This machine kills secrets : how WikiLeakers, cypherpunks and hacktivists aim to free the world's information / Andy Greenberg.

An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.

Bibliographic Details
Main Author: Greenberg, Andy
Language:English
Published: New York, N.Y. : Dutton, 2012, ©2012.
Subjects:
Local Note:
MSU: The material is stored offsite in Remote Storage. Please contact Special Collections 3 working days in advance if you wish to use it.
MSU: In dust jacket.
Physical Description:xiv, 370 pages ; 24 cm
Format: Book

MARC

LEADER 00000cam a2200000 a 4500
001 in00005110129
003 OCoLC
005 20220616053953.0
008 120203s2012 nyu b 001 0 eng
010 |a  2012004309 
020 |a 9780525953203 (hbk.) 
020 |a 0525953205 (hbk.) 
035 |a (CaEvSKY)sky245950743 
035 |a (OCoLC)731911680 
040 |a DLC  |c DLC  |d DLC  |d SKYRV  |e rda  |d UtOrBLW 
042 |a pcc 
049 |a EEMJ 
050 0 0 |a HV6773  |b .G74 2012 
082 0 0 |a 364.16/8  |2 23 
100 1 |a Greenberg, Andy.  |0 http://id.loc.gov/authorities/names/n2012008168 
245 1 0 |a This machine kills secrets :  |b how WikiLeakers, cypherpunks and hacktivists aim to free the world's information /  |c Andy Greenberg. 
260 |a New York, N.Y. :  |b Dutton,  |c 2012, ©2012. 
300 |a xiv, 370 pages ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references (pages 325-356) and index. 
505 0 |a The whistleblowers -- The cryptographers -- The cypherpunks -- The onion routers -- The plumbers -- The globalizers -- The engineers. 
520 |a An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg. 
590 |a MSU: The material is stored offsite in Remote Storage. Please contact Special Collections 3 working days in advance if you wish to use it. 
590 |a MSU: In dust jacket. 
650 0 |a Hackers  |x Political activity.  |0 http://id.loc.gov/authorities/subjects/sh94005931 
650 0 |a Secrecy.  |0 http://id.loc.gov/authorities/subjects/sh85119431 
650 0 |a Official secrets.  |0 http://id.loc.gov/authorities/subjects/sh85094205 
650 0 |a Whistle blowing.  |0 http://id.loc.gov/authorities/subjects/sh85146449 
650 0 |a Computer crimes.  |0 http://id.loc.gov/authorities/subjects/sh85029492 
650 7 |a COMPUTERS / Internet / Security. 
650 7 |a COMPUTERS / Information Technology. 
907 |y .b99271606  |b 210127  |c 130501 
998 |a sp  |b 130606  |c m  |d a   |e -  |f eng  |g nyu  |h 0  |i 2 
999 f f |i 76a080b6-0c73-550a-a3a4-145d37ac430b  |s 8bb3d39b-f4fe-53b1-83df-f2078c699a4a  |t 0 
952 f f |p Non-Circulating  |a Michigan State University-Library of Michigan  |b Michigan State University  |c MSU Special Collections  |d MSU Special Collections - Remote Radicalism  |t 0  |e HV6773 .G74 2012  |h Library of Congress classification  |i Printed Material  |n 1