Abene, Mark (Phiber Optik), 26–28
Acid Phreak. See Ladopoulos, Elias
Acton, Brian, 152
Adafruit Industries, 46
Aitel, Dave, 120–121, 137, 177
Akman, Kemal (Mixter), 128, 141, 145, 162–163, 170–172, 186
AKP, 169–170
Al-Bassam, Mustafa (tflow), 149–150
Albini, Steve, 17
Alexander, Keith, 180–181
Alexandre, Brandy, 68
Allard, J (Darby Crash), 38–39
Alliance Teleconferencing, 44
American Association for the Advancement of Science, 100
Amnesty International, 101, 134
anarchism, 11, 40, 47, 60–61, 117, 152, 165
Anarchist’s Cookbook, The, 11
Anglin, Andrew, 195
anonymity, role of, 2–3, 128–130, 142, 157, 161
Anonymous, 145–149, 155, 166, 188, 195
ANSI, 199
Anthony, Sam (Tweety Fish), 7, 48, 62–63, 84, 88, 186–187, 191, 193–194
at conferences, 66–67, 81, 91–93
anti-establishment attitude, 6, 22–23, 27, 43, 86, 93, 142, 176
Antisec (anti-security) movement, 122–123, 148, 165
antivirus industry, 29, 66, 78, 83, 107, 167–168, 210
computer viruses, 81–82, 120, 167, 176
Appelbaum, Jacob “Jake” (IOerror), 3, 151–159, 161, 192
early history and joining cDc, 140, 142
sexual misconduct, 152–158, 193
WikiLeaks, involvement in, 143–145, 148, 150
Apple, 18, 30, 37, 63, 112, 163, 211–212
Apple II computers, 10, 11, 54, 204
iPhones, 2, 121–122, 124, 165–166, 171, 203
applications (apps), 69, 90, 108, 196
APT28, 199
Arch Angel. See Bednarczyk, Michael
Arkin, Brad, 185
ARPANET, 177
art, role in cDc culture, 2, 16, 60–61, 71, 147
artificial intelligence (AI), 142, 201
Assange, Julian (proff), 3, 142–145, 148, 150, 153, 159, 166. See also WikiLeaks
@stake, 3–6, 110–113, 116, 120–125
veterans of, 171, 175, 177, 183–185, 193, 196
Auernheimer, Andrew (weev), 195–196
back doors, 78, 142, 172, 180, 212
by NSA, 5, 100, 138–139, 151, 197
Back Orifice, 66–69, 77–78, 93, 96–98, 123, 148
BO2K, 69, 71–73, 76–79, 81–84, 96, 113–114, 163
Microsoft response, 67–68, 69, 77, 82–83, 96–97
See also Microsoft; Windows
Ball, Patrick, 100–103, 163–164
Baranowski, Paul, 127–128
Barlow, John Perry, 22–23, 26–27, 31–32, 89–91, 132, 150–151, 155
Bates College, 72
BBN Technologies, 37–38, 55–57, 75, 120, 176, 182
Beck, Rob “Whitey,” 83–84, 121, 171, 193–194
Bednarczyk, Michael (Arch Angel), 29, 33, 35
Bell, Al. See Fierstein, Alan
BellSouth, 26–28
Benfey, Luke (Deth Vegetable), 68, 102, 110, 186, 194–195
early life and joining cDc, 33, 39, 47–50
media interactions, 48–49, 59–63, 65–66, 96–97
reaction to Jake situation, 140, 144–147, 156–157
Benjamin, Yobie, 109
Berklee College of Music, 53
Bernstein, Daniel J., 155
Beyond HOPE, 91–93. See also Hackers on Planet Earth (HOPE)
Black Crawling Systems, 38
black representation in tech world, 49–50
Blaze, Matt, 155
Bloomberg News, 164
Blue Coat, 133
BlueHat security conferences, 111, 123
BO2K, 69, 71–73, 76–79, 81–84, 96, 113–114, 163
Boing Boing (zine), 16, 60, 151, 153
Border Gateway Protocol, 76
Boston, Massachusetts, 3, 7, 19, 37–51, 53, 55, 74–75, 104, 191
Boston Herald (newspaper), 50
Boston University, 38
Brewer, Brandon (Sid Vicious), 11–13, 30, 186
Brewer, Ty (Graphic Violence), 12, 30
Brian Oblivion. See Hassick, Brian
Broderick, Matthew, 9
Brown, Bill (Franken Gibe), 13–15, 17–18, 30, 71, 81, 85, 186
Brown, Laird (Oxblood Ruffin), 85–105, 131–132, 141–146, 150, 156–158, 162–164, 171–172
early life and pre-cDc history, 85–87
as father of hacktivism, 3, 84, 91, 97, 113
Hacktivismo, 99–103, 127–131, 139, 141, 149, 162, 194–195
Tibetans, helping, 99–101, 130–131, 135, 137
See also Hong Kong Blondes
