Julian Assange

100 results back to index

pages: 461 words: 125,845

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers by Andy Greenberg

Apple II, Ayatollah Khomeini, Berlin Wall, Bill Gates: Altair 8800, Burning Man, Chelsea Manning, computerized markets, crowdsourcing, cryptocurrency, domain-specific language, drone strike, en.wikipedia.org, fault tolerance, hive mind, Jacob Appelbaum, Julian Assange, Mahatma Gandhi, Mitch Kapor, MITM: man-in-the-middle, Mohammed Bouazizi, nuclear winter, offshore financial centre, pattern recognition, profit motive, Ralph Nader, Richard Stallman, Robert Hanssen: Double agent, Silicon Valley, Silicon Valley ideology, Skype, social graph, statistical model, stem cell, Steve Jobs, Steve Wozniak, Steven Levy, undersea cable, Vernor Vinge, We are Anonymous. We are Legion, We are the 99%, WikiLeaks, X Prize, Zimmermann PGP

temporary SIM cards and avoided all payment forms other than cash Ibid., p. 40. “a genius” Andrew Fowler. “WikiLeaks site in limbo without architect” abc.net.au, October 4, 2011. worked with CIA agents during her time at the consulting firm McKinsey Julian Assange. “Statement by Julian Assange on the reported destruction of WikiLeaks source material by Daniel Domscheit-Berg,” August 20, 2011. a real problem of methodology and, therefore, of credibility “OPEN LETTER TO WIKILEAKS FOUNDER JULIAN ASSANGE: ‘A BAD PRECEDENT FOR THE INTERNET’S FUTURE.’” Reporters Without Borders website, August 12, 2010. “We were very, very upset with [the Afghan War release,] and with the way he spoke about it afterwards” John Burns and Ravi Somaiya. “WikiLeaks Founder on the Run, Trailed By Notoriety.” The New York Times, October 23, 2010.

accept unencrypted documents by post and even scan in reams of paper submissions and convert them to text files E-mail from Julian Assange to WikiLeaks developer list, December 13, 2006, available at http://cryptome.org/wikileaks/wikileaks-leak.htm “Yes, the guy running the exit node can read the bytes that come in and out there” Bruce Schneier. “Lesson from Tor Hack: Anonymity and Privacy Aren’t the Same.” Wired.com, September 20, 2007. a member of the project who ran a Tor exit node had noticed Chinese hackers using the relay to hide their tracks Khatchadourian. “Somewhere between none and a handful of those documents were ever released on WikiLeaks” John Leyden. “Wikileaks denies Tor hacker eavesdropping gave site its start.” TheRegister.co.uk, June 2, 2010. “When they pull, so do we” E-mail from Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm thirty times the size of every text article stored on Wikipedia Wikipedia: Database download, available at http://en.wikipedia.org/wiki/Wikipedia:Database_download “let it flower into something new” Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm spreading free software like a hacker Johnny Appleseed Jacob Appelbaum.

They include Daniel Ellsberg’s memoir Secrets, Suelette Dreyfus and Julian Assange’s Underground, Steven Levy’s Crypto, Daniel Domscheit-Berg’s memoir Inside WikiLeaks, Robert Manne’s “The Cypherpunk Revolutionary: Julian Assange” in Australia’s The Monthly, Nathaniel Rich’s “The Most Dangerous Man In Cyberspace” in Rolling Stone, and Raffi Khatchadourian’s spectacular New Yorker article “No Secrets.” PROLOGUE: THE MEGALEAK trick companies’ employees into revealing their passwords over the phone Suelette Dreyfus and Julian Assange. Underground: Hacking, madness and obsession on the electronic frontier. First published by Mandarin, a part of Reed Books, Australia, 1997, available at http://suelette.home.xs4all.nl/underground/Underground.pdf speculation that WikiLeaks’ target would be Bank of America shaves off $3.5 billion from the company’s total value Dan Fitzpatrick.

pages: 212 words: 49,544

WikiLeaks and the Age of Transparency by Micah L. Sifry

1960s counterculture, Amazon Web Services, banking crisis, barriers to entry, Bernie Sanders, Buckminster Fuller, Chelsea Manning, citizen journalism, Climategate, crowdsourcing, Google Earth, Howard Rheingold, Internet Archive, Jacob Appelbaum, John Markoff, Julian Assange, Network effects, RAND corporation, school vouchers, Skype, social web, source of truth, Stewart Brand, web application, WikiLeaks

SIFRY Notes Chapter 1 1 David Leigh, “Guardian gagged from reporting Parliament,” The Guardian, October 12, 2009, www.guardian.co.uk/media/2009/oct/12/guardiangagged-from-reporting-parliament. 2 Guido Fawkes blog, “Guardian Gagged From Reporting Parliament,” October 12, 2009, http://order-order.com/2009/10/12/guardian-gaggedfrom-reporting-parliament. 3 Minton report secret injunction gagging The Guardian on Trafigura, September 11, 2009, http://mirror.wikileaks.info/wiki/Minton_report_ secret_injunction_gagging_The_Guardian_on_Trafigura,_11_Sep_2009. 4 See http://techpresident.com/blog-entry/wikileak-julian-assange-dontbe-martyr for the video of Assange’s remarks. 5 Noam Cohen and Brian Stelter, “Iraq Video Brings Notice to a Web Site,” The New York Times, April 6, 2010, www.nytimes.com/2010/04/07/ world/07wikileaks.html, and http://twitter.com/#!/wikileaks/status/753 0875613. 6 Kevin Charles Redmon, “WikiLeaks Proves Its Worth as a Backstop,” The Atlantic, April 6, 2010, www.theatlantic.com/politics/archive /2010/04/ wikileaks-provides-its-worth-as-a-backstop/38517. 7 “Exclusive – Julian Assange Extended Interview,” The Colbert Report, April 12, 2010, www.colbertnation.com/the-colbert-report-videos /260785/ april-12-2010/exclusive-julian-assange-extended-interview. 8 Raffi Khatchadourian, “No Secrets: Julian Assange’s Mission for Total Transparency,” The New Yorker, June 7, 2010, www.newyorker.com/ reporting/2010/06/07/100607fa_fact_khatchadourian. 9 Ibid. 10 @wikileaks, April 7, 2010, http://twitter.com/#!

Chapter 8 1 Philip Shenon, “Civil War at WikiLeaks,” The Daily Beast, September 3, 2010, www.thedailybeast.com/blogs-and-stories/2010-09-03/wikileaksorganizers-demand-julian-assange-step-aside. 2 Marina Jimenez, “Q&A: Birgitta Jonsdottir on WikiLeaks and Twitter,” The Globe and Mail, January 12, 2011, www.theglobeandmail.com/ news/opinions/qa-birgitta-jonsdottir-on-wikileaks-and-twitter/ article1866270. 3 Mark Hosenball, “Is WikiLeaks Too Full of Itself?” Newsweek, August 26, 2010, www.newsweek.com/blogs/declassified/2010/08/26/is-wikileakstoo-full-of-itself.print.html. 4 Kevin Poulsen and Kim Zetter, “Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt,” Wired.com, September 27, 2010, www. wired.com/threatlevel/2010/09/wikileaks-revolt. 5 Steven Aftergood, “Wikileaks Fails ‘Due Diligence’ Review,” Secrecy News, June 28, 2010, www.fas.org/blog/secrecy/2010/06/wikileaks_review.html. 6 Sarah Ellison, “The Man Who Spilled the Secrets,” Vanity Fair, February 2011, www.vanityfair.com/politics/features/2011/02/the-guardian-201102. 7 Alan Rusbridger, “WikiLeaks: The Guardian’s role in the biggest leak in the history of the world,” The Guardian, January 28, 2011, www.guardian. co.uk/media/2011/jan/28/wikileaks-julian-assange-alan-rusbridger and Marcel Rosenbach and Holger Stark, “An Inside Look at Difficult Negotiations with Julian Assange,” Spiegel Online, January 28, 2011, www.spiegel.de/international/world/0,1518,742163,00.html. 8 “Chinese cyber-dissidents launch WikiLeaks, a site for whistleblowers,” Agence France-Presse, January 11, 2007, www.theage.com.au/news/ Technology/Chinese-cyberdissidents-launch-WikiLeaks-a-site-forwhistl eblowers/2007/01/11/1168105082315.html. 9 Julian Assange, “State and Terrorist Conspiracies,” November 10, 2006, and “Conspiracy as Governance,” December 3, 2006. 10 http://twitter.com/#!

Newsweek, August 26, 2010, www.newsweek.com/blogs/declassified/2010/08/26/is-wikileakstoo-full-of-itself.print.html. 4 Kevin Poulsen and Kim Zetter, “Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt,” Wired.com, September 27, 2010, www. wired.com/threatlevel/2010/09/wikileaks-revolt. 5 Steven Aftergood, “Wikileaks Fails ‘Due Diligence’ Review,” Secrecy News, June 28, 2010, www.fas.org/blog/secrecy/2010/06/wikileaks_review.html. 6 Sarah Ellison, “The Man Who Spilled the Secrets,” Vanity Fair, February 2011, www.vanityfair.com/politics/features/2011/02/the-guardian-201102. 7 Alan Rusbridger, “WikiLeaks: The Guardian’s role in the biggest leak in the history of the world,” The Guardian, January 28, 2011, www.guardian. co.uk/media/2011/jan/28/wikileaks-julian-assange-alan-rusbridger and Marcel Rosenbach and Holger Stark, “An Inside Look at Difficult Negotiations with Julian Assange,” Spiegel Online, January 28, 2011, www.spiegel.de/international/world/0,1518,742163,00.html. 8 “Chinese cyber-dissidents launch WikiLeaks, a site for whistleblowers,” Agence France-Presse, January 11, 2007, www.theage.com.au/news/ Technology/Chinese-cyberdissidents-launch-WikiLeaks-a-site-forwhistl eblowers/2007/01/11/1168105082315.html. 9 Julian Assange, “State and Terrorist Conspiracies,” November 10, 2006, and “Conspiracy as Governance,” December 3, 2006. 10 http://twitter.com/#!

pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks by The "Guardian", David Leigh, Luke Harding

4chan, banking crisis, centre right, Chelsea Manning, citizen journalism, Climategate, cloud computing, credit crunch, crowdsourcing, Downton Abbey, drone strike, eurozone crisis, friendly fire, global village, Hacker Ethic, impulse control, Jacob Appelbaum, Julian Assange, knowledge economy, Mohammed Bouazizi, Nelson Mandela, offshore financial centre, post-work, rolodex, Silicon Valley, Skype, Steven Levy, uranium enrichment, WikiLeaks

First published in Great Britain in 2011 by Guardian Books Kings Place 90 York Way London N1 9GU www.guardianbooks.co.uk A CIP catalogue for this book is available from the British Library ISBN: 978-0-85265-239-8 CONTENTS Cast of characters Introduction Chapter 1: The Hunt Chapter 2: Bradley Manning Chapter 3: Julian Assange Chapter 4: The rise of WikiLeaks Chapter 5: The Apache video Chapter 6: The Lamo dialogues Chapter 7: The deal Chapter 8: In the bunker Chapter 9: The Afghanistan war logs Chapter 10: The Iraq war logs Chapter 11: The cables Chapter 12: The world’s most famous man Chapter 13: Uneasy partners Chapter 14: Before the deluge Chapter 15: Publication day Chapter 16: The biggest leak in history Chapter 17: The ballad of Wandsworth jail Chapter 18: The future of WikiLeaks Appendix: US Embassy Cables Acknowledgements CAST OF CHARACTERS WikiLeaks MELBOURNE, NAIROBI, REYKJAVIK, BERLIN, LONDON, NORFOLK, STOCKHOLM Julian AssangeWikiLeaks founder/editor Sarah Harrison – aide to WikiLeaks founder Julian Assange Kristinn Hrafnsson – Icelandic journalist and WikiLeaks supporter James Ball – WikiLeaks data expert Vaughan Smith – former Grenadier Guards captain, founder of the Frontline Club and Assange’s host at Ellingham Hall Jacob Appelbaum – WikiLeaks’ representative in the US Daniel Ellsberg – Vietnam war whistleblower, WikiLeaks supporter Daniel Domscheit-Berg – German programmer and WikiLeaks technical architect (aka Daniel Schmitt) Mikael Viborg – owner of WikiLeaks’ Swedish internet service provider PRQ Ben Laurie – British encryption expert, adviser to Assange on encryption Mwalimu Mati – head of anti-corruption group Mars Group Kenya, source of first major WikiLeaks report Rudolf Elmer – former head of the Cayman Islands branch of the Julius Baer bank, source of second major WikiLeaks report Smári McCarthy – Iceland-based WikiLeaks enthusiast, programmer, Modern Media Initiative (MMI) campaigner Birgitta Jónsdóttir – Icelandic MP and WikiLeaks supporter Rop Gonggrijp – Dutch hacker-businessman, friend of Assange and MMI campaigner Herbert Snorrason – Icelandic MMI campaigner Israel Shamir – WikiLeaks associate Donald Böstrom – Swedish journalist and WikiLeaks’ Stockholm connection The Guardian LONDON Alan Rusbridger – editor-in-chief Nick Davies – investigative reporter David Leigh – investigations editor Ian Katz – deputy editor (news) Ian Traynor – Europe correspondent Harold Frayman – systems editor Declan Walsh – Pakistan/Afghanistan correspondent Alastair Dant – data visualiser Simon Rogers – data editor Jonathan Steele – former Iraq correspondent James Meek – former Iraq correspondent Rob Evans – investigative journalist Luke Harding – Moscow correspondent Robert Booth – reporter Stuart Millar – news editor, guardian.co.uk Janine Gibson – editor, guardian.co.uk Jonathan Casson – head of production Gill Phillips – in-house head of legal Jan Thompson – managing editor New York Times NEW YORK, LONDON Max Frankel – former executive editor Bill Keller – editor Eric Schmitt – war correspondent John F Burns – London correspondent Ian Fisher – deputy foreign editor Der Spiegel HAMBURG, LONDON Georg Mascolo – editor-in-chief Holger Stark – head of German desk Marcel Rosenbach – journalist John Goetz – journalist El País MADRID, LONDON Javier Moreno – editor-in-chief Vicente Jiménez – deputy editor Other Media Raffi Khatchadourian – New Yorker staffer and author of a major profile of Assange Saeed Chmagh and Namir Noor-Eldeen – Reuters news agency employees accidentally killed by US army pilots in 2007 David Schlesinger – Reuters’ editor-in-chief Kevin Poulsen – former hacker, senior editor at Wired Gavin MacFadyen – City University professor and journalist, London host to Assange Stephen Grey – freelance reporter Iain Overton – former TV journalist, head of Bureau of Investigative Journalism Heather Brooke – London-based American journalist and freedom of information activist Bradley Manning Bradley Manning – 23-year-old US army private and alleged WikiLeaks source Rick McCombs – former principal at Crescent high school, Crescent, Oklahoma Brian, Susan, Casey Manning – parents and sister Tom Dyer – school friend Kord Campbell – former manager at Zoto software company Jeff Paterson – steering committee member of the Bradley Manning support network Adrian Lamo – hacker and online confidant Timothy Webster – former US army counter-intelligence special agent Tyler Watkins – former boyfriend David House – former hacker and supporter David Coombs – lawyer Julian Assange Christine Hawkins – mother John Shipton – father Brett Assange – stepfather Keith Hamilton – former partner of Christine Daniel Assange – Julian’s son Paul Galbally – Assange’s lawyer during his 1996 hacking trial Stockholm allegations / extradition “Sonja Braun” – plaintiff; member of Brotherhood movement “Katrin Weiss” – plaintiff; museum worker Claes Borgström – lawyer for both women, former Swedish equal opportunities ombudsman and prominent Social Democrat politician Marianne Ny – Swedish chief prosecutor and sex crimes specialist Mark Stephens – Assange lawyer Geoffrey Robertson, QC – Assange lawyer Jennifer Robinson – lawyer in Mark Stephens’ office Gemma Lindfield – lawyer acting for the Swedish authorities Howard Riddle – district judge, Westminster magistrates court Mr Justice Ouseley – high court judge, London Government Hillary Clinton – US Secretary of State Louis B Susman – US ambassador in London PJ Crowley – US assistant secretary of state for public affairs Harold Koh – US state department’s legal adviser Robert Gates – US defence secretary Sir Sherard Cowper-Coles – former UK government special representative to Afghanistan and former ambassador to Kabul INTRODUCTION Alan Rusbridger Back in the days when almost no one had heard about WikiLeaks, regular emails started arriving in my inbox from someone called Julian Assange.

What happened in Stockholm may have been complex and equivocal, but some questionable sexual encounters had certainly occurred, and there was no evidence to support the claims of dirty tricks and honeytraps. The journalists were acutely aware that to ignore the fresh controversy that had erupted around their new collaborator could only increase the risk that it might taint the WikiLeaks enterprise as a whole. CHAPTER 13 Uneasy partners Editor’s office, the Guardian, Kings Place, London 1 November 2010 “I’m a combative person” JULIAN ASSANGE, TED CONFERENCE, OXFORD, 2010 The three partner papers decided it was time for a meeting with Julian Assange. Everything was threatening to get rather messy. The embattled WikiLeaks founder now wanted the Americans frozen out of the much-delayed deal to publish the diplomatic cables jointly – a punishment, so it was said, for a recent profile of him, by the New York Times veteran London correspondent John F Burns.

If a CIA agent or some other observer were hidden in the woodland along with the pheasants, they could have been forgiven for a moment of puzzlement. Close up, however, it was obvious that this strange figure was Julian Assange, his platinum hair concealed by a wig. At more than 6ft tall, he was never going to be a very convincing female. “You can’t imagine how ridiculous it was,” WikiLeaks’ James Ball later said. “He’d stayed dressed up as an old woman for more than two hours.” Assange was swapping genders in a pantomime attempt to evade possible pursuers. With him were also his young aide, Sarah Harrison, and his deputy, the Icelandic journalist Kristinn Hrafnsson. On that evening, this small team was the nucleus of WikiLeaks, the whistleblower website Assange had launched four years earlier. In a breathtakingly short time, WikiLeaks had soared out of its previous niche as an obscure radical website to become a widely known online news platform.

pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia by Becky Hogge, Damien Morris, Christopher Scally

A Declaration of the Independence of Cyberspace, back-to-the-land, Berlin Wall, Buckminster Fuller, Chelsea Manning, citizen journalism, cloud computing, corporate social responsibility, disintermediation, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, Fall of the Berlin Wall, game design, Hacker Ethic, informal economy, information asymmetry, Jacob Appelbaum, jimmy wales, John Markoff, Julian Assange, Kevin Kelly, mass immigration, Menlo Park, Mitch Kapor, MITM: man-in-the-middle, moral panic, Mother of all demos, Naomi Klein, Nelson Mandela, Network effects, New Journalism, Norbert Wiener, peer-to-peer, Richard Stallman, Silicon Valley, Skype, Socratic dialogue, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technoutopianism, Telecommunications Act of 1996, The Hackers Conference, Vannevar Bush, Whole Earth Catalog, Whole Earth Review, WikiLeaks

It hasn’t got anything to do with GSM, or mobile phones, and it won’t make headlines for a little while yet. But when it does, it will make them all over the world. Julian Assange and Daniel Schmitt take to the stage. They’re here as spokespeople for WikiLeaks, the whistle-blowing website that has published over one million leaked documents since its founding in 2007. In that short time, WikiLeaks has been behind more scoops than the Washington Post has notched up in 30 years. In the UK in 2009, it was at the centre of two major news stories. The first was about the use of libel law to gag reporting about a company who had dumped toxic waste illegally off the coast of Cote d’Ivoire leaving thousands of locals sick and at least a dozen dead. The scandal led to serious initiatives to reform libel laws in the UK. The second, when WikiLeaks published over 1,000 emails sent over a period of ten years between scientists at the Climatic Research Institute in Norwich, UK, pretty much derailed international talks on climate change the following month in Copenhagen.

* * * “Ask yourself, why aren’t there more journalists in the West being killed?” Julian Assange is a pale man, white skin, white hair. Etiolated, pale like a plant that’s been kept in an airing cupboard. His gentle Australian accent that sings up and down just adds to this impression of pallor, and he has the soft, untouched hands and well-manicured, but slightly too-long (for a boy) fingernails I associate with acid dealers, accountants and hackers. It turns out that, as I suspected, he’s the latter. In 1992, aged 24, Julian was convicted of more than 20 counts of computer crimes in an Australian court. In 1999 he registered the domain leaks.org, but it has only been recently that the idea of WikiLeaks has really taken off, thanks to what he terms, “a particular intersection of economic forces and understanding”. Julian Assange talks this way quite a lot.

Very quickly, the story of the Afghan War Logs became the story of Julian Assange. The same American TV channels brought out the same military talking heads, most of whom told the news anchors that the material released by WikiLeaks was “nothing new”. And of course to anyone, like them, with security clearance – the Washington Post recently reported that a whopping 854,000 people hold top secret clearance in the US – it was nothing new. But to the people who didn’t have such clearance, very often the ones sending their sons and daughters to war in Afghanistan, the picture painted by the Afghan War Logs may well not have matched their ideas about the conflict. Just a day or so after the release of the Afghan War Logs, the US State Department accused WikiLeaks of publishing the names of key Afghan informants in a few of the 75,000 reports on their website, exposing them to reprisals from the Taliban.

pages: 478 words: 149,810

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

4chan, Asperger Syndrome, bitcoin, call centre, Chelsea Manning, corporate governance, crowdsourcing, Firefox, hive mind, Julian Assange, Minecraft, MITM: man-in-the-middle, Occupy movement, peer-to-peer, pirate software, side project, Skype, speech recognition, Stephen Hawking, Stuxnet, We are Anonymous. We are Legion, We are the 99%, web application, WikiLeaks, zero day

Every week or so, she would meet on IRC with q and pass over the collected info via encrypted e-mail, then await further instructions. If she asked what Julian Assange thought of what she was doing, q would say he approved of what was going on. It turned out that q was good at lying. Almost a year after Kayla started volunteering for WikiLeaks, other hackers who had been working with q found out he was a rogue operator who had recruited them without Assange’s knowledge. In late 2011, Assange asked q to leave the organization. Kayla was not the only volunteer looking for information for what she thought was WikiLeaks. The rogue operator had also gotten other hackers to work with him on false pretenses. And in addition, one source claims, q stole $60,000 from the WikiLeaks t-shirt shop and transferred the money into his personal account. WikiLeaks never found out what q was doing with the vulnerabilities that Kayla and other hackers found, though it is possible he sold them to others in the criminal underworld.

He had no idea that, even though the anticopyright battle was dying, Operation Payback was about to explode with support for a little organization called WikiLeaks. Jake, now as Topiary, explored the AnonOps chat rooms while a former, widely-revered hacker from Australia named Julian Assange was getting ready to drop a bombshell on the American government. Earlier in 2010, a U.S. army private named Bradley Manning had allegedly reached out to Assange and given his whistleblower site, WikiLeaks, 250,000 internal messages, known as cables, that had been sent between American embassies. These diplomatic cables revealed American political maneuverings and confidential diplomatic reports. In exposing the documents, Assange would hugely embarrass American foreign policy makers. The WikiLeaks founder had struck deals with five major newspapers, including the New York Times and the U.K.’s Guardian, and on November 28, 2010, they started publishing the cables.

Topiary was immediately skeptical and believed the contact was trolling him. When he finally spoke to a WikiLeaks staff member known as q, who was in the channel under the nickname Dancing_Balls, he asked for someone to post something from the WikiLeaks Twitter account. Assange, who allegedly had sole access, did so, putting out something about eBay, then deleting the post. Topiary did the same from the LulzSec Twitter feed. But he needed more proof, since the WikiLeaks feed could have been hacked. q said he could do that. Within five minutes, he pasted a link to YouTube into the IRC chat, and he said to look at it quickly. Topiary opened it and saw video footage of a laptop screen and the same IRC chat they were having, with the text moving up in real time. The camera then panned up to show a snowy-haired Julian Assange sitting directly opposite and staring into a white laptop, chin resting thoughtfully in his hand.

pages: 159 words: 42,401

Snowden's Box: Trust in the Age of Surveillance by Jessica Bruder, Dale Maharidge

anti-communist, Bay Area Rapid Transit, Berlin Wall, blockchain, Broken windows theory, Burning Man, cashless society, Chelsea Manning, citizen journalism, computer vision, crowdsourcing, Donald Trump, Edward Snowden, Elon Musk, Ferguson, Missouri, Filter Bubble, Firefox, Internet of things, Jeff Bezos, Julian Assange, license plate recognition, Mark Zuckerberg, mass incarceration, medical malpractice, Occupy movement, off grid, pattern recognition, Peter Thiel, Robert Bork, Shoshana Zuboff, Silicon Valley, Skype, social graph, Steven Levy, Tim Cook: Apple, web of trust, WikiLeaks

p. 129 Rumors spread that the company was buying Passionflix: Sarah Jones, “Tensions Rise at First Look Media as Company Shifts Strategy,” New York Magazine, July 17, 2019, nymag. com. p. 129 “barometer of naughtiness”: Passionflix, Passionflix.com/bon. p. 129 Passionflix acquisition finalized: “First Look Media, Passionflix Strike Streaming Partnership,” MSNBC, Sept. 12, 2019, YouTube. p. 129 Julian Assange eighteen-count indictment: “WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment,” US Department of Justice, May 23, 2019, justice. gov. p. 130 Jabber singled out in Assange indictment: Glenn Greenwald and Micah Lee, “The US Government’s Indictment of Julian Assange Poses Grave Threats to Press Freedom,” Intercept, April 11, 2019. p. 130 Micah Lee comments on Assange indictment: twitter. com/micahflee/status/1116340396643082240?lang=en. p. 130 Snowden comments on Assange indictment: twitter. com/snowden/status/1131657973745496066?

Above all, we hope that this story will help empower others — anyone who cares about an open society — to speak and act during a precarious moment in American history. Meanwhile, the presidency of Donald Trump has brought new threats to democracy and transparency in government. Chelsea Manning, whose role in leaking US diplomatic cables made her an inspirational figure to Snowden, has been thrown back in jail, despite having received a pardon by President Barack Obama. WikiLeaks founder Julian Assange has been charged under the Espionage Act and now faces up to 175 years in jail. Meanwhile, Trump is pushing to restore the NSA’s access to Americans’ phone and text records, a practice that was exposed — and then derailed — by the Snowden revelations. As we write this, a new whistleblower has emerged from the intelligence community to reveal a startling abuse of presidential power: Trump pressuring Ukrainian president Volodymyr Zelensky to investigate the son of Democratic presidential candidate Joe Biden.

The experience was maddening. On some occasions agents detained her at the airport for more than three hours. Sometimes they temporarily confiscated and photocopied her notebooks. Once, they took away her computer. On April 6, 2012, after we had known each other for about four months, Laura was grilled at Newark Liberty International Airport. She was coming home from London, where she’d been filming WikiLeaks founder Julian Assange and his team for a documentary later titled Risk. As always, following her lawyer’s instructions, she took notes. This time, a federal agent declared her pen was a potential weapon. He threatened to handcuff her if she kept using it. When she offered to write with crayons instead, he said no. When I heard about what happened, I was on a reporting trip in the Rust Belt, en route home from the Monongahela Valley.

pages: 324 words: 96,491

Messing With the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News by Clint Watts

4chan, active measures, Affordable Care Act / Obamacare, barriers to entry, Berlin Wall, Bernie Sanders, Chelsea Manning, Climatic Research Unit, crowdsourcing, Daniel Kahneman / Amos Tversky, Donald Trump, drone strike, Edward Snowden, en.wikipedia.org, Erik Brynjolfsson, failed state, Fall of the Berlin Wall, Filter Bubble, global pandemic, Google Earth, illegal immigration, Internet of things, Julian Assange, loss aversion, Mark Zuckerberg, Mikhail Gorbachev, mobile money, mutually assured destruction, obamacare, Occupy movement, offshore financial centre, pre–internet, side project, Silicon Valley, Snapchat, The Wisdom of Crowds, Turing test, University of East Anglia, Valery Gerasimov, WikiLeaks, zero day

But Sheikh Aweys, years before his Shabaab escapades, surprisingly became the first victim of Julian Assange’s creation, WikiLeaks. WikiLeaks began its campaign for international transparency on December 28, 2006, posting a full English translation of a document allegedly written by Sheikh Aweys on November 9, 2005. The message made less news than the messenger. Julian Assange began his climb to international fame and today, more than a decade later, remains a disruptive force of information warfare. WikiLeaks thought “the crowd,” an open-source army of contributors scattered around the world, would investigate the contents of the alleged Aweys letter and determine collectively whether the document was true to its alleged source. That never actually happened, though. Even today, the contents of the document are shrouded in mystery. Assange’s journey to WikiLeaks began where many transparency activists start: hacking.

The leak, referred to internationally as the Panama Papers, dwarfed any previous disclosure by WikiLeaks. The data dump differed from WikiLeaks not only in size but in approach. Rather than post the raw data without context or with Julian Assange’s narrative, ICIJ shared the data with dozens of news outlets around the world familiar with the characters appearing in the documents and how the contents made sense in each country. In just the first eight months after their release, the Panama Papers generated more than 4,000 stories from media outlets and more than 6,500 investigations into companies and people potentially seeking to skirt laws and avoid taxes.30 Not only did the Panama Papers achieve far more transparency than WikiLeaks, but they exposed an authoritarian regime that WikiLeaks initially set out to challenge but mysteriously never touched: Russia.

,” The Christian Science Monitor (October 26, 2010). https://www.csmonitor.com/World/Europe/2010/1026/WikiLeaks-ready-to-drop-a-bombshell-on-Russia.-But-will-Russians-get-to-read-about-it. 7. Simon Shuster, “Wikileaks. Is Russia the Next Target?,” Time (November 1, 2010). http://content.time.com/time/world/article/0,8599,2028283,00.html. 8. James Ball, “Why I Felt I Had to Turn my Back on Wikileaks,” The Guardian (September 2, 2011). https://www.theguardian.com/media/2011/sep/02/why-i-had-to-leave-wikileaks. 9. Kapil Komireddi, “Julian Assange and Europe’s Last Dictator, Alexander Lukashenko,” New Statesman (March 1, 2012). https://www.newstates man.com/blogs/the-staggers/2012/03/belarus-assange-lukashenko. 10. “U.S.–Led Attack on Afghanistan Begins,” History.com (2010). http://www.history.com/this-day-in-history/u-s-led-attack-on-afghanistan-begins. 11.

pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, Apple's 1984 Super Bowl advert, bitcoin, borderless world, British Empire, call centre, Chelsea Manning, cloud computing, collaborative editing, colonial rule, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, digital map, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, drone strike, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, fault tolerance, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Markoff, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, life extension, Lyft, Mark Zuckerberg, market bubble, Menlo Park, Mitch Kapor, natural language processing, Network effects, new economy, Norbert Wiener, packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, Plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, uber lyft, Whole Earth Catalog, Whole Earth Review, WikiLeaks

Andrew Lewman, email message sent to Kelly DeYoe and Roger Dingledine, “EPIC, BBC, Tor, and FOIA,” September 10, 2013, https://surveillancevalley.com/content /citations/email-from-andrew-lewman-to-kelly-deyoe-and-roger-dingledine-epic-bbc-tor-and-foia-10-september-2013.pdf. 78. WikiLeaks, email message sent to John Young, “Martha Stewart pgp,” Cryptome, January 7, 2007, https://cryptome.org/wikileaks/wikileaks-leak2.htm. 79. Mona Mahmood, Maggie O’Kane, Chavala Madlena, and Teresa Smith, “Revealed: Pentagon’s Link to Iraqi Torture Centres,” Guardian, March 6, 2013. 80. Scott Shane and Andrew W. Lehren, “Leaked Cables Offer Raw Look at U.S. Diplomacy,” New York Times, November 28, 2010. 81. “Affidavit of Julian Paul Assange,” WikiLeaks, September 2, 2013, https://wikileaks.org/IMG/html/Affidavit_of_Julian_Assange.html. 82. “In late 2010, when Assange seemed to be on the brink of long-term jail awaiting questioning for alleged sex crimes, one WikiLeaks staffer told me he hoped Appelbaum might even be the favored successor to Assange in WikiLeaks’ hierarchy.”

.…”77 Appelbaum was energetic and did his best to promote Tor among privacy activists, cryptographers, and, most important of all, the radical cypherpunk movement that dreamed of using encryption to take on the power of governments and liberate the world from centralized control. In 2010, he snagged the support of Julian Assange, a silver-haired hacker who wanted to free the world of secrets. Tor Gets Radical Jacob Appelbaum and Julian Assange had met in Berlin sometime in 2005, just as the mysterious Australian hacker was getting ready to set WikiLeaks in motion. Assange’s idea for WikiLeaks was simple: government tyranny can only survive in an ecosystem of secrecy. Take away the ability of the powerful to keep secrets, and the whole facade will come crashing down around them. “We are going to fuck them all,” wrote Assange giddily on a secret listserv, after announcing his goal of raising $5 million for the WikiLeaks effort. “We’re going to crack the world open and let it flower into something new. If fleecing the CIA will assist us, then fleece we will.”78 Appelbaum watched as Assange slowly erected WikiLeaks from nothing, building up a dedicated following by trawling hacker conferences for would-be leakers.

“If the users or developers he meets worry that Tor’s government funding compromises its ideals, there’s no one better than Appelbaum to show the group doesn’t take orders from the feds,” wrote journalist Andy Greenberg in This Machine Kills Secrets, a book about WikiLeaks. “Appelbaum’s best evidence of Tor’s purity from Big Brother’s interference, perhaps, is his very public association with WikiLeaks, the American government’s least favorite website.” With Julian Assange endorsing Tor, reporters assumed that the US government saw the anonymity nonprofit as a threat. But internal documents obtained through FOIA from the Broadcasting Board of Governors, as well as an analysis of Tor’s government contracts, paint a different picture. They reveal that Appelbaum and Dingledine worked with Assange on securing WikiLeaks with Tor since late 2008 and that they kept their handlers at the BBG informed about their relationship and even provided information about the inner workings of WikiLeaks’s secure submissions system. “Talked to the WikiLeaks people (Daniel and Julian) about their use of Tor hidden services, and how we can make things better for them,” Dingledine wrote in a progress report he sent to the BBG in January 2008.

pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man by Luke Harding

affirmative action, airport security, Anton Chekhov, Apple's 1984 Super Bowl advert, Berlin Wall, Chelsea Manning, don't be evil, drone strike, Edward Snowden, Etonian, Firefox, Google Earth, Jacob Appelbaum, job-hopping, Julian Assange, Khan Academy, kremlinology, Mark Zuckerberg, Maui Hawaii, MITM: man-in-the-middle, national security letter, Panopticon Jeremy Bentham, pre–internet, Ralph Waldo Emerson, rolodex, Rubik’s Cube, Silicon Valley, Skype, social graph, Steve Jobs, undersea cable, web application, WikiLeaks

One was Henry Dunckley, a 19th-century Baptist social critic who used the nom de plume in the Manchester Examiner. The other was Clement Walker, a 17th-century Somerset parliamentarian during the English civil war who was eventually locked up and died in the Tower of London. Significantly, verax is also an antonym of mendax. Mendax means ‘deceiving’ and was the handle used by Julian Assange of WikiLeaks when he was a young Australian hacker. WikiLeaks, with their electronic mass-leaking of US army files from Afghanistan, and of State Department diplomatic cables from all over the world, had recently plunged the US administration into uproar. Perhaps Snowden’s allusion was deliberate. Outwardly, his life continued as before. Read with hindsight, his girlfriend’s blog entries seem poignant. On 1 March, Mills writes that she will be an ‘international woman of mystery’ and that her Friday show later the same evening has a ‘007’ theme.

He has reported from Delhi, Berlin and Moscow and covered wars in Afghanistan, Iraq, Libya and Syria. Between 2007 and 2011 he was the Guardian’s Moscow bureau chief; the Kremlin expelled him from the country in the first case of its kind since the cold war. He is the author of three previous non-fiction books. They are The Liar: The Fall of Jonathan Aitken, nominated for the Orwell Prize; and WikiLeaks: Inside Julian Assange’s War on Secrecy, both written with David Leigh. Mafia State: How One Reporter Became an Enemy of the Brutal New Russia appeared in 2011. His books have been translated into 13 languages. Luke lives in Hertfordshire with his wife, the freelance journalist Phoebe Taplin, and their two children. FIRST VINTAGE BOOKS EDITION, FEBRUARY 2014 Copyright © 2014 by The Guardian All rights reserved.

SENATOR FRANK CHURCH The origins of the dragnet surveillance of the world’s internet users can be clearly pinpointed. It started on 9/11, the day of the terrorist atrocities that so frightened and enraged the US. Over the ensuing decade, both in America and Britain, there came a new political willingness to invade individual privacy. At the same time, mushrooming technical developments started to make mass eavesdropping much more feasible. The intricate web of the internet secretly became what Julian Assange of WikiLeaks was to call, with only some exaggeration, ‘the greatest spying machine the world has ever seen’. But before the appearance of Edward Snowden, very little of the truth about that had reached the surface. The NSA – the biggest and most secretive of the US intelligence agencies – failed on 9/11 to give advance warning of al-Qaida’s surprise attack against the Twin Towers in New York. Michael Hayden, an obscure air force general, was running the agency at the time.

pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous by Gabriella Coleman

1960s counterculture, 4chan, Amazon Web Services, Bay Area Rapid Transit, bitcoin, Chelsea Manning, citizen journalism, cloud computing, collective bargaining, corporate governance, creative destruction, crowdsourcing, David Graeber, Debian, do-ocracy, East Village, Edward Snowden, feminist movement, George Santayana, hive mind, impulse control, Jacob Appelbaum, jimmy wales, Julian Assange, low cost airline, mandatory minimum, Mohammed Bouazizi, Network effects, Occupy movement, pirate software, Richard Stallman, SETI@home, side project, Silicon Valley, Skype, Steven Levy, WikiLeaks, zero day

As the editors noted at the time, “The Guardian is also forbidden from telling its readers why the paper is prevented—for the first time in memory—from reporting parliament. Legal obstacles, which cannot be identified, involve proceedings, which cannot be mentioned, on behalf of a client who must remain secret.”1 And so, by April 2010, WikiLeaks had dramatically switched public relations strategies. When they released video footage of a Baghdad air strike, which they called “Collateral Murder,” WikiLeaks left nothing to chance—packaging the already shocking material in a way that delivered an extra punch. They edited the video for maximum effect and added simple but powerful editorial commentary at the beginning. Julian Assange, the Australian hacker who founded WikiLeaks, was then known in the media as an “international man of mystery.” Now he broke with his previous disavowal of the spotlight. To coincide with the publication of the video, he hosted a press conference in Washington, DC, and followed it with a high-profile media tour.

But now, as the revelations kept coming, members of the public discovered their jaws dropping lower and lower by the day, as if they were strapped into some orthodontic-transparency device, hand-cranked by Julian Assange himself. Sarah Palin suggested Assange be hunted down “with the same urgency we pursue al-Qaeda and Taliban leaders.”3 Senator Joe Lieberman declared it “an outrageous, reckless, and despicable action that will undermine the ability of our government and our partners to keep our people safe and to work together to defend our vital interests.”4 Lieberman’s staff reached out to Amazon—not only the world’s largest book retailer but also its largest web host—and asked it to ban WikiLeaks from its servers. It acquiesced. The financial firms that process credit card transactions worldwide followed suit, cutting the umbilical cord between donors and WikiLeaks. Although WikiLeaks was not listed on the foreign intelligence watch list—nor had it been found guilty of anything by any court of law—these companies, without any legal obligation to do what the government asked of them, went ahead anyways.

Sean-Paul Correll, “ ‘Tis the Season of DDoS – WikiLeaks Edition,” PandaLabs Blog, last accessed June 3, 2014, available at http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio. 11. Sean-Paul Correll, “Operation:Payback Broadens to ‘Operation Avenge Assange,’ ” PandaLabs Blog, last accessed June 3, 2014, available at http://pandalabs.pandasecurity.com/operationpayback- broadens-to-operation-avenge-assange. 12. Nick Davies, “10 Days in Sweden: The Full Allegations Against Julian Assange,” theguardian.com, Dec. 17, 2010. 13. Michel De Certeau, The Practice of Everyday Life, trans. Steven Rendall (Berkeley: University of California Press, 2011), xix. 14. Jon Snow, Twitter post, Dec. 9, 2010, 5:22 am, https://twitter.com/jonsnowC4/status/12814239458656256. 15. Zeynep Tufekci, “WikiLeaks Exposes Internet’s Dissent Tax, Not Nerd Supremacy,” theatlantic.com, Dec. 22, 2010. 16 Online interview with the author. 17.

pages: 708 words: 176,708

The WikiLeaks Files: The World According to US Empire by Wikileaks

affirmative action, anti-communist, banking crisis, battle of ideas, Boycotts of Israel, Bretton Woods, British Empire, capital controls, central bank independence, Chelsea Manning, colonial exploitation, colonial rule, corporate social responsibility, credit crunch, cuban missile crisis, Deng Xiaoping, drone strike, Edward Snowden, energy security, energy transition, European colonialism, eurozone crisis, experimental subject, F. W. de Klerk, facts on the ground, failed state, financial innovation, Food sovereignty, Francis Fukuyama: the end of history, full employment, future of journalism, high net worth, invisible hand, Julian Assange, Kickstarter, liberal world order, Mikhail Gorbachev, millennium bug, Mohammed Bouazizi, Monroe Doctrine, Nelson Mandela, Northern Rock, Philip Mirowski, RAND corporation, Ronald Reagan, Silicon Valley, South China Sea, statistical model, structural adjustment programs, too big to fail, trade liberalization, trade route, UNCLOS, UNCLOS, uranium enrichment, Washington Consensus, WikiLeaks, zero-sum game, éminence grise

CHAPTER 3: WAR AND TERRORISM 1Thomas Friedman, “A Manifesto for the Fast World,” New York Times Magazine, March 28, 1999. 2“Business and WikiLeaks: Be Afraid,” Economist, December 9, 2010. 3Andy Greenberg, “WikiLeaksJulian Assange Wants To Spill Your Corporate Secrets,” Forbes, November 29, 2010. 4https://wikileaks.org/wiki/Minton_report:_Trafigura_toxic_ dumping_along_the_Ivory_Coast_broke_EU_regulations,_14_Sep_2006. 5David Leigh, “Trafigura Hoped to Make a Fortune. Instead They Caused a Tragedy,” Guardian, September 16, 2009. 6“A Gag Too Far,” Index on Censorship, October 14, 2009. 7Mark Sweney, “Bank Drops Lawsuit against Wikileaks,” Guardian, March 6, 2008; “Wikileaks Given Data on Swiss Bank Accounts,” BBC News, January 17, 2011; “WikiLeaks to Target Wealthy Individuals,” Daily Telegraph, January 17, 2011. 8Yochai Benkler, “A Free Irresponsible Press: Wikileaks and the Battle over the Soul of the Networked Fourth Estate,” Harvard Civil Rights-Civil Liberties Law Review 46 (2011); Lisa Lynch, “‘We’re Going to Crack the World Open’: Wikileaks and the Future of Investigative Reporting,” Journalism Practice 4: 3 (2010)—Special Issue: The Future of Journalism. 9John Vidal, “WikiLeaks: US Targets EU over GM Crops,” Guardian, January 3, 2011. 10See Mariana Mazzucato, The Entrepreneurial State: Debunking Public vs Private Sector Myths (London/New York/Delhi: Anthem Press, 2013), Kindle loc. 2302–2320; and Leo Panitch and Sam Gindin, The Making of Global Capitalism: The Political Economy of the American Empire (London/New York: Verso, 2013), p. 288. 11https://wikileaks.org/tpp-ip2/pressrelease. 12Peter Gowan, The Global Gamble: Washington’s Faustian Bid for World Dominance (London/New York: Verso, 1999). 13Quoted in Leo Panitch and Sam Gindin, “Global Capitalism and the American Empire,” Socialist Register 40 (2004). 14Figure cited in Andrew G.

“Worse than a military attack,” the Republican congressman Peter King expostulated in November 2010, urging that WikiLeaks be categorized as a “terrorist organization.”23 Vice President Joe Biden accused Julian Assange of being a “high-tech terrorist.” Hunt him down like bin Laden, exhorted Sarah Palin.24 “Yes, WikiLeaks is a terrorist organization,” said Fox News.25 The basis of this overblown charge was that WikiLeaks was waging a “cyber-war” on the United States that placed “vital interests” at risk—particularly the flows of information necessary to track down and capture “terrorists”—thus putting American lives in danger. When WikiLeaks invited the US government to name a single cable whose publication put anyone at significant risk of harm, the State Department’s legal advisor wrote back formally declining to name a specific danger, but nonetheless ordered WikiLeaks to shut down its websites, cease publication, and destroy all the information it held.26 This charge of “terrorism” was not merely lazy or overexcited: there was real power behind it.

