Jacob Appelbaum

back to index

description: computer security researcher, journalist and hacker from United States

24 results

pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex
by Yasha Levine
Published 6 Feb 2018

., https://web.archive.org/web/20170808234142/https://twitter.com/puellavulnerata/status/678168846897934340. 3. Roger Dingledine, Jacob Appelbaum, and Laura Poitras, “State of the Onion,” 31c3, December 30, 2014, https://media.ccc.de/v/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma. 4. Roger Dingledine, Jacob Appelbaum, Mike Perry, Shari Steele, and Alison Macrina, “State of the Onion,” 32c3, December 28, 2015, https://media.ccc.de/v/32c3-7307-state_of_the_onion#video. 5. Nicole Perlroth, “Tor Project Confirms Sexual Misconduct Claims against Employee,” New York Times, July 27, 2016. 6. Jacob Appelbaum’s most recent salary information comes from a separation agreement Tor Project sent to him following the sexual harassment allegations, a document that was subsequently leaked to Cryptome.org.

“They asked me to build a mass surveillance system to tap the entire country of Ecuador,” he said. “I told them to go fuck themselves, and I reported them to the presidency. I think you are proposing a coup. I have your names—you’re fucked.” A few people on stage look embarrassed, not believing a word. But the audience laps it up. They love Jacob Appelbaum. Everyone at 32c3 loves Jacob Appelbaum. Appelbaum is the most storied member of the Tor Project. After Edward Snowden and Julian Assange, he is arguably the most famous personality in the Internet privacy movement. He is also the most outrageous. For five years he’s played the role of a self-facilitating media node and counterculture Ethan Hunt, a celebrity hacker who constantly changes his appearance, travels the world to speak at conferences and conduct teach-ins, and fights injustice and censorship wherever they rear their ugly government heads.

Dingledine, Appelbaum, and Poitras, “State of the Onion.” 9. “People have approached us to do these types of things, and this is a serious commitment that the whole Tor community gets behind, which is that we will never ever put in a backdoor,” Jacob Appelbaum said in a 2013 talk, relating a story about how the Department of Justice once tried but failed to get Tor to tap the network for the federal government. Roger Dingledine and Jacob Appelbaum, “The Tor Network: We’re Living in Interesting Times,” 30c3, December 31, 2013, https://media.ccc.de/v/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma#video&t=0. 10. Paul Syverson, homepage, accessed February 9, 2016, http://www.syverson.org/. 11.

pages: 461 words: 125,845

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
by Andy Greenberg
Published 12 Sep 2012

“When they pull, so do we” E-mail from Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm thirty times the size of every text article stored on Wikipedia Wikipedia: Database download, available at http://en.wikipedia.org/wiki/Wikipedia:Database_download “let it flower into something new” Julian Assange to John Young, January 7, 2007, available at http://cryptome.org/wikileaks/wikileaks-leak2.htm spreading free software like a hacker Johnny Appleseed Jacob Appelbaum. “Personal experiences bringing technology and new media to disaster areas.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/events/478.en.html “As an American, I found myself feeling pretty awful about what we’d contributed to” Ibid. grabbed the remote, turned up the volume, and refused to change the channel Ibid. A man beaten in the shower. Nightly curfews, women raped. Xeni Jardin interview with Jacob Appelbaum. “Katrina: ‘Rape, murder, beatings’ in Astrodome, say evacuees.”

“The same thing, over and over again. The disconnection. The lack of humanity.” Jacob Appelbaum. “Personal experiences bringing technology and new media to disaster areas.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/events/478.en.html transfer the equivalent of $50,000 from a bank to the CCC’s accounts Steve Kettman. “Tribute to Hippie Hacker Holland.” Wired.com, July 31, 2001. even when authorities are standing over the user, rubber hose in hand, demanding the key Jacob Appelbaum. “A discussion about modern disk encryption systems.” Speech at the Chaos Communication Congress, December 2005, available here: http://events.ccc.de/congress/2005/fahrplan/speakers/165.en.html “Justice was just too slow to catch you” Ibid.

JULF HELSINGIUS Finnish systems administrator and privacy advocate, Helsingius created the Penet anonymous remailer and faced legal pressure from the Church of Scientology that demanded he turn over the identity of one of his users. JIM BELL Engineer and libertarian whose 1997 essay “Assassination Politics” described a system of using encryption to facilitate anonymous, untraceable, and crowd-funded contract killings. JACOB APPELBAUM Activist, hacker, and developer for the Tor anonymity network who befriended Julian Assange and became the WikiLeaks’ primary American associate. PAUL SYVERSON Logician and cryptographer in the Naval Research Laboratory who is credited with inventing the anonymous communications protocol known as “onion routing.”

pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
by Ben Buchanan
Published 25 Feb 2020

The staged debate can be viewed on C-Span, https://www.c-span.org/video/?318674-1/debate-nsa-privacy-laws. 60. theshadowbrokers, “OH LORDY! Comey Wanna Cry Edition.” 61. theshadowbrokers, “OH LORDY!” 62. Jacob Appelbaum, Judith Horchert, and Christian Stoecker, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, December 29, 2013. 63. Jacob Appelbaum, Nikolaus Blome, Hubert Gude, Ralf Neukirch, et al., “Embassy Espionage: The NSA’s Secret Spy Hub in Berlin,” November 4, 2013; Jacob Appelbaum, A. Gibson, J. Goetz, V. Kabisch, et al., “NSA Targets the Privacy-Conscious,” Das Erste, July 3, 2014. For more on these non-Snowden leaks, see Peter Koop, “Leaked Documents That Were Not Attributed to Snowden,” Electrospaces, December 13, 2015; Peter Koop, “Are the Shadow Brokers Identical with the Second Source?

