surveillance_valley_index

Surveillance Valley Index

Return to Surveillance Valley, History of the Internet and History of Silicon Valley, Advanced Research Projects Agency (ARPA)

“ (SrvlValy 2018)

Advanced Network Services, 122

advertising and marketing

Apple’s “1984” ad, 115–116

Facebook, 170

Google’s targeted advertising system, 5, 152–153, 159–161

Internet revolution as liberating technology, 6

political campaigns, 170–171

public relations response to Sputnik launch, 16–17

AdWords, 152–153

Afghanistan: WikiLeaks data, 243

African Americans. See race

Agent Orange, 14–15

Air Force, US: Social Radar initiative, 189–190

Algeria: Arab Spring, 248

Allo app, 258

al-Qaeda, 142, 199, 265

Amazon

CIA as client for, 180

monitoring and profiling individuals, 169–170

Signal app data, 265

American Airlines, 81–82

American Civil Liberties Union (ACLU), 245

American Institutes for Research (AIR), 29–30

Angry Birds, 169

anonymous communication. See Tor/Tor Project

Anonymous movement, 212

ANS CO+RE Systems, 122

ANSNET, 122

Anthropometric Survey of the Royal Thai Armed Forces, 53–54

anticipatory intelligence, 189–190

anti-communist activities and sentiment

covert government initiatives, 23–24

Radio Free Asia, 254–255

Simulmatics Corporation work, 65–66

Stewart Brand, 107–108

tabulating racial data on immigrants, 55–56

William Godel’s counterinsurgency efforts, 22

See also Cold War

antisurveillance movement. See privacy

AOL, 154–156

Appelbaum, Jacob

background, 239–242

Julian Assange and WikiLeaks, 242–245, 247

Moxie Marlinspike’s Signal, 257

privacy movement, 245–247

32C3, 221–222

Tor encryption, 260

training Arab Spring protesters in social media use, 250

training political activists around the world, 251–253

Apple

“1984” ad, 115–116

personal computers, 124–126

Signal data, 265

Arab Spring protests, 247–251, 254

ARPA (Advanced Research Projects Agency)

anthropomorphic data on Thais, 53–54

anti-communist operations, 23–24

Brand’s advocacy for, 105–106

collaborative computer technology for civilian use, 57–59

Command and Control Research program, 48–51

communications technology research, 35–37

computer and networking technology development for counterinsurgency, 51–59

creation and objectives of, 16–18

cybernetics, 111–112

defoliation in Vietnam, 15

history of NSA involvement, 191

Nicholas Negroponte, 130

Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145

Project Camelot, 67–68, 160

psychological warfare programs, 28–31

Stanford Industrial Park presence, 145

student protests against, 69–71

surveillance systems in Vietnam, 24–25

Tunney’s congressional investigation of domestic surveillance, 90–93

See also ARPANET

ARPANET

ARPA and communes, 111–112

as tool of repression, 8

Cambridge Project, 68

connecting the network, 59–62

early Internet development, 6–7

exposé on domestic data files, 87–90

Godel’s counterinsurgency operations, 21

government spying on civilians, 187–188

Larry Page’s connection, 144

privatization of the technology, 117–121

routing system protocol design, 93–97

spying on Americans with, 73–75

student protests targeting, 62–64

Tunney hearings on domestic surveillance, 90–93

Ars Technica, 196–197

art galleries, crypto culture and, 210–211

artificial intelligence (AI), cybernetics and, 47

Artificial Intelligence Laboratory, Stanford University, 104–107

artillery, 38–39

Assange, Julian, 220–222, 242–247

Atlantic Monthly, 82–84

Atlantis, 261

Atlas Shrugged (Rand), 109

Augmentation Research Center, 50–51, 112

backbone of the Internet, 119–123, 127, 191–192

backdoor hacks: Tor Project, 223

BackRub, 149

Bamford, James, 238

Baran, Paul, 61

Barlow, Perry, 228

Bechtolsheim, Andy, 151

Beck, Glenn, 199

Bell Labs, 145

Ben Ali, Zine El Abidine, 248

Beria, Lavrentiy, 37

Berman, Ken, 228–230, 246–247

Bezos, Jeff, 169–170, 180

Bitcoin, 201–202, 205

Blue, Violet, 240

Blue Origin missile company, 180

Bolt, Beranek and Newman, 92–93, 191

Brand, Stewart, 101(quote), 104–116, 131–132, 134, 137, 152

Brantingham, Jeffrey, 165–168

Brautigan, Richard, 112, 183–184

Brin, Sergey, 5, 139–140, 139(quote), 140–141, 147–153, 157, 163–164, 173–175, 208

Broadcasting Board of Governors (BBG)