Finer, “Iraqi Sunnis Battle to Defend Shiites,” Washington Post, August 14, 2005. 19Department of Defense, “Measuring Stability and Security in Iraq,” June 2007, Report to Congress, at defense.gov; Fred Kaplan, “Western Targets: The Iraqi Insurgency Is Still Primarily an Anti-Occupation Effort,” Slate, February 9, 2006. 20International Council on Security and Development, “Eight Years after 9/11 Taliban Now Has a Permanent Presence in 80% of Afghanistan,” press release, September 10, 2009, available at uruknet.info; Antonio Giustozzi, Koran, Kalashnikov, and Laptop: The Neo-Taliban Insurgency in Afghanistan (New York: Columbia University Press, 2007), pp. 108–9. 21“Leverage Xenophobia,” Washington Post, April 10, 2006. 22General Sir Richard Dannatt, “Address to the International Institute for Strategic Studies,” September 21, 2007, at mod.uk. 23“King: WikiLeaks Release ‘Worse than Military Attack,’” CBS New York, November 28, 2010, at newyork.cbslocal.com. 24Chris McGreal, “Is WikiLeaks Hi-Tech Terrorism or Hype? Washington can’t decide,” Guardian, February 5, 2011. 25K. T. McFarland, “Yes, WikiLeaks Is a Terrorist Organization and the Time to Act Is NOW,” Fox News, November 30, 2011, at foxnews.com. 26David Leigh and Luke Harding, WikiLeaks: Inside Julian Assange’s War on Secrecy (London: Guardian, 2011). 27This phrase is from a chat with Assange, discovered by US authorities. Kim Zetter, “Jolt in WikiLeaks Case: Feds Found Manning-Assange Chat Logs on Laptop,” Wired, December 19, 2011. 28Ed Pilkington, “Bradley Manning Treated More Harshly than a Terrorist, Lawyer Argues,” Guardian, July 12, 2012; Ed Pilkington, “Bradley Manning’s Treatment Was Cruel and Inhuman, UN Torture Chief Rules,” Guardian, March 12, 2012. 29See Richard Jackson, Marie Breen Smyth, and Jeroen Gunning, eds, Critical Terrorism Studies: A New Research Agenda (Oxford: Routledge, 2009); and Marie Breen-Smyth, ed., The Ashgate Research Companion to Political Violence (Farnham: Ashgate, 2012). 30Steve Inskeep, “State Department Defends America’s Image Abroad,” National Public Radio, March 27, 2006. 31George W.

pages: 525 words: 116,295

The New Digital Age: Transforming Nations, Businesses, and Our Lives by Eric Schmidt, Jared Cohen

access to a mobile phone, additive manufacturing, airport security, Amazon Mechanical Turk, Amazon Web Services, anti-communist, augmented reality, Ayatollah Khomeini, barriers to entry, bitcoin, borderless world, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, crowdsourcing, data acquisition, Dean Kamen, drone strike, Elon Musk, failed state, fear of failure, Filter Bubble, Google Earth, Google Glasses, hive mind, income inequality, information trail, invention of the printing press, job automation, John Markoff, Julian Assange, Khan Academy, Kickstarter, knowledge economy, Law of Accelerating Returns, market fundamentalism, means of production, MITM: man-in-the-middle, mobile money, mutually assured destruction, Naomi Klein, Nelson Mandela, offshore financial centre, Parag Khanna, peer-to-peer, peer-to-peer lending, personalized medicine, Peter Singer: altruism, Ray Kurzweil, RFID, Robert Bork, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, social graph, speech recognition, Steve Jobs, Steven Pinker, Stewart Brand, Stuxnet, The Wisdom of Crowds, upwardly mobile, Whole Earth Catalog, WikiLeaks, young professional, zero day

Wall Street bankers hired: Nick Bilton, “Erasing the Digital Past,” New York Times, April 1, 2011, http://www.nytimes.com/2011/04/03/fashion/03reputation.html?pagewanted=all. Assange shared his two basic arguments on this subject: Julian Assange in discussion with the authors, June 2011. lightning rod, as Assange called himself: Atika Shubert, “WikiLeaks Editor Julian Assange Dismisses Reports of Internal Strife,” CNN, October 22, 2010, http://articles.cnn.com/2010-10-22/us/wikileaks.interview_1_julian-assange-wikileaks-afghan-war-diary?_s=PM:US. “Sources speak with their feet”: Julian Assange in discussion with the authors, June 2011. WikiLeaks lost its principal website URL: James Cowie, “WikiLeaks: Moving Target,” Renesys (blog), December 7, 2010, http://www.renesys.com/blog/2010/12/wikileaks-moving-target.shtml. “mirror” sites: Ravi Somaiya, “Pro-Wikileaks Activists Abandon Amazon Cyber Attack,” BBC, December 9, 2010, http://www.bbc.com/news/technology-11957367.

These groups will continue to demand attention from the governments and institutions they attack, and their threats may come to be taken more seriously than one might expect judging from today’s activities, which mostly seem like stunts. The story of WikiLeaks, the secrets-publishing website we discussed earlier, and its sympathetic hacker allies is an illustrative example. The arrest of WikiLeaks’ cofounder Julian Assange in December 2010 sparked flurries of outrage around the world, particularly among the many activists, hackers and computer experts who believed his indictment on sexual-assault charges was politically motivated. Shortly thereafter, a series of cyber attacks crippled, among others, the websites for Amazon, which had revoked WikiLeaks’ use of its servers, and MasterCard and PayPal, which had both stopped processing donations for WikiLeaks. This campaign, officially titled Operation Avenge Assange, was coordinated by Anonymous, a loosely knit collective of hackers and activists already responsible for a string of prominent DDoS attacks against the Church of Scientology and other targets.

Brokers and buyers in this exchange would face risks similar to what black marketeers do today, including undercover agents and dishonest dealings (perhaps made all the more likely due to the anonymous nature of these virtual-world transactions). Some people will cheer for the end of control that connectivity and data-rich environments engender. They are the people who believe that information wants to be free,2 and that greater transparency in all things will bring about a more just, safe and free world. For a time, WikiLeaks’ cofounder Julian Assange was the world’s most visible ambassador for this cause, but supporters of WikiLeaks and the values it champions come in all stripes, including right-wing libertarians, far-left liberals and apolitical technology enthusiasts. While they don’t always agree on tactics, to them, data permanence is a fail-safe for society. Despite some of the known negative consequences of this movement (threats to individual security, ruined reputations and diplomatic chaos), some free-information activists believe the absence of a delete button ultimately strengthens humanity’s progress toward greater equality, productivity and self-determination.

pages: 547 words: 160,071

Underground by Suelette Dreyfus

airport security, invisible hand, John Markoff, Julian Assange, Loma Prieta earthquake, packet switching, pirate software, profit motive, publish or perish, RFC: Request For Comment, Ronald Reagan, Stephen Hawking, Steven Levy, Stuxnet, uranium enrichment, urban decay, WikiLeaks, zero day

This goes back to the earliest definition of a hacker, which doesn’t imply any illegal activity, but, rather, simply reflects someone who can find clever technical solutions to hard problems. It is this kernel of unusual creativity, not their illegal activities, that makes the hackers in Underground so interesting. This kernel carried through to WikiLeaks. WikiLeaks revealed the creative application of technology, in the form of secure, anonymous online publishing, to the hard problem of getting governments and corporations to tell the truth. The founder of WikiLeaks, Julian Assange, and I worked on Underground for almost three years. He brought exceptional technical understanding and a detailed knowledge of the computer underground while I brought years of experience as a professional journalist and technology writer. CNN.com’s news blog declared Julian to be ‘the most intriguing person of the year’ at the end of 2010 based on the results of its online poll.

Nicholas Jackson, ‘WikiLeaks Volunteer Detained by U.S. Agents for Second Time,’ The Atlantic, 12 January, 2011. See: http://www.theatlantic.com/technology/archive/2011/01/wikileaks-volunteer-detained-by-usagents-for-second-time/69458/ 3. Josh Gordon, ‘PM has betrayed me: Assange’, The Sunday Age, 5 December, 2010, p 1. 4. James C. Thomson, Jr, ‘How could Vietnam Happen? – An autopsy’, The Atlantic, April, 1968. See: http://www.theatlantic.com/past/docs/issues/68apr/vietnam.htm. Thomson describes how dissenters are silenced via a warm and welcoming embrace inside the US Government during debates about the Vietnam War. The similarities with the Afghan and Iraq wars are striking. 5. Julian Assange, ‘Serious nuclear accident may lay behind Iranian nuke chief’s mystery resignation.’ WikiLeaks, 16 July, 2009.

Her articles have appeared in magazines and newspapers such as The Independent (London), The Age, The Sydney Morning Herald and The Australian. She began work on Underground while completing her PhD. She is a Research Fellow at the University of Melbourne, where she runs several major research projects in information systems. Julian Assange is an internet activist, journalist and publisher. Born and raised in Australia, Julian is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website that started in 2006. In 2010, WikiLeaks began to publish hundreds of thousands of classified details about American involvement in the wars in Afghanistan and Iraq, which created a media storm. At the end of 2010, the site published a series of classified US diplomatic cables, now known as Cablegate. ‘An astonishing book.’

pages: 422 words: 104,457

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance by Julia Angwin

AltaVista, Ayatollah Khomeini, barriers to entry, bitcoin, Chelsea Manning, Chuck Templeton: OpenTable:, clean water, crowdsourcing, cuban missile crisis, data is the new oil, David Graeber, Debian, Edward Snowden, Filter Bubble, Firefox, GnuPG, Google Chrome, Google Glasses, informal economy, Jacob Appelbaum, John Markoff, Julian Assange, Marc Andreessen, market bubble, market design, medical residency, meta analysis, meta-analysis, mutually assured destruction, Panopticon Jeremy Bentham, prediction markets, price discrimination, randomized controlled trial, RFID, Robert Shiller, Ronald Reagan, security theater, Silicon Valley, Silicon Valley startup, Skype, smart meter, Steven Levy, Upton Sinclair, WikiLeaks, Y2K, zero-sum game, Zimmermann PGP

At his military court proceedings, Bradley Manning, the U.S. Army private who leaked documents to WikiLeaks, described how he connected with WikiLeaks using Tor and Jabber for encrypted chats. “The anonymity provided by TOR and the Jabber client and the WLO’s [WikiLeaks Organization’s] policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life,” Manning said in his statement to the court. Of course, encryption ultimately didn’t save Manning. He was betrayed by a friend—a hacker named Adrian Lamo, who turned Manning in to the FBI. Government investigators later found traces of Manning’s correspondence on his computer; Julian Assange was on Manning’s “buddy list” in Jabber. And so, even this ungainly setup that is designed to conceal can reveal too much.

Short, simple passwords, such as dictionary words, have very low entropy because they can easily be guessed. Longer passwords that contain many types of symbols, letters, and numbers often have larger entropy because it takes more guesses to figure them out. Julian Assange knew this when he created the following password to the WikiLeaks cables database: AcollectionOfDiplomaticHistorySince_1966_ToThe_PresentDay#. It is fifty-eight characters long, with very few symbols, and easy to remember. Of course, the reason we know his password is that the Guardian newspaper published it in a book about WikiLeaks. So, obviously, it wasn’t a secure password in other respects. Entropy is frustratingly difficult to estimate. A long password can have low entropy if it is comprised of simple words and easy grammar. I started to become obsessed with measuring the entropy of the passwords I had created.

” * * * In some ways, the Cypherpunk movement is coming back to life. Julian Assange, a longtime Cypherpunk, transformed the relationship between journalists and their sources with his 2006 launch of the WikiLeaks encrypted drop box that promised complete anonymity to people who wanted to leak information. Other Cypherpunks focused on building “liberation technology” to help liberate people from oppressive regimes. Moxie Marlinspike in San Francisco built encryption apps—RedPhone and TextSecure—for Android phones. Nathan Freitas and the Guardian Project in New York built apps to bring encrypted calls and Tor to cell phones. The U.S. government funded some projects, such as Tor, in the name of Internet freedom, while at the same time the Justice Department was investigating Tor developer Jacob Appelbaum for his involvement in WikiLeaks. And Phil Zimmermann, the founder of Pretty Good Privacy, went the capitalist route.

pages: 391 words: 123,597

Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again by Brittany Kaiser

Albert Einstein, Amazon Mechanical Turk, Asian financial crisis, Bernie Sanders, bitcoin, blockchain, Boris Johnson, Burning Man, call centre, centre right, Chelsea Manning, clean water, cognitive dissonance, crony capitalism, Dominic Cummings, Donald Trump, Edward Snowden, Etonian, haute couture, illegal immigration, Julian Assange, Mark Zuckerberg, Menlo Park, Nelson Mandela, off grid, open borders, Renaissance Technologies, Robert Mercer, rolodex, sentiment analysis, Silicon Valley, Silicon Valley startup, Skype, Snapchat, statistical model, the High Line, the scientific method, WikiLeaks, young professional

Not much later, it would become clear that Sam Patten, whom Alexander had hired to work for SCL in Nigeria, and whom he was considering as my replacement in Mexico, had once been boss to Konstantin Kilimnik, a suspected Russian spy who had worked with Paul Manafort. Terrible news—that and the fact that in October, the Guardian revealed that Alexander himself had reached out to WikiLeaks during the campaign to try to obtain Hillary Clinton’s hacked emails. This had probably been enough to spark Congress’s interest in Cambridge’s relationship with the Trump campaign. Both Alexander Nix and Julian Assange had come out in public saying that the former’s attempt to get Hillary’s emails had been unsuccessful. Assange hadn’t even bothered to respond to him. Neither of these revelations surprised me. As far as I knew, Julian Assange had no reason to help out a man like Alexander Nix, and he wasn’t exactly a man to accept cold calls, either. In December, the House Judiciary Committee had interviewed Alexander by Skype and requested that he turn over all the emails between Cambridge and the Trump campaign.

I looked back at it. I had never believed a thing she’d reported because every single thing she’d ever written about me had been so inaccurate and speculative, to say the least. Later that year, Carole would cite an anonymous source stating that I was “funneling” Bitcoin to fund Wikileaks (I guess she’s referring to my student-budget donation in 2011) and had gone to visit Julian Assange to discuss the U.S. elections. Her theory and inference that I could be Guccifer 2.0, the conduit between Russia, the DNC hack, and Wikileaks, was a bit much to take in. Her allegations against me had real collateral damage: I was subpoenaed by Mueller the next day, which she then printed nine months later, conveniently leaving out the date and touting it as though it had just happened, further confusing the world and obfuscating the truth.

While Cambridge, she allowed, had never officially worked for Lukoil—Wylie had a copy of that proposal, which I myself had seen in my early days at SCL—Cadwalladr wanted to tie it all together, despite having no causal evidence. This features writer posing as an investigator wanted to connect CA with WikiLeaks, with the downfall of Hillary and the rise of Trump, and she presumed that both Julian Assange and Alexander Nix had been lying when each said that they had not in fact ended up working together when Alexander reached out to WikiLeaks in search of Hillary Clinton’s emails. Carole wanted so desperately to find a smoking gun that she blew smoke everywhere, with larger-than-life characters such as Chris Wylie and villainous companies such as Cambridge Analytica, which she described as deploying psyops and operating much like MI6.

pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele

4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, commoditize, creative destruction, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, disruptive innovation, Donald Trump, Douglas Engelbart, Douglas Engelbart, en.wikipedia.org, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, Mark Zuckerberg, minimum viable product, Mitch Kapor, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, old-boy network, peer-to-peer, period drama, Peter Thiel, pirate software, publication bias, Robert Metcalfe, Ronald Reagan, Ronald Reagan: Tear down this wall, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Telecommunications Act of 1996, telemarketer, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

v=swHkpHMVt3A 28. Julian Assange, “The Non Linear Effects of Leaks on Unjust Systems of Governance,” WikiLeaks 31 Dec. 2006. Archived from the original on 2 Oct. 2007. 29. http://www.smh.com.au/technology/technology-news/the-secret-life-of-wikileaks-founder-julian-assange-20100521-w1um.html 30. http://www.guardian.co.uk/world/2010/dec/01/us-embassy-cables-executed-mike-huckabee 31. http://www.telegraph.co.uk/news/worldnews/wikileaks/8171269/Sarah-Palin-hunt-WikiLeaks-founder-like-al-Qaeda-and-Taliban-leaders.html 32. http://www.guardian.co.uk/media/2010/dec/19/assange-high-tech-terrorist-biden 33. http://www.democracynow.org/2010/12/31/pentagon_whistleblower_daniel_ellsberg_julian_assange 34. Micah L. Sifry and Andrew Rasiej, WikiLeaks and the Age of Transparency (Berkeley: Counterpoint, 2011), 14. 35. http://gov20.govfresh.com/samantha-power-transparency-has-gone-global/ 36. http://wikileaks.ch/cable/2008/06/08TUNIS679.html 37. http://www.time.com/time/magazine/article/0,9171,2044723,00.html; http://www.cnn.com/2011/12/17/world/meast/arab-spring-one-year-later/index.html 38.

Soghoian has suggested that Flame exposes the average citizen to a significant level of security risk on their personal computer by undermining automatic security updates, not to mention the growing consumer privacy concerns.27 As the preceding discussion suggests, the term “nonstate actor” has its limitations; it’s conceivable that every technically literate person with a laptop and an Internet connection might be able to influence global geopolitics as a nonstate actor. In fact, it’s already happening. Consider Bradley Manning and Julian Assange; together they changed diplomacy and, arguably, the governments of several countries—without any exceptional technical knowledge or expertise. Bradley Manning is a computer programmer, but not a technical genius. He was a low-ranking U.S. Army soldier, a private first class, who made use of a fundamental attribute of digital files: They are easily copied and, once copied, easily shared. Manning allegedly had access to the files through the U.S. military’s online data-management tools and copied them to share online on WikiLeaks. Julian Assange, a computer programmer and activist, had been working with a team to build WikiLeaks into a known repository for whistleblowers and a trusted source for journalists.

These two core values of Wikipedia—that anyone can edit it and that everything is transparent—are part of the attraction of the “wiki” in WikiLeaks. While WikiLeaks actually started as a wiki, it is no longer one. But WikiLeaks is a place that wants to bring radical transparency to the world’s largest institutions and prove that anyone—even a lowly private in the U.S. Army—can be powerful beyond imagination. What is the role of secrecy in democracy and diplomacy, and what does it mean in a digital age where secrecy and privacy have nearly disappeared? It’s an important question, because whatever WikiLeaks’s future, Internet-fueled leaks are certain to rise again. Assange sees WikiLeaks as a new force in the world, one that works to bring accountability to large institutions like the U.S. government. In a series of blog posts explaining the purpose of WikiLeaks, he writes, “the more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. … Since unjust systems, by their nature, induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.”28 To Assange WikiLeaks is something between the accountability journalism of newspapers and the transparency activism of the open-source movement.

Active Measures by Thomas Rid

1960s counterculture, 4chan, active measures, anti-communist, back-to-the-land, Berlin Wall, Bernie Sanders, bitcoin, call centre, Chelsea Manning, continuation of politics by other means, cryptocurrency, cuban missile crisis, Donald Trump, East Village, Edward Snowden, en.wikipedia.org, facts on the ground, Fall of the Berlin Wall, guest worker program, Internet Archive, Jacob Appelbaum, John Markoff, Julian Assange, kremlinology, Mikhail Gorbachev, Norman Mailer, nuclear winter, peer-to-peer, Ronald Reagan, Silicon Valley, Stewart Brand, technoutopianism, We are Anonymous. We are Legion, Whole Earth Catalog, WikiLeaks, zero day

Yet Cryptome pioneered and precipitated a larger cultural shift that would help reawaken active measures with a vengeance. Young met Julian Assange on the cypherpunk list, and Assange described Cryptome as the “spiritual godfather”6 of WikiLeaks. In 2006, Assange asked Young to become the public face of WikiLeaks in the United States, and suggested that Young could register WikiLeaks.org in his name.7 The cooperation failed; two eccentric personalities clashed, and the radical-libertarian partnership came to an end. Yet WikiLeaks would soon eclipse Cryptome. In 2010, Chelsea Manning, then a twenty-two-year-old Army private known as Bradley,8 leaked more than a quarter million State Department and Department of Defense documents to WikiLeaks. The leaked diplomatic cables spanned about a decade, and turned Assange and his website into household names.

By the end of the weekend, on June 12, the DNC’s networks were cleaned up and back online.23 That day, Julian Assange gave an interview to a British news network. He mentioned that a major political leak was forthcoming. “We have upcoming leaks in relation to Hillary Clinton, which are great,” Assange said. “WikiLeaks has a very big year ahead.”24 As was often his strategy, Assange was being deliberately cryptic. Later he persistently refused to clarify either from whom or precisely when his organization had received specific leaks. Two days later, on June 14, the GRU, sensing that DCLeaks was a hard sell and not exactly a success, started to reach out to WikiLeaks directly. The @DCleaks_ Twitter account privately messaged Julian Assange’s outfit. “You announced your organization was preparing to publish more Hillary’s emails,” one GRU officer wrote to @WikiLeaks, referring to Assange’s TV interview just two days earlier, adding: “We are ready to support you.

The New York Post, usually adept at finding what it called “hair-raising data,” concluded there was none in the released opposition research.5 Press attention only picked up somewhat when Donald Trump claimed that the DNC itself “did the ‘hacking.’”6 It would take nearly six weeks before the story finally dominated the news cycle. Next, the GRU recruited the help of WikiLeaks. The Guccifer 2.0 account had claimed, in the first note on the DNC hack, that “the main part of the papers, thousands of files and mails, I gave to WikiLeaks.” The GRU had not yet handed over the treasure trove, but the announcement had caught Julian Assange’s attention, and WikiLeaks immediately but cryptically reacted on Twitter. “DNC ‘hacker’ releases 200+ page internal report on Trump, says gave WikiLeaks all the rest,” Assange posted hours after the first leaks appeared, carefully not acknowledging receipt, and only repeating what the GRU front had claimed in its ominous blog post.7 Events now started to move quickly.

pages: 579 words: 160,351

Breaking News: The Remaking of Journalism and Why It Matters Now by Alan Rusbridger

accounting loophole / creative accounting, Airbnb, banking crisis, Bernie Sanders, Boris Johnson, centre right, Chelsea Manning, citizen journalism, cross-subsidies, crowdsourcing, David Attenborough, David Brooks, death of newspapers, Donald Trump, Doomsday Book, Double Irish / Dutch Sandwich, Downton Abbey, Edward Snowden, Etonian, Filter Bubble, forensic accounting, Frank Gehry, future of journalism, G4S, high net worth, invention of movable type, invention of the printing press, Jeff Bezos, jimmy wales, Julian Assange, Mark Zuckerberg, Menlo Park, natural language processing, New Journalism, offshore financial centre, oil shale / tar sands, open borders, packet switching, Panopticon Jeremy Bentham, pre–internet, ransomware, recommendation engine, Ruby on Rails, sexual politics, Silicon Valley, Skype, Snapchat, social web, Socratic dialogue, sovereign wealth fund, speech recognition, Steve Jobs, The Wisdom of Crowds, Tim Cook: Apple, traveling salesman, upwardly mobile, WikiLeaks

The effect of the Pentagon Papers Supreme Court judgment was that the government would have to demonstrate direct, immediate and irreparable damage to the state before the courts would restrict or prevent publication. 7. Twitter, 29 May 2015, 12.44 p.m.; @wikileaks 8. ‘Ghosting: Julian Assange’, London Review of Books, 6 March 2014; Andrew O’Hagan 9. James Clapper, the former Director of National Intelligence, told Raffi Khatchadourian of the New Yorker: ‘It was done by a cutout, which of course afforded Assange plausible deniability.’ (‘Julian Assange: A Man Without a Country’, New Yorker, 21 August 2017) 10. ‘Julian Assange: A Man Without a Country’, New Yorker, 21 August 2017 11. Interview with Ian Katz, editor of Newsnight, BBC Two, 15 December 2016 12. ‘Free’ in the sense of available rather than at no cost. 13. These reports allege Trump has deep ties to Russia, 10 January 2017 14.

Oxford: Reuters Institute for the Study of Journalism, 2017. Leigh, D. and Harding, L. WikiLeaks: Inside Julian Assange’s War on Secrecy. London: Guardian Books, 2010. Levy, D., Aslan, B. and Bironzo, D. UK Press Coverage of the EU Referendum. Oxford: Reuters Institute for the Study of Journalism, 2016. Lewis, A. Make No Law: The Sullivan Case and the First Amendment. New York: Random House, 1991. Lichter, R., Lichter, L. and Rothman, A. Watching America. New Jersey: NW Prentice-Hall Press, 1991. Lloyd, J. What the Media Are Doing to Our Politics. London: Constable, 2004. Lobban, M. ‘From Seditious Libel to Unlawful Assembly: Peterloo and the Changing Face of Political Crime’. Oxford Journal of Legal Studies, Vol. 10 No. 3 (Autumn 1990), pp. 307–352. Lundberg, K. Friend or Foe? WikiLeaks and the Guardian. New York, NY: Knight Case Studies Initiative, The Journalism School, Columbia University, 2011.

Horowitz has described Rupert Murdoch’s Fox News as ‘a partner’ (‘They’ve done a phenomenal job of disseminating the videos and my point of view’),5 and they duly picked up on a YouTube video he’d published in December 2016 claiming that ‘rape and violence has exploded across Sweden due it’s [sic] immigration policies’.6 Within 15 seconds of the video, an alert viewer would see what kind of an exercise this was. Horowitz lingers on a BBC headline ‘Sweden’s rape rate under the spotlight’. In fact, that four-year-old, 1,200-word article – pegged to the extradition of WikiLeaks leader Julian Assange, rather than immigration – was a nuanced exploration of whether Sweden’s apparently higher rates of rape were mainly down to changes in the way the police record incidents. But that was not how Horowitz used the headline. Horowitz dealt in outrage, entertainment and provocation. It was central to his Unique Selling Point that he told uncomfortable home truths the despised Mainstream Media (MSM) ignored.7 He was not a reliable source for the President of the United States.

pages: 302 words: 85,877

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

4chan, A Declaration of the Independence of Cyberspace, Apple II, autonomous vehicles, Berlin Wall, Bernie Sanders, bitcoin, Chelsea Manning, commoditize, corporate governance, Donald Trump, dumpster diving, Edward Snowden, Firefox, Google Chrome, Haight Ashbury, Internet of things, Jacob Appelbaum, Jason Scott: textfiles.com, John Markoff, Julian Assange, Mark Zuckerberg, Mitch Kapor, Naomi Klein, Peter Thiel, pirate software, pre–internet, Ralph Nader, ransomware, Richard Stallman, Robert Mercer, self-driving car, side project, Silicon Valley, Skype, slashdot, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, Whole Earth Catalog, WikiLeaks, zero day

Inside cDc, Jake handled himself differently than the others, arguing more fiercely and sometimes with disdain for his elders. That accelerated after he hooked up with something even bigger than Tor: WikiLeaks. Activist hackers started the site in 2006 and first won wide attention in 2010, when they posted a video called “Collateral Murder” that captured the gunfire from a US helicopter that killed a dozen people, including two Reuters journalists, in Iraq. The video disproved US claims that the shooting was part of a battle. The one WikiLeaks founder who would be left standing after years of internal dissension and splits was Australian Julian Assange, who had nearly as bad a childhood as Jake, including hiding with his mother from a vengeful cult. Even more of a show-off than Jake, Assange had been a belligerently antiestablishment and sometimes malicious hacker in his native Australia.

Toward the end, after puzzling as cDc did about what to do with all the attention, Davis announced that LulzSec would revive Antisec, an old campaign against white-hat security professionals. This time, LulzSec would ally with the broader Anonymous and go after government security agencies, banks, and other establishment powers. Julian Assange was tracking events closely, at one point contacting the group for help getting into Icelandic email services that might show that government treating WikiLeaks unfairly. After LulzSec supporter Jeremy Hammond hacked US intelligence consulting firm Stratfor, WikiLeaks published millions of Stratfor emails with clients. Eventually authorities caught almost the entire LulzSec crew. Technological ringleader Hector Monsegur, alias Sabu, flipped and helped put Davis and the others away. After he began working undercover for the FBI in return for a radically reduced sentence, Monsegur encouraged hackers to disrupt more targets, and he repeatedly reached out to Assange and Jake, which suggests both were under US investigation.

Courtesy Danny Dulai German hacker Kemal Akman was a key addition to Laird Brown’s Hacktivismo spinoff from cDc. But then Akman brought in the man who invented FinFisher spyware, still used by repressive regimes against dissidents. Courtesy Declan McCullagh Jacob Appelbaum became one of the last close aides to WikiLeaks founder Julian Assange, with whom he spoke at a 2011 press conference touting the release of new files. Both would be accused of sexual misconduct. Still from “Wikileaks Press Conference,” uploaded to YouTube December 1, 2011, by Rima Amin Cult of the Dead Cow founders Bill Brown and Kevin Wheeler, known to the outside world as Franken Gibe and Grandmaster Ratte, met as middle-school students in Lubbock, Texas. Courtesy Kevin Wheeler Security engineer and longtime Cult of the Dead Cow member Adam O’Donnell and Facebook security chief Alex Stamos hosted an early fundraiser for Senate candidate Beto O’Rourke of Texas during the fall of 2017.

pages: 587 words: 117,894

Cybersecurity: What Everyone Needs to Know by P. W. Singer, Allan Friedman

4chan, A Declaration of the Independence of Cyberspace, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, bitcoin, blood diamonds, borderless world, Brian Krebs, business continuity plan, Chelsea Manning, cloud computing, crowdsourcing, cuban missile crisis, data acquisition, do-ocracy, drone strike, Edward Snowden, energy security, failed state, Fall of the Berlin Wall, fault tolerance, global supply chain, Google Earth, Internet of things, invention of the telegraph, John Markoff, Julian Assange, Khan Academy, M-Pesa, MITM: man-in-the-middle, mutually assured destruction, Network effects, packet switching, Peace of Westphalia, pre–internet, profit motive, RAND corporation, ransomware, RFC: Request For Comment, risk tolerance, rolodex, Silicon Valley, Skype, smart grid, Steve Jobs, Stuxnet, uranium enrichment, We are Anonymous. We are Legion, web application, WikiLeaks, zero day, zero-sum game

… (12:26:09 PM) bradass87: lets just say *someone* i know intimately well, has been penetrating US classified networks, mining data like the ones described … and been transferring that data from the classified networks over the “air gap” onto a commercial network computer … sorting the data, compressing it, encrypting it, and uploading it to a crazy white haired aussie who can’t seem to stay in one country very long =L … (12:31:43 PM) bradass87: crazy white haired dude = Julian Assange (12:33:05 PM) bradass87: in other words … ive made a huge mess. This exchange on AOL Instant Messenger launched one of the biggest incidents in cyber history. WikiLeaks not only changed the way the world thinks about diplomatic secrets, but also became a focal point for understanding how radically cyberspace has changed our relationship with data and access. In 2006, the website WikiLeaks was launched with the goal of “exposing corruption and abuse around the world.” With an agenda that scholars call “radical transparency,” the concept was to reform powerful actors’ behavior by exposing documented evidence of their wrongdoing online. Led by the now-iconic “crazy white haired dude,” Australian Julian Assange, it used the Wikipedia model of an “open-source, democratic intelligence agency,” where activists from around the world could upload information and share it through a central but communally archived repository.

Companies like PayPal, Bank of America, MasterCard, and Visa were targeted because they stopped processing payments to the whistle-blowing website WikiLeaks, following its controversial publication of US diplomatic cables. The Zimbabwe government’s websites were targeted after its president’s wife sued a newspaper for US$15 million for publishing a WikiLeaks cable that linked her to the blood diamond trade. The Tunisian government was targeted for censoring the WikiLeaks documents as well as news about uprisings in the country (in a poignant twist, a noted local blogger, Slim Amamou, who had supported Anonymous in the effort, was arrested by the old regime and then became a minister in the new regime that the effort helped put into power). The British government was threatened with similar attacks if it extradited WikiLeaks founder Julian Assange. As Anonymous went after bigger and more powerful targets, the group garnered more and more attention.

without traditional due process Ewan MacAskill, “Julian Assange Like a High-Tech Terrorist, Says Joe Biden,” Guardian, December 19, 2010, http://www.guardian.co.uk/media/2010/dec/19/assange-high-tech-terrorist-biden. “enemy combatant” Shane D’Aprile, “Gingrich: Leaks Show Obama Administration ‘Shallow,’ ‘Amateurish,’” Blog Briefing Room (blog), The Hill, December 5, 2010, http://thehill.com/blogs/blog-briefing-room/news/132037-gingrich-blames-obama-on-wikileaks-labels-assange-a-terrorist. traditional channels Ewen MacAskill, “WikiLeaks Website Pulled by Amazon after US Political Pressure,” Guardian, December 1, 2010, http://www.guardian.co.uk/media/2010/dec/01/wikileaks-website-cables-servers-amazon. registered in Australia Hal Berghel, “WikiLeaks and the Matter of Private Manning,” Computer 45, no. 3 (March 2012): pp. 70–73.

pages: 285 words: 86,174

Twilight of the Elites: America After Meritocracy by Chris Hayes

affirmative action, Affordable Care Act / Obamacare, asset-backed security, barriers to entry, Berlin Wall, Bernie Madoff, carried interest, circulation of elites, Climategate, Climatic Research Unit, collapse of Lehman Brothers, collective bargaining, creative destruction, Credit Default Swap, dark matter, David Brooks, David Graeber, deindustrialization, Fall of the Berlin Wall, financial deregulation, fixed income, full employment, George Akerlof, Gunnar Myrdal, hiring and firing, income inequality, Jane Jacobs, jimmy wales, Julian Assange, Kenneth Arrow, Mark Zuckerberg, mass affluent, mass incarceration, means of production, meta analysis, meta-analysis, money market fund, moral hazard, Naomi Klein, Nate Silver, peak oil, plutocrats, Plutocrats, Ponzi scheme, Ralph Waldo Emerson, rolodex, The Spirit Level, too big to fail, University of East Anglia, Vilfredo Pareto, We are the 99%, WikiLeaks, women in the workforce

The old gatekeepers have been discredited but not discarded. Their challengers are capable of subverting consensus and authority but not reconstituting it. And into the breach comes Julian Assange bearing a single, simple radical promise: total information can provide our salvation. If Julian Assange did not exist, we would have to invent him. With his white hair and lip that curls into something between a smirk and a snarl, his playful but vaguely sinister affect, Assange seems almost too cinematic to be real, as if our collective skepticism and distrust managed to conjure him into being. Founded in 2006 as a secure means by which international whistle-blowers and hackers could anonymously publish secret documents, WikiLeaks’ ethos was grounded in Assange’s worldview, one distrustful, to the point of near paranoia, of any source of authority. “He had come to understand the defining human struggle not as left versus right, but as individual versus institution,” the New Yorker wrote in a 2010 profile.

Once the Northern white establishment was won over and began to use its considerable power to document the violence, hatred, and cruelty of the Jim Crow establishment’s reaction to Civil Rights protesters, public opinion began to turn. The concentration of the media at that moment, in other words, provided activists with an Archimedean point of leverage: They could focus their energies on a relative handful of press outlets and through these outlets broadcast their message to almost every last member of the voting public. In some ways, the story told in The Race Beat bears out Julian Assange’s simple vision: The truth of the nature of segregation was exposed and the truth won. Roberts and Klibanoff quote Swedish economist Gunnar Myrdal, who prophetically observed in his 1944 book that “there is no doubt that a great majority of white people in America would be prepared to give the Negro a substantially better deal if they knew the facts.” But key to this “truth” getting out was the concentrated authority that the establishment press at the time, particularly the New York Times, possessed.

., p. 6. 48 “We’re marching over the cliff”: See interview with Noam Chomsky in “Peak Oil and a Changing Climate,” Videonation, www.youtube.com/watch?v=UUmwy0VTnqM&feature=player_embedded, accessed February 22, 2012. 49 “State and Terrorist Conspiracies”: Available at http://cryptome.org/0002/ja-conspiracies.pdf, accessed January 19, 2012. 50 “Institutions are very important”: “Frost Over the World: Julian Assange Interview,” Aljazeera, http://www.aljazeera.com/programmes/frostovertheworld/2010/12/201012228384924314.html, accessed January 19, 2012. CHAPTER 5. WINNERS 1 “We are the 1%”: See “Board of Trade Has a Message for Occupy Chicago,” Chicagoist, http://chicagoist.com/2011/10/05/board_of_trade_has_a_message_for_oc.php, accessed January 22, 2012. 2 “I should sooner live in a society governed by the first two thousand names in the Boston telephone directory”: See William F.

pages: 253 words: 75,772

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald

airport security, anti-communist, Cass Sunstein, Chelsea Manning, cognitive dissonance, David Brooks, Edward Snowden, Julian Assange, Mark Zuckerberg, Occupy movement, Panopticon Jeremy Bentham, Rubik’s Cube, Silicon Valley, Skype, Ted Kaczynski, WikiLeaks

The agency claims this personal information won’t be abused, “but these documents show that the NSA probably defines ‘abuse’ very narrowly.” As Jaffer pointed out, the NSA has historically, at a president’s request, “used the fruits of surveillance to discredit a political opponent, journalist, or human rights activist.” It would be “naive,” he said, to think the agency couldn’t still “use its power that way.” Other documents describe the government’s focus not only on WikiLeaks and its founder, Julian Assange, but also on what the agency calls “the human network that supports WikiLeaks.” In August 2010 the Obama administration urged several allies to file criminal charges against Assange for the group’s publication of the Afghanistan war logs. The discussion around pressuring other nations to prosecute Assange appears in an NSA file that the agency calls its “Manhunting Timeline.” It details, on a country-by-country basis, the efforts by the United States and its allies to locate, prosecute, capture, and/or kill various individuals, among them alleged terrorists, drug traffickers, and Palestinian leaders.

You know, there is—there is—there is a point of law. One CNN show, Reliable Sources, debated the question while a graphic remained on the screen that read, “Should Glenn Greenwald be prosecuted?” The Washington Post’s Walter Pincus—who spied on US students abroad on behalf of the CIA in the 1960s—wrote a column strongly suggesting that Laura, Snowden, and I were all operating as part of a plot secretly masterminded by WikiLeaks founder Julian Assange. The column was filled with so many factual errors (ones I documented in an open letter to Pincus) that the Post was forced to append an unusually large, three-paragraph, two-hundred-word correction acknowledging multiple mistakes. On his own CNBC show, New York Times financial columnist Andrew Ross Sorkin said: I feel like, A, we’ve screwed this up, even letting [Snowden] get to Russia.

As nonsensical as the tactic might seem—why would exposure of embarrassing personal information counter evidence of government deceit?—Ellsberg understood it clearly: people do not want to be associated with someone who has been discredited or publicly humiliated. The same tactic was used to damage Julian Assange’s reputation well before he was accused of sex crimes by two women in Sweden. Notably, the attacks on Assange were carried out by the same newspapers that had worked with him and had benefited from Chelsea Manning’s disclosures, which Assange and WikiLeaks had enabled. When the New York Times published what it called “The Iraq War Logs,” thousands of classified documents detailing atrocities and other abuses during the war by the US military and its Iraqi allies, the paper featured a front-page article—as prominently as the disclosures themselves—by pro-war reporter John Burns that had no purpose other than to depict Assange as bizarre and paranoid, with little grip on reality.

pages: 239 words: 73,178

The Narcissist You Know by Joseph Burgo

Albert Einstein, Donald Trump, Downton Abbey, en.wikipedia.org, financial independence, Jeff Bezos, Julian Assange, Paul Graham, Ronald Reagan, Silicon Valley, Steve Jobs, traveling salesman, WikiLeaks

Although their charitable foundations, LiveStrong and the Central Asia Institute, did much good, a closer look at the psychology of these men reveals the features of Extreme Narcissism and points toward core shame.9 Julian Assange, founder of WikiLeaks and tireless crusader against the secrecy of entrenched power, for a time appeared to be another hero in our feckless world. Standing up for truth, transparency, and the rights of the individual to access secret government information, Assange at first seemed to be a selfless advocate for the little man. He turned out to be a Grandiose Narcissist more interested in public acclaim and enjoying his “rock star” status than in pursuing the truth. Ghostwriter Andrew O’Hagan spent many months collaborating with Julian Assange on an autobiography and in the process came to know him well. “His pursuit of governments and corporations was a ghostly reverse of his own fears for himself,” O’Hagan writes.

Joseph Burgo, The Hero as Narcissist: How Lance Armstrong and Greg Mortenson Conned a Willing Public (Chapel Hill: New Rise Press, 2013). 10. http://www.lrb.co.uk/v36/n05/andrew-ohagan/ghosting. 11. http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?currentPage=all. 12. O’Hagan, Ghosting. 13. http://www.independent.co.uk/news/uk/home-news/julian-assange-i-am-ndash-like-all-hackers-ndash-a-little-bit-autistic-2358654.html. 14. Daniel Domscheit-Berg, Inside WikiLeaks: My Time with Julian Assange at the World’s Most Dangerous Website (New York: Crown, 2011). 15. O’Hagan, Ghosting. 16. http://www.nytimes.com/2011/01/30/magazine/30Wikileaks-t.html?pagewanted=all&_r=0. 7. “I HAVE SO MUCH TO TELL YOU”: THE KNOW-IT-ALL NARCISSIST 1. Martha Stout, The Sociopath Next Door: The Ruthless versus the Rest of Us (New York: Broadway Books, 2005), 60. 2.

He feels superior in understanding to those in Washington who are responsible for the computer system he has hijacked. He enjoys the experience of thumbing his nose at authority and taking charge himself. With the founding of WikiLeaks, Assange found an even larger stage upon which to express his grandiose sense of self. He surely felt a passionate devotion to his cause—uncovering the government lies that preserve its power over the individual—but as the enterprise gained notoriety and he became a cult hero to millions, he increasingly saw himself as a sort of celebrity guru, often insisting that one person or another was in love with him, or wanted to be him. In his account of their years together at WikiLeaks, Daniel Domscheit-Berg paints a portrait of Assange as a man obsessed with his image, unwilling to share credit with collaborators, hostile to those who didn’t accord him due respect, and contemptuous of even those who supported him.14 He treated his collaborators as if they were his subjects.

Mindf*ck: Cambridge Analytica and the Plot to Break America by Christopher Wylie

4chan, affirmative action, Affordable Care Act / Obamacare, availability heuristic, Berlin Wall, Bernie Sanders, big-box store, Boris Johnson, British Empire, call centre, Chelsea Manning, chief data officer, cognitive bias, cognitive dissonance, colonial rule, computer vision, conceptual framework, cryptocurrency, Daniel Kahneman / Amos Tversky, desegregation, Dominic Cummings, Donald Trump, Downton Abbey, Edward Snowden, Elon Musk, Etonian, first-past-the-post, Google Earth, housing crisis, income inequality, indoor plumbing, information asymmetry, Internet of things, Julian Assange, Lyft, Marc Andreessen, Mark Zuckerberg, Menlo Park, move fast and break things, move fast and break things, Network effects, new economy, obamacare, Peter Thiel, Potemkin village, recommendation engine, Renaissance Technologies, Robert Mercer, Ronald Reagan, Rosa Parks, Sand Hill Road, Scientific racism, Shoshana Zuboff, side project, Silicon Valley, Skype, uber lyft, unpaid internship, Valery Gerasimov, web application, WikiLeaks, zero-sum game

In their first meeting, Nix flirted with Kaiser, saying to her, “Let me get you drunk and steal all your secrets.” She had grown up in a wealthy area outside of Chicago and attended Phillips Academy, an exclusive private school in Massachusetts (alma mater of both Presidents Bush). She went to the University of Edinburgh and afterward got involved in projects in Libya. Once there, she met a barrister named John Jones who represented not only Saif Qaddafi, Muammar Qaddafi’s son, but also Julian Assange of WikiLeaks. Jones was a well-respected member of the British bar. Kaiser started consulting for him and, as a result, became acquainted with Assange. She started working at Cambridge Analytica toward the end of 2014, just as I was leaving. Cambridge Analytica created a two-pronged approach to swaying the Nigerian election. First they would seek out damaging information—kompromat—on Buhari. And, second, they would produce a video designed to terrify people from voting for him.

Over the summer and into the fall, Trump and Putin exchanged admiring comments, and I started thinking back on the weird Russia connections I’d noticed at Cambridge Analytica. Kogan’s ties to St. Petersburg. The meeting with Lukoil executives. Sam Patten’s boasts about working with the Russian government. Cambridge Analytica’s internal memos alluding to Russian intelligence. The Putin questions inexplicably inserted into our research. And even Brittany Kaiser’s apparent connection to Julian Assange and WikiLeaks. At the time, I had thought these were strange events, each one incidental to the others. But now they began to seem like something more. Trump became the GOP nominee at the Republican National Convention on July 19. If my hunch was correct, Cambridge Analytica was not only using the data tool I had worked on to manipulate American voters into supporting him, it may have been knowingly or unknowingly working with Russians to sway the election.

But I’ve always hated the expression “smoking gun,” because it means nothing to an actual investigator. Instead, investigators compile small pieces of information—a fingerprint, a saliva sample, tire tracks, a strand of hair. In this case, Sam Patten worked for CA after working on pro-Russian campaigns in Ukraine; CA tested American attitudes toward Vladimir Putin; SCL’s work for NATO made it a Russian intel target; Brittany Kaiser used to consult for Julian Assange’s legal team; the head psychologist who was collecting Facebook data for CA was making trips to Russia to present lectures about social media profiling, one of which was titled “New Methods of Communication as an Effective Political Instrument”; CA systems were accessed by IP addresses that resolved to Russia and other CIS countries; memos referenced ex–Russian security services; and we have Alexander Nix telling Lukoil about Cambridge Analytica’s U.S. data sets and disinformation capacity.

pages: 267 words: 82,580

The Dark Net by Jamie Bartlett

3D printing, 4chan, bitcoin, blockchain, brain emulation, carbon footprint, creative destruction, crowdsourcing, cryptocurrency, deindustrialization, Edward Snowden, Filter Bubble, Francis Fukuyama: the end of history, global village, Google Chrome, Howard Rheingold, Internet of things, invention of writing, Johann Wolfgang von Goethe, Julian Assange, Kuwabatake Sanjuro: assassination market, life extension, litecoin, longitudinal study, Mark Zuckerberg, Marshall McLuhan, moral hazard, moral panic, Occupy movement, pre–internet, Ray Kurzweil, Ross Ulbricht, Satoshi Nakamoto, Skype, slashdot, technological singularity, technoutopianism, Ted Kaczynski, The Coming Technological Singularity, Turing test, Vernor Vinge, WikiLeaks, Zimmermann PGP

Phil Zimmermann is currently working on a project called Darkmail, an automatically end-to-end encrypted email service. Today there are hundreds of people like Amir and Miguel working on ingenious ways of keeping online secrets or preventing censorship, often in their own time, and frequently crowdfunded by users sympathetic to the cause. One is Smári McCarthy. Smári is unashamedly geeky: a computer whizz and founding member of the radical Icelandic Pirate Party. He used to work with Julian Assange in the early days of WikiLeaks. Smári isn’t really a cypherpunk – he resists any association with Ayn Rand’s philosophy – but he does believe that privacy online is a fundamental right, and worries about state surveillance of the net. He also believes that crypto is a key part of a political project. He wants you to encrypt all your emails with PGP, even (or especially) those you send to friends and family members.

It certainly has in these groups. Chapter 3 Into Galt’s Gulch p.74 ‘Millions of dollars’ worth of Bitcoin . . .’ http://www.theguardian.com/technology/2013/apr/26/bitcoins-gain-currency-in-berlin (accessed 9 January 2014). p.76 ‘One day in late 1992 . . .’ Manne, R., ‘The Cypherpunk Revolutionary: Julian Assange’ in Making Trouble: Essays Against the New Australian Complacency, Black Inc, p.204. This story is also brilliantly told in Greenberg, A., This Machine Kills Secrets: Julian Assange, the Cypherpunks, and their Fight to Empower Whistleblowers. I draw on Greenberg’s account throughout. p.76 ‘The all believed that the great political issue . . .’ Levy, S., ‘Crypto-rebels’, http://www.wired.com/wired/archive/1.02/crypto.rebels.html?pg= 8&topic=, 1993 (accessed 23 February 2014); www.themonthly.com.au/issue/2011/march/1324265093/robert-manne/cypherpunk-revolutionary (accessed 23 February 2014).

