1.“Dear Fox New,” YouTube video, posted by dearfoxnews, July 29, 2007, last accessed July 8, 2014, available at http://www.youtube.com/watch?v=RFjU8bZR19A.
2.This quote comes from a class lecture.
3.“Message to Scientology,” YouTube video, posted by Church0f Scientology, Jan. 21, 2008, last accessed July 4, 2014, available at http://www.youtube.com/watch?v=JCbKv9yiLiQ.
4.Siobhan Gorman, “Power Outage Seen as a Potential Aim of Hacking Group,” online.wsj.com, Feb. 21, 2012.
5.Sam Biddle, “No, Idiots, Anonymous Isn’t Going to Destroy the Power Grid,” gizmodo.com, Feb. 21, 2012.
1.Danielle Keats Citron, Hate 3.0: The Rise of Discriminatory Online Harassment and How to Stop It (Cambridge, MA: Harvard University Press, forthcoming); Danielle Keats Citron, “Cyber Civil Rights,” Boston University Law Review, vol. 91 (2009).
2.For a detailed critique of the CFAA and recommendations for reform see http://www.eff.org/issues/cfaa.
3.Tom McCarthy, “Andrew Auernheimer’s Conviction over Computer Fraud Thrown Out,” theguardian.com, April 1, 2014.
4.Joseph Carey, Twitter post, July 22, 2013, 10:22 am, http://twitter.com/JDCareyMusic/status/359362756568285184.
5.weev, “I am weev. I may be going to prison under the Computer Fraud and Abuse Act tomorrow at my sentencing. AMA.,” reddit, March 17, 2013, last accessed May 21, 2014, available at http://www.reddit.com/r/IAmA/comments/1ahkgc/i_am_weev_i_may_be_going
_to_prison_under_the/c8xgqq9.
6.Daniel Bates, “Standing by Her Man: Strauss-Kahn’s Wife Puts Her Mansion Up as Collateral to Get Him out of Jail and She’s Paying the Rent at His ‘Golden Cage,’” dailymail.co.uk, May 21, 2011.
7.“Lulz,” Encyclopedia Dramatica, last accessed May 23, 2012, available at http://encyclopediadramatica.es/Lulz
8.For early references to “lulz” on Jameth’s LiveJournal site, see http://web.archive.org/web/20021102004836/ http://www.livejournal.com/users/jameth (last accessed May 22, 2014).
9.Whitney Phillips, “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online,” First Monday vol. 16, no. 12 (2011).
10.Many of these insights are delectably explored in Lewis Hyde’s majestic account Trickster Makes This World: Mischief, Myth, and Art (New York: Farrar, Straus and Giroux, 1998).
11.Ibid., p. 9
12.Alex Galloway and Eugene Thacker, The Exploit: A Theory of Networks (Minneapolis, MN: University of Minnesota Press, 2007).
13.Phil Lapsley, Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell (New York: Grove Press, 2013), 226.
14.Steven Levy, Hackers: Heroes of the Computer Revolution—25th Anniversary Edition (Sebastapol, CA: O’Reilly Media, 2010).
15.Adam L. Penenberg, “A Private Little Cyberwar,” forbes.com, Feb. 21, 2000.
16.“Biography of u4ea,” soldierx.com, last accessed May 21, 2014, available at https://www.soldierx.com/hdb/u4ea.
17.Marco Deseriis, “‘Lots of Money Because I Am Many’: The Luther Blissett Project and the Multiple-Use Name Strategy,” in Cultural Activism: Practices, Dilemmas and Possibilities (Amsterdam: Rodopi, 2011), 65–93.
18.Trond Lossius, “/55\[Fwd: [max-msp] it’s over],” /55\ mailing list, Jan. 15, 2001, last accessed May 21, 2014, available at http://www.bek.no/pipermail/55/2001-January/000102.html. A good example of Nezvanova’s art can be found at http://www.nettime.org/Lists-Archives/nettime-bold-0009/msg00073.html (last accessed May 21, 2014).
19.Lee Knuttila, “Users Unknown: 4chan, Anonymity and Contingency,” First Monday, vol. 16, no. 10 (Oct. 2011).
20.“Internet Hate Machine” was a phrase used by a local Fox News program in Los Angeles in 2007 to describe Anonymous. The group promptly turned the phrase into a popular meme.
21.Phillips, “LOLing at Tragedy.”
22.David Graeber, “Manners, Deference, and Private Property in Early Modern Europe,” Comparative Studies in Society and History, vol. 39 (October 1997): 694–728.
23.Christopher Kelty, Two Bits: The Cultural Significance of Free Software (Durham, NC: Duke University Press, 2008).
1.Anonymous, “The Story Behind the Tom Cruise Video Link,” Why We Protest, July 27, 2013, last accessed May 23, 2014, available at http://whyweprotest.net/community/threads/the-story-behind-the-tom-cruise-video-leak.93170/page-4.
2.“The Cruise Indoctrination Video Scientology Tried to Suppress,” gawker.com, January 15, 2008, last accessed July 11, 2014.
3.L. Ron Hubbard, “Scientology Technology,” The Auditor, no. 41 (1968).
4.XENU TV, “The Story Behind the Tom Cruise Video Link,” Why We Protest, Sept. 7, 2011, last accessed May 23, 2014, available at http://whyweprotest.net/community/threads/the-story-behind-the-tom-cruise-video-leak.93170/page-3#post-1875660.
5.“Code of Conduct,” YouTube video, posted by ChurchOfScientology, Feb. 1, 2008, last accessed May 23, 2014, available at http://www.youtube.com/watch?v=-063clxiB8I.
6.Cain, “Hal Tuner Raid Planned for Tomorrow,” The PFLD, April 20, 2007, last accessed May 23, 2014, available at http://episkoposcain.blogspot.ca/2007/04/hal-turner-raid-planned-for-tomorrow.html.
7.Asterix, “August Theme: Anonymous Takes Back Chanology,” Why We Protest, July 14, 2008, last accessed May 23, 2014, available at http://whyweprotest.net/community/threads/august-theme-anonymous-takes-back-chanology.18139/page-2.
8.Why We Protest, http://whyweprotest.net/community/threads/false-press-we-need-to-deal-with-this-immediately.80242
9.“Operation Slickpubes,” Motherfuckery, Jan. 10, 2009, last accessed May 23, 2014, available at http://motherfuckery.org/this-is-how-a-post-looks.
10.“In 2009, NYPD Issued ‘Surveillance Request’ to ‘Identify’ Anonymous Members During Their Anti-Scientology Rally,” techdirt.com, Sept. 4, 2013, last accessed July 11, 2014.
11.Eric Hobsbawm, “Subculture and Primitive Rebels” in the Cultural Resistance Reader (London and New York: Verso, 2002), 136.
12.Ibid., 147
13.Tony Ortega, “Meet the Man Behind WWP, the Web Home of Anonymous and Project Chanology,” The Underground Bunker, June 22, 2013, last accessed May 23, 2014, available at http://tonyortega.org/2013/06/22/meet-the-man-behind-wwp-the-web-home-of-anonymous.
14.Online interview with author.
15.Anonymous, “What the Dicks Is Marblecake and What Do They Do?” Why We Protest, July 23, 2008, last accessed July 4, 2014, available at http://whyweprotest.net/community/threads/what-the-dicks-is-marblecake-and-what-do-they-do.16012/page-13.
16.Paolo Gerbaudo, Tweets and the Streets: Social Media and Contemporary Activism (London: Pluto Press, 2012).
17.Jo Freeman, “The Tyranny of Structurelessness,” The Second Wave, vol. 2, no. 1 (1972).
18.“Operation Clambake Present: The Scientology Fair Game Policy,” Operation Clambake: Undressing the Church of Scientology, last accessed May 23, 2014, available at http://www.xenu.net/fairgame-e.html.
1.David Leigh, “Guardian Gagged from Reporting Parliament,” the guardian.com, Oct. 12, 2009.
2.Christian Christensen, “Collateral Murder and the After-Life of Activist Imagery,” medium.com, April 14, 2014.
3.Evan Hansen, “Manning-Lamo Chat Logs Revealed,” wired.com, July 13, 2011.
4.Lamo has claimed that, since he has published some articles, he is a journalist. He has also said that he is a minister for the Universal Life Church. See Luis Martinez, “Bradley Manning Accuser Adrian Lamo Takes the Stand,” Dec. 20, 2011, abcnews.go.com.
5.Ed Pilkington, “Bradley Manning’s Treatment Was Cruel and Inhuman, UN Torture Chief Rules,” theguardian.com, March 12, 2012.
6.Raffi Khatchadourian, “No Secrets,” newyorker.com, June 7, 2010.
7.The connection can be drawn even further, as the young Julian Assange had his own foray into fighting Scientology as well. Back in Australia, he ran a free speech Internet service provider, Suburbia, which hosted anti-Scientology material. He also organized an anti-Scientology protest in Melbourne in 1996.
8.Wilford’s Dog, “AMA Request Sabu from LuLSec this would be amazing,” reddit, Sept. 23, 2011, last accessed May 29, 2014, available at http://www.reddit.com/r/IAmA/comments/kpfsp/ama_request_sabu_from_lulsec
_this_would_be_amazing/
9.Guest, “Untitled,” July 5, 2010, last accessed May 29, 2014, available at http://pastebin.com/ytZ7N1x7.
10.For reasons of privacy, this is not a real IP address.
11.For more on botnets, see Finn Brunton’s excellent Spam: A Shadow History of the Internet (Cambridge, MA: MIT Press, 2013).
12.“Activists Target Recording Industry Websites,” bbc.com, Sept. 20, 2010.
13.Ernesto, “Anti-Piracy Outfit Tries to Erase History,” torrentfreak.com, Oct. 15, 2011.
14.David Kravets, “Wired Exclusive: I Was a Hacker for the MPAA,” abcnews.go.com, Oct. 22, 2007.
15.Enigmax, “Anti-Piracy Outfit Threatens to DoS Uncooperative Torrent Sites,” torrentfreak.com, Sept. 5, 2010.
16.Enigmax, “4chan DDoS Takes Down MPAA and Anti-Piracy Websites,” torrentfreak.com, Sept. 18, 2010.
17.“Hackers Hit Hollywood’s Piracy Watchdog,” reuters.com, Sept. 19, 2010.
18.Christopher Williams, “Piracy Threats Lawyer Mocks 4chan DDoS Attack,” theregister.co.uk, Sept. 22, 2010.
19.Nate Anderson, “‘Straightforward Legal Blackmail’: A Tale of P2P Lawyering,” arstechnica.com, June 6, 2010.
20.“Lords Hansard text for 26 Jan 201026 Jan 2010 (pt 0003),” parliament.uk, last accessed May 29, 2014, available at http://www.parliament.the-stationery-office.co.uk/pa/ld200910/ldhansrd/text/100126-0003.htm.
21.Nate Anderson, “The ‘Legal Blackmail’ Business: Inside a P2P Settlement Factory,” arstechnica.com, Sept. 28, 2010.
22.Enigmax, “ACS:Law (Gay) Porn Letters Target Pensioners, Married Men,” torrentfreak.com, Sept. 25, 2010.
23.Charles Arthur, “ACS:Law and MediaCAT Close Their Doors, Ending Filesharing Claims,” theguardian.com, Feb. 4, 2011.
24.“ACS:Law Solicitor Andrew Crossley Suspended by SRA,” bbc.com, Jan. 18, 2012.
25.Josh Halliday, “ACS:Law Solicitor at Centre of Internet Piracy Row Suspended,” theguardian.com, Jan. 18, 2012.
26.Ernesto, “Behind the Scenes at Anonymous’ Operation Payback,” torrentfreak.com, Nov. 15, 2010.
27.“Anonymous Is Not Unanimous,” last accessed May 29, 2014, available at http://pastebin.com/4vprKdXH.
28.“PPi Ask Anonymous to Stop Payback,” The pp.international.general, Nov. 2010, last accessed May 29, 2014, available at http://lists.pirateweb.net/pipermail/pp.international.general/2010-November/thread.html#8046.
29.Pirate Parties of the UK and US, “Pirate Party Op,” Nov. 19, 2010, last accessed May 29, 2014, available at http://www.scribd.com/doc/43400303/Pirate-Party-OP.
30.Ernesto, “Behind the Scenes at Anonymous’ Operation Payback.”
31.Online interview with author.
32.Ibid.
33.For an example, see “Untitled,” Feb. 24, 2011, last accessed May 29, 2014, available at http://pastebin.com/0Y5CkrF9.
34.Online interview with author.
35.Online interview with author.
36.gster, “DDoS Attacks on Pro-Copyright Groups: Pirate Parties and ‘Operation Payback,’” Play Station Universe, Nov. 25, 2010, last accessed May 29, 2014, available at psu.com.
1.Art Keller, “Dozens (Yes, Dozens) Show Up for Anonymous’ Million-Mask March,” newsweek.com, Nov. 7, 2013.
2.Justin Elliot, “The 10 Most Important Wikileaks Revelations,” salon.com, Nov. 29, 2010.
3.Martin Beckford, “Sarah Palin: Hunt WikiLeaks Founder Like al-Qaeda and Taliban Leaders,” telegraph.co.uk, Nov. 30, 2010.
4.Kathryn Jean Lopez, “On This Sunday Outrage,” nationalreview.com, Nov. 28, 2010.
5.At the time, statistics were available at http://irc.netsplit.de/networks/top10.php and http://searchirc.com/channel-stats.
6.Richard Stallman, “The Anonymous WikiLeaks Protests Are a Mass Demo Against Control,” theguardian.com, Dec. 17, 2010.
7.For precise figures, see Molly Sauter, The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet (London: Bloomsbury Academic, 2014).
8.Noam Cohen, “Web Attackers Find a Cause in WikiLeaks,” nytimes.com, Dec. 9, 2010.
9.Parmy Olson, We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (New York: Back Bay Books, 2013), 109.
10.Sean-Paul Correll, “’Tis the Season of DDoS—WikiLeaks Edition,” PandaLabs Blog, last accessed June 3, 2014, available at http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio.
11.Sean-Paul Correll, “Operation:Payback Broadens to ‘Operation Avenge Assange,’” PandaLabs Blog, last accessed June 3, 2014, available at http://pandalabs.pandasecurity.com/operationpayback-broadens-to-operation-avenge-assange.
12.Nick Davies, “10 Days in Sweden: The Full Allegations Against Julian Assange,” theguardian.com, Dec. 17, 2010.
13.Michel de Certeau, The Practice of Everyday Life, trans. Steven Rendall (Berkeley: University of California Press, 2011), xix.
14.Jon Snow, Twitter post, Dec. 9, 2010, 5:22 am, https://twitter.com/jonsnowC4/status/12814239458656256.
15.Zeynep Tufekci, “WikiLeaks Exposes Internet’s Dissent Tax, Not Nerd Supremacy,” theatlantic.com, Dec. 22, 2010.
16.Online interview with the author.
17.Mikhail Bakhtin, The Dialogic Imagination: Four Essays (Austin, TX: University of Texas Press Slavic Series, 1981).
18.Ethan Case, “The Dark Side of Anonymous: Everything You Never Knew About the Hacktivist Group,” policymic.com, Jan. 3, 2012.
19.“Untitled,” Dec. 10, 2010, last accessed June 3, 2014, available at http://pastebin.com/WzzJ1Jp3.
20.Joel Johnson, “What Is LOIC?” gizmodo.com, Dec. 8, 2010.
21.Gerry Smith, “Feds Charge 13 Members of Anonymous in ‘Operation Payback’ Attacks,” huffingtonpost.com, Oct. 3, 2010.
22.For the definitive account of early hactivism, see Tim Jordan and Paul Taylor, Hactivism and Cyberwars: Rebels with a Cause? (New York: Routledge, 2004).
23.Molly Sauter, “‘LOIC Will Tear Us Apart,’” American Behavioral Scientist, 998, vol. 57 (2013): 983–100.
24.Frances Fox Piven, Who’s Afraid of Frances Fox Piven?: The Essential Writings of the Professor Glenn Beck Loves to Hate (New York: New Press, 2011).
25.Sauter, “LOIC Will Tear Us Apart.”
26.Elinor Mills, “Old-time Hacktivists: Anonymous, You’ve Crossed the Line,” cnet.com, March 30, 2012.
27.Tod Gemuese, Facebook comment on page of Cult of the Dead Cow, Jan. 10, 2013, last accessed June 5, 2014, available at http://www.facebook.com/groups/28828338908/permalink/10151344658883909.
28.For an extended and illuminating discussion on the DDoS campaign as an intervention that furthers speech objectives but also qualifies as conduct, see Sauter, The Coming Swarm.
29.Ethan Zuckerman, Hal Roberts, Ryan McGrady, Jillian York, and John Palfrey, 2010 Report on Distributed Denial of Service (DDoS) Attacks, Berkman Center for Internet and Security, Dec. 20, 2010, available at http://cyber.law.harvard.edu/publications/2010/DDoS_Independent_Media_Human_Rights.
30.For example, in March 2013, the Los Angeles Times issued a correction after erroneously stating in a post that an indictment charged Anonymous with what amounted to hacking. See Matt Pearce, “Wisconsin Man Indicted in Anonymous Attack of Koch Industries,” latimes.com, March 27, 2013. The correction appears near the end of the article.
31.Lee Mathews, “Man Fined $183,000 for Helping Anonymous Ddos a Site for One Minute,” geek.com, Dec. 10, 2013. Ryan J. Reilly, “Loading Koch Industries Website Too Many Times in 1 Minute Just Cost this Truck Driver $183,000,” huffingtonpost.com, Dec. 3, 2013.
32.Sandra Laville, “Student Convicted over Anonymous Cyber-Attacks,” theguardian.com, Dec. 6, 2012.
33.Joe Kloc, “Anonymous’s PayPal 14 Enter Pleas, Most May Skirt Jail,” dailydot.com, Dec. 5, 2013.
34.Anu Passary, “Anonymous Members Plead Guilty in Paypal DDoS Attack Case,” techtimes.com, Dec. 8, 2013.
35.Somini Sengupta, “British Police Make Arrest in Net Attacks,” nytimes.com, July 27, 2011.
1.Eduard Kovacs, “Anonymous Hackers Leak Documents on Governor of Italy’s Lombardy Region,” softpedia.com, Nov. 25, 2013.
2.See Carola Frediani, Inside Anonymous: A Journey into the World of Cyberactivism (Informant, 2013).
3.Lina Ben Mhenni, “Tunisia: Censorship Continues as WikiLeaks Cables Make the Rounds,” globalvoicesonline.org, Dec. 7, 2010.
4.Quinn Norton, “2011: The Year Anonymous Took On Cops, Dictators and Existential Dread,” wired.com, Jan. 11, 2012.
5.Ibrahim Saleh, “WikiLeaks and the Arab Spring: The Twists and Turns of Media, Culture, and Power,” Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society (New York: Palgrave Macmillan, 2013), 237.
6.WikiLeaks, “Cable: 09TUNIS516-a,” wikileaks.org, last accessed June 5, 2014, available at https://www.wikileaks.org/plusd/cables/09TUNIS516_a.html.
7.John Pollock, “How Egyptian and Tunisian Youth Hacked the Arab Spring,” technologyreview.com, Aug. 23, 2011.
8.See twitter.com/TAKRIZ, last accessed June 5, 2014.
9.“Tunisia Suicide Protester Mohamed Bouazizi Dies,” bbc.com, Jan. 5, 2011.
10.“Thousands of Tunisia Lawyers Strike,” aljazeera.com, Jan. 6, 2011.
11.Tarek Amara, “Tunisian Government Says Two Killed in Clashes,” reuters.com, Jan. 9, 2011.
12.See anonnews.org/press/item/135, last accessed June 16, 2014.
13.For a few representative articles claiming Sabu as the leader see: Charles Arthur, “The Darkness at the Heart of Anonymous,” theguardian.com, Aug. 23, 2011; Josh Halliday, “LulzSec Mastermind Sabu: An Elite Hacker and Star FBI Informant,” theguardian.com, March 6, 2012; Andy Greenberg, “LulzSec Leader and Informant ‘Sabu’ Let Off with Time Served,” wired.com, May 27, 2014. For articles claiming Topiary as the leader, see: Adrian Chen, “Meet the LulzSec Leader Arrested by British Police Today,” gawker.com, July 27, 2011; Peter Finocchiaro, “LulzSec Leader ‘Topiary’ Arrested in Britain,” salon.com, July 27, 2011.
14.John Cook and Adrian Chen, “Inside Anonymous’ Secret War Room,” gawker.com, March 18, 2011.
15.Arthur, “The Darkness at the Heart of Anonymous.”
16.Joseph Menn, “SPECIAL REPORT—U.S. Cyberwar Strategy Stokes Fear of Blowback,” reuters.com, May 10, 2013.
17.Ibid.
18.Although I have access to most of the subsequent log, there was no other mention about why the zero-day did not pan out, and when I asked some participants, no one could remember why. It is not unusual for an issue or possibility that is raised and explored to not pan out and never be discussed again.
19.Tom Jagatic, Nathaniel Johnson, Markus Jakobsson, Filippo Menczer, “Social Phishing,” Communications of the ACM, (Fall 2007): 94–100.
20.“St. Jude Memorial and Virtual Wake,” The Well, August 1, 2003, last accessed July 6, 2014, available at http://www.well.com/conf/inkwell.vue/topics/190/St-Jude-Memorial-and-Virtual-Wak-page01.html.
21.Spencer Ackerman, “Former NSA Chief Warns of Cyber-Terror Attacks if Snowden Apprehended,” theguardian.com, Aug. 6, 2013.
22.Ryan J. Reily, “Stephen Heymann, Aaron Swartz Prosecutor, Compared Internet Activist to Rapist: MIT Report,” huffingtonpost.com, July 31, 2013.
23.Hal Abelson, “The Lessons of Aaron Swartz,” technologyreview.com, October 4, 2013.
24.Gabriella Coleman, “Gabriella Coleman’s Favorite News Stories of the Week,” techdirt.com, Oct. 12, 2013.
25.Miller McPherson, Lynn Smith-Lovin, and James M. Cook, “Birds of a Feather: Homophily in Social Networks,” Annual Review of Sociology, Vol. 27 (2001): 415–44.
26.Roli Varma, “Why So Few Women Enroll in Computing? Gender and Ethnic Differences in Students’ Perception,” Computer Science Education vol. 20, no. 4 (2010): 301–16.
27.For more precise figures, see Christina Dunbar Hester and Gabriella Coleman, “Engendering Change? Gender Advocacy in Open Source,” June 26, 2012, last accessed July 9, 2014, available at http://culture digitally.org/2012/06/engendering-change-gender-advocacy-in-open-source/.
28.Ibid.
29.See Douglas Thomas, Hacker Culture (Minneapolis, MN: University of Minnesota Press, 2003).
1.Barret Brown, Twitter post, Nov. 9, 2011, 9:56 pm, https://twitter.com/BarrettBrownLOL/status/134464512064626689.
2.Barret Brown, “Why the Hacks Hate Michael Hastings,” vanityfair. com, June 23, 2010.
3.Ian Shapira, “‘Anonymous’ Movement Views Web Hijinks as Public Good, but Legality Is Opaque,” washingtonpost.com, Jan. 25, 2011.
4.Richard Borshay Lee, “Eating Christmas in the Kalahari,” natural historymag.com (originally published in Dec. 1969).
5.“US Urges Restraint in Egypt, Says Government Stable,” reuters.com, Jan. 25, 2011.
6.Although some Anons certainly dabble in credit card fraud, they are not in the business of large-scale carding and identity theft. One of the most notorious carding rings—Shadowcrew—was busted in November 2006 in what journalist Kevin Poulsen has described as “the biggest crackdown on identify thieves in American history.” Poulsen, Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (New York: Broadway Books, 2012), 113.
7.For the definitive account of Operation Sundevil, see Bruce Sterling’s The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992), available at http://www.mit.edu/hacker/hacker.html.
8.“Document Management in the FBI,” ch. 2 in An Investigation of the Belated Production of Documents in the Oklahoma City Bombing Case,” US Justice Department, March 19, 2002, last accessed June 16, 2014, available at http://www.justice.gov/oig/special/0203/chapter2.htm.
9.Since the FD-302 provides a summary of an interview instead of a transcript, activists and lawyers have long criticized it for its bias. Civil liberties lawyer Harvey Silverglate encapsulated its problems in an op-ed: “Frightened and confused interviewees, who, if they deny they said what any 302 report claims they uttered, can then be indicted for making false statements” (Silvergate, “Unrecorded Testimony,” bostonglobe.com, May 11, 2013). In May 2014, the FBI reversed its policy and will now mandate recording for most interviews with federal suspects. (Andrew Grossman, “FBI to Record Most Interrogations of Suspects in Federal Custody,”online.wsj.com, May 21, 2014.)
1.Jules Boykoff, The Suppression of Dissent: How the State and Mass Media Squelch USAmerican Social Movements (New York: Routledge, 2006), 121.
2.Ibid., 115–17.
3.Ibid., 118.
4.US Senate Committee to Study Governmental Operations with Respect to Intelligence Activities, “COINTELPRO: The FBI’s Covert Action Programs Against American Citizens,” April 23, 1976, last accessed June 18, 2014, available at http://terrasol.home.igc.org/HooverPlan.htm.
5.Quoted in “The FBI, COINTELPRO, and the Most Important Robbery You’ve Never Heard Of,” Privacy SOS, April 3, 2013, last accessed June 18, 2014, available at https://www.privacysos.org/node/1015.
6.Mark Mazzetti, “Burglars Who Took on F.B.I. Abandon Shadows,” nytimes.com, Jan. 7, 2014.
7.Glenn Greenwald, “The Leaked Campaign to Attack Wikileaks and Its Supporters,” salon.com, Feb. 11, 2011.
8.Nelson D. Schwartz, “Facing Threat from WikiLeaks, Bank Plays Defense,” nytimes.com, Jan. 2, 2011.
9.See Eric Lipton and Charlie Savage, “Hackers Reveal Offers to Spy on Corporate Rivals,” nytimes.com, Feb. 11, 2011.
10.Marcus Kabel, “Ark. Court Says Wal-Mart Can Copy Data of Fired Worker,” utsandiego.com, April 13, 2007.
11.Gary Ruskin, “Spooky Business: Corporate Espionage Against Nonprofit Organization”, Center for Corporate Policy, 23. Available at http://www.corporatepolicy.org/spookybusiness.pdf.
12.Ibid. Emphasis my own.
13.Peter Bright, Nate Anderson, and Jacqui Chang, Unmasked (Amazon Digital Services, 2011), 54
14.Nicole Perlroth and David E. Sanger, “Nations Buying as Hackers Sell Flaws in Computer Code,” nytimes.com, July 13, 2013.
15.Ryan Gallagher, “Cyberwar’s Gray Market,” slate.com, Jan. 16, 2013.
16.Nate Anderson, “Black Ops: How Hbgary Wrote Backdoors for the Government,” arctechnica.com, Feb. 21, 2011.
17.Ruskin, Spooky Business, 3.
18.Available at http://pastebin.com/raw.php?i=u4mtivNN, last accessed June 17, 2014.
19.Mike Masnick, “Play by Play of How HBGary Federal Tried to Expose Anonymous … And Got Hacked Instead,” techdirt.com, Feb. 11, 2011.
20.Joseph Menn, “Cyberactivists Warned of Arrest,” ft.com, Feb. 5, 2011.
21.Emails sent in the fall of 2010 discussed closing down HBGary Federal for not being profitable, and suggested that Aaraon Barr’s “CEO job was under threat.” (See page 28 in Unmasked for emails detailing the company’s financial position.)
22.Peter Bright, “Anonymous Speaks: The Inside Story of the Albany Hack,” arstechnica.com, Feb. 15, 2011.
23.Aphorism by Karl Wilhelm Friedrich Schlegel, nineteenth-century Romantic (and super oddball!).
24.Available at http://archive.today/lMuqh#selection-207.17-207.32, last accessed June 18, 2014.
25.John Cook and Adrian Chen, “Inside Anonymous’ Secret War Room,” gawker.com, March 18, 2011.
26.Dan Kaplan, “Anonymous Takes Over Security Firm in Vengeful Hack,” scmagazine.com, Feb. 7, 2011.
27.“Hacker of Sacramento Company HBGary Pleads Guilty,” FBI press release, March 6, 2012, last accessed June 18, 2014, available at http://www.fbi.gov/sacramento/press-releases/2012/hacker-of-sacramento-company-hbgary-pleads-guilty.
28.Parmy Olson, “Victim of Anonymous Attack Speaks Out,” forbes. com, Feb. 7, 2011.
29.According to the plan, Palantir would provide its expensive link analysis software running on a hosted server, while Berico would “prime the contract supplying the project management, development resources, and process/methodology development.” HBGary Federal would come alongside to provide “digital intelligence collection” and “social media exploitation.” Nate Anderson, “Spy Games: Inside the Convoluted Plot to Bring Down WikiLeaks,” arstechnica.com, Feb. 14, 2011.
30.Parmy Olson, “Congressman Probing HBGary Scandal Fears ‘Domestic Surveillance,’” forbes.com, March 23, 2011.
31.Barrett Brown, “The Cyber-Intelligence Complex and Its Useful Idiots,” theguardian.com, July 1, 2013.
32.Tim Shorrock, “US Intelligence & Oursourcing,” last accessed June 17, 2014, available at http://timshorrock.com/?page_id=141.
33.Tim Shorrock, “Put the Spies Back Under One Roof,” nytimes.com, June 17, 2013.
1.Steve Ragan of the Tech Herald also communicated with LulzSec members while reporting on a technical accounting of the hacks.
2.2600, Twitter post, July 22, 2013, 10:22 am, http://twitter.com/2600/status/76931363755925504.
3.“A Little FAQ About Me vs. Anonymous,” Asherah Research Group, May 24, 2012, last accessed June 24, 2014, available at http://www.back-trace-security.com/blog/844473-a-little-faq-about-me-vs-anonymous.
4.“Anonymous Message to Sony about Taking Down Playstation Network,” YouTube video, posted by Johnny John, April 22, 2011, last accessed June 24, 2014, available at http://www.youtube.com/watch?v=aTbLA_1nkgU.
5.“The Light It Up Contest—Geohot,” YouTube video, posted by geohot, Feb. 12, 2011, last accessed July 7, 2014, available at http://www.youtube.com/watch?v=9iUvuaChDEg.
6.Cory Doctorow, “Embattled PS3 Hacker Raises Big Bank to Fight Sony,” boingboing.net, Feb. 22, 2011.
7.Quoted in Jason Mick, “Anonymous Engages in Sony DDoS Attacks over GeoHot PS3 Lawsuit,” dailytech.com, April 4, 2011.
8.Patrick Seybold, “Update on PlayStation Network and Qriocity,” PlayStation.com, Apr. 26, 2011, last accessed, July 11, 2014.
9.Colin Milburn, “Long Live Play: The PlayStation Network and Technogenic Life,” in Attractive Objects: The Furniture of the Technoscientific World, edited by Bernadette Bensaude-Vincent, Sacha Loeve, Alfred Nordmann, and Astrid Schwartz (Pittsburgh: PA, University of Pittsburgh Press, forthcoming).
10.Owen Good, “Welcome Back PSN: The Winners,” kotaku.com, May 21, 2011.
11.Paul Tassi, “Sony Pegs PSN Attack Costs at $170 Million, $3.1B Total Loss for 2011,” forbes.com, May 23, 2011.
12.“Sony Fined £250,000 After Millions of UK Gamers’ Details Compromised,” Information Commissioner’s Office, Jan. 24, 2013, last accessed June 24, 2014, available at http://www.ico.org.uk/news/latest_news/2013/ico-news-release-2013.
13.“Outro,” HTP Zine 5 (2013), last accessed June 24, 2014, available at http://www.exploit-db.com/papers/25306.
14.LulzSec, Twitter post, May 10, 2011, 7:52 am, http://twitter.com/LulzSec/status/68116303004708864.
15.Picture taken by Alexander Sotirov. Republished with permission.
16.For an excellent account covering the many threats plaguing Internet security, see Ron Deibert, Black Code: Surveillance, Privacy, and the Dark Side of the Internet (Toronto: Signal, 2013).
17.“Hackers Testifying at the United States Senate, May 19, 1998 (L0pht Heavy Industries),” YouTube video, posted by Joe Grand, March 14, 2011, last accessed June 24, 2014, available at http://www.youtube.com/watch?v=VVJldn_MmMY.
18.In fact, in 2013, one security report estimated that there was a 30 percent increase in the total number of infiltrations compared to 2012. These numbers are not bulletproof, but they do give a sense of the depth and extent of infiltrations for a given year. See “ITRC 2013 Breach List Tops 600 in 2013,” Identity Theft Resource Center, Feb. 20, 2014, last accessed June 24, 2014, available at http://www.idtheftcenter.org/ITRC-Surveys-Studies/2013-data-breaches.html.
19.Patrick Gray, “Why We Secretly Love LulzSec,” Risky Business, June 8, 2011, last accessed June 24, 2014, available at http://risky.biz/lulzsec.
20.Michael Taussig, Defacement: Public Secrecy and the Labor of the Negative (Stanford: Stanford University Press, 1999), 5.
21.See the TTI/Vanguard homepage at http://www.ttivanguard.com. Last accessed June 24, 2014.
22.Dick Hebdige, Subculture: The Meaning of Style (London: Routledge, 1979).
23.A major Hollywood producer has recently purchased the film rights to a Rolling Stone story covering Operation Steubenville, an Anonymous operation concerning a rape case in Ohio. Until the movie is released, it is impossible to say whether the film will distort and tame Anonymous’ countercultural message.
24.For a detailed discussion about the role aesthetics and hyperbole play in Nietzsche’s thought and writing, see Alexander Nehamas, Nietzsche: Life as Literature (Cambridge, MA: Harvard University Press, 1987).
25.Friedrich Nietzsche, “Thus Spoke Zarathustra” (1891), available at http://philosophy.eserver.org/nietzsche-zarathustra.txt (last accessed July 7, 2014).
26.Walter Benjamin, Selected Writings, Volume 1: 1913–1926, eds. Marcus Bullock and Michael W. Jennings (Cambridge, MA: Harvard University Press, 1996), 239.
1.Chris Hedges, “The Revolutionaries in Our Midst,” truthdig.com, Nov. 10, 2013.
2.Sterling, The Hacker Crackdown.
3.Ibid. The list of philes is a partial rendition of a longer one in Sterling’s account.
4.hacktivists of the world, unite, “Philippine Hackers Target National Police, Demanding the Release of the Sagada 11!,” Indybay, March 22, 2006, last accessed June 25, 2014, available at http://www.indybay.org/newsitems/2006/03/22/18099531.php. See also “Electronic Civil Disobedience Journal,” Hack This Site, 2007, last accessed July 9, 2014, available at http://mirror.hackthissite.org/hackthiszine/hackthiszine5.txt
5.Stuart Luman, “The Hacktivist,” chicagomag.com, June 25, 2007.
6.“Operation Anti-Security,” June 19, 2011, last accessed June 25, 2014, available at http://pastebin.com/9KyA0E5v.
7.“Anti-Security: Save a Bug, Save a Life,” last accessed June 25, 2014, available at http://web.archive.org/web/20010301215117/http://anti.security.is.
8.The Lulz Boat, Twitter post, June 4, 2011, 5:34 am, http://twitter.com/LulzSec/status/76960035145650177.
9.Stephen Chapman, “Operation Anti-Security: LulzSec and Anonymous Target Banks and Governments,” zdnet.com, June 20, 2011.
10.“Chinga La Migra Bulletin #1,” June 6 23, 2011, last accessed July 9, 2104, available at http://thepiratebay.se/torrent/6490796/Chinga_La_Migra.
11.“50 Days of Lulz,” June 25, 2011, last accessed June 25, 2014, available at http://pastebin.com/1znEGmHa.
12.Samantha Murphy, “Exclusive First Interview with Key LulzSec Hacker,” New Scientist, no. 2820 (July 9, 2011). Available at http://www.newscientist.com/article/dn20649-exclusive-first-interview-with-key-lulzsec-hacker.html#.U6bPdB_7Gi0. (Last accessed June 26, 2014.)
13.Aldous Huxley, Complete Essays, (Chicago: Dee, 2000 [1934]), 526.
14.Topiary, Twitter post, July 21, 2011, 9:02 pm, https://twitter.com/atopiary/status/94225773896015872.
15.Mark Schone et al., “Exclusive: Snowden Docs Show UK Spies Attacked Anonymous, Hackers,” nbcnews.com, Feb. 4, 2014.
16.Chris Weatherhead, Twitter post, Feb. 5, 2014, 8:39 am, http://twitter.com/CJFWeatherhead/status/431059633071878144.
17.Transcript, CNN Newsroom, Aug. 15, 2011, last accessed June 25, 2014, available at http://quiz.cnn.com/TRANSCRIPTS/1108/15/cnr.08.html.
18.See Paolo Gerbaudo, Tweets and the Streets: Social Media and Contemporary Activism (London: Pluto Press, 2012).
19.Available at http://bartlulz.weebly.com. (Last accessed June 25, 2014.)
20.“Disguised Member of Hacktivist Group ‘Anonymous’ Defends Retaliatory Action Against BART,” democracynow.org, Aug. 16, 2011.
21.“Untitled,” Aug. 19, 2011, last accessed June 25, 2014, available at http://pastebin.com/zug52JVA.
22.“Anonymous Is Not Unanimous,” Aug. 17, 2011, last accessed June 25, 2014, available at http://pastebin.com/4vprKdXH.
23.See Chantal Mouffe, “Deliberative Democracy or Agonistic Pluralism?” Social Research, vol. 66, no. 3 (Fall 1999): 745–58.
24.Brick Squad, vol. 1, last accessed June 25, 2014, available at http://download.adamas.ai/dlbase/ezines/Br1ck_Squ4d/br1ck_squ4d_vol.1.txt.
1.The Real Sabu, Twitter post, Aug. 17, 2011, 4:43 am, http://twitter.com/anonymouSabu/status/103763961064865792.
2.The Real Sabu, Twitter post, Sep. 17, 2011, 1:43 pm, http://twitter.com/anonymousabu/status/115133670213435393.
3.The Real Sabu, Twitter post, Sep. 17, 2011, 1:52 pm, http://twitter.com/anonymouSabu/status/115136117925347328.
4.“USA v. Hector ‘Sabu’ Monsegur Transcript August 15, 2011,” last accessed June 27, 2014, available at http://cryptome.org/2013/02/usa-v-monsegur-11-0815.htm.
5.Available at http://pastie.org/private/om3mrqvbdbmg8esddkcmw#2-3,347,353,365,376. (Last accessed June 27, 2014.)
6.Nathan Schneider, Thank You, Anarchy: Notes from the Occupy Apocalypse (Berkeley: University of California Press, 2013), 28.
7.Drew Grant, “Hacker Hero ‘Weev’ Stops by Occupy Wall Street [Video],” observer.com, Oct. 21, 2011.
8.Graham Jones, Tricks of the Trade: Inside the Magician’s Craft (Berkeley: University of California Press, 2011), 94.
9.Jeanne Mansfield, “Why I Was Maced at the Wall Street Protests,” Sept. 26, 2011, last accessed June 27, 2014, available at http://pastebin.com/Wkckd9bR.
10.“BadCop d0x,” Sept. 26, 2011, last accessed June 27, 2014, available at http://pastebin.com/nC4f5uca.
11.“Anthony Bologna, Pepper Spray NYPD Officer, Transferred to Work in Staten Island,” huffingtonpost.com, Oct. 26, 2011.
12.Karen McVeigh, “Occupy Wall Street: ‘Pepper-Spray’ Officer Named in Bush Protest Claim,” theguardian.com, Sept. 27, 2011.
13.“DoITT – Frequently Asked Questions – Public Pay Telephones,” NYC.gov, last accessed June 27, 2014, available at http://www.nyc.gov/html/doitt/html/faq/payphone.shtml.
14.“Sabu / LulzSec leader,” June 7, 2011, last accessed June 27, 2014, available at http://pastebin.com/TVnGwSmG. Some of the details of this event also came from Steve Fishman’s fascinating profile of Sabu, “‘Hello, I Am Sabu…,’” nymag.com, June 3, 2012.
15.For thoughtful critiques of gender dynamics in geek communities, see geekfeminism.org.
16.The role of weirdness is thoughtfully explored by hacker Meredith Patterson in her essay “When Nerds Collide,” medium.com, March 23, 2014.
17.Quinn Norton, “How Antisec Died,” medium.com, Nov. 21, 2013.
18.Schneider, Thank You, Anarchy, 76.
19.“FBI Documents Reveal Secret Nationwide Occupy Monitoring,” Partnership for Civil Justice Fund, Dec. 22, 2012, last accessed June 27, 2014, available at http://www.justiceonline.org/commentary/fbi-files-ows.html.
20.Colin Moynihan, “Officials Cast Wide Net in Monitoring Occupy Protests,” nytimes.com, May 23, 2014.
21.David Hume, A Treatise of Human Nature, eds. David Fate Norton and Mary J. Norton (Oxford: Oxford University Press, 2000), 204.
1.http://ulrikbrask.dk/operation-m4yh3m, last accessed July 5, 2014.
2.Ibid.
3.The Real Sabu, Twitter post, Dec. 24, 2011, 2:49 pm, http://twitter.com/anonymouSabu/status/150664330763964416.
4.The Invisible Committee, The Coming Insurrection (2007), last accessed July 9, 2014, available at http://tarnac9.wordpress.com/texts/the-coming-insurrection/.
5.“Operation m4yh3m,” last accessed July 9, 2104, available at http://ulrikbrask.dk/operation-m4yh3m.
6.Ibid., Dec. 25, 2011, 3:54 pm, http://twitter.com/anonymouSabu/status/151043065501593601.
7.Ibid., Dec. 25, 2011, 4:57 pm, http://twitter.com/anonymouSabu/status/151059108353683456.
8.“Press Release: Stratfor Hack NOT Anonymous,” Dec. 25, 2011, last accessed June 30, 2014, available at http://pastebin.com/8yrwyNkt.
9.Kevin Poulsen, “WikiLeaks Volunteer Was a Paid Informant for the FBI,” wired.com, June 27, 2013.
10.For a full list of participating sites see sopastrike.com.
11.Chenda Ngak, “SOPA and PIPA Internet Blackout Aftermath, Staggering Numbers,” cbsnews.com, Dec. 19, 2012.
12.Victoria Espinel, Aneesh Chopra, and Howard Schmidt, “Combating Online Piracy While Protecting an Open and Innovative Internet,” We the People: Your Voice in Our Government, last accessed July 1, 2014, available at http://petitions.whitehouse.gov/response/combating-online-piracy-while-protecting-open-and-innovative-internet.
13.Greg Sandoval, “New Zealand PM Apologizes to Kim Dotcom; Case Unraveling,” cnet.com, Sept. 27, 2012.
14.Max Fisher, “Stratfor Is a Joke and So Is Wikileaks for Taking It Seriously,” theatlantic.com, Feb. 27, 2012.
15.“Re: Wiki Hackers Talk to The Economist,” Global Intelligence Files, March 28, 2013, last accessed July 1, 2014, available at http://wikileaks.org/gifiles/docs/10/1075390_re-wiki-hackers-talk-to-the-economist-.html.
16.Steve Horn, “How to Win the Media War Against Grassroots Activists: Stratfor’s Strategies,” mintpressnews.com, July 29, 2013.
17.Email communication with the author.
18.Gary Ruskin, Spooky Business: Corporate Espionage Against Nonprofit Organizations, Center for Corporate Policy, 34. Available at http://www.corporatepolicy.org/spookybusiness.pdf.
19.“Stratfor Statement on Wikileaks,” digitaljournal.com, Feb. 27, 2012.
20.The Real Sabu, Twitter post, Feb. 3, 2012, 10:22 pm, http://twitter.com/anonymouSabu/status/165636278770077697.
21.Jana Winter, “EXCLUSIVE: Inside LulzSec, a Mastermind Turns on His Minions,” foxnews.com, March 6, 2012.
22.The Real Sabu, Twitter post, Aug. 16, 2011, 8:22 am, http://twitter.com/anonymousabu/status/103456479964700672.
23.Nigel Parry, “Sacrificing Stratfor: How the FBI Waited Three Weeks to Close the Stable Door,” NigelParry.com, March 25, 2012, last accessed July 2, 2014, available at http://www.nigelparry.com/news/sacrificing-stratfor.shtml.
24.Jana Winter, “EXCLUSIVE: Inside LulzSec, a Mastermind Turns on His Minions.”
25.George Friedman, “The Hack on Stratfor,” Stratfor.com, Jan. 11, 2012, last accessed July 1, 2014, available at http://www.stratfor.com/weekly/hack-stratfor.
26.Nicole Perlroth, “Inside the Stratfor Attack,” nytimes.com, March 12, 2012.
27.Dell Cameron, “How an FBI Informant Orchestrated the Stratfor Hack,” dailydot.com, June 5, 2014.
28.“Sentenced to 10 Years in Prison, Jeremy Hammond Uses Allocution to Give Consequential Statement Highlighting Global Criminal Exploits by FBI Handlers,” sparrowmedia.net, Nov. 15, 2013.
29.Mark Mazzetti, “F.B.I. Informant Is Tied to Cyberattacks Abroad,” nytimes, April 23, 2014.
30.Daniel Stuckey and Andrew Blake, “Exclusive: How FBI Informant Sabu Helped Anonymous Hack Brazil,” motherboard.vice.com, June 5, 2014.
31.Alexandra Natapoff, Snitching: Criminal Informants and the Erosion of American Justice (New York: NYU Press, 2011), 44.
32.Lee Romney, “Pressured to Name Names,” latimes.com, Aug. 7, 2006.
33.Adam Goldman, “Lawsuit Alleges FBI Is Using No-Fly List to Force Muslims to Become Informants,” washingtonpost.com, April 22, 2014.
34.“Notes on Sabu Arrest,” Errata Security, March 6, 2013, last accessed July 1, 2014, available at http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html#.U64Kjx_7Gb8.
35.Parmy Olson, We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (New York: Back Bay Books, 2013), 400.
36.John Leyden, “Sabu Wasn’t the Only FBI Mole in LulzSec, Suggest Leaked Docs,” theregister.co.uk, Jan. 10, 2014.
37.Ruth Rosen, The World Split Open: How the Modern Women’s Movement Changed America, Revised Edition (New York: Penguin, 2006), 281.
38.Brian Todd and Kevin Bohn, “Computers of Obama, McCain Campaigns Hacked,” cnn.com, Nov. 6, 2008.
39.Online interview with the author.
40.“Quebec Human Rights Commission Slams Bill 78,” cbc.ca, July 19, 2012, last accessed July 2, 2014, available at cbc.ca, July 19, 2012.
41.AnonOpsIndia, Twitter post, May 17, 2012, 6:08 am, http://twitter.com/opindia_revenge/status/203079500983050240.
42.“Official Statement from Family and Partner of Aaron Swartz,” RememberAaronSw.com, Jan. 12, 2013, last accessed July 2, 2014, available at rememberaaronsw.com/memories.
43.“Anonymous Operation Last Resort,” YouTube video, posted by Aarons ArkAngel, Jan. 26, 2013, last accessed July 7, 2014, available at http://www.youtube.com/watch?v=WaPni5O2YyI&feature=youtu.be.
44.Jason Howerton, “Disturbing Video Leaked of Ohio High School Students Joking About Alleged Gang Rape,” theblaze.com, Jan. 2, 2013.
45.David Kushner, “Anonymous vs. Steubenville,” rollingstone.com, Nov. 27, 2013.
46.Trip Gabriel, “Inquiry in Cover-Up of Ohio Rape Yields Indictment of Four Adults,” nytimes.com, Nov. 25, 2013.
47.“#OpJustice4Rehtaeh,” YouTube video, posted by Anonymous Canada, last accessed July 9, 2014, available at http://www.youtube.com/watch?v=7_D_zvizzKA.
48.Cited in Emily Bazelon, “Non-Consensual Sexting Leads to Child Pornography Charges for Two Men in Rehtaeh Parsons Case,” salon.com, Aug. 8, 2013.
49.Ibid.
50.Peggy Lowe and Monica Sandreczki, “Why Was the Maryville Rape Case Dropped?” kcur.org, July 11, 2013.
51.Ariel Levy, “Trial by Twitter,” newyorker.com, Aug. 5, 2013.
52.“Is Maryville the Next Steubenville?” Huffington Post Live, Oct. 16, 2013, last accessed July 1, 2014, available at http://live.huffingtonpost.com/r/segment/is-maryville-the-next-steubenville/525d71012b8c2a4a3d0000d2.
53.Emily Bazelon, “The Online Avengers,” nytimes.com, Jan. 15, 2014.
54.The discussion was prompted by Larisa Mann’s published commentary on a similar topic. Mann, “What Can Feminism Learn from New Media?,” Communication and Critical/Cultural Studies (Summer, 2014): 1–5.
55.Stephen Duncombe, Dream: Re-imagining Progressive Politics in an Age of Fantasy (New York: New Press, 2007).
1.Lauren Cornell, “Primary Documents” (interview with Laura Poitras), Mouse Magazine, Issue 40, last accessed July 7, 2014, available at http://www.moussemagazine.it/articolo.mm?id=1020.
2.Barton Gellman and Julie Tate, “In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are,” washingtonpost.com, July 5, 2014.
3.James Risen and Laura Poitras, “N.S.A. Report Outlined Goals for More Power,” nytimes.com, Nov. 22, 2013.
4.Samuel Warren and Louis Brandeis, “The Right to Privacy,” Harvard Law Review, vol. IV, no. 5 (Dec. 15, 1890). Last accessed July 2, 2014, available at http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html.
5.https://help.riseup.net/en/about-us/newsletter/2013/08.
6.Jennifer Granick, “My Dinner with NSA Director Keith Alexander,” forbes.com, Aug. 22, 2013.
7.See especially Will Potter, Green Is the New Red: An Insider’s Account of a Social Movement Under Siege (San Francisco: City Lights Publishers, 2011), and Arun Kundnani, The Muslims Are Coming!: Islamophobia, Extremism, and the Domestic War on Terror (New York: Verso, 2014).
8.Muslim American Civil Liberties Coalition, Creating Law Enforcement Accountability & Responsibility (CLEAR), and Asian American Legal Defense and Education Fund (AALDEF), Mapping Muslims: NYPD Spying and Its Impact on American Muslims (2013). Last accessed July 2, 2014, available at http://aaldef.org/press-releases/press-release/new-report-launched-nypd-spyings-impact-on-american-muslims.html.
9.Tim Cushing, “Former FBI Agent: NYPD’s Muslim-Spying Demographics Unit Was Almost Completely Useless,” techdirt.com, April 28, 2014.
10.Mapping Muslims, 55.
11.Glenn Greenwald and Murtaza Hussain, “Under Surveillance,” theintercept.com, July 9, 2014.
12.“Factsheet: The NYPD Muslim Surveillance Program,” ACLU, last accessed July 2, 2014, available at https://www.aclu.org/national-security/factsheet-nypd-muslim-surveillance-program.
13.Laurie Penny, “If You Live in a Surveillance State for Long Enough, You Create a Censor in Your Head,” newstatesman.com, June 17, 2013.
14.Steve Lohr, “Unblinking Eyes Track Employees,” nytimes.com, June 21, 2014.
15.Recently, two professors from Northwestern and Princeton examined nearly two thousand policy changes in light of extensive data on lobbyists, the American elite, and the preferences of ordinary Americans. They concluded what many already suspected to be the case: “Economic elites and organized groups representing business interests have substantial independent impacts on US government policy, while mass-based interest groups and average citizens have little or no independent influence.” Martin Gilens and Benjamin Page, “Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens,” Perspective on Politics, forthcoming.
16.Eben Moglen, “Freedom in the Cloud: Software Freedom, Privacy, and Security for Web 2.0 and Cloud Computing,” speech given at meeting of the New York branch of the Internet Society, Feb. 5, 2010. Available at http://www.softwarefreedom.org/events/2010/isoc-ny/FreedomInTheCloud-transcript.html (last accessed July 2, 2014). Bruce Schneier, “The US Government Has Betrayed the Internet. We Need to Take it Back,” theguardian.com, Sept. 5, 2013.
17.Christopher Soghoian, “Protecting Privacy Can Conflict with Free Business Models,” Section 7.1 in The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance, PhD Dissertation, August 2012.
18.For two recent books on geek politics see Jessica L. Bayer, Expect Us: Online Communities and Political Mobilization (Oxford: Oxford University Press, 2014), and Patrick Burkhart, Pirate Politics: The New Information Policy Contests (Cambridge, MA: MIT Press, 2014).
19.Trevor Timm, “Congress Wants NSA Reform After All. Obama and the Senate Need to Pass It,” theguardian.com, June 20, 2014.
20.Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (New York: Metropolitan Books, 2014).
21.“Cyber Security in the Post-Snowden Era,” panel at 2014 Ottawa Conference on Defence and Security. Video available at http://www.cpac.ca/en/programs/public-record/episodes/31366144 (last accessed July 2, 2014).
22.See the website of Reset the Net at resetthenet.org.
23.Quoted in Derek Mead, “‘The Bottom Line Is That Encryption Does Work’: Edward Snowden at SXSW,” motherboard.vice.com, March 10, 2014.
24.“On the FBI Raid,” March 7, 2012, last accessed July 8, 2014, http://pastebin.com/vZEteA3C.
25.“Why I’m Going to Destroy FBI Agent Robert Smith Part Three Revenge of the Lithe,” YouTube video, posted by Grenalio Kristian Perdana Siahaan, Nov. 25, 2012, last accessed July 3, 2014, available at http://www.youtube.com/watch?v=VcMHdfvnEk4.
26.Adrian Chen, “Former Anonymous Spokesman Barrett Brown Indicted for Sharing a Link to Stolen Credit Card Data,” gawker.com, Dec. 7, 2012.
27.Kevin M. Gallagher, “Barrett Brown, Political Prisoner of the Information Revolution,” theguardian.com, July 13, 2013.
28.Douglas Thomas, Hacker Culture (Minneapolis, MN: University of Minnesota Press, 2003), 241.
29.Your Anonymous News, Twitter post, May 27, 2014, 10:53 am, https://twitter.com/YourAnonNews/status/471318266255011840
30.Jeremy Hammond, “Jeremy Hammond Reacts to Hector Monsegur’s ‘Sentencing’: Rejects the NSA White Hat Sabu Ideology,” posted June 2, 2014, last accessed July 9, 2014.
31.Danilyn Rutherford, “Kinky Empiricism,” Cultural Anthropology, vol. 27, issue 3 (Aug. 2012): 465–79.
32.Anonymous, Twitter post, May 12, 2014, 11:52 am, http://twitter.com/blackplans/status/465897377468260352.
33.I would like to thank Scott Kushner for pointing out the subtle but important difference between unwillingness to acknowledge action as political versus delegitimization conducted precisely because the action is seen as politically potent.
34.Jane Bennett, The Enchantment of Modern Life: Attachments, Crossings, and Ethics (Princeton, NJ: Princeton University Press, 2001), 4.
35.Ernst Bloch, The Principle of Hope, Vol. 1, (Cambridge MA: MIT Press, 1995), 3.
36.Ibid., 5.
37.Whitney Phillips, This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture (Cambridge, MA: MIT Press, forthcoming 2015).
38.David Foster Wallace, “E Unibus Pluram: Television and U.S. Fiction,” Review of Contemporary Fiction, vol. 13, no. 2: 151–94.
39.“Waiting for the Tsunami - Bifo,” YouTube video, posted by alterazionivideo alterazionivideo, August. 29, 2007, last accessed July 8, 2014, available at http://www.youtube.com/watch?v=5eojG4Hom3A#t=10.
40.Of course, due to the enormous plurality exhibited in contemporary industrial societies, it is naive and dangerous to boil something as complex as political sentiments to single “structures of feeling,” to borrow Raymond Williams’s useful phrase. It would be equally naive to entirely discard an analysis of dominant trends—whether economic or affective—such as the turn to cyncism. Raymond Williams, Marxism and Literature (Oxford: Oxford University Paperback, 1978).
41.Plan C/The Institute for Precarious Consciousness, “We Are All Very Anxious,” last accessed July 9, 2014, available at http://www.weareplanc.org/we-are-all-very-anxious.
42.Bloch, The Principle of Hope, Vol. 1, 5.
43.Richard Sennet, Together: The Rituals, Pleasures and Politics of Cooperation (New Haven, CT: Yale University Press, 2012), 242.