by Yasha Levine
New Economy, 133–134, 143
Nixon, Richard, 16
North, Newton Dexter, 55–56
North Africa, 247–248
North Korea: Radio Free Asia, 255
North Vietnam: US counterinsurgency operations, 21
NSFNET, 118–119, 122–123, 125–127, 134, 168
nuclear weapons
ARPA testing, 18
cybernetics and, 45–46
early Cold War preparation for nuclear war, 231–232
Soviet’s first tests, 37–38
US surveillance on Soviet communications, 21–22
Oakland, California, 1–4
Obama, Barack, 193, 198
Octoputer, 64
Oman: Arab Spring, 248
Omidyar, Pierre, 169–170
onion router, 225, 227
open source code: Tor Project, 223
open source intelligence, 188–190
Open Technology Fund (OTF), 255–257, 259–260
Open Whisper Systems, 210, 257
Operation Argus, 18
Operation Iraqi Freedom, 175
Operation Omynous, 262
Operation Ranch Hand (1962), 15
origins of networking technology, 6–7
packet satellite networking, 94
Page, Larry, 5, 140, 143–155, 157, 159–160, 163–164, 173–174, 195–196
PageRank, 149
Paglen, Trevor, 210
Painter, Rob, 175–176
Pando magazine, 5, 210, 215, 217
Pandora, 169
parallel network. See Tor/Tor Project
PATHAR, 189
Patriot Act (2001), 141–142
PayPal, 180
pension system, tabulator use in, 56
The Pentagon’s Brain (Jacobsen), 20, 53
personal computers, 124–126
Petzinger, Thomas, Jr., 82
Phoenix Program, 31
Plan X, 180–181
Playpen website, 262
Pogue, David, 158, 164
Poindexter, John, 161
Poitras, Laura, 220, 252, 257–258
police surveillance
eBay’s internal police, 180
Google involvement in, 178
Oakland’s Domain Awareness Center, 1–5
predictive policing, 165–168
using social media to monitor activists, 188
political campaigns, 170–171
political control
Project ComCom and Pool’s vision, 66–67
student protests against ARPANET, 64
political science: importance of cybernetics, 45
Politics, Personality, and Nation-Building (Pye), 65–66
Pool, Ithiel de Sola, 64–67, 111
Poor People’s March on Washington, 78
Poulsen, Kevin, 206
predictive models, 160–168, 189–190
PredPol Inc., 165–168
PRISM surveillance program, 192–196, 265
privacy
Google and Gmail tracking users, 157–163
government funding for Tor, 213–215
Jacob Appelbaum, 221–222
Open Technology Fund, 256
Snowden’s views on, 200
32C3, 220
Tor Project’s military connections, 223–228
weaponization of, 222
See also Tor/Tor Project
privatization of the Internet, 116–124, 126–128, 135–137, 168–173
PRNET (packet radio network), 94
profiling individuals, 158–164, 213–214. See also data collection and mining
Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145
Project CAM. See Cambridge Project
Project Camelot, 67–68, 160
Project ComCom, 66
Project Igloo White, 25–27
propaganda
CIA’s Cold War media funding, 232–233
Ithiel de Sola Pool’s research, 65–66
protests
anti-Vietnam War protesters, 108
Arab Spring, 247–251
congressional hearings on domestic surveillance, 86
early warning against leftist revolutions, 67
exposé on domestic surveillance, 89–90
spying on American protestors with ARPANET, 73–80
student protests against the Vietnam War and the Cambridge Project, 69–71, 90, 108
targeting the Stanford Research Institute, 105–106
PSINET, 124–126
psychological warfare, 20, 27–33, 65–66, 232–233
punch card technology, 54–55
Pye, Lucian, 65–66
Pyle, Christopher, 35(quote), 76, 79, 84
Quittner, Joshua, 136
race
CONUS Intel targeting civil rights activists, 76–78
“dynamations,” 47–48
early racial data tabulation, 55–56
proposed counterinsurgency tactics against African Americans, 30–31
radar systems: early warning against leftist revolutions, 67
radiation exposure, 37
Radio Free Asia, 232–234, 254–255, 258
Radio Free Europe, 232–233
Radio Liberation From Bolshevism (Radio liberty), 232–233
Ramparts magazine, 29–30
Rand, Ayn, 109, 128–129, 239–240
RAND Corporation, 28–29, 32
Redirect Method, 182
regime change, 182, 251
Regional Enforcement Information Network, 81
revolution, technology, 101–106
Rhode, Joy, 66–67
Rich, Nathaniel, 245
Roberts, Lawrence, 59–62
robotics
gerbil experiments in project SEEK, 130
MIT cybernetics program, 42–43
surveillance systems in Vietnam, 25
See also cybernetics
Rolling Stone magazine, 104–105, 244–245, 250
Ross, Alec, 248–249
Rossetto, Louis, 101–102, 128–129, 131–134, 137–138, 143, 203
routing system protocol design, 93–97
Rowan, Ford, 73–75, 87–90, 97
Russia
BBG’s anti-censorship activities and policies, 236–239
Snowden’s escape to, 199, 207
Tor’s Deployment Plan, 253
See also Soviet Union
