Table of Contents
Surveillance Valley Index
Return to Surveillance Valley, History of the Internet and History of Silicon Valley, Advanced Research Projects Agency (ARPA)
Advanced Network Services, 122
advertising and marketing
Apple’s “1984” ad, 115–116
Facebook, 170
Google’s targeted advertising system, 5, 152–153, 159–161
Internet revolution as liberating technology, 6
political campaigns, 170–171
public relations response to Sputnik launch, 16–17
AdWords, 152–153
Afghanistan: WikiLeaks data, 243
African Americans. See race
Agent Orange, 14–15
Air Force, US: Social Radar initiative, 189–190
Algeria: Arab Spring, 248
Allo app, 258
al-Qaeda, 142, 199, 265
Amazon
CIA as client for, 180
monitoring and profiling individuals, 169–170
Signal app data, 265
American Airlines, 81–82
American Civil Liberties Union (ACLU), 245
American Institutes for Research (AIR), 29–30
Angry Birds, 169
anonymous communication. See Tor/Tor Project
Anonymous movement, 212
ANS CO+RE Systems, 122
ANSNET, 122
Anthropometric Survey of the Royal Thai Armed Forces, 53–54
anticipatory intelligence, 189–190
anti-communist activities and sentiment
covert government initiatives, 23–24
Radio Free Asia, 254–255
Simulmatics Corporation work, 65–66
Stewart Brand, 107–108
tabulating racial data on immigrants, 55–56
William Godel’s counterinsurgency efforts, 22
See also Cold War
antisurveillance movement. See privacy
AOL, 154–156
Appelbaum, Jacob
background, 239–242
Julian Assange and WikiLeaks, 242–245, 247
Moxie Marlinspike’s Signal, 257
privacy movement, 245–247
32C3, 221–222
Tor encryption, 260
training Arab Spring protesters in social media use, 250
training political activists around the world, 251–253
Apple
“1984” ad, 115–116
personal computers, 124–126
Signal data, 265
Arab Spring protests, 247–251, 254
ARPA (Advanced Research Projects Agency)
anthropomorphic data on Thais, 53–54
anti-communist operations, 23–24
Brand’s advocacy for, 105–106
collaborative computer technology for civilian use, 57–59
Command and Control Research program, 48–51
communications technology research, 35–37
computer and networking technology development for counterinsurgency, 51–59
creation and objectives of, 16–18
cybernetics, 111–112
defoliation in Vietnam, 15
history of NSA involvement, 191
Nicholas Negroponte, 130
Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145
Project Camelot, 67–68, 160
psychological warfare programs, 28–31
Stanford Industrial Park presence, 145
student protests against, 69–71
surveillance systems in Vietnam, 24–25
Tunney’s congressional investigation of domestic surveillance, 90–93
See also ARPANET
ARPANET
ARPA and communes, 111–112
as tool of repression, 8
Cambridge Project, 68
connecting the network, 59–62
early Internet development, 6–7
exposé on domestic data files, 87–90
Godel’s counterinsurgency operations, 21
government spying on civilians, 187–188
Larry Page’s connection, 144
privatization of the technology, 117–121
routing system protocol design, 93–97
spying on Americans with, 73–75
student protests targeting, 62–64
Tunney hearings on domestic surveillance, 90–93
Ars Technica, 196–197
art galleries, crypto culture and, 210–211
artificial intelligence (AI), cybernetics and, 47
Artificial Intelligence Laboratory, Stanford University, 104–107
artillery, 38–39
Assange, Julian, 220–222, 242–247
Atlantic Monthly, 82–84
Atlantis, 261
Atlas Shrugged (Rand), 109
Augmentation Research Center, 50–51, 112
backbone of the Internet, 119–123, 127, 191–192
backdoor hacks: Tor Project, 223
BackRub, 149
Bamford, James, 238
Baran, Paul, 61
Barlow, Perry, 228
Bechtolsheim, Andy, 151
Beck, Glenn, 199
Bell Labs, 145
Ben Ali, Zine El Abidine, 248
Beria, Lavrentiy, 37
Berman, Ken, 228–230, 246–247
Bezos, Jeff, 169–170, 180
Bitcoin, 201–202, 205
Blue, Violet, 240
Blue Origin missile company, 180
Bolt, Beranek and Newman, 92–93, 191
Brand, Stewart, 101(quote), 104–116, 131–132, 134, 137, 152
Brantingham, Jeffrey, 165–168
Brautigan, Richard, 112, 183–184
Brin, Sergey, 5, 139–140, 139(quote), 140–141, 147–153, 157, 163–164, 173–175, 208