For more on system vulnerabilities, see “Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities,” US Government Accountability Office, October 19, 2018. 36. “BYZANTINE HADES: An Evolution of Collection,” National Security Agency presentation to SIGDEV conference, published alongside Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, et al., “The Digital Arms Race: NSA Preps America for Future Battle,” Der Spiegel, January 17, 2015, 3. 37. “Chinese Exfiltrate Sensitive Military Technology,” National Security Agency presentation deck, published alongside Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, et al., “The Digital Arms Race: NSA Preps America for Future Battle,” Der Spiegel, January 17, 2015, 3. 38.

“BYZANTINE HADES: An Evolution of Collection,” National Security Agency presentation to SIGDEV conference, published alongside Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, et al., “The Digital Arms Race: NSA Preps America for Future Battle,” Der Spiegel, January 17, 2015, 3. 8. The Five Eyes use hop points, as well, which they call Operational Relay Boxes. Two or three times per year, some Five Eyes employees conduct a one-day push to obtain access to as many of these machines in non-Five Eyes countries as they can for use in future operations. “What Is HACIENDA?” UK Government Communications Headquarters internal presentation, published online alongside Jacob Appelbaum, Monika Ermert, Julian Kirsch, Henrik Moltke, Laura Poitras, and Christian Grothoff, “The HACIENDA Program for Internet Colonization,” Heise / c’t Magazin, August 15, 2014. 9.

pages: 302 words: 85,877

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by Joseph Menn
Published 3 Jun 2019

An archive of the original is here: https://web.archive.org/web/20160606222408/https://medium.com/@nickf4rr/hi-im-nick-farr-nickf4rr-35c32f13da4d. “most serious public statement in more than a decade”: “CULT OF THE DEAD COW Statement on Jacob Appelbaum / ioerror” (press release), June 6, 2016, http://w3.cultdeadcow.com/cms/2016/06/cult-of-the-dead-cow-statement-on-jacob-appelbaum-ioerror.html. “In a personal post on Medium”: Oxblood Ruffin, “Public Figures & Anonymous Victims,” Medium, June 8, 2016, https://medium.com/@oxbloodruffin/public-figures-anonymous-victims-543f0b02d684. “quote the emails between WikiLeaks and its real source”: “Read Mueller Probe Indictment of 12 Russians for Hacking Democrats,” Washington Post, n.d., http://apps.washingtonpost.com/g/documents/national/read-mueller-probe-indictment-of-12-russians-for-hacking-democrats/3087/.

Joseph Menn > THE PLAYERS Cult of the Dead Cow Kevin Wheeler / Swamp Rat Bill Brown / Franken Gibe Psychedelic Warlord Carrie Campbell / Lady Carolin Jesse Dryden / Drunkfux Paul Leonard / Obscure Images Chris Tucker / Nightstalker Dan MacMillan / White Knight Misha Kubecka / Omega John Lester / Count Zero Luke Benfey / Deth Vegetable Sam Anthony / Tweety Fish Peiter Zatko / Mudge Laird Brown / Oxblood Ruffin Josh Buchbinder / Sir Dystic Christien Rioux / Dildog Adam O’Donnell / Javaman Jacob Appelbaum / IOerror Kemal Akman / Mixter Patrick Kroupa / Lord Digital cDc Ninja Strike Force Chris Wysopal / Weld Pond Window Snyder / Rosie the Riveter Limor Fried / Lady Ada Legion of Doom Chris Goggans Scott Chasin Masters of Deception Elias Ladopoulos / Acid Phreak Mark Abene / Phiber Optik @stake Alex Stamos Rob Beck David Litchfield Katie Moussouris > CHAPTER 1 > AN EVENING IN SAN FRANCISCO ON A TUESDAY evening in October 2017, three dozen friends and acquaintances gathered in the San Francisco townhouse of security engineer Adam O’Donnell for a political fundraiser.

Then Mudge’s squad turned the L0pht into the first big consulting group of star hackers, called @stake; later he led the cybersecurity efforts at the Defense Advanced Research Projects Agency (DARPA), powering both US military defense and still-undisclosed offensive hacks that headed off worse violence in the Middle East. Even more famous in recent years has been Jacob Appelbaum, alias IOerror. The charismatic American face of Tor, the most important tool for preserving privacy on the net, Jake served as one of the last loyal aides to WikiLeaks leader Julian Assange, and he personally revealed hacking tools developed by the National Security Agency. When his own acolytes exposed Jake for sexual harassment, the Cult of the Dead Cow publicly booted him out.

pages: 422 words: 104,457

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
by Julia Angwin
Published 25 Feb 2014

The few instances where we have learned that companies fought government surveillance have not ended well. Consider just two cases—a small Internet provider, Sonic.net, and Internet giant Yahoo!. In 2011, Sonic.net went public with the fact that it had fought—and lost—a secret court order demanding the e-mail addresses of people who had corresponded with a WikiLeaks volunteer, Jacob Appelbaum, in the course of two years. Challenging the order was “rather expensive, but we felt it was the right thing to do,” said Sonic’s chief executive, Dane Jasper. By speaking to me, Jasper was defying the court’s gag order that prevented him from discussing the government’s request. (Jasper later said that he was unaware that the gag order remained in force when he spoke to me.)

All my transactions would haunt me forever, stalking me and informing the choices that were presented to me. And so, until I could find a better way, I was going to have to rely on Ida and my masked identities to settle my debts. 10 POCKET LITTER I was standing under the world clock tower on Alexanderplatz in Berlin, feeling nervous. I had just arrived in the city and had arranged to meet Jacob Appelbaum, the computer security researcher whose e-mail had been secretly investigated by the U.S. government after his involvement as a volunteer for WikiLeaks was publicly disclosed in 2010. But I didn’t have any way to get in touch with him—no cell phone number, no street address, nothing. I simply had to wait to see if he would show up at our planned meeting point.

