Chelsea Manning

33 results back to index

pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous by Gabriella Coleman


1960s counterculture, 4chan, Amazon Web Services, Bay Area Rapid Transit, bitcoin, Chelsea Manning, citizen journalism, cloud computing, collective bargaining, corporate governance, creative destruction, crowdsourcing, David Graeber, Debian, East Village, Edward Snowden, feminist movement, George Santayana, hive mind, impulse control, Jacob Appelbaum, jimmy wales, Julian Assange, mandatory minimum, Mohammed Bouazizi, Network effects, Occupy movement, pirate software, Richard Stallman, SETI@home, side project, Silicon Valley, Skype, Steven Levy, WikiLeaks, zero day

More than anything, though, it was the pilots’ banal tone of voice during their discussions with command about whether to attack—they were calm to the point of psychosis—that really sent waves of horror over you. One member of the crew laughs upon discovering that one of the many victims is a young girl. “Well, it’s their fault for bringing their kids to a battle,” he remarks nonchalantly. As we all now know, Bradley Manning (who has since changed names—and genders—to become Chelsea Manning) made the choice to leak the video, along with other vital documents, and a hacker named Adrian Lamo ratted him out. On May 22, 2010, Manning confessed to Lamo during a chat conversation that he’d gifted WikiLeaks the footage that was used to create “Collateral Murder.” Early in the conversation, Lamo earned Manning’s trust by misrepresenting himself: I’m a journalist and a minister.

Christian Christensen, “Collateral Murder and the After-Life of Activist Imagery,”, April 14, 2014. 3. Evan Hansen, “Manning-Lamo Chat Logs Revealed,”, July 13, 2011. 4. Lamo has claimed that, since he has published some articles, he is a journalist. He has also said that he is a minister for the Universal Life Church. See Luis Martinez, “Bradley Manning Accuser Adrian Lamo Takes the Stand,” Dec. 20, 2011, 5. Ed Pilkington, “Bradley Manning’s treatment was cruel and inhuman, UN torture chief rules,”, March 12, 2012. 6. Raffi Khatchadourian, “No Secrets,”, June 7, 2010. 7. Actually, the connection can be drawn further, as the young Julian Assange had his own foray into fighting Scientology as well. Back in Australia, he ran a free speech Internet service provider, Suburbia, which hosted anti-Scientology material.

Any organization involved in censorship will be targeted and will not be released until the Tunisian government hears the claim for freedom to its people. It’s on the hands of the Tunisian government to stop this situation. Free the net, and attacks will cease, keep on that attitude and this will just be the beginning. The Tiger Consumes Four Chickens a Day But let’s back up to the onset of revolution itself. Mohammed Bouazizi, WikiLeaks and Nawaat, and Chelsea Manning all deserve thanks for its inception. In 2010, living under the Ben Ali regime since 1989, scores of Tunisians were downtrodden, living in deplorable conditions, and fearful as human rights abuses—torture, censorship, and detentions—intensified in the country. The country had not been party to any large-scale protests for decades, and its many Western allies, including the United States, singled Tunisia out as a model of political and economic stability in an Arab region otherwise known for strife and instability.

pages: 708 words: 176,708

The WikiLeaks Files: The World According to US Empire by Wikileaks


affirmative action, anti-communist, banking crisis, battle of ideas, Boycotts of Israel, Bretton Woods, British Empire, capital controls, central bank independence, Chelsea Manning, colonial exploitation, colonial rule, corporate social responsibility, credit crunch, cuban missile crisis, Deng Xiaoping, drone strike, Edward Snowden, energy security, energy transition, European colonialism, eurozone crisis, experimental subject, F. W. de Klerk, facts on the ground, failed state, financial innovation, Food sovereignty, Francis Fukuyama: the end of history, full employment, future of journalism, high net worth, invisible hand, Julian Assange, liberal world order, Mikhail Gorbachev, millennium bug, Mohammed Bouazizi, Monroe Doctrine, Naomi Klein, Northern Rock, Philip Mirowski, RAND corporation, Ronald Reagan, Silicon Valley, South China Sea, statistical model, structural adjustment programs, too big to fail, trade liberalization, trade route, UNCLOS, UNCLOS, uranium enrichment, Washington Consensus, WikiLeaks, zero-sum game, éminence grise

See Tom McCarthy, “Bradley Manning Tells Lawyer After Sentencing: ‘I’m Going to Be OK’—as it happened,” Guardian, August 21, 2013. At the time of publication, she is appealing her case to the United States Army Court of Criminal Appeals, and a hearing is expected in mid 2015. See “Chelsea Manning’s 35-Year Prison Sentence Upheld by US Army General,” Guardian, April 14, 2014. 11Josh Gerstein, “Blocking WikiLeaks Emails Trips Up Bradley Manning Prosecution,” Politico, March 15, 2012, at 12Simon DeDeo, Robert X. D. Hawkins, Sara Klingenstein, and Tim Hitchcock, “Bootstrap Methods for the Empirical Study of Decision-Making and Information Flows in Social Systems,” Cornell University Library website, February 5, 2013, at “Scholars in other disciplines have been more willing to make use of leaked information. In fields as varied as informatics, applied mathematics, geography, and economics, researchers have enthusiastically turned to the leaked information of the Afghan War Diary and the Iraq War Logs as invaluable data sources for modeling and predicting conflict (O’Loughlin et al., 2010; Linke et al., 2012; Zammit-Mangion et al., 2012; Cseke et al., 2013; Rusch et al., 2013; Zammit-Mangion et al., 2013).

Kevin Gosztola, “US National Archives Has Blocked Searches for ‘WikiLeaks,’” The Dissenter, November 3, 2012, at 10Chelsea (formerly Bradley) Manning was detained without trial for 1,103 days, an infringement of her right to speedy justice. The United Nations special rapporteur for torture, Juan Méndez, formally found that Manning had been treated in a manner that was cruel and inhuman, and that possibly amounted to torture. See Ed Pilkington, “Bradley Manning’s Treatment Was Cruel and Inhuman, UN Torture Chief Rules,” Guardian, March 12, 2012. The government charged Manning—accused of being a journalistic source for WikiLeaks—with thirty-four individual counts of violations of the Uniform Code of Military Justice, including parts of the Espionage Act, the combined maximum sentence for which was over one hundred years in prison. See Kim Zetter, “Bradley Manning Charged with 22 New Counts, Including Capital Offense,” Wired, February 3, 2011, at

Manning was prohibited by the court from making defense arguments as to public interest, motive, or the lack of actual harm resulting from her alleged actions (see Ed Pilkington, “Bradley Manning Denied Chance to Make Whistleblower Defence,” Guardian, January 17, 2013), and she offered a limited guilty plea (see Alexa O’Brien, “Pfc. Manning’s Statement for the Providence Inquiry,”, February 28, 2013). This plea was refused by the government, which sought to convict Manning on the full charge sheet. The case went to trial in June 2013 under conditions of unprecedented secrecy, against which WikiLeaks and the Center for Constitutional Rights litigated. In August 2013 Manning was found guilty on seventeen counts and sentenced to thirty-five years in prison. See Tom McCarthy, “Bradley Manning Tells Lawyer After Sentencing: ‘I’m Going to Be OK’—as it happened,” Guardian, August 21, 2013.

pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man by Luke Harding


affirmative action, airport security, Anton Chekhov, Apple's 1984 Super Bowl advert, Berlin Wall, Chelsea Manning, don't be evil, drone strike, Edward Snowden, Etonian, Firefox, Google Earth, Jacob Appelbaum, job-hopping, Julian Assange, Khan Academy, kremlinology, Mark Zuckerberg, Maui Hawaii, national security letter, pre–internet, Ralph Waldo Emerson, rolodex, Rubik’s Cube, Silicon Valley, Skype, social graph, Steve Jobs, web application, WikiLeaks

They were strongly encrypted with multiple passwords. No one person knew all the passwords to access a file. The US freelance journalists approached by Snowden now had in their possession a large treasure trove of classified material. The WikiLeaks disclosures, published by the Guardian in London in 2010, were of US diplomatic cables and war-logs from Afghanistan and Iraq leaked by the US private Chelsea Manning. A few – just 6 per cent – were classified at the relatively modest level of ‘secret’. The Snowden files were in a different league. They were ‘top secret’ and above. There had once been a melodramatic defection of Cambridge-educated spies to Soviet Moscow – Burgess, Maclean and Philby. But there had never been a mass documentary leak at this vertiginous altitude before. Snowden generally wore just a casual T-shirt in his room, but on Thursday 6 June, Greenwald organised a switch.

He had witnessed the ‘terrible consequences for people under suspicion’. He said he didn’t want to put his colleagues through such an ordeal. Second, he was aware of the NSA’s ferocious technical capacities; it was only a matter of time before they tracked him down. His plan all along had been that after the first few stories, he would make himself known. This didn’t mean, however, that Snowden wished to emulate Chelsea Manning, whose arrest in 2010 and harsh jail treatment he had followed closely. Snowden said: ‘Manning was a classic whistleblower. He was inspired by the public good.’ As a result, Manning was due to face a court martial in Fort Meade, next door to the NSA’s headquarters – one that was shortly to sentence the young soldier to 35 years in prison. Snowden intimated that Manning had proved the point that it was impossible for a whistleblower to get a fair trial in the US.

But it is known his approaches came via intermediaries and through his Hong Kong lawyers. These pre-dated Snowden’s video confession, and they grew more intense after it. From Assange’s perspective the approach was logical. Snowden was another anti-US whistleblower in trouble, apparently just like him. In 2010, Assange had leaked the thousands of classified documents obtained from the US private Chelsea Manning. Their publication, in collaboration with the Guardian and other newspapers, had caused a global furore. Manning was jailed and a grand jury reportedly investigated Assange over the leaks. Assange’s woes with Swedish women were a separate matter, though the former hacker would frequently – and some would say cynically – confuse the two. But Assange did have some claim to specialised expertise in asylum issues.

Because We Say So by Noam Chomsky


Affordable Care Act / Obamacare, American Legislative Exchange Council, Chelsea Manning, cuban missile crisis, David Brooks, drone strike, Edward Snowden, Intergovernmental Panel on Climate Change (IPCC), Julian Assange, Malacca Straits, Martin Wolf, means of production, Monroe Doctrine, Occupy movement, oil shale / tar sands, Powell Memorandum, Ralph Waldo Emerson, RAND corporation, Slavoj Žižek, Stanislav Petrov, Thorstein Veblen, too big to fail, uranium enrichment, WikiLeaks

Snowden said that his “breaking point” was “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” by denying the existence of a domestic spying program conducted by the National Security Agency. Snowden elaborated that “the public had a right to know about these programs. The public had a right to know that which the government is doing in its name, and that which the government is doing against the public.” The same could be justly said by Daniel Ellsberg, Chelsea Manning and other courageous figures who acted on the same democratic principle. The government stance is quite different: The public doesn’t have the right to know because security thus is undermined—severely so, as officials assert. There are several good reasons to be skeptical about such a response. The first is that it’s almost completely predictable: When a government’s act is exposed, the government reflexively pleads security.