Broadcasting Board of Governors (BBG)
China’s censorship of radio and Internet, 234–236
Cold War origins of, 231–233
Consolidated Appropriations Act, 254
Internet Freedom policies and digital weapons, 234–236
Jacob Appelbaum and, 241–242
Radio Free Asia, 258
Russian Deployment Plan, 236–239
Tor, WikiLeaks, and US Intelligence, 245–247
Tor Project funding, 222–224, 228–230, 236
Burton, Fred, 182
Bush, George W., 141–142, 193
Cambridge Project, 63–65, 68, 90, 130, 160–161
Carnegie Mellon University, 147, 263–264
censorship
China’s censorship of CIA radio propaganda and Internet, 234–236
Russian Deployment Plan, 236–239
Tor Project as weapon against Internet censorship, 236–239
training Arab Spring protesters in social media use, 250
US foreign policy targeting China’s Internet censorship, 234–236
Census, US, 54–55
Central Intelligence Agency (CIA)
anti-terrorist activities, 142
ARPA’s Command and Control, 49–50
as Amazon client, 180
congressional hearings on domestic surveillance, 91–92
congressional investigations of radio networks, 233
counterinsurgency in North Vietnam and Laos, 21
covert communication, 224–225
exposé on domestic surveillance, 89
Godel’s work with, 19
Google’s involvement with, 5
hacking tools targeting smartphones, 265–266
Internet Freedom weapons, 235
Keyhole Incorporated, 174–176
LSD study, 108
Oakland’s DAC, 3–4
open source intelligence, 188–189
origins of the BBG, 231–233
predictive policing, 167
protesters targeting the Cambridge Project, 69–70
Radio Free Asia, 234, 254–255
Snowden’s employment, 197–198
spying on Americans with ARPANET, 73–75
Tor Project funding, 230
Cerf, Vint, 93–96, 120–121, 176
Chen, Adrian, 201
child pornography network, 205, 262
Chile: Project Camelot, 67–68
China
anti-censorship activities, 234–239
CIA propaganda targeting, 232–234
using Tor anonymity in, 205
Chomsky, Noam, 71
Ciabattari, Scott, 179
civil rights activists, 8, 76–78, 187
Clapper, James R., 193
Clinton, Bill, 127
cloud computing: Google penetration into the private sector, 178–179
Cohen, Jared, 181
Cold War
anti-communist operations, 23–24
CIA radio propaganda, 232–233
origins of the BBG, 231–233
Combat Development and Test Center, 24–25, 53
Command and Control Research program (ARPA), 15, 48–51, 53, 59, 64–65
communes, 109–112
Communications Assistance for Law Enforcement Act (1994), 227–228
communications technology. See telecommunications technology
Community Online Intelligence System (COINS), 91–93
computer technology
artillery trajectory calculations, 39–40
Command and Control Research program, 47–49
computer and networking technology development for counterinsurgency, 51–59
cryptography research, 38
cybernetics, 42–51
ENIAC computer, 39–41, 117
SAGE, 41–42
ComputerWorld magazine, 134
Congress
CIA investigation, 233
Consolidated Appropriations Act, 254
domestic surveillance hearings, 84–87
privatization of the Internet, 126–127
Tunney’s congressional investigation of ARPA, 90–93
Wired magazine and Internet infrastructure, 135
Consolidated Appropriations Act (2014), 254
containment policy, 231
CONUS Intel (Continental United States Intelligence), 76–80, 84–85, 87–88
Cooke, David, 91–93
corporate sector
backing Internet Freedom policies, 234–236
Bay Area boom, 102–103
collaborative computer technology for civilian use, 57–59
database construction, 81–82
expansion of data mining, 169–173
interactive computing, 51
military involvement, 5–6
NSA PRISM program, 192–193
personal computers and Internet access, 124–126
predictive policing, 165–168
privatization of the Internet, 121–124, 126–127
profiting from weaponization of the Internet, 267–269
Silicon Valley start-ups, 145
Stanford Industrial Park, 145
Stewart Brand’s realignment with, 113–114
Tor Project support, 227
use of World War II camp labor, 272–274
See also Google
Correa, Rafael, 221
counterculture, 107–109, 112–113
counterinsurgency
Cambridge Project, 68–69
computer and networking technology development for, 51–59
congressional hearings on domestic surveillance, 86–87
CONUS Intel targeting domestic activists, 75–80