China’s censorship of radio and Internet, 234–236

Cold War origins of, 231–233

Consolidated Appropriations Act, 254

Internet Freedom policies and digital weapons, 234–236

Jacob Appelbaum and, 241–242

Radio Free Asia, 258

Russian Deployment Plan, 236–239

Tor, WikiLeaks, and US Intelligence, 245–247

Tor Project funding, 222–224, 228–230, 236

Burton, Fred, 182

Bush, George W., 141–142, 193

Cambridge Project, 63–65, 68, 90, 130, 160–161

Carnegie Mellon University, 147, 263–264

censorship

China’s censorship of CIA radio propaganda and Internet, 234–236

Russian Deployment Plan, 236–239

Tor Project as weapon against Internet censorship, 236–239

training Arab Spring protesters in social media use, 250

US foreign policy targeting China’s Internet censorship, 234–236

Census, US, 54–55

Central Intelligence Agency (CIA)

anti-terrorist activities, 142

ARPA’s Command and Control, 49–50

as Amazon client, 180

congressional hearings on domestic surveillance, 91–92

congressional investigations of radio networks, 233

counterinsurgency in North Vietnam and Laos, 21

covert communication, 224–225

exposé on domestic surveillance, 89

Godel’s work with, 19

Google’s involvement with, 5

hacking tools targeting smartphones, 265–266

Internet Freedom weapons, 235

Keyhole Incorporated, 174–176

LSD study, 108

Oakland’s DAC, 3–4

open source intelligence, 188–189

origins of the BBG, 231–233

predictive policing, 167

protesters targeting the Cambridge Project, 69–70

Radio Free Asia, 234, 254–255

Snowden’s employment, 197–198

spying on Americans with ARPANET, 73–75

Tor Project funding, 230

Cerf, Vint, 93–96, 120–121, 176

Chen, Adrian, 201

child pornography network, 205, 262

Chile: Project Camelot, 67–68

China

anti-censorship activities, 234–239

CIA propaganda targeting, 232–234

using Tor anonymity in, 205

Chomsky, Noam, 71

Ciabattari, Scott, 179

civil rights activists, 8, 76–78, 187

Clapper, James R., 193

Clinton, Bill, 127

cloud computing: Google penetration into the private sector, 178–179

Cohen, Jared, 181

Cold War

anti-communist operations, 23–24

CIA radio propaganda, 232–233

origins of the BBG, 231–233

Combat Development and Test Center, 24–25, 53

Command and Control Research program (ARPA), 15, 48–51, 53, 59, 64–65

communes, 109–112

Communications Assistance for Law Enforcement Act (1994), 227–228

communications technology. See telecommunications technology

Community Online Intelligence System (COINS), 91–93

computer technology

artillery trajectory calculations, 39–40

Command and Control Research program, 47–49

computer and networking technology development for counterinsurgency, 51–59

cryptography research, 38

cybernetics, 42–51

ENIAC computer, 39–41, 117

SAGE, 41–42

ComputerWorld magazine, 134

Congress

CIA investigation, 233

Consolidated Appropriations Act, 254

domestic surveillance hearings, 84–87

privatization of the Internet, 126–127

Tunney’s congressional investigation of ARPA, 90–93

Wired magazine and Internet infrastructure, 135

Consolidated Appropriations Act (2014), 254

containment policy, 231

CONUS Intel (Continental United States Intelligence), 76–80, 84–85, 87–88

Cooke, David, 91–93

corporate sector

backing Internet Freedom policies, 234–236

Bay Area boom, 102–103

collaborative computer technology for civilian use, 57–59

database construction, 81–82

expansion of data mining, 169–173

interactive computing, 51

military involvement, 5–6

NSA PRISM program, 192–193

personal computers and Internet access, 124–126

predictive policing, 165–168

privatization of the Internet, 121–124, 126–127

profiting from weaponization of the Internet, 267–269

Silicon Valley start-ups, 145

Stanford Industrial Park, 145

Stewart Brand’s realignment with, 113–114

Tor Project support, 227

use of World War II camp labor, 272–274

See also Google

Correa, Rafael, 221

counterculture, 107–109, 112–113

counterinsurgency

Cambridge Project, 68–69

computer and networking technology development for, 51–59

congressional hearings on domestic surveillance, 86–87

CONUS Intel targeting domestic activists, 75–80

Godel’s anti-communist objectives, 22

Ithiel de Sola Pool’s research, 65–66

Nicaragua, 129–130

origins of networking technology, 7

predictive models and profiling individuals, 160–161

Project Agile in Vietnam, 24–25

Project Camelot, 67

psychological warfare, 27–33

spying on American protesters, 75–80

strategic elements, policy, and doctrine, 27–31

student protests targeting ARPANET, 63–64

technology during the Vietnam War, 13–14

US history of, 21

US psychological warfare, 20

See also domestic surveillance and counterinsurgency

coups d’état, 67–68, 221

crime

celebrating Tor’s role in, 209–210

predictive policing, 165–168

Silk Road, 201–205, 260–262

CrowdStrike, 181JigSaw181

The Crypto Anarchist Manifesto (May), 185(quote)

