Surveillance Valley
Page 44
Silicon Valley start-ups, 145
Stanford Industrial Park, 145
Stewart Brand’s realignment with, 113–114
Tor Project support, 227
use of World War II camp labor, 272–274
See also Google
Correa, Rafael, 221
counterculture, 107–109, 112–113
counterinsurgency
Cambridge Project, 68–69
computer and networking technology development for, 51–59
congressional hearings on domestic surveillance, 86–87
CONUS Intel targeting domestic activists, 75–80
Godel’s anti-communist objectives, 22
Ithiel de Sola Pool’s research, 65–66
Nicaragua, 129–130
origins of networking technology, 7
predictive models and profiling individuals, 160–161
Project Agile in Vietnam, 24–25
Project Camelot, 67
psychological warfare, 27–33
spying on American protesters, 75–80
strategic elements, policy, and doctrine, 27–31
student protests targeting ARPANET, 63–64
technology during the Vietnam War, 13–14
US history of, 21
US psychological warfare, 20
See also domestic surveillance and counterinsurgency
coups d’état, 67–68, 221
crime
celebrating Tor’s role in, 209–210
predictive policing, 165–168
Silk Road, 201–205, 260–262
CrowdStrike, 181JigSaw181
The Crypto Anarchist Manifesto (May), 185(quote)
crypto culture, 209–211. See also Tor/Tor Project
cryptography research, 38, 225–226
cults, 109–111
Cultural Logic of Computation (Golumbia), 45
Curtis, Adam, 109–111
cybernetics
as defense technology, 47–51
communes and, 112–113
Hackers’ Conference, 114–116
MIT cybernetics program, 42–46
New Communalists, 109–112
Cybernetics (Wiener), 44–45
cyberpunk movement, 115
cyberspace, 115
cypherpunks, 203–204
dark web. See Tor/Tor Project
DARPA (Defense Advanced Research Projects Agency)
Agent Orange development, 15
Digital Library Initiative, 147
early warning intelligence, 190
Google involvement with, 181
origins of networking technology, 6–7
Tor Project, 226–227
Total Information Awareness project, 161
See also ARPA
data banks. See databases
data collection and mining
AOL search logs revealing personal identity, 156–157
ARPA’s Southeast Asia programs, 52–53
Brin’s interest in, 148
Cambridge Project, 68–69
early tabulation technology, 55–56
Google and Gmail, 157–159
Google as government contractor, 173–178
Google search engine algorithm, 149–150
Google’s expansion into multiple markets, 171–173
Google’s penetration into civil society, 179–181
NSA PRISM program, 192–193
predictive modeling using search engine data, 160–161
search engine development, 151–152
secrecy over user search data, 153–156
US Army database, 79–80
data sharing: Oakland’s Domain Awareness Center, 2
databases
American Airlines SABRE, 82
congressional hearings on domestic surveillance, 84–87, 90–93
digitizing data, 80–84
death threats, 211–212, 216
Deep Web (documentary), 209
Defense Communication Agency, 93
defoliants, 13–15
democracy promotion, 251
Democratic National Convention, 265
Department of Homeland Security (DHS): Silk Road, 261–262
Dingledine, Roger, 202, 214, 225–227, 229–230, 236–241, 245–247, 251, 253, 258, 263
Diplomatic Security, 182
Doctorow, Cory, 258
Domain Awareness Center (DAC), 1–5
domestic surveillance and counterinsurgency
bringing military technology to, 75–80
Ford Rowan’s exposé, 73–75, 87–90
growth of corporate and government databases, 82–84
Sam Ervin’s congressional hearings, 84–87