Godel’s anti-communist objectives, 22
Ithiel de Sola Pool’s research, 65–66
Nicaragua, 129–130
origins of networking technology, 7
predictive models and profiling individuals, 160–161
Project Agile in Vietnam, 24–25
Project Camelot, 67
psychological warfare, 27–33
spying on American protesters, 75–80
strategic elements, policy, and doctrine, 27–31
student protests targeting ARPANET, 63–64
technology during the Vietnam War, 13–14
US history of, 21
US psychological warfare, 20
See also domestic surveillance and counterinsurgency
coups d’état, 67–68, 221
crime
celebrating Tor’s role in, 209–210
predictive policing, 165–168
Silk Road, 201–205, 260–262
CrowdStrike, 181JigSaw181
The Crypto Anarchist Manifesto (May), 185(quote)
crypto culture, 209–211. See also Tor/Tor Project
cryptography research, 38, 225–226
cults, 109–111
Cultural Logic of Computation (Golumbia), 45
Curtis, Adam, 109–111
cybernetics
as defense technology, 47–51
communes and, 112–113
Hackers’ Conference, 114–116
MIT cybernetics program, 42–46
New Communalists, 109–112
Cybernetics (Wiener), 44–45
cyberpunk movement, 115
cyberspace, 115
cypherpunks, 203–204
dark web. See Tor/Tor Project
DARPA (Defense Advanced Research Projects Agency)
Agent Orange development, 15
Digital Library Initiative, 147
early warning intelligence, 190
Google involvement with, 181
origins of networking technology, 6–7
Tor Project, 226–227
Total Information Awareness project, 161
See also ARPA
data banks. See databases
data collection and mining
AOL search logs revealing personal identity, 156–157
ARPA’s Southeast Asia programs, 52–53
Brin’s interest in, 148
Cambridge Project, 68–69
early tabulation technology, 55–56
Google and Gmail, 157–159
Google as government contractor, 173–178
Google search engine algorithm, 149–150
Google’s expansion into multiple markets, 171–173
Google’s penetration into civil society, 179–181
NSA PRISM program, 192–193
predictive modeling using search engine data, 160–161
search engine development, 151–152
secrecy over user search data, 153–156
US Army database, 79–80
data sharing: Oakland’s Domain Awareness Center, 2
databases
American Airlines SABRE, 82
congressional hearings on domestic surveillance, 84–87, 90–93
digitizing data, 80–84
death threats, 211–212, 216
Deep Web (documentary), 209
Defense Communication Agency, 93
defoliants, 13–15
democracy promotion, 251
Democratic National Convention, 265
Department of Homeland Security (DHS): Silk Road, 261–262
Dingledine, Roger, 202, 214, 225–227, 229–230, 236–241, 245–247, 251, 253, 258, 263
Diplomatic Security, 182
Doctorow, Cory, 258
Domain Awareness Center (DAC), 1–5
domestic surveillance and counterinsurgency
bringing military technology to, 75–80
Ford Rowan’s exposé, 73–75, 87–90
growth of corporate and government databases, 82–84
Sam Ervin’s congressional hearings, 84–87
Tunney’s congressional investigation of ARPA, 90–93
Dow Chemical, 69
Dread Pirate Roberts, 201–204, 260–262
Silk Road, 205
The Dream Machine (Waldrop), 51
drones, 52
drug use: Vietnam War, 31–32
dual use technology, 57–59
Dugan, Regina, 180–181
Duo app, 258
“dynamations,” 47–48
early warning systems, 37–38, 67, 189–190
Earth Day festival, 78
eBay, 169–170, 180
economics: importance of cybernetics, 45
eco-technics, 110
Ecuador, 221
education
“dynamations,” 47–48
Google penetration into public schools, 179
Edwards, Douglas, 141–142, 153–154
EGOTISTICAL GIRAFFE, 265
Egypt: Arab Spring, 248
Eisenhower, Dwight, 16–17
elections: data-driven campaigning, 65
Electric Word magazine, 129
electronic fence technology, 27
Electronic Frontier Foundation (EFF)
Signal, 258
Tor, Assange, and WikiLeaks, 245
Tor Project funding, 212–213, 227–228
Wired magazine connection, 136
Electronic Privacy Information Center, 162
Ellsberg, Daniel, 209
email, 157–164
encryption: Moxie Marlinspike and Signal, 257
Engelbart, Douglas C., 50, 112, 145
ENIAC computer, 39–41, 117
Erskine, Graves, 19–20
Ervin, Sam, 84–88
Ethical Tor Research guide, 263–264
face recognition: Oakland’s Domain Awareness Center, 1–2
