Hostname: page-component-586b7cd67f-dlnhk Total loading time: 0 Render date: 2024-11-26T10:28:38.046Z Has data issue: false hasContentIssue false

E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One

Published online by Cambridge University Press:  10 December 2013

Wendy H. Wong
Affiliation:
University of Toronto
Peter A. Brown
Affiliation:
University of Toronto

Abstract

In recent years, WikiLeaks and Anonymous have made headlines distributing confidential information, defacing websites, and generating protest around political issues. Although many have dismissed these actors as terrorists, criminals, and troublemakers, we argue that such actors are emblematic of a new kind of political actor: extraordinary bandits (e-bandits) that engage in the politics of no one via anonymizing Internet technologies. Building on Hobsbawm's idea of the social bandit, we show how these actors fundamentally change the terms of global activism. First, as political actors, e-bandits are akin to Robin Hood, resisting the powers that be who threaten the desire to keep the Internet free, not through lobbying legislators, but by “taking” what has been deemed off limits. Second, e-banditry forces us to think about how technology changes “ordinary” transnational activism. Iconic images of street protests and massive marches often underlie the way we as scholars think about social movements and citizen action; they are ordinary ways we expect non-state actors to behave when they demand political change. E-bandits force us to understand political protest as virtual missives and actions, activity that leaves no physical traces but that has real-world consequences, as when home phone numbers and addresses of public officials are released. Finally, e-banditry is relatively open in terms of who participates, which contributes to the growing sense that activism has outgrown organizations as the way by which individuals connect. We illustrate our theory with the actions of two e-bandits, Anonymous and WikiLeaks.

Type
Research Article
Copyright
Copyright © American Political Science Association 2013 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