Tunney’s congressional investigation of ARPA, 90–93
Dow Chemical, 69
Dread Pirate Roberts, 201–204, 260–262
Silk Road, 205
The Dream Machine (Waldrop), 51
drones, 52
drug use: Vietnam War, 31–32
dual use technology, 57–59
Dugan, Regina, 180–181
Duo app, 258
“dynamations,” 47–48
early warning systems, 37–38, 67, 189–190
Earth Day festival, 78
eBay, 169–170, 180
economics: importance of cybernetics, 45
eco-technics, 110
Ecuador, 221
education
“dynamations,” 47–48
Google penetration into public schools, 179
Edwards, Douglas, 141–142, 153–154
EGOTISTICAL GIRAFFE, 265
Egypt: Arab Spring, 248
Eisenhower, Dwight, 16–17
elections: data-driven campaigning, 65
Electric Word magazine, 129
electronic fence technology, 27
Electronic Frontier Foundation (EFF)
Signal, 258
Tor, Assange, and WikiLeaks, 245
Tor Project funding, 212–213, 227–228
Wired magazine connection, 136
Electronic Privacy Information Center, 162
Ellsberg, Daniel, 209
email, 157–164
encryption: Moxie Marlinspike and Signal, 257
Engelbart, Douglas C., 50, 112, 145
ENIAC computer, 39–41, 117
Erskine, Graves, 19–20
Ervin, Sam, 84–88
Ethical Tor Research guide, 263–264
face recognition: Oakland’s Domain Awareness Center, 1–2
Facebook, 170, 180–181, 194–195, 209, 258
Falun Gong, 235
The Family, 110–111
Federal Bureau of Investigation (FBI)
building a database, 80–81
exposé on domestic surveillance, 89
NSA PRISM program, 192–193
Silk Road, 203, 261–262
Federal Communications Commission (FCC), 135
Ferguson, Richard, 89–90
Fight for the Future, 258
Figueroa, Liz, 162–164
First Lighting, 37–38
foreign policy, US
BBG’s Russian Deployment Plan, 237–238
fighting Internet censorship, 234–236
The Fountainhead (Rand), 239–240
Fowler, Donnie, 167–168
France: US clandestine ops in Vietnam, 19–20
fraud, Project Agile as, 32–33
Freedom of Information Act, 223
Gaddafi, Muammar, 248
Gellman, Barton, 199
Geneva Conventions, 15
gentrification: San Francisco and Oakland, 2–4
GeoEye-I satellite, 181
Gibson, Randall, 110, 115
Gilder, George, 102, 135
Gingrich, Newt, 135
Gmail, 157–164, 179–180
Godel, William, 13–15, 18–22, 27–33, 51–53, 145
Golumbia, David, 45
Google
as government contra
ctor, 173–178
buying companies and start-ups, 169–173
civilian, military and intelligence penetration, 178–182
early users, 143
equating with government, 182–184
Gmail, 157–164
JigSaw, 181–183
Keyhole Incorporated takeover, 175
Lockheed Martin partnership, 176–177
National Geospatial-Intelligence Agency partnership, 177–179
NSA PRISM program, 194–195
Oakland’s Domain Awareness Center and, 4–5
predictive policing, 167–168
predictive system, 161
public stock offering, 164–165
search engine, 149–150
search engine development, 151–152
secrecy over user search data, 153–155, 157
September 11, 2001, 139–141
Signal encryption, 258, 265
Snowden and, 208–209
tailoring searching through profiling, 150
targeted advertising system, 5
Google Earth, 173–176
Google Federal, 176, 178–179
Gore, Al, 102, 164
Great Firewall of China, 235, 256
Great Intergalactic Network, 59–61
Greenberg, Andy, 245, 258
guerrilla activity: US clandestine ops in Vietnam, 19–20
hacker community
defense origins of the Tor Project, 225–226
hacking Tor, 263–265
Jacob Appelbaum’s history, 239–242
Tor Project, 220–222
working for the government, 225–226