Beyond that the story is murky. Washington has made clear that any country that refuses to extradite Snowden will face harsh punishment. The United States will “chase him to the ends of the earth,” Senator Lindsey Graham warned. But U.S. government spokespersons assured the world that Snowden will be granted the full protection of American law—referring to those same laws that have kept U.S. Army soldier Bradley Manning (who released a vast archive of U.S. military and diplomatic documents to WikiLeaks) in prison for three years, much of it in solitary confinement under humiliating conditions. Long gone is the archaic notion of a speedy trial before a jury of peers. On July 30 a military judge found Manning guilty of charges that could lead to a maximum sentence of 136 years. Like Snowden, Manning committed the crime of revealing to Americans—and others—what their government is doing.

pages: 461 words: 125,845

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers by Andy Greenberg


Apple II, Ayatollah Khomeini, Berlin Wall, Bill Gates: Altair 8800, Burning Man, Chelsea Manning, computerized markets, crowdsourcing, cryptocurrency, domain-specific language, drone strike,, fault tolerance, hive mind, Jacob Appelbaum, Julian Assange, Mahatma Gandhi, Mohammed Bouazizi, nuclear winter, offshore financial centre, pattern recognition, profit motive, Ralph Nader, Richard Stallman, Robert Hanssen: Double agent, Silicon Valley, Silicon Valley ideology, Skype, social graph, statistical model, stem cell, Steve Jobs, Steve Wozniak, Steven Levy, Vernor Vinge, We are Anonymous. We are Legion, We are the 99%, WikiLeaks, X Prize, Zimmermann PGP

leave them largely isolated Interview with Brian Manning. PBS Frontline, published on, March 29, 2010. vodka in her morning tea Ellen Nakashima. “Bradley Manning is at the center of the WikiLeaks controversy. But who is he?” Washington Post Magazine, May 4, 2011. basics of Web servers and Internet routing Hansen. “quirky as hell” David Leigh and Luke Harding. WikiLeaks: Inside Julian Assange’s War on Secrecy (New York: Public Affairs), p. 25. “I have been telling him he needs to get a job and he won’t get a job!” PBS Frontline, “Frontline Exclusive: The Bradley Manning 911 Call.” Available at hiding in the bedroom from Davis’s father until he could find a bare-bones apartment in town Denver Nicks. “Manning in the Making.”

protesting Manning’s inhumane confinement in a Quantico, Virginia, military prison Video available on YouTube: Outside the base there, he staged another sit-in and was arrested again Ibid. “I was Bradley Manning” Ashley Fantz. “Pentagon Papers leaker: ‘I was Bradley Manning.’”, March 19, 2011. The president turns away, and the conversation is over Video available on YouTube: Upd4id0 The materials that Ellsberg leaked were actually of a higher top-secret classification Glenn Greenwald. “The intellectual cowardice of Bradley Manning’s critics.”, December 24, 2011. “I can’t tell you how much that affected me.” Fantz. CHAPTER 2: THE CRYPTOGRAPHERS one unit of data switching from a one to a zero or vice versa seemingly of its own accord Daniel S.

He told a reporter that he had been kicked out of his home and lost a job because of his sexual orientation. He said that the military’s don’t-ask-don’t-tell policy was forcing him to live “a double life.” His Facebook statuses referred to a Boston boyfriend, Tyler Watkins, whom he had met while on leave there prior to shipping out to Iraq. “Bradley Manning is glad he is working and active again, yet heartbroken being so far away from hubby,” read one status update. And another: “Bradley Manning is in the barracks, alone. I miss you, Tyler!” Manning would write later of his decision to “transition” to becoming a female named Breanna Manning. On one of his leaves, he spent days dressed as a female in public, and had begun planning for electrolysis and other sex change procedures after his discharge. But the moment that Manning would cite as setting him on the path to become his era’s most prolific leaker didn’t come during his social struggle in the army’s ranks.

pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks by The "Guardian", David Leigh, Luke Harding


4chan, banking crisis, centre right, Chelsea Manning, citizen journalism, Climategate, cloud computing, credit crunch, crowdsourcing, Downton Abbey, drone strike, eurozone crisis, friendly fire, global village, Hacker Ethic, impulse control, Jacob Appelbaum, Julian Assange, knowledge economy, Mohammed Bouazizi, offshore financial centre, rolodex, Silicon Valley, Skype, Steven Levy, uranium enrichment, WikiLeaks

First published in Great Britain in 2011 by Guardian Books Kings Place 90 York Way London N1 9GU A CIP catalogue for this book is available from the British Library ISBN: 978-0-85265-239-8 CONTENTS Cast of characters Introduction Chapter 1: The Hunt Chapter 2: Bradley Manning Chapter 3: Julian Assange Chapter 4: The rise of WikiLeaks Chapter 5: The Apache video Chapter 6: The Lamo dialogues Chapter 7: The deal Chapter 8: In the bunker Chapter 9: The Afghanistan war logs Chapter 10: The Iraq war logs Chapter 11: The cables Chapter 12: The world’s most famous man Chapter 13: Uneasy partners Chapter 14: Before the deluge Chapter 15: Publication day Chapter 16: The biggest leak in history Chapter 17: The ballad of Wandsworth jail Chapter 18: The future of WikiLeaks Appendix: US Embassy Cables Acknowledgements CAST OF CHARACTERS WikiLeaks MELBOURNE, NAIROBI, REYKJAVIK, BERLIN, LONDON, NORFOLK, STOCKHOLM Julian Assange – WikiLeaks founder/editor Sarah Harrison – aide to WikiLeaks founder Julian Assange Kristinn Hrafnsson – Icelandic journalist and WikiLeaks supporter James Ball – WikiLeaks data expert Vaughan Smith – former Grenadier Guards captain, founder of the Frontline Club and Assange’s host at Ellingham Hall Jacob Appelbaum – WikiLeaks’ representative in the US Daniel Ellsberg – Vietnam war whistleblower, WikiLeaks supporter Daniel Domscheit-Berg – German programmer and WikiLeaks technical architect (aka Daniel Schmitt) Mikael Viborg – owner of WikiLeaks’ Swedish internet service provider PRQ Ben Laurie – British encryption expert, adviser to Assange on encryption Mwalimu Mati – head of anti-corruption group Mars Group Kenya, source of first major WikiLeaks report Rudolf Elmer – former head of the Cayman Islands branch of the Julius Baer bank, source of second major WikiLeaks report Smári McCarthy – Iceland-based WikiLeaks enthusiast, programmer, Modern Media Initiative (MMI) campaigner Birgitta Jónsdóttir – Icelandic MP and WikiLeaks supporter Rop Gonggrijp – Dutch hacker-businessman, friend of Assange and MMI campaigner Herbert Snorrason – Icelandic MMI campaigner Israel Shamir – WikiLeaks associate Donald Böstrom – Swedish journalist and WikiLeaks’ Stockholm connection The Guardian LONDON Alan Rusbridger – editor-in-chief Nick Davies – investigative reporter David Leigh – investigations editor Ian Katz – deputy editor (news) Ian Traynor – Europe correspondent Harold Frayman – systems editor Declan Walsh – Pakistan/Afghanistan correspondent Alastair Dant – data visualiser Simon Rogers – data editor Jonathan Steele – former Iraq correspondent James Meek – former Iraq correspondent Rob Evans – investigative journalist Luke Harding – Moscow correspondent Robert Booth – reporter Stuart Millar – news editor, Janine Gibson – editor, Jonathan Casson – head of production Gill Phillips – in-house head of legal Jan Thompson – managing editor New York Times NEW YORK, LONDON Max Frankel – former executive editor Bill Keller – editor Eric Schmitt – war correspondent John F Burns – London correspondent Ian Fisher – deputy foreign editor Der Spiegel HAMBURG, LONDON Georg Mascolo – editor-in-chief Holger Stark – head of German desk Marcel Rosenbach – journalist John Goetz – journalist El País MADRID, LONDON Javier Moreno – editor-in-chief Vicente Jiménez – deputy editor Other Media Raffi Khatchadourian – New Yorker staffer and author of a major profile of Assange Saeed Chmagh and Namir Noor-Eldeen – Reuters news agency employees accidentally killed by US army pilots in 2007 David Schlesinger – Reuters’ editor-in-chief Kevin Poulsen – former hacker, senior editor at Wired Gavin MacFadyen – City University professor and journalist, London host to Assange Stephen Grey – freelance reporter Iain Overton – former TV journalist, head of Bureau of Investigative Journalism Heather Brooke – London-based American journalist and freedom of information activist Bradley Manning Bradley Manning – 23-year-old US army private and alleged WikiLeaks source Rick McCombs – former principal at Crescent high school, Crescent, Oklahoma Brian, Susan, Casey Manning – parents and sister Tom Dyer – school friend Kord Campbell – former manager at Zoto software company Jeff Paterson – steering committee member of the Bradley Manning support network Adrian Lamo – hacker and online confidant Timothy Webster – former US army counter-intelligence special agent Tyler Watkins – former boyfriend David House – former hacker and supporter David Coombs – lawyer Julian Assange Christine Hawkins – mother John Shipton – father Brett Assange – stepfather Keith Hamilton – former partner of Christine Daniel Assange – Julian’s son Paul Galbally – Assange’s lawyer during his 1996 hacking trial Stockholm allegations / extradition “Sonja Braun” – plaintiff; member of Brotherhood movement “Katrin Weiss” – plaintiff; museum worker Claes Borgström – lawyer for both women, former Swedish equal opportunities ombudsman and prominent Social Democrat politician Marianne Ny – Swedish chief prosecutor and sex crimes specialist Mark Stephens – Assange lawyer Geoffrey Robertson, QC – Assange lawyer Jennifer Robinson – lawyer in Mark Stephens’ office Gemma Lindfield – lawyer acting for the Swedish authorities Howard Riddle – district judge, Westminster magistrates court Mr Justice Ouseley – high court judge, London Government Hillary Clinton – US Secretary of State Louis B Susman – US ambassador in London PJ Crowley – US assistant secretary of state for public affairs Harold Koh – US state department’s legal adviser Robert Gates – US defence secretary Sir Sherard Cowper-Coles – former UK government special representative to Afghanistan and former ambassador to Kabul INTRODUCTION Alan Rusbridger Back in the days when almost no one had heard about WikiLeaks, regular emails started arriving in my inbox from someone called Julian Assange.

Was he, too, the hunted animal, with prosecutors and US intelligence agents the red-coated huntsmen, riding to the sound of a blowing bugle, surging closer and closer? CHAPTER 2 Bradley Manning Contingency Operating Station Hammer, 40 miles east of Baghdad, Iraq November 2009 “I should have left my phone at home” LADY GAGA After the punishing heat of summer, Iraq in November is pleasantly warm. But for the men and women stationed at Camp Hammer, in the middle of the Mada’in Qada desert, the air was forever thick with dust and dirt kicked up by convoys of lorries that supplied the capital – a constant reminder that they were very far from home. One of those was Specialist Bradley Manning, who’d been sent to Iraq with the 2nd Brigade Combat Team, 10th Mountain Division a few weeks earlier. About to turn 22, he was the antithesis of the battle-hardened US soldier beloved of Hollywood.