4Chan website http://www.4chan.org/ (Accessed September 3, 2013).Google Scholar
About Friends of WikiLeaks.” https://wlfriends.org/about (Accessed March 31, 2013).Google Scholar
About WikiLeaks.” http://wikileaks.org/About.html (Accessed September 3, 2013).Google Scholar
Adamson, Fiona B. 2005. “Globalisation, Transnational Political Mobilisation, and Networks of Violence.” Cambridge Review of International Affairs 18(1): 3149.CrossRefGoogle Scholar
Ahmed, Shamima, and Potter, David. 2006. NGOs in International Politics. Bloomfield, CT: Kumarian Press.Google Scholar
Albanesius, Chloe. 2012. “Anonymous Leaks FBI, Scotland Yard Call About Hackers.” PCMAG, February 3; accessed February 14, 2012.Google Scholar
Allnutt, Luke. 2011. “Old-School Hacker Oxblood Ruffin Discusses Anonymous and the Future of Hacktivism.” RadioFreeEurope/RadioLiberty. June 8; accessed January 24, 2013.Google Scholar
Andreas, Peter. 2003. “Redrawing the Line: Borders and Security in the Twenty-first Century.” International Security 28(2): 78111.Google Scholar
Andreas, Peter. 2013. Smuggler Nation: How Illicit Trade Made America. New York: Oxford University Press.Google Scholar
An IRC Tutorial.” http://irchelp.org/irchelp/irctutorial.html#intro (Accessed September 3, 2013).Google Scholar
Anonymous Analytics.” http://www.anonanalytics.com/ (Accessed September 3, 2013).Google Scholar
Bacani, Cesar. 2011. “Are You Safe from the Research Vigilantes?” CFO Innovation ASIA, October 12; accessed July 31, 2012.Google Scholar
Bagh, Carl. 2010. “How WikiLeaks Uses Technology to Protect Anonymity of Whistle-blowers.” International Business Times, November 29; accessed March 25, 2012.Google Scholar
Bandy, Joe, and Smith, Jackie, eds. 2005. Coalitions across Borders: Transnational Protest and the Neoliberal Order. Lanham, MD: Rowman and Littlefield.Google Scholar
Benkler, Yochai. 2006. The Wealthy of Networks: How Social Production Transforms Markets and Freedom. New Haven and London: Yale University Press.Google Scholar
Bennett, W. Lance. 2003. “Communicating Global Activism: Strengths and Vulnerabilities of Networked Politics.” Information, Communication, and Society 6(2): 143–68.Google Scholar
Betsill, Michele M., and Corell, Elisabeth. 2001. “NGO Influence in International Environmental Negotiations: A Framework for Analysis.” Global Environmental Politics 1(4): 6585.CrossRefGoogle Scholar
Bimber, Bruce. 2012. “Digital Media and Citizenship.” In The SAGE Handbook of Political Communication, ed. Semetko, Holli A and Scammell, Margaret. London: SAGE Publications, Ltd.Google Scholar
Bimber, Bruce, Flanagin, Andrew J., and Stohl, Cynthia. 2012. Collective Action in Organizations: Interaction and Engagement in an Era of Technological Change. New York: Cambridge University Press.Google Scholar
Bob, Clifford. 2005. The Marketing of Rebellion: Insurgents, Media, and International Activism. New York: Cambridge University Press.CrossRefGoogle Scholar
Bob, Clifford. 2012. The Global Right Wing and the Clash of World Politics. New York: Cambridge University Press.Google Scholar
Burns, John F., and Somaiya, Ravi. 2010. “WikiLeaks Founder on the Run, Trailed by Notoriety.” New York Times, October 23; accessed March 26, 2012.Google Scholar
Burstein, Paul, and Linton, April. 2002. “The Impact of Political Parties, Interest Groups, and Social Movement Organizations on Public Policy: Some Recent Evidence and Theoretical Concerns.” Social Forces 81(2): 380408.Google Scholar
Captain, Sean. 2011. “The Real Role of Anonymous in Occupy Wall Street.” Fast Company, October; 17; accessed January 24. 2013.Google Scholar
Carpenter, R. Charli. 2010. Forgetting Children Born of War: Setting the Human Rights Agenda in Bosnia and Beyond. New York: Columbia University Press.Google Scholar
Carpenter, R. Charli. 2011. “Vetting the Advocacy Agenda: Network Centrality and the Paradox of Weapons Norms.” International Organization 65(1): 69102.Google Scholar
Castells, Manuel. 2007. “Communication, Power, and Counter-power in the Network Society.” International Journal of Communication 1: 238–66.Google Scholar
Clark, Ann Marie, Friedman, Elisabeth J., and Hochstetler, Kathryn. 1998. “The Sovereign Limits of Global Civil Society: A Comparison of NGO Participation in UN World Conferences on the Environment, Human Rights, and Women.” World Politics 51(1): 135.Google Scholar
Coleman, Gabriella. 2010. “What It's Like to Participate in Anonymous' Actions.” The Atlantic, December 10; accessed July 31, 2012.Google Scholar
