> INDEX

Abene, Mark (Phiber Optik), 26–28

Acid Phreak. See Ladopoulos, Elias

Acton, Brian, 152

Adafruit Industries, 46

Adkins, Heather, 188, 200

Adobe Systems, 164, 185

Aitel, Dave, 120–121, 137, 177

Akman, Kemal (Mixter), 128, 141, 145, 162–163, 170–172, 186

AKP, 169–170

Al-Bassam, Mustafa (tflow), 149–150

Albini, Steve, 17

Alexander, Keith, 180–181

Alexandre, Brandy, 68

Allard, J (Darby Crash), 38–39

Alliance Teleconferencing, 44

American Association for the Advancement of Science, 100

America Online (AOL), 18, 107

Amnesty International, 101, 134

anarchism, 11, 40, 47, 60–61, 117, 152, 165

Anarchist’s Cookbook, The, 11

Anglin, Andrew, 195

anonymity, role of, 2–3, 128–130, 142, 157, 161

Anonymous, 145–149, 155, 166, 188, 195

ANSI, 199

Anthony, Sam (Tweety Fish), 7, 48, 62–63, 84, 88, 186–187, 191, 193–194

at conferences, 66–67, 81, 91–93

anti-establishment attitude, 6, 22–23, 27, 43, 86, 93, 142, 176

Antisec (anti-security) movement, 122–123, 148, 165

antivirus industry, 29, 66, 78, 83, 107, 167–168, 210

computer viruses, 81–82, 120, 167, 176

Appelbaum, Jacob “Jake” (IOerror), 3, 151–159, 161, 192

early history and joining cDc, 140, 142

sexual misconduct, 152–158, 193

WikiLeaks, involvement in, 143–145, 148, 150

Apple, 18, 30, 37, 63, 112, 163, 211–212

Apple II computers, 10, 11, 54, 204

iPhones, 2, 121–122, 124, 165–166, 171, 203

Mac, 23, 182

applications (apps), 69, 90, 108, 196

APT28, 199

Arab Spring, 149, 164

Arbor Networks, 123, 178

Arch Angel. See Bednarczyk, Michael

Arkin, Brad, 185

ARPANET, 177

art, role in cDc culture, 2, 16, 60–61, 71, 147

artificial intelligence (AI), 142, 201

Assange, Julian (proff), 3, 142–145, 148, 150, 153, 159, 166. See also WikiLeaks

ATDT, 38, 42–43

@stake, 3–6, 110–113, 116, 120–125

veterans of, 171, 175, 177, 183–185, 193, 196

AT&T, 19, 26, 40

Auernheimer, Andrew (weev), 195–196

back doors, 78, 142, 172, 180, 212

by NSA, 5, 100, 138–139, 151, 197

Back Orifice, 66–69, 77–78, 93, 96–98, 123, 148

BO2K, 69, 71–73, 76–79, 81–84, 96, 113–114, 163

Microsoft response, 67–68, 69, 77, 82–83, 96–97

See also Microsoft; Windows

Ball, Patrick, 100–103, 163–164

Baranowski, Paul, 127–128

Barlow, John Perry, 22–23, 26–27, 31–32, 89–91, 132, 150–151, 155

Barr, Aaron, 147, 164

Bates College, 72

Battery Ventures, 110, 112

BBC, 67, 127

BBN Technologies, 37–38, 55–57, 75, 120, 176, 182

Beck, Rob “Whitey,” 83–84, 121, 171, 193–194

Bednarczyk, Michael (Arch Angel), 29, 33, 35

Bell, Al. See Fierstein, Alan

BellSouth, 26–28

Benfey, Luke (Deth Vegetable), 68, 102, 110, 186, 194–195

at conferences, 81, 88, 91

early life and joining cDc, 33, 39, 47–50

media interactions, 48–49, 59–63, 65–66, 96–97

reaction to Jake situation, 140, 144–147, 156–157

Benjamin, Yobie, 109

Berklee College of Music, 53

Bernstein, Daniel J., 155

Beyond HOPE, 91–93. See also Hackers on Planet Earth (HOPE)

Black Crawling Systems, 38

Black Hat, 34, 112, 181

“black hat” hacking, 82, 195

black representation in tech world, 49–50

Blaze, Matt, 155

Bloomberg News, 164

blue boxes, 12, 18–19

Blue Coat, 133

BlueHat security conferences, 111, 123

BO2K, 69, 71–73, 76–79, 81–84, 96, 113–114, 163

Boing Boing (zine), 16, 60, 151, 153

Border Gateway Protocol, 76

Boston, Massachusetts, 3, 7, 19, 37–51, 53, 55, 74–75, 104, 191

Boston Herald (newspaper), 50

Boston University, 38

bots, 120, 146, 172

Brand, Stewart, 22, 26

Brewer, Brandon (Sid Vicious), 11–13, 30, 186

Brewer, Ty (Graphic Violence), 12, 30

Brian Oblivion. See Hassick, Brian

Broderick, Matthew, 9

Brown, Bill (Franken Gibe), 13–15, 17–18, 30, 71, 81, 85, 186

Brown, Laird (Oxblood Ruffin), 85–105, 131–132, 141–146, 150, 156–158, 162–164, 171–172