Four months in, concerned that Manning’s personal issues were affecting his work, Campbell fired him. After discovering that Bradley was homosexual, Brian Manning threw his son out of the house. Homeless, jobless, Bradley rambled around for a few months, moving from place to place, odd job to odd job. As Jeff Paterson, a member of the steering committee of the Bradley Manning support network, puts it: “He needed a way of proving himself, to go out on his own, to establish himself.” After a few months of aimlessness the solution came to him: Bradley Manning would follow in his father’s footsteps and volunteer for the US military. He enlisted in October 2007, and was put through specialist training for military intelligence work at Fort Huachuca in Arizona. Upon graduation in August 2008 he was posted to Fort Drum in upstate New York, awaiting dispatch to Iraq, armed with the security clearance that would give him access to those two top-secret databases.

pages: 212 words: 49,544

WikiLeaks and the Age of Transparency by Micah L. Sifry


1960s counterculture, Amazon Web Services, banking crisis, barriers to entry, Bernie Sanders, Buckminster Fuller, Chelsea Manning, citizen journalism, Climategate, crowdsourcing, Google Earth, Howard Rheingold, Internet Archive, Jacob Appelbaum, John Markoff, Julian Assange, Network effects, RAND corporation, school vouchers, Skype, social web, source of truth, Stewart Brand, web application, WikiLeaks

A non-profit media organization dedicated to bringing important news and information to the public that provides an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. A list of mirror sites can be found at –– WikiLeaks Central ( A hub for news, analysis and action run by volunteers supportive of WikiLeaks that covers censorship and freedom of information topics in all forms. –– The Bradley Manning Support Network ( An ad hoc, international grassroots effort to help accused whistle blower Pfc. Bradley Manning. See also the blog FireDogLake’s ongoing coverage ( 211 WIKILEAKS AND THE AGE OF TRANSPARENCY

“Remember, almost no one gets caught. We’re talking about five prosecutions in a country of three hundred million. Almost everyone who leaks material is successful. . . . It’s much safer than walking across the street.” And yet, Assange would not travel to America. It is 31 WIKILEAKS AND THE AGE OF TRANSPARENCY probably not a coincidence that right around this time, at the end of May, Private Bradley Manning was arrested at his U.S. Army base east of Baghdad, on suspicion of having given classified military documents and videos, along with hundreds of thousands of secret State Department cables, to WikiLeaks. According to, which broke the news, the authorities learned of Manning’s alleged activities from a former computer hacker named Adrian Lamo, who Manning spoke to online. Lamo gave Wired a copy of their chat transcripts, in which Manning described leaking the Apache video, as well as a classified Army counterintelligence study evaluating WikiLeaks as a security threat, which the site had posted in March 2010.13 He also said he had leaked 260,000 diplomatic cables that he claimed exposed “almost criminal political back dealings.”

In the days after the State Department cables starting leaking, not only did Senator Joe Lieberman intimidate major Internet companies into kicking WikiLeaks off their services without any serious review, the government told its own employees that they shouldn’t look at references to WikiLeaks from government computers or their home computers, and even public resources like the Library of Congress started filtering searches on its computers and Wi-Fi to prevent people from reading news articles about the cables.7 The Office of Management and Budget circulated a fourteen-page memo to all government agencies requiring them to tighten their security procedures, which included suggestions that they employ psychiatrists and sociologists to measure employee “despondence and grumpiness as a means to gauge waning trustworthiness,” “capture evidence of pre-employment and/ or post-employment activities or participation in on-line media data mining sites like WikiLeaks or Open Leaks,” and require all employees to report their contacts with the media.8 It was quite an about-face from the OMB’s Open Government Directive of a year earlier, which called on agencies to “create an unprecedented and sustained level of openness and accountability.”9 And the Justice Department began pursuing a criminal investigation against WikiLeaks, demanding that Twitter turn 139 WIKILEAKS AND THE AGE OF TRANSPARENCY over the subscriber account information—including personal addresses, connections made to and from the account, IP addresses used, means of payment (though Twitter is free)— for Julian Assange, Bradley Manning, and three other people who had been involved with the group around the time that the Collateral Murder video came out: Icelandic MP Birgitta Jonsdottir, Dutch hacker Rop Gonggrijp, and American anticensorship hacker Jacob Appelbaum. This is an extremely worrisome development. For there is nothing that WikiLeaks has done that is different from any other newspaper or media outlet that has received leaked government documents, verified their authenticity, and then published their contents and analysis.

pages: 422 words: 104,457

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance by Julia Angwin


AltaVista, Ayatollah Khomeini, barriers to entry, bitcoin, Chelsea Manning, Chuck Templeton: OpenTable, clean water, crowdsourcing, cuban missile crisis, data is the new oil, David Graeber, Debian, Edward Snowden, Filter Bubble, Firefox, GnuPG, Google Chrome, Google Glasses, informal economy, Jacob Appelbaum, John Markoff, Julian Assange, Marc Andreessen, market bubble, market design, medical residency, meta analysis, meta-analysis, mutually assured destruction, prediction markets, price discrimination, randomized controlled trial, RFID, Robert Shiller, Ronald Reagan, security theater, Silicon Valley, Silicon Valley startup, Skype, smart meter, Steven Levy, Upton Sinclair, WikiLeaks, Y2K, zero-sum game, Zimmermann PGP

(Tails) operating system: “Documentation,” Tails, At his military court proceedings: Bradley Manning, “Bradley Manning’s Statement Taking Responsibility for Releasing Documents to WikiLeaks,” February 28, 2013, He was betrayed by a friend: Kevin Poulsen and Kim Zetter, “U.S. Intelligence Analyst Arrested in Wikileaks Video Probe,” Wired, Threat Level (blog), June 6, 2010, Government investigators later found traces: Eva Blum-Dumontet, “Bradley Manning Legal Proceedings: Fact Sheet,” WikiLeaks Press, March 31, 2012, that has any paid staff: “Core Tor People,” The Tor Project,

In 2010, Immigration and Customs Enforcement investigators: Susan Stellin, “The Border Is a Back Door for U.S. Device Searches,” New York Times, September 9, 2013, House sued the Department of Homeland Security: “U.S. Settles Lawsuit with Bradley Manning Supporter Who Had Laptop Seized at Airport,” (press release), Consider the story of Husain Abdulla: Vernon Silver, “Cyber Attacks on Activists Traced to FinFisher Spyware of Gamma,”, July 25, 2012, After months of painstaking examination: Nicole Perlroth, “Software Meant to Fight Crime Is Used to Spy on Dissidents,” New York Times, August 20, 2012,

an accurate count of the civilians killed in the Iraq: David Leigh, “Iraq War Logs Reveal 15,000 Previously Unlisted Civilian Deaths,” Guardian, October 22, 2010, and Afghanistan wars: David Leigh, “Afghanistan War Logs: Secret CIA Paramilitaries’ Role in Civilian Deaths,” Guardian, July 25, 2010, In 2013, Manning was sentenced to: Paul Lewis, “Bradley Manning Given 35-Year Prison Term for Passing Files to WikiLeaks,” Guardian, August 21, 2013, Snowden obtained temporary political asylum: Alec Luhn, Luke Harding, and Paul Lewis, “Edward Snowden Asylum: US ‘Disappointed’ by Russian Decision,” Guardian, August 1, 2013, In 2013, the Justice Department informed: Devlin Barrett, “U.S.

pages: 322 words: 84,752

Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up by Philip N. Howard


Affordable Care Act / Obamacare, Berlin Wall, bitcoin, blood diamonds, Bretton Woods, Brian Krebs, British Empire, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, corporate social responsibility, creative destruction, crowdsourcing, digital map, Edward Snowden,, failed state, Fall of the Berlin Wall, feminist movement, Filter Bubble, Firefox, Francis Fukuyama: the end of history, Google Earth, Howard Rheingold, income inequality, informal economy, Internet of things, Julian Assange, Kibera, Kickstarter, land reform, M-Pesa, Marshall McLuhan, megacity, Mikhail Gorbachev, mobile money, Mohammed Bouazizi, national security letter, Network effects, obamacare, Occupy movement, packet switching, pension reform, prediction markets, sentiment analysis, Silicon Valley, Skype, spectrum auction, statistical model, Stuxnet, trade route, uranium enrichment, WikiLeaks, zero day

On the whole, democratically elected governments are comparatively open technical systems, and authoritarian regimes are relatively closed technical systems. Indeed, a spectrum of regimes from “open” to “closed” may capture more of the important nuances in what makes a contemporary government than a spectrum that gauges levels of “democracy” and “authoritarianism.” The surveillance scandals triggered by Edward Snowden and Chelsea Manning and the censorship tactics exposed by the OpenNet Initiative complicate many governments’ claims to being democratic. Thinking in terms of democracy and authoritarianism does not make sense in a world where authoritarian governments use digital media to measure and respond to public opinion in positive ways. A growing number of regimes permit no public displays of dissent or high-level elections but do build new ways of interacting with citizens, encourage involvement in public policy, permit digital activism on particular issues such as pollution and corruption, and allow local elections for minor offices.

By 2020, many of us will inhabit a world of interconnected sensors that will have been embedded in everyday objects, and increasingly in our bodies. Filling our lives with such devices should not be just about making better consumer products but about giving us the ability to improve our quality of life. The Hope and Instability of Hackers and Whistle Blowers We’ve come to depend on hacktivists and whistle blowers to teach us about how this internet of things is evolving. It’s easy to despise Edward Snowden and Chelsea Manning for the perceived breach of trust with their national security colleagues and the armed forces. And industry lobbyists work hard to paint activists like Aaron Swartz as miscreants.10 But it is difficult to ignore the debates these hackers and whistle blowers set in motion. Refusing to address their questions is foolish. They risk breaching the trust of their colleagues, but earn public trust and trigger a much-needed, evidence-based public conversation about what our device networks are being used for.