Coleman, Gabriella. 2011a. “Hacker Politics and Publics.” Public Culture 23(3): 511–16.Google Scholar
Coleman, Gabriella. 2011b. “Anonymous: From the Lulz to Collective Action.” MediaCommons, April 6; accessed March 25, 2012.Google Scholar
Coleman, Gabriella. 2011c “The Ethics of Digital Direct Action.” Al Jazeera English, September 1; accessed July 31, 2012.Google Scholar
Coleman, Gabriella. 2012a. “Our Weirdness Is Free.” Triple Canopy, January 13; accessed Mach 30, 2012.Google Scholar
Coleman, Gabriella. 2012b. “Am I Anonymous?” Limn, accessed July 31, 2012.Google Scholar
Cooper, Michael, and Roberts, Sam. 2011. “After 40 Years, the Complete Pentagon Papers.” Nytimes.com, June 7; accessed March 25, 2012.Google Scholar
Crenshaw, Adrian. 2013. “Crude, Inconsistent Threat: Understanding Anonymous.” Irongeek.com; accessed January 28, 2013.Google Scholar
Davies, Nick, and Leigh, David. 2010. “Afghanistan War Logs: Massive Leak of Secret Files Exposes Truth of Occupation.” The Guardian, July 25;. accessed July 31, 2012.Google Scholar
Deibert, Ronald J. 2000. “International Plug 'n Play? Citizen Activism, the Internet, and Global Public Policy.” International Studies Perspectives 1: 255–72.Google Scholar
Deibert, Ronald J. 2003. “Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace.” Millennium—Journal of International Studies 32(3): 501–30.Google Scholar
Deibert, Ronald J. 2012. “Cybersecurity: The New Frontier.” Foreign Policy Topic 4: 4558.Google Scholar
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L., eds. 2008. Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L. 2010. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press.Google Scholar
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L. 2011. Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: MIT Press.Google Scholar
Delio, Michelle. 2004. “Hacktivism and How It Got Here.” Wired; accessed July 14, 2004.Google Scholar
Denning, Dorothy E. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. Arquilla, John and Ronfeldt, David F.. Santa Monica, CA: RAND.Google Scholar
Denning, Dorothy E. 2008. “Cyberwarriors: Activists and Terrorists Turn to Cyberspace.” Harvard International Review 23(2): 7075.Google Scholar
Domscheit-Berg, Daniel. 2011. Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website. Toronto: Doubleday Canada, Limited.Google Scholar
Dupuis-Deri, Francis. 2010a. “Anarchism and the Politics of Affinity Groups.” Anarchist Studies 18(1): 4061.Google Scholar
Dupuis-Deri, Francis. 2010b. “The Black Blocs Ten Years after Seattle.” Journal for the Study of Radicalism 4(2): 4582.Google Scholar
Earl, Jennifer. 2007. “Leading Tasks in a Leaderless Movement: The Case of Strategic Voting.” American Behavioral Scientist 50(10): 1327–49.Google Scholar
Earl, Jennifer. 2010. “The Dynamics of Protest-Related Difussion on the Web.” Information, Communication, and Society 13(2): 209–25.Google Scholar
Earl, Jennifer, and Kimport, Katrina. 2011. Digitally Enabled Social Change: Activism in the Internet Age. Cambridge, MA: MIT Press.Google Scholar
Earl, Jennifer, and Schussman, Alan. 2008. “Contesting Cultural Control: Youth Culture and Online Petitioning.” In Civil Life Online: Learning How Digital Media Can Engage Youth, ed. Bennett, W. Lance. Cambridge, MA: MIT Press.Google Scholar
Fisher, Dana R., Stanley, Kevin, Berman, David, and Neff, Gina. 2005. “How Do Organizations Matter? Mobilization and Support for Participants at Five Globalization Protests.” Social Problems 52(1): 102–21.CrossRefGoogle Scholar
Foremski, Tom. 2011. Wall Street Journal Wants Your Leaks—Launches ‘SafeHouse’” ZDNet, May 5; accessed July 31, 2012.Google Scholar
Freeman, Allen. 2012. “Who Is Anonymous? How the Wall Street Journal and the NSA Got It Wrong.” Null Byte, accessed April 2, 2012.Google Scholar
Friends of WikiLeaks.” https://wlfriends.org (Accessed March 31, 2013).Google Scholar
Friends of WikiLeaks Membershiphttps://wlfriends.org/membership (Accessed March 31, 2013.)Google Scholar
Gill, Stephen. 2000. “Toward a Postmodern Prince? The Battle in Seattle as a Moment in the New Politics of Globalisation.” Millennium 29(1): 131–40.Google Scholar
Goldsmith, Jack, and Wu, Tim. 2006. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press.CrossRefGoogle Scholar
Gordon, Uri. 2007. “Anarchism Reloaded.” Journal of Political Ideologies 12(1): 2948.Google Scholar
