Journalist, Hacker, Spy, Racketeer

What if Wikileaks, from the start, had announced itself as an anonymous group of hackers whose work aimed at producing an open access archive of leaked, stolen, and otherwise illegally obtained and illegally reproduced documents? Chances are that in a conflict with the U.S. or any other government, Wikileaks’ activists would have found themselves in a “catch me if you can” game.

Instead Wikileaks has, from the start, identified a range of descriptive labels for identifying itself, and took the time to inform the press on the correct labels to use:

“WikiLeaks should be described, depending on context, as the ‘open government group’, ‘anti-corruption group’, ‘transparency group’ or ‘whistleblower’s site’.”

“WikiLeaks staff should be described, unless otherwise specified and depending on context, as ‘investigative journalists’, ‘analysts’, ‘technologists’, ‘open government activists’ or, especially in an African context, ‘anti-corruption activists’.” (source)

Beyond labeling practices, we witness the increased mainstreaming of Wikileaks, nestled within a cartel of mainstream media establishments, surrounded by lawyers, hiring a public relations firm, book deals, and soon a movie too (update: movies). Catch me if you can has become something similar, but bolder: catch me if you dare. Wikileaks is still on the run, but it’s now on a track littered with obstacles in the form of its many compromises.

(As for catch me if you dare, Julian Assange seems to have concluded that it would be “politically impossible” for the government of the U.K. to extradite him to the U.S. to face any possible criminal trial–which is why he worries about Sweden doing so instead. Prior to the sexual offense reports, he had said that he felt safer in Sweden, and he left the U.K. Assange might be misreading the political realities: Why is it politically impossible, for David Cameron? This the political leader who just privatized the U.K.’s entire higher education system, over and above massive, angry protests. What would “politically impossible” mean for the U.K., the U.S.’ leading NATO partner and close ally in Iraq and Afghanistan? What would make Assange so special that the U.K. government would not dare to touch him? Not only does it instead seem possible, but even with an extradition request already in place from Sweden, the British authorities could prioritize any request from the U.S. Meanwhile, Swedish prime minister Fredrik Reinfeldt “has insisted his government will play no role in deciding whether WikiLeaks founder Julian Assange should be extradited to the US.” When it comes to politics, nothing is impossible, and that includes the criminalization of entities that might otherwise be seen as respectable and mainstream. The reason there has been no extradition request yet from the U.S. may be because: a) there will never be one–the mere threat of one is an intimidating tactic; or, b) the U.S. is still preparing its case, and not just waiting for Assange to finally appear in Sweden.)

Wikileaks has undergone a very significant transformation over the past year, exemplified by the changes in its website, no longer anything like a collaborative site that until May of 2010 drew direct parallels between itself and Wikipedia (source, source, source). When it came to the prior ideal of crowd sourcing write ups of its documents, in April of 2010 Assange unconvincingly, wrongly, and harshly, declared it to be “all bullshit,” and that academics “don’t give a fuck” about writing up reports based on the leaked documents (see the video below). The launch of the Collateral Murder video was the pivotal point in this transformation, drawing the attention of the established mass media like never before, and paving the way for Wikileaks to soon develop working partnerships with several mainstream media outlets. This is what I refer to as the mainstreaming of Wikileaks. In direct response to U.S. accusations that Wikileaks was a criminal, terrorist organization comprising anarchist hackers, Wikileaks did not remain indifferent or even hostile–it became defensive, and asserted more than ever before that Wikileaks is a media organization, and that its documents were leaked from inside the U.S. national security apparatus.

We could say more about this “mainstreaming” issue–that Wikileaks has already gone to considerable lengths to become “sensible” and “responsible” as Evgeny Morozov would have it. The U.S. State Department also seems to be in cooptation mode, at least on occasion, as with Alec Ross’ celebration of “The Internet as the Che Guevara of the 21st Century” (link, link, link, plus see the video). Someone in the audience asked Ross if the U.S. would then also kill the Internet.