., The English Defence League, Faith Matters, http://faith-matters.org/images/stories/fm-reports/english-defense-league-report.pdf. Simon, J., Lone Wolf Terrorism: Understanding the Growing Threat. Chapter 3 Into Galt’s Gulch Greenberg, A., This Machine Kills Secrets: Julian Assange, the Cypherpunks, and their Fight to Empower Whistleblowers. An invaluable guide to cypherpunk technology and ideology, and the significance of the cypherpunk philosophy to whistleblowers. Levy, S., ‘Crypto-rebels’ in Wired and Crypto: How the Code Rebels Beat the Government Saving Privacy in a Digital Age. ‘Crypto-rebels’ was the first mainstream account of the cypherpunks; while Crypto remains the best account of the movement overall. Manne, R., ‘The Cypherpunk Revolutionary: Julian Assange’, in Making Trouble: Essays Against the New Australian Complacency May, T., Cyphernomicom, Tim May’s book-length essay, providing an excellent insight into the cypherpunk philosophy.

pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier

23andMe, Airbnb, airport security, AltaVista, Anne Wojcicki, augmented reality, Benjamin Mako Hill, Black Swan, Boris Johnson, Brewster Kahle, Brian Krebs, call centre, Cass Sunstein, Chelsea Manning, citizen journalism, cloud computing, congestion charging, disintermediation, drone strike, Edward Snowden, experimental subject, failed state, fault tolerance, Ferguson, Missouri, Filter Bubble, Firefox, friendly fire, Google Chrome, Google Glasses, hindsight bias, informal economy, Internet Archive, Internet of things, Jacob Appelbaum, Jaron Lanier, John Markoff, Julian Assange, Kevin Kelly, license plate recognition, lifelogging, linked data, Lyft, Mark Zuckerberg, moral panic, Nash equilibrium, Nate Silver, national security letter, Network effects, Occupy movement, Panopticon Jeremy Bentham, payday loans, pre–internet, price discrimination, profit motive, race to the bottom, RAND corporation, recommendation engine, RFID, Ross Ulbricht, self-driving car, Shoshana Zuboff, Silicon Valley, Skype, smart cities, smart grid, Snapchat, social graph, software as a service, South China Sea, stealth mode startup, Steven Levy, Stuxnet, TaskRabbit, telemarketer, Tim Cook: Apple, transaction costs, Uber and Lyft, uber lyft, undersea cable, urban planning, WikiLeaks, zero day

One called MARINA: James Ball (30 Sep 2013), “NSA stores metadata of millions of web users for up to a year, secret files show,” Guardian, http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents. Another NSA database, MYSTIC: Ryan Devereaux, Glenn Greenwald, and Laura Poitras (19 May 2014), “Data pirates of the Caribbean: The NSA is recording every cell phone call in the Bahamas,” Intercept, https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas. Julian Assange (23 May 2014), “WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA,” WikiLeaks, https://wikileaks.org/WikiLeaks-statement-on-the-mass.html. The NSA stores telephone metadata: David Kravets (17 Jan 2014), “Obama revamps NSA phone metadata spying program,” Wired, http://www.wired.com/2014/01/obama-nsa. If you use encryption: I do not know whether this includes all encrypted SSL sessions. My guess is that the NSA is able to decrypt a lot of SSL in real time.

Antony Loewenstein (10 Jul 2014), “The ultimate goal of the NSA is total population control,” Guardian, http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-ofthe-nsa-is-total-population-control. we know it is doing so: Ryan Devereaux, Glenn Greenwald, and Laura Poitras (19 May 2014), “Data pirates of the Caribbean: The NSA is recording every cell phone call in the Bahamas,” Intercept, https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas. Julian Assange (23 May 2014), “WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA,” WikiLeaks, https://wikileaks.org/WikiLeaks-statement-on-the-mass.html. The agency’s 2013 budget: Barton Gellman and Greg Miller (29 Aug 2013), “‘Black budget’ summary details U.S. spy network’s successes, failures and objectives,” Washington Post, http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html.

E-mails you send to someone in private can easily be forwarded to others. Kids do this to each other all the time: forwarding private chats, photos, and messages, or showing each other private postings on social networking sites. One of the reasons apps that delete messages and photos after a few seconds are so popular among teenagers is that they help prevent this sort of thing. Old web pages have a way of sticking around. In 2010, WikiLeaks founder Julian Assange’s old OKCupid dating profile was dug up for public discussion. Even worse are people who use the Internet to shame and harass. Revenge porn—for the most part, ex-boyfriends posting compromising photographs of former girlfriends—is an extreme example. Mug shot extortion sites turn this sort of thing into a business. Mug shots are public record, but they’re not readily available. Owners of mug shot sites acquire the photos in bulk and publish them online, where everybody can find them, then charge individuals to remove their photos from the sites.

Hiding in Plain Sight: The Invention of Donald Trump and the Erosion of America by Sarah Kendzior

"side hustle", 4chan, Berlin Wall, Bernie Sanders, borderless world, Chelsea Manning, Columbine, corporate raider, desegregation, don't be evil, Donald Trump, drone strike, Edward Snowden, Ferguson, Missouri, Francis Fukuyama: the end of history, hiring and firing, illegal immigration, income inequality, Jaron Lanier, Jeff Bezos, Jeffrey Epstein, Julian Assange, Mohammed Bouazizi, Naomi Klein, Nelson Mandela, new economy, payday loans, plutocrats, Plutocrats, QAnon, Robert Hanssen: Double agent, Ronald Reagan, Silicon Valley, Skype, Thomas L Friedman, trickle-down economics, unpaid internship, white flight, WikiLeaks, Y2K, zero-sum game

Among the few who saw the threat clearly was computer scientist Jaron Lanier, who, in 2010, warned the public of a new danger: WikiLeaks. At the time, free speech advocates were hailing WikiLeaks, and its founder, Julian Assange, as defenders of government transparency. Their lionization of the leaker organization was largely due to frustration with the criminal impunity of the Bush administration. In February 2010, soldier Chelsea Manning exposed war crimes by sending classified documents to WikiLeaks, which WikiLeaks then published online. The emphasis on civilian victims led human rights advocates to believe that WikiLeaks would prove a formidable opponent for autocratic regimes. But after WikiLeaks dropped hacked documents from the US State Department in November, Lanier predicted the opposite—that WikiLeaks would ultimately ally with dictators and that social media networks would abet them: The WikiLeaks method punishes a nation—or any human undertaking—that falls short of absolute, total transparency, which is all human undertakings, but perversely rewards an absolute lack of transparency.

Nations have faced autocracy before and recovered. It is not easy, but it is possible: witness the peaceful revolutions that preceded the collapse of the USSR, the dissolution of apartheid in South Africa, and the fall of tyrants throughout history, from Hitler to Milosevic to Mubarak. But the crisis we face now is new. Its transnational nature and reliance on non–state actors who can use digital media to override borders—Julian Assange, the founder of WikiLeaks, is a prime example—means it lacks true historic precedent. Climate change is another factor that makes our current crisis distinct from any other. It is doubtful that this group of roving criminals and kleptocrats are the climate skeptics they purport to be. It is far more likely that they are, as Naomi Klein phrases it, “disaster capitalists” who see opportunity in a dying planet, and who will spare no expense in pursuit of their own preservation.16 Throughout this book, I describe how digital media has transformed state repression and citizen protest, and how globalization allowed organized crime to proliferate on an unparalleled scale.

I was also not surprised when, over the course of the next few years, officials gradually revealed that Russian hackers had targeted election systems in 2016 in all fifty states.23 The most damning evidence of this was brought forward by NSA whistleblower Reality Winner, a twenty-five-year-old Air Force veteran who anonymously sent proof of the attacks to the website The Intercept. The Intercept then published the leaked information in a way that made Winner easy for officials to identify and then arrest.24 The Intercept is home to Glenn Greenwald, the journalist famous for aiding Kremlin abettor Julian Assange and Edward Snowden, who gained asylum in Russia after fleeing the United States with classified documents. In 2018, Winner was jailed under the Espionage Act and was given the longest sentence in US history for her particular offense, totaling sixty-three months.25 She is banned from speaking to the press. No government official has bothered to interview Winner about her explosive findings, not even Robert Mueller.26 There remains to this day a publicly available NSA document showing that US voting infrastructure was attacked.

pages: 230 words: 60,050

In the Flow by Boris Groys

illegal immigration, Internet Archive, Julian Assange, late capitalism, Marshall McLuhan, means of production, WikiLeaks

Thus for Kojève the only way to remain a philosopher after the end of history was to enter universal service in the form of the European Commission. Kojève understood the path of universal service and administration as a secure one. WikiLeaks and Assange himself have proved that the path of universal service can also involve taking a substantial risk. They became dissidents of universal service, and so invented a new form of risk. Or rather, they thematized this risk and made it explicit by committing themselves to universal service and administration as a form of conspiracy from the very beginning. It is a true historical innovation. And it is to be expected that this innovation will have interesting consequences. ___________________________ 1‘In Conversation with Julian Assange Part I’, WikiLeaks.org, 23 May 2011. 2Ibid. This eBook is licensed to Edward Betts, edward@4angle.com on 04/01/2016 CHAPTER 12 Art on the Internet In recent decades the Internet has become the primary place for the production and distribution of writing, including literature; artistic practices; and, more generally, cultural archives.

The universal presents itself through the Internet as an impersonal sign flow. The subjectivities of the ‘content providers’ unavoidably drown in this flow. In this sense, the new universality – the universality of Internet clerks – creates a universal image after all. But this image is not a universal idea, project or commitment, but rather a universal event – the fact that the sign flow took this and not that form at a particular moment in time. Julian Assange described eloquently this new, postmodern, posthistorical universalist vision in a recent interview with Hans-Ulrich Obrist: There’s a universe of information, and we can imagine a sort of Platonic ideal in which we have an infinite horizon of information. It’s similar to the concept of the Tower of Babel. Imagine a field before us composed of all the information that exists in the world – inside government computers, people’s letters, things that have already been published, the stream of information coming out of televisions, this total knowledge of all the world, both accessible and inaccessible to the public.

This eBook is licensed to Edward Betts, edward@4angle.com on 04/01/2016 CHAPTER 11 WikiLeaks: The Revolt of the Clerks, or Universality as Conspiracy In our epoch we have become accustomed to protests and revolts in the name of particular identities and interests. The revolts in the name of universal projects, such as liberalism or communism, seem to belong to the past. But the activities of WikiLeaks serve no specific identities or interests. They, rather, have a general, universal goal: to guarantee the free flow of information. Thus, the phenomenon of WikiLeaks signals a reintroduction of universalism into politics. This fact alone makes the emergence of WikiLeaks highly significant. We know from history that only universalist projects can lead to real political change. But WikiLeaks signals not only a return of universalism but also the deep transformation that the notion of universalism has undergone during recent decades.

pages: 283 words: 85,824

The People's Platform: Taking Back Power and Culture in the Digital Age by Astra Taylor

A Declaration of the Independence of Cyberspace, American Legislative Exchange Council, Andrew Keen, barriers to entry, Berlin Wall, big-box store, Brewster Kahle, citizen journalism, cloud computing, collateralized debt obligation, Community Supported Agriculture, conceptual framework, corporate social responsibility, creative destruction, cross-subsidies, crowdsourcing, David Brooks, digital Maoism, disintermediation, don't be evil, Donald Trump, Edward Snowden, Fall of the Berlin Wall, Filter Bubble, future of journalism, George Gilder, Google Chrome, Google Glasses, hive mind, income inequality, informal economy, Internet Archive, Internet of things, invisible hand, Jane Jacobs, Jaron Lanier, Jeff Bezos, job automation, John Markoff, Julian Assange, Kevin Kelly, Kickstarter, knowledge worker, Mark Zuckerberg, means of production, Metcalfe’s law, Naomi Klein, Narrative Science, Network effects, new economy, New Journalism, New Urbanism, Nicholas Carr, oil rush, peer-to-peer, Peter Thiel, plutocrats, Plutocrats, post-work, pre–internet, profit motive, recommendation engine, Richard Florida, Richard Stallman, self-driving car, shareholder value, sharing economy, Silicon Valley, Silicon Valley ideology, slashdot, Slavoj Žižek, Snapchat, social graph, Steve Jobs, Stewart Brand, technoutopianism, trade route, Whole Earth Catalog, WikiLeaks, winner-take-all economy, Works Progress Administration, young professional

Deep investigations into questions about what had caused the blowout, the devastation of the local ecosystem and economy, the health risks associated with fuel and dispersants, and the work needed to be done monitoring the four thousand oil platforms and twenty-seven thousand old oil wells, many of them leaking, were well beyond the scope of any individual. Even Julian Assange had been unable to act independently, joining up with major news organizations like the New York Times and the Guardian to release the thousands of cables. WikiLeaks had been organized initially around the premise that the public would sift through and interpret raw data, collaboratively writing necessary analysis, making sense of the issues and evidence without professional censors and meddling middlemen. That turned out to be “not at all true,” Assange lamented. “Media are the only channels that have the motivation and resources required to have a real impact.” It wasn’t that the WikiLeaks mastermind had lost faith in people to think for themselves; rather, he recognized that they lacked the time the task required and the power to legitimize and publicize the results.

Sottek, “Google Joins the Lobbying Elite with Record Spending on Lawmakers in 2012,” The Verge, April 23, 2012, http://www.theverge.com/2012/4/23/2968686/google-joins-lobbying-elite. For “Copyright, Patent & Trademark” reports, see http://www.opensecrets.org/lobby/issuesum.php?id=CPT&year=2011. 15. Glenn Greenwald, “Surveillance State Democracy,” Salon, May 6, 2012, http://www.salon.com/2012/05/06/surveillance_state_democracy/singleton/. Also note a similar comment by Julian Assange, who said Google joining the SOPA fight “scared the hell out of me,” because the company was beginning to see itself as a “ ‘political player’ with enormous power over Congress.” Quoted in Julian Assange, Cypher-punks: Freedom and the Future of the Internet (New York: OR Books, 2012), 83. 16. David Segal, “CISPA Is the New SOPA: Help Kill It This Week,” Huffington Post, April 16, 2012. Segal also discusses this issue at length in the book he coedited with David Moon and Patrick Ruffini, Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet (New York: OR Books, 2013). 17.

.… But once you factor in money spent on schooling, the earnings I’ve received outside of aggregation-oriented writing positions is still in the bloodiest shade of red imaginable. It’s unlikely the numbers will ever even out.”43 4 UNEQUAL UPTAKE Not long after WikiLeaks released its enormous cache of classified diplomatic cables, making the private observations of jaded attachés public for all to see, I spent a Saturday afternoon at a quickly assembled conference trying to make sense of the implications. The conversation hinged on the tangled theme of media, technology, and politics. Does WikiLeaks represent a new kind of transnational investigative journalism? Has the Web made us all reporters? Is transparency an unambiguous good? Should all information be free, to everyone, everywhere? The United States government had been caught off its guard and the audience was electrified by the possibilities of networked people power.

The Data Journalism Handbook by Jonathan Gray, Lucy Chambers, Liliana Bounegru

Amazon Web Services, barriers to entry, bioinformatics, business intelligence, carbon footprint, citizen journalism, correlation does not imply causation, crowdsourcing, David Heinemeier Hansson, eurozone crisis, Firefox, Florence Nightingale: pie chart, game design, Google Earth, Hans Rosling, information asymmetry, Internet Archive, John Snow's cholera map, Julian Assange, linked data, moral hazard, MVC pattern, New Journalism, openstreetmap, Ronald Reagan, Ruby on Rails, Silicon Valley, social graph, SPARQL, text mining, web application, WikiLeaks

Quoting and sharing source materials is in the nature of the hyperlink structure of the Web, and the way we are accustomed to navigating information today. Going further back, the principle that sits at the foundation of the hyperlinked structure of the Web is the citation principle used in academic works. Quoting and sharing the source materials and the data behind the story is one of the basic ways in which data journalism can improve journalism, what WikiLeaks founder Julian Assange calls “scientific journalism.” By enabling anyone to drill down into data sources and find information that is relevant to them, as well as to to verify assertions and challenge commonly received assumptions, data journalism effectively represents the mass democratization of resources, tools, techniques, and methodologies that were previously used by specialists; whether investigative reporters, social scientists, statisticians, analysts, or other experts.

What we wanted to do was enable our team of specialist reporters to get great human stories from the information—and we wanted to analyze it to get the big picture, to show how the war really is going. It was central to what we would do quite early on that we would not publish the full database. WikiLeaks was already going to do that and we wanted to make sure that we didn’t reveal the names of informants or unnecessarily endanger NATO troops. At the same time, we needed to make the data easier to use for our team of investigative reporters led by David Leigh and Nick Davies (who had negotiated releasing the data with Julian Assange). We also wanted to make it simpler to access key information, out there in the real world, as clear and open as we could make it. The data came to us as a huge Excel file; over 92,201 rows of data, some with nothing in it at all or poorly formatted.

But the game-changer for data journalism happened in spring 2010, beginning with one spreadsheet: 92,201 rows of data, each one containing a detailed breakdown of a military event in Afghanistan. This was the WikiLeaks war logs. Part one, that is. There were to be two more episodes to follow: Iraq and the cables. The official term for the first two parts was SIGACTS: the US military Significant Actions Database. News organizations are all about geography—and proximity to the news desk. If you’re close, it’s easy to suggest stories and become part of the process; conversely, out of sight is literally out of mind. Before WikiLeaks, we were placed on a different floor, with graphics. Since WikiLeaks, we have sat on the same floor, next to the newsdesk. It means that it’s easier for us to suggest ideas to the desk, and for reporters across the newsroom to think of us to help with stories.

pages: 903 words: 235,753

The Stack: On Software and Sovereignty by Benjamin H. Bratton

1960s counterculture, 3D printing, 4chan, Ada Lovelace, additive manufacturing, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Amazon Mechanical Turk, Amazon Web Services, augmented reality, autonomous vehicles, basic income, Benevolent Dictator For Life (BDFL), Berlin Wall, bioinformatics, bitcoin, blockchain, Buckminster Fuller, Burning Man, call centre, carbon footprint, carbon-based life, Cass Sunstein, Celebration, Florida, charter city, clean water, cloud computing, connected car, corporate governance, crowdsourcing, cryptocurrency, dark matter, David Graeber, deglobalization, dematerialisation, disintermediation, distributed generation, don't be evil, Douglas Engelbart, Douglas Engelbart, Edward Snowden, Elon Musk, en.wikipedia.org, Eratosthenes, Ethereum, ethereum blockchain, facts on the ground, Flash crash, Frank Gehry, Frederick Winslow Taylor, future of work, Georg Cantor, gig economy, global supply chain, Google Earth, Google Glasses, Guggenheim Bilbao, High speed trading, Hyperloop, illegal immigration, industrial robot, information retrieval, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Jacob Appelbaum, Jaron Lanier, Joan Didion, John Markoff, Joi Ito, Jony Ive, Julian Assange, Khan Academy, liberal capitalism, lifelogging, linked data, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, McMansion, means of production, megacity, megastructure, Menlo Park, Minecraft, MITM: man-in-the-middle, Monroe Doctrine, Network effects, new economy, offshore financial centre, oil shale / tar sands, packet switching, PageRank, pattern recognition, peak oil, peer-to-peer, performance metric, personalized medicine, Peter Eisenman, Peter Thiel, phenotype, Philip Mirowski, Pierre-Simon Laplace, place-making, planetary scale, RAND corporation, recommendation engine, reserve currency, RFID, Robert Bork, Sand Hill Road, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley ideology, Slavoj Žižek, smart cities, smart grid, smart meter, social graph, software studies, South China Sea, sovereign wealth fund, special economic zone, spectrum auction, Startup school, statistical arbitrage, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, Superbowl ad, supply-chain management, supply-chain management software, TaskRabbit, the built environment, The Chicago School, the scientific method, Torches of Freedom, transaction costs, Turing complete, Turing machine, Turing test, undersea cable, universal basic income, urban planning, Vernor Vinge, Washington Consensus, web application, Westphalian system, WikiLeaks, working poor, Y Combinator

(The next five sentences then repeat the oldest and most conventional calls for general well-being through measured oversight.) By comparison Assange's When Google Met Wikileaks is a fascinating, self-contradictory, hyperactive tangle of ideas, accusations, and bizarre rationalizations. Within critical Google discourse it is in a league of its own, for both better or worse. Julian Assange, When Google Met Wikileaks (New York: OR Books, 2014). 64.  See Julian Assange, “The Banality of ‘Don't Be Evil,’” New York Times, June 1, 2013, http://www.nytimes.com/2013/06/02/opinion/sunday/the-banality-of-googles-dont-be-evil.html It was later republished in Assange, When WikiLeaks Met Google. 65.  As recently occurred in Turkey, when the AK Party tried to shut down Twitter, and the government also tried to shut off access to Google DNS as well.

See, for example, Jaron Lanier, Who Owns the Future? (New York: Simon & Schuster, 2013). 64.  See Danielle Citron, “Bright Ideas: Anita Allen's Unpopular Privacy,” Concurring Opinions, January 13, 2012, http://www.concurringopinions.com/archives/2012/01/bright-ideas-anita-allens-unpopular-privacy.html. 65.  Jacob Applebaum, Andy Mueller-Maguhn, Jeremie Zimmermann, and Julian Assange, “Episode 8, Part 1,” WikiLeaks World Tomorrow, April 2012, https://worldtomorrow.wikileaks.org/episode-8.html.If you look at it from a market perspective, I'm convinced that there is a market in privacy that has been mostly left unexplored, so maybe there will be an economic drive for companies to develop tools that will give users the in-dividual ability to control their data and communication. Maybe this is one way that we can solve that problem.

See, for example, Nikolai von Kreitor, “The Concept of Grossraum in Carl Schmitt's Jurisprudence: The Historical Necessity of a New Russian Grossraum,” August 7, 1970, http://www.amerika.org/globalism/the-concept-of-grossraum-in-carl-schmitts-jurisprudence-nikolai-von-kreitor/. This is the language of today's Russian Eurasianists, France's Nouvelle Droite, Japanese imperial revisionists, as well, it must be said, of some voices on the European Left. 34.  For a melodramatic but not uninformed account, see Julian Assange, When WikiLeaks Met Google (N.p.: OR Books, 2014). 35.  See, for example, the European Schengen Cloud, or Brazil's proposed “independent Internet”: http://www.itworld.com/article/2705173/networking-hardware/bric-nations-plan-their-own–independent-internet.html. 36.  Chris C. Demchak and Peter J. Dombrowski, “Rise of a Cybered Westphalian Age: The Coming Age,” Strategic Studies Quarterly 5, no. 1 (2011): 31–62. 37. 

pages: 226 words: 71,540

Epic Win for Anonymous: How 4chan's Army Conquered the Web by Cole Stryker

4chan, barriers to entry, Berlin Wall, Chelsea Manning, cognitive dissonance, Columbine, commoditize, creative destruction, crowdsourcing, Firefox, future of journalism, hive mind, informal economy, Internet Archive, Julian Assange, Kickstarter, Mark Zuckerberg, Marshall McLuhan, Mason jar, pre–internet, Silicon Valley, slashdot, social web, Stephen Hawking, Steve Jobs, Stewart Brand, technoutopianism, wage slave, We are Anonymous. We are Legion, Whole Earth Catalog, WikiLeaks

No, it’s not like that. It’s simply that US intelligence is able to bring to bear legal and political pressure on them. And it’s costly for them to hand out records one by one, so they have automated the process. Everyone should understand that when they add their friends to Facebook, they are doing free work for United States intelligence agencies in building this database for them. So declared WikiLeaks founder Julian Assange in May 2011 during an interview with Russian news site RT. A spokesman for Facebook responded to CNET: We don’t respond to pressure, we respond to compulsory legal process . . . There has never been a time we have been pressured to turn over data [and] we fight every time we believe the legal process is insufficient. The legal standards for compelling a company to turn over data are determined by the laws of the country, and we respect that standard.

Anonymouse thinks that the press is asking the wrong questions, claiming that they tend to focus on the illegal hacks rather than the illegal acts that the hackers are able to expose. He says that most of the media coverage belies a “sick” acceptance of HBGary’s activities, using government power to spy on its citizens. He draws parallels to the freedom-fighting actions of Anonymous and those of Bradley Manning and Julian Assange, who have also experienced a fair amount of negative press. How about prosecuting the soldiers named in one of the Afghan war diaries as having shot a bunch of unarmed teenagers? The number one response I’ve noticed when I argue about this is “Well this is the real world, corruption happens, deal with it.” I’m left gaping. Sure it happens. Murder and rape happen too, does that mean we should just say “Oh sure we’ll just leave the murderers alone, it happens.

His impotent threats, like so many of those Anonymous has targeted, were sheepishly removed a short time later after his site was brought down again. Then Anonymous went after the RIAA because it sought legal action against file sharing site Limewire. In December 2010, Amazon, Paypal, Bank of America, PostFinance, MasterCard, and Visa decided to stop processing donations for the global news leak network WikiLeaks, which had recently caused global controversy by posting sensitive internal documents. These payment-processing sites had bowed to political pressure, refusing to work with WikiLeaks. In retaliation, Anonymous launched DDoS attacks against several of these companies, successfully bringing down the websites for MasterCard and Visa. A 16-year-old boy from the Netherlands was arrested in relation to the attack, and the FBI is probably still investigating. HBGary Federal Hack In February 2011, Aaron Barr, the chief executive of the security firm HBGary Federal, announced that he’d infiltrated Anonymous and would reveal his findings in an upcoming conference.

pages: 390 words: 96,624

Consent of the Networked: The Worldwide Struggle for Internet Freedom by Rebecca MacKinnon

A Declaration of the Independence of Cyberspace, Bay Area Rapid Transit, Berlin Wall, business cycle, business intelligence, Cass Sunstein, Chelsea Manning, citizen journalism, cloud computing, cognitive dissonance, collective bargaining, conceptual framework, corporate social responsibility, Deng Xiaoping, digital Maoism, don't be evil, Filter Bubble, Firefox, future of journalism, illegal immigration, Jaron Lanier, Jeff Bezos, John Markoff, Joi Ito, Julian Assange, Mark Zuckerberg, Mikhail Gorbachev, MITM: man-in-the-middle, national security letter, online collectivism, Panopticon Jeremy Bentham, Parag Khanna, pre–internet, race to the bottom, Richard Stallman, Ronald Reagan, sharing economy, Silicon Valley, Silicon Valley startup, Skype, Steve Crocker, Steven Levy, WikiLeaks

But without clear transparency and accountability about how, when, and under what specific circumstances personal information is being collected and used, citizens have good reason to worry about the growth of the state’s “panoptic” power. WIKILEAKS AND THE FATE OF CONTROVERSIAL SPEECH WikiLeaks and several news organizations that the whistle-blowing organization had chosen as partners published the first batch of classified US diplomatic cables, leaked by disgruntled US Army Private Bradley Manning, in November 2010. Vice President Joseph Biden declared WikiLeaks’ leader, Julian Assange, to be a “digital terrorist.” Senator Joe Lieberman declared that “WikiLeaks’ illegal, outrageous, and reckless acts have compromised our national security and put lives at risk around the world.” Meanwhile, the WikiLeaks “Cablegate” website, dedicated to showcasing the leaked diplomatic cables, came under distributed denial of service attacks of unknown origin.

Regardless of whether one views the intentions and consequences of WikiLeaks’ release of diplomatic cables favorably, the US government’s response to WikiLeaks highlights a troubling murkiness, opacity, and lack of public accountability in the power relationships between government and Internet-related companies. In a speech in February 2011, Secretary of State Hillary Clinton sought to distance the State Department—and the US government more generally—from individual politicians and media commentators who called for Julian Assange’s head without any apparent interest in due process. She also made the point that the US government did not pressure private companies such as Amazon and PayPal to sever their ties with WikiLeaks. But through subsequent reporting in newspapers and research by civil liberties lawyers, it has also become clear that the companies were influenced by government statements and opinions.

These included a letter by State Department legal adviser Harold Koh, in which he wrote that the “violation of the law is ongoing” as long as WikiLeaks continues to publish the leaked diplomatic cables. As Harvard legal scholar Yochai Benkler pointed out in a group e-mail discussion with colleagues about WikiLeaks and the State Department’s actions (which I am quoting with his permission), Koh’s assertion was patently “false, as a matter of constitutional law.” The Justice Department has not managed to bring a viable case to a court of law against WikiLeaks or any other entity involved with publishing the cables. Benkler argued the government had no case unless it could prove that somebody involved with WikiLeaks directly conspired with Manning. What Benkler and many other constitutional scholars find insidious about the US government’s approach to WikiLeaks is that since the government has no genuine case against the publishers, its assertion of WikiLeaks’ illegality—no matter how groundless—“leaves room for various extralegal avenues that can be denied as not under your control to do the suppression work.”

pages: 322 words: 84,752

Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up by Philip N. Howard

Affordable Care Act / Obamacare, Berlin Wall, bitcoin, blood diamonds, Bretton Woods, Brian Krebs, British Empire, butter production in bangladesh, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, corporate social responsibility, creative destruction, crowdsourcing, digital map, Edward Snowden, en.wikipedia.org, failed state, Fall of the Berlin Wall, feminist movement, Filter Bubble, Firefox, Francis Fukuyama: the end of history, Google Earth, Howard Rheingold, income inequality, informal economy, Internet of things, Julian Assange, Kibera, Kickstarter, land reform, M-Pesa, Marshall McLuhan, megacity, Mikhail Gorbachev, mobile money, Mohammed Bouazizi, national security letter, Nelson Mandela, Network effects, obamacare, Occupy movement, packet switching, pension reform, prediction markets, sentiment analysis, Silicon Valley, Skype, spectrum auction, statistical model, Stuxnet, trade route, undersea cable, uranium enrichment, WikiLeaks, zero day

Its operations are not always successful, sometimes doing damage more than raising awareness. When overwhelmed, governments have begun to address Anonymous as an equal in negotiation. The government of the Philippines has tried to engage with the group by making concessions and involving it in national cyberstrategy.18 Internet pundits have added to the chaos of international politics. Julian Assange’s online WikiLeaks project exposed diplomatic correspondence and upset many delicately balanced relationships among states and between power brokers. Both Assange and Edward Snowden decided that democracies were the least likely to provide them with just treatment as whistle blowers. The Russians gave Assange an online talk show and have sheltered Snowden. Moreover, many kinds of authoritarian regimes like Russia now employ their own social media gurus to engage with the public.

Srđa Popović, the Serb who in 2000 mobilized the resistance to end Slobodan Milošević’s rule, went on in 2003 to train protesters for Georgia’s “Rose Revolution,” Ukraine’s 2005 “Orange Revolution,” and the Maldives’ revolution in 2007, before training activists in Egypt’s April 6 Movement in 2008. Popović’s book Nonviolent Struggle: 50 Crucial Points has been downloaded thousands of times.19 For the presidents of countries and companies, people like Aaron Swartz, Chelsea Manning, and Julian Assange are threats to national security and the corporate bottom line. But in many networks they are heroes. Every few years, hacktivists and whistle blowers turn national security and diplomacy upside down by putting large amounts of previously secret content online. Conservative security analysts and industry pundits often react hostilely to people who play with information technologies and exploit consumer electronics beyond designers’ intent.

Moises Naim, “Mafia States: Organized Crime Takes Office,” Foreign Affairs 91 (May 2012): 112. 26. Ibid. 27. Symantec, Norton Report 2013: Cost per Cybercrime Victim Up 50 Percent (Mountain View, CA: Symantec, October 2013), accessed September 30, 2014, http://www.symantec.com/about/news/release/article.jsp?prid=20131001_01. 28. Luke Harding, “WikiLeaks Cables: Russian Government ‘Using Mafia for Its Dirty Work,’” Guardian, December 1, 2010, accessed September 30, 2014, http://www.theguardian.com/world/2010/dec/01/wikileaks-cable-spain-russian-mafia. 29. Homi Kharas and Andrew Rogerson, Horizon 2025: Creative Destruction in the Aid Industry (London: Overseas Development Institute, July 2012), accessed September 30, 2014, http://www.aidmonitor.org.np/reports/horizon%202012.pdf. 30. “Where Life Is Cheap and Talk Is Loose,” Economist, March 17, 2011, accessed September 30, 2014, http://www.economist.com/node/18396240. 31.

pages: 269 words: 79,285

Silk Road by Eileen Ormsby

4chan, bitcoin, blockchain, Brian Krebs, corporate governance, cryptocurrency, Edward Snowden, fiat currency, Firefox, Julian Assange, litecoin, Mark Zuckerberg, Network effects, peer-to-peer, Ponzi scheme, profit motive, Right to Buy, Ross Ulbricht, Satoshi Nakamoto, stealth mode startup, Ted Nelson, trade route, Turing test, web application, WikiLeaks

Although Nakamoto’s initial posts had described his vision for an absence of regulation, his later posts remained technical and academic until WikiLeaks began to canvass the viability of accepting bitcoin. Nakamoto was adamant that he did not want his creation associated with the whistleblowing site. ‘No, don’t “bring it on”,’ he wrote. ‘I make this appeal to WikiLeaks not to try to use Bitcoin. Bitcoin is a small beta community in its infancy. You would not stand to get more than pocket change, and the heat you would bring would likely destroy us at this stage.’ He seemed more focused on the potential effects on his invention rather than any judgments about Julian Assange and his website. Nakamoto’s only other political statement was unearthed by cryptographers and was embedded in the source code of bitcoin itself, a little Easter egg for determined crypto-sleuths.

Like that of Nakamoto, Dread Pirate Roberts’ cult status grew. Articles painting him as a hero and visionary were no longer confined to a few fringe online publications. Forbes started to report regularly on Silk Road and its owner in positive terms. The magazine published a collection of Roberts’ quotes, describing him as a ‘principled libertarian and cypherpunk in the same vein as WikiLeaks founder Julian Assange and bitcoin creator Satoshi Nakamoto’. Although many would be appalled at the notion of a drug dealer as a hero, those who were against prohibition believed Silk Road offered a better, safer way for users to buy the drugs they would acquire anyway. As one member put it, ‘I came for the drugs and stayed for the revolution.’ That revolution played out largely in an entire section of the Silk Road forums called ‘Philosophy, Economics and Law’, which hosted many passionate debates about prohibition, legalisation and decriminalisation.

It is a little ironic that this is a project that is likely co-funded by the US government and organised crime. ‘Tor’s original design was to give users privacy and anonymity online and that’s still the core of what we do,’ Lewman said. ‘The vast majority of Tor usage is by normal people who are just looking to not give out all their information; who they are, where they are and every website they visit. Of course jerks and criminals do use Tor but frankly they have far better options.’ WikiLeaks is one example of an organisation that took advantage of darknets to maintain the integrity of its submissions, recommending that those who required anonymity when whistleblowing use Tor. Even if a server were to be confiscated, there would be little risk to users of the site, because there would be no IP trail and no typical user traffic trails that led out of the server. Conversely, traffic of visitors was also protected from their end, because they would not leave a trail of where they were going or what they were doing when they got there.

pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State by Barton Gellman

4chan, A Declaration of the Independence of Cyberspace, active measures, Anton Chekhov, bitcoin, Cass Sunstein, cloud computing, corporate governance, crowdsourcing, data acquisition, Debian, desegregation, Donald Trump, Edward Snowden, financial independence, Firefox, GnuPG, Google Hangouts, informal economy, Jacob Appelbaum, job automation, Julian Assange, MITM: man-in-the-middle, national security letter, planetary scale, private military company, ransomware, Robert Gordon, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Saturday Night Live, Silicon Valley, Skype, social graph, standardized shipping container, Steven Levy, telepresence, undersea cable, web of trust, WikiLeaks, zero day, Zimmermann PGP

“That would be dead man material,” he said elliptically. He was referring, as he had done with me before, to a “dead man’s switch,” a device or arrangement according to which the most sensitive files in his possession would somehow come to light automatically in circumstances he did not specify. Julian Assange of WikiLeaks had made an explicit arrangement like this in 2011, distributing online an encrypted “insurance file” and threatening to release the decryption key if the U.S. government did anything to harm him or shut down WikiLeaks. Snowden never made this kind of threat himself, but Glenn Greenwald did so in a published interview. “Snowden has enough information to cause more harm to the U.S. government in a single minute than any other person has ever had,” Greenwald told the Argentinian daily La Nación.

The government had never tried to prosecute a journalist or publisher under the Espionage Act of 1917, which is so broadly drafted that it could be read as banning any news story about “national defense information,” whether classified or not. No one knew for certain how such a prosecution would fare under First Amendment analysis. In mid-2019, the Trump administration decided to test the question. In an indictment unsealed against Julian Assange, the founder of WikiLeaks, the Justice Department charged him with sixteen counts of espionage, three of them based entirely on his communication of secrets “to all the world by publishing them on the Internet.” Whether you wish to call Assange a “journalist” or not, the distinction is not important legally. The elements of the crime alleged against him—disclosure of secret information to the public—are very hard to distinguish from what I did with Snowden’s NSA archive, even if I was more selective about it.

In order to download the files at home, I would need an “SSH private key” that I did not bring on the trip. Fourth Amendment does not apply: See “Notes: The Border Search Muddle,” Harvard Law Review 132, no. 8 (June 1, 2019): 2278–92, https://harvardlawreview.org/2019/06/the-border-search-muddle/. “The damage is incalculable”: George Cotter, email to author, December 1, 2016. Advocates for radical transparency: Julian Assange of WikiLeaks and John Young of the leak website Cryptome often criticized me, along with Glenn Greenwald and Laura Poitras, for holding back any documents at all. See, for example, “Snowden Long Drip Pie Charts,” March 14, 2014, at https://perma.cc/FZ9M-ZXPF. trafficking in stolen goods: Publishing information obtained by theft is not trafficking in stolen goods in part because the Supreme Court interprets the National Stolen Property Act, 18 U.S.C. §§ 2314 and 2315, as limited to tangible “goods, wares, or merchandise.”

pages: 301 words: 85,263

New Dark Age: Technology and the End of the Future by James Bridle

AI winter, Airbnb, Alfred Russel Wallace, Automated Insights, autonomous vehicles, back-to-the-land, Benoit Mandelbrot, Bernie Sanders, bitcoin, British Empire, Brownian motion, Buckminster Fuller, Capital in the Twenty-First Century by Thomas Piketty, carbon footprint, cognitive bias, cognitive dissonance, combinatorial explosion, computer vision, congestion charging, cryptocurrency, data is the new oil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, drone strike, Edward Snowden, fear of failure, Flash crash, Google Earth, Haber-Bosch Process, hive mind, income inequality, informal economy, Internet of things, Isaac Newton, John von Neumann, Julian Assange, Kickstarter, late capitalism, lone genius, mandelbrot fractal, meta analysis, meta-analysis, Minecraft, mutually assured destruction, natural language processing, Network effects, oil shock, p-value, pattern recognition, peak oil, recommendation engine, road to serfdom, Robert Mercer, Ronald Reagan, self-driving car, Silicon Valley, Silicon Valley ideology, Skype, social graph, sorting algorithm, South China Sea, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, stem cell, Stuxnet, technoutopianism, the built environment, the scientific method, Uber for X, undersea cable, University of East Anglia, uranium enrichment, Vannevar Bush, WikiLeaks

Our demands for clarity and openness may appear to be a counter to opacity and classification, but they end up asserting the same logics. Under this analysis, the National Security Agency and Wikileaks share the same worldview, with differing ends. Both essentially believe that there is some secret at the heart of the world that, if only it can be known, will make everything better. Wikileaks wants transparency for all; the NSA only wants transparency for some – its enemies; but both function according to the same philosophy. Wikileaks’ original intent was not to become a kind of mirror to the NSA, but to break the whole machine. In 2006, in the very early days of Wikileaks, Julian Assange wrote an analysis of conspiratorial systems of government and how they can be attacked, entitled ‘Conspiracy as Governance’. For Assange, all authoritarian systems are conspiracies because their power depends on keeping secrets from their peoples.

, January 13, 2014, newamerica.org. 35.Jennifer King, Deirdre Mulligan, and Stephen Rafael, ‘CITRIS Report: The San Francisco Community Safety Program’, UC Berkeley, December 17, 2008, available at wired.com. 36.K. Pease, ‘A Review Of Street Lighting Evaluations: Crime Reduction Effects’, Crime Prevention Studies 10 (1999). 37.Stephen Atkins, ‘The Influence Of Street Lighting On Crime And Fear Of Crime’, Crime Prevention Unit Paper 28, UK Home Office, 1991, available at popcenter.org. 38.Julian Assange, ‘State and Terrorist Conspiracies’, Cryptome, November 10, 2006, cryptome.org. 39.Caroline Elkins, Imperial Reckoning: The Untold Story of Britain’s Gulag in Kenya, New York: Henry Holt and Company, 2005. 40.‘Owners Watched Fort McMurray Home Burn to Ground Over iPhone’, YouTube video, username: Storyful News, May 6, 2016. 8Conspiracy 1.Joseph Heller, Catch-22, New York: Simon & Schuster, 1961. 2.See James Bridle, ‘Planespotting’, blog post, December 18, 2013, booktwo.org, and other reports by the author. 3.For a good overview of the trial, see: Kevin Hall, The ABC Trial (2006), originally published at ukcoldwar.simplenet.com, archived at archive.li/1xfT4. 4.Richard Aldrich, GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency, New York: HarperPress, 2010. 5.Duncan Campbell, ‘GCHQ’ (book review), New Statesman, June 28, 2010, newstatesman.com. 6.Chris Blackhurst, ‘Police robbed of millions in plane fraud’, Independent, May 19, 1995, independent.co.uk. 7.US Air Force, Weather as a Force Multiplier: Owning the Weather in 2025, 1996, csat.au.af.mil. 8.

For Assange, all authoritarian systems are conspiracies because their power depends on keeping secrets from their peoples. Leaks undermine their power, not because of what is leaked, but because increased internal fear and paranoia degrades the system’s ability to conspire. What is damaging is the act of leaking itself, not the contents of any specific leak.38 As Wikileaks entered the public eye and Assange himself became an increasingly powerful and arrogant figure, the organisation became involved in a series of feuds with the intelligence agencies – and ultimately a tool for states to attack one another – and this realisation was lost. What replaced it was a mistaken belief in the power of the ‘smoking gun’: the single source or piece of evidence that would bring down authority. The problem of the smoking gun besets every strategy that depends on revelation to move opinion.

pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

air freight, Airbnb, Bernie Sanders, bitcoin, blockchain, call centre, clean water, data acquisition, Donald Trump, Edward Snowden, global supply chain, hive mind, Julian Assange, Just-in-time delivery, Kickstarter, Mikhail Gorbachev, open borders, pirate software, pre–internet, profit motive, ransomware, RFID, speech recognition, Steven Levy, Stuxnet, undersea cable, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

* * * ■ The flimsiness of the Guccifer 2.0 lie hardly mattered. The hackers sent the news site Gawker the Trump opposition research document, and it published a story on the file that received half a million clicks, robbing the Democrats of the ability to time the release of their Trump dirt. Soon, as promised, WikiLeaks began to publish a steady trickle of the hackers’ stolen data, too; after all, Julian Assange’s secret-spilling group had never been very particular about whether its “leaks” came from whistle-blowers or hackers. The documents, now with WikiLeaks’ stamp of credibility, began to be picked up by news outlets including The New York Times, The Washington Post, The Guardian, Politico, BuzzFeed, and The Intercept. The revelations were very real: It turned out the DNC had secretly favored the candidate Hillary Clinton over her opponent Bernie Sanders as the presumptive Democratic nominee for president, despite the committee’s purported role as a neutral arbiter for the party.

“The main part of the papers, thousands of files and mails, I gave to WikiLeaks. They will publish them soon,” Guccifer 2.0 wrote. “Fuck the Illuminati and their conspiracies!!!!!!!!!” That “Illuminati” reference and Guccifer 2.0’s name were meant to convey a kind of rogue hacktivist, stealing and leaking the documents of the powerful to upend the corrupt social order. The original Guccifer had been a Romanian amateur hacker named Marcel Lehel Lazăr who had broken into the email accounts of high-profile figures like Colin Powell, the Rockefeller family, and the sister of former president George W. Bush. Guccifer 2.0 took on the persona of a cocky eastern European cyberpunk who idolized figures like the original Guccifer, Edward Snowden, and Julian Assange. “Personally I think that I’m among the best hackers in the world,” he would write in a FAQ.

