Surveillance Valley

Home > Other > Surveillance Valley > Page 45
Surveillance Valley Page 45

by Yasha Levine


  New Economy, 133–134, 143

  Nixon, Richard, 16

  North, Newton Dexter, 55–56

  North Africa, 247–248

  North Korea: Radio Free Asia, 255

  North Vietnam: US counterinsurgency operations, 21

  NSFNET, 118–119, 122–123, 125–127, 134, 168

  nuclear weapons

  ARPA testing, 18

  cybernetics and, 45–46

  early Cold War preparation for nuclear war, 231–232

  Soviet’s first tests, 37–38

  US surveillance on Soviet communications, 21–22

  Oakland, California, 1–4

  Obama, Barack, 193, 198

  Octoputer, 64

  Oman: Arab Spring, 248

  Omidyar, Pierre, 169–170

  onion router, 225, 227

  open source code: Tor Project, 223

  open source intelligence, 188–190

  Open Technology Fund (OTF), 255–257, 259–260

  Open Whisper Systems, 210, 257

  Operation Argus, 18

  Operation Iraqi Freedom, 175

  Operation Omynous, 262

  Operation Ranch Hand (1962), 15

  origins of networking technology, 6–7

  packet satellite networking, 94

  Page, Larry, 5, 140, 143–155, 157, 159–160, 163–164, 173–174, 195–196

  PageRank, 149

  Paglen, Trevor, 210

  Painter, Rob, 175–176

  Pando magazine, 5, 210, 215, 217

  Pandora, 169

  parallel network. See Tor/Tor Project

  PATHAR, 189

  Patriot Act (2001), 141–142

  PayPal, 180

  pension system, tabulator use in, 56

  The Pentagon’s Brain (Jacobsen), 20, 53

  personal computers, 124–126

  Petzinger, Thomas, Jr., 82

  Phoenix Program, 31

  Plan X, 180–181

  Playpen website, 262

  Pogue, David, 158, 164

  Poindexter, John, 161

  Poitras, Laura, 220, 252, 257–258

  police surveillance

  eBay’s internal police, 180

  Google involvement in, 178

  Oakland’s Domain Awareness Center, 1–5

  predictive policing, 165–168

  using social media to monitor activists, 188

  political campaigns, 170–171

  political control

  Project ComCom and Pool’s vision, 66–67

  student protests against ARPANET, 64

  political science: importance of cybernetics, 45

  Politics, Personality, and Nation-Building (Pye), 65–66

  Pool, Ithiel de Sola, 64–67, 111

  Poor People’s March on Washington, 78

  Poulsen, Kevin, 206

  predictive models, 160–168, 189–190

  PredPol Inc., 165–168

  PRISM surveillance program, 192–196, 265

  privacy

  Google and Gmail tracking users, 157–163

  government funding for Tor, 213–215

  Jacob Appelbaum, 221–222

  Open Technology Fund, 256

  Snowden’s views on, 200

  32C3, 220

  Tor Project’s military connections, 223–228

  weaponization of, 222

  See also Tor/Tor Project

  privatization of the Internet, 116–124, 126–128, 135–137, 168–173

  PRNET (packet radio network), 94

  profiling individuals, 158–164, 213–214. See also data collection and mining

  Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145

  Project CAM. See Cambridge Project

  Project Camelot, 67–68, 160

  Project ComCom, 66

  Project Igloo White, 25–27

  propaganda

  CIA’s Cold War media funding, 232–233

  Ithiel de Sola Pool’s research, 65–66

  protests

  anti-Vietnam War protesters, 108

  Arab Spring, 247–251

  congressional hearings on domestic surveillance, 86

  early warning against leftist revolutions, 67

  exposé on domestic surveillance, 89–90

  spying on American protestors with ARPANET, 73–80

  student protests against the Vietnam War and the Cambridge Project, 69–71, 90, 108

