Just two years ago, Andy Greenberg had an hours-long interview with WikiLeaks founder Julian Assange. The author and Forbes reporter listened as Assange claimed to have a massive trove of documents, the release of which, he promised, could “take down a bank or two.” When Greenberg reported the story, stock speculation led to Bank of America losing $3.5 billion in market value in just a few hours. But the promised documents never materialized. Instead, the real story was in a casual remark Assange made at the end of the interview, after Greenberg’s recorder was turned off. He promised a “megaleak” seven times the size of the Iraq War document collection the group had already set into the wild. Asked whether it would affect the private sector or government, Assange answered “both,” and asked which industries, he replied, “All of them.”
If Assange was overstating the case, it wasn’t by much. The release of 251,000 classified State Department cables laid bare the secrets of international relations. The revelations helped spur the Arab Spring, the effects of which are still reverberating; according to CNN, the WikiLeaks dump helped deep-six negotiations that would have kept American troops in Iraq past the 2011 withdrawal date. And those are only the most obvious effects.
The Cablegate release kept reporters plenty busy for over a year. But Greenberg wondered what had happened to the banking documents hyped by Assange. He began digging into not just WikiLeaks, but the history of leaking, of cryptography and technological anonymity. The resulting book, This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information, spans from Daniel Ellsberg to Bradley Manning, cypherpunks to Icelandic information activists, the Chaos Computer Club to Occupy Wall Street. Via e-mail, he discussed with us the difference between the Pentagon Papers and Cablegate; his encounter with The Architect, the engineer behind WikiLeaks; and the future of online anonymity.
"WikiLeaks really isn't the story, so much as an episode in a movement."
This Machine Kills Secrets covers a half-century of leaking, from the Pentagon Papers to new projects such as OpenWatch and Cop Recorder. You interviewed many of the key participants, spending a lot of time among crypto-libertarians, hackers, and information activists. What was the most surprising thing you discovered within that milieu?
Maybe the thing that surprised me the most, as I dug into the history of the cypherpunks that leads up to WikiLeaks, was just how far back this dream of using anonymity and untraceable information as a weapon against authority originates. Tim May’s “Crypto-Anarchist Manifesto” and his BlackNet experiment wrapped in most of the key ideas that WikiLeaks would use literally 20 years later to obtain and publish its megaleaks of classified info, despite the fact that most of the necessary technologies didn’t even exist back in the early 90s when May was writing.
I was surprised to find again and again that the Cypherpunk Mail List that Tim May co-founded was cited as an influence by so many characters in this story of the history of anonymity and anonymous data leaks, including John Young (the co-founder of Cryptome), the creators of the anonymity software Tor, to Jacob Appelbaum and of course Julian Assange. It all fit together much more neatly than I expected, and it made it clear that WikiLeaks really isn’t the story, so much as an episode in a movement that existed before WikiLeaks and will persist after WikiLeaks is gone.
Wikileaks seems like a germ of an idea always on the verge of becoming reality: from Tim May’s BlackNet proposal on the cypherpunk mailing list to Roger Dingledine’s idea of a distributed, anonymous publishing system (which would later become the Tor project). And of course there’s John Young’s long-running Cryptome, a Wikileaks without the pretense of secure leaking. But what had to come together for Wikileaks to actually happen?
I think a couple of things came together in WikiLeaks: Tor became a powerful and relatively secure anonymity tool, and Assange was more willing than John Young to rely on its security. And just as importantly, Assange turned out to be the perfect character necessary to inspire leakers. Not only did he have the technical skills to build WikiLeaks, but he was also eloquent, ultra-confident, and had a hacker convict past that gave him this unimpeachable anti-authoritarian credibility. Those personal qualities were a kind of catalyst for the ingredients that had been percolating since the early days of the cypherpunks — the “kitchen-sink nitroglycerin” in the cypherpunk “blast-shack” that Bruce Sterling wrote about in his awesome essay of that name.
Andy Greenberg holding one of the Wikileaks servers
"Even WikiLeaks became enough of an institution itself that it had shared secrets that leaked."
You’re the only journalist to knowingly interview The Architect, the engineer behind the original Wikileaks technology. He and another co-founder left the organization with a lot of hostility, vowing to create their own, competitive site, OpenLeaks. But nothing seems to have happened. Do you have any insight on that?
I haven’t actually spoken with Daniel Domscheit-Berg since the book published, and the Architect declined to speak with me again after our first and only interview. (I was lucky to get him once.) It may be that OpenLeaks is still waiting for the right moment to launch. Both the Architect and DDB are perfectionists, and won’t launch until they’re ready. But I imagine they also face enormous hurdles due to their reputation as turncoats among so much of the hacker community.
