by, 7, 139–40

  and Anonymous, 184

  and Appelbaum, 136, 150–51, 155, 167

  the Architect on, 292–93

  Bivol’s use of, 261

  Browser Bundle program, 150

  and copycat sites, 230, 231, 233

  development of, 139, 144–47, 149

  distribution of, 149

  government backing of, 139, 140, 144–45, 146, 149, 150–51

  Hidden Service feature, 140, 142, 157, 278, 318–19

  leakers’ acclimation to, 233

  Manning’s use of, 39, 139

  mechanics of, 141

  MIT Hackfest, 135–36, 139

  name of, 141

  nodes of, 149, 150, 158–60

  and OpenLeaks, 278

  political applications of, 149

  and satellite modems, 135–37

  security of, 141–42

  and unencrypted files, 158–59

  uses of, 140–41

  and U.S. government, 139–43

  and WikiLeaks, 138, 157, 158–60, 168

  Trailblazer, 221–24

  Trax, 107, 112

  Tryggvadóttir, Margrét, 252

  Trynor, Mark, 192–94

  Tsonev, Tsoni, 231

  Twitter, 138–39, 266–67

  UKUSA agreement, 235, 236

  Underground (Assange and Dreyfus), 103, 106–7, 111, 112, 129

  University of Melbourne, 94–96, 106, 127

  U.S. Army

  and helicopter airstrike footage, 28–29, 34, 43, 168, 311

  and Lamo, 40, 42

  Manning’s acquisition of documents, 14–15

  Manning’s arrest by, 43–44

  Manning’s career with, 21, 27

  security in, 37–39, 46

  U.S. Congress, 73–74, 83–84, 189, 207–8

  U.S. Defense Advanced Research Projects Agency (DARPA)

  CINDER initiative, 173–74, 187–88, 190–91, 216–17, 218–20

  cybersecurity research team at, 171–74

  and governmental secrets, 139

  and Tor, 139, 146, 147, 149

  and University of Melbourne, 95

  U.S. Department of Homeland Security, 101, 280

  U.S. Department of Justice

  and Bank of America, 179, 181

  ethics violations leaks of, 225

  and NSA wiretapping scandal, 223

  PGP investigation, 87

  and Twitter data, 138–39

  and users’ data, 266

  U.S. Department of State

  and Appelbaum, 139

  and crypto-export laws, 86–87

  and Tor, 139–40, 149

  and Tunisian revolution, 3

  See also Cablegate

  Usenet, 59, 74, 106, 197

  Viborg, Mikael, 239

  video clips, 315–16

  Vietnam War, 21–26, 36, 54. See also Pentagon Papers

  Wall Street Journal, 230

  WarGames (1983), 196–97

  Weinmann, Ralf-Philipp, 126, 163

  WikiLeaks

  anonymity of, 6, 157–58

  and Anonymous, 184–85

  and Appelbaum, 138–39, 151–52

  and the Architect, 287, 292–98, 300

  archives of, 164–66, 296, 297, 300, 302

  and BalkanLeaks, 263–64

  beginnings of, 96–98

  and Church of Scientology, 166, 186

  cloned sites of, 177

  and Collateral Murder video, 28–29, 34, 43, 168, 311

  copycat sites, 229–35, 290–92, 318–19 (see also OpenLeaks)

  cover traffic of, 293

  critics of, 4, 295–96

  cyberattacks on, 177, 182

  and cypherpunks, 102

  dismantled state of, 297–98, 302

  DNS service provider for, 177

  WikiLeaks (cont.)

  document repository of, 159

  and Domscheit-Berg, 229–30, 276, 285–88, 296–98, 300

  donations and funding for, 4, 34, 175, 177, 182, 186, 264, 286, 319–20

  early days of, 156–60, 164–66, 285

  and HBGary Federal, 179–83, 214

  in Iceland, 256–59

  and IMMI legislation, 228

  leaks left unpublished by, 300, 302–4

  leaks released by, 2–3, 174–79, 285, 295–96 (see also Afghan War; Cablegate; Iraq War)

  leaks submitted to, 39, 164–66, 293–94, 297, 298, 299–300

  nondisclosure agreement of, 300–301

  OpenLeakers’ digital custody dispute with, 178, 297–98, 299–300, 301–5, 307, 310

  operations of, 286

  partial shutdown of, 296–97

  prototype for, 113

  redactions of names, 295, 296, 309

  security breaches at, 300–301, 305–9

  servers of, 157, 177, 182, 237, 285, 294, 297

  submission system of, 157–58, 168, 230, 238, 297, 298, 300, 302

  supporters of, 4, 182–83

  and Tor, 138, 157, 158–60, 168

  transnational status of, 235–36

  web hosting for, 237–41, 294

  and Young, 102, 130–32, 157–58, 159–60, 164–65, 285, 321–22

  World War II, 311

  Yordanov, Assen, 233–35, 241–46, 253–54, 259–65, 270–71

  Young, John

  and Assange, 130–32

  background of, 108–11

  and Bell, 123–24, 125

  and Cablegate security breach, 307

  and cypherpunks, 111, 122–25

  interview with, 99–102

  libertarianism of, 109

  and WikiLeaks, 102, 130–32, 157–58, 159–60, 164–65, 285, 321–22

  See also Cryptome

  Zatko, Peiter “Mudge”

  and Assange, 174, 201–2

  background of, 195–202

  at Black Hat conference, 216–17

  CINDER initiative, 173–74, 187–88, 190–91, 216–17, 218–20

  and Forbes article, 202

  and L0pht, 206–9

 
role at Department of Defense, 171–74, 190–91

  Zimmermann, Philip R.

  activism of, 53–55, 71, 84

  and Assange, 113

  background of, 60–62

  and Bell’s “Assassination Politics,” 122

  and Clipper Chip, 85, 88

  congressional testimony of, 83

  and cypherpunks, 85, 86

  encryption engine of, 70–75 (see also PGP)

  and export laws, 86–87

  interview with, 53

  investigation of, 75, 83–84, 86–87

  and May, 85, 88

  media coverage of, 85–86

  and Merritt, 70–72

  and New York Times magazine story, 122

 

 

 


‹ Prev