Then I signed up for a Jabber instant messaging account. Then I downloaded an instant messaging program called Adium that contains the Off-the-Record messaging protocol. Then I configured Adium to work with Tor and Jabber. The only reason I was able to do any of this is because the computer security researcher Jacob Appelbaum walked me through each step and told me where to click and what to type in the settings. And yet this cobbled-together mash of free software was actually the state of the art for encrypted communications. I found that many of my sensitive journalistic sources would talk to me only over the combination of Tor, Jabber, and Off-the-Record messaging.

pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks
by The "Guardian" , David Leigh and Luke Harding
Published 1 Feb 2011

First published in Great Britain in 2011 by Guardian Books Kings Place 90 York Way London N1 9GU www.guardianbooks.co.uk A CIP catalogue for this book is available from the British Library ISBN: 978-0-85265-239-8 CONTENTS Cast of characters Introduction Chapter 1: The Hunt Chapter 2: Bradley Manning Chapter 3: Julian Assange Chapter 4: The rise of WikiLeaks Chapter 5: The Apache video Chapter 6: The Lamo dialogues Chapter 7: The deal Chapter 8: In the bunker Chapter 9: The Afghanistan war logs Chapter 10: The Iraq war logs Chapter 11: The cables Chapter 12: The world’s most famous man Chapter 13: Uneasy partners Chapter 14: Before the deluge Chapter 15: Publication day Chapter 16: The biggest leak in history Chapter 17: The ballad of Wandsworth jail Chapter 18: The future of WikiLeaks Appendix: US Embassy Cables Acknowledgements CAST OF CHARACTERS WikiLeaks MELBOURNE, NAIROBI, REYKJAVIK, BERLIN, LONDON, NORFOLK, STOCKHOLM Julian Assange – WikiLeaks founder/editor Sarah Harrison – aide to WikiLeaks founder Julian Assange Kristinn Hrafnsson – Icelandic journalist and WikiLeaks supporter James Ball – WikiLeaks data expert Vaughan Smith – former Grenadier Guards captain, founder of the Frontline Club and Assange’s host at Ellingham Hall Jacob Appelbaum – WikiLeaks’ representative in the US Daniel Ellsberg – Vietnam war whistleblower, WikiLeaks supporter Daniel Domscheit-Berg – German programmer and WikiLeaks technical architect (aka Daniel Schmitt) Mikael Viborg – owner of WikiLeaks’ Swedish internet service provider PRQ Ben Laurie – British encryption expert, adviser to Assange on encryption Mwalimu Mati – head of anti-corruption group Mars Group Kenya, source of first major WikiLeaks report Rudolf Elmer – former head of the Cayman Islands branch of the Julius Baer bank, source of second major WikiLeaks report Smári McCarthy – Iceland-based WikiLeaks enthusiast, programmer, Modern Media Initiative (MMI) campaigner Birgitta Jónsdóttir – Icelandic MP and WikiLeaks supporter Rop Gonggrijp – Dutch hacker-businessman, friend of Assange and MMI campaigner Herbert Snorrason – Icelandic MMI campaigner Israel Shamir – WikiLeaks associate Donald Böstrom – Swedish journalist and WikiLeaks’ Stockholm connection The Guardian LONDON Alan Rusbridger – editor-in-chief Nick Davies – investigative reporter David Leigh – investigations editor Ian Katz – deputy editor (news) Ian Traynor – Europe correspondent Harold Frayman – systems editor Declan Walsh – Pakistan/Afghanistan correspondent Alastair Dant – data visualiser Simon Rogers – data editor Jonathan Steele – former Iraq correspondent James Meek – former Iraq correspondent Rob Evans – investigative journalist Luke Harding – Moscow correspondent Robert Booth – reporter Stuart Millar – news editor, guardian.co.uk Janine Gibson – editor, guardian.co.uk Jonathan Casson – head of production Gill Phillips – in-house head of legal Jan Thompson – managing editor New York Times NEW YORK, LONDON Max Frankel – former executive editor Bill Keller – editor Eric Schmitt – war correspondent John F Burns – London correspondent Ian Fisher – deputy foreign editor Der Spiegel HAMBURG, LONDON Georg Mascolo – editor-in-chief Holger Stark – head of German desk Marcel Rosenbach – journalist John Goetz – journalist El País MADRID, LONDON Javier Moreno – editor-in-chief Vicente Jiménez – deputy editor Other Media Raffi Khatchadourian – New Yorker staffer and author of a major profile of Assange Saeed Chmagh and Namir Noor-Eldeen – Reuters news agency employees accidentally killed by US army pilots in 2007 David Schlesinger – Reuters’ editor-in-chief Kevin Poulsen – former hacker, senior editor at Wired Gavin MacFadyen – City University professor and journalist, London host to Assange Stephen Grey – freelance reporter Iain Overton – former TV journalist, head of Bureau of Investigative Journalism Heather Brooke – London-based American journalist and freedom of information activist Bradley Manning Bradley Manning – 23-year-old US army private and alleged WikiLeaks source Rick McCombs – former principal at Crescent high school, Crescent, Oklahoma Brian, Susan, Casey Manning – parents and sister Tom Dyer – school friend Kord Campbell – former manager at Zoto software company Jeff Paterson – steering committee member of the Bradley Manning support network Adrian Lamo – hacker and online confidant Timothy Webster – former US army counter-intelligence special agent Tyler Watkins – former boyfriend David House – former hacker and supporter David Coombs – lawyer Julian Assange Christine Hawkins – mother John Shipton – father Brett Assange – stepfather Keith Hamilton – former partner of Christine Daniel Assange – Julian’s son Paul Galbally – Assange’s lawyer during his 1996 hacking trial Stockholm allegations / extradition “Sonja Braun” – plaintiff; member of Brotherhood movement “Katrin Weiss” – plaintiff; museum worker Claes Borgström – lawyer for both women, former Swedish equal opportunities ombudsman and prominent Social Democrat politician Marianne Ny – Swedish chief prosecutor and sex crimes specialist Mark Stephens – Assange lawyer Geoffrey Robertson, QC – Assange lawyer Jennifer Robinson – lawyer in Mark Stephens’ office Gemma Lindfield – lawyer acting for the Swedish authorities Howard Riddle – district judge, Westminster magistrates court Mr Justice Ouseley – high court judge, London Government Hillary Clinton – US Secretary of State Louis B Susman – US ambassador in London PJ Crowley – US assistant secretary of state for public affairs Harold Koh – US state department’s legal adviser Robert Gates – US defence secretary Sir Sherard Cowper-Coles – former UK government special representative to Afghanistan and former ambassador to Kabul INTRODUCTION Alan Rusbridger Back in the days when almost no one had heard about WikiLeaks, regular emails started arriving in my inbox from someone called Julian Assange.