Bruni, Frank, 202
Buchbinder, Josh (Sir Dystic), 63–68, 78, 81, 93, 186
bugs, in software, 48, 119–121, 175, 179, 185
coordinated disclosure, 73, 110–111, 122, 197
disclosure ethics, 135–136, 177, 188, 196–198
patches for, 67, 72–74, 112, 119, 124, 197
See also vulnerabilities
bulletin boards, electronic, 10–22, 24–25, 35, 38–39, 45, 47, 49
as connection for beginner hackers, 10, 15, 42–43, 53, 203–205
Demon Roach Underground, 11, 13, 17, 44, 93, 204
expansion of cDc via, 13–16, 62
See also text files
Burns, Jesse, 124
Bush, George H. W. (administration), 21, 74
Bush, George W. (administration), 116, 176
Businessweek (magazine), 67
Calvary, 38–39
Cambridge Analytica, 6, 196, 201
Cambridge Technology Partners, 109–110
Campbell, Carolin “Carrie” (Lady Carolin), 16, 32, 88–89, 91–93, 186, 191–192
on Back Orifice, 64, 67, 69, 83
Canadian government, 86, 134–137
Cap’n Crunch. See Draper, John
Cassady, Neal, 22
CA Technologies, 185
Ceglowski, Maciej, 192–193
Cellebrite, 165–166
censorship, 99, 104–105, 127, 136. See also Tor
Center for Humane Technology, 201
Chaos Computer Club, 143, 153–154, 156–157, 162
Cheshire Catalyst. See Osband, Robert
Chinese government, 2, 54, 114, 138–139, 196, 211–212
Chinese dissidents, 87–88, 91–92
Great Firewall of China, 104–105, 149
Tibetan exiles, 100–103, 130–136
See also Hong Kong Blondes
Chinese People’s Liberation Army, 135
Choate, 50
Chuk E. See Rhodes, Charlie
Church of Scientology, 146
CIA, 18, 43, 104, 114, 118, 121, 190
Russian hacking and, 166–168, 176, 183
Cisco Systems, 1–2, 74, 167, 211
Citizen Lab, 131–137, 161, 164–165, 210. See also Tor
Clarke, Richard, 5, 74–77, 114–115, 176
Clinton, Bill (administration), 21, 74, 78, 95–96, 115
Clinton, Hillary, 104, 149, 159, 166
Cloudmark, 104
CNN, 67
code, computer, 78, 108, 112, 143, 168, 193
source code, 51, 57–58, 137–138, 164–165, 182–186
Coleman, Gabriella, 145, 149, 155, 166
Comey, James, 191
Commission on Human Rights, 96–97
Computer Associates, 185
Computer Fraud and Abuse Act (1986), 5, 16, 42, 54, 64, 75, 90
Computer Network Defense, 74
Computers, Freedom, and Privacy conference, 100–101
“Computer Vice” (Geraldo), 59
ComSec, 28
conferences, for hackers, 3, 23–34, 100–101, 111, 123, 153–157, 197–198
Hackers on Planet Earth (HOPE), 91–93, 143–144, 188–189
HoHoCon (Xmas Con), 24–25, 28–30, 32–34, 37, 41, 48, 85, 158
See also Def Con
Consumer Electronics Show, 187
Cool Beans (zine), 17
Corley, Eric (Emmanuel Goldstein), 26, 92
counter-culture, influence in cDc, 22, 71, 93, 205–206
Count Zero. See Lester, John
credit card hacking, 10, 21–23, 27, 40, 42, 45, 110, 148–149
crime, role of, 29, 120–122, 143, 148, 164, 176. See also law enforcement
Criminal Investigative Service, 78
critical thinking, role in tech world, 188, 191, 209
CrowdStrike, 134
Cruz, Ted, 5–7, 190–191, 196, 200, 202–204, 206
cryptography, 43, 78, 82, 100, 131, 143, 155, 196
C-SPAN, 190
@CthulhuSec. See White, Thomas
Cuckoo’s Egg, The (Stoll), 26–27
Cyber Analytic Framework, 179–180
Cyber Command, 180
cyberespionage. See espionage
Cyber Fast Track (CFT), 178–179, 181
Cyber Independent Testing Lab (CITL), 182
cybersecurity. See security
cyberwarfare, 116, 131, 134, 136–138, 172, 192, 196
Cypherpunks, 27, 65, 100, 139, 143
Dalai Lama, the, 100, 130, 135
Darby Crash. See Allard, J
dark market transactions, 21, 162, 193
Dark Tangent. See Moss, Jeff
databases, 35, 43–44, 74, 100–101, 107
security of, 61, 111–112, 122, 170
Dateline (television show), 48–49, 59, 62