crypto culture, 209–211. See also Tor/Tor Project

cryptography research, 38, 225–226

cults, 109–111

Cultural Logic of Computation (Golumbia), 45

Curtis, Adam, 109–111

cybernetics

as defense technology, 47–51

communes and, 112–113

Hackers’ Conference, 114–116

MIT cybernetics program, 42–46

New Communalists, 109–112

Cybernetics (Wiener), 44–45

cyberpunk movement, 115

cyberspace, 115

cypherpunks, 203–204

dark web. See Tor/Tor Project

DARPA (Defense Advanced Research Projects Agency)

Agent Orange development, 15

Digital Library Initiative, 147

early warning intelligence, 190

Google involvement with, 181

origins of networking technology, 6–7

Tor Project, 226–227

Total Information Awareness project, 161

See also ARPA

data banks. See databases

data collection and mining

AOL search logs revealing personal identity, 156–157

ARPA’s Southeast Asia programs, 52–53

Brin’s interest in, 148

Cambridge Project, 68–69

early tabulation technology, 55–56

Google and Gmail, 157–159

Google as government contractor, 173–178

Google search engine algorithm, 149–150

Google’s expansion into multiple markets, 171–173

Google’s penetration into civil society, 179–181

NSA PRISM program, 192–193

predictive modeling using search engine data, 160–161

search engine development, 151–152

secrecy over user search data, 153–156

US Army database, 79–80

data sharing: Oakland’s Domain Awareness Center, 2

databases

American Airlines SABRE, 82

congressional hearings on domestic surveillance, 84–87, 90–93

digitizing data, 80–84

death threats, 211–212, 216

Deep Web (documentary), 209

Defense Communication Agency, 93

defoliants, 13–15

democracy promotion, 251

Democratic National Convention, 265

Department of Homeland Security (DHS): Silk Road, 261–262

Dingledine, Roger, 202, 214, 225–227, 229–230, 236–241, 245–247, 251, 253, 258, 263

Diplomatic Security, 182

Doctorow, Cory, 258

Domain Awareness Center (DAC), 1–5

domestic surveillance and counterinsurgency

bringing military technology to, 75–80

Ford Rowan’s exposé, 73–75, 87–90

growth of corporate and government databases, 82–84

Sam Ervin’s congressional hearings, 84–87

Tunney’s congressional investigation of ARPA, 90–93

Dow Chemical, 69

Dread Pirate Roberts, 201–204, 260–262

Silk Road, 205

The Dream Machine (Waldrop), 51

drones, 52

drug use: Vietnam War, 31–32

dual use technology, 57–59

Dugan, Regina, 180–181

Duo app, 258

“dynamations,” 47–48

early warning systems, 37–38, 67, 189–190

Earth Day festival, 78

eBay, 169–170, 180

economics: importance of cybernetics, 45

eco-technics, 110

Ecuador, 221

education

“dynamations,” 47–48

Google penetration into public schools, 179

Edwards, Douglas, 141–142, 153–154

EGOTISTICAL GIRAFFE, 265

Egypt: Arab Spring, 248

Eisenhower, Dwight, 16–17

elections: data-driven campaigning, 65

Electric Word magazine, 129

electronic fence technology, 27

Electronic Frontier Foundation (EFF)

Signal, 258

Tor, Assange, and WikiLeaks, 245

Tor Project funding, 212–213, 227–228

Wired magazine connection, 136

Electronic Privacy Information Center, 162

Ellsberg, Daniel, 209

email, 157–164

encryption: Moxie Marlinspike and Signal, 257

Engelbart, Douglas C., 50, 112, 145

ENIAC computer, 39–41, 117

Erskine, Graves, 19–20

Ervin, Sam, 84–88

Ethical Tor Research guide, 263–264

face recognition: Oakland’s Domain Awareness Center, 1–2

Facebook, 170, 180–181, 194–195, 209, 258

Falun Gong, 235

The Family, 110–111

Federal Bureau of Investigation (FBI)