This time, in a blatant mockery: Andy Greenberg, “Russian Hackers Get Bolder in Anti-Doping Agency Attack,” Wired, Sept. 14, 2016, www.wired.com. The site, of course: Raphael Satter, “Inside Story: How Russia Hacked the Democrats’ Email,” Associated Press, Nov. 4, 2017, www.apnews.com. Another seemed to call for “open borders”: “HRC Paid Speeches,” email via WikiLeaks, sent Jan. 25, 2016, wikileaks.org, archived at bit.ly/2RRtcNA. The security firm Secureworks found the link: “Threat Group 4127 Targets Hillary Clinton Presidential Campaign,” June 16, 2016, www.secureworks.com, archived at bit.ly/2RecMtu. “I love WikiLeaks!”: Mark Hensch, “Trump: ‘I Love WikiLeaks,’ ” Hill, Oct. 10, 2016, thehill.com. But for the most part, Trump: Andy Greenberg, “A Timeline of Trump’s Strange, Contradictory Statements on Russian Hacking,” Wired, Jan. 4, 2017, www.wired.com. Trump’s obfuscation served Fancy Bear: Jake Sherman, “POLITICO/Morning Consult Poll: Only One-Third of Americans Say Russia Influenced 2016 Election,” Politico, Dec. 20, 2016, www.politico.com.

pages: 170 words: 49,193

The People vs Tech: How the Internet Is Killing Democracy (And How We Save It) by Jamie Bartlett

Ada Lovelace, Airbnb, Amazon Mechanical Turk, Andrew Keen, autonomous vehicles, barriers to entry, basic income, Bernie Sanders, bitcoin, blockchain, Boris Johnson, central bank independence, Chelsea Manning, cloud computing, computer vision, creative destruction, cryptocurrency, Daniel Kahneman / Amos Tversky, Dominic Cummings, Donald Trump, Edward Snowden, Elon Musk, Filter Bubble, future of work, gig economy, global village, Google bus, hive mind, Howard Rheingold, information retrieval, Internet of things, Jeff Bezos, job automation, John Maynard Keynes: technological unemployment, Julian Assange, manufacturing employment, Mark Zuckerberg, Marshall McLuhan, Menlo Park, meta analysis, meta-analysis, mittelstand, move fast and break things, move fast and break things, Network effects, Nicholas Carr, off grid, Panopticon Jeremy Bentham, payday loans, Peter Thiel, prediction markets, QR code, ransomware, Ray Kurzweil, recommendation engine, Renaissance Technologies, ride hailing / ride sharing, Robert Mercer, Ross Ulbricht, Sam Altman, Satoshi Nakamoto, Second Machine Age, sharing economy, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, smart cities, smart contracts, smart meter, Snapchat, Stanford prison experiment, Steve Jobs, Steven Levy, strong AI, TaskRabbit, technological singularity, technoutopianism, Ted Kaczynski, the medium is the message, the scientific method, The Spirit Level, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, too big to fail, ultimatum game, universal basic income, WikiLeaks, World Values Survey, Y Combinator

It allows people to communicate, browse and transact beyond the reach of government, making it significantly harder for the state to control information, and subsequently, its citizens. This is because of a simple-but-magic rule: due to some arcane properties of prime numbers, it takes far more computing power to decrypt something than to encrypt it.3 It’s like an egg: a lot easier to crack than to put back in its shell. Julian Assange, who was an active contributor to Timothy May’s email list, puts it this way: ‘the universe believes in encryption’. Crypto-anarchy in the UK Over the course of the nineties this remarkable group predicted, developed or helped spread several techniques that are now routinely employed by computer users to protect against various forms of surveillance. Timothy May proposed, among other things, secure cryptocurrencies, a tool enabling people to browse the web anonymously, an unregulated marketplace which he called ‘BlackNet’, where anything could be bought or sold without being tracked and a system of anonymous whistleblowing.

In the well-intentioned pursuit of privacy and freedom, we might risk undermining the entire edifice on which these rights are based. Most liberals have been very short-sighted about this, because they want total freedom and equality, without realising that the two are sometimes in tension. This is why the issue of encryption and privacy throws up peculiar political alliances. (The most notable of recent years is surely the idiotic social democratic love affair with crypto-anarchist Julian Assange.) Democracy is about individual liberty of course, but that’s only half the picture. It is also a system of coercion because your liberty must sometimes be taken away too. The state must be able to force you to pay tax, remove your passport, restrict your right to assemble and back it up with the use of force if it needs to by arresting you and throwing you in prison. The state’s control of information justifies and organises this system of coercion, through official taxation records, land registries, criminal records, censuses and passports.

During the US election the Russian Government took these Cold War techniques up several notches. Thousands of paid content producers pushed out pro-Trump or anti-Hillary content, flooding feeds and overwhelming serious hashtags with nonsense, making them unusable. Russian hackers ran very big Facebook pages, which created the illusion of grassroots support for Trump. They allegedly hacked Hillary Clinton’s private emails and shared them with the whistleblowing site WikiLeaks – who leaked them slowly over the campaign, and to good effect. They also ran an aggressive campaign of paid advertising on Facebook and Google. I won’t tell this story in full here, because it is still unfolding (at the time of writing, the investigation into alleged collusion between the Trump campaign and the Russian Government is ongoing).* But it seems that the purpose was obviously the same as Alamo: to win the information war, shape people’s reality and use the internet to subtly shift opinion in new and hidden ways.

pages: 74 words: 19,580

The 99.998271% by Simon Wood

banking crisis, clean water, drone strike, equal pay for equal work, Julian Assange, Occupy movement, offshore financial centre, Steve Jobs, WikiLeaks

This dangerous creature will not go down easily. It has all the money and owns most of the media and a large number of politicians. How long will it take before a way is found to limit the internet as well? As soon as it can be shown to be a credible threat to the status quo, how can we be sure it will not be taken out? Anyone who stands up to the empire is swatted down, as can be seen in the hysterical reaction to Wikileaks and Julian Assange, who could be extradited to the US where he can be held in indefinite detention. The Occupy Wall Street movement, at first ignored completely by the establishment media, is now feeling the full force of the propaganda mill, with protestors smeared as ‘hippies’ and ‘pot smokers’ with ‘no direction in their lives’ and so on. 41 The author of this book is not a professional journalist, so I hereby request that professional journalists in the media point out to me the part of the course in journalism they studied at college which says that journalists are supposed to criticize, insult, judge and demean the subjects of the stories they cover.

When Haiti passed a law in 2009 to raise the minimum wage from 24 to 61 cents an hour, US corporations like Levi Strauss and Hanes were furious. These corporations pay workers in Haiti, the poorest country in the western hemisphere, which is still struggling to recover from a devastating earthquake, extremely low wages to sew clothes in their sweatshops. A Wikileaks cable showed that the corporations lobbied the US State Department, who then had the US ambassador put pressure on Haiti’s president. The result? A new minimum wage of 31 cents an hour. This may never have been revealed had it not been released in a Wikileaks cable, demonstrating that the US government acts in secrecy. The justification for secrecy is usually national security interest, but it would be hard for anyone to place this in such a category. The American people were not to be informed of how their elected officials were interfering in a desperately poor country in their name.

Considering the current states of both countries, the question must be asked: are we insane? Unless this madness is stopped, tragedies like the following will continue to occur: on 15th March 2006, during a house raid in Iraq by US forces, a family and their children were handcuffed and then summarily executed with shots to the head. Philip Alston, the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, wrote the following in a letter (exposed by Wikileaks) to the then Secretary of State, Condoleeza Rice: “It would appear that when the MNF [Multinational Forces] approached the house,” Alston wrote, “shots were fired from it and a confrontation ensued” before the “troops entered the house, handcuffed all residents and executed all of them.” Mr. Faiz Hratt Khalaf, (aged 28), his wife Sumay’ya Abdul Razzaq Khuther (aged 24), their three children Hawra’a (aged 5) Aisha ( aged 3) and Husam (5 months old), Faiz’s mother Ms.

pages: 324 words: 106,699

Permanent Record by Edward Snowden

A Declaration of the Independence of Cyberspace, Berlin Wall, call centre, Chelsea Manning, cloud computing, cognitive dissonance, drone strike, Edward Snowden, Fall of the Berlin Wall, job-hopping, Julian Assange, Mark Zuckerberg, McMansion, Occupy movement, pattern recognition, peak oil, pre–internet, Rubik’s Cube, Silicon Valley, Skype, sovereign wealth fund, trade route, WikiLeaks, zero day

Kirk Wiebe and Ed Loomis—though the triumvirate I actually had in mind consisted of Thomas Drake, who disclosed the existence of TRAILBLAZER to journalists, and Daniel Ellsberg and Anthony Russo, whose disclosure of The Pentagon Papers helped expose the deceptions of the Vietnam War and bring it to an end. The final name I chose for my correspondence was “Verax,” Latin for “speaker of truth,” in the hopes of proposing an alternative to the model of a hacker called “Mendax” (“speaker of lies”)—the pseudonym of the young man who’d grow up to become WikiLeaksJulian Assange. You can’t really appreciate how hard it is to stay anonymous online until you’ve tried to operate as if your life depended on it. Most of the communications systems set up in the IC have a single basic aim: the observer of a communication must not be able to discern the identities of those involved, or in any way attribute them to an agency. This is why the IC calls these exchanges “non-attributable.”

Repayment of odious debt is not enforceable. With this announcement, Correa freed his people from decades of economic serfdom, though he made not a few enemies among the class of financiers who direct much of US foreign policy. Ecuador, at least in 2013, had a hard-earned belief in the institution of political asylum. Most famously, the Ecuadorean embassy in London had become, under Correa, the safe haven and redoubt of WikiLeaksJulian Assange. I had no desire to live in an embassy, perhaps because I’d already worked in one. Still, my Hong Kong lawyers agreed that, given the circumstances, Ecuador seemed to be the most likely country to defend my right to political asylum and the least likely to be cowed by the ire of the hegemon that ruled its hemisphere. My growing but ad hoc team of lawyers, journalists, technologists, and activists concurred.

It might be hard to remember, or even to imagine, but at the time when I first considered coming forward, the whistleblower’s forum of choice was WikiLeaks. Back then, it operated in many respects like a traditional publisher, albeit one that was radically skeptical of state power. WikiLeaks regularly joined up with leading international publications like the Guardian, the New York Times, Der Spiegel, Le Monde, and El País to publish the documents provided by its sources. The work that these partner news organizations accomplished over the course of 2010 and 2011 suggested to me that WikiLeaks was most valuable as a go-between that connected sources with journalists, and as a firewall that preserved sources’ anonymity. WikiLeaks’ practices changed following its publication of disclosures by US Army private Chelsea Manning—huge caches of US military field logs pertaining to the Iraq and Afghan wars, information about detainees at Guantanamo Bay, along with US diplomatic cables.

pages: 349 words: 114,038

Culture & Empire: Digital Revolution by Pieter Hintjens

4chan, airport security, AltaVista, anti-communist, anti-pattern, barriers to entry, Bill Duvall, bitcoin, blockchain, business climate, business intelligence, business process, Chelsea Manning, clean water, commoditize, congestion charging, Corn Laws, correlation does not imply causation, cryptocurrency, Debian, Edward Snowden, failed state, financial independence, Firefox, full text search, German hyperinflation, global village, GnuPG, Google Chrome, greed is good, Hernando de Soto, hiring and firing, informal economy, intangible asset, invisible hand, James Watt: steam engine, Jeff Rulifson, Julian Assange, Kickstarter, M-Pesa, mass immigration, mass incarceration, mega-rich, MITM: man-in-the-middle, mutually assured destruction, Naomi Klein, national security letter, Nelson Mandela, new economy, New Urbanism, Occupy movement, offshore financial centre, packet switching, patent troll, peak oil, pre–internet, private military company, race to the bottom, rent-seeking, reserve currency, RFC: Request For Comment, Richard Feynman, Richard Stallman, Ross Ulbricht, Satoshi Nakamoto, security theater, selection bias, Skype, slashdot, software patent, spectrum auction, Steve Crocker, Steve Jobs, Steven Pinker, Stuxnet, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, trade route, transaction costs, twin studies, union organizing, wealth creators, web application, WikiLeaks, Y2K, zero day, Zipf's Law

There are several strategies, as far as I can see. The most obvious and widely used is to attack any website that acts as a broker for leaks. WikiLeaks drew a massive amount of fire and fury for declaring its mission to be a broker for leaks, in 2006, leading to its founder Julian Assange infamously holed up in the Ecuadorian embassy in London, with Hollywood painting him in 2013 as a glory-seeking egomaniac. Threaten the powers that be, and you will pay. While it can be tricky to arrest and disappear a public figure, it is trivial to launch a "distributed denial of service attack," or DDoS, on any troublesome website. One simply tells hundreds of thousands of slave PCs to request the main page of the website, say wikileaks.org, at the same time. The simultaneous volume of demand overwhelms the server so that real users can't access it.

Chelsea née Bradley Manning and Edward Snowden are the two main figures here, heroes in a real sense. Other whistle blowers of note are Annie Machon, Gareth Williams, Russel Tice, Jeffrey Sterling, Stephen Jin-Woo Kim, Jesselyn Radack, Thomas Drake, Daniel Ellsberg, and William Binney. We then have the independent media who are willing to report these documents, at personal risk. There is Julian Assange, building wikileaks.org around Manning's leaks, and Glenn Greenwald and Laura Poitras, reporting in the Guardian on Edward Snowden's leaks. Again, heroic figures who have changed the course of history. We see academics like Dr Daniele Ganser, who know their history and are immune to this particular Narrative because they have seen so many like it. They look at events over the last twenty years and they see continuation of old patterns.

Big sites need hosting, and that costs money. WikiLeaks was the target of this in 2010, with US credit card processors cutting off all donations to the site. Despite not getting money from US contributors, WikiLeaks survived and got good press from being the victim of clearly abusive conduct by the US government and financial industry. So attacking a site will often just make it stronger. The very fact that authorities target a leaks site promotes its accuracy and importance. It is also technically hard to sustain. In 2011, Bank of America hired three firms to attack Wikileaks. One of the firms, HBGary Federal, was hacked by Anonymous, and the plan was discovered. Emails and documents uncovered in the hack outline several proposed attacks on WikiLeaks: Feed the fuel between the feuding groups.

Power Systems: Conversations on Global Democratic Uprisings and the New Challenges to U.S. Empire by Noam Chomsky, David Barsamian

affirmative action, Affordable Care Act / Obamacare, Albert Einstein, American ideology, Chelsea Manning, collective bargaining, colonial rule, corporate personhood, David Brooks, discovery of DNA, double helix, drone strike, failed state, Howard Zinn, hydraulic fracturing, income inequality, inflation targeting, Intergovernmental Panel on Climate Change (IPCC), Julian Assange, land reform, Martin Wolf, Mohammed Bouazizi, Naomi Klein, Nelson Mandela, new economy, obamacare, Occupy movement, oil shale / tar sands, pattern recognition, Powell Memorandum, quantitative easing, Ralph Nader, Ralph Waldo Emerson, single-payer health, sovereign wealth fund, The Wealth of Nations by Adam Smith, theory of mind, Tobin tax, union organizing, Upton Sinclair, uranium enrichment, WikiLeaks

After the uprising had already started, one French cabinet minister, Michèle Alliot-Marie, actually went to Tunisia for a vacation.17 This is a country that’s been under the thumb of France for a long time and is surely penetrated by French intelligence. But how much these leaks influenced the protests is an open question. I doubt that Tunisians cared very much about French and U.S. hypocrisy, which is all that WikiLeaks revealed—nothing that they didn’t know themselves. Talk about the connection between Daniel Ellsberg and Bradley Manning. Dan is an old friend. I was involved with him in helping release the Pentagon Papers, which I thought was a quite proper thing to do. I testified at his trial. In the case of Bradley Manning, he’s charged with having released material to Julian Assange, who distributed it on WikiLeaks.18 He’s been in prison now since May 2010, a large part of that in solitary confinement—which is torture. He’s been treated in rotten ways and been bitterly attacked. Here’s someone who is charged with doing something which, in my opinion, is not a crime but a service to the country.

In response to the question, “Name two countries that you think pose the biggest threat to you,” Israel received 88 percent, the United States 77 percent, and Iran 9 percent among those aged thirty-six and over and 11 percent among those thirty-six and under. 2010 Arab Public Opinion Survey. 16. Ian Black, “WikiLeaks Cables: Tunisia Blocks Site Reporting ‘Hatred’ of First Lady,” Guardian (London), 7 December 2010. Ian Black, “Profile: Zine al-Abidine Ben Ali,” Guardian (London), 14 January 2011. See also Amy Davidson, “Tunisia and WikiLeaks,” New Yorker, Close Read blog, 14 January 2011. 17. Steven Erlanger, “French Foreign Minister Urged to Resign,” New York Times, 3 February 2011. 18. Charlie Savage, “Soldier Faces 22 New WikiLeaks Charges,” New York Times, 2 March 2011. 19. Scott Shane, “Court Martial Recommended in WikiLeaks Case,” New York Times, 12 January 2012. 20. Stephanie Condon, “Obama Says Bradley Manning ‘Broke the Law,’” CBSNews.com, 22 April 2011. 21.

How does the United States square its trumpeting of the free flow of information and democratic rights of expression with its response to WikiLeaks? The profession of dedication to rights is always tinged with a fundamental hypocrisy: rights if we want them, not if we don’t. The clearest example of this is support for democracy. It’s pretty well established over many decades that the United States supports democracy only if it accords with strategic and economic objectives. Otherwise it opposes it. The United States is by no means alone on that, of course. The same is true of terror, aggression, torture, human rights, freedom of speech, whatever it might be. So the line that the enormous trove of information that was disseminated through WikiLeaks was somehow compromising U.S. security doesn’t wash. It compromised the security that governments are usually concerned about: their security from inspection by their own populations.

pages: 409 words: 112,055

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake

A Declaration of the Independence of Cyberspace, Affordable Care Act / Obamacare, Airbnb, Albert Einstein, Amazon Web Services, autonomous vehicles, barriers to entry, bitcoin, Black Swan, blockchain, borderless world, business cycle, business intelligence, call centre, Cass Sunstein, cloud computing, cognitive bias, commoditize, computer vision, corporate governance, cryptocurrency, data acquisition, DevOps, don't be evil, Donald Trump, Edward Snowden, Exxon Valdez, global village, immigration reform, Infrastructure as a Service, Internet of things, Jeff Bezos, Julian Assange, Kubernetes, Mark Zuckerberg, Metcalfe’s law, MITM: man-in-the-middle, move fast and break things, move fast and break things, Network effects, open borders, platform as a service, Ponzi scheme, ransomware, Richard Thaler, Sand Hill Road, Schrödinger's Cat, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, software as a service, Steven Levy, Stuxnet, technoutopianism, Tim Cook: Apple, undersea cable, WikiLeaks, Y2K, zero day

In the case of the CIA, however, there is little doubt about how the secrets were taken or by whom. Joshua Schulte, a CIA employee, was arrested by the FBI in August 2017 and charged with passing over eight thousand pages of highly classified information to Julian Assange, who subsequently posted them publicly on the WikiLeaks website. Assange, an Australian who had taken refuge in Ecuador’s London embassy, has been accused by numerous American authorities of acting in cooperation with Russian intelligence. The CIA documents were called Vault 7 by WikiLeaks, and they too revealed numerous zero-day exploits of widely used software, including products of Apple, Microsoft, and Samsung (e.g., allegedly a tool to listen to rooms in which Samsung televisions were installed, even when the television appeared to be turned off).

The pings came from hundreds of thousands of IoT devices, including nanny cams, more sophisticated surveillance and security cameras, and a host of other devices. All of those devices had been affected by a malicious bot, a piece of software that guided itself around the world looking for unprotected IoT devices to infect and take over. The bot was given a name by the cybersecurity world. They called it Mirai. Suspicions about who launched Mirai fell on the supporters in North America of the hacker Julian Assange, who has been linked to Russian intelligence and the hacking of the U.S. 2016 election. Word had been spreading that the United States was putting pressure on Ecuador to throw Assange out of their embassy in London, where he had taken refuge after arrest warrants were issued for him. Assange’s organization eventually publicly called on his supporters to “stop taking down the U.S. internet. You proved your point.”

in the Vault 7 documents: Semantic Security Response, “Longhorn: Tools used by cyberespionage group linked to Vault 7,” Symantec Official Blog, April 10, 2017, www.symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7. groups known as APT 3 and APT 10: Andrew Griffin, “Wikileaks Files Detail CIA ‘Umbrage’ Project, Which Would Allow Spies to Pin Attacks on Other Countries,” Independent, March 8, 2017, www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-files-cia-umbrage-hacker-secret-spies-explained-countries-donald-trump-russia-a7618661.html. most “reckless and indiscriminate”: This quote is attributed to British Defense Secretary Gavin Williamson, said at a meeting with U.S. Defense Secretary Jim Mattis and other defense ministers in Brussels in 2018.

pages: 186 words: 49,595

Revolution in the Age of Social Media: The Egyptian Popular Insurrection and the Internet by Linda Herrera

citizen journalism, crowdsourcing, Google Earth, informal economy, Julian Assange, knowledge economy, minimum wage unemployment, Mohammed Bouazizi, moral panic, Nelson Mandela, Occupy movement, RAND corporation, Rosa Parks, Silicon Valley, Skype, Slavoj Žižek, WikiLeaks

Technology companies had become deeply enmeshed in American power. Tunisia’s cyberwars escalated to even greater heights when Anonymous, the decentralized internet group that promotes online freedom, launched Operation Tunisia. During the Tunisian uprising, WikiLeaks founder Julian Assange released a series of incriminating cables detailing embezzlement and nepotism by the Ben Ali oligarchy, information that further fueled the revolt. When the government tried to block access to the cables, Operation Tunisia used the Twitter hashtag #OpTunisia to inform Tunisians about backdoor ways to access the WikiLeaks cables and protect themselves online. Anonymous also managed to hack and take down high-profile Tunisian governmental websites, including those of the stock exchange, the government Internet Agency, the Office of the President and Prime Minister, the Ministry of Industry, and the Ministry of Foreign Affairs.

In all likelihood, a Mubarak-regime electronic militia organized the assault on Abbas’s account. Abbas contacted YouTube directly to reinstate the videos, but to no avail. He then reached out to the US Embassy in Cairo and requested that they contact Google, which owns YouTube, on his behalf. The details of Abbas’s request to the embassy appear in an embassy cable dated December 2007, which was made public by WikiLeaks. It reads: Prominent Egyptian blogger, human rights activist and winner of the 2007 Knight-Ridder International Journalism Award, Wael Abbas, contacted us November 17 to report that YouTube removed from his website two videos exposing police abuses—one of a Sinai bedouin allegedly shot by police and thrown in a garbage dump during the past week’s violence … and the other of a woman being tortured in a police station.

In September 2013, Abbas was one of thirty-five activists, including the founders of the 6th of April Facebook page, named in a complaint to the Egyptian public prosecutor. He was called in for questioning on suspicion of treason and working with a foreign government. The names of the activists were taken from a confidential US embassy memo from 2007 entitled “Outreach to Egyptian Democracy and Human Rights Activists,” made public by WikiLeaks in August 2011. This memo details meetings with Egyptian activists from the blogosphere, civil society, and the opposition press. At the time of writing, the fate of those activists remains unclear. What is certain is that activists often risk their own security, credibility, and public standing when they are on record as working with the US government. Their contact with the US government can range from very superficial encounters, like attending a reception or receiving training from a third party funded by USAID, to more suspect activities like participating in closed-door briefings with US officials.

pages: 233 words: 66,446

Bitcoin: The Future of Money? by Dominic Frisby

3D printing, altcoin, bank run, banking crisis, banks create money, barriers to entry, bitcoin, blockchain, capital controls, Chelsea Manning, cloud computing, computer age, cryptocurrency, disintermediation, Ethereum, ethereum blockchain, fiat currency, fixed income, friendly fire, game design, Isaac Newton, Julian Assange, land value tax, litecoin, M-Pesa, mobile money, money: store of value / unit of account / medium of exchange, Occupy movement, Peter Thiel, Ponzi scheme, prediction markets, price stability, QR code, quantitative easing, railway mania, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Skype, slashdot, smart contracts, Snapchat, Stephen Hawking, Steve Jobs, Ted Nelson, too big to fail, transaction costs, Turing complete, War on Poverty, web application, WikiLeaks

It’s difficult to overstate how big a threat to the existing world order WikiLeaks was perceived to be in late 2010. There has been revelation after revelation – the Bradley Manning leaks, the video of US soldiers shooting at Reuters cameramen, the ‘friendly fire’ and civilian casualties, then the leak of another 400,000 documents relating to the Iraq war. WikiLeaks had caught the imagination of those opposed to the US and other governments. Many wanted to help. PayPal was the main means by which WikiLeaks was able to receive funds for its activities and, in 2010, its donors gave around one million dollars. But on December 4th 2010, under pressure from the US government, PayPal froze the WikiLeaks account. Domain name providers and other payment systems followed suit and refused to handle WikiLeaks’ business. Julian Assange, the WikiLeaks boss, was involved in expensive litigation at the same time.

Julian Assange, the WikiLeaks boss, was involved in expensive litigation at the same time. WikiLeaks was starved of funds. And, unbeknownst to most, the organization was crumbling from within due to a falling-out between Daniel Domscheit-Berg, WikiLeaks’ number two, and Assange. One poster at BitcoinTalk thought that Bitcoin would be a means to help WikiLeaks. Others jumped at the idea. ‘Bring it on,’ said one. ‘Let’s encourage WikiLeaks to use Bitcoins and I’m willing to face any risk or fallout from that fact.’ Then wiser heads stepped in and a long discussion ensued.38 Early developers such as Jeff Garzik, Bruce Wagner and others felt that the last thing they should do was bring the attention of authorities to Bitcoin this early in its evolution. ‘It could permanently marginalize Bitcoin, keeping it out of the mainstream for good.

I make this appeal to WikiLeaks not to try to use Bitcoin. Bitcoin is a small beta community in its infancy. You would not stand to get more than pocket change, and the heat you would bring would likely destroy us at this stage.’ Five days later PC World magazine published an article – Could the WikiLeaksScandal Lead to New Virtual Currency?39It was the most prominent site yet to mention Bitcoin and suggested it may be the answer to WikiLeaks’ funding problems. A sudden flood of traffic overwhelmed Bitcoin’s website and it went down. When it came back up again, Satoshi wrote, ‘It would have been nice to get this attention in any other context. WikiLeaks has kicked the hornet’s nest, and the swarm is headed towards us.’ Then Bitcoin was mentioned on Slashdot again, alongside WikiLeaks and the outspoken libertarian US congressman, Ron Paul.

pages: 320 words: 87,853

The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale

Affordable Care Act / Obamacare, algorithmic trading, Amazon Mechanical Turk, American Legislative Exchange Council, asset-backed security, Atul Gawande, bank run, barriers to entry, basic income, Berlin Wall, Bernie Madoff, Black Swan, bonus culture, Brian Krebs, business cycle, call centre, Capital in the Twenty-First Century by Thomas Piketty, Chelsea Manning, Chuck Templeton: OpenTable:, cloud computing, collateralized debt obligation, computerized markets, corporate governance, Credit Default Swap, credit default swaps / collateralized debt obligations, crowdsourcing, cryptocurrency, Debian, don't be evil, drone strike, Edward Snowden, en.wikipedia.org, Fall of the Berlin Wall, Filter Bubble, financial innovation, financial thriller, fixed income, Flash crash, full employment, Goldman Sachs: Vampire Squid, Google Earth, Hernando de Soto, High speed trading, hiring and firing, housing crisis, informal economy, information asymmetry, information retrieval, interest rate swap, Internet of things, invisible hand, Jaron Lanier, Jeff Bezos, job automation, Julian Assange, Kevin Kelly, knowledge worker, Kodak vs Instagram, kremlinology, late fees, London Interbank Offered Rate, London Whale, Marc Andreessen, Mark Zuckerberg, mobile money, moral hazard, new economy, Nicholas Carr, offshore financial centre, PageRank, pattern recognition, Philip Mirowski, precariat, profit maximization, profit motive, quantitative easing, race to the bottom, recommendation engine, regulatory arbitrage, risk-adjusted returns, Satyajit Das, search engine result page, shareholder value, Silicon Valley, Snapchat, social intelligence, Spread Networks laid a new fibre optics cable between New York and Chicago, statistical arbitrage, statistical model, Steven Levy, the scientific method, too big to fail, transaction costs, two-sided market, universal basic income, Upton Sinclair, value at risk, WikiLeaks, zero-sum game

This is not a “bug” in our surveillance system, but a “feature.”192 Note that the very definition of fusion centers includes their willingness to receive information from private parties. The Snowden leaks make the shared infrastructure of state and private data collection incontrovertible. Never again can data deregulationists claim that corporate data collection is entirely distinct and far less threatening than government surveillance. They are irreversibly intertwined. Enduring Opacity Despite the leaks of Snowden (and Chelsea Manning and Julian Assange), the national surveillance apparatus is still opaque on many levels.193 It enjoys both real and legal secrecy, hidden as it is in secure networks and protected by the heavy hand of the law. There’s plenty of complexity, too, should secrecy fail. Intelligence agencies commission private defense contractors like SAIC, Northrop Grumman, Booz Allen, and Palantir to devise specialized software to monitor their data sources—which include social networks.194 Their algorithms are complex enough by themselves, but the contractors are also bound to protect company trade secrets.

We may learn a great deal about the target of the hack, but innocent people’s secrets can be exposed as well. A fully transparent society would be a nightmare of privacy invasion, voyeurism, and intellectual property theft. Sometimes the route to orderly and productive investigation is to entrust the job to a small group of experts. For example, courts often need to have a deep knowledge about events leading up to a legal dispute. Even leading leakers seem to agree: both Julian Assange and Edward Snowden fi ltered their revelations though trusted news sources. I call this general trend “qualified transparency”—limiting revelations in order to respect all the interests involved in a given piece of information. As time goes on, the negative impact of disclosure fades. Statutes of limitation run; power moves to other hands; technology that was once state-of-the-art becomes irrelevant.

Twitter also pointed to a similar situation in 2010, when people had been complaining that #wikileaks did not appear prominently enough in Trending Topics. At that time, the company explained: Twitter Trends are automatically generated by an algorithm that . . . captures the hottest emerging topics, not just what’s most popu lar. Put another way, Twitter favors novelty over popularity. . . . THE HIDDEN LOGICS OF SEARCH 77 Topics break into the Trends list when the volume of Tweets about that topic at a given moment dramatically increases. . . . Sometimes, popular terms don’t make the Trends list because the velocity of conversation isn’t increasing quickly enough, relative to the baseline level of conversation happening on an average day; this is what happened with #wikileaks this week.109 The #wikileaks and #occupy controversies died down quickly after Twitter offered these explanations.

Because We Say So by Noam Chomsky

Affordable Care Act / Obamacare, American Legislative Exchange Council, Chelsea Manning, cuban missile crisis, David Brooks, drone strike, Edward Snowden, Intergovernmental Panel on Climate Change (IPCC), Julian Assange, Malacca Straits, Martin Wolf, means of production, Monroe Doctrine, Nelson Mandela, Occupy movement, oil shale / tar sands, Powell Memorandum, Ralph Waldo Emerson, RAND corporation, Slavoj Žižek, Stanislav Petrov, Thorstein Veblen, too big to fail, uranium enrichment, WikiLeaks

The primary reason is acknowledged by U.S. military and intelligence and their Israeli counterparts: Iran might deter the resort to force by the United States and Israel. Furthermore, Iran must be punished for its “successful defiance,” which was Washington’s charge against Cuba half a century ago, and still the driving force for the U.S. assault against Cuba that continues despite international condemnation. Other events featured on the front pages might also benefit from a different perspective. Suppose that Julian Assange had leaked Russian documents revealing important information that Moscow wanted to conceal from the public, and that circumstances were otherwise identical. Sweden would not hesitate to pursue its sole announced concern, accepting the offer to interrogate Assange in London. It would declare that if Assange returned to Sweden (as he has agreed to do), he would not be extradited to Russia, where chances of a fair trial would be slight.

Joining the Vietnamese appeal against Dow are the government of India, the Indian Olympic Association, and the survivors of the horrendous 1984 Bhopal gas leak, one of history’s worst industrial disasters, which killed thousands and injured more than half a million. Union Carbide, the corporation responsible for the disaster, was taken over by Dow, for whom the matter is of no slight concern. In February, Wikileaks revealed that Dow hired the U.S. private investigative agency Stratfor to monitor activists seeking compensation for the victims and prosecution of those responsible. Another major crime with very serious persisting effects is the Marine assault on the Iraqi city of Fallujah in November 2004. Women and children were permitted to escape if they could. After several weeks of bombing, the attack opened with a carefully planned war crime: invasion of the Fallujah General Hospital, where patients and staff were ordered to the floor, their hands tied.

Washington has made clear that any country that refuses to extradite Snowden will face harsh punishment. The United States will “chase him to the ends of the earth,” Senator Lindsey Graham warned. But U.S. government spokespersons assured the world that Snowden will be granted the full protection of American law—referring to those same laws that have kept U.S. Army soldier Bradley Manning (who released a vast archive of U.S. military and diplomatic documents to WikiLeaks) in prison for three years, much of it in solitary confinement under humiliating conditions. Long gone is the archaic notion of a speedy trial before a jury of peers. On July 30 a military judge found Manning guilty of charges that could lead to a maximum sentence of 136 years. Like Snowden, Manning committed the crime of revealing to Americans—and others—what their government is doing. That is a severe breach of “security” in the operative meaning of the term, familiar to anyone who has pored over declassified documents.

pages: 577 words: 149,554

The Problem of Political Authority: An Examination of the Right to Coerce and the Duty to Obey by Michael Huemer

Cass Sunstein, Chelsea Manning, cognitive dissonance, cuban missile crisis, Daniel Kahneman / Amos Tversky, en.wikipedia.org, Eratosthenes, experimental subject, framing effect, Gini coefficient, illegal immigration, impulse control, Isaac Newton, Julian Assange, laissez-faire capitalism, Machinery of Freedom by David Friedman, Milgram experiment, moral hazard, Phillip Zimbardo, profit maximization, profit motive, Ralph Nader, RAND corporation, rent-seeking, Ronald Coase, Stanford prison experiment, The Wealth of Nations by Adam Smith, unbiased observer, uranium enrichment, WikiLeaks

The government brought twelve felony counts against Ellsberg (ultimately dismissed), and President Nixon ordered illegal wiretaps and a break-in at the office of Ellsberg’s psychiatrist in an effort to find information to discredit Ellsberg.31 A more recent case is that of Wikileaks, which published thousands of government documents in 2010, most of which concerned the wars in Afghanistan and Iraq, including videos showing U.S. troops killing civilians. The uniform reaction from American politicians on both the left and the right was one of outrage at both Wikileaks and its sources. Vice President Biden called Wikileaks founder Julian Assange a terrorist and promised that the Justice Department would be looking for ways to prosecute him. Former Arkansas governor and sometime presidential candidate Mike Huckabee called Wikileaks’ source a traitor and called for his execution. As of this writing (mid-2012), Wikileaks’ source for the Iraq documents, U.S. military intelligence analyst Bradley Manning, is being prosecuted by the military under numerous charges, including ‘aiding the enemy’, a capital offence (though the government will not seek the death penalty).32 These cases show that not everyone is easily intimidated.

Accessed February 7, 2012. MacIntyre, Alasdair. 1986. ‘The Intelligibility of Action’. Pp. 63–80 in Rationality, Relativism and the Human Sciences, ed. J. Margolis, M. Krausz, and R. M. Burian. Dordrecht: Kluwer. Mackie, John L. 1977. Ethics: Inventing Right and Wrong. New York: Penguin. Maley, William. 2009. The Afghanistan Wars, second edition. New York: Palgrave Macmillan. Mandel, Nina. 2010. ‘Biden: WikileaksJulian Assange Closer to a “High-Tech Terrorist” Than Pentagon Papers’, New York Daily News, December 19, http: //articles.nydailynews.com/2010–12–19/news/27084869_1_vice-president-joe-biden-world-leaders-accuser. Accessed March 10, 2011. Mao Tse-tung. 1972. Quotations from Chairman Mao Tsetung. Peking: Foreign Languages Press. Marshall, S. L. A. 1978. Men against Fire: The Problem of Battle Command in Future War.

‘Deaths by Mass Unpleasantness: Estimated Totals for the Entire Twentieth Century’, http://users.erols.com/mwhite28/warstat8.htm. Accessed February 13, 2012. Wikileaks. 2010. Collateral Murder (video), www.collateralmurder.com/. Accessed March 10, 2011. Williams, Juan. 1987. Eyes on the Prize. New York: Viking Penguin. Wilson, Edward O. 2000. Sociobiology: The New Synthesis, 25th anniversary ed. Cambridge, MA: Harvard University Press. Wilson, James Q. 1990. ‘Against the Legalization of Drugs’, Commentary 89: 21–8. Wing, Nick. 2010. ‘Mike Huckabee: WikiLeaks Source Should Be Executed’, Huffington Post, November 30, www.huffingtonpost.com/2010/11/30/mike-huckabee-wikileaks-execution_n_789964.html. Accessed March 10, 2011. Wingo, Ajume. 2003. Veil Politics in Liberal Democratic States. Cambridge: Cambridge University Press.

pages: 474 words: 120,801

The End of Power: From Boardrooms to Battlefields and Churches to States, Why Being in Charge Isn’t What It Used to Be by Moises Naim

additive manufacturing, barriers to entry, Berlin Wall, bilateral investment treaty, business cycle, business process, business process outsourcing, call centre, citizen journalism, Clayton Christensen, clean water, collapse of Lehman Brothers, collective bargaining, colonial rule, conceptual framework, corporate governance, creative destruction, crony capitalism, deskilling, disintermediation, disruptive innovation, don't be evil, failed state, Fall of the Berlin Wall, financial deregulation, Francis Fukuyama: the end of history, illegal immigration, immigration reform, income inequality, income per capita, intangible asset, intermodal, invisible hand, job-hopping, Joseph Schumpeter, Julian Assange, Kickstarter, liberation theology, Martin Wolf, mega-rich, megacity, Naomi Klein, Nate Silver, new economy, Northern Rock, Occupy movement, open borders, open economy, Peace of Westphalia, plutocrats, Plutocrats, price mechanism, price stability, private military company, profit maximization, Ronald Coase, Ronald Reagan, Silicon Valley, Skype, Steve Jobs, The Nature of the Firm, Thomas Malthus, too big to fail, trade route, transaction costs, Washington Consensus, WikiLeaks, World Values Survey, zero-sum game

Kenyan lawyer Ory Okolloh and a blogger called “M” launched a watchdog site in 2006 on Kenya’s corrupt political scene.34 Iranian-American Kelly Golnoush Niknejad started TehranBureau.com to gather and spread news directly from fellow Iranians during the popular uprising after the 2009 presidential elections, with foreign journalists banned from the country.35 Sami Ben Gharbia, a blogger and civil society activist, helped incite anti-regime demonstrations in Tunisia by using his group blog to spread devastating tales of corruption contained in the US diplomatic cables released through WikiLeaks. These new actors are enriching the scope of political discourse around the world. They operate outside the channels and beyond the control of traditional political organizations, both government- and party-related. They are ubiquitous and, when facing repression, they can also be highly elusive. But technology is simply the tool. The bigger picture is a cascading diffusion of power that has put individuals in an unprecedented position not only to bypass political institutions developed over decades but also to influence, persuade, or constrain “real” politicians more directly and more effectively than any classical political theorist could have imagined. HEDGE FUNDS AND HACKTIVISTS Left in a room together, John Paulson and Julian Assange might soon be at each other’s throats.

And the dawn of the twenty-first century, with the Soviet Union consigned to the history books, found just one player paramount: the sole superpower, the hegemon, the United States. For the first time in history, many argued, the struggle for power among nations had produced one single, clear, and maybe even final winner. Consider the evidence from WikiLeaks, which released a trove of more than 250,000 US diplomatic cables that, as the organization’s leader Julian Assange luridly put it, “show the extent of U.S. spying on its allies and the UN; turning a blind eye to corruption and human rights abuse in ‘client states’; backroom deals with supposedly neutral countries; lobbying for U.S. corporations; and the measures U.S. diplomats take to advance those who have access to them.”3 The reaction of experienced analysts such as Jessica Mathews, the president of the Carnegie Endowment in Washington, is that this is not a surprise: “This is precisely what hegemony has always been.

In geopolitics, small players—whether “minor” countries or nonstate entities—have acquired new opportunities to veto, interfere in, redirect, and generally stymie the concerted efforts of “big powers” and multilateral organizations such as the International Monetary Fund (IMF). To name just a few instances: Poland’s vetoing of the EU’s low-carbon policy, the attempts by Turkey and Brazil to derail the big powers’ negotiations with Iran over its nuclear program, Wikileaks’ disclosure of US diplomatic secrets, the Gates Foundation’s contesting of the World Health Organization leadership in the fight against malaria, and spoilers of various stripes and sizes in global negotiations on trade, climate change, and numerous other issues. These newly and increasingly relevant “small players” are vastly different from one another, as are the fields they compete in. But they have in common the fact that they no longer require size, scope, history, or entrenched tradition to make their mark.

pages: 312 words: 93,504

Common Knowledge?: An Ethnography of Wikipedia by Dariusz Jemielniak

Andrew Keen, barriers to entry, Benevolent Dictator For Life (BDFL), citation needed, collaborative consumption, collaborative editing, conceptual framework, continuous integration, crowdsourcing, Debian, deskilling, digital Maoism, en.wikipedia.org, Filter Bubble, Google Glasses, Guido van Rossum, Hacker Ethic, hive mind, Internet Archive, invisible hand, Jaron Lanier, jimmy wales, job satisfaction, Julian Assange, knowledge economy, knowledge worker, Menlo Park, moral hazard, online collectivism, pirate software, RFC: Request For Comment, Richard Stallman, selection bias, Silicon Valley, Skype, slashdot, social software, Stewart Brand, The Hackers Conference, The Nature of the Firm, The Wisdom of Crowds, transaction costs, WikiLeaks, wikimedia commons, zero-sum game

However, he was laid off because of lack of funds in 2002, after which he apparently lost faith in the project (in his farewell message he skeptically wrote that “Wikipedia still might succeed brilliantly”; Berstein, 2011). Since then he has been very critical of it. In 2007 he launched his own online encyclopedia website, Citizendium. Clearly, both being let go from Wikipedia and having his cofounder status questioned left Sanger resentful. Nonetheless, as late as December 2010, when criticizing WikiLeaks and addressing Julian Assange, he mentioned his former affiliation rather than his later projects: “Speaking as Wikipedia’s co-founder, I consider you enemies of the U.S.—not just the government, but the people” (Crovitz, 2010). Identifying himself as Wikipedia’s cofounder might have created the impression that he was speaking for the Wikipedia community or the Wikimedia Foundation, but his view was far from unanimously shared by Wikipedians.

Retrieved from http://www.aetherometry.com/ Electronic_Publications/Politics_of_Science/Antiwikipedia/awp_index.html Coser, L. A. (1957). Social conflict and the theory of social change. The British Journal of Sociology, 8(3), 197–207. Courpasson, D. (2000). Managerial strategies of domination: Power in soft bureaucracies. Organization Studies, 21(1), 141–161. Crombie, A. (1985). The nature and types of search conferences. International Journal of Lifelong Education, 4(1), 3–33. Crovitz, L. G. (2010, December 6). Julian Assange, information anarchist. The Wall Street Journal. Retrieved from http://topics.wsj.com/article/SB100014240527487039890045 75653113548361870.html Crowston, K., & Howison, J. (2006). Hierarchy and centralization in free and open source software team communications. Knowledge, Technology and Policy, 18(4), 65–85. Crowston, K., Heckman, R., Annabi, H., & Masango, C. (2005). A structurational perspective on leadership in free/libre open source software teams.

([[User_talk:Jimbo_Wales/Archive_122]]) At the time of this writing, discussion of the changes is still under way, yet it is quite clear that Wales recognized that his resignation from operational influence has further legitimized his strategic authority. 1 7 4    L e a d e r s h i p T r a n s f o r m e d Modes of Leadership in Open Collaboration While the founder’s exit has been shown to be a natural stage in organizational development, in this case the limitation of Wales’s involvement was both consciously planned and a contingent process of management models and philosophies open-community leadership, both to some extent present in the free/ libre and open-source-software (F/LOSS) environment. E. G. Coleman (2011) points out that digital-generation communities may be governed by principles as diverse as those of WikiLeaks (with one charismatic leader making all decisions and monopolizing the limelight) to those of Anonymous (an antileader and anticelebrity group). Even though rarely falling on the extremes of that continuum, large open-collaboration projects tend to rely on two kinds of models: a democratic community-decision-making process (elections, representation) and “benevolent dictatorship” (Raymond, 1998, 1999/2004).

pages: 283 words: 77,272

With Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful by Glenn Greenwald

Ayatollah Khomeini, banking crisis, Bernie Madoff, Clive Stafford Smith, collateralized debt obligation, Corrections Corporation of America, crack epidemic, Credit Default Swap, credit default swaps / collateralized debt obligations, David Brooks, deskilling, financial deregulation, full employment, high net worth, income inequality, Julian Assange, mandatory minimum, nuremberg principles, Ponzi scheme, Project for a New American Century, rolodex, Ronald Reagan, too big to fail, Washington Consensus, WikiLeaks

Instead, the administration did something else entirely: it launched an all-out war on WikiLeaks itself. Numerous reports quickly surfaced that the Obama DOJ was actively attempting to indict WikiLeaks founder Julian Assange, an Australian citizen, under the Espionage Act of 1917—which, if successful, would be the first time in U.S. history that a nongovernment employee was convicted of espionage for publishing classified material. Meanwhile, a very sophisticated cyberattack temporarily drove WikiLeaks offline. Overt pressure from American government officials resulted in Australia threatening to revoke Assange’s passport. Joe Lieberman, chairman of the Senate Homeland Security Committee, publicly warned companies not to associate with WikiLeaks in any way, after which the assets of WikiLeaks were frozen and the organization’s accounts with MasterCard, Visa, PayPal, and Bank of America were terminated, impeding the group’s ability to raise funds.

Perhaps nothing better illustrates the reprehensible double standard than the Obama administration’s actions against the whistle-blowing site WikiLeaks. Throughout 2010, WikiLeaks published thousands of documents relating to U.S. wars in Iraq and Afghanistan, which revealed shocking abuses and outright criminality on the part of the American occupiers. The files showed American soldiers firing on unarmed civilians and journalists, covering up multiple killings of civilians, and adopting a formal policy of turning a blind eye to systematic human rights abuses perpetrated by Iraqi forces right under the Americans’ noses. Needless to say, none of these revelations resulted in any criminal investigations from the Obama administration. In December, WikiLeaks released another trove of information: numerous diplomatic cables that had been sent from U.S. embassies around the world.