Facebook, 170, 180–181, 194–195, 209, 258
Falun Gong, 235
The Family, 110–111
Federal Bureau of Investigation (FBI)
building a database, 80–81
exposé on domestic surveillance, 89
NSA PRISM program, 192–193
Silk Road, 203, 261–262
Federal Communications Commission (FCC), 135
Ferguson, Richard, 89–90
Fight for the Future, 258
Figueroa, Liz, 162–164
First Lighting, 37–38
foreign policy, US
BBG’s Russian Deployment Plan, 237–238
fighting Internet censorship, 234–236
The Fountainhead (Rand), 239–240
Fowler, Donnie, 167–168
France: US clandestine ops in Vietnam, 19–20
fraud, Project Agile as, 32–33
Freedom of Information Act, 223
Gaddafi, Muammar, 248
Gellman, Barton, 199
Geneva Conventions, 15
gentrification: San Francisco and Oakland, 2–4
GeoEye-I satellite, 181
Gibson, Randall, 110, 115
Gilder, George, 102, 135
Gingrich, Newt, 135
Gmail, 157–164, 179–180
Godel, William, 13–15, 18–22, 27–33, 51–53, 145
Golumbia, David, 45
as government contractor, 173–178
buying companies and start-ups, 169–173
civilian, military and intelligence penetration, 178–182
early users, 143
equating with government, 182–184
Gmail, 157–164
JigSaw, 181–183
Keyhole Incorporated takeover, 175
Lockheed Martin partnership, 176–177
National Geospatial-Intelligence Agency partnership, 177–179
NSA PRISM program, 194–195
Oakland’s Domain Awareness Center and, 4–5
predictive policing, 167–168
predictive system, 161
public stock offering, 164–165
search engine, 149–150
search engine development, 151–152
secrecy over user search data, 153–155, 157
September 11, 2001, 139–141
Signal encryption, 258, 265
Snowden and, 208–209
tailoring searching through profiling, 150
targeted advertising system, 5
Google Earth, 173–176
Google Federal, 176, 178–179
Gore, Al, 102, 164
Great Firewall of China, 235, 256
Great Intergalactic Network, 59–61
Greenberg, Andy, 245, 258
guerrilla activity: US clandestine ops in Vietnam, 19–20
hacker community
defense origins of the Tor Project, 225–226
hacking Tor, 263–265
Jacob Appelbaum’s history, 239–242
Tor Project, 220–222
working for the government, 225–226
Hackers’ Conference, 115–116
Hafner, Katie, 60
Halliday, John T., 26
Hamburg, Germany, 219–222
Hanke, John, 174
Hard Landing (Petzinger), 82
Harrison, Sarah, 220
Harvard University, 62–64
HavenCo, 220
Hayden, Michael, 199–200
Heidinger, Willy, 56–57
Herzfeld, Charles, 47
Hess, Karl III, 128–129
Hitler, Adolf, 43, 56–57, 272
Hollerith, Herman, 54–56
Honduras, 129–130
Hoofnagle, Chris, 161, 164–165
Hoover, J. Edgar, 80–81
hosting companies, 220
Hotmail, 158
The Human Use of Human Beings (Wiener), 46
IBM (International Business Machines)
Hollerith tabulation technology, 54–56
Nazis’ use of IBM machines, 272–273
personal computers, 124–126
privatization of the Internet, 121–124
Regional Enforcement Information Network, 81
ICEWS (Integrated Crisis Early Warning System), 190
identity, AOL search logs revealing, 155–157
I’m Feeling Lucky: The Confessions of Google Employee Number 59 (Edwards), 141, 154
immigration: Hollerith’s tabulator machine, 54–56
“In the Pay of the CIA” (television program), 233
In the Plex (Levy), 152
infrastructure, Internet, 135
Inouye, Daniel, 126
In-Q-Tel, 167, 174–175, 189, 235
Intel, 145
Intelligence Advanced Research Project Agency, 189–190
intelligence community
ARPA’s Southeast Asia programs, 52–53
connection with the Tor Project, 245–247
CONUS Intel, 76–79
covert communication for espionage agents, 224–228
open source intelligence, 188–190
Project Camelot, 67–68
spying on Americans with ARPANET, 73–75
Tor Project enhancing and facilitating, 223–224
Tor Project funding, 228–230
use of social media, 188–189
See also Central Intelligence Agency; Central Intelligence Agency (CIA)
intelligent systems, 96
Intellipedia, 177
interface message processors (IMPs), 61
Internet
as a mirror of the world, 273–274
as liberating technology, 6
as religious experience, 132–133
Augmentation Research Center, 50–51, 112
China’s censorship, 234–236
exponential growth, 146–147
military origins of, 14–15, 41–42
origins of networking technology, 6–8