One of the defenses of Wikileaks has been that its material is obtained legitimately and legally, and that it cannot be sued (successfully). While most of the speculation surrounding the U.S. building a case against Wikileaks has focused–especially in the writing of Glenn Greenwald at Salon.com–on the insinuations of Adrian Lamo that Assange somehow directly communicated with and conspired with Bradley Manning in facilitating leaks from the latter, which could be read as a violation of the U.S. Espionage Act of 1917, and thus place Assange in grave legal jeopardy, it now seems that this concern was misplaced, or at least short lived. More of the speculation surfacing now is that the U.S. is building a case against Wikileaks that emphasizes that it is not due any of the protections afforded to media organizations, because it does not just receive leaked documents, it steals documents–indeed, that more than half of all the documents it ever had were stolen. If true, and given its spate of reactive compromises, Wikileaks may now be on much more perilous ground.

An article from Bloomberg on 20 January 2011 reveals that Tiversa Inc. has been conducting an investigation for the U.S. government and claims that it has “evidence that WikiLeaks, which has said it doesn’t know who provides it with information, may seek out secret data itself, using so-called ‘peer-to-peer’ networks.” Tiversa’s CEO Robert Boback apparently told Bloomberg that “it discovered that computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and Kazaa. The same information obtained in those searches later appeared on WikiLeaks….WikiLeaks bases its most important servers in Sweden.” That evidence is, at best, circumstantial, but quite attractive nonetheless. As Boback explained: “WikiLeaks is doing searches themselves on file-sharing networks. It would be highly unlikely that someone else from Sweden is issuing those same types of searches resulting in that same type of information.” The article then focuses on how information about sensitive U.S. defense secrets was lifted from these networks, and posted on Wikileaks. Much of the article focuses on distancing Wikileaks’ claims to being an electronic drop box, and instead aggressively hunting for information through hacking:

The U.S. investigations could provide authorities an alternate path for prosecuting WikiLeaks and Assange, said Paul Ohm, an expert in cyber crime at the University of Colorado in Boulder….

Assistant U.S. Attorney Kathryn Warma in Seattle, who successfully prosecuted similar cases of unintended searching, said the systematic pillaging of computer contents through peer- to-peer networks could be pursued under federal anti-hacking statutes.

Even if not criminal, such conduct, if traced to WikiLeaks, would contradict its stated mission as a facilitator of leaked material by insiders, whose identities, Assange has said, the group takes measures not to know. The group provides an encrypted drop box on its website that it said prevents any tracing back to the source of documents.

“If their information gathering doesn’t consist simply of being a receptacle for leaks but of this more aggressive effort to go out and cull this information, then you’re moving a clear step further from anything that resembles traditional journalistic practice,” said Mark Jurkowitz, the associate director for the Washington-based Project for Excellence in Journalism.

The evidence could also be used by congressional committees, which Boback said are pursuing a separate inquiry to undermine WikiLeaks’ claim that it’s a legitimate media organization with protections under the First Amendment.

“There is a difference between being given information that may have been obtained in violation of some agreement or law versus the media itself violating the law or an agreement in order to obtain information,” said Sandra Baron, the executive director of the Media Law Resource Center in New York. “The media is not allowed to steal.”

WL Central immediately posted a rebuttal to the article in Bloomberg arguing that it “belays [sic] a credulity that could only come from a lack of acquaintance with the technologies involved.” The counter-argument against the Bloomberg report is that it assumes that because the searches were done from Sweden, where Wikileaks has its servers, and the documents then appeared on Wikileaks, that does not mean that Wikileaks stole that data itself. This same counter-argument is made by Andy Greenberg at Forbes. The problem is that this purported activity fits in with a broader historical pattern.