  targeting the Stanford Research Institute, 105–106

  PSINET, 124–126

  psychological warfare, 20, 27–33, 65–66, 232–233

  punch card technology, 54–55

  Pye, Lucian, 65–66

  Pyle, Christopher, 35(quote), 76, 79, 84

  Quittner, Joshua, 136

  race

  CONUS Intel targeting civil rights activists, 76–78

  “dynamations,” 47–48

  early racial data tabulation, 55–56

  proposed counterinsurgency tactics against African Americans, 30–31

  radar systems: early warning against leftist revolutions, 67

  radiation exposure, 37

  Radio Free Asia, 232–234, 254–255, 258

  Radio Free Europe, 232–233

  Radio Liberation From Bolshevism (Radio liberty), 232–233

  Ramparts magazine, 29–30

  Rand, Ayn, 109, 128–129, 239–240

  RAND Corporation, 28–29, 32

  Redirect Method, 182

  regime change, 182, 251

  Regional Enforcement Information Network, 81

  revolution, technology, 101–106

  Rhode, Joy, 66–67

  Rich, Nathaniel, 245

  Roberts, Lawrence, 59–62

  robotics

  gerbil experiments in project SEEK, 130

  MIT cybernetics program, 42–43

  surveillance systems in Vietnam, 25

  See also cybernetics

  Rolling Stone magazine, 104–105, 244–245, 250

  Ross, Alec, 248–249

  Rossetto, Louis, 101–102, 128–129, 131–134, 137–138, 143, 203

  routing system protocol design, 93–97

  Rowan, Ford, 73–75, 87–90, 97

  Russia

  BBG’s anti-censorship activities and policies, 236–239

  Snowden’s escape to, 199, 207

  Tor’s Deployment Plan, 253

  See also Soviet Union

  Russian Deployment Plan, 236–239

  Russo, Anthony, 32–33

  SABRE (Semi-Automated Business-Related Environment), 82

  SafeWeb proxy, 235

  Sandberg, Sheryl, 153

  Sandvik, Runa, 206

  satellite technology, 15–18, 94

  SATNET, 94

  Schmidt, Eric, 173, 181JigSaw181

  Schrader, William, 123–124, 126

  Science Applications International Corporation (SAIC), 3–4

  Scott, Ridley, 115

  search engines, 102–103, 148–149, 151

  search logs, 153–158

  security

  crypto apps, 258–260

  political interests and weaponization of the Internet, 268–269

  Signal and other secure apps, 265–266

  Silk Road, 260–262

  See also Tor/Tor Project

  Semi-Automatic Ground Environment (SAGE), 41–42, 82

  September 11, 2001, 139–141

  Sequoia Capital, 151

  The Shadow Factory (Bamford), 238

  Shepard, Andrea, 216

  Shockley, William, 145

  Signal app, 210, 257–258, 265–266

  Sikorsky H-34 helicopter, 13–14

  Silk Road, 201–205, 260–262

  Simulmatics Corporation, 65–66

  slave labor, 272–274

  smartphones, CIA hacking tools targeting, 265–266

  Snow Crash (Stephenson), 174

  Snowden, Edward

  background and work experience, 196–199

  blow
ing the whistle on the NSA, 185–187

  global NSA spy implants in the Internet backbones, 191–192

  government involvement in supporting and cracking Tor, 264–265

  history of surveillance, 75

  Jacob Appelbaum and, 222

  NSA PRISM program, 193–196

  political interests and philosophy, 199–201, 269

  privacy movement, 259

  Signal and Tor endorsement, 258

  the Internet as evil entity, 207–208

  Tor Project connection to WikiLeaks, 205–211, 252–254

  soap operas, 16–17

  social media

  Anonymous movement and the author, 212

  Arab Spring protests, 247–251

  backing Internet Freedom policies, 234–236

  police use to monitor activists, 188–189

  predictive policing, 167

  sociology: importance of cybernetics, 45

  South Vietnam, 13–15

  Southeast Asia

  CIA propaganda projects, 232–233

  intelligence and data collection, 52–53

  See also Vietnam

  Soviet Union

  first nuclear test, 37–38

  Pool’s Project ComCom, 66

  Sputnik I launch, 15–18

  See also Cold War