Russian Deployment Plan, 236–239
Russo, Anthony, 32–33
SABRE (Semi-Automated Business-Related Environment), 82
SafeWeb proxy, 235
Sandberg, Sheryl, 153
Sandvik, Runa, 206
satellite technology, 15–18, 94
SATNET, 94
Schmidt, Eric, 173, 181JigSaw181
Schrader, William, 123–124, 126
Science Applications International Corporation (SAIC), 3–4
Scott, Ridley, 115
search engines, 102–103, 148–149, 151
search logs, 153–158
security
crypto apps, 258–260
political interests and weaponization of the Internet, 268–269
Signal and other secure apps, 265–266
Silk Road, 260–262
See also Tor/Tor Project
Semi-Automatic Ground Environment (SAGE), 41–42, 82
September 11, 2001, 139–141
Sequoia Capital, 151
The Shadow Factory (Bamford), 238
Shepard, Andrea, 216
Shockley, William, 145
Signal app, 210, 257–258, 265–266
Sikorsky H-34 helicopter, 13–14
Silk Road, 201–205, 260–262
Simulmatics Corporation, 65–66
slave labor, 272–274
smartphones, CIA hacking tools targeting, 265–266
Snow Crash (Stephenson), 174
Snowden, Edward
background and work experience, 196–199
blow
ing the whistle on the NSA, 185–187
global NSA spy implants in the Internet backbones, 191–192
government involvement in supporting and cracking Tor, 264–265
history of surveillance, 75
Jacob Appelbaum and, 222
NSA PRISM program, 193–196
political interests and philosophy, 199–201, 269
privacy movement, 259
Signal and Tor endorsement, 258
the Internet as evil entity, 207–208
Tor Project connection to WikiLeaks, 205–211, 252–254
soap operas, 16–17
social media
Anonymous movement and the author, 212
Arab Spring protests, 247–251
backing Internet Freedom policies, 234–236
police use to monitor activists, 188–189
predictive policing, 167
sociology: importance of cybernetics, 45
South Vietnam, 13–15
Southeast Asia
CIA propaganda projects, 232–233
intelligence and data collection, 52–53
See also Vietnam
Soviet Union
first nuclear test, 37–38
Pool’s Project ComCom, 66
Sputnik I launch, 15–18
See also Cold War
Space and Naval Warfare Systems Command, 247
Space Race: Sputnik I launch, 15–18
SpaceX, 180
Sputnik I launch, 15–18, 41
Stanford Artificial Intelligence Laboratory, 104–107
Stanford Digital Libraries project, 146
Stanford Research Institute
Augmentation Research Center, 50–51, 112
Brin and Page, 144–145, 147–149
powering up ARPANET, 61–62
Stewart Brand, 111–112
student protests against ARPA, 69
Stanton, Edwin, 187
State Department, US
Google’s involvement with, 182–183
Tor Project funding, 238–239
training global activists in social media use, 249–250
State of the Onion, 220
statistics: Hollerith’s tabulator machine, 54–56
Steele, Shari, 220–221
Stephenson, Neal, 174
Strategic Hamlet initiative, 29
student protest, 8, 62–64
Students for a Democratic Society (SDS), 62–64, 70
Summers, Larry, 153
Sun Microsystems, 151
surveillance technology
growth of corporate and government databases, 82–83
military operations in Vietnam, 25–26
Snowden’s views on, 200
Tor’s lack of protection against, 213–214
Syria: Arab Spring, 248
Syverson, Paul, 224–225
tabulation machine, 54–55, 80, 272–273
TCP/IP (Transmission Control Protocol/Internet Protocol), 95–96
Technology, Entertainment, and Design Conference (TED), 131
technology revolution, 101–106
Technospies (Rowan), 90
Telecommunications Act (1996), 127
telecommunications technology
cybernetics and, 43–46
defense need for anonymous communication capability, 224–225
early defense communication systems development, 35–37
history of government spying, 187–188
Internet Freedom policies and digital weapons, 234–236
modeling the Soviet internal system, 66
Signal app, 257–258
Telecosm (Gilder), 102
terrorist activities, 140–142, 161–162
Tesla, Nikola, 144
Thailand
anthropomorphic survey on Thais, 53–54
psychological warfare research programs, 29–30
Thiel, Peter, 180
“thinking centers,” 58–59
32C3 (Chaos Computer Club), 219–222
This Machine Kills Secrets (Greenberg), 245
Thompson, Hunter S., 75–76
Tor/Tor Project
Appelbaum employment, 240–241
as weapon against Internet censorship, 236–239
attacks on the author, 212–213, 215–218
Broadcasting Board backing, 228–230
celebrating their anonymity and secrecy, 209–210
cracking the network, 263
cypherpunks, 203–204
Dread Pirate Roberts and Silk Road, 201–205, 260–262
Edward Snowden’s activities and, 206–211, 252–253
enhancing US government power, 223–224
government hacking and cracking, 263–264
government support for, 213–215