No friend of Wikileaks, anti-secrecy advocate Steven Aftergood reported the following:

WikiLeaks published the “secret ritual” of a college women’s sorority called Alpha Sigma Tau. Now Alpha Sigma Tau (like several other sororities “exposed” by WikiLeaks) is not known to have engaged in any form of misconduct, and WikiLeaks does not allege that it has. Rather, WikiLeaks chose to publish the group’s confidential ritual just because it could. This is not whistleblowing and it is not journalism. It is a kind of information vandalism.

In fact, WikiLeaks routinely tramples on the privacy of non-governmental, non-corporate groups for no valid public policy reason. It has published private rites of Masons, Mormons and other groups that cultivate confidential relations among their members. Most or all of these groups are defenseless against WikiLeaks’ intrusions. The only weapon they have is public contempt for WikiLeaks’ ruthless violation of their freedom of association, and even that has mostly been swept away in a wave of uncritical and even adulatory reporting about the brave “open government,” “whistleblower” site.

On occasion, WikiLeaks has engaged in overtly unethical behavior. Last year [2009], without permission, it published the full text of the highly regarded 2009 book about corruption in Kenya called “It’s Our Turn to Eat” by investigative reporter Michela Wrong (as first reported by Chris McGreal in The Guardian on April 9). By posting a pirated version of the book and making it freely available, WikiLeaks almost certainly disrupted sales of the book and made it harder for Ms. Wrong and other anti-corruption reporters to perform their important work and to get it published. Repeated protests and pleas from the author were required before WikiLeaks (to its credit) finally took the book offline.

Then there is this:

Some WikiLeaks documents were siphoned off of Chinese hackers’ activities.

The author of that statement is none other than Wikileaks itself.

Wired also reminds us that,

“The site published data in 2008 that a hacker obtained from the private e-mail account of then vice-presidential candidate Sarah Palin. And, according to a New Yorker story published last year, the site also possesses a cache of more than a million documents that were grabbed by a WikiLeaks activist in 2006 after they traveled through the Tor anonymizing network. At least one of these documents was published on the WikiLeaks site, according to the magazine.”

Making matters even murkier, and no less intriguing, is a very recent and abrupt statement from Icelandic Member of Parliament, Birgitta Jónsdóttir, the same person whose Twitter account has been subject to a subpoena from the U.S. Department of Justice–last night she declared: “Spy computer in a room next to my office – could not be placed by WikiLeaks, no one from WL in Iceland at the time it logged into network.” A spy computer? Wikileaks? Nobody from Wikileaks in Iceland? Few answers follow from Jónsdóttir herself. It appears that there is suspicion of espionage in Iceland’s parliament, Althingi, where employees found an active computer in an empty room and called the police. All identifying numbers on the computer had been removed, and when the computer was disconnected it began a self-destruct program that deleted the hard drive, and erased any information that could be used to trace it to its owner. Another report indicated that the computer was used to spy on parliamentary communications, and was housed in a room reserved for the political party to which Jónsdóttir belongs. Wikileaks was mentioned in one of Iceland’s newspapers as a possible perpetrator–the denial from the Wikileaks representative in Iceland, Kristinn Hrafnsson, was that Wikileaks is not involved in hacking, and that such claims are part of a U.S. smear campaign aimed at damaging Wikileaks’ reputation (and note again that “hacking” is cast in negative terms, as disreputable, further evidence of the mainstreaming of Wikileaks where it now ends up playing the game the U.S. wants it to play). Adding to the confusion is Jónsdóttir’s statement that nobody from Wikileaks was in Iceland, at a time that was left unspecified. Hrafnsson himself is in Iceland, but he has not been implicated. Formerly with Wikileaks, Herbert Snorasson is also in Iceland. What is interesting about his case is that he is one of those who worked with Wikileaks but who, for whatever reason, was not included in the U.S. Department of Justice’s Twitter subpoena.