Srđa Popović, the Serb who in 2000 mobilized the resistance to end Slobodan Milošević’s rule, went on in 2003 to train protesters for Georgia’s “Rose Revolution,” Ukraine’s 2005 “Orange Revolution,” and the Maldives’ revolution in 2007, before training activists in Egypt’s April 6 Movement in 2008. Popović’s book Nonviolent Struggle: 50 Crucial Points has been downloaded thousands of times.19 For the presidents of countries and companies, people like Aaron Swartz, Chelsea Manning, and Julian Assange are threats to national security and the corporate bottom line. But in many networks they are heroes. Every few years, hacktivists and whistle blowers turn national security and diplomacy upside down by putting large amounts of previously secret content online. Conservative security analysts and industry pundits often react hostilely to people who play with information technologies and exploit consumer electronics beyond designers’ intent.

pages: 743 words: 201,651

Free Speech: Ten Principles for a Connected World by Timothy Garton Ash


A Declaration of the Independence of Cyberspace, Affordable Care Act / Obamacare, Andrew Keen, Apple II, Ayatollah Khomeini, battle of ideas, Berlin Wall, bitcoin, British Empire, Cass Sunstein, Chelsea Manning, citizen journalism, Clapham omnibus, colonial rule, crowdsourcing, David Attenborough, don't be evil, Donald Davies, Douglas Engelbart, Edward Snowden, Etonian, European colonialism, eurozone crisis, failed state, Fall of the Berlin Wall, Ferguson, Missouri, Filter Bubble, financial independence, Firefox, Galaxy Zoo, George Santayana, global village, index card, Internet Archive, invention of movable type, invention of writing, Jaron Lanier, jimmy wales, John Markoff, Julian Assange, Mark Zuckerberg, Marshall McLuhan, mass immigration, megacity, mutually assured destruction, national security letter, Netflix Prize, Nicholas Carr, obamacare, Peace of Westphalia, Peter Thiel, pre–internet, profit motive, RAND corporation, Ray Kurzweil, Ronald Reagan, semantic web, Silicon Valley, Simon Singh, Snapchat, social graph, Stephen Hawking, Steve Jobs, Steve Wozniak, The Death and Life of Great American Cities, The Wisdom of Crowds, Turing test, We are Anonymous. We are Legion, WikiLeaks, World Values Survey, Yom Kippur War

Many Americans will think of the publication of the Pentagon Papers by the New York Times and Washington Post in the early 1970s: leaked copies of internal US government reports showing just how unsuccessfully and mendaciously the United States was prosecuting the Vietnam War. More recently, we think of the publication by the Guardian and other leading newspapers and magazines—including Der Spiegel, Le Monde and The Hindu—of carefully redacted versions of secret US State Department communications leaked by Private Bradley (subsequently Chelsea) Manning via Julian Assange’s WikiLeaks, and then a selection of the NSA and GCHQ documents passed to them by Snowden. When he first met the journalists involved, in a hotel in Hong Kong, Snowden specifically explained that he wanted experienced news media to decide what it would be in the public interest to publish.56 One can always argue about this or that specific editorial decision, but in general, these newspapers exercised an important controlling function in the public interest; one which government, parliament and the courts had failed to perform.

If it is naïve to think that security officials will all be Platonic guardians armed with invincible virtue, why should we believe that of journalists? So, taken on its own, the journalist’s ‘trust me’ is as inadequate as the spy’s. The responsible use of anonymous sources will remain essential to good journalism. A public interest was served by the publication in leading newspapers of carefully selected and redacted documents from among those that Bradley (subsequently Chelsea) Manning passed to WikiLeaks. To give just one instance, I will never forget the emotional impact of a routine military report from Afghanistan reproduced in the New York Times. Summarising a raid targeting an Al Qaeda commander, it included this sentence: ‘GFC passed initial assessment of 7 × NC KIA (children)’.78 NC KIA stands for noncombatants killed in action. It is the simple word ‘children’, coming after those conscience-freezing bureaucratic acronyms, that is so powerful.

Clarke et al. 2014, 144 74. Kohn 2011, 207–12 75. quoted in Glazer et al. 1989, 34 76. Abrams 2013, 289–92 77. US District Court for the Eastern District of Columbia, sworn affidavit dated 21 June 2011 in the case of US v Jeffrey Alexander Sterling (with some passages redacted), 78. see photograph and text in New York Times, ‘The War Logs’, 26 July 2010, A8 79. but see Matt Sledge, ‘Bradley Manning Sentencing Testimony Suggests WikiLeaks Not Responsible for Any Deaths’, Huffington Post, 8 March 2013, 80. see Timothy Garton Ash, ‘WikiLeaks Has Altered the Leaking Game for Good. Secrets Must Be Fewer, But Better Kept’, The Guardian, 30 March 2011, 81. see the editorial ‘The Times and Iraq’, New York Times, 26 May 2004. See also Margaret Sullivan, ‘The Disconnect on Anonymous Sources’, New York Times, 12 October 2013,, which reports that back in 2004 the use of anonymous sources had been the top concern of Times readers 82. see Margaret Sullivan, ‘The Disconnect on Anonymous Sources’, New York Times, 12 October 2013,

pages: 587 words: 117,894

Cybersecurity: What Everyone Needs to Know by P. W. Singer, Allan Friedman


4chan, A Declaration of the Independence of Cyberspace, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, bitcoin, blood diamonds, borderless world, Brian Krebs, business continuity plan, Chelsea Manning, cloud computing, crowdsourcing, cuban missile crisis, data acquisition, drone strike, Edward Snowden, energy security, failed state, Fall of the Berlin Wall, fault tolerance, global supply chain, Google Earth, Internet of things, invention of the telegraph, John Markoff, Julian Assange, Khan Academy, M-Pesa, mutually assured destruction, Network effects, packet switching, Peace of Westphalia, pre–internet, profit motive, RAND corporation, ransomware, RFC: Request For Comment, risk tolerance, rolodex, Silicon Valley, Skype, smart grid, Steve Jobs, Stuxnet, uranium enrichment, We are Anonymous. We are Legion, web application, WikiLeaks, zero day, zero-sum game

(Ironically, we only know about this classified assessment because WikiLeaks itself published it in 2010.) The Pentagon’s prescience was remarkable, as the website was poised to publish a massive cache of documents that ranged from diplomatic cables to memos and videos directly related to the US military’s war efforts in Iraq and Afghanistan. This story’s beginning goes back to “bradass87,” the online handle of Bradley Manning, born in 1987. Bradley Manning was a private first class in the US Army, and not a terribly happy one. As he described in instant messages sent to another hacker turned journalist, “im an army intelligence analyst, deployed to eastern baghdad, pending discharge for ‘adjustment disorder’ in lieu of ‘gender identity disorder.’” Later investigations found that Manning fit in poorly with other soldiers and that he had already been reprimanded for disclosing too much information in video messages to his friends and family that he posted to YouTube.

Authorization is the part that links these technical issues to policy, business, political and moral questions. Is the individual authorized to buy something, like an account on an online gambling site? And even if so, is the individual old enough to participate? Or, at a slightly larger world stage, just because someone has access to a military’s classified networks, should the person be authorized to read and copy every file in them (a practice that would haunt the US military in the Bradley Manning and Edward Snowden leaks)? The entire problem was perhaps best illustrated by one of the most cited cartoons in history. In 1993, New Yorker magazine published a drawing by Peter Steiner of two dogs sitting near a computer. One dog tells the other, “On the Internet, nobody knows you’re a dog.” Yet this isn’t to say that people can’t find out private details about you if they want. Every activity on the Internet is data being routed from an Internet Protocol (IP) address.

In the variety of attacks cited by the senators above, the Citigroup attackers wanted account details about bank customers with an ultimate goal of financial theft. In the attack on RSA, the attackers wanted key business secrets in order to spy on other companies. For Stuxnet (a case we’ll explore further in Part II), the attackers wanted to disrupt industrial control processes involved in uranium enrichment, so as to sabotage the Iranian nuclear program. Finally, it is useful to acknowledge when the danger comes from one of your own. As cases like Bradley Manning and WikiLeaks or Edward Snowden and the NSA scandal illustrate, the “insider threat” is particularly tough because the actor can search for vulnerabilities from within systems designed only to be used by trusted actors. Insiders can have much better perspectives on what is valuable and how best to leverage that value, whether they are trying to steal secrets or sabotage an operation. It is also important to consider whether the threat actor wants to attack you, or just wants to attack.

pages: 349 words: 114,038

Culture & Empire: Digital Revolution by Pieter Hintjens


4chan, airport security, anti-communist, anti-pattern, barriers to entry, Bill Duvall, bitcoin, blockchain, business climate, business intelligence, business process, Chelsea Manning, clean water, commoditize, congestion charging, Corn Laws, correlation does not imply causation, cryptocurrency, Debian, Edward Snowden, failed state, financial independence, Firefox, full text search, German hyperinflation, global village, GnuPG, Google Chrome, greed is good, Hernando de Soto, hiring and firing, informal economy, intangible asset, invisible hand, James Watt: steam engine, Jeff Rulifson, Julian Assange, Kickstarter, M-Pesa, mass immigration, mass incarceration, mega-rich, mutually assured destruction, Naomi Klein, national security letter, new economy, New Urbanism, Occupy movement, offshore financial centre, packet switching, patent troll, peak oil, pre–internet, private military company, race to the bottom, rent-seeking, reserve currency, RFC: Request For Comment, Richard Feynman, Richard Feynman, Richard Stallman, Satoshi Nakamoto, security theater, selection bias, Skype, slashdot, software patent, spectrum auction, Steve Crocker, Steve Jobs, Steven Pinker, Stuxnet, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, trade route, transaction costs, union organizing, wealth creators, web application, WikiLeaks, Y2K, zero day, Zipf's Law

The burden rests on whistle blowers, and the life of a whistle blower is not an easy one. Leaking sensitive information about malpractice in a business usually leads to firing, blacklisting, and poverty. It's still better than the life of a person who leaks state secrets. Such individuals tend to get suicidal in the most creative ways. Even darknets can't always survive determined leaks, as Chelsea née Bradley Manning and Edward Snowden showed. No security is perfect because it depends on people, and people make mistakes. Someone plugs an off-the-shelf laptop into a darknet, and suddenly it's trivial to copy gigabytes of documents to a USB drive. A maintenance engineer calls the head of operations warning that there's a problem with a router and they have to reset a password. However that "engineer" is a hacker and he gets the system password and access to every every server.

Once a leak is out and attacks on the website that released the information are shown to be useless, the next step is to attack the motives, sanity, and loyalty of the leaker. When there is a leak, the American press (when the leak concerns American secrets) focuses on the messenger and his motives, rather than the message. This isn't necessarily a conspiracy as much as how US media, and indeed much of US society, prefers style over substance. The most significant trove of documents that WikiLeaks published came from Chelsea née Bradley Manning, who has been described in the media as mentally unstable, reckless, and naive. Manning was placed into extreme solitary confinement on arrest, prosecuted in secret, and largely forgotten about until his conviction and sentencing for treason. When someone leaks state secrets, as Manning and Snowden did, it is relatively easy to call out "traitor" and "national security" to trigger the tribalistic herd reflexes.

In fact there have been many whistle blowers who have talked, about large-scale plots of all colors. There is no lack of people who are willing to talk, and often provide very specific, detailed knowledge of crimes committed behind the curtains. The common factor with the whistle blowers is that the mainstream media ignores them unless their stories are pushed through alternative platforms so dramatically that they cannot be ignored. Chelsea née Bradley Manning disclosing crimes through WikiLeaks provides a well-known instance of this. One of the first significant NSA whistle blowers was Russ Tice. He told us in December 2005 that the NSA and DIA (another three-letter agency I'll come back to in the last chapter were spying on US citizens, something that was, and still is, illegal. The NSA then fired him, and rebuffed his claims. Today, we have corroboration of what he said, from Snowden and indeed from the NSA themselves.

pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia by Becky Hogge, Damien Morris, Christopher Scally


A Declaration of the Independence of Cyberspace, back-to-the-land, Berlin Wall, Buckminster Fuller, Chelsea Manning, citizen journalism, cloud computing, corporate social responsibility, disintermediation, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, Fall of the Berlin Wall, game design, Hacker Ethic, informal economy, information asymmetry, Jacob Appelbaum, jimmy wales, John Markoff, Julian Assange, Kevin Kelly, mass immigration, Menlo Park, moral panic, Mother of all demos, Naomi Klein, Network effects, New Journalism, Norbert Wiener, peer-to-peer, Richard Stallman, Silicon Valley, Skype, Socratic dialogue, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technoutopianism, Telecommunications Act of 1996, Vannevar Bush, Whole Earth Catalog, Whole Earth Review, WikiLeaks

Although it wasn’t meant to, this phrase also serves as an epitaph for the video WikiLeaks worked so hard to put out in the public domain. Still, although the message behind the video only needed a light breeze to be carried out of the media echo chamber and disappear into the ether, WikiLeaks themselves remained in the headlines throughout the spring and into summer. In early June, Wired magazine’s Threat Level blog was the first to report the arrest of a junior US Army analyst in Baghdad. Private Bradley Manning, 22, was being held in Kuwait under suspicion of leaking the video and other classified documents to WikiLeaks. WikiLeaks had been on the US government’s radar long before the Collateral Murder video. In 2008, the US Army Counterintelligence Center produced an internal memo entitled—An Online Reference to Foreign Intelligence Services, Insurgents, or Terrorist Groups?, essentially a briefing for US intelligence officials on the site.

