Surveillance Valley

Home > Other > Surveillance Valley > Page 44
Surveillance Valley Page 44

by Yasha Levine


  Silicon Valley start-ups, 145

  Stanford Industrial Park, 145

  Stewart Brand’s realignment with, 113–114

  Tor Project support, 227

  use of World War II camp labor, 272–274

  See also Google

  Correa, Rafael, 221

  counterculture, 107–109, 112–113

  counterinsurgency

  Cambridge Project, 68–69

  computer and networking technology development for, 51–59

  congressional hearings on domestic surveillance, 86–87

  CONUS Intel targeting domestic activists, 75–80

  Godel’s anti-communist objectives, 22

  Ithiel de Sola Pool’s research, 65–66

  Nicaragua, 129–130

  origins of networking technology, 7

  predictive models and profiling individuals, 160–161

  Project Agile in Vietnam, 24–25

  Project Camelot, 67

  psychological warfare, 27–33

  spying on American protesters, 75–80

  strategic elements, policy, and doctrine, 27–31

  student protests targeting ARPANET, 63–64

  technology during the Vietnam War, 13–14

  US history of, 21

  US psychological warfare, 20

  See also domestic surveillance and counterinsurgency

  coups d’état, 67–68, 221

  crime

  celebrating Tor’s role in, 209–210

  predictive policing, 165–168

  Silk Road, 201–205, 260–262

  CrowdStrike, 181JigSaw181

  The Crypto Anarchist Manifesto (May), 185(quote)

  crypto culture, 209–211. See also Tor/Tor Project

  cryptography research, 38, 225–226

  cults, 109–111

  Cultural Logic of Computation (Golumbia), 45

  Curtis, Adam, 109–111

  cybernetics

  as defense technology, 47–51

  communes and, 112–113

  Hackers’ Conference, 114–116

  MIT cybernetics program, 42–46

  New Communalists, 109–112

  Cybernetics (Wiener), 44–45

  cyberpunk movement, 115

  cyberspace, 115

  cypherpunks, 203–204

  dark web. See Tor/Tor Project

  DARPA (Defense Advanced Research Projects Agency)

  Agent Orange development, 15

  Digital Library Initiative, 147

  early warning intelligence, 190

  Google involvement with, 181

  origins of networking technology, 6–7

  Tor Project, 226–227

  Total Information Awareness project, 161

  See also ARPA

  data banks. See databases

  data collection and mining

  AOL search logs revealing personal identity, 156–157

  ARPA’s Southeast Asia programs, 52–53

  Brin’s interest in, 148

  Cambridge Project, 68–69

  early tabulation technology, 55–56

  Google and Gmail, 157–159

  Google as government contractor, 173–178

  Google search engine algorithm, 149–150

  Google’s expansion into multiple markets, 171–173

  Google’s penetration into civil society, 179–181

  NSA PRISM program, 192–193

  predictive modeling using search engine data, 160–161

  search engine development, 151–152

  secrecy over user search data, 153–156

  US Army database, 79–80

  data sharing: Oakland’s Domain Awareness Center, 2

  databases

  American Airlines SABRE, 82

  congressional hearings on domestic surveillance, 84–87, 90–93

  digitizing data, 80–84

  death threats, 211–212, 216

  Deep Web (documentary), 209

  Defense Communication Agency, 93

  defoliants, 13–15

  democracy promotion, 251

  Democratic National Convention, 265

  Department of Homeland Security (DHS): Silk Road, 261–262

  Dingledine, Roger, 202, 214, 225–227, 229–230, 236–241, 245–247, 251, 253, 258, 263