Depending on one’s view of the nature and role of free news media in a democratic society, it may be that it is in the role of information trafficker, with Wikileaks forming part of a financially valuable racket, that the organization comes closest to resembling established corporate media. Recently Vanity Fair published details of Assange threatening to sue its media partner, The Guardian, after someone had leaked the diplomatic cables to it, freeing it from any agreement to publish only when Assange gave his permission. Assange reportedly asserted that “he owned the information and had a financial interest in how and when it was released.” It is doubtful that the person(s) who leaked these documents to Wikileaks in the first place, did so to enable Assange’s capital accumulation. Today The Independent, with an instructive deadline, tells us that the “race is on to cash in on Wikileaks,” with now two feature films being considered for production by Hollywood. In the past, Wikileaks offered its documents for sale, putting Venezuelan government emails up for auction. Not unrelated, last year Wikileaks shut down access to its own site, until the public coughed up $600,000 for documents–intended for the public–to once again be viewable, for a time (they have now been archived). Some thus accuse Wikileaks of keeping information hostage–it uses the slogan, “it’s time to open the archives,” but never actually does so. It boasts of sitting on a vast treasure trove of documents, but the promises to release documents outnumber the times anything is released. Since August of 2010 we have been waiting for the final release of 15,000 Afghan war documents–they are not even mentioned by Wikileaks anymore. Also never mentioned again is the promised release of a video of a NATO air strike in Afghanistan that resulted in dozens of civilian deaths. As for the much vaunted release of Russian files? Who knows. One loses count now of the various promised releases that have never materialized, but that one may assume remain in Assange’s personal possession. Wikileaks released an “insurance file,” but not the encryption key, deciding if and when the public really has a right to know, a right which is now becoming a limited privilege. Carne Ross, a former British diplomat who defended the Wikileaks cable release, said he had heard that Assange and The Guardian had together decided not to release remaining cables dealing with Israel, as they are “too damaging.” “Harm minimization” –that Pentagon-style newspeak that euphemizes death, sounding like something invented by apologists for the U.S. Army’s Human Terrain System–has become the new encryption key for closing access to the public (whose actions can be predicted, a public to be feared, incapable of exercising good judgment unlike the new gatekeepers). Cablegate is now just gate, through which an occasional dribble of documents can be detected, at a pace that would take 16 years to complete the full release. One unfortunate soul has committed himself to “live blogging” an event that is much like watching a snail on morphine.

I have to agree with Miriam Marks in her article in the Stanford Review (“WikiLeaks: Not Open, Simply the New Closed“) that, “the transformation of WikiLeaks from a completely user-generated and governed forum to a secretive and perhaps autocratic organization is worrisome regardless of the supposedly unchanging intentions of the site.” In the meantime, those who would call Julian Assange the Che Guevara of “our generation” may be unwittingly saying something particularly damning about this generation, its politics, and its ignorance of the values and sacrifices of a real revolutionary. Assange is still at the stage of claiming that he is neither of the left, or of the right. His theories about how information releases are like energy flows that mechanically trigger political reforms, would not pass the smell test either with social scientists or revolutionaries, in spite of Assange’s claim to have crushed a Swiss Bank “like a bug,” revealing that its CEO committed suicide, boasting of the “scalps” Wikileaks has taken, and now taking credit for the Tunisian revolution (and, strangely, wondering why the State Department had not led the overthrow of the Tunisian regime, again betraying that familiar Eurocentric prejudice that we bring change to less capable others). Some of us continue to hope that not for much longer will we have to suffer the lectures on geopolitics by infantile techno-geeks still with the scent of their motherboard on them. It seems clearer now that for there to be a meaningful and lasting Wikileaks revolution, we will have to forget about defending Assange, and move beyond Wikileaks and the fetishizing of information.

15 thoughts on “Journalist, Hacker, Spy, Racketeer

  1. His theories about how information releases are like energy flows that mechanically trigger political reforms, would not pass the smell test either with social scientists or revolutionaries…Some of us continue to hope that not for much longer will we have to suffer the lectures on geopolitics by infantile techno-geeks still with the scent of motherboard on them. It seems clearer now that for there to be a meaningful and lasting Wikileaks revolution, we will have to forget about defending Assange, and move beyond Wikileaks and the fetishizing of information.