Chief among these was the suggestion that: Successful identification, prosecution, termination of employment and exposure of persons leaking the information by the governments and businesses affected by information posted to would damage and potentially destroy this center of gravity and deter others from taking similar actions. The counterintelligence document had been leaked to and published by WikiLeaks in March 2010. As the Bradley Manning story hit the headlines, several commentators observed that prosecution of the young Private would appear to present the US government with exactly the opportunity they had been seeking. Manning is now awaiting trial in the US. If found guilty of leaking classified documents, he could face up to 52 years in prison. The story of how Manning came to the attention of the US authorities is shot through with the names of famous computer hackers.

Both Lamo and Poulsen appear on lists of the top ten most famous hackers of all time. Clearly both still like making “interesting trouble”. Rumours that Lamo is now working on asymmetrical information warfare tactics on behalf of the United States National Security Agency remain unconfirmed. Most probably they always will. * * * After Collateral Murder, Julian Assange went into hiding. But just over a month after Bradley Manning’s story hit the headlines, at noon on 25 July, he appeared again, fronting a press conference at London’s Frontline Club for WikiLeaks’ second high-profile leak of the year: the Afghan War Logs, around 75,000 classified internal US field reports sent from the war in Afghanistan. This time, Julian was only appearing to answer questions. There was no video to show, no secrets to dramatically reveal, because the story was already out there.

Power Systems: Conversations on Global Democratic Uprisings and the New Challenges to U.S. Empire by Noam Chomsky, David Barsamian


affirmative action, Affordable Care Act / Obamacare, Albert Einstein, Chelsea Manning, collective bargaining, colonial rule, corporate personhood, David Brooks, discovery of DNA, double helix, drone strike, failed state, Howard Zinn, hydraulic fracturing, income inequality, inflation targeting, Intergovernmental Panel on Climate Change (IPCC), Julian Assange, land reform, Martin Wolf, Mohammed Bouazizi, Naomi Klein, new economy, obamacare, Occupy movement, oil shale / tar sands, pattern recognition, Powell Memorandum, quantitative easing, Ralph Nader, Ralph Waldo Emerson, single-payer health, sovereign wealth fund, The Wealth of Nations by Adam Smith, theory of mind, Tobin tax, union organizing, Upton Sinclair, uranium enrichment, WikiLeaks

After the uprising had already started, one French cabinet minister, Michèle Alliot-Marie, actually went to Tunisia for a vacation.17 This is a country that’s been under the thumb of France for a long time and is surely penetrated by French intelligence. But how much these leaks influenced the protests is an open question. I doubt that Tunisians cared very much about French and U.S. hypocrisy, which is all that WikiLeaks revealed—nothing that they didn’t know themselves. Talk about the connection between Daniel Ellsberg and Bradley Manning. Dan is an old friend. I was involved with him in helping release the Pentagon Papers, which I thought was a quite proper thing to do. I testified at his trial. In the case of Bradley Manning, he’s charged with having released material to Julian Assange, who distributed it on WikiLeaks.18 He’s been in prison now since May 2010, a large part of that in solitary confinement—which is torture. He’s been treated in rotten ways and been bitterly attacked. Here’s someone who is charged with doing something which, in my opinion, is not a crime but a service to the country.

But whatever you think about that, he’s charged, not brought to trial. In fact, at the moment there’s not even any court trial contemplated. They’re treating it as a court-martial inside the military system.19 I think Manning should be applauded and the government should be harshly condemned for throwing out the basic principles of law and human rights. Didn’t Obama, a constitutional law professor, make a prejudicial comment about Bradley Manning? Yes, he immediately said he’s guilty.20 That’s unconscionable. Even if Obama wasn’t a constitutional lawyer, he’s the president. He should know that the president shouldn’t say that about a person who is facing criminal charges. There are worse things—say, assassinating Osama bin Laden. He wasn’t tried in a court. He’s innocent until proven guilty. But you assassinate him if you don’t like him.

See also Amy Davidson, “Tunisia and WikiLeaks,” New Yorker, Close Read blog, 14 January 2011. 17. Steven Erlanger, “French Foreign Minister Urged to Resign,” New York Times, 3 February 2011. 18. Charlie Savage, “Soldier Faces 22 New WikiLeaks Charges,” New York Times, 2 March 2011. 19. Scott Shane, “Court Martial Recommended in WikiLeaks Case,” New York Times, 12 January 2012. 20. Stephanie Condon, “Obama Says Bradley Manning ‘Broke the Law,’”, 22 April 2011. 21. Mark Mazzetti, Eric Schmitt, and Robert F. Worth, “Two-Year Manhunt Led to Killing of Awlaki in Yemen,” New York Times, 30 September 2011. 22. President Barack Obama, “President Obama’s Statement on the Memos,” New York Times, 16 April 2009. See also Mark Mazzetti and Scott Shane, “Interrogation Memos Detail Harsh Tactics by the C.I.A.,” New York Times, 16 April 2009. 23.

pages: 478 words: 149,810

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson


4chan, Asperger Syndrome, bitcoin, call centre, Chelsea Manning, corporate governance, crowdsourcing, Firefox, hive mind, Julian Assange, Minecraft, Occupy movement, peer-to-peer, pirate software, side project, Skype, speech recognition, Stephen Hawking, Stuxnet, We are Anonymous. We are Legion, We are the 99%, web application, WikiLeaks, zero day

He had no idea that, even though the anticopyright battle was dying, Operation Payback was about to explode with support for a little organization called WikiLeaks. Jake, now as Topiary, explored the AnonOps chat rooms while a former, widely-revered hacker from Australia named Julian Assange was getting ready to drop a bombshell on the American government. Earlier in 2010, a U.S. army private named Bradley Manning had allegedly reached out to Assange and given his whistleblower site, WikiLeaks, 250,000 internal messages, known as cables, that had been sent between American embassies. These diplomatic cables revealed American political maneuverings and confidential diplomatic reports. In exposing the documents, Assange would hugely embarrass American foreign policy makers. The WikiLeaks founder had struck deals with five major newspapers, including the New York Times and the U.K.’s Guardian, and on November 28, 2010, they started publishing the cables.

Here they could share flaws they had found in servers hosting everything from the official U.S. Green Party to Harvard University to the CERN laboratory in Switzerland. Sabu even pasted a list of exploits—a series of commands that took advantage of a security glitch—to several iPhones that anyone could snoop on. They threw around ideas for future targets: Adrian Lamo, the hacker that had turned in WikiLeaks’s military mole Bradley Manning, or defected botmaster Switch. “If someone has his dox,” said Kayla, “I can pull his social security number and we can make his life hell.” To those who didn’t know her, Kayla came across as someone who was especially keen to dish out vigilante justice. As the InternetFeds participants got to know each other more, they also saw that Sabu was the one with the loudest voice, the biggest opinions, and the strongest desire to coordinate others into action.

They had used HBGary-like tactics of subterfuge and misinformation to erode the power of organizations from the Black Panthers to the Puerto Rican FLN to the KKK to Mexican gangs, often doing it from the inside. The reason many of these organizations died out, Sabu believed, was that they had a structured hierarchy. Anonymous was different. If someone arrested Monsegur, there would be ten more like him to take his place. By leaking e-mails or helping Internet users around the world bypass government filtering, Anonymous could assist people like Julian Assange and his alleged whistle-blower Bradley Manning once they were arrested. When he had first heard about Assange’s arrest, Monsegur had gone online as Sabu and looked for vulnerabilities in the networks of organizations related to Assange’s case, from the court that allowed Assange’s warrant to those who ended up taking him to jail. Sabu claimed his research led to a wealth of information for future operations, though he never released it to the public.

pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele


3D printing, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, commoditize, creative destruction, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, Donald Trump, Douglas Engelbart, Douglas Engelbart,, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, Galaxy Zoo, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, Mark Zuckerberg, minimum viable product, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, old-boy network, peer-to-peer, period drama, Peter Thiel, pirate software, publication bias, Robert Metcalfe, Ronald Reagan, Ronald Reagan: Tear down this wall, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Telecommunications Act of 1996, telemarketer, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

Soghoian has suggested that Flame exposes the average citizen to a significant level of security risk on their personal computer by undermining automatic security updates, not to mention the growing consumer privacy concerns.27 As the preceding discussion suggests, the term “nonstate actor” has its limitations; it’s conceivable that every technically literate person with a laptop and an Internet connection might be able to influence global geopolitics as a nonstate actor. In fact, it’s already happening. Consider Bradley Manning and Julian Assange; together they changed diplomacy and, arguably, the governments of several countries—without any exceptional technical knowledge or expertise. Bradley Manning is a computer programmer, but not a technical genius. He was a low-ranking U.S. Army soldier, a private first class, who made use of a fundamental attribute of digital files: They are easily copied and, once copied, easily shared. Manning allegedly had access to the files through the U.S. military’s online data-management tools and copied them to share online on WikiLeaks.