early life and pre-cDc history, 85–87

as father of hacktivism, 3, 84, 91, 97, 113

Hacktivismo, 99–103, 127–131, 139, 141, 149, 162, 194–195

Tibetans, helping, 99–101, 130–131, 135, 137

See also Hong Kong Blondes

Bruni, Frank, 202

Buchbinder, Josh (Sir Dystic), 63–68, 78, 81, 93, 186

bugs, in software, 48, 119–121, 175, 179, 185

coordinated disclosure, 73, 110–111, 122, 197

disclosure ethics, 135–136, 177, 188, 196–198

patches for, 67, 72–74, 112, 119, 124, 197

See also vulnerabilities

bulletin boards, electronic, 10–22, 24–25, 35, 38–39, 45, 47, 49

as connection for beginner hackers, 10, 15, 42–43, 53, 203–205

Demon Roach Underground, 11, 13, 17, 44, 93, 204

end of, 32, 59

expansion of cDc via, 13–16, 62

WELL, the, 22, 26, 30

See also text files

Burns, Jesse, 124

Bush, George H. W. (administration), 21, 74

Bush, George W. (administration), 116, 176

Businessweek (magazine), 67

Calvary, 38–39

Cambridge Analytica, 6, 196, 201

Cambridge Technology Partners, 109–110

Cambridge University, 37, 43

Campbell, Carolin “Carrie” (Lady Carolin), 16, 32, 88–89, 91–93, 186, 191–192

on Back Orifice, 64, 67, 69, 83

leaving cDc, 141, 189

Canadian government, 86, 134–137

Cap’n Crunch. See Draper, John

Cassady, Neal, 22

CA Technologies, 185

Ceglowski, Maciej, 192–193

Cellebrite, 165–166

censorship, 99, 104–105, 127, 136. See also Tor

Center for Humane Technology, 201

Chaos Computer Club, 143, 153–154, 156–157, 162

Chasin, Scott, 28–29, 32

Cheshire Catalyst. See Osband, Robert

Chinese government, 2, 54, 114, 138–139, 196, 211–212

Chinese dissidents, 87–88, 91–92

Great Firewall of China, 104–105, 149

Tibetan exiles, 100–103, 130–136

See also Hong Kong Blondes

Chinese People’s Liberation Army, 135

Choate, 50

Chuk E. See Rhodes, Charlie

Church of Scientology, 146

CIA, 18, 43, 104, 114, 118, 121, 190

Russian hacking and, 166–168, 176, 183

Ciphire Labs, 162, 172

Cisco Systems, 1–2, 74, 167, 211

Citizen Lab, 131–137, 161, 164–165, 210. See also Tor

Clarke, Richard, 5, 74–77, 114–115, 176

Clinton, Bill (administration), 21, 74, 78, 95–96, 115

Clinton, Hillary, 104, 149, 159, 166

Cloudmark, 104

CNN, 67

code, computer, 78, 108, 112, 143, 168, 193

source code, 51, 57–58, 137–138, 164–165, 182–186

Cohn, Cindy, 102, 129, 155

Coleman, Gabriella, 145, 149, 155, 166

Columbia University, 189, 205

Comey, James, 191

Commission on Human Rights, 96–97

Communist Party, 87, 96–97

Computer Associates, 185

Computer Fraud and Abuse Act (1986), 5, 16, 42, 54, 64, 75, 90

Computer Network Defense, 74

Computers, Freedom, and Privacy conference, 100–101

“Computer Vice” (Geraldo), 59

ComSec, 28

conferences, for hackers, 3, 23–34, 100–101, 111, 123, 153–157, 197–198

Black Hat, 34, 112, 181

Hackers on Planet Earth (HOPE), 91–93, 143–144, 188–189

HoHoCon (Xmas Con), 24–25, 28–30, 32–34, 37, 41, 48, 85, 158

SummerCon, 24–26, 44, 48

See also Def Con

Consumer Electronics Show, 187

Cool Beans (zine), 17

Corley, Eric (Emmanuel Goldstein), 26, 92

counter-culture, influence in cDc, 22, 71, 93, 205–206

Count Zero. See Lester, John

credit card hacking, 10, 21–23, 27, 40, 42, 45, 110, 148–149

crime, role of, 29, 120–122, 143, 148, 164, 176. See also law enforcement

Criminal Investigative Service, 78

critical thinking, role in tech world, 188, 191, 209

CrowdStrike, 134

Cruz, Ted, 5–7, 190–191, 196, 200, 202–204, 206

cryptography, 43, 78, 82, 100, 131, 143, 155, 196

C-SPAN, 190

@CthulhuSec. See White, Thomas

Cuckoo’s Egg, The (Stoll), 26–27

Cyber Analytic Framework, 179–180

Cyber Command, 180

cyberespionage. See espionage

Cyber Fast Track (CFT), 178–179, 181

Cyber Independent Testing Lab (CITL), 182

cybersecurity. See security

cyberwarfare, 116, 131, 134, 136–138, 172, 192, 196