investigation of, 222–223
Jacob Appelbaum and, 221–222
lack of protection against surveillance, 213–214
Open Technology Fund, 256–257
origins and creators, 225–227
Silicon Valley support, 212–213
32C3, 220–221
training Arab Spring protesters in social media use, 249–250
training political activists around the world, 251–253
US Intelligence benefiting from involvement with, 245–247
WikiLeaks and, 242–245
Total Information Awareness (TIA) project, 161–162
tracking individuals, 158–160, 169–173
Tunisia, 248
Tunney, John, 90–93
Uber, 171
Ulbricht, Ross, 260–262
unemployment: results of cybernetics research, 46
United Kingdom, defoliant use and, 14–15
University of California at Los Angeles (UCLA), 61–62, 95–97, 165
University of California at Santa Barbara (UCSB): powering up ARPANET, 61–62
University of Michigan, 69
University of Utah: powering up ARPANET, 61–62
Valentine, Douglas, 31
Valley, George: early warning radar system automation, 38
video games, computerized, 104–106, 148, 169, 174
Viet Minh insurgency, 22
Vietnam
American military’s destruction of Asian culture, 32–33
Americans’ declining morale and increasing drug use, 31–32
CIA radio propaganda, 232–233
CONUS Intel targeting protesters, 77–78
Erskine’s reconnaissance, 19–20
Godel’s high-tech counterinsurgency program, 24
Project Agile, 13–15, 24–25
psychological warfare research, 27–31
Student anti-war protests, 69
student protests targeting ARPANET, 62–64
US clandestine reconnaissance, 19–20
US counterinsurgency surveillance, 25–26
Viet Minh insurgency, 22
Wackenhut security, 79–80
Waldrop, M. Mitchell, 51, 70
Wallace, Mike, 233
Washington Monthly, 76
Washington Post, 192, 264–265
weaponization of privacy, 222
Weather Underground, 69
web browsers, 102–103, 148–149
Weddady, Nasser, 250
WhatsApp, 258, 265–266
Where Wizards Stay Up Late (Kafner and Lyon), 60
White Trash (Isenberg), 73(quote)
Whitney Museum, New York, 245
Whole Earth Catalog, 109–110, 112–113, 116, 133, 183–184
Whole Earth Review, 113–114
Whole Earth Software Review, 113–114, 152
Wiener, Norbert, 42–47, 108, 117
WikiLeaks, 220, 242–247, 265–266
Winograd, Terry, 146
Winter, Alex, 209
Wired magazine, 101–102, 128, 131–137, 143, 175, 203, 206
wireless routing, 94–97
Wojcicki, Anne, 151
Wojcicki, Susan, 151
/> Wolff, Stephen, 116–118, 123, 126, 273–274
World Privacy Forum, 159
World Trade Center, 139–140
World War II
cybernetics development, 42–44
digital computer technology, 38–39
Hollerith tabulation technology, 56
Mauthausen Concentration Camp, 271–272
Nazis’ use of tabulation technology, 56–57
William Godel’s career, 19
World Wide Web (WWW), 102–103
Yarborough, William P., 76–77
Yntema, Douwe, 70
Young Adults Project, 78
Zinn, Howard, 71
Zuckerberg, Mark, 195
PublicAffairs is a publishing house founded in 1997. It is a tribute to the standards, values, and flair of three persons who have served as mentors to countless reporters, writers, editors, and book people of all kinds, including me.
I.F. STONE, proprietor of I. F. Stone’s Weekly, combined a commitment to the First Amendment with entrepreneurial zeal and reporting skill and became one of the great independent journalists in American history. At the age of eighty, Izzy published The Trial of Socrates, which was a national bestseller. He wrote the book after he taught himself ancient Greek.
BENJAMIN C. BRADLEE was for nearly thirty years the charismatic editorial leader of The Washington Post. It was Ben who gave the Post the range and courage to pursue such historic issues as Watergate. He supported his reporters with a tenacity that made them fearless and it is no accident that so many became authors of influential, best-selling books.
ROBERT L. BERNSTEIN, the chief executive of Random House for more than a quarter century, guided one of the nation’s premier publishing houses. Bob was personally responsible for many books of political dissent and argument that challenged tyranny around the globe. He is also the founder and longtime chair of Human Rights Watch, one of the most respected human rights organizations in the world.
For fifty years, the banner of Public Affairs Press was carried by its owner Morris B. Schnapper, who published Gandhi, Nasser, Toynbee, Truman, and about 1,500 other authors. In 1983, Schnapper was described by The Washington Post as “a redoubtable gadfly.” His legacy will endure in the books to come.
Peter Osnos, Founder