His mother, in fact, encouraged him to use this computer … It had become an addictive instrument to him at a very early age.” Galbally describes Assange as “super smart”; not a nerdy hacker but someone unusual and flamboyant. Interestingly, some of the world’s most talented programmers come from broken families. Jacob Appelbaum, who would become WikiLeaks’ representative in the US, says he was the son of a paranoid schizophrenic mother and heroin addict father. He spent much of his boyhood in a children’s home. As a boy, he discovered a woman convulsing in his father’s bathroom with a needle sticking out of her arm.

This uncompromising attitude appealed to Domscheit-Berg: “PRQ has a track record of being the hardest ISP you can find in the world. There’s just no one that bothers less about lawyers harassing them about content they’re hosting.” WikiLeaks’ own laptops all have military-grade encryption: if seized, the data on them cannot be read, even directly off the disk. The volunteer WikiLeaks hacker, Seattle-based Jacob Appelbaum, boasts that he will destroy any laptop that has been let out of his sight, for fear that it might have been bugged. None of the team worries deeply about the consequences of losing a computer, though, because the lines of code to control the site are stored on remote computers under their control – “in the cloud” – and the passwords they need for access are in their heads.

pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by Bruce Schneier
Published 2 Mar 2015

Privacy and Civil Liberties Oversight Board (2 Jul 2014), “Report on the surveillance program operated pursuant to Section 702 of the Foreign Intelligence Surveillance Act,” http://www.pclob.gov/All%20Documents/Report%20on%20the%20Section%20702%20Program/PCLOB-Section-702-Report.pdf. Jennifer Granick (11 Feb 2014), “Eight questions PCLOB should ask about Section 702,” Just Security, https://justsecurity.org/7001/questions-pclob-section-702. the NSA targets people: Jacob Appelbaum et al. (3 Jul 2014), “NSA targets the privacy-conscious,” Panorama, http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html. the NSA chains together hops: Marcy Wheeler (15 Oct 2013), “About that May 2007 FISC opinion,” Empty Wheel, http://www.emptywheel.net/2013/10/15/about-that-may-2007-fisc-opinion.

Leaksource (30 Dec 2013), “NSA’s ANT Division catalog of exploits for nearly every major software/hardware/firmware,” http://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware. Der Spiegel (29 Dec 2013), “Inside TAO: Documents reveal top NSA hacking unit,” Der Spiegel, http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. Jacob Appelbaum, Judith Horchert, and Christian Stöcker (29 Dec 2013), “Shopping for spy gear: Catalog advertises NSA toolbox,” Der Spiegel, http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html. 80,000 computers worldwide: Matthew M. Aid (15 Oct 2013), “The NSA’s new code breakers,” Foreign Policy, http://www.foreignpolicy.com/articles/2013/10/15/the_nsa_s_new_codebreakers.

Los Angeles police even: Cyrus Farivar (8 Apr 2014), “LAPD officers monkey-wrenched cop-monitoring gear in patrol cars,” Ars Technica, http://arstechnica.com/tech-policy/2014/04/lapd-officers-monkey-wrenched-cop-monitoring-gear-in-patrol-cars. declining half-life of secrets: Peter Swire (5–6 Jun 2014), “The declining half-life of secrets and the future of signals intelligence,” 7th Privacy Law Scholars Conference, Washington, D.C., http://www.law.berkeley.edu/plsc.htm. the NSA spied on the cell phone: Jacob Appelbaum et al. (23 Oct 2013), “Berlin complains: Did US tap Chancellor Merkel’s mobile phone?” Der Spiegel, http://www.spiegel.de/international/world/merkel-calls-obama-over-suspicions-us-tapped-her-mobile-phone-a-929642.html. Ian Traynor, Philip Oltermann, and Paul Lewis (23 Oct 2013), “Angela Merkel’s call to Obama: Are you bugging my mobile phone?”

pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man
by Luke Harding
Published 7 Feb 2014

Germany’s domestic intelligence body, the BND, for example, shared information with Fort Meade including metadata and had even handed over copies of its two digital spy systems, Mira4 and Veras. Snowden himself flagged these close connections, telling the journalist and internet freedom activist Jacob Appelbaum that the NSA was ‘under the same roof’ as the Germans, and ‘most other western states’. The extent of this collaboration could be confusing. One BOUNDLESS INFORMANT slide, shared by Greenwald with the Norwegian tabloid Dagbladet, suggests the NSA is hoovering up 1.2 million Norwegian telephone calls daily.