Cypherpunks, 27, 65, 100, 139, 143

Dalai Lama, the, 100, 130, 135

Darby, Chris, 121, 184

Darby Crash. See Allard, J

dark market transactions, 21, 162, 193

Dark Tangent. See Moss, Jeff

databases, 35, 43–44, 74, 100–101, 107

security of, 61, 111–112, 122, 170

Dateline (television show), 48–49, 59, 62

Davis, Jake (Topiary), 147–148

DCLeaks, 199

“Declaration of Independence of Cyberspace” (Barlow), 31, 89–90

Def Con, 33–34, 80–83, 91, 113, 140, 178, 188

cDc presentations at, 61–63, 66–67, 77, 83, 96–97, 100–103, 127–128

Stamos on security ethics, 4, 196–198, 200

Defending Digital Democracy project, 200

Defense Advanced Research Projects Agency (DARPA), 3, 128–129, 176–182, 206

Defense Intelligence Agency, 48

Deibert, Ron, 132–137

Dell, Tom, 63, 145–146

Democracy (bulletin board), 38

Democratic Congressional Campaign Committee, 192

Democratic National Committee (DNC), 158–159, 166–168, 192, 199

Democratic Party, 166, 183

Demon Roach Underground, 11, 13, 17, 44, 93, 204

denial-of-service attacks, 115, 120, 123, 132, 146

Deth Vegetable. See Benfey, Luke

deVilla, Joey, 127–128

Devost, Matt, 113

Dharamsala, Tibet, 100–103, 130–136

Digital Equipment Corporation, 47

Digital Millennium Copyright Act, 90

Dilbert (comic strip), 72

Dildog. See Rioux, Christien

Dingledine, Roger, 129, 140, 155

Dormido, Angela, 35

dot-com boom, 65, 79, 107, 113, 116

Draper, John (Cap’n Crunch), 18, 158

Drew, Dale, 26

drugs, role of, 11, 30, 49, 63, 65, 77, 80, 110, 140

at conferences, 22–23, 26–29, 32, 34

liberalization of drug laws, 7, 189–190, 202, 205

Drunkfux (dFx). See Dryden, Jesse

Dryden, Jesse (Drunkfux), 21–24, 26, 28–30, 32–35, 48, 54, 58

Dryden, Spencer, 22

dsniff, 123

DSSK Corp, 195–196

Dual Elliptic Curve, 151

Dugan, Regina, 177–179, 182

Dukakis, Mike, 48

Dungeons & Dragons, 9, 211

Duo Security, 123, 211

Electronic Frontier Foundation (EFF), 32, 37, 89, 102, 134, 150, 170

founding of, 25, 27–28

on Tor, 129, 139

elite, concept of being, 10, 40–41, 62, 66, 96, 149, 176

Ellsberg, Daniel, 151

El Paso, Texas, 15, 17, 189–190, 203, 205

email, 48, 57, 135, 150, 165, 198

encryption of, 100, 162, 172

email lists, 83, 122

cDc, 32, 57, 63–64, 141, 150, 156–157, 189, 194

Cypherpunks, 27, 65, 100, 139, 143

Hacktivismo, 128, 131

Emmanuel Goldstein. See Corley, Eric

encryption, 19, 66, 78–79, 100, 180, 197, 210

of email, 100, 162, 171–172

end-to-end, 152, 171–172, 193

Encyclopedia Dramatica, 148

Endgame, 121, 177

Enhanced 911 services, 26–28, 114

Erdogan, Recep, 168–169

espionage, 48, 132–135, 154, 181

international, 120, 137, 170–173, 198

by US government, 113–114, 119, 139, 161–162, 176

Esquire (magazine), 18

ethics, 3, 60, 113, 120, 133–134, 146–147, 172

personal codes of, 55, 119, 122–123, 125, 136, 209–212

professional ethics, 200–201, 211

social responsibility, 196, 211

See also moral issues

exploits, 33, 57, 78, 119, 122, 133, 164, 167

export controls, 78–79, 155, 164

Facebook, 4–6, 152, 157–158, 190–196, 198–201, 211

Fairbanks, Cassandra, 149

Fanning, Shawn, 43, 47

Farr, Nick, 156–157

FBI, 27–30, 51, 64, 68, 74–75, 78, 148

iPhone access, 122, 165–166, 171–172, 211–212

Russian hacking, 176, 191

See also law enforcement; United States government

Fielding, Noel, 147

Fierstein, Alan (Al Bell), 19

Financial Times (newspaper), 147

FinFisher (FinSpy), 163–165

Firefox, 130, 182

firewalls, 84, 104–105, 127, 149

Fisher, Phineas (pseudonym), 165–170, 171, 172

FlexiSpy, 165–166

Ford, Luke, 68

Ford Foundation, 133, 182

4chan, 63, 145–146, 193–194

Fox News, 199–200

Franken Gibe. See Brown, Bill

Frauenfelder, Mark, 60

Freedom of the Press Foundation, 150–151, 155

freedoms, protection of

of opinion and expression, 101–102, 172

of the press, 19, 27, 150–151, 155