Former Republican presidential candidate Mike Huckabee called for the head of “whoever” did WikiLeaks,30 former Republican vice presidential candidate Sarah Palin called for the person behind WikiLeaks to be “hunted down like Bin Laden,”31 and Vice President Joe Biden explicitly denounced Assange as a “digital terrorist.”32 Others see him as a journalist and a hero. Daniel Ellsberg, who leaked the Pentagon Papers, has been out in front defending Assange: “If I released the Pentagon Papers today, the same rhetoric and the same calls would be made about me … I would be called not only a traitor—which I was [called] then, which was false and slanderous—but I would be called a terrorist. … Assange and Bradley Manning are no more terrorists than I am.”33 Micah Sifry, a noted commentator and journalist on technology and politics, regards WikiLeaks as a symptom of a much broader global trend. In his book WikiLeaks and the Age of Transparency, he writes, “What is new is our ability to connect, individually and together, with greater ease than at any time in human history. As a result, information is flowing more freely into the public arena, powered by seemingly unstoppable networks of people all over the world cooperating to share vital data and prevent its suppression.”34 At the heart of this trend is the idea—foundational to our nerd oligarchs—that information should be freely available to those who seek to use it, and the open-source approach that such transparency and openness produces not only better software but also better solutions to many problems.

pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier


23andMe, Airbnb, airport security, AltaVista, Anne Wojcicki, augmented reality, Benjamin Mako Hill, Black Swan, Brewster Kahle, Brian Krebs, call centre, Cass Sunstein, Chelsea Manning, citizen journalism, cloud computing, congestion charging, disintermediation, drone strike, Edward Snowden, experimental subject, failed state, fault tolerance, Ferguson, Missouri, Filter Bubble, Firefox, friendly fire, Google Chrome, Google Glasses, hindsight bias, informal economy, Internet Archive, Internet of things, Jacob Appelbaum, Jaron Lanier, John Markoff, Julian Assange, Kevin Kelly, license plate recognition, lifelogging, linked data, Lyft, Mark Zuckerberg, moral panic, Nash equilibrium, Nate Silver, national security letter, Network effects, Occupy movement, payday loans, pre–internet, price discrimination, profit motive, race to the bottom, RAND corporation, recommendation engine, RFID, self-driving car, Shoshana Zuboff, Silicon Valley, Skype, smart cities, smart grid, Snapchat, social graph, software as a service, South China Sea, stealth mode startup, Steven Levy, Stuxnet, TaskRabbit, telemarketer, Tim Cook: Apple, transaction costs, Uber and Lyft, urban planning, WikiLeaks, zero day

Intelligence-related whistleblowing is not a legal defense in the US; the Espionage Act prohibits the defendant from explaining why he leaked classified information. Daniel Ellsberg, the first person prosecuted under the law, in 1971, was barred from explaining his actions in court. Former NSA senior executive Thomas Drake, an NSA whistleblower who was prosecuted in 2011, was forbidden to say the words “whistleblowing” and “overclassification” in his trial. Chelsea Manning was prohibited from using a similar defense. Edward Snowden claims he’s a whistleblower. Many people, including me, agree; others don’t. Secretary of State John Kerry insisted that Snowden should “come back here and stand in our system of justice and make his case,” and former secretary of state Hillary Clinton proclaimed, “If he wishes to return knowing he would be held accountable and also able to present a defense, that is his decision to make.”

David Pozen (20 Dec 2013), “The leaky leviathan: Why the government condemns and condones unlawful disclosures of information,” Harvard Law Review 127, Thomas Drake, an NSA whistleblower: Daniel Ellsberg (30 May 2014), “Snowden would not get a fair trial—and Kerry is wrong,” Guardian, Chelsea Manning was prohibited: David Dishneau (20 Jul 2012), “Manning largely barred from discussing WikiLeaks harm,” Associated Press, Edward Snowden claims: The country is fairly evenly divided on this point. Seth Motel (15 Apr 2014), “NSA coverage wins Pulitzer, but Americans remain divided on Snowden leaks,” Pew Research Center,

pages: 202 words: 59,883

Age of Context: Mobile, Sensors, Data and the Future of Privacy by Robert Scoble, Shel Israel


Albert Einstein, Apple II, augmented reality, call centre, Chelsea Manning, cloud computing, connected car, Edward Snowden, Edward Thorp, Elon Musk, factory automation, Filter Bubble, Google Earth, Google Glasses, Internet of things, job automation, John Markoff, Kickstarter, lifelogging, Marc Andreessen, Mars Rover, Menlo Park, Metcalfe’s law, New Urbanism, PageRank, pattern recognition, RFID, ride hailing / ride sharing, Robert Metcalfe, Saturday Night Live, self-driving car, sensor fusion, Silicon Valley, Skype, smart grid, social graph, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Tesla Model S, Tim Cook: Apple, urban planning, Zipcar

Our goal was to tell you about incredible new technologies that can understand you well enough to predict what you will need next and to automate many mundane tasks. But with each chapter we found new privacy issues, and some are too serious to brush aside. While we were busy searching the world for mobile, social media, sensor, data and location technologies, the issues of government surveillance became a prominent national issue in the United States. As the names Bradley (Chelsea) Manning, Dzhokhar and Tamerlan Tsarnaev, and Edward Snowden emerged from the headlines into the national consciousness, public attention came to focus on the role of the secret FISA court, the electronic surveillance of millions of Americans under a National Security Agency data-mining operation called PRISM and so much more. We are just a couple of tech enthusiasts, and some of these national issues would normally go well beyond our purview, were it not for the fact that the same technologies we are extolling are being used to secretly watch people.

pages: 233 words: 66,446

Bitcoin: The Future of Money? by Dominic Frisby


3D printing, altcoin, bank run, banking crisis, banks create money, barriers to entry, bitcoin, blockchain, capital controls, Chelsea Manning, cloud computing, computer age, cryptocurrency, disintermediation, ethereum blockchain, fiat currency, fixed income, friendly fire, game design, Isaac Newton, Julian Assange, land value tax, litecoin, M-Pesa, mobile money, money: store of value / unit of account / medium of exchange, Occupy movement, Peter Thiel, Ponzi scheme, prediction markets, price stability, QR code, quantitative easing, railway mania, Ronald Reagan, Satoshi Nakamoto, Silicon Valley, Skype, slashdot, smart contracts, Snapchat, Stephen Hawking, Steve Jobs, Ted Nelson, too big to fail, transaction costs, Turing complete, War on Poverty, web application, WikiLeaks

Then another Bitcoin exchange sprung up, one that would become the biggest and most notorious – MtGox. 3 The Rise of Bitcoin and the Disappearance of its Maker I think that the internet is going to be one of the major forces for reducing the role of government. The one thing that’s missing, but that will soon be developed, is a reliable e-cash. Milton Friedman, economist The US Department of Defense called it the ‘largest leak of classified documents in its history’. It’s difficult to overstate how big a threat to the existing world order WikiLeaks was perceived to be in late 2010. There has been revelation after revelation – the Bradley Manning leaks, the video of US soldiers shooting at Reuters cameramen, the ‘friendly fire’ and civilian casualties, then the leak of another 400,000 documents relating to the Iraq war. WikiLeaks had caught the imagination of those opposed to the US and other governments. Many wanted to help. PayPal was the main means by which WikiLeaks was able to receive funds for its activities and, in 2010, its donors gave around one million dollars.

Gavin Andresen, another of the early developers, was perhaps the closest to Satoshi. In September 2011 he said, ‘I haven’t had email from Satoshi in a couple months actually. The last email I sent him I actually told him I was going to talk at the CIA. So it’s possible that…that may have had something to with his deciding.’42 It’s easy to assume that Satoshi was fearful of government authorities. He saw what was happening to Assange and to Bradley Manning, and what had befallen the founders of other forms of ecash. It’s unlikely he wanted accusations of terrorism levelled against him. Even if they were unfounded, they could have ruined his life and the lives of those close to him. Whether it was WikiLeaks, the CIA or both that caused it, Satoshi had vanished. The rise of Bitcoin That July 2010 mention on Slashdot was a catalyst. More and more users flocked to Bitcoin over the following months.

pages: 577 words: 149,554

The Problem of Political Authority: An Examination of the Right to Coerce and the Duty to Obey by Michael Huemer


Cass Sunstein, Chelsea Manning, cognitive dissonance, cuban missile crisis, Daniel Kahneman / Amos Tversky,, Eratosthenes, experimental subject, framing effect, Gini coefficient, illegal immigration, impulse control, Isaac Newton, Julian Assange, laissez-faire capitalism, Machinery of Freedom by David Friedman, Milgram experiment, moral hazard, Phillip Zimbardo, profit maximization, profit motive, Ralph Nader, RAND corporation, rent-seeking, Ronald Coase, The Wealth of Nations by Adam Smith, unbiased observer, uranium enrichment, WikiLeaks

Vice President Biden called Wikileaks founder Julian Assange a terrorist and promised that the Justice Department would be looking for ways to prosecute him. Former Arkansas governor and sometime presidential candidate Mike Huckabee called Wikileaks’ source a traitor and called for his execution. As of this writing (mid-2012), Wikileaks’ source for the Iraq documents, U.S. military intelligence analyst Bradley Manning, is being prosecuted by the military under numerous charges, including ‘aiding the enemy’, a capital offence (though the government will not seek the death penalty).32 These cases show that not everyone is easily intimidated. But they also show that journalists and their sources have rational cause for fear should they publish information embarrassing to the government. The third and most important reason why it is not in the media’s interests to act as an alert watchdog is the demands of the consumer.

Carson, Kevin A. 2008. Organization Theory: A Libertarian Perspective. N.p.: Booksurge. Cashman, Greg. 1993. What Causes War? An Introduction to Theories of International Conflict. New York: Lexington Books. Cashman, Greg, and Leonard C. Robinson. 2007. An Introduction to the Causes of War: Patterns of Interstate Conflict from World War I to Iraq. Lanham, MD: Rowman & Littlefield. CBS News. 2011. ‘WikiLeaks: Bradley Manning Faces 22 New Charges’, CBS News, 2 March, Accessed March 10, 2011. Center for Responsive Politics. 2011. Reelection Rates over the Years, Accessed March 15, 2011. Center for Systemic Peace. 2011. Polity IV Annual Time-Series 1800–2010 (dataset from Polity IV project),

pages: 226 words: 71,540

Epic Win for Anonymous: How 4chan's Army Conquered the Web by Cole Stryker


4chan, barriers to entry, Berlin Wall, Chelsea Manning, cognitive dissonance, Columbine, commoditize, creative destruction, crowdsourcing, Firefox, future of journalism, hive mind, informal economy, Internet Archive, Julian Assange, Mark Zuckerberg, Marshall McLuhan, Mason jar, pre–internet, Silicon Valley, slashdot, social web, Stephen Hawking, Steve Jobs, Stewart Brand, technoutopianism, wage slave, We are Anonymous. We are Legion, Whole Earth Catalog, WikiLeaks

Anonymouse thinks that the press is asking the wrong questions, claiming that they tend to focus on the illegal hacks rather than the illegal acts that the hackers are able to expose. He says that most of the media coverage belies a “sick” acceptance of HBGary’s activities, using government power to spy on its citizens. He draws parallels to the freedom-fighting actions of Anonymous and those of Bradley Manning and Julian Assange, who have also experienced a fair amount of negative press. How about prosecuting the soldiers named in one of the Afghan war diaries as having shot a bunch of unarmed teenagers? The number one response I’ve noticed when I argue about this is “Well this is the real world, corruption happens, deal with it.” I’m left gaping. Sure it happens. Murder and rape happen too, does that mean we should just say “Oh sure we’ll just leave the murderers alone, it happens.

pages: 284 words: 79,265

The Half-Life of Facts: Why Everything We Know Has an Expiration Date by Samuel Arbesman


