Beruflich Dokumente
Kultur Dokumente
THE MEGALEAK
O
n a rainy November day in a garden flat in London, Julian Assange is
giving me a lecture on the economics of leaking.
“To put it simply, in order for there to be a market, there has to be
information. A perfect market requires perfect information,” he says, set-
tling his six-foot-two-inch body, clothed in a sleek navy suit, into the couch,
a coffee mug in hand. His voice is a hoarse, Aussie-tinged baritone. As a
teenage hacker in Melbourne its pitch helped him impersonate IT staff to
trick companies’ employees into revealing their passwords over the phone,
and today it’s deeper still after a recent bout of flu. His once-shaggy white
hair, recently dyed brown, has been cropped to a sandy leopard print of
blond and tan. (He’s said he colors it when he’s “being tracked.”)
“There’s the famous lemon example in the used car market. It’s hard for
buyers to tell lemons from good cars, and sellers can’t get a good price,
even when they have a good car,” he says in a professorial tone. “We iden-
tify the lemons.”
Assange, today, has a particular lemon in mind. He’s just told me that
WikiLeaks plans to release tens of thousands of internal e-mails from a
major American bank in early 2011, just a few months away from our meet-
ing. He won’t say which bank, or exactly what the e-mails will reveal, but
1
2 THIS MACHINE KILLS SECRETS
carefully dodged all questions about the nonleak, offering veiled excuses
and eventually seeming to pin the blame on a rogue staffer who WikiLeaks
would claim deleted the files. Assange’s brash vows to “take down a bank
or two” only contributed to the banks’ vicious retaliation against WikiLeaks:
Bank of America joined an informal coalition of payment firms including
Visa, MasterCard, PayPal, Western Union, and others who refused to pro-
cess donations to the world’s most controversial website, choking it to the
point of paralysis.
Today, WikiLeaks is on life support. Assange faces trial for alleged sex
crimes in Sweden, with more American legal foes waiting in the wings.
Revelations by the prosecutors of his alleged source Bradley Manning sug-
gest he may have actively coached the young army private, potential
grounds for his own indictment. His organization’s work has stalled as it
struggles to raise cash. Some of its most ardent supporters have become its
most bitter critics, and its releases have dropped sharply in frequency and
impact. Assange seems more interested in hosting his TV talk show on the
Russian government–funded network RT than in rebuilding his organiza-
tion, and WikiLeaks-watchers from Evgeny Morozov to Richard Stallman
argue that the group’s fate holds dark lessons: With WikiLeaks, the Web
turned out to be less the free, anarchic realm we once imagined than a
restrictive platform tightly controlled by corporations and governments.
But it would be a mistake to focus only on how WikiLeaks has been
contained, muzzled, punished, and sabotaged while minimizing how the
group has inspired an entire generation of political hackers and digital
whistleblowers. That larger story didn’t begin or end with Julian Assange,
or even with his institution-eviscerating group. Instead, it tracks the ideals,
the means, and the movement that WikiLeaks represents, extending from
its predecessors decades earlier to the ideological descendants it has radi-
cally mobilized.
Since my meeting with Assange that rainy day in London, that thread
has taken me from one edge of the Western world to the other as I sought
out the history and future of an idea: digital, untraceable, anonymous leak-
ing. And the line of thought I followed remains stronger in many ways than
PROLOGUE 5
ever before. The activists and fellow travelers I’ve met have no illusions
about WikiLeaks’ and Assange’s weaknesses and failures. But they share
the same spirit that drove Assange: to build a better secret-spilling machine
than the last one.
This Machine Kills Secrets is a book about the forces that coalesced to
make WikiLeaks happen. And it’s also about how those forces are working
to make it happen again.
The insider’s drive to expose institutional secrets—to conscientiously
blow the whistle or vindictively dump a superior’s dirty laundry—has
always existed. But the technology that enables the spillers of secrets has
been accelerating its evolution since the invention of computing. With the
dawn of the Internet, the apparatus of disclosure entered a Cambrian
explosion, replicating its effective features, excising its failed components,
and honing its methods faster than ever before.
The state of the world’s information favors the leaker now more than
ever. In 2002, the amount of digitally recorded data in the world finally
matched the amount of analog recorded information, according to a study
by the University of Southern California’s Annenberg School for Commu-
nication and Journalism. Just five years later in 2007, the last year the
study included, digital information already accounted for 94 percent of the
world’s recorded information. And all of that information is liquid: infi-
nitely reproducible, frictionlessly mobile—fundamentally leakable.
Just what fraction of that vast digital swamp remains secret is tough to
gauge. But Harvard science historian Peter Galison, taking printed files as
a proxy, estimates that there are five time as many pages being added to
the world’s classified libraries as to its unclassified ones. Despite Barack
Obama’s promises of a more transparent government, 76.7 million docu-
ments were classified in 2010, compared with 8.6 million 2001 and 23.4
million 2008, the first and last years of George W. Bush’s administration.
The numbers of people who have access to that material are just as
unfathomable. Four million Americans have some form of clearance to
read classified information. Of those, about 1.2 million have top secret
clearance.
6 THIS MACHINE KILLS SECRETS
The abundance of widely shared secrets is hardly the only factor push-
ing the leaking movement forward. Anonymous whistleblowing remains a
game of skirting surveillance. WikiLeaks’ key advancement in the science
of spilling information has been in separating the leaker from the leaked
information. Cutting the data trail to a leak’s source was the crucial trick
that emboldened ever-greater disclosures from whistleblowers leading up
to the Cablegate blowout
That’s why the story of leaked secrets, from the days of Daniel Ellsberg
and the Pentagon Papers to the growing brood of sites hoping to reproduce
WikiLeaks’ work, has not been driven merely by digital disclosure, but by
digital anonymity. And true digital anonymity requires cryptography.
The craft of cryptographic leaking that WikiLeaks brought to light
seems like a paradox: A movement focused on divulging secrets depends
on a technology invented to keep them. But anonymity technologies repre-
sent a special kind of encryption: They reveal data itself while hiding cer-
tain metadata about the data. Specifically, anonymity tools hide that one
metadatum that counts most, the IP address that can be linked immedi-
ately to a user’s location and device. Protecting that one fact is a harder
trick than it sounds: In the end, strong anonymity tools have taken more
than a decade longer than mere strong encryption to make their way into
the hands of the average Internet user. But that strong anonymity, as it
slowly matured over the course of two decades, was the lever WikiLeaks
used to upend the world.
Today, a schizoid hive-mind of Internet pundits and social media theo-
rists claims, simultaneously, that everyone knows no anonymity exists on
the Internet (“These Days the Web Unmasks Everyone,” states a New York
Times headline from 2011) and that everyone knows no identity exists on
the Internet—that “no one knows you’re a dog,” as The New Yorker cartoon
caption reads. Half of security gurus preach about the Internet’s invasion of
privacy, while the other half bemoan the Internet’s lack of authentication,
which they say makes the task of identifying bad actors—what they call the
“attribution problem”—nearly impossible.
Forget these conflicting parallel realities. The Internet is neither funda-
PROLOGUE 7