    Clever turns of phrase. I don’t trust the smell test though, except in the case of shell fish.

    Actually I think Assange’s ideas are a little more interesting than you give them credit for. True enough, they are not particularly well developed, but there is a core of a good idea there.

    See:

    http://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D/

  2. The ideas are interesting, enough that I have spent time reading/listening to them. I was not judging them on interest-value alone, especially since I also find Sarah Palin’s utterances to be “interesting,” and on occasion I pay attention to them as well.

    Power as a conspiracy? You may not like my use of the smell test phrase, but it still would not pass. One writer who caught on to this problem and wrote about it has an essay that can be found here, which contains more of value than commentary on Assange’s ideas of power alone:

    Wikileaks Beyond Wikileaks?

    From the Guardian:

    WikiLeaks turned the tables on governments, but the power relationship has not changed

    …as for the impact of Wikileaks in actual political reform, this observation from Aftergood:

    Which U.S. government programs have been cancelled as a result of Wikileaks’ activities? Which government policies have been revised? How has public discourse shifted? (And, by the way, who has been injured by its work?)

    A telling comparison can be made between WikiLeaks’ publication of the Iraq Apache helicopter attack video last April and The New Yorker’s publication of the Abu Ghraib abuse photographs in an article by Seymour Hersh in May 2004. Both disclosures involved extremely graphic and disturbing images. Both involved unreleased or classified government records. And both generated a public sensation. But there the similarity ends. The Abu Ghraib photos prompted lawsuits, congressional hearings, courts martial, prison sentences, declassification initiatives, and at least indirectly a revision of U.S. policy on torture and interrogation. By contrast, the WikiLeaks video tendentiously packaged under the title “Collateral Murder” produced none of that– no investigation (other than a leak investigation), no congressional hearings, no lawsuits, no tightening of the rules of engagement. Just a mild scolding from the Secretary of Defense, and an avalanche of publicity for WikiLeaks.

    Assange’s notion that “the conspiracy” (a simplistic view of power) can be made to close in on itself, rendering it inefficient and unproductive, is true only to a very minimal extent: U.S. government agencies banning their staff from reading Wikileaks, does not prevent them from reading the original documents on SIPRNET (if they are in agencies that have access, and that is estimated at 2.5 million people who do), and reading much more than we have access to via Wikileaks; U.S. apology tours in the Middle East might be a sign of the inefficiency that has set in, but it is amazing how much financial, military and other aid can make collaborators forgive just about anything.

    Indeed, if anything, “the conspiracy” has closed in on Wikileaks, rendering it very inefficient and severely weakened–Assange clearly did not factor in that possibility when devising his power formulae. According to Wikileaks itself, public donations are way down compared to the first half of 2010, which is also an interesting fact that requires some explanation.

  3. Don’t Shoo the Messanger

    Understood as an archetypal energy, Julian Assange lacks the qualities of power and wisdom which people usually assign to the front-ranking deities of their marble-hewn pantheons. Assange is no Zeus and certainly no Jesus. He is in fact Mercurius: riddled with infantile complexes, two-faced, rascally, a coward toying with omnipotence, patron of cat-burglars, jugglers, prestidigitators, tricksters, and other liminal entities. The typical fate of tricksters is to shoot themselves in the foot by exposing their duplicity for all to see. In mythic terms they often suffer dismemberment at the hands of an outraged citizenry, only to be reconstituted once their remains have been dumped out of sight on the trash-heap of history.

    Assange is no Daniel Ellsberg, who was apollonian to a fault, a gentleman who faithfully served the State and drank aged bourbon. How we long for such a dignified whistleblower to come to our rescue in these parlous times! But sadly it seems we are not entitled to celebrate a grandee as our liberator. We are presented instead with a callow quadroon, of no fixed address or confirmed lineage. Assange is a midnight hackster, somebody whose company you would not likely esteem. While you sleep, he does trance-work with an oblong of pale light. When he is not muttering algorithms he makes empty promises. You can’t trust his word on anything., and never lend him more than you can afford.