As David Corn of Mother Jones reported: During an April 14, 2009, White House briefing, I asked press secretary Robert Gibbs if the Obama administration would cooperate with any request from the Spaniards for information and documents related to the Bush Six. He said, “I don’t want to get involved in hypotheticals.” What he didn’t disclose was that the Obama administration, working with Republicans, was actively pressuring the Spaniards to drop the investigation. Those efforts apparently paid off, and, as this WikiLeaks-released cable shows, Gonzales, Haynes, Feith, Bybee, Addington, and Yoo owed Obama and Secretary of State Hillary Clinton thank-you notes. The release of the WikiLeaks cable prompted the Philadelphia Daily News’s Will Bunch to write a scathing column titled “The Day That Barack Obama Lied to Me.” Recalling his interview with the candidate who had committed to look into Bush crimes, Bunch wrote: “The breakdown of justice in this country is far from exceptional. In fact, it’s contemptible.

pages: 361 words: 81,068

The Internet Is Not the Answer by Andrew Keen

"Robert Solow", 3D printing, A Declaration of the Independence of Cyberspace, Airbnb, AltaVista, Andrew Keen, augmented reality, Bay Area Rapid Transit, Berlin Wall, bitcoin, Black Swan, Bob Geldof, Burning Man, Cass Sunstein, citizen journalism, Clayton Christensen, clean water, cloud computing, collective bargaining, Colonization of Mars, computer age, connected car, creative destruction, cuban missile crisis, David Brooks, disintermediation, disruptive innovation, Donald Davies, Downton Abbey, Edward Snowden, Elon Musk, Erik Brynjolfsson, Fall of the Berlin Wall, Filter Bubble, Francis Fukuyama: the end of history, Frank Gehry, Frederick Winslow Taylor, frictionless, full employment, future of work, gig economy, global village, Google bus, Google Glasses, Hacker Ethic, happiness index / gross national happiness, income inequality, index card, informal economy, information trail, Innovator's Dilemma, Internet of things, Isaac Newton, Jaron Lanier, Jeff Bezos, job automation, Joi Ito, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kickstarter, Kodak vs Instagram, Lean Startup, libertarian paternalism, lifelogging, Lyft, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Martin Wolf, Metcalfe’s law, move fast and break things, move fast and break things, Nate Silver, Nelson Mandela, Network effects, new economy, Nicholas Carr, nonsequential writing, Norbert Wiener, Norman Mailer, Occupy movement, packet switching, PageRank, Panopticon Jeremy Bentham, Paul Graham, peer-to-peer, peer-to-peer rental, Peter Thiel, plutocrats, Plutocrats, Potemkin village, precariat, pre–internet, RAND corporation, Ray Kurzweil, ride hailing / ride sharing, Robert Metcalfe, Second Machine Age, self-driving car, sharing economy, Silicon Valley, Silicon Valley ideology, Skype, smart cities, Snapchat, social web, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, TaskRabbit, Ted Nelson, telemarketer, The Future of Employment, the medium is the message, the new new thing, Thomas L Friedman, Travis Kalanick, Tyler Cowen: Great Stagnation, Uber for X, uber lyft, urban planning, Vannevar Bush, Whole Earth Catalog, WikiLeaks, winner-take-all economy, working poor, Y Combinator

Mielke amassed personal data with the same relentlessness that Google’s Street View car collected the emails, photos, and passwords of online German citizens between 2008 and 2010—a privacy breach that Johannes Caspar, the German regulator in charge of the investigation into Google’s behavior, described as “one of the biggest data-protection rules violations known.”8 But, as a violator of our online data, Google faces stiff competition from its rival Facebook. TechCrunch’s Natasha Lomas suggests that Facebook’s “creepy data-grabbing ways,” such as the 2013 harvesting of the personal contact information of 6 million of its users, or that secret 2012 study to control the emotions of 689,000 of its users,9 make it the “Borg of the digital world.”10 WikiLeaks founder Julian Assange, who knows a thing or two about spying himself, even accuses Facebook of being the “greatest spying machine the world has ever seen.”11 So is Facebook really the greatest spying machine in world history—greater than either the Stasi, the CIA, or Google? Citing Google’s Street View car privacy violations, the German privacy regulator Johannes Caspar might doubt Assange’s assertion, as probably would privacy watchdogs in the United Kingdom, Germany, and Italy who collectively told Google in the summer of 2013 that the company would face legal sanctions unless it changed its 2012 policy of unifying personal data collected from all its different services.12 Others would also award this dubious honor to Google.

Chapter Seven 1 Noam Cohen, “Borges and the Foreseeable Future,” New York Times, January 6, 2008. 2 Victor Sebestyen, Revolution 1989: The Fall of the Soviet Empire (New York: Pantheon 2009), p. 121. 3 Ibid. 4 Anna Funder, Stasiland (London: Granta, 2003), p. 57. 5 Viktor Mayer-Schönberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think (Boston: Houghton-Mifflin, 2013), p. 150. 6 Andrew Keen, “Opinion: Beware Creepy Facebook,” CNN, February 3, 2012. 7 Ibid. 8 Karin Matussek, “Google Fined 145,000 Euros Over Wi-Fi Data Collection in Germany,” Bloomberg News, April 22, 2013. 9 Robert Booth, “Facebook Reveals News Feed Experiment to Control Emotions,” Guardian, June 29, 2014. 10 Natasha Lomas, “Facebook’s Creepy Data-Grabbing Ways Make It the Borg of the Digital World,” TechCrunch, June 24, 2013. 11 Patrick Kingsley, “Julian Assange Tells Students That the Web Is the Greatest Spying Machine Ever,” Guardian, March 15, 2011. 12 Charles Arthur, “European Watchdogs Order Google to Rewrite Privacy Policy or Face Legal Action,” Guardian, July 5, 2013. 13 Claire Cain Miller, “Google Accused of Wiretapping in Gmail Scans,” New York Times, October 1, 2013. 14 Las Vaas, “Google Sued for Data-Mining Student Email,” Naked Security, March 18, 2014. 15 Stefan Wolle, Die heile Welt der Diktatur, p. 186. 16 “The NSA’s Secret Spy Hub in Berlin,” Spiegel Online, October 27, 2013. 17 Ian Traynor and Paul Lewis, “Merkel Compared NSA to Stasi in Heated Encounter with Obama,” Guardian, December 17, 2013. 18 Duncan Campbell, Cahal Milmo, Kim Gengupta, Nigel Morris, and Tony Patterson, “Revealed: Britain’s ‘Secret Listening Post in the Heart of Berlin,’” Independent, November 5, 2013. 19 David Sellinger, “Big Data: Getting Ready for the 2013 Big Bang,” Forbes, January 15, 2013.

Certainly online eyes remain much less valuable than offline ones, with average advertising rates of the printed edition of a major newspaper being around ten times its online cost.36 The same is true of the value of offline versus online readers, with the Newspaper Association of America estimating that the average print reader is worth around $539 versus the $26 value of the online reader.37 And free certainly isn’t working as an economic model for online newspapers. Take, for example, the world’s third most frequently visited news website, the London Guardian. In spite of breaking the News of the World phone hacking scandal and the Edward Snowden and WikiLeaks stories, the Guardian has reported operating losses of more than £100 million since 2010, with a stunning £50 million lost just between 2012 and 2013.38 No wonder the Guardian is experimenting with a robot-generated print edition called #Open001, which replaces editors with algorithms to select relevant stories for publication.39 But robots can’t write the kind of high-quality journalism that distinguishes the Guardian from most of its rivals.

pages: 268 words: 76,702

The System: Who Owns the Internet, and How It Owns Us by James Ball

Bill Duvall, bitcoin, blockchain, Chelsea Manning, cryptocurrency, don't be evil, Donald Trump, Douglas Engelbart, Edward Snowden, en.wikipedia.org, Firefox, Frank Gehry, Internet of things, invention of movable type, Jeff Bezos, jimmy wales, Julian Assange, Kickstarter, Leonard Kleinrock, Marc Andreessen, Mark Zuckerberg, Menlo Park, Minecraft, Mother of all demos, move fast and break things, move fast and break things, Network effects, Oculus Rift, packet switching, patent troll, Peter Thiel, pre–internet, ransomware, RFC: Request For Comment, risk tolerance, Ronald Reagan, Rubik’s Cube, self-driving car, Shoshana Zuboff, Silicon Valley, Silicon Valley startup, Skype, Snapchat, Steve Crocker, Stuxnet, The Chicago School, undersea cable, uranium enrichment, WikiLeaks, yield management, zero day

., The Long Tail: Why the Future of Business Is Selling Less of More, Hachette Books, 2008. Bamford, J., The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, Anchor, 2009. Bartlett, J., People Vs Tech, Ebury Press, 2018. Beckett, C., and Ball, J., Wikileaks: News in the Networked Era, Polity, 2012. Blum, A., Tubes, Viking, 2019. Greenwald, G., No Place to Hide: Edward Snowden, the NSA and the Surveillance State, Penguin UK, 2015. Harding, L., The Snowden Files, Guardian Faber Publishing, 2016. Leigh, D., Wikileaks: Inside Julian Assange’s War on Secrecy, Guardian Books, 2010. Miller, C., The Death of the Gods: The New Global Power Grab, Windmill Books, 2019. Susskind, J., Future Politics: Living Together in a World Transformed by Tech, Oxford University Press, 2018. Wu, T., The Curse of Bigness: Antitrust in the New Gilded Age, Columbia Global Reports, 2018.

Reporting a book like this involves a lot of travel on a tiny budget, so copious thanks are due to Amna Saleem, Elena Egawhary, Megan Carpentier, Laurence Dodds, Nicky Woolf and Tess McCormick for providing places for me to stay, report or write from – and often good company too – during the work on the book. Particular thanks are also due to Nick Hancock and his current fiancée for actually giving up their home permanently during the reporting of the book. Several chapters of this book draw from previous reporting projects I’ve been lucky to have been part of. On WikiLeaks, David Leigh and Luke Harding were a pleasure to work with and their book is a valuable reminder of the time. LSE’s Charlie Beckett was a joy to co-write an academic book with on the era. As to those within WikiLeaks itself, the good ones know who they are, even if the world doesn’t – and Chelsea Manning deserves to be a free woman. I discovered the surprisingly strange world of ICANN thanks to a story idea from Merope Mills, and worked with Laurence Mathieu-Léger reporting the feature and the video, which was a joy.

The reach and scale of the internet would enable a ‘long tail’ of small and independent producers to flourish. Online companies were launched talking in earnest terms of changing the world, with ‘don’t be evil’ mantras alongside – and generous share options making even their office decorators rich. For a long time, you could convince yourself it was all the real deal. At the start of the last decade, WikiLeaks used its unique online platform to challenge the world’s biggest superpower with an unprecedented series of leaks. Shortly afterwards, the world’s biggest social media companies were credited with boosting Arab Spring protests against corrupt and dictatorial governments. Such was the mood towards the internet that the exultant opening ceremony to the 2012 London Olympics culminated in a seventeen-minute dance sequence celebrating Tim Berners-Lee for creating the World Wide Web and giving it to the world for free.

pages: 340 words: 96,149

@War: The Rise of the Military-Internet Complex by Shane Harris

Amazon Web Services, barriers to entry, Berlin Wall, Brian Krebs, centralized clearinghouse, clean water, computer age, crowdsourcing, data acquisition, don't be evil, Edward Snowden, failed state, Firefox, John Markoff, Julian Assange, mutually assured destruction, peer-to-peer, Silicon Valley, Silicon Valley startup, Skype, Stuxnet, undersea cable, uranium enrichment, WikiLeaks, zero day

Hunton & Williams asked the trio, which operated under the name Team Themis, if they could do the same job for supporters of WikiLeaks, and also if they could locate where the organization was storing classified information it got from its anonymous sources. “Apparently, if they can show that WikiLeaks is hosting data in certain countries, it will make prosecution easier,” a member of the trio wrote in an e-mail to his colleagues. Justice Department officials were looking for information they could use to indict WikiLeaks’ founder, Julian Assange, who had posted classified military intelligence reports and State Department cables. Now the feds wanted to outsource part of their investigation, by putting Bank of America in touch with Team Themis, which drew its name from the mythological Greek Titan who represented “divine law,” as opposed to the law of men. Team Themis included Palantir Technologies, a Silicon Valley startup that had been making fast friends with such national security heavyweights as Richard Perle, former chairman of the Defense Policy Board and an influential Republican operative, as well as George Tenet, former director of the CIA, who had gone to work for Herb Allen, a Palantir investor and head of the enigmatic investment bank Allen & Company, which hosts the annual Sun Valley Conference, bringing together celebrity journalists, athletes, and business leaders.

Themis planned to set up an analysis cell that would feed the law firm information about “adversarial entities and networks of interest,” according to a proposal the team created. The CEO of HBGary, Aaron Barr, said the team should collect information about WikiLeaks’ “global following and volunteer staff,” along with the group’s donors, in order to intimidate them. “Need to get people to understand that if they support the organization we will come after them,” Barr wrote in an e-mail. He suggested submitting fake documents to WikiLeaks in hopes that the site would publish them and then be discredited. Barr also urged targeting “people like Glenn Greenwald,” the blogger and vocal WikiLeaks supporter, and he said he wanted to launch “cyberattacks” on a server WikiLeaks was using in Sweden, in order to “get data” about WikiLeaks’ anonymous sources and expose them. Team Themis never had the chance to launch its espionage and propaganda campaign.

The Los Angeles Police Department is another Palantir customer, as is the New York Police Department, which runs an intelligence and counterterrorism unit that many experts believe is more sophisticated than the FBI’s or the CIA’s. Though Team Themis failed, the US government has turned to other private cyber sleuths to go after WikiLeaks and help with other investigations. Tiversa, a Pittsburgh-based company, grabbed headlines in 2011 when it accused WikiLeaks of using peer-to-peer file-sharing systems, like those used to swap music downloads, to obtain classified US military documents. WikiLeaks, which claims only to publish documents that it receives from whistleblowers, called the allegations “completely false.” Tiversa gave its findings to government investigators, who had been trying to build a case against Assange. Tiversa’s board of advisers includes prominent security experts and former US officials, such as General Wesley Clark, former Supreme Allied Commander of NATO forces in Europe and onetime Democratic presidential candidate, and Howard Schmidt, who was Barack Obama’s cyber security adviser in the White House.

pages: 276 words: 93,430

Animal: The Autobiography of a Female Body by Sara Pascoe

Albert Einstein, Berlin Wall, Julian Assange, Kickstarter, meta analysis, meta-analysis, presumed consent, rolodex, selection bias, WikiLeaks

You may be economically dependent on him, with no chance of escape. No door to close to keep yourself safe from future attacks. What keeps surprising me is how relaxed some people seem about men using women’s bodies. Like there’s something ‘natural’ or understandable about it. I’ll give you an example. In 2010, a warrant was issued by Swedish police for the arrest of Julian Assange. The case gained a lot of publicity because of Assange’s pre-existing notoriety as the co-founder of the WikiLeaks website. He was accused of rape by one woman and of molestation by another. In both cases the alleged assault took place AFTER consensual sex. In the first account, a woman who willingly had sex with Assange one night, at her apartment, awoke the next morning to find that he was having penetrative intercourse with her against her will.

We all know that knives are scary, so if I tell you I was mugged by someone holding a machete, you can understand my terror. But if I tell you I was mugged by someone with no weapon but I still gave him all my money and was scared for my life … then maybe you fail to sympathise. I was stupid or weak, I did something wrong. You might walk away muttering, ‘Wasn’t really a mugging at all, I dunno why she’s so upset about it.’ Which was how George Galloway reacted to the claims against Julian Assange. In a podcast the politician went on record to say: ‘Even taken at its worst, if the allegations made by these two women were true, one hundred per cent true, and even if a camera in the room captured them, they don’t constitute rape. At least not rape as anyone with any sense can possibly recognise it. And somebody has to say this.’ It is clear that Galloway really believes this. He is not trying to be incendiary or hurtful or offensive, he feels he is bringing common sense and objectivity to the matter.

In 2005 the Swedish penal code was extended and clarified so that ‘this also applies if a person engages with another person in sexual intercourse or in a sexual act by improperly exploiting that person, due to unconsciousness, sleep, serious fear, intoxication or other drug influence, illness, physical injury or mental disturbance, or otherwise in view of the circumstances, is in a particularly vulnerable situation’. George Galloway may not recognise the allegations against Julian Assange as rape but the Swedish legal system most certainly does. ‘Sleep’, it says. In between ‘unconsciousness’ and ‘serious fear’, recognised as a state in which someone cannot properly give their consent. Oh but that’s in liberal old Sweden,† maybe the confusion has arisen because our British legal system has a different definition and putting your erect penis in sleeping folk is okay here … let me check … okay, so looking at statutory law, since 1956 rape is ‘unlawful sexual intercourse with a woman who at the time of the intercourse does not consent to it’, when either the rapist ‘knows that she does not consent to the intercourse or he is reckless as to whether she consents to it’.

pages: 436 words: 125,809

The Way of the Gun: A Bloody Journey Into the World of Firearms by Iain Overton

air freight, airport security, back-to-the-land, British Empire, Chelsea Manning, clean water, Columbine, David Attenborough, Etonian, Ferguson, Missouri, gender pay gap, gun show loophole, illegal immigration, interchangeable parts, Julian Assange, knowledge economy, Louis Pasteur, Mahatma Gandhi, More Guns, Less Crime, offshore financial centre, Ronald Reagan, Ross Ulbricht, WikiLeaks, Y2K, Yom Kippur War

It was a late springtime London, 2010, when I received a phone call from someone I had never spoken to before, and they asked me if I would like to meet a man I had never met. I was told this could be of real interest to me, and on hearing his name I thought the same. Julian Assange – the Australian provocateur, a Scarlet Pimpernel for our digital age – wanted to talk. Julian was at London’s choice venue for hard-bitten hacks and war correspondents, the Frontline Club in Paddington. Heading there, I found him holed up in one of their rooms, being interviewed by CNN. Nervous and a little self-conscious, he was unused to the media spotlight and here he was being asked about a set of documents his whistleblowing organisation, Wikileaks, had just released: a cache of military reports that exposed the truth about America’s war in Afghanistan. Julian had some of the most controversial secret documents ever to find their way to the light of day.

And in so thinking, the gun took me down a path that led away from those impacted by guns, towards those who wield them. III. Power 5. THE KILLERS The world of mass shooters and assassins – Finland recalled – a bloody day in a teaching college – the American mass shooter examined – Norway – travelling into the wilds – the scene of the worst mass shooting in history – an Oslo drink with a killer’s expert – a meeting with Julian Assange in London – the ugly offerings of the dark web There are many types of people who kill other people with guns. There are those who do so for the explicit control of power. They are, by and large, criminals, gang members, terrorists, policemen or military personnel. When they pull a trigger and a life is ended, people in one of these groups do so out of obedience to a specific ideology or dogma.

Caught in the green-blue glow of a screen, I was told to download certain applications, and his terse words guided me through a portal I had never known existed. I felt ashamed at my technological illiteracy. He told me about TOR, a system that allows its users to search the internet without their computer’s address being revealed. One that lets you look at websites untraced, because TOR wraps your servers’ information around other servers’ information, hiding you behind peeled layers of anonymity, like an onion. Clearly, the head of Wikileaks needed the anonymity that TOR offers, just like investigative journalists do. But some others do not. Others use TOR not out of need, but desire. For many things lurk deep in the hearts of men, and if you give them a tool to hide their identities they will use it. Within minutes I had access to sites that sold things like $20 syringes full of HIV positive blood, a vendetta’s stabbing tool. Where you could buy a soldier’s skull from Verdun for $5,000.

pages: 234 words: 63,149

Every Nation for Itself: Winners and Losers in a G-Zero World by Ian Bremmer

airport security, banking crisis, barriers to entry, Berlin Wall, blood diamonds, Bretton Woods, BRICs, capital controls, clean water, creative destruction, Deng Xiaoping, Doha Development Round, energy security, European colonialism, failed state, global rebalancing, global supply chain, income inequality, informal economy, Intergovernmental Panel on Climate Change (IPCC), Julian Assange, Kickstarter, Martin Wolf, mass immigration, Mikhail Gorbachev, mutually assured destruction, Nelson Mandela, Nixon shock, nuclear winter, Parag Khanna, purchasing power parity, reserve currency, Ronald Reagan, smart grid, South China Sea, sovereign wealth fund, special economic zone, Stuxnet, trade route, uranium enrichment, Washington Consensus, WikiLeaks, Yom Kippur War

.* Recent attacks are among the most effective ever seen in the corporate world, but that’s a record made to be broken. Finally comes the threat posed by info-anarchists and technically sophisticated criminals. In 2010, WikiLeaks founder Julian Assange barely missed becoming Time magazine’s Person of the Year after the release of thousands of politically sensitive documents badly embarrassed Washington and other governments around the world.5 In 2011, efforts by several governments to shut him and WikiLeaks down made him the world’s first cybermartyr. In response, an army of info-anarchists operating under the name Anonymous launched cyberattacks on those governments and denial-of-service attacks on financial services companies PayPal and MasterCard after they severed ties with WikiLeaks. Other companies have become targets of online criminals. Sony has suffered raids on personal information involving tens of millions of customers.

climate change and, 94 as debtor nation, 65, 158, 187 decline of, 63–66 defense program of, 12, 71, 76, 186, 191 entitlement programs in, 12–13, 65, 190 federal debt of, 3, 12, 34, 38, 51, 60, 62, 81, 172, 186, 189 fiscal stimulus in, 11 in G2 with China, 155–84 growing divergence with Chinese economic policies, 62–63, 77 intellectual property laws and, 84 Internet protocol in, 89 leadership role of, 3, 5, 14–15, 24, 25, 40–41, 111, 129, 154, 195 loss of manufacturing jobs in, 64 military commitments of, 187 nuclear program of, 59 oil exported by, 47–48 outsourcing by, 126–27 Pakistan’s relationship with, 115 pollution caused by, 158 poor infrastructure of, 186, 189 possibility of Chinese war with, 170–74 reduced role of, 194, 195 smart grids in, 73 taxes in, 190 trade by, 116–17, 120, 143, 153, 154, 158, 163 unemployment in, 77 in withdrawal from Iraq, 32 in world currency and debt crises, 38 United States and the World Economy, The (Bergsten), 157–58 urbanization, 52, 99, 104–5, 118 Uzbekistan, 135 Varyag, 23 vegetable oil, 100 Venezuela, 25, 48, 138, 168, 177, 182 state capitalism in, 78 Vietnam, 23, 70, 114, 121, 129, 140–41, 194 multinationals in, 80 rice exported by, 102 water security in, 105 Vietnam War, 49 Voice of America, 92 WAPI, 86 war on terror, 11 wars, 123 prevention of, 68 Warsaw Pact, 53 Washington, George, 7 Washington Consensus, 42, 46, 174 water, 68 security of, 3, 5, 97, 104–7, 129–30, 140, 147 Wells, H. G., 86–87 Wen Jiabao, 8, 12, 21, 143 Western Europe, 46–47 oil imported by, 47 West Germany, 45, 46, 47, 53, 82, 165 Wi-Fi, 86 WikiLeaks, 75 World Bank, 4, 28, 29–30, 99, 104, 118, 134, 135 American and European influence in, 42, 43–44 creation of, 39, 43 in world currency and debt crises, 38 World Brain (Wells), 86–87 World Trade Organization, 60 Doha Round, 103 World War I, 3, 11, 40, 141, 167, 170 World War II, 11, 38–40, 56–57, 151, 170, 187 Xinhua, 8, 62, 70 Yanukovych, Viktor, 138 Yeltsin, Boris, 54 Yemen, 14, 67, 114 chaos in, 112, 175, 183 yen, 83 Yom Kippur War, 48–49 yuan: China accused of manipulation of, 79–80, 154, 161–62 as international currency, 83 Yugoslavia, 32 Zambia, 119, 120 Zimbabwe, 7–8, 130, 131–32 Zoellick, Robert, 157 ALSO BY IAN BREMMER The End of the Free Market: Who Wins the War Between States and Corporations?

pages: 237 words: 67,154

Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet by Trebor Scholz, Nathan Schneider

1960s counterculture, activist fund / activist shareholder / activist investor, Airbnb, Amazon Mechanical Turk, barriers to entry, basic income, bitcoin, blockchain, Build a better mousetrap, Burning Man, capital controls, citizen journalism, collaborative economy, collaborative editing, collective bargaining, commoditize, conceptual framework, crowdsourcing, cryptocurrency, Debian, deskilling, disintermediation, distributed ledger, Ethereum, ethereum blockchain, future of work, gig economy, Google bus, hiring and firing, income inequality, information asymmetry, Internet of things, Jacob Appelbaum, Jeff Bezos, job automation, Julian Assange, Kickstarter, lake wobegon effect, low skilled workers, Lyft, Mark Zuckerberg, means of production, minimum viable product, moral hazard, Network effects, new economy, offshore financial centre, openstreetmap, peer-to-peer, post-work, profit maximization, race to the bottom, ride hailing / ride sharing, SETI@home, shareholder value, sharing economy, Shoshana Zuboff, Silicon Valley, smart cities, smart contracts, Snapchat, TaskRabbit, technoutopianism, transaction costs, Travis Kalanick, Uber for X, uber lyft, union organizing, universal basic income, Whole Earth Catalog, WikiLeaks, women in the workforce, Zipcar

FURTHER RESOURCES LAUNCH EVENT “Platform Cooperativism: The Internet, Ownership, Democracy,” The New School (November 2015), video archive: http://platformcoop.net/2015/video READINGS Trebor Scholz, “Platform Cooperativism vs. the Sharing Economy,” Medium (December 5, 2014), https://tinyurl.com/oj8rna2 Nathan Schneider, “Owning Is the New Sharing,” Shareable (December 21, 2014), http://shareable.net/blog/owning-is-the-new-sharing Janelle Orsi, Frank Pasquale, Nathan Schneider, Pia Mancini, Trebor Scholz, “5 Ways to Take Back Tech,” The Nation (May 27, 2015), http://thenation.com/article/5-ways-take-back-tech Trebor Scholz, Platform Cooperativism: Challenging the Corporate Sharing Economy (Rosa Luxemburg Stiftung, New York Office, 2016, with additional translations in Spanish, French, Portuguese, German, Italian, and Chinese), http://platformcoop.net/about/primer Trebor Scholz, Uberworked and Underpaid: How Workers are Disrupting the Digital Economy (Polity, 2016) WEBSITES Platform Cooperativism portal, http://platformcoop.net Platform Cooperativism Consortium, http://platformcoop.newschool.edu The Internet of Ownership, http://internetofownership.net Shareable, http://shareable.net Sustainable Economies Law Center, http://theselc.org OR Books PUBLISHING THE POLITICS OF THE INTERNET What’s Yours is Mine: Against the Sharing Economy TOM SLEE Black Ops Advertising: Native Ads, Content Marketing, and the Covert World of the Digital Sell MARA EINSTEIN Splinternet: How Geopolitics and Commerce are Fragmenting the World Wide Web SCOTT MALCOLMSON Lean Out: The Struggle for Gender Equality in Tech and Start-Up Culture ELISSA SHEVINSKY, EDITOR When Google Met WikiLeaks JULIAN ASSANGE The Big Disconnect: Why the Internet Hasn’t Transformed Politics (Yet) MICAH L. SIFRY Cypherpunks: Freedom and the Future of the Internet JULIAN ASSANGE WITH JACOB APPELBAUM, ANDY MüLLER-MAGUHN, AND JéRéMIE ZIMMERMANN Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet DAVID MOON, PATRICK RUFFINI, AND DAVID SEGAL, EDITORS For more information, visit our website at www.orbooks.com

pages: 743 words: 201,651

Free Speech: Ten Principles for a Connected World by Timothy Garton Ash

A Declaration of the Independence of Cyberspace, activist lawyer, Affordable Care Act / Obamacare, Andrew Keen, Apple II, Ayatollah Khomeini, battle of ideas, Berlin Wall, bitcoin, British Empire, Cass Sunstein, Chelsea Manning, citizen journalism, Clapham omnibus, colonial rule, crowdsourcing, David Attenborough, don't be evil, Donald Davies, Douglas Engelbart, Edward Snowden, Etonian, European colonialism, eurozone crisis, failed state, Fall of the Berlin Wall, Ferguson, Missouri, Filter Bubble, financial independence, Firefox, Galaxy Zoo, George Santayana, global village, index card, Internet Archive, invention of movable type, invention of writing, Jaron Lanier, jimmy wales, John Markoff, Julian Assange, Mark Zuckerberg, Marshall McLuhan, mass immigration, megacity, mutually assured destruction, national security letter, Nelson Mandela, Netflix Prize, Nicholas Carr, obamacare, Peace of Westphalia, Peter Thiel, pre–internet, profit motive, RAND corporation, Ray Kurzweil, Ronald Reagan, semantic web, Silicon Valley, Simon Singh, Snapchat, social graph, Stephen Hawking, Steve Jobs, Steve Wozniak, The Death and Life of Great American Cities, The Wisdom of Crowds, Turing test, We are Anonymous. We are Legion, WikiLeaks, World Values Survey, Yom Kippur War

Many Americans will think of the publication of the Pentagon Papers by the New York Times and Washington Post in the early 1970s: leaked copies of internal US government reports showing just how unsuccessfully and mendaciously the United States was prosecuting the Vietnam War. More recently, we think of the publication by the Guardian and other leading newspapers and magazines—including Der Spiegel, Le Monde and The Hindu—of carefully redacted versions of secret US State Department communications leaked by Private Bradley (subsequently Chelsea) Manning via Julian Assange’s WikiLeaks, and then a selection of the NSA and GCHQ documents passed to them by Snowden. When he first met the journalists involved, in a hotel in Hong Kong, Snowden specifically explained that he wanted experienced news media to decide what it would be in the public interest to publish.56 One can always argue about this or that specific editorial decision, but in general, these newspapers exercised an important controlling function in the public interest; one which government, parliament and the courts had failed to perform.

But maybe the combined secret power of the state and companies, P2, is sometimes such that you need these extraordinary measures to combat it? It was not just hacktivists who covered their faces with the stylised Guy Fawkes mask of Anonymous, inspired by the film ‘V for Vendetta’, when they joined real-life protests at what they saw as the abuse of anonymous state and corporate power revealed by Julian Assange and Edward Snowden.144 After all, police or secret services would photograph you as you marched, and enter your digital image ineradicably into a searchable database. Perhaps it takes anonymous to restrain the power of anonymous? 8 SECRECY ‘We must be empowered to challenge all limits to freedom of information justified on such grounds as national security’. S: You can’t say that. C: Why not?

The US supports such technologies to promote the spread of good things (democracy, human rights, free speech) and opposes them to prevent the spread of bad ones (terrorism, cybercrime, child pornography, infringements of intellectual property). But who decides what is good or bad? The United States. A State Department spokesperson, asked to explain the apparent inconsistency between her criticism of the Indian government for blocking sites the Indian government considered dangerous and Washington’s own stance on Wikileaks, said: ‘WikiLeaks didn’t have to do with freedom of the internet. It had to do with . . . the compromise of US Government classified information’.87 While governments must naturally assert perfect consistency, there is a tension here, as America’s left hand points in a different direction to and sometimes wrestles with its right. In a reference to Hillary Clinton, this has been called the Clinton Paradox.88 With these reservations, it is nonetheless fair to say that the United States remains at once the most powerful and the most consistently pro–free speech state in the early-twenty-first-century world.

pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan

active measures, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, British Empire, Cass Sunstein, citizen journalism, credit crunch, cryptocurrency, cuban missile crisis, data acquisition, Donald Trump, drone strike, Edward Snowden, family office, hive mind, Internet Archive, Jacob Appelbaum, John Markoff, John von Neumann, Julian Assange, Kickstarter, kremlinology, MITM: man-in-the-middle, Nate Silver, profit motive, RAND corporation, ransomware, risk tolerance, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Silicon Valley, South China Sea, Steve Jobs, Stuxnet, technoutopianism, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, WikiLeaks, zero day

Among other things, they noted overlaps in the hacking infrastructure used to target the Democratic organizations and other operations attributed to Russia, including a notable one against the German Parliament.29 As an amusing extra sign that something was amiss, when a journalist interviewing Guccifer online asked him to switch over to his native Romanian, it quickly became apparent that he did not speak the language.30 Enter WikiLeaks. Even prior to the Democrats’ announcement and Guccifier’s creation, the group’s founder, Julian Assange, had sought to be relevant to the 2016 election. On June 12, he promised that WikiLeaks would release damaging Democratic emails. Why he said this remains a mystery, since the first known direct contact between the GRU and WikiLeaks occurred on June 14, though it is possible there had been a previous undetected transfer of information through intermediaries.31 The GRU and WikiLeaks continued to talk. On June 22, WikiLeaks messaged Guccifer, requesting access to any new material. WikiLeaks promised to distribute it with a higher profile and impact than Guccifer could. On July 6, the group reached out to Guccifer again, highlighting the upcoming Democratic convention and asking for any information related to the Clinton campaign.

One hour later, another breaking news story appeared, further burying the government’s words and even distracting attention, to some extent, from Trump’s seeming admission of sexual assault: WikiLeaks began publishing John Podesta’s emails.48 These emails included excerpts from Hillary Clinton’s speeches to Wall Street banks, a subject of intense controversy during the Democratic presidential primary. As WikiLeaks parceled tens of thousands of his emails across the month of October, media coverage kept pace. No detail was too small, it seemed. Even Podesta’s advice on how best to cook risotto garnered many media mentions, as if the country had no bigger things to worry about.49 The Access Hollywood tape, and certainly the United States government’s condemnation of the Russian activity, were yesterday’s news. It is hard to say whether WikiLeaks timed the Podesta leaks to bury the other stories that were less favorable to Trump.

On July 6, the group reached out to Guccifer again, highlighting the upcoming Democratic convention and asking for any information related to the Clinton campaign. Time was of the essence, the message said, because the damaging material had to leak before Hillary Clinton could win over Bernie Sanders supporters in her run toward the general election.32 On July 14, the GRU provided WikiLeaks with a large encrypted batch of hacked files in an email with the subject “big archive” and the message “a new attempt.”33 After all the discussion, Assange delivered for the GRU. On July 22, just three days before the Democratic convention that would officially nominate Hillary Clinton, WikiLeaks posted the largest and most significant trove of DNC files. This batch included almost twenty thousand copies of emails stolen by the GRU hackers. The most damaging emails were the ones that showed some staffers at the DNC, which is not supposed to take sides in intraparty contests, clearly supporting Clinton and not Sanders in the presidential primaries.

pages: 274 words: 85,557

DarkMarket: Cyberthieves, Cybercops and You by Misha Glenny

Berlin Wall, Bretton Woods, Brian Krebs, BRICs, call centre, Chelsea Manning, Fall of the Berlin Wall, illegal immigration, James Watt: steam engine, Julian Assange, MITM: man-in-the-middle, pirate software, Potemkin village, reserve currency, Silicon Valley, Skype, Stuxnet, urban sprawl, white flight, WikiLeaks, zero day

He said that they had not received any directive from Ankara and that after lunch in the canteen I would be able to talk to Mr Evyapan. Eventually I was led through to the small, oblong room. Çagatay Evyapan is cautious but self-confident. Just as Bilal Sen had told me, his instincts would detect immediately if I was trying to ferret out some snippet of information in a devious way. He reminded me of Julian Assange, the mastermind behind WikiLeaks – super-smart, but with an iron conviction in his own intellectual superiority, which at times might be taken for extreme narcissism. When I suggested to him that Lord Cyric was Tony – the tubby, bespectacled businessman named by Mert Ortaç – he emitted a snort of the deepest contempt. ‘You’ve been talking to Turkish intelligence, haven’t you?’ he said sharply. In a manner of speaking Cha0 was correct: if Mert was lying (let’s face it, a real possibility), then the bespectacled man must have been planted in his story by MIT, Turkish intelligence.

Successive US governments have granted greater powers to law enforcement than most European governments would contemplate, allowing officers easier access to data from private companies, in the name of fighting crime and terrorism. The implications of this are both profound and, for the moment, impenetrable. Concerns about crime, surveillance, privacy, the accumulation of data by both private and state institutions, freedom of speech (step forward WikiLeaks), ease of access to websites (the so-called net neutrality debate), social networking as a political tool, and national-security interests constantly bump up against one another in cyberspace. One might argue, for example, that Google’s multi-platform, multitasking omnipresence violates the principles of America’s anti-trust legislation and that the agglomeration of all that personal data is both an opportunity for criminals and a threat to civil liberties.

That evening the websites of Estonia’s President and several government ministries started receiving inordinate amounts of spam email, while the Prime Minister’s photo on his party’s website was defaced. Russian-language chat rooms began to exhort hackers to launch attacks on Estonian sites and were distributing the software to do so. According to sources quoted in a US Embassy telegram to Washington (c/o WikiLeaks), the initial attacks were technically unsophisticated and ‘seemed more like a cyber riot than a cyber war’. Over the weekend, however, the attacks escalated from spam showers to DDoS attacks. Hackers had created dozens of those pesky botnets, suborning infected zombie computers around the world and forcing them to request Estonian websites. These were mighty assaults – the presidential website, ‘which normally has a two-million megabits-per-second capacity, was flooded with nearly 200 million Mbps of traffic’, according to the US Embassy cable.

pages: 387 words: 112,868

Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money by Nathaniel Popper

4chan, Airbnb, Apple's 1984 Super Bowl advert, banking crisis, Ben Horowitz, bitcoin, blockchain, Burning Man, buy and hold, capital controls, Colonization of Mars, crowdsourcing, cryptocurrency, David Graeber, Edward Snowden, Elon Musk, Extropian, fiat currency, Fractional reserve banking, Jeff Bezos, Julian Assange, Kickstarter, life extension, litecoin, lone genius, M-Pesa, Marc Andreessen, Mark Zuckerberg, Occupy movement, peer-to-peer, peer-to-peer lending, Peter Thiel, Ponzi scheme, price stability, QR code, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Simon Singh, Skype, slashdot, smart contracts, Startup school, stealth mode startup, the payments system, transaction costs, tulip mania, WikiLeaks

A FEW MONTHS earlier the big concern plaguing the Bitcoin forum was how to attract new users, but now the problem was how to deal with the influx of new users, their potentially malicious behavior, and their competing interests. These problems became particularly pronounced after Bitcoin’s next big jump into the spotlight. In November, WikiLeaks, the organization founded by a regular participant in the old Cypherpunk movement, Julian Assange, released a vast trove of confidential American diplomatic documents that revealed previously secret operations around the world. The large credit card companies and PayPal came under immediate political pressure to cut off donations to WikiLeaks, which they did in early December, in what became known as the WikiLeaks blockade. This move pointed to the potentially troubling nexus between the financial industry and the government. If politicians didn’t like the ideas of a particular group, government officials could ask banks and credit card networks to deny the unpopular group access to the financial system, often without requiring any judicial approval.

The financial industry seemed to provide politicians with an extralegal way to crack down on dissent. The WikiLeaks blockade went to the core of some of the concerns that had motivated the original Cypherpunks. Bitcoin, in turn, seemed to have the potential to counteract the problem. Each person on the network controlled his or her coins with his or her private key. There was no central organization that could freeze a person’s Bitcoin address or stop coins from being sent from a particular address. A few days after the WikiLeaks blockade began, PCWorld wrote a widely circulated story that noted the obvious utility of Bitcoin in the situation: “Nobody can stop the Bitcoin system or censor it, short of turning off the entire Internet. If WikiLeaks had requested Bitcoins then they would have received their donations without a second thought.”

It wasn’t clear if Bitcoin could actually be used in this particular instance, but whatever the practical possibilities, the blockade was helping elevate the debate around Bitcoin beyond the rather narrow issues of privacy and government money-printing that had been dominant in the early days. Here was a broader philosophical issue that could attract a wider audience, and the forums were full of new members who had been drawn in by the attention. One new user, a young man in England named Amir Taaki, proposed making Bitcoin donations to WikiLeaks. Amir argued this could raise Bitcoin’s profile at the same time that it could help WikiLeaks raise money. This kicked off a vigorous debate on the forum. A number of programmers worried that the Bitcoin network was not ready for all the traffic—and government scrutiny—that might come if it started to be used for controversial donations. “It is extraordinarily unwise to make Bitcoin such a highly visible target, at such an early stage in this project.

pages: 476 words: 125,219

Digital Disconnect: How Capitalism Is Turning the Internet Against Democracy by Robert W. McChesney

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, access to a mobile phone, Albert Einstein, American Legislative Exchange Council, American Society of Civil Engineers: Report Card, Automated Insights, barriers to entry, Berlin Wall, business cycle, Cass Sunstein, citizen journalism, cloud computing, collaborative consumption, collective bargaining, creative destruction, crony capitalism, David Brooks, death of newspapers, declining real wages, Double Irish / Dutch Sandwich, Erik Brynjolfsson, failed state, Filter Bubble, full employment, future of journalism, George Gilder, Gini coefficient, Google Earth, income inequality, informal economy, intangible asset, invention of agriculture, invisible hand, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, Joseph Schumpeter, Julian Assange, Kickstarter, Mark Zuckerberg, Marshall McLuhan, means of production, Metcalfe’s law, mutually assured destruction, national security letter, Nelson Mandela, Network effects, new economy, New Journalism, Nicholas Carr, Occupy movement, offshore financial centre, patent troll, Peter Thiel, plutocrats, Plutocrats, post scarcity, price mechanism, profit maximization, profit motive, QWERTY keyboard, Ralph Nader, Richard Stallman, road to serfdom, Robert Metcalfe, Saturday Night Live, sentiment analysis, Silicon Valley, single-payer health, Skype, spectrum auction, Steve Jobs, Steve Wozniak, Steven Levy, Steven Pinker, Stewart Brand, Telecommunications Act of 1996, the medium is the message, The Spirit Level, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, Thorstein Veblen, too big to fail, transfer pricing, Upton Sinclair, WikiLeaks, winner-take-all economy, yellow journalism

Moreover, there was no independent journalism to respond when the U.S. government launched a successful PR and media blitz to discredit WikiLeaks. Attention largely shifted from the content of these documents to overblown and unsubstantiated claims that WikiLeaks was costing innocent lives, and to a personal focus on WikiLeaks leader Julian Assange. Glenn Greenwald was only slightly exaggerating when he stated that “there was almost a full and complete consensus that WikiLeaks was satanic.” The onslaught discredited and isolated WikiLeaks, despite the dramatic content that could be found in the documents WikiLeaks had published. The point was to get U.S. editors and reporters to think twice before opening the WikiLeaks door. It worked. Many journalists elsewhere rallied to defend basic principles about transparency and speaking truth to power.

It need deal with only a handful of giants to effectively control the Internet. The consequences of this became striking in the wake of the brouhaha surrounding WikiLeaks after it released government documents in 2010. The “U.S. government response to WikiLeaks,” MacKinnon writes, “highlights a troubling murkiness, opacity, and lack of public accountability in the power relationships between government and Internet-related companies.” Amazon booted WikiLeaks off its servers, and the site immediately collapsed, as there was nowhere else to go.229 Apple pulled a WikiLeaks app from its store.230 Monopolist PayPal—as well as MasterCard, Visa, and Bank of America—also severed ties to WikiLeaks. There is no evidence that the executive branch made any explicit demand of the firms to do what they did; it appears they acted proactively, possibly egged on by all the saber rattling and macho talk coming from Capitol Hill.231 The firms responded to vague claims of illegality on the part of WikiLeaks, but no charges had been filed, nor had anyone been convicted.

But the illusion that this constitutes satisfactory journalism is growing thinner. Nothing demonstrates the situation better than the release by WikiLeaks of an immense number of secret U.S. government documents between 2009 and 2011. To some this was investigative journalism at its best, and WikiLeaks had established how superior the Internet was as an information source. It clearly threatened those in power, so this was exactly the sort of Fourth Estate a free people needed. Thanks to the Internet, some claimed, we were now truly free and had the power to hold leaders accountable.112 In fact, the WikiLeaks episode demonstrates precisely the opposite. WikiLeaks was not a journalistic organization. It released secret documents to the public, but the “documents languished online and only came to the public’s attention when they were written up by professional journalists,” as Heather Brooke put it.

pages: 328 words: 100,381

Top Secret America: The Rise of the New American Security State by Dana Priest, William M. Arkin

airport security, business intelligence, dark matter, drone strike, friendly fire, Google Earth, hiring and firing, illegal immigration, immigration reform, index card, Julian Assange, profit motive, RAND corporation, Ronald Reagan, WikiLeaks

In August 2007, eighteen FBI agents, some with their guns drawn, burst into his home with only his wife and children present, to raid his files during an investigation into his alleged role in helping the New York Times develop its seminal warrantless surveillance story in 2004. The government dropped his case nearly four years later, in April 2011, after Tamm’s career had been ruined and he faced financial peril. The Justice Department is also mulling an indictment on espionage charges against WikiLeaks founder Julian Assange for publishing tens of thousands of pages of classified U.S. diplomatic cables and war-related field reports, some of them allegedly provided by a young army private first class, who is also under arrest. Regardless of Assange’s publicly stated bias against U.S. policies and the allegations against his personal behavior, this unprecedented trove of material has allowed reporters around the world to write some of the most insightful and revealing stories of our time.

The number of secrets has become so enormous that the people in charge of keeping them can’t possibly succeed. That is one lesson from the WikiLeaks disclosures. The leaked State Department cables were allegedly first available to a disgruntled army private with a history of instability because the government wasn’t giving even a basic level of protection to those documents, and because his colleagues allowed him to bring a rewritable CD-ROM with Lady Gaga’s music into work, not realizing it could act as the black bag into which a quarter of a million sensitive diplomatic cables could be dumped and carted away. In the government-wide security and counterintelligence investigation that has followed the WikiLeaks disclosures, government experts have learned that most federal agencies have little understanding of how to protect their sensitive information, according to people involved in the review.

At any one time, he could find as many as 15,000 listings for very specialized positions that required a top secret clearance. Between 2006 and 2010 he cataloged 182,000 such job announcements in his files. As he did so, Arkin started to count government organizations and private companies working at the “secret” level of classification. Something is classified secret5 if its unauthorized disclosure would cause “serious damage” to national security. For instance, many of the State Department cables published by WikiLeaks are classified secret because they provide candid assessments of foreign leaders and agreements. Routine field reports from military units are also classified secret on the theory that they might provide useful tidbits to an enemy. He was quickly overwhelmed by the volume. There were simply too many organizations and companies to track. Had he been looking prior to September 11, he would have expected to see evidence of a significant number of such programs, but the post-9/11 quantity was mind-boggling.

pages: 122 words: 38,022

Kill All Normies: Online Culture Wars From 4Chan and Tumblr to Trump and the Alt-Right by Angela Nagle

4chan, A Declaration of the Independence of Cyberspace, affirmative action, anti-communist, battle of ideas, Bernie Sanders, bitcoin, citizen journalism, crony capitalism, death of newspapers, Donald Trump, feminist movement, game design, Hacker Ethic, hive mind, Julian Assange, Kickstarter, mass immigration, moral panic, Nelson Mandela, Norman Mailer, Occupy movement, open borders, post-industrial society, pre–internet, Ronald Reagan, sexual politics, Silicon Valley, The Wisdom of Crowds, WikiLeaks

And by abusive I don’t mean comments that disagree with whatever I’ve written – I came up through the trade union movement don’t forget, and I’ve worked in a men’s prison, so I’m not some delicate flower who can’t handle a bit of banter or heated debate – no, I’m talking about personal, usually sexualised abuse, the sort that on more than one occasion now has made me stop and wonder if what I’m doing is actually worth it. […] I read about how I’m apparently too ugly for any man to want to rape, or I read graphic descriptions detailing precisely how certain implements should be shoved into one or more of my various orifices. Feminist blogger Dawn Foster wrote: The worst instance of online abuse I’ve encountered happened when I blogged about the Julian Assange extradition case. […] Initially it was shocking: in the space of a week, I received a rabid email that included my home address, phone number and workplace address, included as a kind of threat. Then, after tweeting that I’d been waiting for a night bus for ages, someone replied that they hoped I’d get raped at the bus stop. Feminist sex writer Petra Davis later wrote: When I started getting letters at my flat, I reported them to the police, but they advised me to stop writing provocative material.