building a database, 80–81

exposé on domestic surveillance, 89

NSA PRISM program, 192–193

Silk Road, 203, 261–262

Federal Communications Commission (FCC), 135

Ferguson, Richard, 89–90

Fight for the Future, 258

Figueroa, Liz, 162–164

First Lighting, 37–38

foreign policy, US

BBG’s Russian Deployment Plan, 237–238

fighting Internet censorship, 234–236

The Fountainhead (Rand), 239–240

Fowler, Donnie, 167–168

France: US clandestine ops in Vietnam, 19–20

fraud, Project Agile as, 32–33

Freedom of Information Act, 223

Gaddafi, Muammar, 248

Gellman, Barton, 199

Geneva Conventions, 15

gentrification: San Francisco and Oakland, 2–4

GeoEye-I satellite, 181

Gibson, Randall, 110, 115

Gilder, George, 102, 135

Gingrich, Newt, 135

Gmail, 157–164, 179–180

Godel, William, 13–15, 18–22, 27–33, 51–53, 145

Golumbia, David, 45

Google

as government contractor, 173–178

buying companies and start-ups, 169–173

civilian, military and intelligence penetration, 178–182

early users, 143

equating with government, 182–184

Gmail, 157–164

JigSaw, 181–183

Keyhole Incorporated takeover, 175

Lockheed Martin partnership, 176–177

National Geospatial-Intelligence Agency partnership, 177–179

NSA PRISM program, 194–195

Oakland’s Domain Awareness Center and, 4–5

predictive policing, 167–168

predictive system, 161

public stock offering, 164–165

search engine, 149–150

search engine development, 151–152

secrecy over user search data, 153–155, 157

September 11, 2001, 139–141

Signal encryption, 258, 265

Snowden and, 208–209

tailoring searching through profiling, 150

targeted advertising system, 5

Google Earth, 173–176

Google Federal, 176, 178–179

Gore, Al, 102, 164

Great Firewall of China, 235, 256

Great Intergalactic Network, 59–61

Greenberg, Andy, 245, 258

guerrilla activity: US clandestine ops in Vietnam, 19–20

hacker community

defense origins of the Tor Project, 225–226

hacking Tor, 263–265

Jacob Appelbaum’s history, 239–242

Tor Project, 220–222

working for the government, 225–226

Hackers’ Conference, 115–116

Hafner, Katie, 60

Halliday, John T., 26

Hamburg, Germany, 219–222

Hanke, John, 174

Hard Landing (Petzinger), 82

Harrison, Sarah, 220

Harvard University, 62–64

HavenCo, 220

Hayden, Michael, 199–200

Heidinger, Willy, 56–57

Herzfeld, Charles, 47

Hess, Karl III, 128–129

Hitler, Adolf, 43, 56–57, 272

Hollerith, Herman, 54–56

Honduras, 129–130

Hoofnagle, Chris, 161, 164–165

Hoover, J. Edgar, 80–81

hosting companies, 220

Hotmail, 158

The Human Use of Human Beings (Wiener), 46

IBM (International Business Machines)

Hollerith tabulation technology, 54–56

Nazis’ use of IBM machines, 272–273

personal computers, 124–126

privatization of the Internet, 121–124

Regional Enforcement Information Network, 81

ICEWS (Integrated Crisis Early Warning System), 190

identity, AOL search logs revealing, 155–157

I’m Feeling Lucky: The Confessions of Google Employee Number 59 (Edwards), 141, 154

immigration: Hollerith’s tabulator machine, 54–56

“In the Pay of the CIA” (television program), 233

In the Plex (Levy), 152

infrastructure, Internet, 135

Inouye, Daniel, 126

In-Q-Tel, 167, 174–175, 189, 235

Intel, 145

Intelligence Advanced Research Project Agency, 189–190

intelligence community

ARPA’s Southeast Asia programs, 52–53

connection with the Tor Project, 245–247

CONUS Intel, 76–79

covert communication for espionage agents, 224–228

open source intelligence, 188–190

Project Camelot, 67–68

spying on Americans with ARPANET, 73–75

Tor Project enhancing and facilitating, 223–224

Tor Project funding, 228–230

use of social media, 188–189

See also Central Intelligence Agency; Central Intelligence Agency (CIA)

intelligent systems, 96

Intellipedia, 177

interface message processors (IMPs), 61

Internet

as a mirror of the world, 273–274

as liberating technology, 6

as religious experience, 132–133

Augmentation Research Center, 50–51, 112

China’s censorship, 234–236

exponential growth, 146–147

military origins of, 14–15, 41–42

origins of networking technology, 6–8

penetration into China, 234

privatization of, 116–117

Internet Freedom, 234–236, 247, 251, 254, 258–259, 267–269. See also privacy

Internet service providers, 127–128, 135–136

Iran: censorship wars and anonymity, 205, 235–236

Iraq: WikiLeaks data, 243

Isenberg, Nancy, 73(quote)

Jacobsen, Annie, 20–21, 53

JigSaw, 181–182

Jobs, Steve, 109, 116

Johnson, Roy, 17–18

Jordan: Arab Spring, 248

Kahn, Robert, 93–96

Kapor, Mitch, 135

Kelly, Kevin, 101–102, 132–133

Kennan, George, 231

Kennedy, John F., 13–15, 23–24, 35–36, 65

Kent State University, 75

Kesey, Ken, 107–108

Keyhole Incorporated, 173–176

King, Martin Luther, Jr., 75

Kleiner Perkins, 151

Koogle, Tim, 151

Korean War, 19

Kosovo Privacy Project, 228

Kotkin, Stephen, 233

Kucherena, Anatoly, 254

labor unions, 55–56

Lackey, Ryan, 220

Lansdale, Edward, 21, 24, 31

The Last Stand of the Psychocultural Cold Warriors (Rhode), 66

Latin America

CIA propaganda projects, 232–233

training global activists in social media use, 249

law enforcement databases, 80–81

Lee, Micah, 200–201, 214–215

Levy, Steven, 152

Lewman, Andrew, 246

libertarianism, 128–129

Libya: Arab Spring, 248

Licklider, J.C.R., 35–37, 42, 47–53, 57–59, 61, 63–65, 68, 70–71, 76, 111–112, 191

Lincoln, Abraham, 187

Lincoln Lab (MIT), 40–42, 60

Lockheed Martin, 177, 190

Los Angeles Police Department, 79

Lukasik, Stephen, 92

Lycos search engine, 147

Lyon, Matthew, 60

Machine Architecture Group (MAG), 130

Machine-Aided Cognition (MAC), 50

Malone, John, 135

Manning, Chelsea (née Bradley), 243, 267

Marlinspike, Moxie, 257

Massachusetts Institute of Technology (MIT)

Cambridge Project, 64–65

cybernetics, 42–46

early defense technology, 41–42

Machine-Aided Cognition, 50

Stanford and, 145

student protests targeting ARPANET, 62–64, 69–71

Mathewson, Nick, 225–226

Mauthausen, Austria, 271–274

May, Timothy C., 185(quote), 203

McCarthy, Eugene, 77–78

McElroy, Neil, 16–17, 91

MCI: privatization of the Internet, 121–124, 127–128

McLaughlin, Andrew, 164, 258

McNamara, Robert, 36

Meredith, Dan, 255

Metcalfe, Jane, 129, 131

Microsoft: NSA PRISM program, 193

Middle East, 247–248

Mid-West News, 79

military activities

ARPANET classified data collection, 92–93

ARPANET routing protocols, 96–97

FaceBook involvement in, 180–181

Google involvement in, 5

Google surveillance mirroring military surveillance, 160–165

Kosovo Privacy Project, 228

Negroponte’s MAG, 130

prediction and profiling, 160–161

Project Agile in Vietnam, 24

regional counterinsurgencies, 23

Sputnik I launch, 15–18

Tor funding, 247

Tor Project and the privacy movement, 223–228, 238–239

US counterinsurgency operations in North Vietnam, 21

Vietnam War-era technology, 13–15

WikiLeaks data, 243

Miller, Arthur R., 82–84

MIT Media Lab, 130–131

mouse, computer, 50–51

Murray, Charles, 30

MUSCULAR (NSA program), 191–192

music streaming, 169

Musk, Elon, 180

Nakamoto, Satoshi, 201–202

NASA (National Aeronautics and Space Administration), 18

National Crime Information Center, 80–81

national data banks, 81

National Data Center, 81, 83–84

National Geospatial-Intelligence Agency, 174–175, 177

National Military Command System, 51

National Oceanic and Atmospheric Administration (NOAA), 178–179

National Science Foundation (NSF), 117–122, 127

National Security Agency (NSA)