Davis, Jake (Topiary), 147–148
DCLeaks, 199
“Declaration of Independence of Cyberspace” (Barlow), 31, 89–90
Def Con, 33–34, 80–83, 91, 113, 140, 178, 188
cDc presentations at, 61–63, 66–67, 77, 83, 96–97, 100–103, 127–128
Stamos on security ethics, 4, 196–198, 200
Defending Digital Democracy project, 200
Defense Advanced Research Projects Agency (DARPA), 3, 128–129, 176–182, 206
Defense Intelligence Agency, 48
Deibert, Ron, 132–137
Democracy (bulletin board), 38
Democratic Congressional Campaign Committee, 192
Democratic National Committee (DNC), 158–159, 166–168, 192, 199
Demon Roach Underground, 11, 13, 17, 44, 93, 204
denial-of-service attacks, 115, 120, 123, 132, 146
Deth Vegetable. See Benfey, Luke
deVilla, Joey, 127–128
Devost, Matt, 113
Dharamsala, Tibet, 100–103, 130–136
Digital Equipment Corporation, 47
Digital Millennium Copyright Act, 90
Dilbert (comic strip), 72
Dildog. See Rioux, Christien
Dingledine, Roger, 129, 140, 155
Dormido, Angela, 35
dot-com boom, 65, 79, 107, 113, 116
Draper, John (Cap’n Crunch), 18, 158
Drew, Dale, 26
drugs, role of, 11, 30, 49, 63, 65, 77, 80, 110, 140
at conferences, 22–23, 26–29, 32, 34
liberalization of drug laws, 7, 189–190, 202, 205
Drunkfux (dFx). See Dryden, Jesse
Dryden, Jesse (Drunkfux), 21–24, 26, 28–30, 32–35, 48, 54, 58
Dryden, Spencer, 22
dsniff, 123
DSSK Corp, 195–196
Dual Elliptic Curve, 151
Dukakis, Mike, 48
Electronic Frontier Foundation (EFF), 32, 37, 89, 102, 134, 150, 170
elite, concept of being, 10, 40–41, 62, 66, 96, 149, 176
Ellsberg, Daniel, 151
El Paso, Texas, 15, 17, 189–190, 203, 205
email, 48, 57, 135, 150, 165, 198
cDc, 32, 57, 63–64, 141, 150, 156–157, 189, 194
Cypherpunks, 27, 65, 100, 139, 143
Emmanuel Goldstein. See Corley, Eric
encryption, 19, 66, 78–79, 100, 180, 197, 210
Encyclopedia Dramatica, 148
Enhanced 911 services, 26–28, 114
Erdogan, Recep, 168–169
espionage, 48, 132–135, 154, 181
international, 120, 137, 170–173, 198
by US government, 113–114, 119, 139, 161–162, 176
Esquire (magazine), 18
ethics, 3, 60, 113, 120, 133–134, 146–147, 172
personal codes of, 55, 119, 122–123, 125, 136, 209–212
professional ethics, 200–201, 211
social responsibility, 196, 211
See also moral issues
exploits, 33, 57, 78, 119, 122, 133, 164, 167
export controls, 78–79, 155, 164
Facebook, 4–6, 152, 157–158, 190–196, 198–201, 211
Fairbanks, Cassandra, 149
Farr, Nick, 156–157
FBI, 27–30, 51, 64, 68, 74–75, 78, 148
iPhone access, 122, 165–166, 171–172, 211–212
See also law enforcement; United States government
Fielding, Noel, 147
Fierstein, Alan (Al Bell), 19
Financial Times (newspaper), 147
FinFisher (FinSpy), 163–165
firewalls, 84, 104–105, 127, 149
Fisher, Phineas (pseudonym), 165–170, 171, 172
FlexiSpy, 165–166
Ford, Luke, 68
Fox News, 199–200
Franken Gibe. See Brown, Bill
Frauenfelder, Mark, 60
Freedom of the Press Foundation, 150–151, 155
freedoms, protection of
of opinion and expression, 101–102, 172
of the press, 19, 27, 150–151, 155
from unreasonable search and seizure, 27
Freegate, 139
FreqOut. See Shea, Dylan
Fried, Limor (Lady Ada), 46, 63, 81, 93
F-Secure, 82
G. A. Ellsworth. See Kelly, Matt
Gallagher, Hugh, 187
Galperin, Eva, 170
Gamergate, 193–194
games, computer, 15, 31, 54, 72, 205
Gamma Group, 133, 163–165, 168, 170–172, 210
@GammaGroupPR, 164–165, 170. See also Fisher, Phineas
Garcia, Jerry, 22
Gates, Bill, 38, 50, 64, 96, 111
geopolitics of the internet, 121, 133, 137, 161, 163, 171, 173