Albert Einstein, Alfred Russel Wallace, Amazon Mechanical Turk, Andrew Wiles, bioinformatics, British Empire, Cesare Marchetti: Marchetti’s constant, Chelsea Manning, Clayton Christensen, cognitive bias, cognitive dissonance, conceptual framework, David Brooks, demographic transition, double entry bookkeeping, double helix, Galaxy Zoo, guest worker program, Gödel, Escher, Bach, Ignaz Semmelweis: hand washing, index fund, invention of movable type, Isaac Newton, John Harrison: Longitude, Kevin Kelly, life extension, Marc Andreessen, meta analysis, meta-analysis, Milgram experiment, Nicholas Carr, p-value, Paul Erdős, Pluto: dwarf planet, publication bias, randomized controlled trial, Richard Feynman, Richard Feynman, Rodney Brooks, social graph, social web, text mining, the scientific method, Thomas Kuhn: the structure of scientific revolutions, Thomas Malthus, Tyler Cowen: Great Stagnation

Bradley’s father was even more cosmopolitan and traveled throughout the continent of Europe, leading his lifetime movements to be spread throughout a space that is about 2,500 miles on each side. Bradley himself, a world-famous scientist, traveled across the globe. While the Earth is not a square grid, he traveled in a range that is around 25,000 miles on a side, about the circumference of the Earth. A Bradley man could move ten times farther throughout the course of his life with each successive generation, traveling in a space an order of magnitude more extensive in each direction than his father. This increase in travel is an exponential increase in distance from one generation to the next. If we look at the areas and not just the distance of the geographic footprint of each man, these also increase exponentially, at a rate double that of the increase in distance (because they are squares).

pages: 320 words: 87,853

The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale


Affordable Care Act / Obamacare, algorithmic trading, Amazon Mechanical Turk, American Legislative Exchange Council, asset-backed security, Atul Gawande, bank run, barriers to entry, basic income, Berlin Wall, Bernie Madoff, Black Swan, bonus culture, Brian Krebs, call centre, Capital in the Twenty-First Century by Thomas Piketty, Chelsea Manning, Chuck Templeton: OpenTable, cloud computing, collateralized debt obligation, computerized markets, corporate governance, Credit Default Swap, credit default swaps / collateralized debt obligations, crowdsourcing, cryptocurrency, Debian, don't be evil, drone strike, Edward Snowden,, Fall of the Berlin Wall, Filter Bubble, financial innovation, financial thriller, fixed income, Flash crash, full employment, Goldman Sachs: Vampire Squid, Google Earth, Hernando de Soto, High speed trading, hiring and firing, housing crisis, informal economy, information asymmetry, information retrieval, interest rate swap, Internet of things, invisible hand, Jaron Lanier, Jeff Bezos, job automation, Julian Assange, Kevin Kelly, knowledge worker, Kodak vs Instagram, kremlinology, late fees, London Interbank Offered Rate, London Whale, Marc Andreessen, Mark Zuckerberg, mobile money, moral hazard, new economy, Nicholas Carr, offshore financial centre, PageRank, pattern recognition, Philip Mirowski, precariat, profit maximization, profit motive, quantitative easing, race to the bottom, recommendation engine, regulatory arbitrage, risk-adjusted returns, Satyajit Das, search engine result page, shareholder value, Silicon Valley, Snapchat, Spread Networks laid a new fibre optics cable between New York and Chicago, statistical arbitrage, statistical model, Steven Levy, the scientific method, too big to fail, transaction costs, two-sided market, universal basic income, Upton Sinclair, value at risk, WikiLeaks, zero-sum game

This is not a “bug” in our surveillance system, but a “feature.”192 Note that the very definition of fusion centers includes their willingness to receive information from private parties. The Snowden leaks make the shared infrastructure of state and private data collection incontrovertible. Never again can data deregulationists claim that corporate data collection is entirely distinct and far less threatening than government surveillance. They are irreversibly intertwined. Enduring Opacity Despite the leaks of Snowden (and Chelsea Manning and Julian Assange), the national surveillance apparatus is still opaque on many levels.193 It enjoys both real and legal secrecy, hidden as it is in secure networks and protected by the heavy hand of the law. There’s plenty of complexity, too, should secrecy fail. Intelligence agencies commission private defense contractors like SAIC, Northrop Grumman, Booz Allen, and Palantir to devise specialized software to monitor their data sources—which include social networks.194 Their algorithms are complex enough by themselves, but the contractors are also bound to protect company trade secrets.

pages: 464 words: 121,983

Disaster Capitalism: Making a Killing Out of Catastrophe by Antony Loewenstein


activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, American Legislative Exchange Council, anti-communist, Asian financial crisis, British Empire, Capital in the Twenty-First Century by Thomas Piketty, Chelsea Manning, clean water, collective bargaining, colonial rule, corporate social responsibility, Corrections Corporation of America, Edward Snowden, facts on the ground, failed state, falling living standards, Ferguson, Missouri, financial independence, full employment, G4S, Goldman Sachs: Vampire Squid, housing crisis, illegal immigration, immigration reform, income inequality, Julian Assange, mandatory minimum, market fundamentalism, mass incarceration, Naomi Klein, neoliberal agenda, obamacare, Occupy movement, offshore financial centre, open borders, private military company, profit motive, Ralph Nader, Ronald Reagan, Satyajit Das, Scramble for Africa, Slavoj Žižek, stem cell, the medium is the message, trade liberalization, WikiLeaks

Thanks to my Australian publisher, Melbourne University Press, for continuing to back my vision. Louise Adler, Elisa Berg, Sally Heath, Paul Smitz, and Penelope White have all contributed hugely to the vision in your hands. I continue to be inspired by a range of journalists and groups whose work informs my own: Julian Assange and WikiLeaks, Pratap Chatterjee, Glenn Greenwald, Amy Goodman, the late and great Michael Hastings, Naomi Klein, Dahr Jamail, Chelsea Manning, George Monbiot, Greg Palast, John Pilger, Jeremy Scahill, Edward Snowden, and Matt Taibbi. Alison Martin is a truly unique woman who constantly challenges, provokes, and loves me. Her intelligence, insights, and warmth run through this book. Our life journey together is one of the best damn things to ever happen to me. Thank you, my love. My parents Violet and Jeffrey give me endless support, backing, and love.

pages: 519 words: 136,708

Vertical: The City From Satellites to Bunkers by Stephen Graham


1960s counterculture, Berlin Wall, Buckminster Fuller, Buy land – they’re not making it any more, Chelsea Manning, Commodity Super-Cycle, creative destruction, deindustrialization, digital map, drone strike, Edward Glaeser, Edward Snowden, energy security, Frank Gehry, ghettoisation, Google Earth, Gunnar Myrdal, high net worth, housing crisis, Howard Zinn, illegal immigration, Indoor air pollution, Intergovernmental Panel on Climate Change (IPCC), Jane Jacobs, late capitalism, mass immigration, means of production, megacity, megastructure, moral panic, mutually assured destruction, new economy, New Urbanism, nuclear winter, oil shale / tar sands, planetary scale, Plutocrats, plutocrats, post-industrial society, Project Plowshare, rent control, Richard Florida, Right to Buy, Ronald Reagan, Skype, South China Sea, the built environment, The Death and Life of Great American Cities, trickle-down economics, urban decay, urban planning, urban renewal, urban sprawl, white flight, WikiLeaks, William Langewiesche

Of unacknowledged moons and ‘black’ space craft moving through the pre-dawn and early evening darkness, where the rising and setting sun lights up the stainless steel bodies, and they blink in and out of sight as they glide though the backdrop of a darkened sky hundred of miles below. In most cases, the reflection is all we get.20 Fittingly for this book, Paglen’s work, like the whistle-blowing leaks of Chelsea Manning and Edward Snowden, is an example of what has been called sous-surveillance – literally ‘under surveillance’ or ‘surveillance from below’. In challenging the cloak of invisibility and secrecy that obscures top-down surveillance by national security states, Paglen and the satellite-tracking community fleetingly expose one crucial material embodiment of the increasingly secretive and authoritarian nature of security politics.21 Predictably, further exposures come from the strategic competitors of the United States.

pages: 675 words: 141,667

Open Standards and the Digital Age: History, Ideology, and Networks (Cambridge Studies in the Emergence of Global Enterprise) by Andrew L. Russell


barriers to entry, borderless world, Chelsea Manning, computer age, creative destruction, Donald Davies, Edward Snowden, Frederick Winslow Taylor, Hacker Ethic, Howard Rheingold, Hush-A-Phone, interchangeable parts, invisible hand, John Markoff, Joseph Schumpeter, Leonard Kleinrock, means of production, Menlo Park, Network effects, new economy, Norbert Wiener, open economy, packet switching, pre–internet, RAND corporation, RFC: Request For Comment, Richard Stallman, Ronald Coase, Ronald Reagan, Silicon Valley, Steve Crocker, Steven Levy, Stewart Brand, technoutopianism, Ted Nelson, The Nature of the Firm, Thomas L Friedman, Thorstein Veblen, transaction costs, web of trust

Another example may be found in the distinctive prose of journalist Thomas Friedman, who referred to new information technologies such as personal computing, Internet telephony, and wireless devices as “steroids” that are “amplifying and turbocharging all the other flatteners.”5 The consequences of all of this turbocharged flattening, of course, depend on one’s point of view: when Google complained in 2010 that the Chinese government was censoring search results from, the Chinese newspaper Global Times defended China’s right to protect itself from American “information imperialism.” Google’s high-minded defense of the freedom of expression was, the Global Times declared, a ruse – a “disguised attempt to impose its values on other cultures in the name of democracy.”6 The inherent contradictions and tensions bundled within terms such as “openness” and “transparency” have been further exposed by activists such as Chelsea Manning, Aaron Swartz, and Edward Snowden who put powerful institutions in uncomfortable positions by publicizing data that were intended to be secret. In other words, openness (and its ally, transparency) is easy to promote in rhetoric but more complicated to adhere to in practice. One comes away from the popular accounts of high-tech globalization with an oversimplified, linear, and somewhat deterministic view of the relationship between technology and society: for better and for worse, the Internet and digital technologies have thrust an unprecedented era of openness on us.

pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman


23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Brian Krebs, business process, butterfly effect, call centre, Chelsea Manning, cloud computing, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, Dean Kamen, disintermediation, don't be evil, double helix, Downton Abbey, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Filter Bubble, Firefox, Flash crash, future of work, game design, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, knowledge worker, Kuwabatake Sanjuro: assassination market, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, M-Pesa, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, mobile money, more computing power than Apollo, move fast and break things, move fast and break things, Nate Silver, national security letter, natural language processing, obamacare, Occupy movement, Oculus Rift, off grid, offshore financial centre, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, RAND corporation, ransomware, Ray Kurzweil, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, supply-chain management, technological singularity, telepresence, telepresence robot, Tesla Model S, The Future of Employment, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Wall-E, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, zero day

The number and reach of these highly profitable transnational organized cyber-crime rings have grown, and the security intelligence firm CrowdStrike was actively tracking more than fifty such major organizations globally. Besides transnational organized crime syndicates, hacktivists—politically motivated cyber attackers—represent one of the most influential and powerful groups in cyberspace. Anonymous, LulzSec, AntiSec, WikiLeaks, and the Syrian Electronic Army fall into this group and launch their attacks in retaliation for perceived injustices. Personalities such as Julian Assange, Chelsea (Bradley) Manning, and Edward Snowden have become household names for challenging some of the world’s most powerful institutions and for releasing data that others would most certainly have preferred remain hidden. While Assange, Manning, and Snowden have been propelled onto the covers of newspapers around the world, other hacktivist groups prefer that their individual members remain discreetly hidden in subordination to the organization itself and its broader agenda.