Hackers’ Conference, 115–116
Hafner, Katie, 60
Halliday, John T., 26
Hamburg, Germany, 219–222
Hanke, John, 174
Hard Landing (Petzinger), 82
Harrison, Sarah, 220
Harvard University, 62–64
HavenCo, 220
Hayden, Michael, 199–200
Heidinger, Willy, 56–57
Herzfeld, Charles, 47
Hess, Karl III, 128–129
Hitler, Adolf, 43, 56–57, 272
Hollerith, Herman, 54–56
Honduras, 129–130
Hoofnagle, Chris, 161, 164–165
Hoover, J. Edgar, 80–81
hosting companies, 220
Hotmail, 158
The Human Use of Human Beings (Wiener), 46
IBM (International Business Machines)
Hollerith tabulation technology, 54–56
Nazis’ use of IBM machines, 272–273
personal computers, 124–126
privatization of the Internet, 121–124
Regional Enforcement Information Network, 81
ICEWS (Integrated Crisis Early Warning System), 190
identity, AOL search logs revealing, 155–157
I’m Feeling Lucky: The Confessions of Google Employee Number 59 (Edwards), 141, 154
immigration: Hollerith’s tabulator machine, 54–56
“In the Pay of the CIA” (television program), 233
In the Plex (Levy), 152
infrastructure, Internet, 135
Inouye, Daniel, 126
In-Q-Tel, 167, 174–175, 189, 235
Intel, 145
Intelligence Advanced Research Project Agency, 189–190
intelligence community
ARPA’s Southeast Asia programs, 52–53
connection with the Tor Project, 245–247
CONUS Intel, 76–79
covert communication for espionage agents, 224–228
open source intelligence, 188–190
Project Camelot, 67–68
spying on Americans with ARPANET, 73–75
Tor Project enhancing and facilitating, 223–224
Tor Project funding, 228–230
use of social media, 188–189
See also Central Intelligence Agency; Central Intelligence Agency (CIA)
intelligent systems, 96
Intellipedia, 177
interface message processors (IMPs), 61
Internet
as a mirror of the world, 273–274
as liberating technology, 6
as religious experience, 132–133
Augmentation Research Center, 50–51, 112
China’s censorship, 234–236
exponential growth, 146–147
military origins of, 14–15, 41–42
origins of networking technology, 6–8
penetration into China, 234
privatization of, 116–117
Internet Freedom, 234–236, 247, 251, 254, 258–259, 267–269. See also privacy
Internet service providers, 127–128, 135–136
Iran: censorship wars and anonymity, 205, 235–236
Iraq: WikiLeaks data, 243
Isenberg, Nancy, 73(quote)
Jacobsen, Annie, 20–21, 53
JigSaw, 181–182
Jobs, Steve, 109, 116
Johnson, Roy, 17–18
Jordan: Arab Spring, 248
Kahn, Robert, 93–96
Kapor, Mitch, 135
Kelly, Kevin, 101–102, 132–133
Kennan, George, 231
Kennedy, John F., 13–15, 23–24, 35–36, 65
Kent State University, 75
Kesey, Ken, 107–108
Keyhole Incorporated, 173–176
King, Martin Luther, Jr., 75
Kleiner Perkins, 151
Koogle, Tim, 151
Korean War, 19
Kosovo Privacy Project, 228
Kotkin, Stephen, 233
Kucherena, Anatoly, 254
labor unions, 55–56
Lackey, Ryan, 220
Lansdale, Edward, 21, 24, 31
The Last Stand of the Psychocultural Cold Warriors (Rhode), 66
Latin America
CIA propaganda projects, 232–233
training global activists in social media use, 249
law enforcement databases, 80–81
Lee, Micah, 200–201, 214–215
Levy, Steven, 152
Lewman, Andrew, 246
libertarianism, 128–129
Libya: Arab Spring, 248
Licklider, J.C.R., 35–37, 42, 47–53, 57–59, 61, 63–65, 68, 70–71, 76, 111–112, 191
Lincoln, Abraham, 187
Lincoln Lab (MIT), 40–42, 60
Lockheed Martin, 177, 190