penetration into China, 234
privatization of, 116–117
Internet Freedom, 234–236, 247, 251, 254, 258–259, 267–269. See also privacy
Internet service providers, 127–128, 135–136
Iran: censorship wars and anonymity, 205, 235–236
Iraq: WikiLeaks data, 243
Isenberg, Nancy, 73(quote)
Jacobsen, Annie, 20–21, 53
JigSaw, 181–182
Jobs, Steve, 109, 116
Johnson, Roy, 17–18
Jordan: Arab Spring, 248
Kahn, Robert, 93–96
Kapor, Mitch, 135
Kelly, Kevin, 101–102, 132–133
Kennan, George, 231
Kennedy, John F., 13–15, 23–24, 35–36, 65
Kent State University, 75
Kesey, Ken, 107–108
Keyhole Incorporated, 173–176
King, Martin Luther, Jr., 75
Kleiner Perkins, 151
Koogle, Tim, 151
Korean War, 19
Kosovo Privacy Project, 228
Kotkin, Stephen, 233
Kucherena, Anatoly, 254
labor unions, 55–56
Lackey, Ryan, 220
Lansdale, Edward, 21, 24, 31
The Last Stand of the Psychocultural Cold Warriors (Rhode), 66
Latin America
CIA propaganda projects, 232–233
training global activists in social media use, 249
law enforcement databases, 80–81
Lee, Micah, 200–201, 214–215
Levy, Steven, 152
Lewman, Andrew, 246
libertarianism, 128–129
Libya: Arab Spring, 248
Licklider, J.C.R., 35–37, 42, 47–53, 57–59, 61, 63–65, 68, 70–71, 76, 111–112, 191
Lincoln, Abraham, 187
Lincoln Lab (MIT), 40–42, 60
Lockheed Martin, 177, 190
Los Angeles Police Department, 79
Lukasik, Stephen, 92
Lycos search engine, 147
Lyon, Matthew, 60
Machine Architecture Group (MAG), 130
Machine-Aided Cognition (MAC), 50
Malone, John, 135
Manning, Chelsea (née Bradley), 243, 267
Marlinspike, Moxie, 257
Massachusetts Institute of Technology (MIT)
Cambridge Project, 64–65
cybernetics, 42–46
early defense technology, 41–42
Machine-Aided Cognition, 50
Stanford and, 145
student protests targeting ARPANET, 62–64, 69–71
Mathewson, Nick, 225–226
Mauthausen, Austria, 271–274
May, Timothy C., 185(quote), 203
McCarthy, Eugene, 77–78
McElroy, Neil, 16–17, 91
MCI: privatization of the Internet, 121–124, 127–128
McLaughlin, Andrew, 164, 258
McNamara, Robert, 36
Meredith, Dan, 255
Metcalfe, Jane, 129, 131
Microsoft: NSA PRISM program, 193
Middle East, 247–248
Mid-West News, 79
military activities
ARPANET classified data collection, 92–93
ARPANET routing protocols, 96–97
FaceBook involvement in, 180–181
Google involvement in, 5
Google surveillance mirroring military surveillance, 160–165
Kosovo Privacy Project, 228
Negroponte’s MAG, 130
prediction and profiling, 160–161
Project Agile in Vietnam, 24
regional counterinsurgencies, 23
Sputnik I launch, 15–18
Tor funding, 247
Tor Project and the privacy movement, 223–228, 238–239
US counterinsurgency operations in North Vietnam, 21
Vietnam War-era technology, 13–15
WikiLeaks data, 243
Miller, Arthur R., 82–84
MIT Media Lab, 130–131
mouse, computer, 50–51
Murray, Charles, 30
MUSCULAR (NSA program), 191–192
music streaming, 169
Musk, Elon, 180
Nakamoto, Satoshi, 201–202
NASA (National Aeronautics and Space Administration), 18
National Crime Information Center, 80–81
national data banks, 81
National Data Center, 81, 83–84
National Geospatial-Intelligence Agency, 174–175, 177
National Military Command System, 51
National Oceanic and Atmospheric Administration (NOAA), 178–179
National Science Foundation (NSF), 117–122, 127
National Security Agency (NSA)
accessing individuals’ cellphone data, 265–266
Amazon’s involvement with, 180
ARPA’s Command and Control, 50
covert communication, 224–225
cryptography technology, 38–39
Edward Snowden’s activities, 252–254
establishment and mandate of, 190–191
Google’s involvement with, 5
hacking and cracking Tor, 264–265
Patriot Act, 141–142
taking down criminal networks, 262–263
Total Information Awareness project, 161
US Army domestic surveillance files, 88–90
See also Snowden, Edward
National Security Council Directive 10/2, 231–232
NATO bombing in Kosovo, 228
Naval Research Laboratory, Washington, DC, 224
Nazi Germany
tabulation technology in death and labor camps, 56–57
use of IBM machines, 272–273
Negroponte, Nicholas, 129–132, 138
Netflix, 169
Netscape, 102–103
network warfare, 235
networking technology