It will place contemporary culture wars in some historical context and attempt to untangle the real from the performance, the material from the abstract and the ironic from the faux-ironic, if such a thing is any longer possible. Chapter One The leaderless digital counter-revolution It is worth thinking back now to the early 2010s, when cyberutopianism had its biggest resurgence since the 90s, before the dot-com bubble burst. This time it emerged in response to a series of political events around the world from the Arab Spring to the Occupy movement to new politicized hacker movements. Anonymous, Wikileaks and public-square mass protests in Spain and across the Middle East were getting huge coverage in the news, causing a flurry of opinion and analysis pieces about their profound significance. All of these events were being attributed to the rise of social media and characterized as a new leaderless form of digital revolution. The hyperbole and hubris of the moment should have been enough to make anyone skeptical, but most on the left were swept up in the excitement as images of vast crowds in public squares appeared on social media and then in the mainstream media.

pages: 359 words: 113,847

Siege: Trump Under Fire by Michael Wolff

Bernie Madoff, Boris Johnson, conceptual framework, cuban missile crisis, currency manipulation / currency intervention, Deng Xiaoping, Donald Trump, forensic accounting, gig economy, high net worth, hiring and firing, illegal immigration, immigration reform, impulse control, Jeffrey Epstein, Julian Assange, oil shale / tar sands, Potemkin village, Saturday Night Live, sovereign wealth fund, Steve Jobs, WikiLeaks

He now personified the combination of fanatical lunacy and personal self-interest—he was always selling some book or product—that seemed to more and more exist at the edges of modern politics. Indeed, he was Trumpian, but even more so, often leading Trump to brand him as a nuisance and a nutter. It certainly would be an odd kind of justice, Bannon thought, if the case against the president came down to Stone, Julian Assange, and Jerome Corsi—crazies, conspiracists, bullshit artists, and fringe players all. Corsi, a right-wing gadfly who had recently become a figure in the investigation, connecting Stone to WikiLeaks and Assange, had once spearheaded the rumors that Breitbart News founder Andrew Breitbart, who died in 2012 from a heart attack, had been assassinated—and that Bannon, in cahoots with the CIA, was involved. (A raging Bannon had confronted Corsi: “I will shit down your neck if you don’t stop this.

What’s more, Bannon, after his testimony before the special counsel earlier in the year, had come to doubt that Mueller had the goods. Beyond finding that here, in the Trump camp, were some of the sloppiest, most unsophisticated, stupidest people on earth—who, to say the least, had little or no sensitivity “to, shall we say, accepting foreign assistance,” as Bannon put it—what did the investigators have? Or, to put it another way, who did they have? Roger Stone, Carter Page, George Papadopoulos, Julian Assange? Bannon was unimpressed: “No way you impeach the president over those dragoons.” They were hopeless flotsam and jetsam. Obstruction? “Give me a break.” With a Republican Congress in place, what Mueller needed was something that would undermine Trump with the something less than 35 percent of the electorate that had become fanatically his. As long as that support held, the Republican Congress, Bannon believed, would have to hold.

Vanity Fair Veterans Affairs Department Vietnam, Kim summit in Vietnam War View, The (TV show) Virginia, midterms of 2018 and Wachtell, Lipton, Rosen & Katz Waco standoff Wag the Dog (film) Wahlberg, Mark Wall Wall Street Journal Walter Reed National Military Medical Center War on Terror Warren, Elizabeth Washington, Michigan, rally Washington Post Watergate scandal Waters, Maxine Weinstein, Harvey Weisselberg, Allen Weissmann, Andrew Wexton, Jennifer Whitaker, Matthew White House Correspondents’ Dinner White House staff “Anonymous” op-ed and communications team DOJ and midterms and Mueller and Whitestone, Erik Whitewater investigations WikiLeaks Wiles, Susie Wilson, Woodrow Winfrey, Oprah witness tampering WME company Wolf, Michelle Woman’s Day Woodward, Bob working class World Bank World War I commemoration World War II Wray, Christopher Wu Xiaohui Xi Jinping Young, Cy Zelinsky, Aaron ALSO BY MICHAEL WOLFF Fire and Fury: Inside the Trump White House Television Is the New Television: The Unexpected Triumph of Old Media in the Digital Age The Man Who Owns the News: Inside the Secret World of Rupert Murdoch Autumn of the Moguls: My Misadventures with the Titans, Poseurs, and Money Guys Who Mastered and Messed Up Big Media Burn Rate: How I Survived the Gold Rush Years on the Internet Where We Stand White Kids About the Author Michael Wolff is the author of Fire and Fury, the number one bestseller that for the first time told the inside story of the Trump White House.

pages: 464 words: 121,983

Disaster Capitalism: Making a Killing Out of Catastrophe by Antony Loewenstein

activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, American Legislative Exchange Council, anti-communist, Asian financial crisis, British Empire, Capital in the Twenty-First Century by Thomas Piketty, Chelsea Manning, clean water, collective bargaining, colonial rule, corporate social responsibility, Corrections Corporation of America, Edward Snowden, facts on the ground, failed state, falling living standards, Ferguson, Missouri, financial independence, full employment, G4S, Goldman Sachs: Vampire Squid, housing crisis, illegal immigration, immigration reform, income inequality, Julian Assange, Kickstarter, mandatory minimum, market fundamentalism, mass incarceration, Naomi Klein, neoliberal agenda, obamacare, Occupy movement, offshore financial centre, open borders, private military company, profit motive, Ralph Nader, Ronald Reagan, Satyajit Das, Scramble for Africa, Slavoj Žižek, stem cell, the medium is the message, trade liberalization, WikiLeaks

My former agent, Mary Cunnane, was instrumental in formulating some of the ideas in this book. Thanks to my Australian publisher, Melbourne University Press, for continuing to back my vision. Louise Adler, Elisa Berg, Sally Heath, Paul Smitz, and Penelope White have all contributed hugely to the vision in your hands. I continue to be inspired by a range of journalists and groups whose work informs my own: Julian Assange and WikiLeaks, Pratap Chatterjee, Glenn Greenwald, Amy Goodman, the late and great Michael Hastings, Naomi Klein, Dahr Jamail, Chelsea Manning, George Monbiot, Greg Palast, John Pilger, Jeremy Scahill, Edward Snowden, and Matt Taibbi. Alison Martin is a truly unique woman who constantly challenges, provokes, and loves me. Her intelligence, insights, and warmth run through this book. Our life journey together is one of the best damn things to ever happen to me.

New York Times, May 28, 2014. 46Saskia Sassen, “European Economy’s Invisible Transformation: Expulsions and Predatory Capitalism,” London School of Economics and Political Science, July 3, 2014, at blogs.lse.ac.uk. 47Harriet Alexander, “Greece’s Great Fire Sale,” Telegraph, April 20, 2013. 48“Privatization of Athens Water Utility Ruled Unconstitutional,” Press Project, May 28, 2014, at thepressproject.net. 49Niki Kitsantonis, “Greece Wars with Courts over Ways to Slash Budget,” New York Times, June 12, 2014. 50Daniel Trilling, “Shock Therapy and the Gold Mine,” New Statesman, June 18, 2013. 51“Europe’s Failed Course,” New York Times, February 17, 2012. 52Joanna Kakissis, “36 hours in Athens,” New York Times, October 19, 2014. 53Yiannis Baboulias, “Our Big Fat Greek Privatisation Scandals,” Al Jazeera English, June 10, 2014. 54Helen Smith, “Greece Begins 50 Billion Euro Privatisation Drive,” Guardian, August 1, 2010. 55Slavoj Žižek, “Save Us from the Saviours,” London Review of Books, May 28, 2012. 56Alexander, “Greece’s Fire Sale.” 57Ibid. 58Katie Allen, “Austerity in Greece Caused More than 500 Male Suicides, Say Researchers,” Guardian, April 21, 2014. 59Mark Lowen, “Greek’s Million Unpaid Workers,” BBC News, December 5, 2013. 60“Sisa: Cocaine of the Poor,” Vice News, May 22, 2013, at vice.com. 61Liz Alderman, “Societal Ills Spike in Crisis-Stricken Greece,” New York Times, May 22, 2013. 3Haiti 1Mark Schuller and Pablo Morales, eds, Tectonic Shifts (Sterling, VA: Stylus, 2012). 2Ibid., p. 2. 3Ansel Herz and Kim Ives, “Wikileaks Haiti: The Post-Quake ‘Gold Rush’ for Reconstruction Contracts,” Nation, June 15, 2011. 4Deepa Panchang, Beverly Bell, and Tory Field, “Disaster Capitalism: Profiting from Crisis in Post-Earthquake Haiti,” Truthout, February 16, 2011, at truth-out.org. 5Herz and Ives, “Wikileaks Haiti.” 6The AshBritt company was accused of questionable practices in the wake of Hurricane Katrina, the CEPR revealing that a “2006 congressional report examining federal contract waste and abuse noted AshBritt used multiple layers of subcontractors, each of whom got paid while passing on the actual work.”

Market speculators pressurize fragile nations such as Greece, whose citizens are forced to survive with fewer public services.9 British citizens living on the margins face eviction or spiraling rent increases because global fund managers, such as Westbrook—based in the United States—purchase homes as assets to be milked for profit.10 The International Monetary Fund (IMF) traverses the world with the backing of Western elites, strong-arming nations into privatizing their resources and opening up their markets to multinationals. Resistance to this bitter medicine is only one reason that large swathes of Latin America have become more independent since the 2000s. The mass privatization that results—a central plank of US foreign policy—guarantees corruption in autocracies. Wikileaks’ State Department cables offer countless examples of this, including in Egypt under former president Hosni Mubarak.11 The World Bank is equally complicit and equally unaccountable. In 2015 it admitted that it had no idea how many people had been forced off their lands around the world due to its resettlement policies. The story barely made the news and no heads rolled. One Californian town, Maywood, took the privatization memo a bit too seriously.

pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman

23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Brian Krebs, business process, butterfly effect, call centre, Charles Lindbergh, Chelsea Manning, cloud computing, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, Dean Kamen, disintermediation, don't be evil, double helix, Downton Abbey, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Filter Bubble, Firefox, Flash crash, future of work, game design, global pandemic, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Joi Ito, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, knowledge worker, Kuwabatake Sanjuro: assassination market, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, low earth orbit, M-Pesa, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, MITM: man-in-the-middle, mobile money, more computing power than Apollo, move fast and break things, move fast and break things, Nate Silver, national security letter, natural language processing, obamacare, Occupy movement, Oculus Rift, off grid, offshore financial centre, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, RAND corporation, ransomware, Ray Kurzweil, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Ross Ulbricht, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, supply-chain management, technological singularity, telepresence, telepresence robot, Tesla Model S, The Future of Employment, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Wall-E, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, zero day

The number and reach of these highly profitable transnational organized cyber-crime rings have grown, and the security intelligence firm CrowdStrike was actively tracking more than fifty such major organizations globally. Besides transnational organized crime syndicates, hacktivists—politically motivated cyber attackers—represent one of the most influential and powerful groups in cyberspace. Anonymous, LulzSec, AntiSec, WikiLeaks, and the Syrian Electronic Army fall into this group and launch their attacks in retaliation for perceived injustices. Personalities such as Julian Assange, Chelsea (Bradley) Manning, and Edward Snowden have become household names for challenging some of the world’s most powerful institutions and for releasing data that others would most certainly have preferred remain hidden. While Assange, Manning, and Snowden have been propelled onto the covers of newspapers around the world, other hacktivist groups prefer that their individual members remain discreetly hidden in subordination to the organization itself and its broader agenda.

One such notable example is Anonymous, a self-described leaderless organization whose members have become recognizable in public for wearing Guy Fawkes masks. The group’s motto, “We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us,” manifests its organizational ethos: “The corrupt fear us. The honest support us. The heroic join us.” When MasterCard, Visa, and PayPal all agreed to stop funneling donations to Julian Assange’s WikiLeaks organization, Anonymous responded by launching a series of effective cyber attacks against the financial firms. Anonymous is strongly against what it perceives to be rigid antipiracy laws, and it took credit for an earlier attack against the Sony PlayStation Network in response to Sony’s support of U.S. antipiracy legislation known as the Stop Online Piracy Act. Anonymous views itself as hacking for good and has taken on a wide variety of social causes, including its support of activists throughout the Middle East during the Arab Spring.

Eventually, your personal details will fall into the hands of criminal cartels, competitors, and even foreign governments. While big data may be the new oil, our personal data are more like weapons-grade plutonium—dangerous, long lasting, and once they are leaked, there’s no getting them back. Even the federal government is realizing it too can fall victim to this problem. Just look at the 2010 WikiLeaks debacle and the hundreds of thousands of classified diplomatic cables Private Chelsea (Bradley) Manning was able to steal while working as an army intelligence analyst in Iraq. Of course just a few years later, the world would meet Edward Snowden, who used his skills and access as an NSA system administrator to steal millions of highly classified files from America and its allies and share them with journalists for publication online.

pages: 476 words: 139,761

Kleptopia: How Dirty Money Is Conquering the World by Tom Burgis

active measures, Anton Chekhov, banking crisis, Bernie Madoff, Big bang: deregulation of the City of London, Boris Johnson, British Empire, collapse of Lehman Brothers, coronavirus, corporate governance, COVID-19, Covid-19, credit crunch, Credit Default Swap, cryptocurrency, do-ocracy, Donald Trump, energy security, Etonian, failed state, Gordon Gekko, high net worth, Honoré de Balzac, illegal immigration, invisible hand, Julian Assange, liberal capitalism, light touch regulation, Mark Zuckerberg, Martin Wolf, Mikhail Gorbachev, Mohammed Bouazizi, Northern Rock, offshore financial centre, Right to Buy, Ronald Reagan, Skype, sovereign wealth fund, trade route, WikiLeaks

He read about Rudolf Elmer, who had worked at the Cayman Islands office of the Swiss bank Julius Bär. Elmer had developed the same suspicions as Nigel: that all the corporate legerdemain his bank supplied to its clients allowed them to evade tax and launder money. He had raised his concerns with his managers, then with the Swiss authorities, then at a press conference in London during which he handed WikiLeaksJulian Assange two discs containing the account details of 2,000 ‘prominent people’. The Economist story about Elmer that Nigel read described the Swiss authorities’ response. They used the banking secrecy law to visit a ‘legal hell’ on him. He was locked up without charge for 187 days, and he and his family were so hounded by the bank’s agents that his daughter was left traumatised. Nigel researched Kostas Vaxevanis, the Greek journalist arrested when he published the so-called Lagarde List of two thousand Greeks with money hidden in Swiss accounts.

., p.211 in contact with an official from the criminal division of the Interior Ministry: A leaked entry dated 1986 from the Interior Ministry files describes Mogilevich’s current criminal enterprise and past convictions and says he has been ‘in contact’ with an official deal with German intelligence: Friedman, Red Mafiya, p.210 danced with Bob Levinson: Levinson’s reports of the US law enforcement meetings with Mogilevich; Barry Meier, Missing Man, Farrar, Straus and Giroux, 2016, p.59 intelligence file disappeared: Friedman, Red Mafiya, p.211 in a bar nearby: Glenny, McMafia, pp.87–9; Friedman, Red Mafiya, pp.215–16; transcript of Tom Mangold’s interview with Mogilevich for ‘The Billion Dollar Don’, Panorama, 1999 annual profits: Roman Olearchyk, Haig Simonian and Stefan Wagstyl, ‘Energy fears highlight trade’s murky side’, Financial Times, January 9, 2009 his cable: ‘USG concerns over Austrian banking operations’, cable sent by US embassy in Austria on February 17, 2006, later published by WikiLeaks, wikileaks.org/plusd/cables/06VIENNA515_a.html bearer shares: Andrew E. Kramer, ‘Ukraine gas deal draws attention to secretive importer’, New York Times, February 1, 2006, nytimes.com/2006/02/01/business/worldbusiness/ukraine-gas-deal-draws-attention-to-secretive.html Seva’s blessing: ‘Ukraine: Firtash makes his case to the USG’, December 10, 2008, later published by WikiLeaks, wikileaks.org/plusd/cables/08KYIV2414_a.html. The cable contains the ambassador’s record of his conversation with Firtash: ‘He acknowledged ties to Russian organized crime figure Seymon [sic] Mogilevich, stating he needed Mogilevich’s approval to get into business in the first place.

However, the ruling also records that the document was accompanied by a cover letter from the Ministry of Industry and Energy of the Russian Federation to TNK-BP billions of dollars: Alexander Kots, ‘FSB catches energy spies’, Komsomolskaya Pravda, March 20, 2008, kp.ru/daily/24067/307041 (in Russian) told American diplomats: ‘Update on GOR investigation of TNK-BP’, US state department cable published by WikiLeaks, wikileaks.org/plusd/cables/08MOSCOW816_a.html ‘the FSB suspects’: Vera Surzhenko and Alexey Nikolsky, ‘Lubyanka does not sleep’, March 20, 2008, Vedomosti (in Russian), vedomosti.ru/newspaper/articles/2008/03/21/lubyanka-ne-dremlet business cards of CIA officers: Asked about this by the author, McCormick neither confirmed nor denied that the cards were his seventeen hours: McCormick later told Lough in an email that the interrogation had lasted seventeen hours.

On the Road: Adventures From Nixon to Trump by James Naughtie

Affordable Care Act / Obamacare, Alistair Cooke, anti-communist, Ayatollah Khomeini, Berlin Wall, Bernie Sanders, centre right, collapse of Lehman Brothers, Donald Trump, Ferguson, Missouri, Haight Ashbury, illegal immigration, immigration reform, Julian Assange, Mikhail Gorbachev, Norman Mailer, obamacare, plutocrats, Plutocrats, post-work, Ronald Reagan, Ronald Reagan: Tear down this wall, South China Sea, trickle-down economics, white flight, WikiLeaks, Yom Kippur War, young professional, zero-sum game

My team just shared photos from your trump sign waving day yesterday!’). It was the kind of thing of which any mainstream political campaign, operating out of dingy rooms in New York or Chicago or Atlanta, would be proud. Except it was coming from St Petersburg – at least 123 million Facebook posts – and, with the help of WikiLeaks, it was directed, secretly, at achieving one outcome, the disruptive one that would most please the man who could then deal with Trump: Vladimir Putin. That campaign cry – ‘I love WikiLeaks!’ from Trump – rolled down the years. There is no doubt about where Julian Assange of WikiLeaks stood on this question. In a 2015 Twitter comment he confirmed that they believed it would be better for their purpose – widespread disruption, the aim he shared with Putin – if the Republican candidate were to win. For good measure he described Clinton as ‘a bright, well-connected, sadistic sociopath’, thereby prefiguring dozens of Trump rallies.

Imagine giving over the vast power of the modern state to a man who says in advance that he will punish his critics and jail his opponent.’ Trump simply ignored such criticism. The investigation into Clinton’s use of a personal email server when she was secretary of state from 2008 to 2011 was enough. It was perfect conspiracy material, because the less that was known about what the emails contained, the more sinister Trump could make them sound. At every stop he urged WikiLeaks, which said it had a huge cache of hacked Democratic emails, to publish them. ‘I love WikiLeaks!’ he would say. And if the Russians were holding emails too? ‘Bring it on! Publish!’ The campaign was to be as much an attack on his opponent as a set of promises, with assistance welcome from anyone who would join the fun, for whatever reason. At rally after rally, he responded to the crowd’s chant with remarks like this one, in Pennsylvania – ‘Lock her up is right!

I fought back from his really ill-advised inappropriate comments in the summer. Fought back. We had a good convention by everybody’s account. I won the debates. We were on a very solid footing until the Russian co-operation with WikiLeaks and the weaponising of those emails that were stolen, and not only that, as Mueller points out in his second indictment, the Russians hacked into the cloud where very valuable information that the Democratic Party – and my campaign – had stored, and they stole it. We always were wondering how did they know who to target on Facebook. Who were these people that they were clearly going after? And however he knew it, Trump knew it. He mentioned WikiLeaks 161 times between the day that they dropped the emails and the day of the election. So there was just a lot going on at the same time. But Comey? Absolutely called the election.

pages: 492 words: 153,565

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

Ayatollah Khomeini, Brian Krebs, crowdsourcing, data acquisition, Doomsday Clock, drone strike, Edward Snowden, facts on the ground, Firefox, friendly fire, Google Earth, information retrieval, John Markoff, Julian Assange, Kickstarter, Loma Prieta earthquake, Maui Hawaii, MITM: man-in-the-middle, pre–internet, RAND corporation, Silicon Valley, skunkworks, smart grid, smart meter, South China Sea, Stuxnet, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, WikiLeaks, Y2K, zero day

The article quoted a US source speculating that “malicious software” could be used to commandeer or crash controls at an enrichment plant.11 But there was another reason to suspect that Natanz was Stuxnet’s target. On July 16, 2009, three weeks after the 2009 version of Stuxnet was released, WikiLeaks founder Julian Assange posted a cryptic note to his website about a possible accident at Natanz. An anonymous source claiming to be associated with Iran’s nuclear program had told Assange that a “serious” nuclear accident had recently occurred at the plant.12 WikiLeaks usually published only documents on its site, not tips from anonymous sources, but Assange broke protocol, he said, because he had reason to believe the source was credible. He linked to a BBC story published that day, which announced the resignation of Gholam Reza Aghazadeh, the head of Iran’s Atomic Energy Organization, who had relinquished his position twenty days earlier for unknown reasons.13 The time frame seemed to align with when the 2009 version of Stuxnet was released.

The Age of Deception: Nuclear Diplomacy in Treacherous Times (New York: Metropolitan Books, 2011), 141–47. 26 Karl Vick, “Iran’s President Calls Holocaust ‘Myth’ in Latest Assault on Jews,” Washington Post, Foreign Service, December 15, 2005. 27 “06Kuwait71, Kuwait’s Country Wide Radiation Monitoring System,” US State Department cable from the US embassy in Kuwait to the State Department in Washington, DC, January 2006. Published by WikiLeaks at wikileaks.org/cable/2006/01/06KUWAIT71.html. 28 The assessment comes from Ariel (Eli) Levite, deputy director general of the Israel Atomic Energy Commission, in a September 2005 US State Department cable from the Tel Aviv embassy, published by WikiLeaks at wikileaks.org/cable/2005/09/05TELAVIV5705.html. 29 “06TelAviv293, Iran: Congressman Ackerman’s January 5 Meeting at,” US State Department cable from the US embassy in Tel Aviv, January 2006. Published by WikiLeaks at wikileaks.org/cable/2006/01/06TELAVIV293.html. See this page in this book for an explanation of the problems. 30 Privately, Israel and Russia both told the United States they believed Iran could actually master its enrichment difficulties within six months.

See this page in this book for an explanation of the problems. 30 Privately, Israel and Russia both told the United States they believed Iran could actually master its enrichment difficulties within six months. See “06Cairo601, Iran; Centrifuge Briefing to Egyptian MFA,” US State Department cable, February 2006, published by WikiLeaks at wikileaks.org/cable/2006/02/06CAIRO601.html. 31 “06TelAviv688, Iran-IAEA: Israeli Atomic Energy Commission,” US State Department cable, February 2006, published by WikiLeaks at wikileaks.org/cable/2006/02/06TELAVIV688.html. 32 Ibid. 33 “Iran Defiant on Nuclear Deadline,” BBC News, August 1, 2006, available at news.bbc.co.uk/2/hi/5236010.stm. 34 “07Berlins1450, Treasury Under Secretary Levey Discusses Next,” US State Department cable from the embassy in Berlin, July 2007, published by WikiLeaks at wikileaks.org/cable/2007/07/07BERLIN1450.html. The cable mentions that at least thirty Iranian front companies had been established for procurement.

pages: 273 words: 76,786

Explore Everything by Bradley Garrett

airport security, Burning Man, call centre, creative destruction, deindustrialization, double helix, dumpster diving, failed state, Google Earth, Hacker Ethic, Jane Jacobs, Julian Assange, late capitalism, megacity, New Urbanism, Occupy movement, place-making, shareholder value, the built environment, The Death and Life of Great American Cities, urban planning, white flight, WikiLeaks

Once inside, we found that the magnetic reed switch alarm systems on the doors had been disabled prior to our arrival, a technique straight out of Ninjalicious’ book Access All Areas.81 We concluded that the PIRs must also have been disabled, based on the fact that the bunker was not teeming with angry police by this point. So it seemed we had free access to an entire bunker full of potentially sensitive documents, though in the end, we all joked about how unexciting most of it actually was. Just weeks after Julian Assange’s WikiLeaks fiasco, when he appeared in a London courtroom for disclosing government secrets, we had gained entry into a secure file-storage area and had unrestrained access to all the documents it contained. I imagined Assange would have been pleased to know this was happening; his ethos for transparency so closely aligned with ours. The event led to an interesting reflection on what it meant for us as a crew to do something purely for the joy of doing it, purely for the adrenaline rush.

Brick, Subterranean Twin Cities (Minneapolis, MN: University of Minnesota Press, 2009). 26 John Hollingshead, Underground London (London: Kessinger, 2009 [1862]); Charles Dickens, All the Year Round (London, 1861). 27 Whipplesnaith, The Night Climbers of Cambridge (Cambridge: Oleander Press, 2007 [1937]). 28 See Tom Whipple, ‘Confessions of a Night Climber’, Times, 2 November 2007. 29 Tom Wells, ‘Deck the Halls with, er, 150ft-high Santa Hats’, Sun, 4 December 2009. 30 Patrick Sawer, ‘Cambridge University’s 1958 Car on Roof Prank Secrets Revealed’, Telegraph, 28 June 2008. 31 Jon Lackman, ‘The New French Hacker-Artist Underground’, Wired, 20 January 2012. 32 Steven Jones, The Tribes of Burning Man: How an Experimental City in the Desert Is Shaping the New American Counterculture (San Francisco: CCC Publishing, 2011). 33 Geoff Manaugh, The Bldg Blog Book (San Francisco: Chronicle, 2009). 34 D. Wershler-Henry, ‘Urban Life: Usufruct in the City’, Globe and Mail (2005), quoted in Steven High and David W. Lewis, Corporate Wasteland (Ithaca, NY: Cornell University Press, 2007), p. 42. 35 Ashley Fantz and Atika Shubert, ‘Wikileaks “Anonymous” Hackers: “We Will Fight” ’, CNN, 10 December 2010. 36 Lucy Osborne, ‘Urban Explorers Enter London’s Landmarks’, Evening Standard, 10 November 2011. 37 David Pinder, ‘Old Paris No More: Geographies of Spectacle and Anti-Spectacle’, Antipode 32: 4 (October 2000). 38 Quentin Stevens, The Ludic City: Exploring the Potetial of Public Spaces (London: Routledge, 2007). 39 Michael Scott, ‘Hacking the Material World’, Wired 1: 3 (July/August 1993). 40 E.

pages: 503 words: 131,064

Liars and Outliers: How Security Holds Society Together by Bruce Schneier

airport security, barriers to entry, Berlin Wall, Bernie Madoff, Bernie Sanders, Brian Krebs, Broken windows theory, carried interest, Cass Sunstein, Chelsea Manning, commoditize, corporate governance, crack epidemic, credit crunch, crowdsourcing, cuban missile crisis, Daniel Kahneman / Amos Tversky, David Graeber, desegregation, don't be evil, Double Irish / Dutch Sandwich, Douglas Hofstadter, experimental economics, Fall of the Berlin Wall, financial deregulation, George Akerlof, hydraulic fracturing, impulse control, income inequality, invention of agriculture, invention of gunpowder, iterative process, Jean Tirole, John Nash: game theory, joint-stock company, Julian Assange, longitudinal study, mass incarceration, meta analysis, meta-analysis, microcredit, moral hazard, mutually assured destruction, Nate Silver, Network effects, Nick Leeson, offshore financial centre, patent troll, phenotype, pre–internet, principal–agent problem, prisoner's dilemma, profit maximization, profit motive, race to the bottom, Ralph Waldo Emerson, RAND corporation, rent-seeking, RFID, Richard Thaler, risk tolerance, Ronald Coase, security theater, shareholder value, slashdot, statistical model, Steven Pinker, Stuxnet, technological singularity, The Market for Lemons, The Nature of the Firm, The Spirit Level, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, too big to fail, traffic fines, transaction costs, ultimatum game, UNCLOS, union organizing, Vernor Vinge, WikiLeaks, World Values Survey, Y2K, zero-sum game

They are a different sort of actor. On the other hand, Microsoft probably has better systems in place to prevent infiltration by rogue programmers. WikiLeaks is another stateless organization. WikiLeaks sits somewhere between a loose organization of activists and the personal mission of a single individual named Julian Assange. It exposes information that governments and powerful corporations would rather keep secret. In this way it is very much like an organization of journalists. But because it is not a commercial enterprise, and because it is not moored within a country, it's much more difficult to corral. And this scares countries like the United States. Compare WikiLeaks to a traditional newspaper. That newspaper is in a societal dilemma with all the other newspapers in that country. Societal Dilemma: Newspapers publishing government secrets.

In mid-2004, the New York Times learned about the NSA's illegal wiretapping of American citizens without a warrant, but delayed publishing the information for over a year—until well after the presidential election. Presumably there are things the New York Times has learned about and decided not to publish, period. WikiLeaks changes that dynamic. It's not an American company. It's not even a for-profit company. It's not a company at all. And it's not really located in any legal jurisdiction. It simply isn't subject to the same pressures that the New York Times is. This means the government can't rely on the partial cooperation of WikiLeaks in the same way it can rely on that of traditional newspapers.5 In a blog post about the topic, Clay Shirky referred to the Supreme Court ruling in the Pentagon Papers case that said it's illegal to leak secrets but not illegal to publish leaks: The legal bargain from 1971 simply does not and cannot produce the outcome it used to.

Reputational: Society ostracizes those who turn against their own people. Institutional: Laws against war crimes. Security: None. In 2005, Captain Ian Fishback exposed the U.S.'s use of torture in Iraq because of his religious convictions. Similarly, Bradley Manning had to deal with two competing societal dilemmas in 2010 when he allegedly became a whistle-blower and sent 250,000 secret State Department cables to the anti-secrecy group WikiLeaks, which made them public.5 Like the Libyan pilots, he chose to defect from the government and cooperate with what he perceived as the country as a whole. His subsequent treatment by the U.S. government—which incarcerated him, stripped him of due process, and tortured him—is in part a societal pressure by the government to prevent copycat defections. In previous eras, the king might have put his head on a pike for all to see.

pages: 465 words: 109,653

Free Ride by Robert Levine

A Declaration of the Independence of Cyberspace, Anne Wojcicki, book scanning, borderless world, Buckminster Fuller, citizen journalism, commoditize, correlation does not imply causation, creative destruction, crowdsourcing, death of newspapers, Edward Lloyd's coffeehouse, Electric Kool-Aid Acid Test, Firefox, future of journalism, Googley, Hacker Ethic, informal economy, Jaron Lanier, Joi Ito, Julian Assange, Justin.tv, Kevin Kelly, linear programming, Marc Andreessen, Mitch Kapor, moral panic, offshore financial centre, pets.com, publish or perish, race to the bottom, Saturday Night Live, Silicon Valley, Silicon Valley startup, Skype, spectrum auction, Steve Jobs, Steven Levy, Stewart Brand, subscription business, Telecommunications Act of 1996, Whole Earth Catalog, WikiLeaks

In 1996, when most newspapers were still figuring out how to put stories online, Rusbridger, who had been named top editor the previous year, started the Guardian Online as a separate division. During the dot-com bust, as other newspapers cut online staff, he kept investing in digital journalism. More recently, he delivered some of the smartest coverage of the U.S. diplomatic cables from WikiLeaks, dealing with Julian Assange to get the information and asking readers what was worth searching for in the trove of documents. Although more news outlets have started charging for content, Rusbridger believes Internet “paywalls” could hurt journalism itself. “That might be the right direction in business terms, while simultaneously reducing access and influence in editorial terms,” Rusbridger said in a January 2010 speech at the London College of Communication.

The demand for U.S. movies isn’t likely to change soon; countries with homegrown film businesses rarely produce effects-driven popcorn fare like Wolverine. But exporting them relies on international recognition of copyright, which the Internet is eroding. Movies also shape the world’s idea of what the United States stands for, as a cable written by an American diplomat in Saudi Arabia released on WikiLeaks showed. “It’s still all about the War of Ideas here, and the American programming on [the television channels] MBC and Rotana is winning over ordinary Saudis in a way that [the U.S.-funded satellite channel] ‘Al Hurra’ and other U.S. propaganda never could,” read the May 2009 message.25 Titled “David Letterman: Agent of Influence,” it mentioned Friends and Desperate Housewives as being particularly popular.

A 2005 MPAA-funded LEK study, “The Cost of Movie Piracy,” showed that studios lost $6.1 billion to piracy, but the MPAA has retracted the parts of that study related to illegal downloading among college students. 21. This ratio was used in the March 2010 Terra Consultants study, “Building a Digital Economy: The Importance of Saving Jobs in the EU’s Creative Industries.” 22. According to Nash Information Services. 23. According to BigChampagne. 24. This ratio was also used in the Terra Consultants study. 25. Robert Booth, “WikiLeaks Cable: Jihad? Sorry, I Don’t Want to Miss Desperate Housewives,” Guardian, December 7, 2010. 26. Ricardo H. Cavazos Cepeda, Douglas C. Lippoldt, and Jonathan Senft, “Policy Complements to the Strengthening of IPRs in Developing Countries” (OECD Trade Policy Working Paper No. 104, Organisation for Economic Co-operation and Development, September 14, 2010). 27. David Lieberman, “Disney Chief Offers a Ray of Encouragement to UltraViolet Movie Coalition,” USA Today, November 11, 2010. 28.

pages: 354 words: 99,690

Thinking About It Only Makes It Worse: And Other Lessons From Modern Life by David Mitchell

bank run, Boris Johnson, British Empire, cognitive dissonance, collapse of Lehman Brothers, credit crunch, don't be evil, double helix, Downton Abbey, Etonian, eurozone crisis, haute cuisine, Julian Assange, lateral thinking, Northern Rock, offshore financial centre, payday loans, plutocrats, Plutocrats, profit motive, sensible shoes, Skype, The Wisdom of Crowds, WikiLeaks

“The effects of ‘toffee-lung’, ‘cracknell shin’ and ‘vibration white chocolate finger’ on the Oompa-Loompa communities of the Midlands have to be seen to be believed,” Rantzen claimed. A spokesman for Cadbury’s said: “If they could get the chocolate to stick to the Curly Wurlys properly, maybe they’d deserve the minimum wage.” Shock WikiLeaks revelations The debate over transparency and freedom of information intensified in 2019 when WikiLeaks published details of what everyone in the world would be getting for Christmas. “Secrets are used to control people,” said Julian Assange via Skype from his Mars-bound prison rocket. “Wrapping paper is one of the most oppressive inventions in human history. As for the Christmas cracker, it is a highly dangerous form of violent concealment. In order to satisfy the human need to discover what is kept hidden, one must actually trigger an explosion.

Gary 1 Sherlock Holmes stories 1, 2, 3 Silvester, David 1, 2 Simpsons, The 1, 2 Smith, Maggie 1 Snakes, horrible but more important than apostrophes 1, 2 Snickers/Marathon 1 Snow, Peter 1 social media, food on 1 Somme, Battle of the 1, 2, 3 Soubry, Anna 1 Spelthorne Business Forum 1 sphincteral cleanliness 1 Spider-Man 1 Sport Relief 1, 2 Staines 1 Star Wars 1, 2 and Disney 1, 2, 3 Phantom Menace 1 Return of the Jedi 1, 2 Starck, Philippe 1, 2 Stephenson, Sir Paul 1 Stirk, Chris 1 Stoppard, Tom 1 Stott, Ken 1 Straw, Jack 1, 2 Strictly Come Dancing 1 Halloween-themed edition of 1 students 1 Sugar, Sir Alan (later Lord) 1 Summerscale, Kate 1 Sun, The 1, 2 superheroes 1 in film 1 Superman 1, 2 Superman: Man of Steel 1 supermarkets, and sweets at checkouts 1 Suspicions of Mr Whicher, The (Summerscale) 1 Sutcliffe, Gerry, crap remark of 1 Tardis 1, 2 Tasers 1 teaching: of history 1 and pay 1, 2 television: children’s 1 daytime 1 Paxman’s disdain for watching 1 sequels and remakes on 1 see also BBC; individual programme titles telomeres, incomprehensible nature of 1 10 O’Clock Live 1 Tesco, disinclination to be perpetually associated with the word ‘horse’ of 1 Thatcher, Margaret 1, 2 This American Life 1 Thompson, Mark 1 Thompson, Richard 1 Times, The 1, 2, 3, 4 Today 1 Tomkinson, Dr Grant 1 toothpaste, attempts to make less boring 1 Torode, John 1 Toto, anal designs of 1 Trading Places 1 Tribick, Alex 1 Trident 1 Trimingham, Carina 1 Tudors, The 1 Turner Prize 1 Twitter: and anonymous messages 1 DM slated on 1 and food 1 Katz’s message on 1 Ukip 1, 2, 3, 4, 5 Uncle Vanya (Chekhov) 1 Unesco 1 universities: for-profit 1 students’ complaints against 1 valve decisions 1 Vicky Cristina Barcelona 1 Victoria and Albert Museum (V&A) 1 Victoria, Queen 1 Virgo, John tearfulness at fictional death of Peter Ebdon of 1 Visit England 1 Walsh, Fergus 1 Walsh, Louis, waggling mouth, sparkly poppy and fucking shirt of 1 Warne, Shane 1 Warwick, Diana 1 Watercolour Challenge 1 Watson, James D. 1 weather forecasters 1 Webb, Robert – yes Rob, you get mentioned! But not as much as Nick Clegg, I’m afraid. 1 Weight Watchers 1, 2 West Country 1 West, Kanye 1 West Midlands, desire to evacuate of 1 WH Smith, David Cameron’s incomprehension of the business model of 1 wheelie bins 1, 2 Whisperers, The (Figes) 1 White, Charlene 1 Who Wants to Be a Millionaire? 1 Why Don’t You …? 1 Widdecombe, Ann 1, 2 WikiLeaks 1 Wilby, Peter 1, 2 William I 1 William, Prince, Duke of Cambridge, fictional nudey antics of 1 Williams, Ch. Supt Stuart 1 Witchell, Nicholas, arousal of 1 Wolverhampton 1 Wolverhampton Wanderers FC 1 Woods, Tiger 1 words, new, favourite and not so favourite 1, 2 World Cup 2010 1 world heritage sites 1 World War One 1 and Gove 1 Somme 1, 2, 3 World War Two 1, 2 World’s Most Hated Company 1 X Factor, The 1, 2 X-Men 1 Yarwood, Mike, inferiority to Dustin Hoffman of 1 Yes Minister 1 York, Duchess of 1 Young, Toby 1 Zimbabwe 1 About the Author David Mitchell is a comedian, actor, writer and the polysyllabic member of Mitchell and Webb.

pages: 606 words: 157,120

To Save Everything, Click Here: The Folly of Technological Solutionism by Evgeny Morozov

3D printing, algorithmic trading, Amazon Mechanical Turk, Andrew Keen, augmented reality, Automated Insights, Berlin Wall, big data - Walmart - Pop Tarts, Buckminster Fuller, call centre, carbon footprint, Cass Sunstein, choice architecture, citizen journalism, cloud computing, cognitive bias, creative destruction, crowdsourcing, data acquisition, Dava Sobel, disintermediation, East Village, en.wikipedia.org, Fall of the Berlin Wall, Filter Bubble, Firefox, Francis Fukuyama: the end of history, frictionless, future of journalism, game design, Gary Taubes, Google Glasses, illegal immigration, income inequality, invention of the printing press, Jane Jacobs, Jean Tirole, Jeff Bezos, jimmy wales, Julian Assange, Kevin Kelly, Kickstarter, license plate recognition, lifelogging, lone genius, Louis Pasteur, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, moral panic, Narrative Science, Nelson Mandela, Nicholas Carr, packet switching, PageRank, Parag Khanna, Paul Graham, peer-to-peer, Peter Singer: altruism, Peter Thiel, pets.com, placebo effect, pre–internet, Ray Kurzweil, recommendation engine, Richard Thaler, Ronald Coase, Rosa Parks, self-driving car, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, Slavoj Žižek, smart meter, social graph, social web, stakhanovite, Steve Jobs, Steven Levy, Stuxnet, technoutopianism, the built environment, The Chicago School, The Death and Life of Great American Cities, the medium is the message, The Nature of the Firm, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, transaction costs, urban decay, urban planning, urban sprawl, Vannevar Bush, WikiLeaks

It’s groups and networks—which are distributed and often span borders—that hold power; hierarchies and states, confined as they are to fixed territories and programs of action, are outfoxed at every turn. This notion of the almost God-given superiority of networks informs Shirky’s interpretation of WikiLeaks, the one transnational network to rule them all. Thus, in a later speech, Shirky argues that “there was no way the State Department could go to WikiLeaks and have a conversation that hinged on or even involved anything called the national interest. Julian [Assange] is not a U.S. citizen, he is an Australian citizen. He was not operating on U.S. soil, he was in Iceland. The Pentagon Papers conversation took place entirely within the national matrix, and the WikiLeaks conversation took place outside of it.” Groups win; nation-states lose. Networks good; hierarchies bad. Global good; local bad. The problem here is that Clay Shirky believes that global affairs now work according to the demands of “the Internet,” while, in reality, the story is much more complicated.

But this, of course, is true only if one assumes that platforms like PayPal operate in an absolute power vacuum, completely immune to pressures that countries, institutions, and hierarchies might exert on those engaged in the transactions as well as on PayPal itself. PayPal may have obviated the theoretical need for banks—but its investors still need a bank to cash their checks from PayPal, so no technoescape actually takes place. Consider the role that PayPal has played in the WikiLeaks saga: yes, it was initially a great tool to raise money for Assange’s cause, but the moment WikiLeaks took on the US government, PayPal ran away from Assange (freezing WikiLeaks’s account) in much the same way that Peter Thiel wants to run from reality. Likewise, as of July 2012, PayPal had revised how it deals with file-sharing sites, requiring any sites that want to use PayPal to solicit membership fees from users to ensure that they host no illegal files. Instead of subverting the power of the entertainment industry—as Thiel’s belief in technoescapism would suggest—PayPal has become a useful tool in perpetuating that power.

The problem here is that Clay Shirky believes that global affairs now work according to the demands of “the Internet,” while, in reality, the story is much more complicated. A conversation about the national interest between the transglobal network that is (was?) WikiLeaks and the US government actually did take place. In fact, according to at least some credible reports, WikiLeaks did offer the State Department the opportunity to review the diplomatic cables and highlight what should be redacted—an opportunity that the ugly and messy hierarchy of the State Department reportedly declined (Mark Stephens, one of Assange’s numerous ex-lawyers, once claimed that two cables were actually removed at their request). Assange himself often complains that the US government thwarted his highly mobile, distributed, and transnational network, not least because Washington can target—not directly but through rhetoric—the very intermediaries, from credit card companies to technology providers, that enable such networks.

pages: 215 words: 59,188

Seriously Curious: The Facts and Figures That Turn Our World Upside Down by Tom Standage

agricultural Revolution, augmented reality, autonomous vehicles, blood diamonds, corporate governance, Deng Xiaoping, Donald Trump, Elon Musk, failed state, financial independence, gender pay gap, gig economy, Gini coefficient, high net worth, income inequality, index fund, industrial robot, Internet of things, invisible hand, job-hopping, Julian Assange, life extension, Lyft, M-Pesa, Mahatma Gandhi, manufacturing employment, mega-rich, megacity, Minecraft, mobile money, natural language processing, Nelson Mandela, plutocrats, Plutocrats, price mechanism, purchasing power parity, ransomware, reshoring, ride hailing / ride sharing, Ronald Coase, self-driving car, Silicon Valley, Snapchat, South China Sea, speech recognition, stem cell, supply-chain management, transaction costs, Uber and Lyft, uber lyft, undersea cable, US Airways Flight 1549, WikiLeaks

But it also sheds light on changing social attitudes in America: good times used to mean more wedding bells and babies, whereas now they just mean the latter. The policy prescriptions are not obvious. Whether or not people get married is their own business. But the finding does offer some comfort to those who worry that declining marriage rates are purely the product of worsening economic prospects for men. Clearly, some other factor is at play. What explains Europe’s low birth rates? Julian Assange, the founder of WikiLeaks and apparently an amateur demographer, is worried about Europe’s declining birth rate. In a tweet posted in 2017 he posited that “Capitalism + atheism + feminism = sterility = migration”, and noted that the leaders of Britain, France, Germany and Italy were all childless. Never mind that Mr Assange needs a dictionary. “Sterility” means the inability to play a part in conception (often for medical reasons, or because a man has had a vasectomy or a woman has had her Fallopian tubes tied).

Three Felonies A Day by Harvey Silverglate

Berlin Wall, Home mortgage interest deduction, illegal immigration, Julian Assange, mandatory minimum, medical malpractice, mortgage tax deduction, national security letter, offshore financial centre, Potemkin village, RAND corporation, Ronald Reagan, short selling, Silicon Valley, Steve Jobs, Steven Pinker, technology bubble, urban planning, WikiLeaks

His sister, Sally Goodson, succinctly and accurately summed up his “crime” in a remembrance of her beloved brother: “Truthful speech to fellow physicians about the off-label use of an FDA-approved drug.” Just as federal prosecutors managed to disrupt the activism of Siobhan Reynolds and derail the medical practice of Dr. Peter Gleason, so the feds in late 2010 took up the task of finding some basis in federal law for putting Julian Assange, founder of the whistleblowing platform WikiLeaks, out of business. The international organization had made 2010 a landmark year for the exposure of government secrets. Among the groundbreaking releases: a video depicting U.S. military forces killing two Reuters journalists and nine Iraqis in 2007; Pentagon files detailing abuse of Iraqi prisoners as well as 15,000 previously unreported civilian deaths; and a steady stream of U.S. diplomatic cables dealing with subjects like Iran’s nuclear program and alleged CIA torture.