Geraldo (television show), 59
GhostNet, 135–137
Gibson, William, 38
Gilmore, John, 27, 65, 100, 155
Godwin, Mike, 144
Gonzalez, Albert, 122
China, data breach in, 137–138, 151, 196, 211
hackers working for, 122–124, 134, 171–172, 182, 188, 200–201
Grand, Joe (Kingpin), 39–40, 42, 45, 76, 109
Graphic Violence. See Brewer, Ty
Grateful Dead (band), 22–23, 26
Greenwald, Glenn, 151
Grugq, the, 121
Guardian (newspaper), 151, 201
Gutierrez, Vince, 23–24
Hackers (film), 60
Hackers on Planet Earth (HOPE), 91–93, 143–144, 188–189
hacker space, 39–41, 49–50, 65, 73, 155. See also L0pht
Hacking Team, 133, 164–165, 168, 170
hacktivism, 87–103, 113, 133, 137, 145–146, 188, 209–210
Tibetan exiles, 100–103, 130–136
See also Hacktivismo; Hong Kong Blondes; Tor; WikiLeaks
Hacktivismo, 99–103, 127–131, 139, 141, 149, 162, 194–195
Hailstone, 186
Hamilton, Booz Allen, 177
Hammond, Jeremy, 148
handles, use of, 3, 54, 61, 110, 121–122, 148, 154
Harper’s (magazine), 26
Harris, Tristan, 201
Harvard University, 37–38, 46, 55, 172, 186, 200
Hassick, Brian (Brian Oblivion), 38–45, 55–56, 76
Hell (hacker living space), 49
Henson, James, 206
Heyer, Heather, 195
history of cDc, 2–3, 12–17, 41, 99, 140–142. See also Wheeler, Kevin
Hitchhiker’s Guide to the Galaxy, 12
Hoffman, Abbie, 19
HoHoCon (Xmas Con), 24–25, 28–30, 32–34, 37, 41, 48, 85, 158
Holly, Buddy, 9
Hong Kong Blondes, 87–100, 115, 137, 163, 189
Blondie Wong interview, 93–100
See also Brown, Laird (Oxblood Ruffin); Chinese government; hacktivism
Honker Union, 103
Houston, Texas, 21, 24, 32, 206
Hughes, Eric, 65
Human Rights Watch, 129
humor, role of, 59–61, 67, 147–148, 164–165, 170
in cDc culture, 11–15, 23, 47–48, 71, 80, 109–110, 203
See also Back Orifice; Hong Kong Blondes
immigration, 192–193, 196–197, 201, 212
Immunet, 104
International Covenant on Civil and Political Rights, 102
Internet Relay Chat, 32, 72, 135, 142, 146, 149, 165, 188
Internet Research Agency (IRA), 199–200
Internet Security Systems (ISS), 79–81
IOerror. See Appelbaum, Jacob
Isaacson, Andy, 153
iSec Partners, 124–125, 196, 201
Javaman. See O’Donnell, Adam
Jefferson Airplane (band), 22, 24
Jintao, Hu, 114
Jolie, Angelina, 60
Jones, Alex, 149
Julian, Ted, 123
Kam, Moshe, 211
Kelly, Matt (G.A. Ellsworth), 15–17, 32, 186
Kesey, Ken, 22–23
keystroke logging, 66, 117, 182
KGB (bulletin board), 12
Kialo, 172
Kingpin. See Grand, Joe
Klein, Naomi, 95–96
K0de Ab0de, 21
Komlo, Chelsea, 153–154
Koum, Jan, 152
Kroupa, Patrick (Lord Digital), 30–32, 141, 145–146, 202
Kubecka, Misha (Omega), 33, 39, 43–44, 57, 88, 156, 186
Kurtzrock, Glenn, 102, 144, 186
Ladopoulos, Elias (Acid Phreak), 26–28
Lady Ada. See Fried, Limor
Lady Carolin. See Campbell, Carolin
Lamo, Adrian, 144
Las Vegas, Nevada, 33–34, 62, 67, 81, 100–101
law enforcement, 11, 122, 152, 157–158, 199, 212
hack of Catalan Police Union, 165, 168–170
hackers in trouble with, 13, 25, 27, 30, 32–33, 49–50, 55, 144–146
hackers working with, 2, 29–30, 117, 162, 165
See also FBI; National Security Agency; United States government
leaks, of information
DCLeaks, 199
whistle-blowing, 118, 137, 143–144, 167, 180, 185
WikiLeaks, 3, 142–151, 155–156, 158–159, 163, 166, 169–170, 192
See also Snowden, Edward
Leary, Timothy, 22
legal liability, 69, 74, 78, 85, 108–109, 133, 137, 175
Legion of Doom (LoD), 25–30, 32, 45, 54, 60, 80
Legions of the Underground (LoU), 98–99
legislation, of technology, 89, 171, 190
Leonard, Paul (Obscure Images), 16, 32, 60, 155–156, 186, 194–195