Los Angeles Police Department, 79
Lukasik, Stephen, 92
Lycos search engine, 147
Lyon, Matthew, 60
Machine Architecture Group (MAG), 130
Machine-Aided Cognition (MAC), 50
Malone, John, 135
Manning, Chelsea (née Bradley), 243, 267
Marlinspike, Moxie, 257
Massachusetts Institute of Technology (MIT)
Cambridge Project, 64–65
cybernetics, 42–46
early defense technology, 41–42
Machine-Aided Cognition, 50
Stanford and, 145
student protests targeting ARPANET, 62–64, 69–71
Mathewson, Nick, 225–226
Mauthausen, Austria, 271–274
May, Timothy C., 185(quote), 203
McCarthy, Eugene, 77–78
McElroy, Neil, 16–17, 91
MCI: privatization of the Internet, 121–124, 127–128
McLaughlin, Andrew, 164, 258
McNamara, Robert, 36
Meredith, Dan, 255
Metcalfe, Jane, 129, 131
Microsoft: NSA PRISM program, 193
Middle East, 247–248
Mid-West News, 79
military activities
ARPANET classified data collection, 92–93
ARPANET routing protocols, 96–97
FaceBook involvement in, 180–181
Google involvement in, 5
Google surveillance mirroring military su
rveillance, 160–165
Kosovo Privacy Project, 228
Negroponte’s MAG, 130
prediction and profiling, 160–161
Project Agile in Vietnam, 24
regional counterinsurgencies, 23
Sputnik I launch, 15–18
Tor funding, 247
Tor Project and the privacy movement, 223–228, 238–239
US counterinsurgency operations in North Vietnam, 21
Vietnam War-era technology, 13–15
WikiLeaks data, 243
Miller, Arthur R., 82–84
MIT Media Lab, 130–131
mouse, computer, 50–51
Murray, Charles, 30
MUSCULAR (NSA program), 191–192
music streaming, 169
Musk, Elon, 180
Nakamoto, Satoshi, 201–202
NASA (National Aeronautics and Space Administration), 18
National Crime Information Center, 80–81
national data banks, 81
National Data Center, 81, 83–84
National Geospatial-Intelligence Agency, 174–175, 177
National Military Command System, 51
National Oceanic and Atmospheric Administration (NOAA), 178–179
National Science Foundation (NSF), 117–122, 127
National Security Agency (NSA)
accessing individuals’ cellphone data, 265–266
Amazon’s involvement with, 180
ARPA’s Command and Control, 50
covert communication, 224–225
cryptography technology, 38–39
Edward Snowden’s activities, 252–254
establishment and mandate of, 190–191
Google’s involvement with, 5
hacking and cracking Tor, 264–265
Patriot Act, 141–142
taking down criminal networks, 262–263
Total Information Awareness project, 161
US Army domestic surveillance files, 88–90
See also Snowden, Edward
National Security Council Directive 10/2, 231–232
NATO bombing in Kosovo, 228
Naval Research Laboratory, Washington, DC, 224
Nazi Germany
tabulation technology in death and labor camps, 56–57
use of IBM machines, 272–273
Negroponte, Nicholas, 129–132, 138
Netflix, 169
Netscape, 102–103
network warfare, 235
networking technology
ARPANET, 59–62
ARPANET’s routing system protocols, 93–97
Augmentation Research Center, 50–51, 112
Cambridge Project, 64–65
Command and Control Research program, 48–49
congressional hearings on domestic surveillance, 84–87
counterinsurgency technology, 51–59
increasing private access to, 124–126
Licklider’s “thinking centers,” 57–59
military and intelligence use of ARPANET data, 92–93
NSA PRISM program, 193–196
NSFNET, 118–121
origins of, 6–8
Telecosm, 102
Neuromancer (Gibson), 115
New Communalists, 108–109, 112–113