Eventually, your personal details will fall into the hands of criminal cartels, competitors, and even foreign governments. While big data may be the new oil, our personal data are more like weapons-grade plutonium—dangerous, long lasting, and once they are leaked, there’s no getting them back. Even the federal government is realizing it too can fall victim to this problem. Just look at the 2010 WikiLeaks debacle and the hundreds of thousands of classified diplomatic cables Private Chelsea (Bradley) Manning was able to steal while working as an army intelligence analyst in Iraq. Of course just a few years later, the world would meet Edward Snowden, who used his skills and access as an NSA system administrator to steal millions of highly classified files from America and its allies and share them with journalists for publication online. Some have called this type of mass information theft and disclosure the “civil disobedience of the information age.”

pages: 390 words: 96,624

Consent of the Networked: The Worldwide Struggle for Internet Freedom by Rebecca MacKinnon


A Declaration of the Independence of Cyberspace, Bay Area Rapid Transit, Berlin Wall, business intelligence, Cass Sunstein, Chelsea Manning, citizen journalism, cloud computing, cognitive dissonance, collective bargaining, conceptual framework, corporate social responsibility, Deng Xiaoping, digital Maoism, don't be evil, Filter Bubble, Firefox, future of journalism, illegal immigration, Jaron Lanier, Jeff Bezos, John Markoff, Julian Assange, Mark Zuckerberg, Mikhail Gorbachev, national security letter, online collectivism, Parag Khanna, pre–internet, race to the bottom, Richard Stallman, Ronald Reagan, sharing economy, Silicon Valley, Silicon Valley startup, Skype, Steve Crocker, Steven Levy, WikiLeaks

But without clear transparency and accountability about how, when, and under what specific circumstances personal information is being collected and used, citizens have good reason to worry about the growth of the state’s “panoptic” power. WIKILEAKS AND THE FATE OF CONTROVERSIAL SPEECH WikiLeaks and several news organizations that the whistle-blowing organization had chosen as partners published the first batch of classified US diplomatic cables, leaked by disgruntled US Army Private Bradley Manning, in November 2010. Vice President Joseph Biden declared WikiLeaks’ leader, Julian Assange, to be a “digital terrorist.” Senator Joe Lieberman declared that “WikiLeaks’ illegal, outrageous, and reckless acts have compromised our national security and put lives at risk around the world.” Meanwhile, the WikiLeaks “Cablegate” website, dedicated to showcasing the leaked diplomatic cables, came under distributed denial of service attacks of unknown origin.

pages: 503 words: 131,064

Liars and Outliers: How Security Holds Society Together by Bruce Schneier


airport security, barriers to entry, Berlin Wall, Bernie Madoff, Bernie Sanders, Brian Krebs, Broken windows theory, carried interest, Cass Sunstein, Chelsea Manning, commoditize, corporate governance, crack epidemic, credit crunch, crowdsourcing, cuban missile crisis, Daniel Kahneman / Amos Tversky, David Graeber, desegregation, don't be evil, Double Irish / Dutch Sandwich, Douglas Hofstadter, experimental economics, Fall of the Berlin Wall, financial deregulation, George Akerlof, hydraulic fracturing, impulse control, income inequality, invention of agriculture, invention of gunpowder, iterative process, Jean Tirole, John Nash: game theory, joint-stock company, Julian Assange, mass incarceration, meta analysis, meta-analysis, microcredit, moral hazard, mutually assured destruction, Nate Silver, Network effects, Nick Leeson, offshore financial centre, patent troll, phenotype, pre–internet, principal–agent problem, prisoner's dilemma, profit maximization, profit motive, race to the bottom, Ralph Waldo Emerson, RAND corporation, rent-seeking, RFID, Richard Thaler, risk tolerance, Ronald Coase, security theater, shareholder value, slashdot, statistical model, Steven Pinker, Stuxnet, technological singularity, The Market for Lemons, The Nature of the Firm, The Spirit Level, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, too big to fail, traffic fines, transaction costs, ultimatum game, UNCLOS, union organizing, Vernor Vinge, WikiLeaks, World Values Survey, Y2K, zero-sum game

To encourage people to act in the competing group interest, society implements a variety of societal pressures. Moral: Moral teaching not to harm others. Reputational: Society ostracizes those who turn against their own people. Institutional: Laws against war crimes. Security: None. In 2005, Captain Ian Fishback exposed the U.S.'s use of torture in Iraq because of his religious convictions. Similarly, Bradley Manning had to deal with two competing societal dilemmas in 2010 when he allegedly became a whistle-blower and sent 250,000 secret State Department cables to the anti-secrecy group WikiLeaks, which made them public.5 Like the Libyan pilots, he chose to defect from the government and cooperate with what he perceived as the country as a whole. His subsequent treatment by the U.S. government—which incarcerated him, stripped him of due process, and tortured him—is in part a societal pressure by the government to prevent copycat defections.

pages: 525 words: 116,295

The New Digital Age: Transforming Nations, Businesses, and Our Lives by Eric Schmidt, Jared Cohen


3D printing, access to a mobile phone, additive manufacturing, airport security, Amazon Mechanical Turk, Amazon Web Services, anti-communist, augmented reality, Ayatollah Khomeini, barriers to entry, bitcoin, borderless world, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, crowdsourcing, data acquisition, Dean Kamen, drone strike, Elon Musk, failed state, fear of failure, Filter Bubble, Google Earth, Google Glasses, hive mind, income inequality, information trail, invention of the printing press, job automation, John Markoff, Julian Assange, Khan Academy, Kickstarter, knowledge economy, Law of Accelerating Returns, market fundamentalism, means of production, mobile money, mutually assured destruction, Naomi Klein, offshore financial centre, Parag Khanna, peer-to-peer, peer-to-peer lending, personalized medicine, Peter Singer: altruism, Ray Kurzweil, RFID, Robert Bork, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, social graph, speech recognition, Steve Jobs, Steven Pinker, Stewart Brand, Stuxnet, The Wisdom of Crowds, upwardly mobile, Whole Earth Catalog, WikiLeaks, young professional, zero day

Information criminals would almost certainly traffic in bulk leaks in order to cause maximum disruption. To some extent, leaking selectively reflects purpose while releasing material in bulk is effectively thumbing one’s nose at the entire system of secure information. But context matters, too. How different would the reaction have been, from Western governments in particular, if WikiLeaks had published stolen classified documents from the regimes in Venezuela, North Korea and Iran? If Bradley Manning, the alleged source of WikiLeaks’ materials about the United States government and military, had been a North Korean border guard or a defector from Iran’s Revolutionary Guard Corps, how differently would politicians and pundits in the United States have viewed him? Were a string of whistle-blowing websites dedicated to exposing abuses within those countries to appear, surely the tone of the Western political class would shift.

pages: 493 words: 132,290

Vultures' Picnic: In Pursuit of Petroleum Pigs, Power Pirates, and High-Finance Carnivores by Greg Palast


anti-communist, back-to-the-land, bank run, Berlin Wall, Bernie Madoff, British Empire, capital asset pricing model, capital controls, centre right, Chelsea Manning, clean water, collateralized debt obligation, creative destruction, Credit Default Swap, credit default swaps / collateralized debt obligations, Donald Trump, energy security, Exxon Valdez, invisible hand, means of production, Myron Scholes, offshore financial centre, random walk, Ronald Reagan, sensible shoes, transfer pricing, uranium enrichment, Washington Consensus, Yogi Berra

They wanted President Bush to complain to the UK government, but quietly. The American companies could have sued BP for their losses. But the club clearly thought it prudent to keep silent. That silence is complicity. The cable came from the U.S. Embassy in Baku. Who had the steel, the courage, the noblesse and fearlessness to bust this open to make this cold cable public? No, not one of Baba’s prisoners. He’s one of President Obama’s prisoners: Private Bradley Manning. While I’ve been hunting the globe for evidence of oil industry killings, I’ve also been hunting for a much more difficult set of clues: to the source of human courage. Manning’s is immeasurable. Soldier Manning, in prison inside the Quantico Marine Base near Washington, DC, sleeps in nothing but his underpants. Not by choice. He’s on suicide watch, even though no psychiatrist could be coaxed into saying Manning wants to kill himself.

pages: 436 words: 125,809

The Way of the Gun: A Bloody Journey Into the World of Firearms by Iain Overton


air freight, airport security, back-to-the-land, British Empire, Chelsea Manning, clean water, Columbine, David Attenborough, Etonian, Ferguson, Missouri, gender pay gap, gun show loophole, illegal immigration, interchangeable parts, Julian Assange, knowledge economy, Louis Pasteur, Mahatma Gandhi, More Guns, Less Crime, offshore financial centre, Ronald Reagan, Y2K, Yom Kippur War

Nervous and a little self-conscious, he was unused to the media spotlight and here he was being asked about a set of documents his whistleblowing organisation, Wikileaks, had just released: a cache of military reports that exposed the truth about America’s war in Afghanistan. Julian had some of the most controversial secret documents ever to find their way to the light of day. Millions of files from the US diplomatic and military operations overseas that had been leaked by US soldier Bradley Manning. And I was there, as the editor of the London-based Bureau of Investigative Journalism, to see if my outfit could have a peek. Julian, interested in the Bureau’s ability to make documentary films, was keen to see if the contents of another set of files, this time the Iraq War military reports, could end up on TV channels the world over. It was a treasure trove of documents that proved there were war crimes and human rights abuses, incompetence and intrigues on the part of the US military in Iraq.

pages: 870 words: 259,362

Austerity Britain: 1945-51 by David Kynaston

Alistair Cooke, anti-communist, British Empire, Chelsea Manning, collective bargaining, continuous integration, deindustrialization, deskilling, Etonian, full employment, garden city movement, hiring and firing, industrial cluster, invisible hand, job satisfaction, labour mobility, light touch regulation, mass immigration, moral panic, Neil Kinnock, occupational segregation, price mechanism, rent control, reserve currency, road to serfdom, Ronald Reagan, stakhanovite, strikebreaker, the market place, upwardly mobile, urban planning, urban renewal, very high income, wage slave, washing machines reduced drudgery, wealth creators, women in the workforce, young professional

‘The war’s got us down, what with the bombing and the blackout, and the worrying about coupons and queues, women like me haven’t the mind to take to politics,’ a Fulham resident told Mass-Observation early in the campaign. ‘We want to be left alone for a bit – not worrying about speeches.’ A woman from Bayswater agreed: ‘I don’t take any interest in it. Not a scrap. To me it’s an awful lot of tommy rot, what with each party running the other down, and when they get in, they’ll be bosom pals.’ A Chelsea man was the most succinct: ‘Dunno who I’ll vote for. I don’t like politicians anyway – they’re all crooks.’ In mid-June an M-O survey of Londoners as a whole found that only one in seven was ‘happy or elated’, that a third ‘felt no different from during the war’, that a quarter ‘felt worried’, that 15 per cent ‘felt depressed’, and that several ‘simply said that there ought not to be an election yet’.