Lester, John (Count Zero), 41–42, 85–86, 88, 91, 93, 186
departure from L0pht, 56, 58, 76
founding L0pht and 2600 meetings, 38–40, 45–46
Lewis, Jim, 170
Lex Luthor, 25
licensing, of software, 69, 108
Litchfield, David, 111–112, 122, 171
L0pht, 3, 55–61, 71–77, 86, 91, 98–99
congressional testimony, 4, 75–77
L0phtCrack password breaker, 56, 73–74
L0pht Heavy Industries, re-incorporation as, 55–56
security advisories, 56–57, 59, 61, 108–110, 113, 197
@stake merger, 110, 113, 116, 123, 183–184
Lord Digital. See Kroupa, Patrick
Los Angeles Times (newspaper), 97–98
Lotus Development Corporation, 37, 45, 56
Lou Cipher. See York, Byron
founding of cDc in, 13–17
Kevin Wheeler’s early life in, 8–13
Lubbock Avalanche-Journal (newspaper), 82
Lulz Security (@LulzSec), 147–150, 164–165, 210
MacMillan, Dan (White Knight), 33, 39–41, 43–46, 53–57, 63, 76, 186
Magic Man, 38
malware. See software programs, malicious
Mandiant, 134
Mann, Sally, 22–23
Manning, Chelsea (formerly Bradley), 143–144
Marlinspike, Moxie, 152, 162, 178
Masters of Deception (MoD), 25–29, 32, 54
Matasano Security, 125
Mathewson, Nick, 129, 140, 155
Matlock. See Noonan, Timothy
Mayer, Marissa, 198
McGill University, 166
media, cDc relationship with, 58–62, 67–68, 80. See also Hong Kong Blondes
Medium (website), 99
Mentor, the, 44
Mercer, Rebekah, 196
Mercer, Robert, 196
Merry Pranksters, 22–23
Messiah Village, 48–49
Metasploit, 177
#MeToo, 158
Microsoft, 37, 63, 108, 196, 212
Back Orifice, response to, 67–69, 77, 82–83, 96–97
hackers working for, 38, 50, 111–112, 122–124, 193
security vulnerabilities, 45, 56, 72–73, 82–83, 85, 111–112
See also Back Orifice; Windows
military, 74, 78, 117–118, 136, 185, 209
See also United States government
Miller, Charlie, 178–179
Miloševic, Slobodan, 102–103
MindSpring, 68
MIT, 37–38, 40, 45–46, 50, 53, 72–73
Mixter. See Akman, Kemal
early internet use of, 9–10, 15–16, 26, 38, 42, 48
Mondo 2000 (magazine), 65
Monsegur, Hector (Sabu), 148–150
Moore, H. D., 177
moral issues, 79–80, 102–104, 118, 132, 165–166, 201
moral crisis of technology, 78, 85, 125, 197, 212
moral reasoning, 43, 117, 124, 155, 161, 181, 211
opposition to immoral conduct, 193
See also ethics
Morris, Chris, 147
Moss, Jeff (Dark Tangent), 33–34, 61
Motor 308, 17–18
Moussouris, Katie, 122
Mudge. See Zatko, Peiter
Muench, Martin, 162–163, 171–172
Mulvenon, James, 103–104
Murdoch, Rupert, 147
music, role in cDc culture, 21–23, 53, 72, 86, 187, 202
Foss (O’Rourke’s band), 92–93, 189, 191–192, 202–203, 207
punk influences, 11, 14–15, 17–18, 80, 88
Muth, Edmund, 67
National Security Agency (NSA), 3, 34, 68, 74–75, 143–144, 163, 211
back doors by, 5, 100, 138–139, 151, 197
hackers working with, 110, 118–120, 137–138, 176
security breach of, 166–168, 197
Snowden leak, 4, 138, 150–152, 172, 181, 196
National Security Council (NSC), 74–76, 114–115
NBC News, 48–49
NCC Group, 124
Netscape, 18, 32, 50, 61, 63, 65, 72
“Never Again” pledge, 193
New Hack City (hacker space), 49–50, 65, 73
New York City, New York, 19, 30–32, 91–93, 104, 143–144, 187
New York Times (newspaper), 67, 133, 135, 143, 151, 202, 207
New York University, 187
Nightstalker. See Tucker, Chris
9/11 attacks, 113–114, 116–117, 119, 133, 187
Ninja Strike Force (NSF), 6, 62–63, 81, 116–117, 121, 129–130, 177, 193–196
Noisebridge, 155
No Logo: Taking Aim at the Brand Bullies (Klein), 96
nonprofits, 102, 130, 132, 152, 164, 182, 188
Noonan, Timothy (Matlock), 195–196
NORAD, 58
NPR, 67
NSO Group, 133