‘With my best regards ‘Edward Snowden’ Days later, Harrison said goodbye to Snowden and flew to Berlin. She had been with him in Moscow for four months. On what was said to be legal advice, she declined to return to the UK. The German capital and East Berlin in particular was now a hub for a growing number of Snowden exiles: Poitras, journalist Jacob Appelbaum and Harrison. For anyone with a sense of history this was ironic. Stasiland had become an island of media freedom. Greenwald, meanwhile, announced his resignation from the Guardian to join a new media venture backed by the eBay billionaire Pierre Omidyar. What were Snowden’s prospects of exiting Moscow for a new life in western Europe?

pages: 903 words: 235,753

The Stack: On Software and Sovereignty
by Benjamin H. Bratton
Published 19 Feb 2016

The problematics and potential of the urban operating system are well articulated by Matthew Fuller and Usman Haque in Urban Versioning System v.1.0, Situated Technologies Pamphlet series, 2008, http://www.situatedtechnologies.net/. The conflicts involved, however, are impossible to tally in real time. In their book Cypherpunks: Freedom and the Future of the Internet, Julian Assange, Jacob Appelbaum, and Andy Muller-Maguhn are alarmed that “Siemens is marketing a platform for intelligence agencies that does actually produce automated actions. So when target A is within a certain number of meters of target B according to their mobile intercept records, and target A receives an email mentioning something—a keyword—then an action is triggered.”

The line, “animal living inside of animal living inside animal” is Ed Keller's. III The Projects The Stack to Come Secrets are lies. —The Circle, company policy1 Surveillance is theft. —Writers against Mass Surveillance2 Autonomy is abstraction. —Chris Anderson, 3D Robotics3 Convenience means not secure. —Jacob Appelbaum, Tor project4 Fear is awareness. —Charles Manson5 68.  Seeing The Stack We Have, Stacks to Come The Stack we have means: borderlines are rewritten, dashed, curved, erased, automated; algorithms count as continental divides; the opposition of chthonic versus geometric territory is collapsed by computation; interfaces upon interfaces accumulate into networks, which accumulate into territories, which accumulate into geoscapes (territories comprising territories, made and so entered into, not entered into and so made); the embedded is mobilized and the liquid is tethered down into shelter and infrastructure; the flat, looping planes of jurisdiction multiply and overlap into towered, interwoven stacks; the opaque is transcribed and the transparent is staged, dramatized, and artificialized; irregular allegiances are formalized (the enclave and exclave, for diasporic and satellite expatriates); both futurist and medievalist scenarios confiscate, one from another, the program of supercomputational utopias; and the incomplete(able) comprehensiveness of Earth's archives is folded back on itself as a promiscuous, ambient geopolitics of consumable electrons.

Writers Against Mass Surveillance, “A Stand for Democracy in the Digital Age,” a collectively signed petition at https://www.change.org/p/a-stand-for-democracy-in-the-digital-age-3. First published December 10, 2013. 3.  From Chris Anderson's talk at Google, Authors@Google: Chris Anderson (2012), https://www.youtube.com/watch?v=3grzYoJ2oPQ. 4.  Jacob Appelbaum, “Art as Evidence” (panel at Transmediale, Haus Der Kulturen Der Welt, Berlin, January 30, 2014), http://www.transmediale.de/content/presentation-by-jacob-applebaum-at-transmediale-2014-keynote-art-as-evidence. 5.  Charles Manson, “Lie,” recorded August 9, 1968, Phil Kaufman, 1970, vinyl recording. 6. 

pages: 383 words: 105,021

Dark Territory: The Secret History of Cyber War
by Fred Kaplan
Published 1 Mar 2016

One device, called LoudAuto: The names of these programs come from a fifty-eight-page TAO catalogue of tools and techniques, among the many documents leaked by former NSA contractor Edward Snowden. No U.S. newspaper or magazine reprinted the list (the reporters and editors working the story considered it genuinely damaging to national security), but Der Spiegel did, in its entirety (Jacob Appelbaum, Judith Horchert, and Christian Stöcker, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Dec. 29, 2013), and computer security analyst Bruce Schneier subsequently reprinted each item, one day at a time, on his blog. As hackers and spies discovered vulnerabilities: “Inside TAO.” In the ensuing decade, private companies: For more on zero-day exploits, see Neal Ungerleider, “How Spies, Hackers, and the Government Bolster a Booming Software Exploit Market,” Fast Company, May 1, 2013; Nicole Perlroth and David E.

One week after the failed summit: Lana Lam and Stephen Chen, “Exclusive: Snowden Reveals More US Cyberspying Details,” South China Morning Post, June 22, 2013, http://www.scmp.com/news/hong-kong/article/1266777/exclusive-snowden-safe-hong-kong-more-us-cyberspying-details-revealed?page=all. Soon came newspaper stories: For summary, see Kaplan, “Why Snowden Won’t (and Shouldn’t) Get Clemency.” Fort Meade’s crown jewels: Jacob Appelbaum, Judith Horchert, and Christian Stocker, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, Dec. 29, 2013, http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html. Under the surveillance system described: The potential extent of surveillance, covered by three hops, is most clearly explained in Liberty and Security in a Changing World: Report and Recommendations of the President’s Review Group on Intelligence and Communication Technologies (White House, Dec. 12, 2013), 103, https://www.google.com/webhp?