  Space and Naval Warfare Systems Command, 247

  Space Race: Sputnik I launch, 15–18

  SpaceX, 180

  Sputnik I launch, 15–18, 41

  Stanford Artificial Intelligence Laboratory, 104–107

  Stanford Digital Libraries project, 146

  Stanford Research Institute

  Augmentation Research Center, 50–51, 112

  Brin and Page, 144–145, 147–149

  powering up ARPANET, 61–62

  Stewart Brand, 111–112

  student protests against ARPA, 69

  Stanton, Edwin, 187

  State Department, US

  Google’s involvement with, 182–183

  Tor Project funding, 238–239

  training global activists in social media use, 249–250

  State of the Onion, 220

  statistics: Hollerith’s tabulator machine, 54–56

  Steele, Shari, 220–221

  Stephenson, Neal, 174

  Strategic Hamlet initiative, 29

  student protest, 8, 62–64

  Students for a Democratic Society (SDS), 62–64, 70

  Summers, Larry, 153

  Sun Microsystems, 151

  surveillance technology

  growth of corporate and government databases, 82–83

  military operations in Vietnam, 25–26

  Snowden’s views on, 200

  Tor’s lack of protection against, 213–214

  Syria: Arab Spring, 248

  Syverson, Paul, 224–225

  tabulation machine, 54–55, 80, 272–273

  TCP/IP (Transmission Control Protocol/Internet Protocol), 95–96

  Technology, Entertainment, and Design Conference (TED), 131

  technology revolution, 101–106

  Technospies (Rowan), 90

  Telecommunications Act (1996), 127

  telecommunications technology

  cybernetics and, 43–46

  defense need for anonymous communication capability, 224–225

  early defense communication systems development, 35–37

  history of government spying, 187–188

  Internet Freedom policies and digital weapons, 234–236

  modeling the Soviet internal system, 66

  Signal app, 257–258

  Telecosm (Gilder), 102

  terrorist activities, 140–142, 161–162

  Tesla, Nikola, 144

  Thailand

  anthropomorphic survey on Thais, 53–54

  psychological warfare research programs, 29–30

  Thiel, Peter, 180

  “thinking centers,” 58–59

  32C3 (Chaos Computer Club), 219–222

  This Machine Kills Secrets (Greenberg), 245

  Thompson, Hunter S., 75–76

  Tor/Tor Project

  Appelbaum employment, 240–241

  as weapon against Internet censorship, 236–239

  attacks on the author, 212–213, 215–218

  Broadcasting Board backing, 228–230

  celebrating their anonymity and secrecy, 209–210

  cracking the network, 263

  cypherpunks, 203–204

  Dread Pirate Roberts and Silk Road, 201–205, 260–262

  Edward Snowden’s activities and, 206–211, 252–253

  enhancing US government power, 223–224

  government hacking and cracking, 263–264

  government support for, 213–215

  investigation of, 222–223

  Jacob Appelbaum and, 221–222

  lack of protection against surveillance, 213–214

  Open Technology Fund, 256–257

  origins and creators, 225–227

  Silicon Valley support, 212–213

  32C3, 220–221

  training Arab Spring protesters in social media use, 249–250

  training political activists around the world, 251–253

  US Intelligence benefiting from involvement with, 245–247

  WikiLeaks and, 242–245

  Total Information Awareness (TIA) project, 161–162

  tracking individuals, 158–160, 169–173

  Tunisia, 248

  Tunney, John, 90–93

  Uber, 171

  Ulbricht, Ross, 260–262

  unemployment: results of cybernetics research, 46

  United Kingdom, defoliant use and, 14–15

  University of California at Los Angeles (UCLA), 61–62, 95–97, 165

  University of California at Santa Barbara (UCSB): powering up ARPANET, 61–62

  University of Michigan, 69

  University of Utah: powering up ARPANET, 61–62

  Valentine, Douglas, 31

  Valley, George: early warning radar system automation, 38