Obama, Barack (administration), 104, 168, 204
Obscure Images. See Leonard, Paul
O’Donnell, Adam (Javaman), 104–105, 141, 152, 156–157, 193
political fundraising by, 1–2, 4–6, 201–202
Omega. See Kubecka, Misha
Onion Router. See Tor
OpenCola, 127
OpenNet Initiative, 132
open-source projects, 108, 113, 123, 127
Operation Tunisia, 149–150
O’Rourke, Robert “Beto” (Psychedelic Warlord), 5–7, 15–17, 92–93, 141, 188–192, 196, 201–207
Osband, Robert (Cheshire Catalyst), 19, 55
Oxblood Ruffin. See Brown, Laird
Palantir, 192
Palm, 130
Panama Papers, 166
Paramedia, 60
password security, 56, 108–109, 123, 140
patches, for software flaws, 67, 72–74, 112, 119, 124, 197. See also bugs
Pegasus spyware, 133
penetration testing, 107, 109–110, 113, 122, 135, 177
Pentagon, the, 113, 143, 178–179, 201, 211
digital threats against, 74, 78, 142, 151
hackers working for, 29, 37–38, 54, 116, 180–181
Pentagon Papers, 151
Perceptive Automata, 186–187
Phiber Optik. See Abene, Mark
phone hacking. See phreaking
Phrack (online magazine), 24–26, 28, 32–33, 37–38, 43, 47, 98, 122, 211
Phrack High Council, 122–123
phreaking, 12–14, 16, 18–19, 24, 30–31, 33, 40, 44
long-distance codes, 10–12, 42, 204–205, 209
piracy, digital, 15–16, 21, 30, 54, 68, 121
Pitsos, Errikos, 172
policies, effects of, 110–111, 130, 132
corporate, 146–147, 148–149, 196
government, 151–152, 192–193, 202–203
politics, 132, 175–176, 190–196
campaign fundraising, 1, 5, 7–8, 201–202, 203
campaign security advice, 193, 200
conservatism, 9, 19–20, 192–193, 207
DNC hack, 158–159, 166–168, 192, 199
liberalism, 47, 87, 191, 203–204, 207
libertarianism, 20, 27, 89, 202, 207
protests, 86, 113, 131, 146, 148–149, 201, 203
See also hacktivism; O’Rourke, Robert “Beto”; Trump, Donald
Poulsen, Kevin, 44
Presidential Decision Directive 63, 75–76
Pretty Good Privacy (PGP), 100
privacy, 19, 43–44, 84, 100–101, 114, 147, 211
proff. See Assange, Julian
Project Mayhem, 122–123
Project Zero, 188
propaganda, 2, 5, 60, 149, 200, 211
proxy systems, 104, 128, 136, 162
Psychedelic Warlord. See O’Rourke, Robert “Beto”
public embarrassment, 108, 110, 145, 165
public interest hacking, 166, 210
Pure Nihilism, 16
racism, in tech world, 193–196, 199–200, 203
RAND, 103
Reagan, Ronald (administration), 9, 11, 19
Reddit, 84
regulations, digital, 19–20, 78–79, 175–176, 202, 210–211
Rensselaer Polytechnic Institute (RPI), 45
Republican National Convention, 196
Republic Title, 186
Reuters (news agency), 142
Rhodes, Charlie (Chuk E), 49
Rioux, Christien (Dildog), 99, 108–110, 121, 156, 183–186, 191, 196
BO2K, 69, 71–73, 76–79, 81–82, 84, 163
Ritter, Jordan, 104
Rohozinski, Rafal, 136–137
Rolling Stone (magazine), 22, 142, 187
Rolling Stones (band), 50
Rosenbaum, Ron, 18
Rosie the Riveter. See Snyder, Window
Ross, Alec, 104
routing systems, 76, 104–105, 132, 167
Onion Router (Tor), 3, 139–140, 152–157, 195, 210
RSA, 197–198
Rubin, Andy, 124
Ruffin, David, 88
Russia
hacking tools, 2, 134, 163, 170–171
Moonlight Maze, 74
Russian intelligence agencies, 151, 166, 193–194, 199
Russian operatives, 148–149, 158–159, 198–199
Trump election interference, 4–5, 166, 176, 183, 190–191, 199–200, 202
Sabu. See Monsegur, Hector
Sadofsky, Jason Scott, 38, 46–47, 58–59, 67, 69
Salon (online magazine), 151
San Antonio Express-News, 60
Sandberg, Sheryl, 200
San Francisco, California, 1–8, 22, 30, 65, 113, 123, 128, 155, 186
satellite communications, 61, 93, 95, 131, 177
Schneier, Bruce, 82–83, 155, 210