As I detail in the last chapter of the book, WikiLeaks and OpenLeaks sabotaged each other very effectively.
You take a historically minded approach in the book, establishing a lineage of leaking that, for example, connects accused Wikileaks source Bradley Manning to Pentagon Papers leaker Daniel Ellsberg. It took Ellsberg nearly a year of photocopying, cutting, and printing; Manning exfiltrated an exponentially larger cache of documents using a rewritable CD masquerading as a Lady Gaga disc. So advances in information technology have enabled both secret-keepers and secret-sharers. But you also point out that in 1969 Daniel Ellsberg occupied a rarefied position within the RAND Corporation, and his leak involved documents with a higher top-secret classification than the Wikileaks material. Manning, meanwhile, was a lowly private, yet one among 1.2 million Americans with a top-secret security clearance. Is there a near-paradox here — more secrets, with more people having access to them?
The lesson of WikiLeaks is that shared secrets leak. Eventually even WikiLeaks became enough of an institution itself that it had shared secrets that leaked, including the disastrous leak of the unredacted Cablegate database in the summer of 2011. In the case of the U.S. Government, which has granted millions of people classified access to so-called “secret” and “top-secret” information, it does seem inevitable that one of them leaked a large collection of that data.
It won’t be surprising when it happens again. In fact, it may have happened again to some degree with this Swiss intelligence agency technician who apparently walked out with terabytes of secret data.
The early cypherpunks you interviewed, people like Tim May and David Chaum, hold very optimistic beliefs about the power of cryptography to protect individual liberty. And as you point out, Bradley Manning wasn’t tracked down by technology, but by an informant. But he’s still imprisoned, and other whistleblowers such as former NSA analyst Thomas Drake have been prosecuted to an unprecedented degree: the Obama administration has pursued twice as many Espionage Act charges as all previous administration. Technologically this might be a golden age of leaking, but the legal arena seems a different matter.
The Obama administration has been amazingly unfriendly to whistleblowers who leak classified information. But it seems to me that those efforts only push leakers of sensitive data away from traditional, vulnerable mainstream media outlets, towards platforms WikiLeaks that (at least at one time) could be trusted to protect their anonymity. Unfortunately for leakers, WikiLeaks no longer operates a submissions system, and it doesn’t seem like any other trusted leaking platform exists right now, either.
"I see a world where contraband will pass underground through the data cables as the drones move overhead."
You open with a quote from security guru Bruce Schneier, “The mice will win in the end. But in the meantime, the cats will be well fed” — the mice in this case being the leakers and the cats being secret keepers. The mice have had a real jamboree recently, but Wikileaks, for example, has been starved of cash and resources; OpenLeaks, the rival service proposed by a former Wikileaks co-founder, has yet to materialize. Julian Assange has said digital surveillance is leading us to a “new transnational dystopia.” Are we closer to the point when the mice win, or are the cats going to continue dining well?
I wish that Bruce had said that quote the other way around, that “The cats will be well fed, but the mice will win in the end.” I think that’s the lesson of the cypherpunks: Computing and the Internet don’t offer any individual rights of privacy by default, and in fact they enable massive surveillance. But for those that seize the right tools, which are also enabled by computers and the Internet, it’s possible to use anonymity in ways it has never been used before — hence the rise of phenomena like Anonymous and WikiLeaks.
If you read the introduction to Assange’s new book, he says the same thing: For those that take advantage of it, cryptography can provide a haven from the default dystopia he describes.
Anonymity tools are powerful, and offense seems to be easier than defense in information security, especially for big institutions. So it seems like only a matter of time until the mice score another WikiLeaks-like victory.
I’ve been talking a lot lately with Cody Wilson, one of the founders of a group called Defense Distributed that hopes to 3D-print guns, and he said this to me at one point: “Call me crazy, but I see a world where contraband will pass underground through the data cables as the drones move overhead. I see a kind of poetry there…I dream of a weird future and I’d like to be a part of it.”
So maybe something like that.
We'll email you a reset link.
If you signed up using a 3rd party account like Facebook or Twitter, please login with it instead.
Choose an available username to complete sign up.
In order to provide our users with a better overall experience, we ask for more information from Facebook when using it to login so that we can learn more about our audience and provide you with the best possible experience. We do not store specific user data and the sharing of it is not required to login with Facebook.