  Diplomatic Security, 182

  Doctorow, Cory, 258

  Domain Awareness Center (DAC), 1–5

  domestic surveillance and counterinsurgency

  bringing military technology to, 75–80

  Ford Rowan’s exposé, 73–75, 87–90

  growth of corporate and government databases, 82–84

  Sam Ervin’s congressional hearings, 84–87

  Tunney’s congressional investigation of ARPA, 90–93

  Dow Chemical, 69

  Dread Pirate Roberts, 201–204, 260–262

  Silk Road, 205

  The Dream Machine (Waldrop), 51

  drones, 52

  drug use: Vietnam War, 31–32

  dual use technology, 57–59

  Dugan, Regina, 180–181

  Duo app, 258

  “dynamations,” 47–48

  early warning systems, 37–38, 67, 189–190

  Earth Day festival, 78

  eBay, 169–170, 180

  economics: importance of cybernetics, 45

  eco-technics, 110

  Ecuador, 221

  education

  “dynamations,” 47–48

  Google penetration into public schools, 179

  Edwards, Douglas, 141–142, 153–154

  EGOTISTICAL GIRAFFE, 265

  Egypt: Arab Spring, 248

  Eisenhower, Dwight, 16–17

  elections: data-driven campaigning, 65

  Electric Word magazine, 129

  electronic fence technology, 27

  Electronic Frontier Foundation (EFF)

  Signal, 258

  Tor, Assange, and WikiLeaks, 245

  Tor Project funding, 212–213, 227–228

  Wired magazine connection, 136

  Electronic Privacy Information Center, 162

  Ellsberg, Daniel, 209

  email, 157–164

  encryption: Moxie Marlinspike and Signal, 257

  Engelbart, Douglas C., 50, 112, 145

  ENIAC computer, 39–41, 117

  Erskine, Graves, 19–20

  Ervin, Sam, 84–88

  Ethical Tor Research guide, 263–264

  face recognition: Oakland’s Domain Awareness Center, 1–2

  Facebook, 170, 180–181, 194–195, 209, 258

  Falun Gong, 235

  The Family, 110–111

  Federal Bureau of Investigation (FBI)