of speech, 146, 157, 171

from unreasonable search and seizure, 27

Freegate, 139

Freitas, Nathan, 130–131, 136

FreqOut. See Shea, Dylan

Fried, Limor (Lady Ada), 46, 63, 81, 93

F-Secure, 82

G. A. Ellsworth. See Kelly, Matt

Gallagher, Hugh, 187

Galperin, Eva, 170

Gamergate, 193–194

games, computer, 15, 31, 54, 72, 205

Gamma Group, 133, 163–165, 168, 170–172, 210

@GammaGroupPR, 164–165, 170. See also Fisher, Phineas

Garcia, Jerry, 22

Gates, Bill, 38, 50, 64, 96, 111

Geer, Dan, 112, 121

geopolitics of the internet, 121, 133, 137, 161, 163, 171, 173

Geraldo (television show), 59

GhostNet, 135–137

Gibson, William, 38

Gilmore, John, 27, 65, 100, 155

Godwin, Mike, 144

Goggans, Chris, 28–29, 32

Goldsmith, Dave, 110, 124–125

Golgo13, 38–39, 40, 42, 48

Gonzalez, Albert, 122

Google, 59, 84, 129, 164

Android, 124, 131, 163

China, data breach in, 137–138, 151, 196, 211

Chrome browser, 84, 182

Gmail, 149, 192

hackers working for, 122–124, 134, 171–172, 182, 188, 200–201

Grand, Joe (Kingpin), 39–40, 42, 45, 76, 109

Graphic Violence. See Brewer, Ty

Grateful Dead (band), 22–23, 26

Greenwald, Glenn, 151

Grill-a-Thons, 39–40, 46

GRU, 166, 199

Grugq, the, 121

Guardian (newspaper), 151, 201

Guccifer 2, 159, 166

Gutierrez, Vince, 23–24

Hackers (film), 60

Hackers on Planet Earth (HOPE), 91–93, 143–144, 188–189

hacker space, 39–41, 49–50, 65, 73, 155. See also L0pht

Hacking Team, 133, 164–165, 168, 170

hacktivism, 87–103, 113, 133, 137, 145–146, 188, 209–210

invention of term, 2–3, 91

problems with, 159, 171

Tibetan exiles, 100–103, 130–136

See also Hacktivismo; Hong Kong Blondes; Tor; WikiLeaks

Hacktivismo, 99–103, 127–131, 139, 141, 149, 162, 194–195

Hailstone, 186

Hamilton, Booz Allen, 177

Hammond, Jeremy, 148

handles, use of, 3, 54, 61, 110, 121–122, 148, 154

Harper’s (magazine), 26

Harris, Tristan, 201

Harvard University, 37–38, 46, 55, 172, 186, 200

Hassick, Brian (Brian Oblivion), 38–45, 55–56, 76

HBGary, 147, 164–165

Hell (hacker living space), 49

Henson, James, 206

Hesseldahl, Arik, 93–95, 99

Heyer, Heather, 195

history of cDc, 2–3, 12–17, 41, 99, 140–142. See also Wheeler, Kevin

Hitchhiker’s Guide to the Galaxy, 12

Hitler, Adolf, 15, 144

Hoffman, Abbie, 19

HoHoCon (Xmas Con), 24–25, 28–30, 32–34, 37, 41, 48, 85, 158

Holly, Buddy, 9

Honeywell, Leigh, 154, 193

Hong Kong Blondes, 87–100, 115, 137, 163, 189

Blondie Wong interview, 93–100

origin of, 88, 91–92

Wired articles, 93–95, 99

See also Brown, Laird (Oxblood Ruffin); Chinese government; hacktivism

Honker Union, 103

Houston, Texas, 21, 24, 32, 206

Hughes, Eric, 65

Human Rights Watch, 129

humor, role of, 59–61, 67, 147–148, 164–165, 170

in cDc culture, 11–15, 23, 47–48, 71, 80, 109–110, 203

See also Back Orifice; Hong Kong Blondes

Hurd, Will, 5, 190

immigration, 192–193, 196–197, 201, 212

Immunet, 104

Immunity Inc., 120–121, 177

Information America, 43, 65

In-Q-Tel, 121, 184

Instagram, 192, 199–200

International Covenant on Civil and Political Rights, 102

Internet Relay Chat, 32, 72, 135, 142, 146, 149, 165, 188

Internet Research Agency (IRA), 199–200

Internet Security Systems (ISS), 79–81

IOerror. See Appelbaum, Jacob

Iran, 2, 134, 139, 167, 195

Iraq, 48, 116–117, 142

Isaacson, Andy, 153

iSec Partners, 124–125, 196, 201

Israel, 133, 165–167

Jardin, Xeni, 151, 153

Javaman. See O’Donnell, Adam

Jefferson Airplane (band), 22, 24

Jintao, Hu, 114

Jolie, Angelina, 60

Jones, Alex, 149

Julian, Ted, 123

Kam, Moshe, 211

Kapor, Mitch, 27, 37, 45

Kaspersky Lab, 134, 167–168

Kaufman, Dan, 179, 181

Kelly, Matt (G.A. Ellsworth), 15–17, 32, 186

Kesey, Ken, 22–23

keystroke logging, 66, 117, 182

KGB (bulletin board), 12

Kialo, 172

Kingpin. See Grand, Joe

Klein, Naomi, 95–96