pages: 212 words: 49,544

WikiLeaks and the Age of Transparency
by Micah L. Sifry
Published 19 Feb 2011

In the days after the State Department cables starting leaking, not only did Senator Joe Lieberman intimidate major Internet companies into kicking WikiLeaks off their services without any serious review, the government told its own employees that they shouldn’t look at references to WikiLeaks from government computers or their home computers, and even public resources like the Library of Congress started filtering searches on its computers and Wi-Fi to prevent people from reading news articles about the cables.7 The Office of Management and Budget circulated a fourteen-page memo to all government agencies requiring them to tighten their security procedures, which included suggestions that they employ psychiatrists and sociologists to measure employee “despondence and grumpiness as a means to gauge waning trustworthiness,” “capture evidence of pre-employment and/ or post-employment activities or participation in on-line media data mining sites like WikiLeaks or Open Leaks,” and require all employees to report their contacts with the media.8 It was quite an about-face from the OMB’s Open Government Directive of a year earlier, which called on agencies to “create an unprecedented and sustained level of openness and accountability.”9 And the Justice Department began pursuing a criminal investigation against WikiLeaks, demanding that Twitter turn 139 WIKILEAKS AND THE AGE OF TRANSPARENCY over the subscriber account information—including personal addresses, connections made to and from the account, IP addresses used, means of payment (though Twitter is free)— for Julian Assange, Bradley Manning, and three other people who had been involved with the group around the time that the Collateral Murder video came out: Icelandic MP Birgitta Jonsdottir, Dutch hacker Rop Gonggrijp, and American anticensorship hacker Jacob Appelbaum. This is an extremely worrisome development. For there is nothing that WikiLeaks has done that is different from any other newspaper or media outlet that has received leaked government documents, verified their authenticity, and then published their contents and analysis. If WikiLeaks can be prosecuted and convicted for its acts of journalism, then the foundations of freedom of the press in America are in serious trouble.

pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia
by Becky Hogge , Damien Morris and Christopher Scally
Published 26 Jul 2011

A mischievous kid will show you how the Internet works.” But as it turned out, he didn’t have the skills to back up his claims. Though he purported to deal in cryptography, Austin turned out to be nothing but a cipher himself. After Evgeny’s piece for Foreign Policy, the code fell into the hands of Jacob Appelbaum, a hacker of considerable pedigree who had spoken on behalf of WikiLeaks at a US conference in July while Julian was in hiding (and who, for his troubles, was subsequently detained at the airport the next time he flew into the US). Appelbaum’s verdict was unequivocal, delivered via Twitter on 14 September: “Haystack is the worst piece of software I have ever had the displeasure of ripping apart.

pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State
by Barton Gellman
Published 20 May 2020

January 31, 2013—Poitras, writing from Berlin, asks to meet me, saying she needs advice. February 2, 2013—At a New York café, Poitras tells me about her source and his (still vague) story. I offer to help her validate it. According to her journal, she is also asking advice from privacy advocate and technologist Jacob Appelbaum in Berlin. March 30, 2013—Citizen Four sends Poitras a link to an encrypted file called “astro_noise,” but not the key to open it. April 19, 2013—Poitras learns that Greenwald is visiting New York. She asks to meet and shows him two emails from Citizen Four, suggestive but still vague about the story.

The source worked in a comparable expeditionary role, not in Unit S3283. not going to write about those things: I am not sure I would have described the unit at all, given the risks, if its work and equipment had not been made public in more detail in a widely reproduced article and original NSA document called the ANT Catalog. Jacob Appelbaum and Christian Stöcker, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, December 29, 2013, www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html. ROOFIE: Slang for Rohypnol, roofie is the street name for a notorious drug that sexual predators use to incapacitate women.

Active Measures: The Secret History of Disinformation and Political Warfare
by Thomas Rid

Russian authorities in turn interpreted American and European attempts at deescalating the crisis as the opposite, as an escalation and as “meddling” in the Russian sphere of influence.24 American intelligence agencies began to prioritize intelligence collection in Ukraine. A shadow war was on the rise. Four days later, another highly damaging NSA document appeared. In Hamburg, the annual congress of the Chaos Computer Club was under way. On December 29, the activist Jacob Appelbaum revealed the Advanced Network Technology list, known as the ANT catalog.25 The ANT catalog outlined custom-designed NSA hardware and software hacking used to penetrate devices produced by U.S. companies, including Apple, Dell, Cisco, Juniper Networks, and others. The document was released alongside a Spiegel story on the NSA’s elite hacking division, then known as Tailored Access Operations.

New York Review of Books, February 9, 2017. 10.  For implementation dates, see “SecureDrop,” Wikipedia, https://web.archive.org/web/20190107195518/https://en.wikipedia.org/wiki/SecureDrop 11.  Bruce Schneier, “The U.S. Intelligence Community Has a Third Leaker,” Schneier on Security, August 7, 2014. 12.  Jacob Appelbaum, Holger Stark, Marcel Rosenbach, and Jörg Schindler, “Merkel beschwert sich bei Obama,” Der Spiegel, October 23, 2013. 13.  Marcel Rosenbach, conversation with Thomas Rid, May 8, 2017. 14.  Marcel Rosenbach and Holger Stark, “Von Mielke zu Merkel,” Der Spiegel 39 (September 27, 2010), pp. 30–31. 15.  

pages: 237 words: 67,154

Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet
by Trebor Scholz and Nathan Schneider
Published 14 Aug 2017