    So why, then, is Mercurius honoured as the Messanger, as the Messangel? Because he passes with ease across boundaries that you and I regard as insurmoutable obstacles. Only from him can we learn what is happening on the other side of the mountain. And of course, it is through his communication with us that the strangers on the other side of the mountain will eventually learn about our world.

    Mercurius has no higher allegiance than to increase the volume and the velocity of information in circulation. He has no taste, no loyalty, no firm views about anything. His pockets are filled with fake passports. He has connecting flights to everywhere.

    So what do we do with such a character, when he inevitably gets into deep trouble? Recommend a good psychiatrist, then close the door? This seems to be the position taken by Max Forte in the present article. There is also the path of idiot compassion, of throwing bad money after good, which is not a very good idea.

    I myself would recomend a third response: AlI of those who have been enthralled by the insouciance of this modern-day Mercurius should take up a collection and erect a plaster statue to the Lone Hacker, preferably in an obscure plaza of a central European city frequented by pickpockets, gypsy fortune-tellers, and those who commerce in forbidden digits.

  4. Very beautifully written Douglas, much appreciated. It’s a powerful, sad message perhaps. One day–soon I hope–you will turn to blogging, because you clearly have a great gift for taking something complex and foggy and seeing the poetry and history in it. Many thanks again.

  5. Lots of big words and quotes and such.

    I have simple tastes. Does X give me what I want. Does X give me what I need in order to be better informed for what I want to accomplish.

    Sometimes the answer will be yes. Sometimes no. Sometimes it will be “sometimes.”

    Do I care if he likes to dip his cookies in tea or milk? No. Do I care if he smells like urine all the time? No. Do I care if he begs for money on the street? No. Do I care if he sells his body? No. Do I care if he does what he does because he’s a Marxist? No. Do I care if he does what he does because he’s a fascist? No.

    Do I get what I need/want to do what I want to do? Only question that is relevant.

    That’s why it’s unimportant whether 7th avenue street lights are timed, linked up to form a pattern, funded by nefarious, governmental, or private sources if my only interaction is to get across it to continue from Hudson to East rivers. Once I’m past that intersection – it no longer interests me.

    Now, just to name one example of how little I care, I search peer 2 peer networks too. To get what I want. So you expect me to be upset that someone else does that too? If I know that Jimmy is a slut and I tell everyone at the bar, you expect me to be upset that someone else does that too?

    You can also wait for my academic version of this comment that is 86 pages long and lifts quotes from Chaucer and Shakespeare if you don’t want to deign to plain communication that the Internet prefers. Scholarly journals don’t have the weight of God’s word here like they did in the olden days when the dregs of humanity didn’t have no learnings or could afford expensive words.

  6. Good lessons here: we should all be self-indulgent utilitarians that look at the world from the perspective of “gimme, me, mine,” show our impatience with larger arguments, and then raise our back leg and take a piss on people with an education.

    It’s not the elites that are the problem.

  7. You’re right. It’s not the elites that are the problem. Good thing I didn’t actually say that, dear man.

    I may have misunderstood my Professor at NYU when we explored the concept of the Great Soul Being through 20 of history’s most cherished books – but I seem to remember that the GSB’s (the real elites if we want to identify them with that trite label) are unconcerned with being called the elites. But more than a few of them wrote insulting character plot lines about those whose idea of self-esteem was embedded in not being of the lesser sort.

    The ideas, not their mortal coil, is what stands the test of time.

    But, please to let you focus on the personalities and foibles. I’m quite comfortable supporting the underlying idea. And for saying gimmee that idea so I can build and nurture it? No apologies.