  building a database, 80–81

  exposé on domestic surveillance, 89

  NSA PRISM program, 192–193

  Silk Road, 203, 261–262

  Federal Communications Commission (FCC), 135

  Ferguson, Richard, 89–90

  Fight for the Future, 258

  Figueroa, Liz, 162–164

  First Lighting, 37–38

  foreign policy, US

  BBG’s Russian Deployment Plan, 237–238

  fighting Internet censorship, 234–236

  The Fountainhead (Rand), 239–240

  Fowler, Donnie, 167–168

  France: US clandestine ops in Vietnam, 19–20

  fraud, Project Agile as, 32–33

  Freedom of Information Act, 223

  Gaddafi, Muammar, 248

  Gellman, Barton, 199

  Geneva Conventions, 15

  gentrification: San Francisco and Oakland, 2–4

  GeoEye-I satellite, 181

  Gibson, Randall, 110, 115

  Gilder, George, 102, 135

  Gingrich, Newt, 135

  Gmail, 157–164, 179–180

  Godel, William, 13–15, 18–22, 27–33, 51–53, 145

  Golumbia, David, 45

  Google

  as government contra
ctor, 173–178

  buying companies and start-ups, 169–173

  civilian, military and intelligence penetration, 178–182

  early users, 143

  equating with government, 182–184

  Gmail, 157–164

  JigSaw, 181–183

  Keyhole Incorporated takeover, 175

  Lockheed Martin partnership, 176–177

  National Geospatial-Intelligence Agency partnership, 177–179

  NSA PRISM program, 194–195

  Oakland’s Domain Awareness Center and, 4–5

  predictive policing, 167–168

  predictive system, 161

  public stock offering, 164–165

  search engine, 149–150

  search engine development, 151–152

  secrecy over user search data, 153–155, 157

  September 11, 2001, 139–141

  Signal encryption, 258, 265

  Snowden and, 208–209

  tailoring searching through profiling, 150

  targeted advertising system, 5

  Google Earth, 173–176

  Google Federal, 176, 178–179

  Gore, Al, 102, 164

  Great Firewall of China, 235, 256

  Great Intergalactic Network, 59–61

  Greenberg, Andy, 245, 258

  guerrilla activity: US clandestine ops in Vietnam, 19–20

  hacker community

  defense origins of the Tor Project, 225–226

  hacking Tor, 263–265

  Jacob Appelbaum’s history, 239–242

  Tor Project, 220–222

  working for the government, 225–226

  Hackers’ Conference, 115–116

  Hafner, Katie, 60

  Halliday, John T., 26

  Hamburg, Germany, 219–222

  Hanke, John, 174

  Hard Landing (Petzinger), 82

  Harrison, Sarah, 220

  Harvard University, 62–64

  HavenCo, 220

  Hayden, Michael, 199–200

  Heidinger, Willy, 56–57

  Herzfeld, Charles, 47

  Hess, Karl III, 128–129

  Hitler, Adolf, 43, 56–57, 272

  Hollerith, Herman, 54–56

  Honduras, 129–130

  Hoofnagle, Chris, 161, 164–165

  Hoover, J. Edgar, 80–81

  hosting companies, 220

  Hotmail, 158

  The Human Use of Human Beings (Wiener), 46

  IBM (International Business Machines)

  Hollerith tabulation technology, 54–56

  Nazis’ use of IBM machines, 272–273

  personal computers, 124–126

  privatization of the Internet, 121–124

  Regional Enforcement Information Network, 81

  ICEWS (Integrated Crisis Early Warning System), 190

  identity, AOL search logs revealing, 155–157

  I’m Feeling Lucky: The Confessions of Google Employee Number 59 (Edwards), 141, 154

  immigration: Hollerith’s tabulator machine, 54–56

  “In the Pay of the CIA” (television program), 233

  In the Plex (Levy), 152

  infrastructure, Internet, 135

  Inouye, Daniel, 126

  In-Q-Tel, 167, 174–175, 189, 235

  Intel, 145

  Intelligence Advanced Research Project Agency, 189–190

  intelligence community

  ARPA’s Southeast Asia programs, 52–53

  connection with the Tor Project, 245–247

  CONUS Intel, 76–79

  covert communication for espionage agents, 224–228

  open source intelligence, 188–190

  Project Camelot, 67–68

  spying on Americans with ARPANET, 73–75

  Tor Project enhancing and facilitating, 223–224

  Tor Project funding, 228–230

  use of social media, 188–189

  See also Central Intelligence Agency; Central Intelligence Agency (CIA)

  intelligent systems, 96

  Intellipedia, 177

  interface message processors (IMPs), 61

  Internet

  as a mirror of the world, 273–274

  as liberating technology, 6

  as religious experience, 132–133

  Augmentation Research Center, 50–51, 112

  China’s censorship, 234–236

  exponential growth, 146–147

  military origins of, 14–15, 41–42

  origins of networking technology, 6–8

  penetration into China, 234

  privatization of, 116–117

  Internet Freedom, 234–236, 247, 251, 254, 258–259, 267–269. See also privacy

  Internet service providers, 127–128, 135–136

  Iran: censorship wars and anonymity, 205, 235–236

  Iraq: WikiLeaks data, 243

  Isenberg, Nancy, 73(quote)

  Jacobsen, Annie, 20–21, 53

  JigSaw, 181–182

  Jobs, Steve, 109, 116

  Johnson, Roy, 17–18

  Jordan: Arab Spring, 248

  Kahn, Robert, 93–96

  Kapor, Mitch, 135

  Kelly, Kevin, 101–102, 132–133

  Kennan, George, 231

  Kennedy, John F., 13–15, 23–24, 35–36, 65

  Kent State University, 75

  Kesey, Ken, 107–108

  Keyhole Incorporated, 173–176

  King, Martin Luther, Jr., 75

  Kleiner Perkins, 151

  Koogle, Tim, 151

  Korean War, 19

  Kosovo Privacy Project, 228

  Kotkin, Stephen, 233

  Kucherena, Anatoly, 254

  labor unions, 55–56

  Lackey, Ryan, 220

  Lansdale, Edward, 21, 24, 31

  The Last Stand of the Psychocultural Cold Warriors (Rhode), 66

  Latin America

  CIA propaganda projects, 232–233

  training global activists in social media use, 249

  law enforcement databases, 80–81

  Lee, Micah, 200–201, 214–215

  Levy, Steven, 152

  Lewman, Andrew, 246

  libertarianism, 128–129

  Libya: Arab Spring, 248

  Licklider, J.C.R., 35–37, 42, 47–53, 57–59, 61, 63–65, 68, 70–71, 76, 111–112, 191

  Lincoln, Abraham, 187

  Lincoln Lab (MIT), 40–42, 60

  Lockheed Martin, 177, 190

  Los Angeles Police Department, 79

  Lukasik, Stephen, 92

  Lycos search engine, 147

  Lyon, Matthew, 60

  Machine Architecture Group (MAG), 130

  Machine-Aided Cognition (MAC), 50

  Malone, John, 135

  Manning, Chelsea (née Bradley), 243, 267

  Marlinspike, Moxie, 257

  Massachusetts Institute of Technology (MIT)

  Cambridge Project, 64–65

  cybernetics, 42–46

  early defense technology, 41–42

  Machine-Aided Cognition, 50

  Stanford and, 145

  student protests targeting ARPANET, 62–64, 69–71

  Mathewson, Nick, 225–226

  Mauthausen, Austria, 271–274

  May, Timothy C., 185(quote), 203

  McCarthy, Eugene, 77–78

  McElroy, Neil, 16–17, 91

  MCI: privatization of the Internet, 121–124, 127–128

  McLaughlin, Andrew, 164, 258

  McNamara, Robert, 36

  Meredith, Dan, 255

  Metcalfe, Jane, 129, 131

  Microsoft: NSA PRISM program, 193

  Middle East, 247–248

  Mid-West News, 79

  military activities

  ARPANET classified data collection, 92–93

  ARPANET routing protocols, 96–97

  FaceBook involvement in, 180–181

  Google involvement in, 5

  Google surveillance mirroring military su
rveillance, 160–165

  Kosovo Privacy Project, 228

  Negroponte’s MAG, 130

  prediction and profiling, 160–161

  Project Agile in Vietnam, 24

  regional counterinsurgencies, 23

  Sputnik I launch, 15–18

  Tor funding, 247

  Tor Project and the privacy movement, 223–228, 238–239

  US counterinsurgency operations in North Vietnam, 21

  Vietnam War-era technology, 13–15

  WikiLeaks data, 243

  Miller, Arthur R., 82–84

  MIT Media Lab, 130–131

  mouse, computer, 50–51

  Murray, Charles, 30

  MUSCULAR (NSA program), 191–192

  music streaming, 169

  Musk, Elon, 180

  Nakamoto, Satoshi, 201–202

  NASA (National Aeronautics and Space Administration), 18

  National Crime Information Center, 80–81

  national data banks, 81

  National Data Center, 81, 83–84

  National Geospatial-Intelligence Agency, 174–175, 177

  National Military Command System, 51

  National Oceanic and Atmospheric Administration (NOAA), 178–179

  National Science Foundation (NSF), 117–122, 127

  National Security Agency (NSA)

  accessing individuals’ cellphone data, 265–266

  Amazon’s involvement with, 180

  ARPA’s Command and Control, 50

  covert communication, 224–225

  cryptography technology, 38–39

  Edward Snowden’s activities, 252–254

  establishment and mandate of, 190–191

  Google’s involvement with, 5

  hacking and cracking Tor, 264–265

  Patriot Act, 141–142

  taking down criminal networks, 262–263

  Total Information Awareness project, 161

  US Army domestic surveillance files, 88–90

  See also Snowden, Edward

  National Security Council Directive 10/2, 231–232

  NATO bombing in Kosovo, 228

  Naval Research Laboratory, Washington, DC, 224

  Nazi Germany

  tabulation technology in death and labor camps, 56–57

  use of IBM machines, 272–273

  Negroponte, Nicholas, 129–132, 138

  Netflix, 169

  Netscape, 102–103

  network warfare, 235

  networking technology

  ARPANET, 59–62

  ARPANET’s routing system protocols, 93–97

  Augmentation Research Center, 50–51, 112

  Cambridge Project, 64–65

  Command and Control Research program, 48–49

  congressional hearings on domestic surveillance, 84–87

  counterinsurgency technology, 51–59

  increasing private access to, 124–126

  Licklider’s “thinking centers,” 57–59

  military and intelligence use of ARPANET data, 92–93

  NSA PRISM program, 193–196

  NSFNET, 118–121

  origins of, 6–8

  Telecosm, 102

  Neuromancer (Gibson), 115

  New Communalists, 108–109, 112–113

 

‹ Prev