FURTHER RESOURCES LAUNCH EVENT “Platform Cooperativism: The Internet, Ownership, Democracy,” The New School (November 2015), video archive: http://platformcoop.net/2015/video READINGS Trebor Scholz, “Platform Cooperativism vs. the Sharing Economy,” Medium (December 5, 2014), https://tinyurl.com/oj8rna2 Nathan Schneider, “Owning Is the New Sharing,” Shareable (December 21, 2014), http://shareable.net/blog/owning-is-the-new-sharing Janelle Orsi, Frank Pasquale, Nathan Schneider, Pia Mancini, Trebor Scholz, “5 Ways to Take Back Tech,” The Nation (May 27, 2015), http://thenation.com/article/5-ways-take-back-tech Trebor Scholz, Platform Cooperativism: Challenging the Corporate Sharing Economy (Rosa Luxemburg Stiftung, New York Office, 2016, with additional translations in Spanish, French, Portuguese, German, Italian, and Chinese), http://platformcoop.net/about/primer Trebor Scholz, Uberworked and Underpaid: How Workers are Disrupting the Digital Economy (Polity, 2016) WEBSITES Platform Cooperativism portal, http://platformcoop.net Platform Cooperativism Consortium, http://platformcoop.newschool.edu The Internet of Ownership, http://internetofownership.net Shareable, http://shareable.net Sustainable Economies Law Center, http://theselc.org OR Books PUBLISHING THE POLITICS OF THE INTERNET What’s Yours is Mine: Against the Sharing Economy TOM SLEE Black Ops Advertising: Native Ads, Content Marketing, and the Covert World of the Digital Sell MARA EINSTEIN Splinternet: How Geopolitics and Commerce are Fragmenting the World Wide Web SCOTT MALCOLMSON Lean Out: The Struggle for Gender Equality in Tech and Start-Up Culture ELISSA SHEVINSKY, EDITOR When Google Met WikiLeaks JULIAN ASSANGE The Big Disconnect: Why the Internet Hasn’t Transformed Politics (Yet) MICAH L. SIFRY Cypherpunks: Freedom and the Future of the Internet JULIAN ASSANGE WITH JACOB APPELBAUM, ANDY MüLLER-MAGUHN, AND JéRéMIE ZIMMERMANN Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet DAVID MOON, PATRICK RUFFINI, AND DAVID SEGAL, EDITORS For more information, visit our website at www.orbooks.com

pages: 265 words: 69,310

What's Yours Is Mine: Against the Sharing Economy
by Tom Slee
Published 18 Nov 2015

There are many who still see open source software as a social movement rather than as a part of the commercial world, who believe in the liberating possibilities of open source software, and who cast a baleful glare towards the giants of Silicon Valley.13 For example, in the fallout from the Snowden revelations about NSA spying on the Internet, computer security researcher Jacob Appelbaum gave a keynote about the surveillance state at the 29C3 (“Chaos Communication Congress”) hacker conference in December 2012 and included this ringing encomium for open source development: It is possible to make a living making free software for freedom, instead of closed source proprietary malware for cops . . .

pages: 296 words: 86,610

The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World's First Decentralized Cryptocurrency
by Ian Demartino
Published 2 Feb 2016

Accessed February 6, 2016. http://www.nbcnewyork.com/news/local/Schumer-Calls-on-Feds-to-Shut-Down-Online-Drug-Marketplace-123187958.html. 11 Jeong, Sarah. “Criminal Charges Against Agents Reveal Staggering Corruption in the Silk Road Investigation.” Forbes. March 31, 2015. Accessed June 22, 2015. http://www.forbes.com/sites/sarahjeong/2015/03/31/force-and-bridges/. 12 Assange, Julian, Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. Cypherpunks: Freedom and the Future of the Internet. New York: OR Books, 2012. 13 Greenberg, Andy. “An Interview With A Digital Drug Lord: The Silk Road’s Dread Pirate Roberts (Q&A).” Forbes. August 14, 2013. Accessed June 22, 2015. http://www.forbes.com/sites/andygreenberg/2013/08/14/an-interview-with-a-digital-drug-lord-the-silk-roads-dread-pirate-roberts-qa/. 14 Cubrilovic, Nik.

pages: 295 words: 84,843

There's a War Going on but No One Can See It
by Huib Modderkolk
Published 1 Sep 2021

Israeli firms that supply surveillance software James Bamford, ‘Shady Companies With Ties to Israel Wiretap the U.S. for the NSA’, Wired.com, 4 March 2012. Israel bugs Bill Clinton and Monica Lewinsky Gordon Thomas, Gideon’s Spies: The Secret History of the Mossad, St. Martin’s Griffin, 2000. nsa catalogue Jacob Appelbaum, Judith Horchert and Christian Stöcker, ‘Catalog Advertises NSA Toolbox’, Der Spiegel, 29 December 2013. Britain refuses to co-operate in Belgacom investigation Anouk van Kampen, ‘Britten weigerden medewerking aan onderzoek naar hacking Belgacom’, NRC Handelsblad, 25 October 2018. Belgium needs NSA Mitch Prothero, ‘Belgium Called in the NSA To Catch Europe’s Most Wanted Man’, Buzzfeednews.com, 21 August 2016. 8 Conspiracy in Amsterdam Dutch agencies should share information faster Niels Rigter, ‘VS: informatie na aanslag kwam te laat’, De Telegraaf, 5 September 2018.

Engineering Security
by Peter Gutmann

id=556468. [258] “Breach of Trust”, Kurt Seifried, Linux Magazine, Issue 114 (May 2010), p.24. [259] “Who’s letting me become ssladmin?”, Kurt Seifried, 17 April 2010, http://keyboardcowboy.ca/2010/04/whos-letting-me-become-ssladmin/. [260] “Detecting Certificate Authority compromises and web browser collusion”, Jacob Appelbaum, 22 March 2011, https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browsercollusion. [261] “Report of incident on 15-MAR-2011”, 23 March 2011, Comodo, http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html. [262] “The Recent RA Compromise”, Phillip Hallam-Baker, 23 March 2011, http://blogs.comodo.com/it-security/data-security/the-recent-cacompromise/