secrecy, role of, 117–120, 134, 145, 171, 196
WikiLeaks, 142–151, 155–156, 158–159, 163, 166, 169–170, 192
“Secrets of the Little Blue Box” (Rosenbaum), 18
Secure Sockets Layer encryption, 127
security, 3–5, 43, 51, 84, 136, 182–184, 199
advisories to public, 56–57, 59, 61, 72–74, 108–110, 113, 193, 197
industry, 29–30, 79–80, 85, 171, 177–180, 197
self-driving car technology, 7, 175, 178, 186–187
Setec Astronomy, 65
sexism, in tech world, 158, 170, 193–194
sexual misconduct, in tech world, 150, 152–156, 193
Shadow Brokers, 167
Sid Vicious. See Brewer, Brandon
Silicon Valley, 3–4, 37, 121, 130, 133, 184–185, 191–192, 201–202
Sir Dystic (Josh Buchbinder), 63–68, 78, 81, 93, 186
Slack, 193
Slashdot, 84
Slick, Grace, 22
smartphones, 124, 130–131, 163, 178
Snowden, Edward, 138, 167, 172, 177, 181–182, 211
contents of leak, 4, 120, 137, 139, 151, 172
Freedom of the Press Foundation, 150–151, 155
ramifications of leak, 122, 153, 161, 196–198
Snyder, Window (Rosie the Riveter), 49–50, 63, 110–111, 121–123, 171
social engineering, 35, 141, 153
Facebook, 4–6, 152, 157–158, 190–196, 198–201, 211
See also Twitter
software, pirated, 15–16, 21, 30, 54, 68, 121
software flaws. See bugs
software programs, malicious, 64, 73, 77, 82–83, 134, 150, 179
malware, 103, 121, 135–136, 167, 196, 210
worms, self-replicating, 112, 123
Song, Dug, 123, 125, 152, 177–178, 211
Soros, George, 199
Spiegel, Der (magazine), 151
Stamos, Alex, 4–5, 6, 123–124, 196–202, 211
Stanford University, 200–201
start-ups, 1, 110, 127, 130, 162, 171–172, 183–186, 192, 212
State Security Investigations Service (Egypt), 164
Steele, Shari, 153–154
Sterling, Bruce, 32–33
Stoll, Cliff, 26–27
Stratfor, 148
Stripe, 182
Students for a Free Tibet, 131
Sumners, Colton, 194–195
surveillance, 123, 133, 139, 152, 180, 182, 193, 211
Swamp Rat. See Wheeler, Kevin
Symantec, 79, 107, 112, 122, 123, 183
sysop (system operator), 13, 38, 47, 82
Syverson, Paul, 129
Tacoland, 17
Tailored Access Operations, 176
TAP (“Technological American Party” newsletter), 19, 31, 55
TCP/IP, 38
Ted’s Collision and Body Repair (bar), 94
Telecommunications Act (1996), 89–90
terrorism, 59, 74, 113, 115–117, 210
Tethong, Lhadon, 131
text files (t-files), 10–20, 33, 44, 47, 123, 141, 148
Blondie Wong interview, 93–100
“Book of Cow,” 14
by Chris Tucker, 19–20
Dateline interview with Luke Benfey, 48–49
disclaimers on bomb-making files, 60–61
numbered cDc files, 18, 32, 59, 98
by Psychedelic Warlord, 15
“Sex with Satan,” 59
Villeneuve interviewing Laird, 131
Won Ton Con, 88
See also bulletin boards
Thieme, Richard, 117–118
Third Technical Department, 135
Thompson, Fred, 76
Tiananmen Square massacre, 87, 92, 94–95, 128
Tibet Action Institute, 131
Tibetan exiles, 100–103, 130–136
Time (magazine), 199
Topiary. See Davis, Jake
Topletz, Steve, 129–130, 195–196
Tor, 3, 128–133, 139–140, 152–157, 195, 210
Toronto Star (newspaper), 95–96
trolling, 54, 170, 193–194, 195–196, 210
Trump, Donald
administrative policies of, 2, 6–7, 202–203, 206–207, 212
Russian election interference, 4–5, 166, 176, 183, 190–191, 199–200, 202
supporters of, 158–159, 191–196
trust
amongst hackers, 21, 29, 46, 148, 156–158, 162, 191
of computer programs, 77–78, 82, 139–140, 175, 197–198
TrustyCon, 198
Tucker, Chris (Nightstalker), 18–20, 43, 63–64, 89, 91–92, 195
Turkey, 168–170
Tweety Fish. See Anthony, Sam
20/20 (television news), 109
2600 (publication), 19, 25–26, 38, 49, 91–92
in-person meetings of, 46–47, 53, 72–73, 104
