Abstract
In his seminal piece on WikiLeaks, Yochai Benkler (2011; also see Benkler’s chapter in this volume) makes a compelling case for why WikiLeaks is a vital element of the networked fourth estate and why we should view its harsh treatment by the US government as a threat to the free press. As he says, the case embodies a struggle for the soul of the Internet, a battle that is being waged through both legal and extralegal means, with major corporate actors — Apple, Amazon, eBay (Paypal), Bank of America (Visa), Mastercard, etc. — using their control over critical Internet resources to lean in heavily on the side of the state and against WikiLeaks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Apple removes iPhone WikiLeaks app from iTunes. BBC, December 22, 2010. Available at: http://www.bbc.com/news/technology-12059577 (last visited, July 12, 2012)
Arthur, C. (January 8, 2011). WikiLeaks Under Attack: Definitive Timeline. The Guardian,. http://www.guardian.co.uk/media/2010/dec/07/WikiLeaks-under-attack-definitive-timeline (last visited, July 12, 2012)
Ball, J. (April 20, 2012). Battle for the Internet: The Guardian’s Open 20 — Fighters for Internet Freedom. The Guardian. Available at: http://www.guardian.co.uk/technology/2012/apr/20/twenty-fighters-open-internet (last visited, July 12, 2012)
Benkler, Y. (2011). A Free Irresponsible Press: WikiLeaks and the Battle over the Soul of the Networked Fourth Estate. Harvard Civil Rights-Civil Liberties Law Review. http://benkler.org/Benkler_WikiLeaks_current.pdf (last visited, July 12, 2012)
Benkler, Y. (March 4, 2009). Correspondence: A new era of corruption? The New Republic. http://www.tnr.com/article/correspondence-new-era-corruption (last visited, July 12, 2012)
Calame, B. (January 1, 2006). Behind the eavesdropping story, a loud silence. New York Times, http://www.nytimes.com/2006/01/01/opinion/o1publiceditor.html (last visited, July 12, 2012)
Deibert, R. and Rohozinski, R. (2010). Beyond Denial: Introducing Next-Generation Information Access Controls. In R. J. Deibert, J. G. Palfrey, R. Rohozinski and J. Zittrain (eds) Access Controlled. Cambridge: MIT Press, pp. 1–14
Gongrijp, R. (January 8, 2011). US DOJ wants my twitter account into. Available at: http://rop.gonggri.jp/?p=442 (last visited, July 12, 2012)
Intra-Parliamentary Union (October 19, 2011). Case No. IS/Ol — Birgitta Jónsdóttir: Resolution adopted unanimously by the IPU Governing Council at its 189th session http://www.ipu.org/hr-e/189/Is01.htm (last visited, July 12, 2012)
La Rue, F. (2011) Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. United Nations Human Rights Council, Seventeenth session Agenda item 3, A/HRC/17/27 of 17 May 2011. Available at http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf (last visited, July 12, 2012)
Lieberman, Senator J. (2010). Amazon Severs Ties with WikiLeaks. Press Release. http://lieberman.senate.gov/index. cfm/news-events/news/2010/12/amazon-s evers-ties-with-WikiLeaks (last visited, July 12, 2012)
McCullagh, D. (Jan. 11, 2011). European politicos protest DOJ WikiLeaks-Twitter probe. Wired. Available at: http://news.cnet.com/8301-31921_3-20028239-281.htm1?tag=n1.e703 (last visited, July 12, 2012)
Mueller, M. (2010). Networks and States. Cambridge, MA: MIT
Nissenbaum, H. (2011). A Contextual Approach to Privacy Online. Daedalus, 140(4), 32–48. http://www.amacad.org/publications/daedalus/11_fall_nissen-baum.pdf (last visited, July 12, 2012)
Noam, E. (2012). International Media Concentration — United States. International Media Concentration Research Project, Columbia University, New York. Available at: http://internationalmedia.pbwiki.com/ (last visited, July 12, 2012)
Risen, J. and Lichtblau, E. (December 16, 2005). Bush lets US Spy on Callers Without Courts. New York Times. Available at: http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=all (last visited, July 12, 2012)
Soghoian, C. (November 2, 2011). Two honest Google employees: our products don’t protect your privacy. Slight Paranoia. http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html (last visited, July 12, 2012)
United States (2008). Foreign Intelligence Security Act of 1978 Amendment Act of 2008. Available at: http://intelligence.senate.gov/laws/p1110261.pdf (last visited, July 12, 2012)
United States, Congressional Research Service (2004). Information Warfare and Cyberwarfare: Capabilities and Related Policy Issues. Washington, D.C.: Congressional Research Service. Available at http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA477185 (last visited, July 12, 2012)
United States, Department of Defense (2003). Information Operations Roadmap. Washington, D.C. Available at: http://www.gwu.edu/-nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf (last visited, July 12, 2012)
United States, District Court of Eastern Virginia (2011a). In re. Application of the United States of America for an Order pursuant to 18 U.S.0 §2703(d): Memorandum and Opinion. Available at: http://t.co/ZdzGQiIQ (last visited, July 12, 2012)
United States Court of Appeals for the Second Circuit (2011b). Amnesty International et. al. vs. James P. Clapper, Director, National Intelligence, et. al. Available at: http://dwmw.files.wordpress.com/2011/03/aclu-v-clapper.pdf (last visited, July 12, 2012)
United States, District Court of Eastern Virginia (December 14, 2010). In re. Application of the United States of America for an Order pursuant to 18 U.S.0 §2703(d): Order. Available at: https://www.eff.org/sites/default/files/filenode/dorders_twitter/34%20USA%20Position%20Re%20Unsealing%20 Records%20as%20to%20Appelbaum%20et%20al.pdf (last visited, July 12, 2012)
United States, District Court of Eastern District or Michigan (August 17, 2006). American Civil Liberties Union, et. al. v. National Security Agency, et. al. (2006). Memorandum Opinion. Case No. 06-CV-10204. Available at: http://cryptome.org/aclu-nsa-2.pdf (last visited, July 12, 2012)
WikiLeaks (October 24, 2011). WikiLeaks: Banking Blockade and Donations Campaign. Available at: http://WikiLeaks.org/IMG/pdf/WikiLeaks-Banking-Blockade-Information-Pack.pdf (last visited, July 12, 2012)
WikiLeaks Press (n.d.). Accolades. http://WiktLeaks-press.org/category/latest-news/accolades/ (last visited, July 12, 2012)
Editor information
Editors and Affiliations
Copyright information
© 2013 Dwayne Winseck
About this chapter
Cite this chapter
Winseck, D. (2013). Weak Links and WikiLeaks: How Control of Critical Internet Resources and Social Media Companies’ Business Models Undermine the Networked Free Press. In: Brevini, B., Hintz, A., McCurdy, P. (eds) Beyond WikiLeaks. Palgrave Macmillan, London. https://doi.org/10.1057/9781137275745_10
Download citation
DOI: https://doi.org/10.1057/9781137275745_10
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-27573-8
Online ISBN: 978-1-137-27574-5
eBook Packages: Palgrave Media & Culture CollectionLiterature, Cultural and Media Studies (R0)