K0de Ab0de, 21

Komlo, Chelsea, 153–154

Koum, Jan, 152

Kroupa, Patrick (Lord Digital), 30–32, 141, 145–146, 202

Kubecka, Misha (Omega), 33, 39, 43–44, 57, 88, 156, 186

Kurtzrock, Glenn, 102, 144, 186

Ladopoulos, Elias (Acid Phreak), 26–28

Lady Ada. See Fried, Limor

Lady Carolin. See Campbell, Carolin

Lamo, Adrian, 144

Las Vegas, Nevada, 33–34, 62, 67, 81, 100–101

law enforcement, 11, 122, 152, 157–158, 199, 212

hack of Catalan Police Union, 165, 168–170

hackers in trouble with, 13, 25, 27, 30, 32–33, 49–50, 55, 144–146

hackers working with, 2, 29–30, 117, 162, 165

informants, 29, 35, 44, 55

Secret Service, 24–25, 26–28

See also FBI; National Security Agency; United States government

leaks, of information

DCLeaks, 199

whistle-blowing, 118, 137, 143–144, 167, 180, 185

WikiLeaks, 3, 142–151, 155–156, 158–159, 163, 166, 169–170, 192

See also Snowden, Edward

Leary, Timothy, 22

legal liability, 69, 74, 78, 85, 108–109, 133, 137, 175

Legion of Doom (LoD), 25–30, 32, 45, 54, 60, 80

Legions of the Underground (LoU), 98–99

legislation, of technology, 89, 171, 190

Leonard, Paul (Obscure Images), 16, 32, 60, 155–156, 186, 194–195

Lester, John (Count Zero), 41–42, 85–86, 88, 91, 93, 186

departure from L0pht, 56, 58, 76

founding L0pht and 2600 meetings, 38–40, 45–46

Lewis, Jim, 170

Lex Luthor, 25

licensing, of software, 69, 108

Linux, 63, 69, 84, 108

Litchfield, David, 111–112, 122, 171

L0pht, 3, 55–61, 71–77, 86, 91, 98–99

congressional testimony, 4, 75–77

early start of, 39–42, 44–45

L0phtCrack password breaker, 56, 73–74

L0pht Heavy Industries, re-incorporation as, 55–56

security advisories, 56–57, 59, 61, 108–110, 113, 197

@stake merger, 110, 113, 116, 123, 183–184

Lockheed Martin, 83, 103

Lord Digital. See Kroupa, Patrick

Los Angeles Times (newspaper), 97–98

Lotus Development Corporation, 37, 45, 56

Lou Cipher. See York, Byron

Lubbock, Texas, 8–20, 82, 204

founding of cDc in, 13–17

Kevin Wheeler’s early life in, 8–13

Lubbock Avalanche-Journal (newspaper), 82

Lulz Security (@LulzSec), 147–150, 164–165, 210

MacMillan, Dan (White Knight), 33, 39–41, 43–46, 53–57, 63, 76, 186

Magic Man, 38

maker movement, 40, 46

malware. See software programs, malicious

Mandiant, 134

Mann, Sally, 22–23

Manning, Chelsea (formerly Bradley), 143–144

Marlinspike, Moxie, 152, 162, 178

Masters of Deception (MoD), 25–29, 32, 54

Matasano Security, 125

Mathewson, Nick, 129, 140, 155

Matlock. See Noonan, Timothy

Mayer, Marissa, 198

McAfee, 29, 107

McGill University, 166

MCI, 10, 12–13

media, cDc relationship with, 58–62, 67–68, 80. See also Hong Kong Blondes

Medium (website), 99

Mentor, the, 44

Mercer, Rebekah, 196

Mercer, Robert, 196

Merry Pranksters, 22–23

Messiah Village, 48–49

Metasploit, 177

#MeToo, 158

Microsoft, 37, 63, 108, 196, 212

BackOffice software, 66, 69

Back Orifice, response to, 67–69, 77, 82–83, 96–97

hackers working for, 38, 50, 111–112, 122–124, 193

security vulnerabilities, 45, 56, 72–73, 82–83, 85, 111–112

See also Back Orifice; Windows

military, 74, 78, 117–118, 136, 185, 209

See also United States government

Miller, Charlie, 178–179

Miloševic, Slobodan, 102–103

MindSpring, 68

MindVox, 30–32, 63, 145

MIT, 37–38, 40, 45–46, 50, 53, 72–73

Mitnick, Kevin, 35, 44

Mixter. See Akman, Kemal

modems, 59, 93, 130, 177, 204

early internet use of, 9–10, 15–16, 26, 38, 42, 48

Mondo 2000 (magazine), 65

Monsegur, Hector (Sabu), 148–150

Moore, H. D., 177

moral issues, 79–80, 102–104, 118, 132, 165–166, 201

moral crisis of technology, 78, 85, 125, 197, 212

moral reasoning, 43, 117, 124, 155, 161, 181, 211

opposition to immoral conduct, 193

See also ethics

Morris, Chris, 147

Moss, Jeff (Dark Tangent), 33–34, 61

Motor 308, 17–18

Moussouris, Katie, 122