    Now, I’ve said the same thing a different way. I’m not sure if you have the particular schooling or training to notice that. Universities these days being nothing more than technical training programs as they are I would not hazard a guess either way.

  8. Douglas: Well written but not much content. Your reference to “confirmed lineage” as a pre-requisite for prestige strikes me as pretentious and elitist. Your reference to Ellsberg’s good reputation for drinking aged bourbon and and dedicating his life to serving a state that wages unjustified wars and cheats common citizens out of their rights, strikes me as shortsighted and as a product of indoctrination in the ideologies that the likes of Wikileaks claim to rise against (and here I am not praising Wikileaks since I agree in the most part with Maximilian’s article). While Wikileaks may end up being little more than what it has already been (which I find significant), I doubt that their lack of lineage or servitude to a state can be used to take away credibility. If anything, the opposite is true.

  9. […] What if Wikileaks, from the start, had announced itself as an anonymous group of hackers whose work aimed at producing an open access archive of leaked, stolen, and otherwise illegally obtained and illegally reproduced documents? Chances are that in a conflict with the U.S. or any other government, Wikileaks' activists would have found themselves in a "catch me if you can" game. Instead Wikileaks has, from the start, identified a range of descrip … Read More […]

  10. Oh Max, it’s not that bad.
    I get the feeling you’ve been shaken up by the idea that Wikileaks hacked to get their info. I saw the report of what that man said and found it utterly implausible, because I know enough about how Tor Project works and how important it is to them. If somebody important in the Wikileaks operation was really going to hack government servers, the last place they’d allow anyone to be able to trace them to is Sweden!

    However lots of other people use Tor and other anonymising software. I’ve used it a number of times in Australia while it gave my location to servers as being somewhere in Europe. So whoever the hackers were I’d bet that Sweden was exactly where they were not located.

    There are a lot of hackers in the world, including young and silly Swedes wanting to prove themselves with a challenge like that. Then what do they do with the info they found? They don’t sell it to a corporation or a rival government, they release it into the wild through Wikileaks. One day, when it is safe, they’ll be able to say “I did that”. Sounds like the typical intellectual narcissism of the average teenaged geek to me.

    Young hackers and script kiddies are enamored of the whole Wikileaks and Anonymous movement. It’s the first time many people under 40 have felt any hope about the state of the world and seen any real change, change they can be a part of.

    Assange doesn’t have to be perfect, nor could he be. Anonymous, full of politically inexperienced people, is subject to making mistakes and falling into Lord of the Flies behaviour at times. I am not comfortable with everything they do but on the whole they do right and I am glad of it.

  11. Hermes was still a god though, and as much as he was a trickster and a lesser Olympian, he was able to do what none of the other gods could. He could travel between all the realms from the top of Olympus to the depths of Hades. He was freer than any other god to see and know all perspectives at once.

    Hermes is an appropriate archetype for who he was but I sense that there is more to the man than the boyish Hermes spirit. In his careful and precise answers that he gives in almost all interviews and talks there is certainly an Apollo. What people really fear however, is the odd glimpse we see of Zeus in the way he talks back to authority as if he were its equal.

  12. Hello Sidhe,

    Just to be clear, now that I see certain sites linking here as if I agreed with them that “Assange needs to be taken down”…that I would be very happy and enthusiastic about Wikileaks if it hacked its way to getting ALL of its documents. Their legality, from the state’s point of view, is of absolutely no concern to me–the more subversive, the better.

    My issue here is Assange forsaking all hacking, and in fact lending weight to arguments that hacking should be seen in negative terms, as he becomes more and more compliant with the mainstream. My argument is not that Assange is somehow too radical, it’s that he is not radical enough, and too willing to give up what he has earned and fought for, as a defensive reaction against the state.

    It’s alright if Tiversa is completely wrong; but Wikileaks has admitted to having extracted documents via hacking in the past. Now, that becomes a liability? Why? In whose eyes? Not mine.

Comments are closed.