ARPANET, 59–62
ARPANET’s routing system protocols, 93–97
Augmentation Research Center, 50–51, 112
Cambridge Project, 64–65
Command and Control Research program, 48–49
congressional hearings on domestic surveillance, 84–87
counterinsurgency technology, 51–59
increasing private access to, 124–126
Licklider’s “thinking centers,” 57–59
military and intelligence use of ARPANET data, 92–93
NSA PRISM program, 193–196
NSFNET, 118–121
origins of, 6–8
Telecosm, 102
Neuromancer (Gibson), 115
New Communalists, 108–109, 112–113
New Economy, 133–134, 143
Nixon, Richard, 16
North, Newton Dexter, 55–56
North Africa, 247–248
North Korea: Radio Free Asia, 255
North Vietnam: US counterinsurgency operations, 21
NSFNET, 118–119, 122–123, 125–127, 134, 168
nuclear weapons
ARPA testing, 18
cybernetics and, 45–46
early Cold War preparation for nuclear war, 231–232
Soviet’s first tests, 37–38
US surveillance on Soviet communications, 21–22
Oakland, California, 1–4
Obama, Barack, 193, 198
Octoputer, 64
Oman: Arab Spring, 248
Omidyar, Pierre, 169–170
onion router, 225, 227
open source code: Tor Project, 223
open source intelligence, 188–190
Open Technology Fund (OTF), 255–257, 259–260
Open Whisper Systems, 210, 257
Operation Argus, 18
Operation Iraqi Freedom, 175
Operation Omynous, 262
Operation Ranch Hand (1962), 15
origins of networking technology, 6–7
packet satellite networking, 94
Page, Larry, 5, 140, 143–155, 157, 159–160, 163–164, 173–174, 195–196
PageRank, 149
Paglen, Trevor, 210
Painter, Rob, 175–176
Pando magazine, 5, 210, 215, 217
Pandora, 169
parallel network. See Tor/Tor Project
PATHAR, 189
Patriot Act (2001), 141–142
PayPal, 180
pension system, tabulator use in, 56
The Pentagon’s Brain (Jacobsen), 20, 53
personal computers, 124–126
Petzinger, Thomas, Jr., 82
Phoenix Program, 31
Plan X, 180–181
Playpen website, 262
Pogue, David, 158, 164
Poindexter, John, 161
Poitras, Laura, 220, 252, 257–258
police surveillance
eBay’s internal police, 180
Google involvement in, 178
Oakland’s Domain Awareness Center, 1–5
predictive policing, 165–168
using social media to monitor activists, 188
political campaigns, 170–171
political control
Project ComCom and Pool’s vision, 66–67
student protests against ARPANET, 64
political science: importance of cybernetics, 45
Politics, Personality, and Nation-Building (Pye), 65–66
Pool, Ithiel de Sola, 64–67, 111
Poor People’s March on Washington, 78
Poulsen, Kevin, 206
predictive models, 160–168, 189–190
PredPol Inc., 165–168
PRISM surveillance program, 192–196, 265
privacy
Google and Gmail tracking users, 157–163
government funding for Tor, 213–215
Jacob Appelbaum, 221–222
Open Technology Fund, 256
Snowden’s views on, 200
32C3, 220
Tor Project’s military connections, 223–228
weaponization of, 222
See also Tor/Tor Project
privatization of the Internet, 116–124, 126–128, 135–137, 168–173
PRNET (packet radio network), 94
profiling individuals, 158–164, 213–214. See also data collection and mining
Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145
Project CAM. See Cambridge Project
Project Camelot, 67–68, 160
Project ComCom, 66
Project Igloo White, 25–27
propaganda
CIA’s Cold War media funding, 232–233
Ithiel de Sola Pool’s research, 65–66
protests
anti-Vietnam War protesters, 108
Arab Spring, 247–251
congressional hearings on domestic surveillance, 86
early warning against leftist revolutions, 67
exposé on domestic surveillance, 89–90
spying on American protestors with ARPANET, 73–80
student protests against the Vietnam War and the Cambridge Project, 69–71, 90, 108
targeting the Stanford Research Institute, 105–106
PSINET, 124–126
psychological warfare, 20, 27–33, 65–66, 232–233
punch card technology, 54–55
Pye, Lucian, 65–66
Pyle, Christopher, 35(quote), 76, 79, 84
Quittner, Joshua, 136
race
CONUS Intel targeting civil rights activists, 76–78
“dynamations,” 47–48
early racial data tabulation, 55–56
proposed counterinsurgency tactics against African Americans, 30–31
radar systems: early warning against leftist revolutions, 67
radiation exposure, 37
Radio Free Asia, 232–234, 254–255, 258