Mudge. See Zatko, Peiter

Mueller, Robert, 5, 166, 199

Muench, Martin, 162–163, 171–172

Mulvenon, James, 103–104

Murdoch, Rupert, 147

music, role in cDc culture, 21–23, 53, 72, 86, 187, 202

Foss (O’Rourke’s band), 92–93, 189, 191–192, 202–203, 207

punk influences, 11, 14–15, 17–18, 80, 88

Muth, Edmund, 67

Napster, 23, 43, 47

National Security Agency (NSA), 3, 34, 68, 74–75, 143–144, 163, 211

back doors by, 5, 100, 138–139, 151, 197

hackers working with, 110, 118–120, 137–138, 176

security breach of, 166–168, 197

Snowden leak, 4, 138, 150–152, 172, 181, 196

National Security Council (NSC), 74–76, 114–115

NATO, 114, 135

Nazis, 144, 195

NBC News, 48–49

NCC Group, 124

Neidorf, Craig, 26–28, 30

neo-Nazis, 6, 193–196

net neutrality, 7, 205–206

Netscape, 18, 32, 50, 61, 63, 65, 72

“Never Again” pledge, 193

New Hack City (hacker space), 49–50, 65, 73

New York City, New York, 19, 30–32, 91–93, 104, 143–144, 187

New York Times (newspaper), 67, 133, 135, 143, 151, 202, 207

New York University, 187

Nightstalker. See Tucker, Chris

9/11 attacks, 113–114, 116–117, 119, 133, 187

Ninja Strike Force (NSF), 6, 62–63, 81, 116–117, 121, 129–130, 177, 193–196

Noisebridge, 155

No Logo: Taking Aim at the Brand Bullies (Klein), 96

nonprofits, 102, 130, 132, 152, 164, 182, 188

Noonan, Timothy (Matlock), 195–196

NORAD, 58

NPR, 67

NSO Group, 133

Obama, Barack (administration), 104, 168, 204

Obscure Images. See Leonard, Paul

O’Donnell, Adam (Javaman), 104–105, 141, 152, 156–157, 193

political fundraising by, 1–2, 4–6, 201–202

Olson, Parmy, 145, 149

Omega. See Kubecka, Misha

Onion Router. See Tor

OpenCola, 127

OpenNet Initiative, 132

open-source projects, 108, 113, 123, 127

operating systems, 63, 92

software, 26, 46, 78, 98, 163

Operation Tunisia, 149–150

Oracle, 74, 122

O’Rourke, Robert “Beto” (Psychedelic Warlord), 5–7, 15–17, 92–93, 141, 188–192, 196, 201–207

Osband, Robert (Cheshire Catalyst), 19, 55

Oxblood Ruffin. See Brown, Laird

Palantir, 192

Palm, 130

Panama Papers, 166

Pan-Galactic Entropy, 10, 12

Paramedia, 60

password security, 56, 108–109, 123, 140

patches, for software flaws, 67, 72–74, 112, 119, 124, 197. See also bugs

PayPal, 145, 149

Peekabooty, 101, 104, 127–129

Pegasus spyware, 133

penetration testing, 107, 109–110, 113, 122, 135, 177

Peng, Li, 87, 102

Pentagon, the, 113, 143, 178–179, 201, 211

digital threats against, 74, 78, 142, 151

hackers working for, 29, 37–38, 54, 116, 180–181

Pentagon Papers, 151

Perceptive Automata, 186–187

Phiber Optik. See Abene, Mark

phone hacking. See phreaking

Phrack (online magazine), 24–26, 28, 32–33, 37–38, 43, 47, 98, 122, 211

Phrack High Council, 122–123

phreaking, 12–14, 16, 18–19, 24, 30–31, 33, 40, 44

long-distance codes, 10–12, 42, 204–205, 209

piracy, digital, 15–16, 21, 30, 54, 68, 121

Pitsos, Errikos, 172

Podesta, John, 149, 159, 192

Poitras, Laura, 151, 153

policies, effects of, 110–111, 130, 132

corporate, 146–147, 148–149, 196

government, 151–152, 192–193, 202–203

politics, 132, 175–176, 190–196

campaign fundraising, 1, 5, 7–8, 201–202, 203

campaign security advice, 193, 200

conservatism, 9, 19–20, 192–193, 207

DNC hack, 158–159, 166–168, 192, 199

liberalism, 47, 87, 191, 203–204, 207

libertarianism, 20, 27, 89, 202, 207

protests, 86, 113, 131, 146, 148–149, 201, 203

See also hacktivism; O’Rourke, Robert “Beto”; Trump, Donald

Poulsen, Kevin, 44

Presidential Decision Directive 63, 75–76

Pretty Good Privacy (PGP), 100

privacy, 19, 43–44, 84, 100–101, 114, 147, 211

proff. See Assange, Julian

Project Mayhem, 122–123

Project Zero, 188

propaganda, 2, 5, 60, 149, 200, 211

proxy systems, 104, 128, 136, 162

Psiphon Inc., 136, 139

Psychedelic Warlord. See O’Rourke, Robert “Beto”