These included trafficking in stolen property (which applies to both tangible and intangible property),8 conspiracy (if the U.S. government could prove that Assange collaborated from the start with the original source of the military leaks), and the ever malleable wire fraud (which, by the statute’s language, tells more about the means of the crime than its actual substance). The still unfolding WikiLeaks saga also provided instruction as to how the feds, in trying to pin a crime on their ultimate target, intimidate that target’s supporters. Salon’s Glenn Greenwald noted that his readers, even while believing strongly in WikiLeaks’s cause, were apprehensive about offering their financial support. They worried about being put on a government blacklist, Greenwald wrote, “or, worse, incur[ring] criminal liability for materially supporting a Terrorist organization.”9 While Greenwald pointed out that it would be a stretch to apply this statute to WikiLeaks’s supporters, a Supreme Court ruling in June 2010 nonetheless gave well-informed, rational citizens grounds to fear punishment.

Anzalone, 180, 229, 247, 264 University of Pittsburgh Human Genetics Laboratory, 235, 236 Weil, Jonathan, 125–126, 146 Welch, Matt, 209–210 Weld, William Floyd, 14–27 Wexler, Leonard D., 53–54 whistleblowers, 88–90, 94 White, Byron, 199 unlawful incitement to violence, 240 White, Kathryn, 17, 19 Urso, Lindy, 163 White, Kevin Hagan, 14–27, 229 336 index White, Patricia, 19, 21 workplace safety, 255–256 white collar sentencing guidelines, 143–144 Wright, Otis D., xxi wiggle room, 37–38 Wrongful Death Accountability Act (proposed), 256 WikiLeaks, xiii–xiv Wu, Tim, l Wilkerson, Dianne, xvii–xviii Williams, Thomas, 163 Xyrem®, xiii, 63–65 Wilmot, Pamela H., 35 Wilson, Joseph, 207 Yeltsin, Boris, xxiii wire fraud Burkle and Stern and, 194 Ferrell and Kurtz and, 234–237 Lay and, 124 Milken and, 99 The New York Times and, 213 Stern, Jared Paul, and, 194 Yukos Oil, xxiii Wiretap Act, 258–260, 263 wiretapping, 257–264 witness bribery, xlvii–xlviii witness cooperation Anzalone and, 19–20, 22 Councilman and, 264 Gleason and, 66, 95–96 Greenberg and, 154–155 journalists and, 205 judges and, 270 KPMG and, 143–147, 149–150 LaFreniere and, 170, 172, 178–179 Martinez and, 7, 10–11 Milken and, 99, 101, 103, 105–106 prosecutorial threats and, xxvi, xlvi–xlix See also plea bargaining Wolf, Mark L., 17 Wood, Kimba, 102–105 Woodlock, Douglas, xvii–xviii, 33, 224–231 Woodrow Wilson Center’s Middle East program, 223 Zehe, Albert, 217–224 Zobel, Rya, 242 Zoladex®, 91

pages: 234 words: 63,844

Filthy Rich: A Powerful Billionaire, the Sex Scandal That Undid Him, and All the Justice That Money Can Buy: The Shocking True Story of Jeffrey Epstein by James Patterson, John Connolly, Tim Malloy

Bernie Madoff, corporate raider, Donald Trump, East Village, Elon Musk, Isaac Newton, Jeffrey Epstein, Julian Assange, Murray Gell-Mann, Ponzi scheme, Stephen Hawking, WikiLeaks

“If you want to meet him in your business,” she’d said then, “look after me, and he’ll look after you. You’ll get it back tenfold.” “Once again,” she said afterward, “my errors have compounded and rebounded and also impacted on the man I admire most in the world: the Duke.” Prince Andrew had had his troubles already—with shady real estate deals, sticky romances, highly embarrassing document dumps (courtesy of Julian Assange and WikiLeaks), and questionable ties to Tunisian oligarchs, corrupt presidents of former Soviet republics, and Mu’ammar Gadhafi, among other entanglements, many of which were explored in a Vanity Fair article headlined THE TROUBLE WITH ANDREW. “The duke has a record of being loyal to his friends,” a “royal source” told Vanity Fair’s Edward Klein. “Take his feelings for Sarah Ferguson. If you are a prince and you bring a woman into the royal life and, for whatever reasons, she’s spit out, you might have feelings of debt toward her.

pages: 442 words: 135,006

ZeroZeroZero by Roberto Saviano

Berlin Wall, Bernie Madoff, call centre, credit crunch, double entry bookkeeping, Fall of the Berlin Wall, illegal immigration, Julian Assange, London Interbank Offered Rate, Mikhail Gorbachev, new economy, open borders, planetary scale, Ponzi scheme, Ronald Reagan, Skype, Steve Jobs, uranium enrichment, WikiLeaks

Another cable, which predates their meeting, talks of potential ties between Firtaš and Mogilevic, suggested by their shared investment in certain offshore companies and the fact that they have the same lawyer. These ties had already been noted in a previous intermediary gas company, Eural Trans Gas. But that same lawyer sues the Guardian for publishing documents circulated by WikiLeaks’s Julian Assange in an article by Luke Harding titled “WikiLeaks Cables Link Russian Mafia Boss to EU Gas Supplies.” In the correction that the London paper was forced to print on December 9, 2010, “to clear up any subsequent mistranslation or misunderstanding of their meeting,” Firtaš denies having any connection to Mogilevic other than a simple acquaintance. The gas affair affects the vital interests of an entire continent.

Don Semën was in prison for nearly all of the most dramatic phase of the Russian-Ukrainian gas war. But what has he got to do with it? In 2006 Julija Timošenko had already told the BBC: “We have no doubt that Mogilevic is the person behind the entire RosUkrEnergo operation.” Hers is one of the loudest among the many accusing voices that fell on deaf ears for years, until a document surfaced and caught the notice of public opinion in the West. It’s one of the secret files published by WikiLeaks: a cable from Kiev dated December 10, 2008, from the American ambassador William Taylor. It refers to a meeting with Dmitro Firtaš, the Ukrainian oligarch behind RosUkrEnergo, in which he warned Taylor that Timošenko planned to eliminate his company both for personal interests and internal political conflicts, for which she was willing to make concessions to Putin, thus strengthening his influence in Europe.

., 245–46, 254 Trevi, Gloria, 101 Treviño Morales, José, 252–53 Treviño Morales, Miguel Ángel (El Z40), 98, 103, 252 Treviño Morales, Omar (El Z42), 98–99 Trimboli, Rocco, 230 Trinidad Cerón, Luis Alberto (El Guicho), 61 tripulantes (ship’s crew), 291–92, 297, 299, 300 Troika restaurant, 274 tropane alkaloids, 113–14 Trujillo, Carlos (Griselda Blanco’s first husband), 359–60 Truxillo coca, 114 Turatello, Francis (Angel Face), 212 Turin, 298, 331 Turkey, 215, 232 Twenty-first Motorized Cavalry Regiment, Mexican, 60 Ufa (sniffer dog), 345 U Holubů restaurant, 275 Ukraine, 260, 276, 277, 279, 285–87 UniCredit Bank, 193 Unidad Revolucionaria Nacional Guatemalteca (Guatemalan National Revolutionary Unity), 83 Union Frigo Transport Logistic, 196–97 United Nations, 74, 207–9, 250 United Nations Office on Drugs and Crime, 207–9, 250 United Sacred Crown, 296–97 United States: access routes to, 20–23, 39–40, 42, 49, 57, 59 cocaine market of, 34, 38–39, 51–53, 59, 73–77, 127, 289 Colombian relations with, 127, 131, 148–49, 154–66, 189 drug enforcement in, 19–34, 64–65, 97, 148–66, 168, 294–95 extraditions to, 41, 59, 131, 148–51, 162–66, 282, 285, 366 illegal immigration to, 102, 289 Italian relations with, 168, 178, 185–86 Mexican border of, 20–22, 39–40, 44, 53, 57, 60, 61, 69–70, 102, 289–90, 328 Mexican relations with, 28, 31, 41, 58, 158, 366 Russian mafia in, 262, 268, 273–74, 276, 279, 289, 294 war on terror of, 155–57, 187, 242, 254–55 Uralmaševskaja crime group, 269–70 Uribe, Álvaro, 155, 157, 166 Uribe Escobar, Mario, 166 Vado Ligure, Italy, 291, 329 Valdez Villarreal, Edgar (Barbie), 42–43 Valencia, Armando (Maradona), 158 Valencia, Erick (El 85), 67 Vallanzasca, Renato, 212 Valtur vacation resorts, 227 Van Kleef, Leon, 234–36 Varela, Wílber (Soap), 135 Vásquez Romero, Luis Roberto, 353, 354–55 Vega, Baruch, 149–51, 158–59, 162 Vendemini, Valter, 199 Venezuela, 164, 179–80, 202, 233, 238, 291 Ventrans, 180, 196 Ventrici, Francesco (El Gordo; Fatty), 175–76, 177, 180, 182–84, 190, 192, 195–200 Ventura Moussong, Juan Carlos, 365 Veracruz, Mexico, 67–68 Vibonesi group, 193 Vibo Valentia, Italy, 172, 175–76, 183, 191, 204–5, 254 Vida loca, La, 348–56 Vieira, João Bernardo, 316 Villarreal Barragán, Sergio (El Grande), 50 VM Trans, 196–97 Volkov, Aleksandr, 273–74 Vološin, Vladimir, 273–74 Volpiano, Italy, 344 Voltan, Mattia, 297–98, 299 Vory v zakone organization, 264–65, 271, 273, 285 Voz de Durango, La, 368 Voz de Michoacán, La, 64 Voz y Solución, 64 Wachovia Bank, 243–46, 249–50, 253 Wall Street, 247, 254, 273–74 Waridel, Paul Eduard (The Turk), 232–34 “white petrol,” 38, 57 WikiLeaks, 286–87 wiretapping, 181, 202, 228–30, 237, 298, 362 witness protection programs, 157–60, 164, 362 Woods, Martin, 243–46, 249–50, 252, 253 Woods, Ray, 332 Woods M5 Associates, 249 World Drug Report (2012), 207–9 yachts, 296–300 YBM Magnex International, 251, 276–77, 286 YouTube videos, 43, 67, 94 Yugoslavia, 219, 257 Yuma, Ariz., 290 Zacazonapan, Mexico, 68 Zambada García, Ismael (El Mayo), 30, 41, 55–56, 66, 363, 365 Zapata, Emiliano, 62 Zola, Émile, 348 Looking for more?

pages: 552 words: 168,518

MacroWikinomics: Rebooting Business and the World by Don Tapscott, Anthony D. Williams

accounting loophole / creative accounting, airport security, Andrew Keen, augmented reality, Ayatollah Khomeini, barriers to entry, Ben Horowitz, bioinformatics, Bretton Woods, business climate, business process, buy and hold, car-free, carbon footprint, Charles Lindbergh, citizen journalism, Clayton Christensen, clean water, Climategate, Climatic Research Unit, cloud computing, collaborative editing, collapse of Lehman Brothers, collateralized debt obligation, colonial rule, commoditize, corporate governance, corporate social responsibility, creative destruction, crowdsourcing, death of newspapers, demographic transition, disruptive innovation, distributed generation, don't be evil, en.wikipedia.org, energy security, energy transition, Exxon Valdez, failed state, fault tolerance, financial innovation, Galaxy Zoo, game design, global village, Google Earth, Hans Rosling, hive mind, Home mortgage interest deduction, information asymmetry, interchangeable parts, Internet of things, invention of movable type, Isaac Newton, James Watt: steam engine, Jaron Lanier, jimmy wales, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kickstarter, knowledge economy, knowledge worker, Marc Andreessen, Marshall McLuhan, mass immigration, medical bankruptcy, megacity, mortgage tax deduction, Netflix Prize, new economy, Nicholas Carr, oil shock, old-boy network, online collectivism, open borders, open economy, pattern recognition, peer-to-peer lending, personalized medicine, Ray Kurzweil, RFID, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, scientific mainstream, shareholder value, Silicon Valley, Skype, smart grid, smart meter, social graph, social web, software patent, Steve Jobs, text mining, the scientific method, The Wisdom of Crowds, transaction costs, transfer pricing, University of East Anglia, urban sprawl, value at risk, WikiLeaks, X Prize, young professional, Zipcar

Its annual Freedom in the World report is a respected global benchmark assessment of the state of political rights in 192 countries and 14 related and disputed territories. 4. “Undermining Democracy: 21st Century Authoritarians,” Freedom House (June 2009). 5. James Gwartney and Robert Lawson, “Ten Consequences of Economic Freedom,” National Center for Policy Analysis (July 30, 2004). 6. We do know, however, that WikiLeaks was founded by an Australian (Julian Assange) who lives in East Africa. 7. Evgeny Morozov, “Think Again: The Internet,” Foreign Policy (May/June 2010). 8. Experts suggest that the differences between Mir Hossein Mousavi and Mahmoud Ahmadinejad are far less significant than what unites them. In the aftermath of their failed attempts to overturn the election results, many pro-democracy activists started to question whether Mousavi truly embraces their ideals.

Not a great deal is known about its founders, except that WikiLeaks describes the group as comprising Chinese dissidents, hackers, computer programmers, lawyers, and journalists.6 To protect their sources (and their own identities), they spread assets, encrypt everything, and move telecommunications and people around the world to activate protective laws in different national jurisdictions. But who watches WikiLeaks? Can it be fully trusted? The jury is out, but so far its track record is good. And when you put WikiLeaks together with the events in Iran and other places you can begin to see why dictators everywhere are wondering when this new citizen power is going to come knocking on their door. Indeed, the Pentagon may wonder whether WikiLeaks can be held to account when sensitive information leaks to the public.

And they are always innovating—using the latest Internet-based technologies to amplify their impact. Take WikiLeaks, a self-proclaimed “intelligence service of the people” with a mission to abolish official secrecy. The whistle-blowing site made headlines when in April 2010 an anonymous tipster posted a video the Pentagon claimed to have lost of U.S. helicopter crews enthusiastically killing Iraqis on a Baghdad street in 2007. That event, in itself, might not have made headlines, except among the dead were two reporters with the Reuters news agency. The explosive leak, which sent shock waves around the world and had the Pentagon in a conniption, is merely the tip of the iceberg. In just a few short years, WikiLeaks has released more than a million confidential documents from highly classified military secrets to text messages of those killed in the 9/11 attacks.

pages: 525 words: 142,027

CIOs at Work by Ed Yourdon

8-hour work day, Apple's 1984 Super Bowl advert, business intelligence, business process, call centre, cloud computing, crowdsourcing, distributed generation, Donald Knuth, Flash crash, Googley, Grace Hopper, Infrastructure as a Service, Innovator's Dilemma, inventory management, Julian Assange, knowledge worker, Mark Zuckerberg, Nicholas Carr, rolodex, shareholder value, Silicon Valley, six sigma, Skype, smart grid, smart meter, software as a service, Steve Ballmer, Steve Jobs, Steven Levy, the new new thing, the scientific method, WikiLeaks, Y2K, Zipcar

Yourdon: Is he the one that provided it to the WikiLeaks guy, to [Julian] Assange? Or is that someone else? Strassmann: No, Ames provided to the Russians. Yourdon: Yeah. I thought he was the more traditional one. Who is the guy who gave all of the Wiki stuff? Strassmann: Oh, you know, a low-level sergeant. Yourdon: But the same problem? Strassmann: Same problem, exfiltration. And by the way, the stuff that is being reported is defective. The stuff that is reported that he downloaded, he cut a CD, and sent out by mail for WikiLeaks. Yourdon: Really? Strassmann: So now you are dealing with a problem. I have several trays in there [pointing to his desktop computer] with CDs. Now, are you going to permit people to burn their own CDs? And, you know, today on a DVD, you can put a big database. Right now, WikiLeaks has a list of all the people who had accounts in the Cayman Islands.

., 87 attributes, 108 capital market community, 91 cash/actual trading business, 88 channel marketing departments, 92 cloud computing, 97 CNBC, 89 collaborative technology, 95 collective intelligence, 95 communication skills, 102, 106 conference organizations, 99 consumer marketplace, 94 data center, 90 decision making, 105, 108 economy standpoint, 100 e-mail, 100 Fidelity Investments, 105 financial services, 92 IEEE, 101 innovative impression, 94 Internet, 98 iPad, 97 iPod device, 91 labor laws, 110 listening skills, 106 logical progression, 104 Mac, 96 mainframe, 104 management and leadership, 104, 105 market data system, 89 micro-second response time, 89 mobile applications, 94 multidisciplinary approach, 103 multimedia, 97 multi-national projects, 110 multiprocessing options, 99 network operating system, 103 NYSE Euronext, 87 open outside system, 88 parallel programming models, 99 personal satisfaction, 109 PR function, 106 proclaimed workaholic, 109 real estate business, 88 regulatory and security standpoint, 96 Rolodex, 94 Rubin, Howard, 99 server department, 97 software development, 89 sophisticated technology, 101 technology business, 88 technology integration, 91 trading engines, 90 typewriter ribbon, 94 virtualization, 98 Windows 7, 96 younger generation video games, 93 visual interfaces, 93 Rumsfeld, Donald, 222 S San Diego Fire Department, 224 Santa Clara University, 36 SAS programs, 131 Scott, Tony, 10, 33, 236 Android, 43 Apple Computer, 35 architectural flaw, 44 BASIC and Pascal, 35 Bristol-Myers Squibb, 33 Bunch, Rick (role model), 34 business groups, 42 COO, 39 Corporate Vice President, 33 Corvus disk drive, 36 CSC, 35 Defense department, 45 dogfooding, 37, 38 games and arcades, 35 General Motors, 33 IBM's role, 37 information systems management, 36 integrity factor, 40 Internet, 44 iPhone, 43 IT lifecycle management process, 37 leadership capability, 40 leisure studies, 34 macro-architectural threats, 44 Marriott's Great America, 35 math models, 36 Microsoft Corporation, 33, 36, 38, 41, 44, 46 Microsoft's operational enterprise risk management, 33 parks and recreation, 34 Petri dish, 44 playground leader, 42 product groups, 42 quality and business excellence team, 33 Santa Clara University, 36 Senior Vice President, 33 smartphone, 43 social computing, 38 Sun Microsystems, 36 theme park industry, 35 University of Illinois, 34 University of San Francisco, 36 value-added business, 33 Walt Disney Company, 33 Senior Leadership Technology and Product Marketing, 71 Shakespeare, 30 Shirky, Clay, 220 Sierra Ventures, 191 Silicon Valley companies, 68 Silicon Valley software factories, 323 Skype, 118 Smart Grid Advisory Committee, 177 Smartphones, 20, 27, 43, 54, 217, 238 Social care computer electronic record system, 279 Social computing, 38, 320 Social networking, 51, 53, 56, 58 Society trails technology, 21 SPSS programs, 131 Sridhara, Mittu, 71 Amazon, 76 American Airlines, 72 back-end computation and presentation, 80 banking, 77 B2B and B2C, 85 business/product departments, 82 business work context, 74 buzzword, 77 career aspiration, 73 career spans, 73 coders, 72 cognitive surplus, 79 competitive differentiation, 74 computing power, 78 contribution and energy, 85 convergence, 75 CPU cycles, 78 cross-channel digital business, 71 cultural and geographic implementation, 72 customer experience, 84, 85 customer profile, 76 data visualization, 79, 80 DDoS protection, 81 economies of scale, 77 elements of technology, 72 encryption, 82 end customer, 83 entertainment, 75 ERP system, 72 Facebook, 84 finance and accounting, 73 foster innovation and open culture, 81 friends/mentors/role models, 74 FSA, 76 gambling acts, 81 games, 79 gaming machines, 80 GDS, 72 global organization, 71 Google, 75, 84, 85 Group CIO, Ladbrokes PLC, 71 industry-standard technologies, 77 integrity and competence, 83 IT, 74, 82 KickOff app, 71 land-based casinos, 79 live streaming, 78 London Business School, 73 mobile computing, 78 multimedia, 84 new generation, 84 on-the-job training, 73 open-source computing, 79 opportunity, 80, 83 PCA-compliant, 81 personalization, 76 real-time systems, 74 re-evaluation, 81 reliability and availability, 77 security threats, 80 smart mobile device, 75 technology-intense customer, 85 top-line revenue, 74 trader apps, 82 true context, 73 underpinning business process, 76 virtualization, 78 Visa/MasterCard transactions, 78 Web 3.0 business, 76 web-emerging web channel, 76 Wikipedia, 79, 85 Word documents and e-mail, 82 work-life balance, 84 young body with high miles, 72 Zuckerberg, Mark, 73 Stead, Jerry, 214 Storefront engineering, 212 Strassmann, Paul, 228, 309 agile development, 340 Amazon EC2, 314 America information processors, 322 Annapolis, 340 AT&T, 332 backstabbing culture, 339 BlackBerry, 317 block houses, 319 CFO/CEO position, 337 CIM program, 309 Citibank, 337 Citicorp, 313, 339 cloud computing, 310, 311, 313 coding infrastructure, 341 communication infrastructure, 341 corporate information management, 329 Corporate Information Officer, 309 counterintelligence, 320 cyber-operations, 338 Dell server, 314 Department of Defense, 329, 332 Director of Defense Information, 309 employee-owned technology, 316 enterprise architecture, 316 exfiltration, 313 financial organizations, 320 firewalls and antiviruses, 312 General Foods, 309, 326–328 General Motors, 321, 329, 332 George Mason School of Information Technology, 309 Google apps, 314 government-supported activities, 326 Harvard Business School, 331 HR-related issues, 331 IBM manpower, 311 infiltration, 313 Internet, 316, 322 interoperability, 315, 317, 341 Kraft Foods Inc, 309 MacArthur's intelligence officer, 327 Machiavellian view, 327 mash-up, 316 military service, 331 NASA, 309, 333, 334 police department, economics, 312 powerpoint slides, 324 Radio Shack, 319 senior executive position, 334 service-oriented architecture, 316 Silicon Valley software factories, 323 social computing, 320 Strassmann's concentration camp, 318 structured methodologies, 342 U.S. Navy, 318 Virginia Tech, 323 virtualization, 310, 311 VMware, 311 Web 2.0, 325 WikiLeaks, 320 Windows machine, 317 Xerox Corporation, 309, 326, 330, 338 Xerox video center, 318 Sun Microsystems, 36 Supply-demand organization, 157 T Tech Mahindra, 253, 255 Tech Model Railroad Club (TMRC), 19 Telephony, 17 Temares, Lewis, 113 adaptability, 128 American Marketing Society, 113 Apple device, 116 ARPANET and Internet, 117 BBA, 126 camera, 124 CIO responsibilities and duties, 127 classroom information, 119 client and terminal, 124 College of Engineering, University of Miami, 113 combination of degrees, 125 communication and business skills, 126 computer conference, 116 customer service, 130 cyber security, 121 day-to-day administration, 128 digital device, 125 document management, 129 electronic hospital record, 115 encyclopedia and Wikipedia, 115 entrepreneurial characteristics, 114 ERP, 123 Facebook, 116, 121 faculty members, 121 financial industry, 123 Fortune 500 commercial land, 114 Google, 117 GPS technology, 117 grocery store, 130 Hewlett-Packard piece, 129 higher education, 114, 122 high-performance computing, 119 IBM data center, 124 independent entrepreneurs, 114 Information Technology (IT), 113, 118 Jones, Sam, 131 leading-edge technology, 119 mainframe computers, 118 marketing, 122 matchmaker.com, 131 matchmakerexecs.com, 131 MBA, 126 MIT and Berkeley, 120 mobile technology, 115 New-Age, technology-savvy kids, 115 online degree, 121 passion, 128 personal computer, 117 philanthropism, 123 presentation skills, 128 project management, 126 rainmaker.com, 131 retail industry, 123 revenue producer, 123 RIM device, 116, 121, 124 Skype, 118 social media, 115, 116 SPSS and SAS programs, 131 telecommunications, 120 telemedicine, 118 TRS-80s, 129 Twitter, 116 up-to-date technology, 119 video entertainment, 116 voice/data integration, 117 Web 2.0 industry, 132 wireless computers, 115 yellow notepaper, 115 YouTube, 120 Texas, 226 The Associates First Capital Corporation, 47 Toyota, 102 Tracy, Michael, 212 Transmission and distribution companies, 47 Turner, Kevin, 39 Twitter, 244 Ellyn, Lynne, 185 Temares, Lewis, 116 U University computing center, 28 University of Chicago, 104 University of Florida, 139 University of Illinois, 34 University of San Francisco, 36 Utilities Telecom Council, 177 V Verizon Communications, 231, 232 Videoconferencing, 12 Virtual corporations, 241 Virtualization, 310, 311 Visicalc, 24 Vivendi Universal, 134 VMware, 311 Vodafone AirTouch, 231 voice capability, 259 Voice-response unit (VRU), 203 W Wakeman, Dan, 151 advanced placement program, 168 back-end systems, 154, 155 business maxims, 159 business peers, 160, 161 cloud computing, 168 collaborative environment, 160 Computer Choice, 170, 171 consumerization, 166, 170 credibility, 160 decision making, 152 defect-free code, 164 demand-supply model, 157 digital nation, 169 disaster recovery, 154 education business, 160 ElastomerSolutions.com, 151 ETS, 151 mission, 162, 163 packaging and selling information, 163 EXP program, 159 Facebook, 169 fair value and reliable assessments, 159 for-profit business, 152 Gartner CIO Academy, 157 Gen-Xer stuff, 169 Google, 170, 172 Heller, Martha, 171 intellectual property, 171 iPad, 169 IT core competency, 172 engine, 163 industry, 156 skills, 154 ITIL version 3, 158 judgment, 162 leadership and personal integrity, 161 McGenesis, Steve, 155 mentor, 155, 156 metrics and quantitative benchmarking, 166 on-demand services, 168 operational excellence, 163 operations and maintenance, 166 Salesforce, 154 scorecard, 164, 165 security budget, 167 security organization, 167 services and packaging, 171 Six Sigma, 164 smart phones, 170 standardization, 164 Taylor, John, 154–156 virtualization and cloud computing, 167, 168 Wallington, Pat, 175 Wall Street, 23 Wall Street Journal, 168 Walmart, 6, 50 Walt Disney Company, 33 WAN, 259 Web 2.0, 244, 325 Web 3.0 business, 76 Web 2.0 companies, 227 Web infrastructure, 215 Wichita, 226 WikiLeaks, 320 Wikipedia, 79, 85, 115, 185, 220, 291, 292, 303 Williams Companies, 232, 233 WillTell, 233 Wilson, Carl, 225, 228, 229 Wilson, Joe, 338 Wireless network, 59 World Wide Web, 266 X Xerox Corporation, 175, 326, 330, 338 Xerox video center, 318 Y Y2K, 222 YouTube, 20, 65

Navy, 318 Virginia Tech, 323 virtualization, 310, 311 VMware, 311 Web 2.0, 325 WikiLeaks, 320 Windows machine, 317 Xerox Corporation, 309, 326, 330, 338 Xerox video center, 318 Sun Microsystems, 36 Supply-demand organization, 157 T Tech Mahindra, 253, 255 Tech Model Railroad Club (TMRC), 19 Telephony, 17 Temares, Lewis, 113 adaptability, 128 American Marketing Society, 113 Apple device, 116 ARPANET and Internet, 117 BBA, 126 camera, 124 CIO responsibilities and duties, 127 classroom information, 119 client and terminal, 124 College of Engineering, University of Miami, 113 combination of degrees, 125 communication and business skills, 126 computer conference, 116 customer service, 130 cyber security, 121 day-to-day administration, 128 digital device, 125 document management, 129 electronic hospital record, 115 encyclopedia and Wikipedia, 115 entrepreneurial characteristics, 114 ERP, 123 Facebook, 116, 121 faculty members, 121 financial industry, 123 Fortune 500 commercial land, 114 Google, 117 GPS technology, 117 grocery store, 130 Hewlett-Packard piece, 129 higher education, 114, 122 high-performance computing, 119 IBM data center, 124 independent entrepreneurs, 114 Information Technology (IT), 113, 118 Jones, Sam, 131 leading-edge technology, 119 mainframe computers, 118 marketing, 122 matchmaker.com, 131 matchmakerexecs.com, 131 MBA, 126 MIT and Berkeley, 120 mobile technology, 115 New-Age, technology-savvy kids, 115 online degree, 121 passion, 128 personal computer, 117 philanthropism, 123 presentation skills, 128 project management, 126 rainmaker.com, 131 retail industry, 123 revenue producer, 123 RIM device, 116, 121, 124 Skype, 118 social media, 115, 116 SPSS and SAS programs, 131 telecommunications, 120 telemedicine, 118 TRS-80s, 129 Twitter, 116 up-to-date technology, 119 video entertainment, 116 voice/data integration, 117 Web 2.0 industry, 132 wireless computers, 115 yellow notepaper, 115 YouTube, 120 Texas, 226 The Associates First Capital Corporation, 47 Toyota, 102 Tracy, Michael, 212 Transmission and distribution companies, 47 Turner, Kevin, 39 Twitter, 244 Ellyn, Lynne, 185 Temares, Lewis, 116 U University computing center, 28 University of Chicago, 104 University of Florida, 139 University of Illinois, 34 University of San Francisco, 36 Utilities Telecom Council, 177 V Verizon Communications, 231, 232 Videoconferencing, 12 Virtual corporations, 241 Virtualization, 310, 311 Visicalc, 24 Vivendi Universal, 134 VMware, 311 Vodafone AirTouch, 231 voice capability, 259 Voice-response unit (VRU), 203 W Wakeman, Dan, 151 advanced placement program, 168 back-end systems, 154, 155 business maxims, 159 business peers, 160, 161 cloud computing, 168 collaborative environment, 160 Computer Choice, 170, 171 consumerization, 166, 170 credibility, 160 decision making, 152 defect-free code, 164 demand-supply model, 157 digital nation, 169 disaster recovery, 154 education business, 160 ElastomerSolutions.com, 151 ETS, 151 mission, 162, 163 packaging and selling information, 163 EXP program, 159 Facebook, 169 fair value and reliable assessments, 159 for-profit business, 152 Gartner CIO Academy, 157 Gen-Xer stuff, 169 Google, 170, 172 Heller, Martha, 171 intellectual property, 171 iPad, 169 IT core competency, 172 engine, 163 industry, 156 skills, 154 ITIL version 3, 158 judgment, 162 leadership and personal integrity, 161 McGenesis, Steve, 155 mentor, 155, 156 metrics and quantitative benchmarking, 166 on-demand services, 168 operational excellence, 163 operations and maintenance, 166 Salesforce, 154 scorecard, 164, 165 security budget, 167 security organization, 167 services and packaging, 171 Six Sigma, 164 smart phones, 170 standardization, 164 Taylor, John, 154–156 virtualization and cloud computing, 167, 168 Wallington, Pat, 175 Wall Street, 23 Wall Street Journal, 168 Walmart, 6, 50 Walt Disney Company, 33 WAN, 259 Web 2.0, 244, 325 Web 3.0 business, 76 Web 2.0 companies, 227 Web infrastructure, 215 Wichita, 226 WikiLeaks, 320 Wikipedia, 79, 85, 115, 185, 220, 291, 292, 303 Williams Companies, 232, 233 WillTell, 233 Wilson, Carl, 225, 228, 229 Wilson, Joe, 338 Wireless network, 59 World Wide Web, 266 X Xerox Corporation, 175, 326, 330, 338 Xerox video center, 318 Y Y2K, 222 YouTube, 20, 65

pages: 504 words: 143,303

Why We Can't Afford the Rich by Andrew Sayer

accounting loophole / creative accounting, Albert Einstein, anti-globalists, asset-backed security, banking crisis, banks create money, basic income, Boris Johnson, Bretton Woods, British Empire, business cycle, call centre, capital controls, carbon footprint, collective bargaining, corporate raider, corporate social responsibility, creative destruction, credit crunch, Credit Default Swap, crony capitalism, David Graeber, David Ricardo: comparative advantage, debt deflation, decarbonisation, declining real wages, deglobalization, deindustrialization, delayed gratification, demand response, don't be evil, Double Irish / Dutch Sandwich, en.wikipedia.org, Etonian, financial innovation, financial intermediation, Fractional reserve banking, full employment, G4S, Goldman Sachs: Vampire Squid, high net worth, income inequality, information asymmetry, Intergovernmental Panel on Climate Change (IPCC), investor state dispute settlement, Isaac Newton, James Dyson, job automation, Julian Assange, Kickstarter, labour market flexibility, laissez-faire capitalism, land value tax, low skilled workers, Mark Zuckerberg, market fundamentalism, Martin Wolf, mass immigration, means of production, moral hazard, mortgage debt, negative equity, neoliberal agenda, new economy, New Urbanism, Northern Rock, Occupy movement, offshore financial centre, oil shale / tar sands, patent troll, payday loans, Philip Mirowski, plutocrats, Plutocrats, popular capitalism, predatory finance, price stability, pushing on a string, quantitative easing, race to the bottom, rent-seeking, Ronald Reagan, shareholder value, short selling, sovereign wealth fund, Steve Jobs, The Nature of the Firm, The Spirit Level, The Wealth of Nations by Adam Smith, Thorstein Veblen, too big to fail, transfer pricing, trickle-down economics, universal basic income, unpaid internship, upwardly mobile, Washington Consensus, wealth creators, WikiLeaks, Winter of Discontent, working poor, Yom Kippur War, zero-sum game

Significantly, Wikileaks has been the main source of information about them. While the European Commission has held just 8 meetings with civil society groups about the TTIP, it has had 119 with corporations and their lobbyists. These trade pacts seek to augment the intellectual property of companies, prolonging patents beyond 20 years, enabling them to extract more rent for longer from ‘their’ products. Internet service providers will be required to filter and block content – thereby giving companies control over users’ use of ‘their’ products, stopping sharing or reverse engineering and adaptation. Tim Berners-Lee, the inventor of the internet, may have said ‘this is for everyone’, but some major companies want to privatise and control it for their own interests. Julian Assange of Wikileaks comments: If instituted, the TPP’s intellectual property regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons.

idcatart=134&lang=1. 116 White, A. (2012) ‘PwC fined record £1.4m over JP Morgan audit’, Telegraph, 5 January, http://www.telegraph.co.uk/finance/newsbysector/supportservices/8995981/PwC-fined-record-1.4m-over-JP-Morgan-audit.html. 117 Thanks to John Christensen for this information. 118 https://www.gov.uk/government/organisations/hm-revenue-customs/groups/hmrc-board. 119 http://www.ushistory.org/us/24d.asp. 120 Bowman, A., Ertürk, I., Froud, J., Johal, S., Moran, M., Law, J., Leaver, A. and Williams, K. (2012) ‘Scapegoats aren’t enough: a Leveson for the banks?’, CRESC Discussion Paper, p 8. 121 Canada, US, Mexico, Peru, Chile, New Zealand, Australia, Brunei, Singapore, Malaysia, Vietnam and Japan. 122 Wikileaks (2013) ‘Secret Trans-Pacific Partnership agreement (TPP)’, https://wikileaks.org/tpp/pressrelease.html. 123 Wikileaks (2013). 124 Monbiot, G. (2013) ‘The lies behind this transatlantic trade deal’, Guardian, 2 December, http://www.theguardian.com/commentisfree/2013/dec/02/transatlantic-free-trade-deal-regulation-by-lawyers-eu-us. 125 Corporate Europe Observatory (2013) ‘A transatlantic corporate bill of rights’, 3 June, http://corporateeurope.org/trade/2013/06/transatlantic-corporate-bill-rights. 126 McDonagh, T. (2013) ‘Unfair, unsustainable and under the radar’, San Francisco: Democracy Center, http://democracyctr.org/new-report-unfair-unsustainable-and-under-the-radar/.

pages: 565 words: 151,129

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism by Jeremy Rifkin

"Robert Solow", 3D printing, active measures, additive manufacturing, Airbnb, autonomous vehicles, back-to-the-land, big-box store, bioinformatics, bitcoin, business process, Chris Urmson, clean water, cleantech, cloud computing, collaborative consumption, collaborative economy, Community Supported Agriculture, Computer Numeric Control, computer vision, crowdsourcing, demographic transition, distributed generation, en.wikipedia.org, Frederick Winslow Taylor, global supply chain, global village, Hacker Ethic, industrial robot, informal economy, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Isaac Newton, James Watt: steam engine, job automation, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Julian Assange, Kickstarter, knowledge worker, longitudinal study, Mahatma Gandhi, manufacturing employment, Mark Zuckerberg, market design, mass immigration, means of production, meta analysis, meta-analysis, natural language processing, new economy, New Urbanism, nuclear winter, Occupy movement, off grid, oil shale / tar sands, pattern recognition, peer-to-peer, peer-to-peer lending, personalized medicine, phenotype, planetary scale, price discrimination, profit motive, QR code, RAND corporation, randomized controlled trial, Ray Kurzweil, RFID, Richard Stallman, risk/return, Ronald Coase, search inside the book, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, smart cities, smart grid, smart meter, social web, software as a service, spectrum auction, Steve Jobs, Stewart Brand, the built environment, The Nature of the Firm, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, too big to fail, transaction costs, urban planning, Watson beat the top human players on Jeopardy!, web application, Whole Earth Catalog, Whole Earth Review, WikiLeaks, working poor, zero-sum game, Zipcar

Others are concerned that social media sites like Twitter might be tempted to manipulate rankings, one of the more popular features used to engage their members. For example, Twitter hosts a feature called Twitter Trends, which identifies hot topics and issues of current interest that are “trending.” Questions have been raised about whether the algorithms companies use to spot and rank trends might be programmed to reflect the biases of the management that oversees them, consciously or otherwise. Julian Assange’s supporters suspected that Twitter deliberately finagled the trending during the WikiLeaks scandal.36 Industry watchers are beginning to ask, how we can maintain “algorithm neutrality”? Tarleton Gillespie, a professor of communications at Cornell University, says that algorithm manipulation is not entirely out of the question, especially when the algorithms are created by commercial players who might see a pecuniary or ideological rationale for tampering with the data.

Tim Wu, “In the Grip of the New Monopolists,” Wall Street Journal, November 13, 2010, http://online.wsj.com/article/SB10001424052748704635704575604993311538482.html. 34. Ibid. 35. Lam Thuy Vo, “Another Ridiculous Number from the Patent Wars,” NPR Planet Money, April 27, 2012, http://www.npr.org/blogs/money/2012/04/27/151357127/another-ridiculous-number -from-the-patent-wars. 36. Angus Johnston, “Still More Questions about Why Wikileaks Hasn’t Trended on Twitter,” Student Activism, December 5, 2010, http://studentactivism.net/2010/12/05/wikileaks-twitter-3/. 37. Tarleton Gillespie, “Can an Algorithm Be Wrong? Twitter Trends, the Specter of Censorship, and Our Faith in the Algorithms around Us,” Social Media Collective, October 19, 2011, http://socialmediacollective.org/2011/10/19/can-an-algorithm-be-wrong/. 38. Ibid. 39. Zeynep Tufekci, “Google Buzz: The Corporatization of Social Commons,” Technosociology, February 17, 2010, http://technosociology.org/?

., 61 technological employment/unemployment, 7, 122, 266–269 telegraph(s), impact of, 22, 46, 50, 51, 71, 194 Tennessee Valley Authority (TVA), 206–210 textile industry, 31, 39–40, 124–125, 212 thermodynamic efficiencies, 10–15, 70–73, 78, 91, 143–144, 186 the third Industrial Revolution. see Collaborative Commons The Third Industrial Revolution (Rifkin), 11 3D printing, 89–108 and automobiles, 98–99 and bioprinting body parts/organs, 246–247 and construction of buildings, 96–97 and customization, 91 democratizing the replicator, 93–99 differs from conventional manufacturing, 90–92 efficiency and productivity of, 90 and feedstock, 48, 89, 95–98, 101–102 and furniture, 96 and lunar buildings, 97 and a makers infrastructure, 99–104 marketing of, 91 and micro infofacturing, 89–92 and a neo-Gandhian world, 104–108 and the Solar-Sinter, 95–96 and Xerox, 95 ThredUP, 236, 258 Thrun, Sebastian, 114–115 Time, 253 time bank(s), 261 The Times of London, 44 Tie Society, 236 TIR Consulting Group, 15, 191 Torvalds, Linus, 175 Toyota, 54, 99, 230 “The Tragedy of the Commons” (Hardin), 155–158 transborder park(s), 183 Treaty to Share the Genetic Commons, 167–168 TrustCloud, 258 Twitter becoming an online monopoly, 204–205 and algorithm manipulation, 203 changes the concept of privacy, 76 as communication, 151, 234, 248, 302 exploiting the Commons for commercial ends, 199–200, 310 and freedom, 226 as a podium for activism, 189 referenced in news and entertainment reporting, 201–202 revenue and market share, 201 and the WikiLeaks scandal, 203 as tracking tool, 245 Two Treatises of Government (Locke), 60 Udacity, 115 unemployment and blue-collar workers,123–124 due to technological advancement, 7, 121–128 and repercussions of job loss, 132 and white-collar workers, 126 United Nations, 21, 213 Food and Agriculture Organization (FAO), 274 Industrial Development Organization (UNIDO), 285 Internet Governance Forum (IGF), 196 United States Centers for Disease Control, 245 Department of Defense, 96, 125, 142, 294–295 Department of Energy, 87, 295 Energy Information Administration (EIA), 87 Federal Trade Commission, 202, 291 Gross Domestic Product (GDP), 122, 219 income disparity in the, 277–278 Justice Department, 129 National Academy of Sciences, 293–294 National Center for Atmospheric Research, 288 Patents and Trademark Office (PTO), 165–166 postal service, 45–46, 113, 125–126, 163–164 transmission grid, vulnerability of, 293–296 Treasury, 259, 291 upcycling, 91, 236 UPS, uses Big Data, 11–12 urbanization, caused by printing/rail industry, 53 Urbee, 98–99 utilitarian value, Hume and Bentham’s theory of, 62–63 Utopia (More), 31 Vail, Theodore Newton, 49–50 vehicle(s). see automobile(s) Verizon, 51, 54, 148, 198 Vernadsky, Vladimir, 183 vertical integration/vertically integrated companies and centralized management of production and distribution, 46–47 and removal of costly middle men, 23, 46, 232 see also Collaborative Commons Vietor, Richard H.

pages: 452 words: 134,502

Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet by David Moon, Patrick Ruffini, David Segal, Aaron Swartz, Lawrence Lessig, Cory Doctorow, Zoe Lofgren, Jamie Laurie, Ron Paul, Mike Masnick, Kim Dotcom, Tiffiniy Cheng, Alexis Ohanian, Nicole Powers, Josh Levy

4chan, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Burning Man, call centre, Cass Sunstein, Chelsea Manning, collective bargaining, creative destruction, crony capitalism, crowdsourcing, don't be evil, facts on the ground, Firefox, hive mind, immigration reform, informal economy, jimmy wales, Julian Assange, Kickstarter, liquidity trap, Mark Zuckerberg, obamacare, Occupy movement, offshore financial centre, peer-to-peer, plutocrats, Plutocrats, prisoner's dilemma, rent-seeking, Silicon Valley, Skype, technoutopianism, WikiLeaks, Y Combinator

The SOPA/PIPA win was the first great American political hack of the Internet age, but it won’t be the last. OR Books PUBLISHING THE POLITICS OF THE INTERNET Cypherpunks: Freedom and the Future of the Internet JULIAN ASSANGE Tweets From Tahrir: Egypt’s Revolution as It Unfolded, in the Words of the People Who Made It NADIA IDLE AND ALEX NUNNS, EDITORS The Passion of Bradley Manning: The Story of the Suspect Behind the Largest Security Breach in U.S. History CHASE MADAR Freeloading: How Our Insatiable Appetite for Free Content Starves Creativity CHRIS RUEN Program or Be Programmed: Ten Commands for a Digital Age DOUGLAS RUSHKOFF WikiLeaks and the Age of Transparency MICAH L. SIFRY For more information, visit our website at www.orbooks.com

Aaron Swartz If you wanted to censor the Internet, if you wanted to come up with a way the government could shut down access to particular websites—this bill might just be the only way to do it. If you said it was about pornography, it’d probably get overturned by the courts—just like that adult bookstore case. But by claiming it was about copyright, it might just sneak through. And that was terrifying, because copyright was absolutely everywhere. If you wanted to shut down WikiLeaks, it’d be a bit of a stretch to claim you were doing it because they were distributing child pornography. But it wouldn’t be hard at all to claim they were violating copyright. Patrick Ruffini (Republican Party political strategist, cofounder of Engage) When I first read the bill that October, the notion that a bill like this could see the light of day was jaw-dropping. On the one hand, elected officials celebrated the Internet, used it in their campaigns, and extolled its disruptive potential in visits to Silicon Valley.