Radio Free Europe, 232–233
Radio Liberation From Bolshevism (Radio liberty), 232–233
Ramparts magazine, 29–30
Rand, Ayn, 109, 128–129, 239–240
RAND Corporation, 28–29, 32
Redirect Method, 182
regime change, 182, 251
Regional Enforcement Information Network, 81
revolution, technology, 101–106
Rhode, Joy, 66–67
Rich, Nathaniel, 245
Roberts, Lawrence, 59–62
robotics
gerbil experiments in project SEEK, 130
MIT cybernetics program, 42–43
surveillance systems in Vietnam, 25
See also cybernetics
Rolling Stone magazine, 104–105, 244–245, 250
Ross, Alec, 248–249
Rossetto, Louis, 101–102, 128–129, 131–134, 137–138, 143, 203
routing system protocol design, 93–97
Rowan, Ford, 73–75, 87–90, 97
Russia
BBG’s anti-censorship activities and policies, 236–239
Snowden’s escape to, 199, 207
Tor’s Deployment Plan, 253
See also Soviet Union
Russian Deployment Plan, 236–239
Russo, Anthony, 32–33
SABRE (Semi-Automated Business-Related Environment), 82
SafeWeb proxy, 235
Sandberg, Sheryl, 153
Sandvik, Runa, 206
satellite technology, 15–18, 94
SATNET, 94
Schmidt, Eric, 173, 181JigSaw181
Schrader, William, 123–124, 126
Science Applications International Corporation (SAIC), 3–4
Scott, Ridley, 115
search engines, 102–103, 148–149, 151
search logs, 153–158
security
crypto apps, 258–260
political interests and weaponization of the Internet, 268–269
Signal and other secure apps, 265–266
Silk Road, 260–262
See also Tor/Tor Project
Semi-Automatic Ground Environment (SAGE), 41–42, 82
September 11, 2001, 139–141
Sequoia Capital, 151
The Shadow Factory (Bamford), 238
Shepard, Andrea, 216
Shockley, William, 145
Signal app, 210, 257–258, 265–266
Sikorsky H-34 helicopter, 13–14
Silk Road, 201–205, 260–262
Simulmatics Corporation, 65–66
slave labor, 272–274
smartphones, CIA hacking tools targeting, 265–266
Snow Crash (Stephenson), 174
Snowden, Edward
background and work experience, 196–199
blowing the whistle on the NSA, 185–187
global NSA spy implants in the Internet backbones, 191–192
government involvement in supporting and cracking Tor, 264–265
history of surveillance, 75
Jacob Appelbaum and, 222
NSA PRISM program, 193–196
political interests and philosophy, 199–201, 269
privacy movement, 259
Signal and Tor endorsement, 258
the Internet as evil entity, 207–208
Tor Project connection to WikiLeaks, 205–211, 252–254
soap operas, 16–17
social media
Anonymous movement and the author, 212
Arab Spring protests, 247–251
backing Internet Freedom policies, 234–236
police use to monitor activists, 188–189
predictive policing, 167
sociology: importance of cybernetics, 45
South Vietnam, 13–15
Southeast Asia
CIA propaganda projects, 232–233
intelligence and data collection, 52–53
See also Vietnam
Soviet Union
first nuclear test, 37–38
Pool’s Project ComCom, 66
Sputnik I launch, 15–18
See also Cold War
Space and Naval Warfare Systems Command, 247
Space Race: Sputnik I launch, 15–18
SpaceX, 180
Sputnik I launch, 15–18, 41
Stanford Artificial Intelligence Laboratory, 104–107
Stanford Digital Libraries project, 146
Stanford Research Institute
Augmentation Research Center, 50–51, 112
Brin and Page, 144–145, 147–149
powering up ARPANET, 61–62
Stewart Brand, 111–112
student protests against ARPA, 69
Stanton, Edwin, 187
State Department, US
Google’s involvement with, 182–183
Tor Project funding, 238–239
training global activists in social media use, 249–250
State of the Onion, 220
statistics: Hollerith’s tabulator machine, 54–56
Steele, Shari, 220–221
Stephenson, Neal, 174
Strategic Hamlet initiative, 29
student protest, 8, 62–64
Students for a Democratic Society (SDS), 62–64, 70
Summers, Larry, 153
Sun Microsystems, 151
surveillance technology
growth of corporate and government databases, 82–83
military operations in Vietnam, 25–26
Snowden’s views on, 200
Tor’s lack of protection against, 213–214
Syria: Arab Spring, 248
Syverson, Paul, 224–225
tabulation machine, 54–55, 80, 272–273
TCP/IP (Transmission Control Protocol/Internet Protocol), 95–96
Technology, Entertainment, and Design Conference (TED), 131
technology revolution, 101–106