accessing individuals’ cellphone data, 265–266

Amazon’s involvement with, 180

ARPA’s Command and Control, 50

covert communication, 224–225

cryptography technology, 38–39

Edward Snowden’s activities, 252–254

establishment and mandate of, 190–191

Google’s involvement with, 5

hacking and cracking Tor, 264–265

Patriot Act, 141–142

taking down criminal networks, 262–263

Total Information Awareness project, 161

US Army domestic surveillance files, 88–90

See also Snowden, Edward

National Security Council Directive 10/2, 231–232

NATO bombing in Kosovo, 228

Naval Research Laboratory, Washington, DC, 224

Nazi Germany

tabulation technology in death and labor camps, 56–57

use of IBM machines, 272–273

Negroponte, Nicholas, 129–132, 138

Netflix, 169

Netscape, 102–103

network warfare, 235

networking technology

ARPANET, 59–62

ARPANET’s routing system protocols, 93–97

Augmentation Research Center, 50–51, 112

Cambridge Project, 64–65

Command and Control Research program, 48–49

congressional hearings on domestic surveillance, 84–87

counterinsurgency technology, 51–59

increasing private access to, 124–126

Licklider’s “thinking centers,” 57–59

military and intelligence use of ARPANET data, 92–93

NSA PRISM program, 193–196

NSFNET, 118–121

origins of, 6–8

Telecosm, 102

Neuromancer (Gibson), 115

New Communalists, 108–109, 112–113

New Economy, 133–134, 143

Nixon, Richard, 16

North, Newton Dexter, 55–56

North Africa, 247–248

North Korea: Radio Free Asia, 255

North Vietnam: US counterinsurgency operations, 21

NSFNET, 118–119, 122–123, 125–127, 134, 168

nuclear weapons

ARPA testing, 18

cybernetics and, 45–46

early Cold War preparation for nuclear war, 231–232

Soviet’s first tests, 37–38

US surveillance on Soviet communications, 21–22

Oakland, California, 1–4

Obama, Barack, 193, 198

Octoputer, 64

Oman: Arab Spring, 248

Omidyar, Pierre, 169–170

onion router, 225, 227

open source code: Tor Project, 223

open source intelligence, 188–190

Open Technology Fund (OTF), 255–257, 259–260

Open Whisper Systems, 210, 257

Operation Argus, 18

Operation Iraqi Freedom, 175

Operation Omynous, 262

Operation Ranch Hand (1962), 15

origins of networking technology, 6–7

packet satellite networking, 94

Page, Larry, 5, 140, 143–155, 157, 159–160, 163–164, 173–174, 195–196

PageRank, 149

Paglen, Trevor, 210

Painter, Rob, 175–176

Pando magazine, 5, 210, 215, 217

Pandora, 169

parallel network. See Tor/Tor Project

PATHAR, 189

Patriot Act (2001), 141–142

PayPal, 180

pension system, tabulator use in, 56

The Pentagon’s Brain (Jacobsen), 20, 53

personal computers, 124–126

Petzinger, Thomas, Jr., 82

Phoenix Program, 31

Plan X, 180–181

Playpen website, 262

Pogue, David, 158, 164

Poindexter, John, 161

Poitras, Laura, 220, 252, 257–258

police surveillance

eBay’s internal police, 180

Google involvement in, 178

Oakland’s Domain Awareness Center, 1–5

predictive policing, 165–168

using social media to monitor activists, 188

political campaigns, 170–171

political control

Project ComCom and Pool’s vision, 66–67

student protests against ARPANET, 64

political science: importance of cybernetics, 45

Politics, Personality, and Nation-Building (Pye), 65–66

Pool, Ithiel de Sola, 64–67, 111

Poor People’s March on Washington, 78

Poulsen, Kevin, 206

predictive models, 160–168, 189–190

PredPol Inc., 165–168

PRISM surveillance program, 192–196, 265

privacy

Google and Gmail tracking users, 157–163

government funding for Tor, 213–215

Jacob Appelbaum, 221–222

Open Technology Fund, 256

Snowden’s views on, 200

32C3, 220

Tor Project’s military connections, 223–228

weaponization of, 222

See also Tor/Tor Project

privatization of the Internet, 116–124, 126–128, 135–137, 168–173

PRNET (packet radio network), 94

profiling individuals, 158–164, 213–214. See also data collection and mining

Project Agile, 13–15, 24, 27, 31–33, 52, 65–66, 145

Project CAM. See Cambridge Project

Project Camelot, 67–68, 160

Project ComCom, 66

Project Igloo White, 25–27

propaganda

CIA’s Cold War media funding, 232–233

Ithiel de Sola Pool’s research, 65–66

protests

anti-Vietnam War protesters, 108

Arab Spring, 247–251

congressional hearings on domestic surveillance, 86

early warning against leftist revolutions, 67

exposé on domestic surveillance, 89–90

spying on American protestors with ARPANET, 73–80

student protests against the Vietnam War and the Cambridge Project, 69–71, 90, 108