Twitter, 140, 147, 149, 156, 167, 172, 191–192, 210–211
Tymnet, 28
u4ea, 50
United Nations (UN), 86–87, 96–97, 101–102, 136
United States Congress, 4–5, 145, 176, 182–183, 190–191, 200–201, 206–207, 212
United States government, 3, 48, 54, 103–104, 133, 139, 166, 184
Bill of Rights, 19
Customs and Border Protection (CBP), 144–145
cyberespionage by, 113–114, 119, 139, 161–162, 176
Department of Defense, 38, 74, 78, 122, 176, 177, 179–180, 181
Department of Homeland Security, 176
Department of Justice, 100
Department of State, 86, 104, 143–144, 145, 170
Foreign Intelligence Surveillance Court, 198
Joint Special Operations Command (JSOC), 117
US code, 144–145
White House, 57, 115, 176, 191
See also FBI; law enforcement
Universal Declaration of Human Rights, 101–102
University of Alabama, 53
University of California at Berkeley, 123
University of Michigan, 123, 211
University of Texas, 206
University of Toronto, 131, 133
University of Windsor, 86
USA Today (newspaper), 67
Vanity Fair (magazine), 202, 204
VAX, 47
venture capital, 109–110, 112–113, 124, 184
VICE (online publication), 165, 170
Videodrome (film), 42
Villeneuve, Nart, 131–137
Vint Cerf, 175
viruses, computer, 81–82, 120, 167, 176
antivirus industry, 29, 66, 78, 83, 107, 167–168, 210
Von Von Von, 187
vulnerabilities, software, 167, 177, 188, 206, 209
exploits, 33, 57, 78, 119, 122, 133, 164, 167
zero-day vulnerabilities, 119–122, 210
See also bugs
w00w00, 47, 104, 123, 152, 211
Wallenstrom, Joel, 124
warfare, cyber, 116, 131, 134, 136–138, 172, 192, 196
War Games (film), 9, 13, 42, 54
Warner, Mark, 182–183
Washington Post (newspaper), 73–74, 143, 151
Watt, Stephen, 122–123
website defacement, 98, 132, 147, 149
weev. See Auernheimer, Andrew
Weld Pond. See Wysopal, Chris
WELL, the (online community), 22, 26, 30
Wentworth Institute of Technology, 49
WhatsApp, 152
Wheeler, Kevin, 9–20, 78, 82, 95, 156–157
on changes in cDc, 60, 71, 194–195
early life in Lubbock, Texas, 8–13
involvement in music scene, 17–18, 187–188
learning from other hackers, 18–20
recruiting for cDc, 41, 44, 48–49, 57–59, 87–88, 140–142
whistle-blowing. See leaks
White, Thomas (@CthulhuSec), 170
“white hat” hacking, 3, 82, 123, 148, 196
White Knight. See MacMillan, Dan
white nationalism, in tech world, 6, 144, 193–196
Whole Earth Catalog (magazine), 22
WikiLeaks, 3, 142–151, 155–156, 158–159, 163, 166, 169–170, 192
Windows, 56, 63, 95, 111, 163, 167
Windows 7, 124
Windows 95, 38, 50, 61, 64, 82
Windows XP Service Pack 2, 111
See also Back Orifice; Microsoft
Wired (magazine), 30, 44, 46, 66, 73–74, 93–94, 99, 178
Wired News (online magazine), 94–95
Wiretapper’s Ball, 163
wiretapping, 143, 145, 163, 198
women, in tech world, 16, 46, 49–50, 141, 149, 154–155, 158
Wong, Blondie, 93–100
Works, the (bulletin board), 38, 41, 45–48, 59
World Economic Forum, 89
World Trade Center. See 9/11 attacks
Wysopal, Chris (Weld Pond), 44–45, 55–56, 62–63, 72–73, 76–77, 108–110
Xerobank (xB), 129–130, 139, 195
XmasCon. See HoHoCon
Yes Men, 61
Yippies (Youth International Party), 19, 43
York, Byron (Lou Cipher), 54–55
Youth International Party Line (newsletter), 19, 43
Zatko, David, 53–54
Zatko, Peiter (Mudge), 67–68, 73, 75–77, 79–81, 91, 142, 188
history and joining hacking groups, 51, 53–59
professional career, 3, 99, 104, 120–121, 182–183
working with government officials, 4, 108–110, 113–116, 138, 172, 175–181, 206
Zatko, Sarah, 182
Zedong, Mao, 94
Zimmerman, Phil, 100
Zovi, Dino Dai, 177