Technospies (Rowan), 90
Telecommunications Act (1996), 127
telecommunications technology
cybernetics and, 43–46
defense need for anonymous communication capability, 224–225
early defense communication systems development, 35–37
history of government spying, 187–188
Internet Freedom policies and digital weapons, 234–236
modeling the Soviet internal system, 66
Signal app, 257–258
Telecosm (Gilder), 102
terrorist activities, 140–142, 161–162
Tesla, Nikola, 144
Thailand
anthropomorphic survey on Thais, 53–54
psychological warfare research programs, 29–30
Thiel, Peter, 180
“thinking centers,” 58–59
32C3 (Chaos Computer Club), 219–222
This Machine Kills Secrets (Greenberg), 245
Thompson, Hunter S., 75–76
Tor/Tor Project
Appelbaum employment, 240–241
as weapon against Internet censorship, 236–239
attacks on the author, 212–213, 215–218
Broadcasting Board backing, 228–230
celebrating their anonymity and secrecy, 209–210
cracking the network, 263
cypherpunks, 203–204
Dread Pirate Roberts and Silk Road, 201–205, 260–262
Edward Snowden’s activities and, 206–211, 252–253
enhancing US government power, 223–224
government hacking and cracking, 263–264
government support for, 213–215
investigation of, 222–223
Jacob Appelbaum and, 221–222
lack of protection against surveillance, 213–214
Open Technology Fund, 256–257
origins and creators, 225–227
Silicon Valley support, 212–213
32C3, 220–221
training Arab Spring protesters in social media use, 249–250
training political activists around the world, 251–253
US Intelligence benefiting from involvement with, 245–247
WikiLeaks and, 242–245
Total Information Awareness (TIA) project, 161–162
tracking individuals, 158–160, 169–173
Tunisia, 248
Tunney, John, 90–93
Uber, 171
Ulbricht, Ross, 260–262
unemployment: results of cybernetics research, 46
United Kingdom, defoliant use and, 14–15
University of California at Los Angeles (UCLA), 61–62, 95–97, 165
University of California at Santa Barbara (UCSB): powering up ARPANET, 61–62
University of Michigan, 69
University of Utah: powering up ARPANET, 61–62
Valentine, Douglas, 31
Valley, George: early warning radar system automation, 38
video games, computerized, 104–106, 148, 169, 174
Viet Minh insurgency, 22
Vietnam
American military’s destruction of Asian culture, 32–33
Americans’ declining morale and increasing drug use, 31–32
CIA radio propaganda, 232–233
CONUS Intel targeting protesters, 77–78
Erskine’s reconnaissance, 19–20
Godel’s high-tech counterinsurgency program, 24
Project Agile, 13–15, 24–25
psychological warfare research, 27–31
Student anti-war protests, 69
student protests targeting ARPANET, 62–64
US clandestine reconnaissance, 19–20
US counterinsurgency surveillance, 25–26
Viet Minh insurgency, 22
Wackenhut security, 79–80
Waldrop, M. Mitchell, 51, 70
Wallace, Mike, 233
Washington Monthly, 76
Washington Post, 192, 264–265
weaponization of privacy, 222
Weather Underground, 69
web browsers, 102–103, 148–149
Weddady, Nasser, 250
WhatsApp, 258, 265–266
Where Wizards Stay Up Late (Kafner and Lyon), 60
White Trash (Isenberg), 73(quote)
Whitney Museum, New York, 245
Whole Earth Catalog, 109–110, 112–113, 116, 133, 183–184
Whole Earth Review, 113–114
Whole Earth Software Review, 113–114, 152
Wiener, Norbert, 42–47, 108, 117
WikiLeaks, 220, 242–247, 265–266
Winograd, Terry, 146
Winter, Alex, 209
Wired magazine, 101–102, 128, 131–137, 143, 175, 203, 206
wireless routing, 94–97
Wojcicki, Anne, 151
Wojcicki, Susan, 151
Wolff, Stephen, 116–118, 123, 126, 273–274
World Privacy Forum, 159
World Trade Center, 139–140
World War II
cybernetics development, 42–44
digital computer technology, 38–39
Hollerith tabulation technology, 56
Mauthausen Concentration Camp, 271–272
Nazis’ use of tabulation technology, 56–57
William Godel’s career, 19
World Wide Web (WWW), 102–103
Yarborough, William P., 76–77
Yntema, Douwe, 70
Young Adults Project, 78
Zinn, Howard, 71
Zuckerberg, Mark, 195
Fair Use Sources
© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers
SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.