targeting the Stanford Research Institute, 105–106

PSINET, 124–126

psychological warfare, 20, 27–33, 65–66, 232–233

punch card technology, 54–55

Pye, Lucian, 65–66

Pyle, Christopher, 35(quote), 76, 79, 84

Quittner, Joshua, 136

race

CONUS Intel targeting civil rights activists, 76–78

“dynamations,” 47–48

early racial data tabulation, 55–56

proposed counterinsurgency tactics against African Americans, 30–31

radar systems: early warning against leftist revolutions, 67

radiation exposure, 37

Radio Free Asia, 232–234, 254–255, 258

Radio Free Europe, 232–233

Radio Liberation From Bolshevism (Radio liberty), 232–233

Ramparts magazine, 29–30

Rand, Ayn, 109, 128–129, 239–240

RAND Corporation, 28–29, 32

Redirect Method, 182

regime change, 182, 251

Regional Enforcement Information Network, 81

revolution, technology, 101–106

Rhode, Joy, 66–67

Rich, Nathaniel, 245

Roberts, Lawrence, 59–62

robotics

gerbil experiments in project SEEK, 130

MIT cybernetics program, 42–43

surveillance systems in Vietnam, 25

See also cybernetics

Rolling Stone magazine, 104–105, 244–245, 250

Ross, Alec, 248–249

Rossetto, Louis, 101–102, 128–129, 131–134, 137–138, 143, 203

routing system protocol design, 93–97

Rowan, Ford, 73–75, 87–90, 97

Russia

BBG’s anti-censorship activities and policies, 236–239

Snowden’s escape to, 199, 207

Tor’s Deployment Plan, 253

See also Soviet Union

Russian Deployment Plan, 236–239

Russo, Anthony, 32–33

SABRE (Semi-Automated Business-Related Environment), 82

SafeWeb proxy, 235

Sandberg, Sheryl, 153

Sandvik, Runa, 206

satellite technology, 15–18, 94

SATNET, 94

Schmidt, Eric, 173, 181JigSaw181

Schrader, William, 123–124, 126

Science Applications International Corporation (SAIC), 3–4

Scott, Ridley, 115

search engines, 102–103, 148–149, 151

search logs, 153–158

security

crypto apps, 258–260

political interests and weaponization of the Internet, 268–269

Signal and other secure apps, 265–266

Silk Road, 260–262

See also Tor/Tor Project

Semi-Automatic Ground Environment (SAGE), 41–42, 82

September 11, 2001, 139–141

Sequoia Capital, 151

The Shadow Factory (Bamford), 238

Shepard, Andrea, 216

Shockley, William, 145

Signal app, 210, 257–258, 265–266

Sikorsky H-34 helicopter, 13–14

Silk Road, 201–205, 260–262

Simulmatics Corporation, 65–66

slave labor, 272–274

smartphones, CIA hacking tools targeting, 265–266

Snow Crash (Stephenson), 174

Snowden, Edward

background and work experience, 196–199

blowing the whistle on the NSA, 185–187

global NSA spy implants in the Internet backbones, 191–192

government involvement in supporting and cracking Tor, 264–265

history of surveillance, 75

Jacob Appelbaum and, 222

NSA PRISM program, 193–196

political interests and philosophy, 199–201, 269

privacy movement, 259

Signal and Tor endorsement, 258

the Internet as evil entity, 207–208

Tor Project connection to WikiLeaks, 205–211, 252–254

soap operas, 16–17

social media

Anonymous movement and the author, 212

Arab Spring protests, 247–251

backing Internet Freedom policies, 234–236

police use to monitor activists, 188–189

predictive policing, 167

sociology: importance of cybernetics, 45

South Vietnam, 13–15

Southeast Asia

CIA propaganda projects, 232–233

intelligence and data collection, 52–53

See also Vietnam

Soviet Union

first nuclear test, 37–38

Pool’s Project ComCom, 66

Sputnik I launch, 15–18

See also Cold War

Space and Naval Warfare Systems Command, 247

Space Race: Sputnik I launch, 15–18

SpaceX, 180

Sputnik I launch, 15–18, 41

Stanford Artificial Intelligence Laboratory, 104–107

Stanford Digital Libraries project, 146

Stanford Research Institute

Augmentation Research Center, 50–51, 112

Brin and Page, 144–145, 147–149

powering up ARPANET, 61–62

Stewart Brand, 111–112

student protests against ARPA, 69

Stanton, Edwin, 187

State Department, US

Google’s involvement with, 182–183

Tor Project funding, 238–239

training global activists in social media use, 249–250

State of the Onion, 220

statistics: Hollerith’s tabulator machine, 54–56

Steele, Shari, 220–221

Stephenson, Neal, 174

Strategic Hamlet initiative, 29

student protest, 8, 62–64

Students for a Democratic Society (SDS), 62–64, 70

Summers, Larry, 153

Sun Microsystems, 151

surveillance technology

growth of corporate and government databases, 82–83

military operations in Vietnam, 25–26

Snowden’s views on, 200