“Microsoft’s continuing work on digital certificates”, Gerardo Di Giacomo and Jonathan Ness, 10 July 2012, http://blogs.technet.com/b/srd/archive/2012/07/10/microsoft-s-continuing-work-on-digitalcertificates.aspx. [281] “Microsoft Revokes Trust in 28 of Its Own Certificates”, Dennis Fisher, 10 July 2012, http://threatpost.com/en_us/blogs/microsoft-revokestrust-28-its-own-certificates-071012. [282] “Detecting collusion between vendors and CAs: Revocation isn’t enough and everyone knows it”, Jacob Appelbaum, 18 March 2011, https://bugzilla.mozilla.org/show_bug.cgi?id=643056. [283] “Firefox Blocking Fraudulent Certificates”, Mozilla Security Blog, 22 March 2011, https://blog.mozilla.com/security/2011/03/22/firefoxblocking-fraudulent-certificates/. [284] “Comodo Certificate Issue — Follow Up”, 25 March 2011, http://blog.mozilla.com/security/2011/03/25/comodo-certificateissue-follow-up/

, Brian Smith, panel session at the 20th Usenix Security Symposium (Security’11), August 2011. [141] “RE: IP: SSL Certificate "Monopoly" Bears Financial Fruit”, Lucky Green, posting to the cryptography@wasabisystems.com mailing list, message-ID 002901c228b4$14522fb0$6501a8c0@LUCKYVAIO, 11 July 2002. [142] “Re: Has any public CA ever had their certificate revoked?”, Dan Geer, posting to the cryptography@metzdowd.com mailing list, message-ID 20090503205759.D7C2E34378@absinthe.tinho.net, 3 May 2009. [143] “Detecting Certificate Authority compromises and web browser collusion”, Jacob Appelbaum, 22 March 2011, https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browsercollusion. [144] “Results after 30 days of (almost) no trusted CAs”, Nasko Oskov, 7 May 2010, http://netsekure.org/2010/05/results-after-30-days-ofalmost-no-trusted-cas/. [145] “Most common trusted root certificates”, Nasko Oskov, 7 April 2010, http://netsekure.org/2010/04/most-common-trusted-rootcertificates/

pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking
by E. Gabriella Coleman
Published 25 Nov 2012

We talked about how to work around the infamous XCB bug with Java and also about the future of X including OpenGL support.”32 Other hackers, who had hoped to get a significant amount of work done, entirely fail to do so, perhaps because socializing, sightseeing, nightclubs, and the occasional impromptu concert (after fixing an old church organ) prove a greater draw than late-night hacking. FIGURE 1.5. Hackers on Planet Earth, New York Attribution 2.0 Generic (CC BY 2.0), https://secure.flickr.com/photos/ioerror/196443446/in/set-72157594211715252 (accessed August 2, 2011). Photo: Jacob Appelbaum. Most hackers, however, intermix play with hacking, giving themselves ample opportunity to see the sights, dance the dances, play the games, eat the local cuisine, hit the parks and beaches, and stay put with computers on their laps, hacking away next to others doing the same, generally into the early morning.

pages: 394 words: 117,982

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
by David E. Sanger
Published 18 Jun 2018

Breached Chinese Servers Seen as Security Threat,” New York Times, March 23, 2014, www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html?. In late 2013, Der Spiegel published the “ANT catalog”: Spiegel Staff, Documents Reveal Top NSA Hacking Unit, December 29, 2013. www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html; Jacob Appelbaum, Judith Horchert, and Christian Stöcker, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, December 29, 2013, www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html. The catalog revealed: I had been aware of these technologies in 2012, when I first published accounts of Olympic Games, in which they were important.

pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous
by Gabriella Coleman
Published 4 Nov 2014

Manning was sentenced by a military judge to thirty five years in prison, and is now at Fort Leavenworth, having spent almost a year in solitary confinement before he was sentenced.5 At the 2010 HOPE conference, there was palpable tension in the air. Rumors were swirling that Julian Assange was going to give the keynote. In a last-minute switch-up, it was not Assange who stepped out on stage, but the American hacker Jacob Appelbaum. Appelbaum gave a riveting talk and effectively outed himself, in front of everyone in attendance (including the inevitable federal agents), as an affiliate of the embattled organization. It was a bold move, given the tactics of silencing, prosecution, and intimidation leveled against the organization by US authorities.

We Are the Nerds: The Birth and Tumultuous Life of Reddit, the Internet's Culture Laboratory
by Christine Lagorio-Chafkin
Published 1 Oct 2018

He was a hacker with a heart—a man who’d sought to change the world, and who’d actually made a dent in the free flow of information online, starting at age fourteen, when he’d helped create the framework for RSS. He’d been the impetus behind rewriting Reddit into the programming language Python. Now he was dead, at age twenty-six. On Reddit on January 12, the top post was a photo posted by Erik Martin, titled simply “AaronSW,” Swartz’s Reddit username. It was a sharp portrait, taken by Jacob Appelbaum, a hacker, security researcher, and friend of Swartz. In the image, Swartz’s face is scruffy, but his brown eyes clear. He’s closed-lipped, smiling warmly, in a dark hoodie. Appelbaum later posted on Twitter, “I’m pretty upset but so is the entire internet—@aaronsw touched a lot of people. It isn’t wrong to say how we will all personally miss him.”

pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by Nicole Perlroth
Published 9 Feb 2021

Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show,” Washington Post, August 30, 2013. See also Ryan Gallagher and Glenn Greenwald, “How the NSA Plans to Infect ‘Millions’ of Computers with Malware,” Intercept, March 12, 2014. The best public window we have into the NSA’s exploits and spy contractions was published by Jacob Appelbaum, Judith Horchert, and Christian Stöcker in Der Spiegel, “Catalog Advertises NSA Toolbox,” December 29, 2013. Eric Rosenbach, then the Pentagon’s Assistant Secretary of Defense for Global Security and Homeland Defense, who would later become the Pentagon’s “Cyber Czar,” addressed his concerns about the growing market for zero-days getting into foreign adversaries and non-state actors’ hands to attack industrial systems in a March 2013 keynote address at the AFCA cybersecurity conference, which is available here (at minute 3:24): www.c-span.org/video/?