public embarrassment, 108, 110, 145, 165

public interest hacking, 166, 210

Pure Nihilism, 16

Putin, Vladimir, 166, 168–169

racism, in tech world, 193–196, 199–200, 203

RAND, 103

Reagan, Ronald (administration), 9, 11, 19

red boxes, 43, 49

Reddit, 84

regulations, digital, 19–20, 78–79, 175–176, 202, 210–211

Rensselaer Polytechnic Institute (RPI), 45

Republican National Convention, 196

Republic Title, 186

Reuters (news agency), 142

Rhodes, Charlie (Chuk E), 49

Rioux, Christien (Dildog), 99, 108–110, 121, 156, 183–186, 191, 196

BO2K, 69, 71–73, 76–79, 81–82, 84, 163

Ritter, Jordan, 104

Rohozinski, Rafal, 136–137

Rolling Stone (magazine), 22, 142, 187

Rolling Stones (band), 50

Rosenbaum, Ron, 18

Rosie the Riveter. See Snyder, Window

Ross, Alec, 104

Rotten.com, 63, 145–146

routing systems, 76, 104–105, 132, 167

Onion Router (Tor), 3, 139–140, 152–157, 195, 210

RSA, 197–198

Rubin, Andy, 124

Ruffin, David, 88

Russia

CIA and, 166–168, 176, 183

hacking tools, 2, 134, 163, 170–171

Moonlight Maze, 74

organized crime in, 120, 176

Russian intelligence agencies, 151, 166, 193–194, 199

Russian operatives, 148–149, 158–159, 198–199

Trump election interference, 4–5, 166, 176, 183, 190–191, 199–200, 202

Sabu. See Monsegur, Hector

Sadofsky, Jason Scott, 38, 46–47, 58–59, 67, 69

Salon (online magazine), 151

San Antonio Express-News, 60

Sandberg, Sheryl, 200

San Francisco, California, 1–8, 22, 30, 65, 113, 123, 128, 155, 186

satellite communications, 61, 93, 95, 131, 177

Schneier, Bruce, 82–83, 155, 210

script kiddies, 64, 83, 122

secrecy, role of, 117–120, 134, 145, 171, 196

WikiLeaks, 142–151, 155–156, 158–159, 163, 166, 169–170, 192

“Secrets of the Little Blue Box” (Rosenbaum), 18

Secure Sockets Layer encryption, 127

security, 3–5, 43, 51, 84, 136, 182–184, 199

advisories to public, 56–57, 59, 61, 72–74, 108–110, 113, 193, 197

consulting, 56, 109–111

industry, 29–30, 79–80, 85, 171, 177–180, 197

self-driving car technology, 7, 175, 178, 186–187

Sendmail, 48, 56

Setec Astronomy, 65

sexism, in tech world, 158, 170, 193–194

sexual misconduct, in tech world, 150, 152–156, 193

Shadow Brokers, 167

Shea, Dylan (FreqOut), 49, 65

Sid Vicious. See Brewer, Brandon

Signal, 152, 162, 171, 178

Silicon Valley, 3–4, 37, 121, 130, 133, 184–185, 191–192, 201–202

Sir Dystic (Josh Buchbinder), 63–68, 78, 81, 93, 186

Six/Four System, 128–129, 162

Slack, 193

Slashdot, 84

Slick, Grace, 22

smartphones, 124, 130–131, 163, 178

Smith, Val, 121, 177–178

Sneakers (film), 65, 109

Snowden, Edward, 138, 167, 172, 177, 181–182, 211

contents of leak, 4, 120, 137, 139, 151, 172

Freedom of the Press Foundation, 150–151, 155

ramifications of leak, 122, 153, 161, 196–198

Snyder, Window (Rosie the Riveter), 49–50, 63, 110–111, 121–123, 171

social engineering, 35, 141, 153

social media, 6, 192–195, 203

Facebook, 4–6, 152, 157–158, 190–196, 198–201, 211

Instagram, 192, 199–200

See also Twitter

software, pirated, 15–16, 21, 30, 54, 68, 121

software flaws. See bugs

software programs, malicious, 64, 73, 77, 82–83, 134, 150, 179

malware, 103, 121, 135–136, 167, 196, 210

worms, self-replicating, 112, 123

Song, Dug, 123, 125, 152, 177–178, 211

Soros, George, 199

Spain, 165, 168–169

spam, 104, 120, 143, 176, 199

Spiegel, Der (magazine), 151

Sputnik satellite, 149, 177

spyware, 133, 163–166, 184

SQL database, 111–112, 122

Stallman, Richard, 26, 46

Stamos, Alex, 4–5, 6, 123–124, 196–202, 211

Stanford University, 200–201

start-ups, 1, 110, 127, 130, 162, 171–172, 183–186, 192, 212

State Security Investigations Service (Egypt), 164

Steele, Shari, 153–154

Sterling, Bruce, 32–33

Stoll, Cliff, 26–27

Stratfor, 148

Stripe, 182

Students for a Free Tibet, 131

Stuxnet, 2, 134, 167, 173

SummerCon, 24–26, 44, 48

Sumners, Colton, 194–195

surveillance, 123, 133, 139, 152, 180, 182, 193, 211

Swamp Rat. See Wheeler, Kevin

Symantec, 79, 107, 112, 122, 123, 183

Syria, 133, 169

sysop (system operator), 13, 38, 47, 82

Syverson, Paul, 129

Tacoland, 17

Tailored Access Operations, 176

TAP (“Technological American Party” newsletter), 19, 31, 55

TCP/IP, 38

Tech Solidarity, 4, 193

Ted’s Collision and Body Repair (bar), 94

Telecommunications Act (1996), 89–90

terrorism, 59, 74, 113, 115–117, 210

Tethong, Lhadon, 131

Texas Tech, 14, 17

text files (t-files), 10–20, 33, 44, 47, 123, 141, 148

Blondie Wong interview, 93–100

“Book of Cow,” 14

by Chris Tucker, 19–20

Dateline interview with Luke Benfey, 48–49

disclaimers on bomb-making files, 60–61

“Gerbil Feed Bomb,” 11, 49

numbered cDc files, 18, 32, 59, 98

by Phrack, 25, 43

by Psychedelic Warlord, 15

“Sex with Satan,” 59

Villeneuve interviewing Laird, 131

Won Ton Con, 88

See also bulletin boards

Thiel, Peter, 192, 196

Thieme, Richard, 117–118

Third Technical Department, 135

Thompson, Fred, 76