Tor’s lack of protection against, 213–214

Syria: Arab Spring, 248

Syverson, Paul, 224–225

tabulation machine, 54–55, 80, 272–273

TCP/IP (Transmission Control Protocol/Internet Protocol), 95–96

Technology, Entertainment, and Design Conference (TED), 131

technology revolution, 101–106

Technospies (Rowan), 90

Telecommunications Act (1996), 127

telecommunications technology

cybernetics and, 43–46

defense need for anonymous communication capability, 224–225

early defense communication systems development, 35–37

history of government spying, 187–188

Internet Freedom policies and digital weapons, 234–236

modeling the Soviet internal system, 66

Signal app, 257–258

Telecosm (Gilder), 102

terrorist activities, 140–142, 161–162

Tesla, Nikola, 144

Thailand

anthropomorphic survey on Thais, 53–54

psychological warfare research programs, 29–30

Thiel, Peter, 180

“thinking centers,” 58–59

32C3 (Chaos Computer Club), 219–222

This Machine Kills Secrets (Greenberg), 245

Thompson, Hunter S., 75–76

Tor/Tor Project

Appelbaum employment, 240–241

as weapon against Internet censorship, 236–239

attacks on the author, 212–213, 215–218

Broadcasting Board backing, 228–230

celebrating their anonymity and secrecy, 209–210

cracking the network, 263

cypherpunks, 203–204

Dread Pirate Roberts and Silk Road, 201–205, 260–262

Edward Snowden’s activities and, 206–211, 252–253

enhancing US government power, 223–224

government hacking and cracking, 263–264

government support for, 213–215

investigation of, 222–223

Jacob Appelbaum and, 221–222

lack of protection against surveillance, 213–214

Open Technology Fund, 256–257

origins and creators, 225–227

Silicon Valley support, 212–213

32C3, 220–221

training Arab Spring protesters in social media use, 249–250

training political activists around the world, 251–253

US Intelligence benefiting from involvement with, 245–247

WikiLeaks and, 242–245

Total Information Awareness (TIA) project, 161–162

tracking individuals, 158–160, 169–173

Tunisia, 248

Tunney, John, 90–93

Uber, 171

Ulbricht, Ross, 260–262

unemployment: results of cybernetics research, 46

United Kingdom, defoliant use and, 14–15

University of California at Los Angeles (UCLA), 61–62, 95–97, 165

University of California at Santa Barbara (UCSB): powering up ARPANET, 61–62

University of Michigan, 69

University of Utah: powering up ARPANET, 61–62

Valentine, Douglas, 31

Valley, George: early warning radar system automation, 38

video games, computerized, 104–106, 148, 169, 174

Viet Minh insurgency, 22

Vietnam

American military’s destruction of Asian culture, 32–33

Americans’ declining morale and increasing drug use, 31–32

CIA radio propaganda, 232–233

CONUS Intel targeting protesters, 77–78

Erskine’s reconnaissance, 19–20

Godel’s high-tech counterinsurgency program, 24

Project Agile, 13–15, 24–25

psychological warfare research, 27–31

Student anti-war protests, 69

student protests targeting ARPANET, 62–64

US clandestine reconnaissance, 19–20

US counterinsurgency surveillance, 25–26

Viet Minh insurgency, 22

Wackenhut security, 79–80

Waldrop, M. Mitchell, 51, 70

Wallace, Mike, 233

Washington Monthly, 76

Washington Post, 192, 264–265

weaponization of privacy, 222

Weather Underground, 69

web browsers, 102–103, 148–149

Weddady, Nasser, 250

WhatsApp, 258, 265–266

Where Wizards Stay Up Late (Kafner and Lyon), 60

White Trash (Isenberg), 73(quote)

Whitney Museum, New York, 245

Whole Earth Catalog, 109–110, 112–113, 116, 133, 183–184

Whole Earth Review, 113–114

Whole Earth Software Review, 113–114, 152

Wiener, Norbert, 42–47, 108, 117

WikiLeaks, 220, 242–247, 265–266

Winograd, Terry, 146

Winter, Alex, 209

Wired magazine, 101–102, 128, 131–137, 143, 175, 203, 206

wireless routing, 94–97

Wojcicki, Anne, 151

Wojcicki, Susan, 151

Wolff, Stephen, 116–118, 123, 126, 273–274

World Privacy Forum, 159

World Trade Center, 139–140

World War II

cybernetics development, 42–44

digital computer technology, 38–39

Hollerith tabulation technology, 56

Mauthausen Concentration Camp, 271–272

Nazis’ use of tabulation technology, 56–57

William Godel’s career, 19

World Wide Web (WWW), 102–103

Yarborough, William P., 76–77

Yntema, Douwe, 70

Young Adults Project, 78

Zinn, Howard, 71

Zuckerberg, Mark, 195

Fair Use Sources


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


surveillance_valley_index.txt · Last modified: 2024/04/28 03:47 (external edit)