  video games, computerized, 104–106, 148, 169, 174

  Viet Minh insurgency, 22

  Vietnam

  American military’s destruction of Asian culture, 32–33

  Americans’ declining morale and increasing drug use, 31–32

  CIA radio propaganda, 232–233

  CONUS Intel targeting protesters, 77–78

  Erskine’s reconnaissance, 19–20

  Godel’s high-tech counterinsurgency program, 24

  Project Agile, 13–15, 24–25

  psychological warfare research, 27–31

  Student anti-war protests, 69

  student protests targeting ARPANET, 62–64

  US clandestine reconnaissance, 19–20

  US counterinsurgency surveillance, 25–26

  Viet Minh insurgency, 22

  Wackenhut security, 79–80

  Waldrop, M. Mitchell, 51, 70

  Wallace, Mike, 233

  Washington Monthly, 76

  Washington Post, 192, 264–265

  weaponization of privacy, 222

  Weather Underground, 69

  web browsers, 102–103, 148–149

  Weddady, Nasser, 250

  WhatsApp, 258, 265–266

  Where Wizards Stay Up Late (Kafner and Lyon), 60

  White Trash (Isenberg), 73(quote)

  Whitney Museum, New York, 245

  Whole Earth Catalog, 109–110, 112–113, 116, 133, 183–184

  Whole Earth Review, 113–114

  Whole Earth Software Review, 113–114, 152

  Wiener, Norbert, 42–47, 108, 117

  WikiLeaks, 220, 242–247, 265–266

  Winograd, Terry, 146

  Winter, Alex, 209

  Wired magazine, 101–102, 128, 131–137, 143, 175, 203, 206

  wireless routing, 94–97

  Wojcicki, Anne, 151

  Wojcicki, Susan, 151
/>   Wolff, Stephen, 116–118, 123, 126, 273–274

  World Privacy Forum, 159

  World Trade Center, 139–140

  World War II

  cybernetics development, 42–44

  digital computer technology, 38–39

  Hollerith tabulation technology, 56

  Mauthausen Concentration Camp, 271–272

  Nazis’ use of tabulation technology, 56–57

  William Godel’s career, 19

  World Wide Web (WWW), 102–103

  Yarborough, William P., 76–77

  Yntema, Douwe, 70

  Young Adults Project, 78

  Zinn, Howard, 71

  Zuckerberg, Mark, 195

  PublicAffairs is a publishing house founded in 1997. It is a tribute to the standards, values, and flair of three persons who have served as mentors to countless reporters, writers, editors, and book people of all kinds, including me.

  I.F. STONE, proprietor of I. F. Stone’s Weekly, combined a commitment to the First Amendment with entrepreneurial zeal and reporting skill and became one of the great independent journalists in American history. At the age of eighty, Izzy published The Trial of Socrates, which was a national bestseller. He wrote the book after he taught himself ancient Greek.

  BENJAMIN C. BRADLEE was for nearly thirty years the charismatic editorial leader of The Washington Post. It was Ben who gave the Post the range and courage to pursue such historic issues as Watergate. He supported his reporters with a tenacity that made them fearless and it is no accident that so many became authors of influential, best-selling books.

  ROBERT L. BERNSTEIN, the chief executive of Random House for more than a quarter century, guided one of the nation’s premier publishing houses. Bob was personally responsible for many books of political dissent and argument that challenged tyranny around the globe. He is also the founder and longtime chair of Human Rights Watch, one of the most respected human rights organizations in the world.

  For fifty years, the banner of Public Affairs Press was carried by its owner Morris B. Schnapper, who published Gandhi, Nasser, Toynbee, Truman, and about 1,500 other authors. In 1983, Schnapper was described by The Washington Post as “a redoubtable gadfly.” His legacy will endure in the books to come.

  Peter Osnos, Founder

 

 

 


‹ Prev