Surveillance Valley

The Secret Military History of the Internet

This title was previously available on NetGalley and is now archived.
Buy on Amazon Buy on BN.com Buy on Bookshop.org
*This page contains affiliate links, so we may earn a small commission when you make a purchase through links on our site at no additional cost to you.
Send NetGalley books directly to your Kindle or Kindle app

1
To read on a Kindle or Kindle app, please add kindle@netgalley.com as an approved email address to receive files in your Amazon account. Click here for step-by-step instructions.
2
Also find your Kindle email address within your Amazon account, and enter it here.
Pub Date Feb 06 2018 | Archive Date Oct 16 2018

Description

The internet is the most effective weapon the government has ever built.

In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project.

A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea -- using computers to spy on people and groups perceived as a threat, both at home and abroad -- drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.

But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.

With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news -- and the device on which you read it.
The internet is the most effective weapon the government has ever built.

In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to...

Available Editions

EDITION Other Format
ISBN 9781610398022
PRICE $40.00 (USD)
PAGES 384

Average rating from 8 members


Featured Reviews

Just How Smart Are Those Guys?

I don’t own a tinfoil hat. I am fairly sure there is no black vans parked outside my driveway, and I sleep without worry that someone is sneaking into my house to plant bugs. On the other hand, I have little doubt that anything I do online is vacuumed up by the NSA and probably stored in some database.

But there is a whole section of the web known as the “dark web” that is supposedly immune to this sort of monitoring. All the transactions are encrypted, and user’s identities, and their IP addresses are cleverly hidden behind a convoluted web of proxy servers that route traffic around the world a few times to disguise its true sender and receiver.

Yasha Levine makes the case that the various security agencies of the Federal Government, and their allies, are the true owners of this “dark web”, and have built into it the capability to monitor it at will. So the question really becomes one of the capabilities of “The Feds”. Just how smart are those guys?

We may not ever unearth the definitive answer, but let’s not forget that the founder of Silk Road (the trading site for illicit materials on the dark web) now sits in jail with a life term, and the Iranians have a couple hundred melted centrifuges sitting in the scrap pile.

=== The Good Stuff ===

* Levine makes some startling claims, and it would be very easy to dismiss her arguments as the work of some conspiracy buff. But at the end of the day, I had to admit she made a convincing and logical case for her viewpoint, and supported it with enough facts to make it credible.

* While much of the material is technical, the author avoids overly complicated jargon. If you have even a basic idea of what being “online” truly means, you will comprehend enough of the technology to appreciate the author’s views.

* Levine includes technical, business and tactical arguments in her discussion. For example, she spends quite a bit of time describing the Tor browser, which is sort of the gateway to the dark web. Levine tracks down the origins and developers behind this piece of software, and it turns out that many Fortune 500 companies (such as Google) perform work on this browser under the direction and funding of the US government. A strange source of funding for a browser nominally dedicated to criminals, spies and anarchists.


=== The Not-So-Good Stuff ===

* No matter how complete and dedicated an effort is made to research this topic, you will never get concrete proof and ironclad references on secret government programs. The best you can hope for is “leaks” from people like Edward Snowden, and his exposures figure prominently in the text. So now the question is “do we believe Snowden”?

* The work is what I consider an essay- an attempt by an author to convince the reader of a particular viewpoint. While Levine does give some consideration to other explanations, the main focus of the text is on her argument that the dark web is a massive government operation designed to make it easier to identify and track the communications of enemies. As an example, she does offer the alternative explanation that the Tor browser offers an excellent means for US intelligence operatives to communicate with each other.


=== Summary ===

I found the book fascinating. I don’t know that I am completely ready to believe everything that was in it, but after a shaky start, I found myself thinking more and more that this was certainly possible, and perhaps plausible. There are some well supported facts (Google taking government contracts), some well-founded supposition, and some less supported speculation.

The book was well written, kept moving without getting tied down in detail, and drew on a breadth of information from a number of sources and disciplines. I’d recommend the book to anyone with an interest in intelligence, network security and technology.


=== Disclaimer ===

I was able to read an advance copy through the courtesy of NetGalley and the publisher.

Was this review helpful?

Readers who liked this book also liked: