The Politics of Information: Examining the Conflict Between Wikileaks and the US Government Esther Raelene Armstrong a Thesis

Total Page:16

File Type:pdf, Size:1020Kb

The Politics of Information: Examining the Conflict Between Wikileaks and the US Government Esther Raelene Armstrong a Thesis The Politics of Information: Examining the Conflict Between WikiLeaks and the US Government Esther Raelene Armstrong A thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements for the MA in Criminology Department of Criminology Faculty of Social Science University of Ottawa © Esther Raelene Armstrong, Ottawa, Canada, 2015 Abstract In 2010 WikiLeaks released a number of secret and classified documents that contained information pertaining to the United States government. Since then, WikiLeaks and the United States government have been engaged in a rhetorical battle over the circulation of information. Using membership categorization analysis (MCA) as an analytical technique this thesis answers the following research question: what form(s) of politics are made possible as the result of the social orders produced by both WikiLeaks’ and the United States government’s public discourse on the circulation of information? After analyzing a sample of the related discourse, it became clear that the disagreement between WikiLeaks and the United States government is much greater than different views on the distribution of, and access to, information. Rather, the major issue is that the discourses produced by representatives of both organizations constitute two similar and yet somehow opposing social orders. The social orders produced result in different forms of politics and democracy. In turn, this involves each side thinking differently about transparency, the public, the government, the law, and the media. ii Acknowledgements Without the assistance of the following people this thesis would not have been possible. First of all, thank you Professor Maritza Felices-Luna for your continued support and guidance throughout this process. I appreciate you investing the time to help me fully develop this project. Professor Wayne Hanniman also needs to be acknowledged for providing my first introduction to WikiLeaks during his political crime course. Paula Hirschmann needs to be thanked for reading an earlier draft of this thesis and providing such detailed and interesting comments. I would also like to thank my readers, Professor Christine Gervais and Professor Justin Piché, for taking the time to provide such thorough feedback and challenging me to develop aspects of this thesis even further. Finally, thank you to my family, friends, and cohort members for your on-going encouragement throughout this process. iii Table of Contents Abstract ................................................................................................................................... ii Acknowledgements ................................................................................................................ iii Table of Figures ..................................................................................................................... vi Chapter 1: Introduction ..................................................................................................... 1-7 Chapter 2: WikiLeaks and the Circulation of Information .......................................... 8-31 2.1 Transparency ............................................................................................................ 9-15 2.2 Media ....................................................................................................................... 16-21 2.3 WikiLeaks ................................................................................................................ 21-31 Chapter 3: Theoretical Framework .............................................................................. 32-48 3.1 A Weberian Perspective On Politics ....................................................................... 32-38 Law and Media: Tools of State Power ...................................................................... 35-38 3.2 Arendt, Politics and the Public Sphere .................................................................... 39-48 Politics and the Public Sphere ................................................................................... 41-45 The Internet as a Site and Tool of Activism .............................................................. 45-48 Chapter 4: Methodology and Method .......................................................................... 49-61 4.1 Setting the Stage: An Introduction to Membership Categorization Analysis ......... 50-54 Research Question and Goals ..........................................................................................54 4.2 Sampling Method and Justification ........................................................................ 54-58 4.3 Analysis: An Overview of the Process ................................................................... 58-61 Chapter 5: Analysis ...................................................................................................... 62-107 5.1 Information .............................................................................................................. 63-71 5.2 Rhetorical Battles: Framing WikiLeaks Actions ..................................................... 71-75 5.3 Concept Maps: A Visual Representation of Social Order ...................................... 76-79 Concept Map Legend .......................................................................................................76 United States Government Social Order ..........................................................................77 WikiLeaks First Social Order ..........................................................................................78 WikiLeaks Second Social Order ......................................................................................79 5.4 Political System ....................................................................................................... 80-85 5.5 Civil Society: An Active vs. Passive Public ............................................................ 85-91 iv 5.6 Justice and Legal System ......................................................................................... 91-95 5.7 Media ..................................................................................................................... 95-100 5.8 Politics and Social Order ..................................................................................... 100-107 Chapter 6: Concluding Remarks .............................................................................. 108-117 References .................................................................................................................. 118-132 Appendix A: Key Players .......................................................................................... 133-134 Appendix B: Timeline of Key Events ........................................................................ 135-136 Appendix C: Final Sample in Chronological Order .......................................................137 v Table of Figures Figure 1: Concept Map Legend ...............................................................................................76 Figure 2: United States Government Social Order .................................................................77 Figure 3: WikiLeaks First Social Order ..................................................................................78 Figure 4: WikiLeaks Second Social Order ..............................................................................79 vi Chapter 1: Introduction Since early 2010 WikiLeaks has engaged with the United States government in an ongoing battle over the circulation of information. Through their release of classified or secret documents, WikiLeaks promotes and facilitates access to information. In contrast, the US government believes that confidentiality and secrecy are important tools for effective governance and seek to control the information that is rendered public. Despite their differing stances in regards to the circulation of information, both WikiLeaks and the US government claim to be protecting democracy through their actions and beliefs. In spite of their differences, both WikiLeaks and the US government clearly see the value of information and recognize that citizens require information in order to take part in the democratic political process. They seem to share the belief that “information is the lifeblood of democracy” (Quigley, 2012, p. 79). As argued throughout this thesis, there is a discursive connection made in the literature as well as by WikiLeaks and the US government between democracy, information and transparency. Citizens are responsible for participating in democratic governments through making informed, rational decisions. However, this is only possible if citizens are given access to information (Foerstel, 1999; Simon & Eitzen, 1990) which is dependent on transparency. Transparency as a political and social ideal has become a global issue as it has moved beyond Western, democratic societies to a worldwide-scale level (Florini, 2007; Lord, 2006). This global push for transparency is facilitated by a “growing demand for open and improved access to information” (Garvin, 2011, p. 6). In response to this call for transparency, governments around the world are establishing (or reforming) various policies 1 meant to increase access to information and transparency in regards to various governmental institutions and practices (Erkkilä, 2012; Otenyo & Lind, 2004). While the US government does acknowledge the benefit that transparency and access to information
Recommended publications
  • Magistrate Brings Another Pre-Written Judgement to Assange’S Hearing
    COURAGE EDITION To Chelsea Week l y Leaks Monday 21st September 2020 FREE Follow Assange’s extradition WikiLeaks pioneered secure submission hearing coverage live at systems for journalism Page 4 defend.WikiLeaks.org Tortured for revealing Assange could die in war crimes Supermax prison in the when and in the interest of whom? Old Bailey on September 7th, and is U.S. for journalism Editorial When the laws of exception are the expected to last until October 2nd. rule, does justice become an excep- Expert witnesses have given elements What is journalism? What is jour- tion? What happens when crucial of answers to these questions through Assange’s extradition nalism’s duty and to whom? Who information returns to the public thoroughly researched, engaging is and isn’t a journalist, and who domain, thanks to the dedication of testimonies — some of which can be decides that? What is a political opin- journalists, whistleblowers and indi- found in this issue of WeeklyLeaks. will create a precedent ion and who is allowed to have one? viduals? And what if we end up living Hanging in the courtroom, with What protects the right to inform, be in a world where there are no such the fate of the WikiLeaks founder, is affecting all journalists in informed and express one’s opinion? people left, to speak truth to power? the fate of us all. Who decides what state and corpo- Those are some key questions So stay informed and join the the U.K. and worldwide rate secrets should be revealed to at the heart of Julian Assange’s extra- fight against the extradition
    [Show full text]
  • As Assange Awaits Ruling, Wikileaks Faces Its Fate 1 November 2011, by RAPHAEL G
    As Assange awaits ruling, WikiLeaks faces its fate 1 November 2011, By RAPHAEL G. SATTTER , Associated Press Harvard University's Belfer Center for Science and International Affairs. Legal analysts were predicting a ruling in favor of extradition. "Very, very few people defeat a European Arrest Warrant," said Julian Knowles, an extradition lawyer at London's Matrix Chambers who has been following the case. "The courts in England generally lean in favor of extradition." Assange may have the right to challenge an This is a Monday, Feb. 7, 2011 file photo of WikiLeaks unfavorable verdict in Britain's Supreme Court. But founder Julian Assange as he leaves Belmarsh Magistrates' Court in London. Assange on Tuesday Nov. Knowles said that if he were denied leave to 1, 2011 awaits a judge's extradition verdict, it could be appeal, it could be only days before he were sent to WikiLeaks' very future that's at stake. Its finances under Scandinavia to face allegations of sex crimes. pressure and some of its biggest revelations already public, WikiLeaks may not have the strength to survive if That result could be devastating for WikiLeaks. Britain's High Court judge decides Wednesday in favor of a Swedish request to extradite Assange to face trial For much of the past year Assange has been over rape allegations, some experts argue. (AP running the website from a supporter's country Photo/Kirsty Wigglesworth, File) manor in eastern England, where the terms of his bail have confined him to virtual house arrest. The 40-year-old Australian says he has 20 staff (AP) -- As Julian Assange awaits a judge's members, but it's unclear who might take over were extradition verdict, it could be WikiLeaks' very he jailed.
    [Show full text]
  • Hacktivismo E Organizações Midiáticas: Hackeamento De Narrativas Em Wikileaks E Mídia Ninja
    UNIVERSIDADE FEDERAL DA PARAÍBA CENTRO DE CIÊNCIAS HUMANAS, LETRAS E ARTES PROGRAMA DE PÓS-GRADUAÇÃO EM COMUNICAÇÃO HACKTIVISMO E ORGANIZAÇÕES MIDIÁTICAS: HACKEAMENTO DE NARRATIVAS EM WIKILEAKS E MÍDIA NINJA ISADORA TEIXEIRA DE LIRA JOÃO PESSOA 2017 UNIVERSIDADE FEDERAL DA PARAÍBA CENTRO DE CIÊNCIAS HUMANAS, LETRAS E ARTES PROGRAMA DE PÓS-GRADUAÇÃO EM COMUNICAÇÃO ISADORA TEIXEIRA DE LIRA HACKTIVISMO E ORGANIZAÇÕES MIDIÁTICAS: HACKEAMENTO DE NARRATIVAS EM WIKILEAKS E MÍDIA NINJA Texto apresentado para defesa de dissertação junto ao Programa de Pós-Graduação em Comunicação da Universidade Federal da Paraíba, nível de Mestrado. Linha: Culturas midiáticas audiovisuais Orientadora: Drª Nadja de Moura Carvalho JOÃO PESSOA 2017 Catalogação na publicação Seção de Catalogação e Classificação L768h Lira, Isadora Teixeira de. Hacktivismo e organizações midiáticas : hackeamento de narrativas em Wikileaks e mídia ninja / Isadora Teixeira de Lira. - João Pessoa, 2017. 101 f. : il. Orientação: Nadja de Moura Carvalho. Dissertação (Mestrado) - UFPB/CCHLA. 1. Hacktivismo. 2. WikiLeaks. 3. Mídia Ninja. 4. Hacker de narrativas. I. Carvalho, Nadja de Moura. II. Título. UFPB/BC ISADORA TEIXEIRA DE LIRA HACKTIVISMO E ORGANIZAÇÕES MIDIÁTICAS: HACKEAMENTO DE NARRATIVAS EM WIKILEAKS E MÍDIA NINJA Defesa de dissertação realizada em: __/__/__ BANCA EXAMINADORA Profa. Dra. Nadja de Moura Carvalho Orientadora Prof. Dr. Cláudio Cardoso de Paiva Universidade Federal da Paraíba Examinador Interno Dr. Daniel Neves Abath Luna Examinador externo Agradecimentos Gostaria de agradecer a Elvira, minha mãe e primeira professora, pelo suporte emocional e também financeiro, durante toda a minha vida e também durante o mestrado. Meu pai faleceu em 2014 e não acompanhou o processo deste mestrado, mas também sempre esteve presente e solícito para que eu tivesse acesso à educação.
    [Show full text]
  • DECLARACIÓN JURADA De Julian Paul Assange
    DECLARACIÓN JURADA de Julian Paul Assange Yo, Julian Paul Assange, ciudadano de Australia, editor, y refugiado político bajo la protección de la Embajada de Ecuador en Londres, HAGO CONSTAR Q!E" So# el Editor de $ikiLeaks # un director de or&ani'aciones asociadas en un número de pa)ses inclu#endo Australia e Islandia+ Hago esta declaración jurada en relación al monitoreo de mis actividades periodísticas por la inteli&encia militar de EE+!!+ en Alemania entre el -. de diciembre del -//0 # el 1/ de diciembre del 2009 el cual fue utili'ado para asistir en el enjuiciamiento de una presunta fuente de $i%iLeaks, el oficial de inteli&encia militar de EE+!!+ Bradle# 5anning, 6uien fue sentenciado a 17 años en prisión militar el -9 de agosto del -/91: # en relación a la probable incautación ile&al de propiedad perteneciente al declarante # a $ikiLeaks mientras se encontraba bajo el control de las autoridades aeroportuarias de Arlanda (Estocolmo) o Te&el (Berl)n) el -= de septiembre del 2010, inter alia tres ordenadores port>tiles cifrados conteniendo materiales period)sticos # le&ales incluyendo evidencia de un crimen de guerra: # esta declaración jurada establece hechos 6ue conforman la base de mi entender 6ue la propiedad antes mencionada fue sujeta a un registro e incautación ile&al # 6ue el monitoreo de mis acti,idades en Alemania tambi@n fue ile&al+ 5e asesoran mis abogados 6ue, adem>s de los derechos 6ue gozan los individuos, como editor # periodista, mi trabajo se encuentra protegido por los derechos # libertades correspondientes, los cuales son vinculantes para Suecia y Alemania+ Escribo esta declaración jurada para ejercer mi derecho a una solución jur)dica e2ecti,a+ Hago esta declaración jurada según mi leal saber y entender+ Índice • 1 Resumen de reclamos • 2 Estado actual • 3 Operaciones de inteli&encia conocidas antes de viajar a Suecia • 4 Estancia eBtendida en Suecia • 5 Presunta confiscación de maleta, EstocolmoDBerl)n • 6 Esfuerzos por recuperar la maleta y presentar una denuncia ante la polic)a • 7 Esfuerzos ininterrumpidos de EE+!!.
    [Show full text]
  • Pdf Download Assange Indictment Uncle Sam Charges Julian Assange with Conspiracy to Commit Computer Intrusion
    pdf download assange indictment Uncle Sam charges Julian Assange with conspiracy to commit computer intrusion. As Brit judge finds him guilty of breaching his bail conditions. One-time Aussie cupboard-dweller Julian Assange has been charged with conspiracy to commit computer intrusion by the US government. Shortly after his arrest in London today – which followed the Ecuadorian embassy handing him over to British police – a US indictment dated March 2018 was unsealed. It charges Assange for his part in a computer-hacking conspiracy from 2010, when hundreds of thousands of secret US cables, war reports and briefs were released after being leaked by US Army intelligence analyst Chelsea Manning. The US Department of Justice alleged that Assange had conspired with Manning – who had top secret security clearance – to break into Pentagon computers and snag the document cache. The indictment (PDF) was made in the Eastern District of Virginia. It alleges that Manning and Assange had multiple conversations about getting the files, with Assange helping her hack a password stored on Department of Defense computers, in a "password-cracking agreement", and discussed measures to conceal Manning as the source. The indictment said that Manning downloaded four nearly complete databases, and the vast majority of the documents contained were then released on Assange's WikiLeaks website. These contained, according to the indictment, about 90,000 Afghanistan war-related significant activity reports, 400,000 Iraq war-related significant activity reports, 800 Guantanamo Bay detainee assessment briefs and 250,000 US Department of State cables. The government said Manning told Assange she was "throwing everything" at getting a set of documents, but that was "all I really have got left".
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Wikileaks Advisory Council
    1 WikiLeaks Advisory Council 2 Hi everyone, My name is Tom Dalo and I am currently a senior at Fairfield. I am very excited to Be chairing the WikiLeaks Advisory Council committee this year. I would like to first introduce myself and tell you a little Bit about myself. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. First off, I have been involved with the Fairfield University Model United Nations Team since my freshman year when I was a co-chair on the Disarmament and International Security committee. My sophomore year, I had the privilege of Being Co- Secretary General for FUMUN and although it was a very time consuming event, it was truly one of the most rewarding experiences I have had at Fairfield. Last year I was the Co-Chair for the Fukushima National Disaster Committee along with Alli Scheetz, who filled in as chair for the committee as I was unaBle to attend the conference. Aside from my chairing this committee, I am currently FUMUN’s Vice- President. In addition to my involvement in the Model UN, I am a Tour Ambassador Manager, and a Beta Alpha Psi member. I love the outdoors and enjoy skiing, running, and golfing. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. Some of you may wonder how I got involved with the Model United Nations considering that I am a business student majoring in Accounting and Finance. Model UN offers any student, regardless of their major, a chance to improve their puBlic speaking, enhance their critical thinking skills, communicate Better to others as well as gain exposure to current events.
    [Show full text]
  • Oliveira, Caio Augusto Guimarães De. Das Ameaças Securitizadas O Caso
    UNIVERSIDADE FEDERAL DO PAMPA CAMPUS SANTANA DO LIVRAMENTO BACHARELADO EM RELAÇÕES INTERNACIONAIS CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Santana do Livramento 2016 CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Trabalho de Conclusão de Curso apresentado como requisito parcial para obtenção do grau de Bacharel em Relações Internacionais pela Universidade Federal do Pampa- UNIPAMPA. Orientador: Prof. Dr. Renato José da Costa Santana do Livramento 2016 Catalogação da Publicação Serviço de Documentação Universidade Federal do Pampa - Unipampa Oliveira, Caio Augusto Guimarães de. Das ameaças securitizadas: o caso da Wikileaks/ Caio Augusto Guimarães de Oliveira. – Santana do Livramento: Universidade Federal do Pampa, 2016. xii, 88 f. : 3 il. : 29,7 cm. Orientador: Renato José da Costa Monografia (graduação) – Universidade Federal do Pampa, Unipampa, Bacharelado em Relações Internacionais, 2016. 1. Wikileaks. 2. Segurança Internacional. 3. Securitização. 4. Julian Assange. 5. Mudança Social. – Monografia. I. Costa, Renato José da. II. Universidade Federal do Pampa, Campus Santana do Livramento, Curso de Relações Internacionais, 2016. III. Das ameaças securitizadas: o caso da Wikileaks. CDD: 327.172 CAIO AUGUSTO GUIMARÃES DE OLIVEIRA DAS AMEAÇAS SECURITIZADAS: O CASO DA WIKILEAKS Trabalho de Conclusão de Curso apresentado como requisito parcial para obtenção do grau de Bacharel em Relações Internacionais pela Universidade Federal do Pampa- UNIPAMPA. Trabalho de Conclusão de Curso defendido e aprovado em: ___/___/_____. Banca examinadora ________________________________________________________________ Prof. Dr. Renato José da Costa Orientador (UNIPAMPA) ________________________________________________________________ Prof. Dr. Flávio Augusto Lira Nascimento (UNIPAMPA) ________________________________________________________________ Prof. Dr. Antonio José Guimarães Brito (UNIPAMPA) A todos que buscam e buscaram a verdade.
    [Show full text]
  • USA V JULIAN ASSANGE EXTRADITION HEARING When
    USA V JULIAN ASSANGE EXTRADITION HEARING When: Part 1: 24th February -28th February Part 2: 18th May - 5th June Where: Woolwich Crown Court/Belmarsh Magistrate's Court, which is adjacent to HMP Belmarsh (See end of this briefing for travel advice). Magistrate: Vanessa Baraitser Defence team: Solicitor Gareth Peirce (Birnberg, Peirce & Partners), lead Barristers Edward Fitzgerald QC, Doughty Street Chambers, Mark Summers QC, Matrix Chambers The US is seeking to imprison Julian Assange for obtaining and publishing the 2010/2011 leaks, which exposed the reality of the Bush Administration's "War on Terror": Collateral Murder (Rules of Engagement), Afghan War Diaries, Iraq War Logs, Cablegate, and The Guantanamo Files. The US began its criminal investigation against Julian Assange and WikiLeaks in early 2010. After several years, the Obama administration decided not to prosecute WikiLeaks because of the precedent that this would set against media organisations. In January 2017, the campaign to free Mr. Assange's alleged source Chelsea Manning was successful and President Obama gave her a presidential commutation and freed her from prison. In August 2017 an attempt was made under the Trump administration to pressure Mr. Assange into saying things that would be politically helpful to the President. After Mr. Assange did not comply, he was indicted by the Trump Administration and the extradition request was set in motion. Chelsea Manning was re-imprisoned due to her refusal to cooperate with the grand jury against WikiLeaks. President Trump has declared that the press is "the enemy of the people" (https://www.nytimes.com/2017/02/17/business/trump-calls-the-news-media-the-enemy-of-the- people.html).
    [Show full text]
  • ***Thesis Manuscript for Pr Uricchio
    A Proposal for a Code of Ethics for Collaborative Journalism in the Digital Age: The Open Park Code by Florence H. J. T. Gallez B.A. English and Russian The University of London, 1996 M.S. Journalism Boston University, 1999 Submitted to the Program in Comparative Media Studies in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies at the Massachusetts Institute of Technology June 2012 © 2012 Florence Gallez. All rights reserved The author hereby grants to MIT permission to reproduce publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: __________________________________________________ Program in Comparative Media Studies June 2012 Certified by: ________________________________________________________ David L. Chandler Science Writer MIT News Office Accepted by: ________________________________________________________ William Charles Uricchio Professor of Comparative Media Studies Director, Comparative Media Studies 1 A Proposal for a Code of Ethics for Collaborative Journalism in the Digital Age: The Open Park Code by Florence H. J. T. Gallez Submitted To The Program in Comparative Media Studies in Partial Fulfillment of the Requirements for the Degree of Master of Science in Comparative Media Studies ABSTRACT As American professional journalism with its established rules and values transitions to the little-regulated, ever-evolving world of digital news, few of its practitioners, contributors
    [Show full text]
  • The Right to Publish Illegally Acquired Information Twenty Years After Bartnicki V
    Washington Law Review Volume 96 Number 1 3-1-2021 Hacks, Leaks, and Data Dumps: The Right to Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper Erik Ugland Christina Mazzeo Follow this and additional works at: https://digitalcommons.law.uw.edu/wlr Part of the Constitutional Law Commons, First Amendment Commons, and the Privacy Law Commons Recommended Citation Erik Ugland & Christina Mazzeo, Hacks, Leaks, and Data Dumps: The Right to Publish Illegally Acquired Information Twenty Years After Bartnicki V. Vopper, 96 Wash. L. Rev. 139 (2021). This Article is brought to you for free and open access by the Law Reviews and Journals at UW Law Digital Commons. It has been accepted for inclusion in Washington Law Review by an authorized editor of UW Law Digital Commons. For more information, please contact [email protected]. Ugland & Mazzeo (Do Not Delete) 3/22/2021 11:58 AM HACKS, LEAKS, AND DATA DUMPS: THE RIGHT TO PUBLISH ILLEGALLY ACQUIRED INFORMATION TWENTY YEARS AFTER BARTNICKI V. VOPPER Erik Ugland* & Christina Mazzeo** Abstract: This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper, the Supreme Court appeared to give broad constitutional cover to journalists and other publishers in these situations, but Justice Stevens’s inexact opinion for the Court and Justice Breyer’s muddling concurrence left the boundaries unclear. The Bartnicki framework is now implicated in dozens of new cases— from the extradition and prosecution of Julian Assange, to Donald Trump’s threatened suit of The New York Times over his tax records, to the civil suits spawned by the hack of DNC servers—so there is a pressing need for clarity.
    [Show full text]
  • "We Steal Secrets: the Story of Wikileaks"
    Annotated Transcript of "We Steal Secrets" by Alex Gibney 11/2/14, 11:43 PM "We Steal Secrets: The Story of Wikileaks" The annotated transcript 19:00 GMT, May 23, 2013 Click here for the introductory note Note: The title ("We Steal Secrets: The Story TITLES of WikiLeaks") is false. It directly implies that WikiLeaks steals secrets. In fact, the statement is made by former CIA/NSA The film begins with opening credits in faux-digital director Michael Hayden in relation to the typeface against a black screen. activities of US government spies, not in relation to WikiLeaks. This an irresponsible TEXT FOCUS WORLD PRESENTS libel. Not even critics in the film say that WikiLeaks steals secrets. A JIGSAW/GLOBAL PRODUCE PRODUCTION AN ALEX GIBNEY FILM The film cuts to orbital footage of the Earth from a satellite, with occasional visual static interference, overlayed with stock news footage and news chatter about the Galileo launch. STOCK Newsreader: ...Thursday's scheduled launch of the shuttle Atlantis with this payload of radioactive plutonium... http://wikileaks.org/IMG/html/gibney-transcript.html Page 1 of 238 Annotated Transcript of "We Steal Secrets" by Alex Gibney 11/2/14, 11:43 PM Newsreader: ...a legal challenge with NASA worried what's going on in court tomorrow to help the shuttle Atlantis and its Gallileo spacecraft escape by unique... The stock footage gradually takes over, depicting protests at the launch. Placards read "BAN PLUTONIUM IN SPACE" and "NO PLUTONIUM IN MY TOWN." Screen shows footage of Gallileo and Atlantis at the launchpad. Text overlay reads "October 1989".
    [Show full text]