Tiananmen Square massacre, 87, 92, 94–95, 128

Tibet Action Institute, 131

Tibetan exiles, 100–103, 130–136

Time (magazine), 199

Topiary. See Davis, Jake

Topletz, Steve, 129–130, 195–196

Tor, 3, 128–133, 139–140, 152–157, 195, 210

Toronto Star (newspaper), 95–96

trolling, 54, 170, 193–194, 195–196, 210

Trump, Donald

administrative policies of, 2, 6–7, 202–203, 206–207, 212

Russian election interference, 4–5, 166, 176, 183, 190–191, 199–200, 202

supporters of, 158–159, 191–196

trust

amongst hackers, 21, 29, 46, 148, 156–158, 162, 191

of computer programs, 77–78, 82, 139–140, 175, 197–198

TrustyCon, 198

Tucker, Chris (Nightstalker), 18–20, 43, 63–64, 89, 91–92, 195

Turkey, 168–170

Tweety Fish. See Anthony, Sam

20/20 (television news), 109

2600 (publication), 19, 25–26, 38, 49, 91–92

in-person meetings of, 46–47, 53, 72–73, 104

Twitter, 140, 147, 149, 156, 167, 172, 191–192, 210–211

parody account, 164–165, 170

Tymnet, 28

u4ea, 50

United Nations (UN), 86–87, 96–97, 101–102, 136

United States Congress, 4–5, 145, 176, 182–183, 190–191, 200–201, 206–207, 212

United States government, 3, 48, 54, 103–104, 133, 139, 166, 184

Bill of Rights, 19

Customs and Border Protection (CBP), 144–145

cyberespionage by, 113–114, 119, 139, 161–162, 176

Department of Defense, 38, 74, 78, 122, 176, 177, 179–180, 181

Department of Homeland Security, 176

Department of Justice, 100

Department of State, 86, 104, 143–144, 145, 170

Foreign Intelligence Surveillance Court, 198

Joint Special Operations Command (JSOC), 117

military, 47, 128–129, 149

Secret Service, 24–25, 26–28

US code, 144–145

White House, 57, 115, 176, 191

See also FBI; law enforcement

Universal Declaration of Human Rights, 101–102

University of Alabama, 53

University of California at Berkeley, 123

University of Michigan, 123, 211

University of Texas, 206

University of Toronto, 131, 133

University of Windsor, 86

Unix, 14, 56, 57

USA Today (newspaper), 67

user data, 121–122, 151, 212

Vanity Fair (magazine), 202, 204

VAX, 47

venture capital, 109–110, 112–113, 124, 184

Veracode, 121, 183–186

VICE (online publication), 165, 170

Videodrome (film), 42

Vietnam War, 18, 86, 143

Villeneuve, Nart, 131–137

Vint Cerf, 175

viruses, computer, 81–82, 120, 167, 176

antivirus industry, 29, 66, 78, 83, 107, 167–168, 210

Visa, 145, 149

Von Von Von, 187

vulnerabilities, software, 167, 177, 188, 206, 209

exploits, 33, 57, 78, 119, 122, 133, 164, 167

zero-day vulnerabilities, 119–122, 210

See also bugs

w00w00, 47, 104, 123, 152, 211

Wallenstrom, Joel, 124

Walton, Greg, 99–103, 135–137

warfare, cyber, 116, 131, 134, 136–138, 172, 192, 196

War Games (film), 9, 13, 42, 54

Warner, Mark, 182–183

Washington Post (newspaper), 73–74, 143, 151

Watt, Stephen, 122–123

website defacement, 98, 132, 147, 149

weev. See Auernheimer, Andrew

Weld Pond. See Wysopal, Chris

WELL, the (online community), 22, 26, 30

Wentworth Institute of Technology, 49

WhatsApp, 152

Wheeler, Kevin, 9–20, 78, 82, 95, 156–157

on changes in cDc, 60, 71, 194–195

at Def Con, 66, 80, 96

early life in Lubbock, Texas, 8–13

founding of cDc, 12–17, 30

at HoHoCon, 32–33, 41

involvement in music scene, 17–18, 187–188

learning from other hackers, 18–20

recruiting for cDc, 41, 44, 48–49, 57–59, 87–88, 140–142

whistle-blowing. See leaks

White, Thomas (@CthulhuSec), 170

“white hat” hacking, 3, 82, 123, 148, 196

White Knight. See MacMillan, Dan

white nationalism, in tech world, 6, 144, 193–196

Whole Earth Catalog (magazine), 22

WikiLeaks, 3, 142–151, 155–156, 158–159, 163, 166, 169–170, 192

Windows, 56, 63, 95, 111, 163, 167

Windows 7, 124

Windows 95, 38, 50, 61, 64, 82

Windows 98, 77, 82

Windows NT, 68–69, 77–78, 82

Windows XP Service Pack 2, 111

See also Back Orifice; Microsoft

Wired (magazine), 30, 44, 46, 66, 73–74, 93–94, 99, 178

Wired News (online magazine), 94–95

Wiretapper’s Ball, 163

wiretapping, 143, 145, 163, 198

women, in tech world, 16, 46, 49–50, 141, 149, 154–155, 158

Wong, Blondie, 93–100

Works, the (bulletin board), 38, 41, 45–48, 59

World Economic Forum, 89

World Trade Center. See 9/11 attacks

Wysopal, Chris (Weld Pond), 44–45, 55–56, 62–63, 72–73, 76–77, 108–110

Veracode, 121, 183, 185

Xerobank (xB), 129–130, 139, 195

XmasCon. See HoHoCon

Yahoo, 4, 5, 107, 124, 198

Yes Men, 61

Yippies (Youth International Party), 19, 43

York, Byron (Lou Cipher), 54–55

Youth International Party Line (newsletter), 19, 43

YouTube, 149, 201, 211

Zatko, David, 53–54

Zatko, Peiter (Mudge), 67–68, 73, 75–77, 79–81, 91, 142, 188

history and joining hacking groups, 51, 53–59

professional career, 3, 99, 104, 120–121, 182–183

working with government officials, 4, 108–110, 113–116, 138, 172, 175–181, 206

Zatko, Sarah, 182

Zedong, Mao, 94

Zimmerman, Phil, 100

Zovi, Dino Dai, 177

Zuckerberg, Mark, 142, 191, 200–201