Which means that if you wanted to censor the Internet, if you wanted to come up with a way the government could shut down access to particular websites—this bill might just be the only way to do it. If you said it was about pornography, it’d probably get overturned by the courts—just like that adult bookstore case. But by claiming it was about copyright, it might just sneak through. And that was terrifying, because copyright was absolutely everywhere. If you wanted to shut down WikiLeaks, it’d be a bit of a stretch to claim you were doing it because they were distributing child pornography. But it wouldn’t be hard at all to claim they were violating copyright. Because everything is copyrighted. These words are copyrighted. And it’s so easy to accidentally copy something. So easy, in fact, that we found the leading Republican supporter of COICA, Orrin Hatch, had illegally copied a bunch of code into his own Senate website.

pages: 457 words: 128,838

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order by Paul Vigna, Michael J. Casey

Airbnb, altcoin, bank run, banking crisis, bitcoin, blockchain, Bretton Woods, buy and hold, California gold rush, capital controls, carbon footprint, clean water, collaborative economy, collapse of Lehman Brothers, Columbine, Credit Default Swap, cryptocurrency, David Graeber, disintermediation, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, fiat currency, financial innovation, Firefox, Flash crash, Fractional reserve banking, hacker house, Hernando de Soto, high net worth, informal economy, intangible asset, Internet of things, inventory management, Joi Ito, Julian Assange, Kickstarter, Kuwabatake Sanjuro: assassination market, litecoin, Long Term Capital Management, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, McMansion, means of production, Menlo Park, mobile money, money: store of value / unit of account / medium of exchange, Nelson Mandela, Network effects, new economy, new new economy, Nixon shock, offshore financial centre, payday loans, Pearl River Delta, peer-to-peer, peer-to-peer lending, pets.com, Ponzi scheme, prediction markets, price stability, profit motive, QR code, RAND corporation, regulatory arbitrage, rent-seeking, reserve currency, Robert Shiller, Robert Shiller, Ross Ulbricht, Satoshi Nakamoto, seigniorage, shareholder value, sharing economy, short selling, Silicon Valley, Silicon Valley startup, Skype, smart contracts, special drawing rights, Spread Networks laid a new fibre optics cable between New York and Chicago, Steve Jobs, supply-chain management, Ted Nelson, The Great Moderation, the market place, the payments system, The Wealth of Nations by Adam Smith, too big to fail, transaction costs, tulip mania, Turing complete, Tyler Cowen: Great Stagnation, Uber and Lyft, uber lyft, underbanked, WikiLeaks, Y Combinator, Y2K, zero-sum game, Zimmermann PGP

* * * Among the close-knit cryptography community invited to review Nakamoto’s work were members of the Cypherpunk movement, a loose association of tech-minded activists who had first gained notoriety in the 1990s with their efforts to use cryptographic privacy tools to force radical political and cultural change. This effort bore some fruit: transparency crusader Julian Assange and his activist publishing organization, WikiLeaks, grew out of this movement. To the Cypherpunks, the idea of an anonymous digital cash system was nothing new. It had been one of their first big ideas, but no one had yet turned it into something viable. Several had attempted to build digital cash systems, one had even got tantalizingly close, but ultimately no system had reached any kind of critical mass, and the cause had fizzled out.

One product they developed was the Cypherpunk version of an anonymous message remailer, which hid the identity of a person sending an e-mail and prevented the recipient from replying to it, all in the name of stopping governments or corporations from snooping on people’s daily communications. Other products had more subversive objectives—for example, May’s audacious BlackNet project, a precursor to WikiLeaks, which solicited secret information with the promise of encryption and payments in untraceable digital money. A few products were downright scary. Jim Bell, who like May was formerly employed by Intel, proposed an anonymous market for assassinations. The idea was that people could anonymously contribute to a bounty that they would pay to have a particular influential person killed, the assumption being that the market would put a greater price on the heads of those most egregiously abusing a position of authority.

Gox and trust industries Turing Festival 20Mission Twitter Uber U-Haul Ulbricht, Ross Ultimate Frisbee unbanked people Unenumerated Unfair Trade, The (Casey) UnionPay Union Square Partners United Kingdom Utah utilities value: of bitcoins of coins of cryptocurrencies of dollar of gold intrinsic of money van der Laan, Wladimir Vaurum venture capitalists (VCs) Ver, Roger Verisign Verizon Vessenes, Peter VHS Virgin Group VirtEx Visa Vodafone Volabit Volcker, Paul Voltaire Voorhees, Erik voting Wall Street Wall Street Journal Walmart Washington State wealth bitcoin and Wealth of Nations, The (Smith) Web Designs WeChat Wedbush Securities Weill, Sanford Wei Dai Weimar Republic welfare state Wells Fargo Western Union Whelan, Jason Whelan, John WikiLeaks Wikipedia Willard, Rik William III, King Williams, Mark T. Wilson, Cody Wilson, Fred Winklevoss, Cameron and Tyler Wise, Josh Women’s Annex Wood, Gavin work World Bank Wright, Frank Lloyd Wuille, Pieter Xapo XIPH Foundation Xpert Financial XRP Y2K threat Yahoo Yang, Jerry Yap Y Combinator Yellen, Janet Yermack, David YouTube YTCracker Yunus, Muhammad ZeroBlock Zhang, Ng Zimbabwe Zimmerman, Phil Zobro, Jonathan Zoosk Zuckerberg, Mark Zug Also by Michael J.

Humble Pi: A Comedy of Maths Errors by Matt Parker

8-hour work day, Affordable Care Act / Obamacare, bitcoin, British Empire, Brownian motion, Chuck Templeton: OpenTable:, collateralized debt obligation, computer age, correlation does not imply causation, crowdsourcing, Donald Trump, Flash crash, forensic accounting, game design, High speed trading, Julian Assange, millennium bug, Minecraft, obamacare, orbital mechanics / astrodynamics, publication bias, Richard Feynman, Richard Feynman: Challenger O-ring, selection bias, Tacoma Narrows Bridge, Therac-25, value at risk, WikiLeaks, Y2K

Through the walls can be heard muffled cries of ‘Tell them to use a real database LIKE AN ADULT.’ The end of the spreadsheet Another limitation of spreadsheets as databases is that they eventually run out. Much like computers having trouble keeping track of time in a 32-digit binary number, Excel has difficulty keeping track of how many rows are in a spreadsheet. In 2010 WikiLeaks presented the Guardian and The New York Times with 92,000 leaked field reports from the war in Afghanistan. Julian Assange delivered them in person to the Guardian offices in London. The journalists quickly confirmed that they seemed to be real but, to their surprise, the reports ended abruptly in April 2009, when they should have gone through to the end of that year. You guessed it: Excel counted its rows as a 16-bit number, so there was a maximum of 2^16= 65,536 rows available.

pages: 251 words: 80,243

Nothing Is True and Everything Is Possible: The Surreal Heart of the New Russia by Peter Pomerantsev

Bretton Woods, corporate governance, corporate raider, Julian Assange, mega-rich, new economy, Occupy movement, Silicon Valley, WikiLeaks

And when the President will go on to annex Crimea and launch his new war with the West, RT will be in the vanguard, fabricating startling fictions about fascists taking over Ukraine. But the first-time viewer would not necessarily register these stories, for such obvious pro-Kremlin messaging is only one part of RT’s output. Its popularity stems from coverage of what it calls “other,” or “unreported,” news. Julian Assange, head of WikiLeaks, had a talk show on RT. American academics who fight the American World Order, 9/11 conspiracy theorists, antiglobalists, and the European Far Right are given generous space. Nigel Farage, leader of the nonparliamentary anti-immigration UKIP party, is a frequent guest; Far Left supporter of Saddam Hussein George Galloway hosts a program about Western media bias. The channel has been nominated for an Emmy for its reporting on the Occupy movement in the United States and is described as “antihegemonic” by its fans; it is the most watched channel on YouTube, with one billion viewers, and the third most watched news channel in the United Kingdom, and its Washington office is expanding.

pages: 597 words: 172,130

The Alchemists: Three Central Bankers and a World on Fire by Neil Irwin

"Robert Solow", Ayatollah Khomeini, bank run, banking crisis, Berlin Wall, Bernie Sanders, break the buck, Bretton Woods, business climate, business cycle, capital controls, central bank independence, centre right, collapse of Lehman Brothers, collateralized debt obligation, credit crunch, currency peg, eurozone crisis, financial innovation, Flash crash, George Akerlof, German hyperinflation, Google Earth, hiring and firing, inflation targeting, Isaac Newton, Julian Assange, low cost airline, market bubble, market design, money market fund, moral hazard, mortgage debt, new economy, Northern Rock, Paul Samuelson, price stability, quantitative easing, rent control, reserve currency, Robert Shiller, Robert Shiller, rolodex, Ronald Reagan, savings glut, Socratic dialogue, sovereign wealth fund, The Great Moderation, too big to fail, union organizing, WikiLeaks, yield curve, Yom Kippur War

We offered alternative language. The majority of the committee decided that they were comfortable with the language that appeared in the report. . . . It is factually correct, however, that at least one other member plus me were concerned that that language was too political, too much of a statement. That’s my personal opinion. A few days after that, another penny dropped. WikiLeaks, the publishing cooperative led by eccentric Australian Julian Assange and devoted to exposing the world’s secrets, began unveiling a trove of diplomatic cables that U.S. embassies around the world had sent to Washington, never meant for public consumption. Among them was Ambassador Susman’s write-up of his meeting with King from earlier in the year, showing the governor offering a ruthlessly critical assessment of the men who were now in power.

“If there were any mobile phones”: Edmund Conway, “Watch Out: The Governor’s About; Mervyn King’s Latest Criticism of the Handling of the Recession Was a Body Blow to the PM, Says Edmund Conway,” Daily Telegraph, January 21, 2010, 23. “This is a decisive moment”: Daniel Bentley, “Top Economists Call for Rapid Deficit Cut,” Independent (London), February 14, 2010. Five times in the winter and spring of 2010: Conaghan, Back from the Brink, 241. “King expressed great concern”: U.S. Embassy London, “Bank of England Governor: Concern about Recovery,” Cable 10LONDON364, http://wikileaks.org/cable/2010/02/10LONDON364.html. “was the spectre which loomed over our talks”: David Laws, 22 Days in May: The Birth of the Lib Dem–Conservative Coalition (London: Biteback Publishing, 2010), 109. “The most important thing now”: Bank of England, Quarterly Inflation Report Q&A, May 12, 2010, http://www.bankofengland.co.uk/publications/Documents/inflationreport/conf120510.pdf. “The age of plenty is over”: James Kirkup, “First Swing of the Axe: Osborne £6 Billion ‘Taste’ of Where the Axe Will Fall,” Daily Telegraph, May 24, 2010, 1.

Chancellor, welcome your commitment”: Mervyn King, Speech at the Lord Mayor’s Banquet for Bankers and Merchants of the City of London at the Mansion House, June 16, 2010, http://www.bankofengland.co.uk/publications/Documents/speeches/2010/speech437.pdf. “thirst for power and influence”: David Blanchflower, “Mervyn King Must Go,” Guardian, December 1, 2010, http://www.guardian.co.uk/commentisfree/2010/dec/01/mervyn-king-bank-of-england. “the issue of confidence simply doesn’t arise”: Jennifer Ryan and Thomas Penny, “Cameron Backs King as Wikileaks Cites BOE Chief’s Concern on Inexperience,” Bloomberg News, December 1, 2010. “I have never discussed with [Osborne]”: Bank of England 2011 Inflation Report, Transcript of Treasury Select Committee, March 1, 2011, http://www.publications.parliament.uk/pa/cm201011/cmselect/cmtreasy/798/11030102.htm. “Notwithstanding my affection for the rock music of the seventies”: Andrew Sentance, “Ten Good Reasons to Tighten,” speech before the Ashridge Alumni Business Briefing at the Institute of Directors, London, February 24, 2011, http://www.bankofengland.co.uk/publications/Documents/speeches/2011/speech476.pdf.

The Secret World: A History of Intelligence by Christopher Andrew

active measures, Admiral Zheng, airport security, anti-communist, Atahualpa, Ayatollah Khomeini, British Empire, Chelsea Manning, colonial rule, cuban missile crisis, Edward Snowden, en.wikipedia.org, Etonian, Fellow of the Royal Society, Francisco Pizarro, Google Earth, invention of movable type, invention of the telegraph, Julian Assange, Khyber Pass, Mahatma Gandhi, Mikhail Gorbachev, Murano, Venice glass, RAND corporation, Robert Hanssen: Double agent, Ronald Reagan, Skype, South Sea Bubble, spice trade, the market place, trade route, union organizing, uranium enrichment, Vladimir Vetrov: Farewell Dossier, WikiLeaks, éminence grise

.* That intelligence continues to generate headline news has been due not merely to the prolonged official enquiries into 9/11 and the Iraq War but also to unprecedented amounts of classified material leaked by ‘whistle-blowers’. In 2010 the WikiLeaks website, founded by Julian Assange, began publishing online documents downloaded from State Department and military databases by US Army Private Bradley (now Chelsea) Manning.† The 251,287 confidential documents passed by Manning to WikiLeaks were by far the largest number ever leaked by a whistleblower.67 When Mike Pompeo became the CIA’s director early in 2017, he denounced WikiLeaks as ‘a non-state hostile intelligence service’.68 Like much other reporting on twenty-first-century intelligence, the enormous global publicity given to WikiLeaks has been mostly devoid of historical perspective. Publication of sensitive American diplomatic documents began, on a far more modest scale, almost one and a half centuries before WikiLeaks – not by the press but by the US government.

A limited number of ambassadors were, however, forced to leave or change their posts. Manning’s achievements as a whistleblower were far outdone by Edward Snowden, an NSA contractor who claimed that its electronic eavesdropping had spiralled out of control. In 2013 Snowden downloaded 1.5 million highly classified intelligence documents onto thumbnail drives – the largest ever breach of Western SIGINT security. Even Julian Assange was taken aback. Andrew O’Hagan, who was commissioned to ghostwrite Assange’s autobiography (which was never completed), found him ‘like an ageing movie star, . . . a little put out by the global superstardom of Snowden’.71 As Snowden began to release documents for publication by global media, he took refuge in, successively, Hong Kong and Moscow. The resulting uproar fuelled international controversy on the proper limits of official surveillance in the internet age.

In the later nineteenth century some American ambassadors became reluctant to send despatches to Washington which criticized their host governments for fear that the State Department would make them public.69 Some of the diplomatic despatches published by WikiLeaks were quite similar to those released by the State Department over a century earlier. One of the best-publicized documents during Tunisia’s ‘Jasmine Revolution’, which overthrew the corrupt authoritarian regime of President Ben Ali at the beginning of the Arab Spring in January 2012, was a report to Washington by the US ambassador to Tunisia, Robert Godec, in July 2009, published by WikiLeaks: Whether it’s cash, services, land, property, or yes, even your yacht, President Ben Ali’s family is rumored to covet it and reportedly gets what it wants . . . Often referred to as a quasi-mafia, an oblique mention of ‘the Family’ is enough to indicate which family you mean.

pages: 1,071 words: 295,220

Rise and Kill First: The Secret History of Israel's Targeted Assassinations by Ronen Bergman

Ayatollah Khomeini, Boycotts of Israel, British Empire, card file, conceptual framework, cuban missile crisis, Edward Snowden, facts on the ground, friendly fire, glass ceiling, illegal immigration, Julian Assange, Kickstarter, Marshall McLuhan, Ronald Reagan, Stuxnet, uranium enrichment, WikiLeaks, Yom Kippur War

The two men established the closest levels of trust Interview with Hayden, February 1, 2014. not even the experienced Hayden anticipated the bombshell Ibid. Hayden leaned over to Vice President Dick Cheney Hayden, Playing to the Edge, 256. “this reactor was not intended for peaceful purposes” Secretary of State Rice, “Syria’s Clandestine Nuclear Program,” April 25, 2008 (taken from the Wikileaks archive, as given to the author by Julian Assange, March 4, 2011). he wanted U.S. forces to destroy the reactor Interview with “Oscar,” April 2014. The Assad family…reminded him of the Corleone family Interview with Hayden, July 20, 2016. “Assad could not stand another embarrassment” That retreat was forced on Assad by the international community, led by the United States and France, for his involvement in the assassination of Rafik Hariri.

The cops left the rest of him sitting against the tree so that press photographers could record the horrific moment for posterity. “His operational capabilities were greater” Interview with Dagan, June 19, 2013. “Lucky for us, he wasn’t” Interview with “Terminal,” September 2014. This behavior “took discipline,” Olmert observed “Boehner’s Meeting with Prime Minister Olmert,” March 23, 2008, Tel Aviv 000738 (author’s archive, received from Julian Assange). But Olmert rejected the idea Interview with “Shimshon,” November 2012. “Suleiman was a real shit” Interview with Olmert, August 29, 2011. “a hand in three primary areas” “Manhunting Timeline 2008,” Intellipedia, NSA (Snowden archive), www.documentcloud.org/​documents/​2165140-manhunting-redacted.html#document/​p1. the Israelis knew there was no chance the United States would get involved By April 2008, the CIA had reached the conclusion that Assad would not start a war over the bombing of the reactor, that there was no more need for secrecy, and that it was possible to use the materials on the affair for other purposes.

INTERVIEWS Aharon Abramovich, Worko Abuhi, Ehud (Udi) Adam, Nathan Adams, Avraham Adan, Nahum Admoni, Gadi Afriat, Shlomi Afriat, David Agmon, Amram Aharoni, Zvi Aharoni, Wanda Akale, Lior Akerman, Fereda Aklum, Aql Al-Hashem, Kanatjan Alibekov, Doron Almog, Ze’ev Alon, Yossi Alpher, Hamdi Aman, Yaakov Amidror, Meir Amit, Frank Anderson, Christopher Andrew, Hugo Anzorreguy, Uzi Arad, Dror Arad-Ayalon, Yasser Arafat, David Arbel, Dani Arditi, Moshe Arens, Anna Aroch, Julian Assange, Rojer Auqe, Gad Aviran, Shai Avital, Juval Aviv, Pinchas Avivi, David Avner, Talia Avner, Uri Avnery, Avner Avraham, Haim Avraham, Aharon Avramovich, Ami Ayalon, Danny Ayalon, Avner Azoulai, Robert Baer, Yossi Baidatz, Ehud Barak, Amatzia Baram, Miki Barel, Aharon Barnea, Avner Barnea, Itamar Barnea, Omer Bar-Lev, Uri Bar-Lev, Hannan Bar-On, David Barkai, Hanoch Bartov, Mehereta Baruch, Yona Baumel, Stanley Bedlington, Benjamin Begin, Yossi Beilin, Dorit Beinisch, Ilan Ben David, Moshe Ben David, Zvika Bendori, Gilad Ben Dror, Benjamin Ben-Eliezer, Eliyahu Ben-Elissar, Eitan Ben Eliyahu, Avigdor “Yanosh” Ben-Gal, Isaac Ben Israel, Arthur (Asher) Ben-Natan, Eyal Ben Reuven, Eitan Ben Tsur, Barak Ben Tzur, David Ben Uziel, Ron Ben-Yishai, Yoran Ben Ze’ev, Ronnie (Aharon) Bergman, Muki Betser, Avino Biber, Amnon Biran, Dov Biran, Ilan Biran, Yoav Biran, Kai Bird, Uri Blau, Hans Blix, Gabriella Blum, Naftali Blumenthal, Yossef Bodansky, Joyce Boim, Ze’ev Boim, Chaim Boru, Avraham Botzer, Eitan Braun, Shlomo Brom, Shay Brosh, Jean-Louis Bruguière, Pinchas Buchris, Haim Buzaglo, Zvi Caftori, Haim Carmon, Igal Carmon, Aharon Chelouche, Dvora Chen, Uri Chen, Michael Chertoff, Itamar Chizik, Joseph Ciechanover, Wesley Clark, Avner Cohen, Haim Cohen, Moshe Cohen, Ronen Cohen (scholar), Dr.

pages: 326 words: 91,559

Everything for Everyone: The Radical Tradition That Is Shaping the Next Economy by Nathan Schneider

1960s counterculture, Affordable Care Act / Obamacare, Airbnb, altcoin, Amazon Mechanical Turk, back-to-the-land, basic income, Berlin Wall, Bernie Sanders, bitcoin, blockchain, Brewster Kahle, Burning Man, Capital in the Twenty-First Century by Thomas Piketty, carbon footprint, Clayton Christensen, collaborative economy, collective bargaining, Community Supported Agriculture, corporate governance, creative destruction, crowdsourcing, cryptocurrency, Debian, disruptive innovation, do-ocracy, Donald Knuth, Donald Trump, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, Food sovereignty, four colour theorem, future of work, gig economy, Google bus, hydraulic fracturing, Internet Archive, Jeff Bezos, jimmy wales, joint-stock company, Joseph Schumpeter, Julian Assange, Kickstarter, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, mass immigration, means of production, multi-sided market, new economy, offshore financial centre, old-boy network, Peter H. Diamandis: Planetary Resources, post-work, precariat, premature optimization, pre–internet, profit motive, race to the bottom, Richard Florida, Richard Stallman, ride hailing / ride sharing, Sam Altman, Satoshi Nakamoto, self-driving car, shareholder value, sharing economy, Silicon Valley, Slavoj Žižek, smart contracts, Steve Jobs, Steve Wozniak, Stewart Brand, transaction costs, Turing test, Uber and Lyft, uber lyft, underbanked, undersea cable, universal basic income, Upton Sinclair, Vanguard fund, white flight, Whole Earth Catalog, WikiLeaks, women in the workforce, working poor, Y Combinator, Y2K, Zipcar

Several months before the summit, Bauwens said that FLOK was a “sideways hack”—of the country, maybe even of the global economy. “It’s taking advantage of a historic opportunity to do something innovative and transformative in Ecuador.” He saw a chance to set the conditions for a commonwealth. FLOK bore the style and contradictions of Ecuador’s brand at the time. The president, Rafael Correa, sometimes spoke in favor of open-source software; WikiLeaks founder Julian Assange had been living in Ecuador’s London embassy since 2012. Even while exploiting rain-forest oil resources and silencing dissenters, Correa’s administration called for changing the country’s “productive matrix” from reliance on finite resources in the ground to the infinite possibilities of unfettered information. Yet most of the North Americans I met in Quito were out of a job because Correa had recently outlawed foreign organizations, likely for circulating inconvenient information about human rights.

pages: 588 words: 131,025

The Patient Will See You Now: The Future of Medicine Is in Your Hands by Eric Topol

23andMe, 3D printing, Affordable Care Act / Obamacare, Anne Wojcicki, Atul Gawande, augmented reality, bioinformatics, call centre, Clayton Christensen, clean water, cloud computing, commoditize, computer vision, conceptual framework, connected car, correlation does not imply causation, creative destruction, crowdsourcing, dark matter, data acquisition, disintermediation, disruptive innovation, don't be evil, Edward Snowden, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Firefox, global village, Google Glasses, Google X / Alphabet X, Ignaz Semmelweis: hand washing, information asymmetry, interchangeable parts, Internet of things, Isaac Newton, job automation, Julian Assange, Kevin Kelly, license plate recognition, lifelogging, Lyft, Mark Zuckerberg, Marshall McLuhan, meta analysis, meta-analysis, microbiome, Nate Silver, natural language processing, Network effects, Nicholas Carr, obamacare, pattern recognition, personalized medicine, phenotype, placebo effect, RAND corporation, randomized controlled trial, Second Machine Age, self-driving car, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, Snapchat, social graph, speech recognition, stealth mode startup, Steve Jobs, the scientific method, The Signal and the Noise by Nate Silver, The Wealth of Nations by Adam Smith, Turing test, Uber for X, uber lyft, Watson beat the top human players on Jeopardy!, WikiLeaks, X Prize

That’s next up. Chapter 12 Secure vs. Cure “I do not want to live in a world where everything I do and say is recorded.” —EDWARD SNOWDEN1 “Today’s Web-enabled gadgets should come with a digital Miranda warning: Anything you say or do online, from a status update to a selfie, can and will be used as evidence against you on the Internet.” —NICK BILTON, New York Times2 In a world of Julian Assange’s Wikileaks and Edward Snowden’s exposé of the National Security Agency, we are progressing toward zero tolerance of governmental non-transparency.1,3 At the same time, massive Internet security breaches are occurring or being discovered, from retailers like Target to the Heartbleed bug. Just as everything is getting digitized, making it eminently portable and accessible, we’re betwixt and between.

Vallee, David, 65 van de Werf, Ysbrand, 53 Variants of unknown significance (VUS), genomic, 85–86, 205 Veatch, Robert, 18, 29–30 Verghese, Abraham, 279 Veterans Affairs, Department of, 129, 136 Virtual Doctor Project, 270–271 Virtual health assistants (VHAs), 164–165 Virtual office visits, 165–172 Voice recognition software, 131 Voigt, John, 56–57 VSee, 270–271 Walgreens, 68, 106–107, 162–163, 224, 292 Walker, Jan, 131 Wall Street Journal, 22, 69 Warner, David, 127 Waste in health care expenditures, 142–147 Wearable book, 54 White coat lecture, 175–176 Whole genome sequencing, 86 Wikileaks, 219 Wikilife Foundation, 200 Wilsey, Grace, 9–10, 10(fig.) Wireshark network analysis tool, 221 Wisdom of the body, 280 The Wisdom of the Body (Cannon), 280–281 Wojcicki, Anne, 63, 69–72 Wolfram, Stephen, 82, 221 Wolpert, Ann, 210 World Bank, 257 World Health Organization (WHO), 257, 270 Worstall, Tim, 151 Xpert, 266 X-rays, 113 Zero: The Biography of a Dangerous Idea (Seife), 71–72

pages: 499 words: 144,278

Coders: The Making of a New Tribe and the Remaking of the World by Clive Thompson

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 4chan, 8-hour work day, Ada Lovelace, AI winter, Airbnb, Amazon Web Services, Asperger Syndrome, augmented reality, Ayatollah Khomeini, barriers to entry, basic income, Bernie Sanders, bitcoin, blockchain, blue-collar work, Brewster Kahle, Brian Krebs, Broken windows theory, call centre, cellular automata, Chelsea Manning, clean water, cloud computing, cognitive dissonance, computer vision, Conway's Game of Life, crowdsourcing, cryptocurrency, Danny Hillis, David Heinemeier Hansson, don't be evil, don't repeat yourself, Donald Trump, dumpster diving, Edward Snowden, Elon Musk, Erik Brynjolfsson, Ernest Rutherford, Ethereum, ethereum blockchain, Firefox, Frederick Winslow Taylor, game design, glass ceiling, Golden Gate Park, Google Hangouts, Google X / Alphabet X, Grace Hopper, Guido van Rossum, Hacker Ethic, HyperCard, illegal immigration, ImageNet competition, Internet Archive, Internet of things, Jane Jacobs, John Markoff, Jony Ive, Julian Assange, Kickstarter, Larry Wall, lone genius, Lyft, Marc Andreessen, Mark Shuttleworth, Mark Zuckerberg, Menlo Park, microservices, Minecraft, move fast and break things, move fast and break things, Nate Silver, Network effects, neurotypical, Nicholas Carr, Oculus Rift, PageRank, pattern recognition, Paul Graham, paypal mafia, Peter Thiel, pink-collar, planetary scale, profit motive, ransomware, recommendation engine, Richard Stallman, ride hailing / ride sharing, Rubik’s Cube, Ruby on Rails, Sam Altman, Satoshi Nakamoto, Saturday Night Live, self-driving car, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, single-payer health, Skype, smart contracts, Snapchat, social software, software is eating the world, sorting algorithm, South of Market, San Francisco, speech recognition, Steve Wozniak, Steven Levy, TaskRabbit, the High Line, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, universal basic income, urban planning, Wall-E, Watson beat the top human players on Jeopardy!, WikiLeaks, women in the workforce, Y Combinator, Zimmermann PGP, éminence grise

Indeed, increasingly the government was getting caught poking its nose deeply into people’s lives. In 2013, Edward Snowden revealed that the NSA was collecting everyday Americans’ phone calls, hoovering up chat messages, and tapping into the backbones of services like Google and Yahoo! Phillips was horrified. But it also seemed like an area where he could make an impact. He’d been reading up on cryptographic history and watching videos where Julian Assange and the founders of the Tor project talked about the need for better, easy-to-use tools for everyday people to enable them to remain private online. Now that—that seemed like a meaningful thing to do with one’s life. “I can literally sit here, like they say, in your underwear, and write world-changing software—protect people’s civil liberties, specifically right to privacy,” he tells me. None of his start-up companies had really popped; he’d gone back to doing software consulting.

“Pragmatic judgments often trump ideological ones,” Coleman writes, “leading to situations where, say, an anti-capitalist anarchist might work in partnership with a liberal social democrat without friction or sectarian infighting.” The afternoon of the hackathon, I run into Steve Phillips; he’s arrived with a group of volunteers, coders who’ve all begun helping build the Pursuance system. In the afternoon he climbs onstage in the Archive’s auditorium in a WikiLeaks T-shirt to show off what they’ve built. There’s the beginnings of the full software, where activists can set up to-do lists, set tasks, delegate jobs. As he tells the crowd, there are a ton of forums where people can talk, but few tools to help them get things done, he explains; Pursuance aims to help fix that. “I notice, watching some online activists operate, that there’s way too much manual work done that could be automated,” Phillips says crisply as he shows off the software.

Today’s big cybercrime groups themselves may not be directly run by national governments or their spy agencies, but they often appear to be at least working in communication with them. When the Russian hacking group Fancy Bear penetrated the Democratic National Committee—via the ever-popular trick of phishing, getting John Podesta to click on a bad link—the trove of DNC email soon appeared in Russian intelligence circles, and thence on WikiLeaks and other sites online. Meanwhile, Chinese state-sponsored hackers are busily penetrating US firms and government agencies: The Department of Defense blocks 36 million phishing attempts each day. And in every authoritarian country, government-sponsored hackers busily wage attacks on civil society advocates and pro-freedom groups—installing spyware on dissidents, the better to bust them. Work by Citizen Lab has found extensive spyware espionage conducted against Tibetan activists and humanitarians, to name just one example.

pages: 497 words: 144,283

Connectography: Mapping the Future of Global Civilization by Parag Khanna

"Robert Solow", 1919 Motor Transport Corps convoy, 2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 9 dash line, additive manufacturing, Admiral Zheng, affirmative action, agricultural Revolution, Airbnb, Albert Einstein, amateurs talk tactics, professionals talk logistics, Amazon Mechanical Turk, Asian financial crisis, asset allocation, autonomous vehicles, banking crisis, Basel III, Berlin Wall, bitcoin, Black Swan, blockchain, borderless world, Boycotts of Israel, Branko Milanovic, BRICs, British Empire, business intelligence, call centre, capital controls, charter city, clean water, cloud computing, collateralized debt obligation, commoditize, complexity theory, continuation of politics by other means, corporate governance, corporate social responsibility, credit crunch, crony capitalism, crowdsourcing, cryptocurrency, cuban missile crisis, data is the new oil, David Ricardo: comparative advantage, deglobalization, deindustrialization, dematerialisation, Deng Xiaoping, Detroit bankruptcy, digital map, disruptive innovation, diversification, Doha Development Round, edge city, Edward Snowden, Elon Musk, energy security, Ethereum, ethereum blockchain, European colonialism, eurozone crisis, failed state, Fall of the Berlin Wall, family office, Ferguson, Missouri, financial innovation, financial repression, fixed income, forward guidance, global supply chain, global value chain, global village, Google Earth, Hernando de Soto, high net worth, Hyperloop, ice-free Arctic, if you build it, they will come, illegal immigration, income inequality, income per capita, industrial cluster, industrial robot, informal economy, Infrastructure as a Service, interest rate swap, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Isaac Newton, Jane Jacobs, Jaron Lanier, John von Neumann, Julian Assange, Just-in-time delivery, Kevin Kelly, Khyber Pass, Kibera, Kickstarter, LNG terminal, low cost airline, low cost carrier, low earth orbit, manufacturing employment, mass affluent, mass immigration, megacity, Mercator projection, Metcalfe’s law, microcredit, mittelstand, Monroe Doctrine, mutually assured destruction, New Economic Geography, new economy, New Urbanism, off grid, offshore financial centre, oil rush, oil shale / tar sands, oil shock, openstreetmap, out of africa, Panamax, Parag Khanna, Peace of Westphalia, peak oil, Pearl River Delta, Peter Thiel, Philip Mirowski, plutocrats, Plutocrats, post-oil, post-Panamax, private military company, purchasing power parity, QWERTY keyboard, race to the bottom, Rana Plaza, rent-seeking, reserve currency, Robert Gordon, Robert Shiller, Robert Shiller, Ronald Coase, Scramble for Africa, Second Machine Age, sharing economy, Shenzhen was a fishing village, Silicon Valley, Silicon Valley startup, six sigma, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, South China Sea, South Sea Bubble, sovereign wealth fund, special economic zone, spice trade, Stuxnet, supply-chain management, sustainable-tourism, TaskRabbit, telepresence, the built environment, The inhabitant of London could order by telephone, sipping his morning tea in bed, the various products of the whole earth, Tim Cook: Apple, trade route, transaction costs, UNCLOS, uranium enrichment, urban planning, urban sprawl, WikiLeaks, young professional, zero day

The intersection of demographic and technological flows creates new opportunities for Facebook groups and other cloud communities to emerge more rapidly, globally, and in greater number, generating flash mobs of allegiance that force us to evolve our political concepts beyond states. Social networks provide the tools for people to shape their welfare by motivating members, financing activities, and sparking political action. The WikiLeaks founder, Julian Assange, argues that the Internet enables connected groups to anneal into empowered collectives that can act on their principles. The taxonomy of influential actors is thus expanding to include terrorist networks, hacker units, and religious fundamentalist groups who define themselves by what they do rather than where they are. Global connectivity gradually undermines national roots and augments or replaces them with a range of transnational bonds and identities.

Structural change happens every few decades; systems change only every few centuries. Structural change makes the world complicated; systems change makes it complex. International relations among states are complicated, while today’s global network civilization is complex. Financial feedback loops destabilize markets, and corporations can be more influential than countries, while ISIS, Occupy Wall Street, and WikiLeaks are all quantum in nature: everywhere and nowhere, constantly metastasizing, capable of sudden phase shifts. If planet Earth had a Facebook account, its status should read “It’s Complex.” Connectivity is the main cause of this complexity. Globalization is almost always written about in terms of how it operates within the existing order rather than how it creates a new one. Yet connectivity is the change emerging from within the system that ultimately changes the system itself.

The Outlaw Ocean: Journeys Across the Last Untamed Frontier by Ian Urbina

9 dash line, Airbnb, British Empire, clean water, Costa Concordia, crowdsourcing, Exxon Valdez, failed state, Filipino sailors, forensic accounting, global value chain, illegal immigration, invisible hand, John Markoff, Jones Act, Julian Assange, Malacca Straits, Maui Hawaii, New Journalism, offshore financial centre, pattern recognition, Peter Thiel, Silicon Valley, Skype, South China Sea, standardized shipping container, statistical arbitrage, UNCLOS, UNCLOS, union organizing, Upton Sinclair, WikiLeaks, William Langewiesche

The informational equivalent of a tax haven—and called HavenCo—the company, founded in 2000, offered web hosting for gambling, pyramid schemes, porn, subpoena-proof emails, and untraceable bank accounts. It turned away clients tied to spam, child porn, and corporate cyber sabotage. “We have our limits,” Michael said. (I refrained from asking him the question on my mind, which was why pyramid schemes were okay if spam was not.) He added that in 2010 he had declined a request from representatives of WikiLeaks for a Sealand passport and safe haven for the group’s founder, Julian Assange. “They were releasing more than made me comfortable,” he added. The idea of moving online services offshore was not new. Science-fiction writers had dreamed of data havens for years. Perhaps the most famous was in Neal Stephenson’s Cryptonomicon, published in 1999, in which the sultan of Kinakuta, a fictional, small, oil-rich island between the Philippines and Borneo, invites the novel’s protagonists to convert an island into a communications hub free from copyright law and other restrictions.

These officers debated and ultimately rejected naval plans to bomb the installation. In the 1970s, a German businessman named Alexander Gottfried Achenbach hired a team of Dutch mercenaries to stage a coup at Sealand, resulting in a hostage crisis and a tense diplomatic row between Germany and England. In the early 1980s, during the Falklands War, a group of Argentinians tried to buy the platform for a training camp. More recently, WikiLeaks explored moving its servers there, and Sealand appeared in the Panama Papers as a haven for organized crime. A cartoon that ran on October 23, 1968, in the London-based newspaper The Sun offers some context on Sealand’s status as a nascent postcolonial breakaway nation with a reference to Rhodesia, which had declared independence from Britain in an attempt to preserve white minority rule.

The British government learned: Another similar incident happened in 1990 when Sealanders opened fire on a British military ship that allegedly came too near the principality. See James Cusick, “Shots Fired in Sealand’s Defence of a Small Freedom,” Independent, Feb. 24, 1990. The British government soon brought firearms: Grimmelmann, “Sealand, HavenCo, and the Rule of Law.” Recently declassified U.K. documents: Dan Bell, “Darkest Hour for ‘Smallest State,’ ” BBC, Dec. 30, 2008. More recently, WikiLeaks explored: Katrin Langhans, “Newer Sealand,” Süddeutsche Zeitung and the Panama Papers, April 25, 2016. They were often called seasteads: My full bibliography on seasteading is as follows: Jerome Fitzgerald, Sea-Steading: A Life of Hope and Freedom on the Last Viable Frontier (New York: iUniverse, 2006); “Homesteading the Ocean,” Spectrum, May 1, 2008; Oliver Burkeman, “Fantasy Islands,” Guardian, July 18, 2008; Patri Friedman and Wayne Gramlich, “Seasteading: A Practical Guide to Homesteading the High Seas,” Gramlich.net, 2009; Declan McCullagh, “The Next Frontier: ‘Seasteading’ the Oceans,” CNET News, Feb. 2, 2009; Alex Pell, “Welcome Aboard a Brand New Country,” Sunday Times, March 15, 2009; Brian Doherty, “20,000 Nations Above the Sea,” Reason, July 2009; Eamonn Fingleton, “The Great Escape,” Prospect, March 25, 2010; Brad Taylor, “Governing Seasteads: An Outline of the Options,” Seasteading Institute, Nov. 9, 2010; “Cities on the Ocean,” Economist, Dec. 3, 2011; Jessica Bruder, “A Start-Up Incubator That Floats,” New York Times, Dec. 14, 2011; Michael Posner, “Floating City Conceived as High-Tech Incubator,” Globe and Mail, Feb. 24, 2012; Josh Harkinson, “My Sunset Cruise with the Clever, Nutty, Techno-libertarian Seasteading Gurus,” Mother Jones, June 7, 2012; Stephen McGinty, “The Real Nowhere Men,” Scotsman, Sept. 8, 2012; Michelle Price, “Is the Sea the Next Frontier for High-Frequency Trading?

The Code: Silicon Valley and the Remaking of America by Margaret O'Mara

"side hustle", A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, affirmative action, Airbnb, AltaVista, Amazon Web Services, Apple II, Apple's 1984 Super Bowl advert, autonomous vehicles, back-to-the-land, barriers to entry, Ben Horowitz, Berlin Wall, Bob Noyce, Buckminster Fuller, Burning Man, business climate, Byte Shop, California gold rush, carried interest, clean water, cleantech, cloud computing, cognitive dissonance, commoditize, computer age, continuous integration, cuban missile crisis, Danny Hillis, DARPA: Urban Challenge, deindustrialization, different worldview, don't be evil, Donald Trump, Doomsday Clock, Douglas Engelbart, Dynabook, Edward Snowden, El Camino Real, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Frank Gehry, George Gilder, gig economy, Googley, Hacker Ethic, high net worth, Hush-A-Phone, immigration reform, income inequality, informal economy, information retrieval, invention of movable type, invisible hand, Isaac Newton, Jeff Bezos, Joan Didion, job automation, job-hopping, John Markoff, Julian Assange, Kitchen Debate, knowledge economy, knowledge worker, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, mass immigration, means of production, mega-rich, Menlo Park, Mikhail Gorbachev, millennium bug, Mitch Kapor, Mother of all demos, move fast and break things, move fast and break things, mutually assured destruction, new economy, Norbert Wiener, old-boy network, pattern recognition, Paul Graham, Paul Terrell, paypal mafia, Peter Thiel, pets.com, pirate software, popular electronics, pre–internet, Ralph Nader, RAND corporation, Richard Florida, ride hailing / ride sharing, risk tolerance, Robert Metcalfe, Ronald Reagan, Sand Hill Road, Second Machine Age, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social graph, software is eating the world, speech recognition, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, supercomputer in your pocket, technoutopianism, Ted Nelson, the market place, the new new thing, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas L Friedman, Tim Cook: Apple, transcontinental railway, Uber and Lyft, uber lyft, Unsafe at Any Speed, upwardly mobile, Vannevar Bush, War on Poverty, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, Y Combinator, Y2K

Laura Smith, “In the early 1980s, white supremacist groups were early adopters (and masters) of the internet,” Medium, October 11, 2017, https://timeline.com/white-supremacist-early-internet-5e91676eb847, archived at https://perma.cc/8UKG-UB8H; Kathleen Belew, Bring the War Home: The White Power Movement and Paramilitary America (Cambridge, Mass.: Harvard University Press, 2018). One early and leading participant in the Cypherpunk movement was Wikileaks founder Julian Assange, who made it the subject of a book-length treatise, Cypherpunks: Freedom and the Future of the Internet (New York: OR Books, 2016). 26. Peter H. Lewis, “Despite a New Plan for Cooling it Off, Cybersex Stays Hot,” The New York Times, March 26, 1995, 1. 27. President’s Blue Ribbon Commission on Defense Management, A Quest for Excellence: Final Report to the President (Washington, D.C.: USGPO, June 1986); William J.

pages: 767 words: 208,933

Liberalism at Large: The World According to the Economist by Alex Zevin

activist fund / activist shareholder / activist investor, affirmative action, anti-communist, Asian financial crisis, bank run, Berlin Wall, Big bang: deregulation of the City of London, Bretton Woods, British Empire, business climate, business cycle, capital controls, centre right, Chelsea Manning, collective bargaining, Columbine, Corn Laws, corporate governance, corporate social responsibility, creative destruction, credit crunch, David Ricardo: comparative advantage, debt deflation, desegregation, disruptive innovation, Donald Trump, Edward Snowden, failed state, Fall of the Berlin Wall, financial deregulation, financial innovation, Francis Fukuyama: the end of history, full employment, Gini coefficient, global supply chain, hiring and firing, imperial preference, income inequality, interest rate derivative, invisible hand, John von Neumann, Joseph Schumpeter, Julian Assange, Khartoum Gordon, land reform, liberal capitalism, liberal world order, light touch regulation, Long Term Capital Management, market bubble, Martin Wolf, means of production, Mikhail Gorbachev, Monroe Doctrine, Mont Pelerin Society, moral hazard, Naomi Klein, new economy, New Journalism, Norman Macrae, Northern Rock, Occupy movement, Philip Mirowski, plutocrats, Plutocrats, price stability, quantitative easing, race to the bottom, railway mania, rent control, rent-seeking, road to serfdom, Ronald Reagan, Rosa Parks, Snapchat, Socratic dialogue, The Wealth of Nations by Adam Smith, Thomas Malthus, too big to fail, trade liberalization, trade route, unbanked and underbanked, underbanked, unorthodox policies, upwardly mobile, War on Poverty, WikiLeaks, Winter of Discontent, Yom Kippur War, young professional

Obama’s unprecedented use of drones to assassinate suspected terrorists on his ‘kill lists’ – in Yemen, Somalia or Pakistan, where America was not at war, and without judicial oversight even when the targets were its own citizens – ‘do not undermine the rules of war’, though more could be done to ‘adapt’ a ‘potent new weapon’ to the constitution.123 When the US Army private then named Bradley Manning leaked hundreds of thousands of secret government documents related partly to the wars in Iraq and Afghanistan in 2010, exposing war crimes committed by US mercenaries, the Economist insisted that both he and the ‘digital Jacobins’ at Wikileaks to whom Manning confided this cache be punished. Julian Assange should be extradited, though in the meantime the paper found ‘some consolation’ that his revelations actually offered ‘a largely flattering picture of America’s diplomats: conscientious, cool-headed, well-informed, and on occasion eloquent’.124 Three years later Edward Snowden, a private analyst for the National Security Agency, exposed the staggering extent of its illegal surveillance of US citizens and foreigners, including such staunch allies of the US as German chancellor Angela Merkel.

Reaganland: America's Right Turn 1976-1980 by Rick Perlstein

"Robert Solow", 8-hour work day, affirmative action, airline deregulation, Alistair Cooke, American Legislative Exchange Council, anti-communist, Ayatollah Khomeini, Berlin Wall, Bernie Sanders, Brewster Kahle, business climate, clean water, collective bargaining, colonial rule, COVID-19, Covid-19, creative destruction, crowdsourcing, cuban missile crisis, currency peg, death of newspapers, defense in depth, Deng Xiaoping, desegregation, Donald Trump, energy security, equal pay for equal work, facts on the ground, feminist movement, financial deregulation, full employment, global village, Golden Gate Park, illegal immigration, In Cold Blood by Truman Capote, index card, indoor plumbing, Internet Archive, invisible hand, Julian Assange, Kitchen Debate, kremlinology, land reform, Marshall McLuhan, mass immigration, MITM: man-in-the-middle, Monroe Doctrine, moral panic, mutually assured destruction, New Journalism, oil shock, open borders, Potemkin village, price stability, Ralph Nader, RAND corporation, rent control, road to serfdom, Robert Bork, rolodex, Ronald Reagan, Rosa Parks, Saturday Night Live, Silicon Valley, traveling salesman, unemployed young men, union organizing, unpaid internship, Unsafe at Any Speed, Upton Sinclair, upwardly mobile, urban decay, urban planning, urban renewal, wages for housework, walking around money, War on Poverty, white flight, WikiLeaks, Winter of Discontent, yellow journalism, Yom Kippur War, zero-sum game

Elections Atlas provides indispensable statistics; the diehard Saturday Night Live fans behind SNLtranscripts.jt.org; and Hawes Publications, which has uploaded every week’s New York Times bestseller list for easy reference. Brewster Kahle is an American hero for providing a platform for crowdsourced historian preservation through his nonprofit Internet Archive, where, for example, one kind soul uploaded transcripts of all the ABC News broadcasts from 1979 to 1980. Julian Assange remains a controversial figure, but the State Department documents uploaded to Wikileaks.org documenting the fall of the Shah of Iran were indispensable to me. I also cherish Gerhard Peters and John Woolly for building the Presidency Project (Presidency.UCSB.Edu), where just about every public utterance by Jimmy Carter quoted here can be found. Amy Salit of WGYY graciously rescued an ancient Terry Gross interview from the Fresh Air archives for me.

“Thinking the Unthinkable” “Vance Deflects a Call for Toughness,” WP, October 28, 1980. “no identifiable leader” “For Iran, No Clear Alternative to the Shah,” NYT, November 6, 1978. The failure to grasp the emergence of revolutionary Islamism is a theme I take from Caryl’s Strange Rebels: 1979 and the Birth of the 21st Century. On November 22 “Secretary Blumenthal’s Meeting with Shah of Iran,” November 22, 1978, Wikileaks Canonical ID 1978KUWAIT06258_d and 1978STATE295264_d, Wikileaks.org. “on a vacation” Translations of the Shah’s statement differ. See AP, January 17, 1979. hushed awe Washington Post Service, January 17, 1979; “Teary-Eyed Shah Flies Out of Iran and Millions Take to Streets in Joy,” CT, January 17, 1979. “God is Great” Toronto Globe and Mail, January 17, 1979. “a Gandhi-like role” “Shah Said to Plan to Leave Iran Today for Egypt and U.S.,” NYT, January 16, 1979.