Gourevitch, Peter A., Lake, David A., and Stein, Janice Gross, eds. 2012. The Credibility of Transnational NGOs: When Virtue Is Not Enough. New York: Cambridge University Press.Google Scholar
Graeber, David. 2002. “The New Anarchists.” New Left Review 13: 6173.Google Scholar
Greenberg, Andy. 2012a. “WikiLeaks Tightens Ties To Anonymous In Leak Of Stratfor Emails.” Forbes, February 27; accessed April 2,. 2012.Google Scholar
Greenberg, Andy. 2012b. “How WikiLeaks' New York Times Hoax Diluted Truth-Telling With Trolling.” Forbes, July 30; accessed January 24, 2013.Google Scholar
Greenwald, Glenn. 2012. “Attacks on RT and Assange Reveal Much about the Critics.” Salon.com, April 18,; accessed July 31, 2012.Google Scholar
Grier, Peter. 2010. “WikiLeaks Chief Julian Assange: ‘Terrorist’ or Journalist?” The Christian Science Monitor, December 20; accessed July 9, 2012.Google Scholar
Grigoriadis, Vanessa. 2011. “4chan's Chaos Theory.” Vanity Fair, April; March 30, 2012.Google Scholar
Hafner-Burton, Emilie M., and Tsutsui, Kiyoteru. 2007. “Justice Lost! The Failure of International Human Rights Law To Matter Where Needed Most.” Journal of Peace Research 44(4): 407–25.Google Scholar
Hafner-Burton, Emilie M., Kahler, Miles, and Montgomery, Alexander H.. 2009. “Network Analysis for International Relations.” International Organization 63(3): 559–92.Google Scholar
Halpin, Harry. 2012. “The Philosophy of Anonymous: Ontological Politics without Identity.” Radical Philosophy 176: 1928.Google Scholar
Harnden, Toby. 2010. “Julian Assange's Arrest Warrant: A Diversion from the Truth?” The Telegraph, August 22; accessed July 31, 2012.Google Scholar
HB Gary website http://www.hbgary.com/ (Accessed September 3, 2013).Google Scholar
Hindman, Matthew. 2005. “The Real Lessons of Howard Dean: Reflections on the First Digital Campaign.” Perspectives on Politics 3(1): 121–28.Google Scholar
Hindman, Matthew. 2009. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press.Google Scholar
Hobsbawm, Eric. 2000. Bandits. New York: The New Press.Google Scholar
Hodson, Steven. 2010. “Has WikiLeaks Finally Bitten off a Secret Too Big?” The Inquisitr, 24 March 24; March 25, 2012.Google Scholar
Howard, Philip N. 2010. The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam. New York: Oxford University Press.Google Scholar
Howard, Philip N. 2011. “Reply to Evgeny Morozov's Review of The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam.” Perspectives on Politics 9(4): 900.Google Scholar
Howard, Philip N., and Hussain, Muzammil M.. 2011. “The Role of Digital Media.” Journal of Democracy 22(3): 3548.Google Scholar
Hughes, Rex. 2010. “A Treaty for Cyberspace.” International Affairs 86(2): 523–41.Google Scholar
Huntington, Samuel P. 1973. “Transnational Organization in World Politics.” World Politics 25(3): 333–68.CrossRefGoogle Scholar
Isikoff, Michael. 2011. “Hacker Group Vows ‘cyberwar’ on US Government, Business.” Msnbc.com, March 8; accessed March 30, 2012.Google Scholar
Jenkins, J. Craig. 1983. “Resource Mobilization Theory and the Study of Social Movements.” Annual Review of Sociology 9: 527–53.Google Scholar
Jenkins, J. Craig, and Eckert, Craig M.. 1986. “Channeling Black Insurgency: Elite Patronage and Professional Social Movement Organizations in the Development of the Black Movement.” American Sociological Review 51(6): 812–29.Google Scholar
Jordan, Tim, and Taylor, Paul A.. 2004. Hacktivism and Cyberwars: Rebels with a Cause. New York: Routledge.Google Scholar
Julian Assange, The Man Behind Wikileaks.” http://www.cbsnews.com/8301-18560_162-7286686.html (Accessed January 29, 2013).Google Scholar
Kahler, Miles, ed. 2009. Networked Politics: Agency, Power, and Governance. Ithaca, NY: Cornell University Press.Google Scholar
Keck, Margaret E., and Sikkink, Kathryn. 1998. Activists beyond Borders. Ithaca, NY: Cornell University Press.Google Scholar
Keller, Bill. 2011. “Dealing with Assange and the WikiLeaks Secrets.” New York Times, January 30; accessed July 31, 2012.Google Scholar
Kenney, Michael. 2005. “Drug Traffickers, Terrorist Networks, and Ill-Fated Government Strategies.” In New Threats and New Actors in International Security, ed. Krahmann, Elke. New York: Palgrave Macmillan.Google Scholar
Kenney, Michael. 2007. From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park, PA: Pennsylvania State University Press.Google Scholar
Kenney, Michael. 2009. “Turning to the ‘Dark Side’: Coordination, Exchange, and Learning in Criminal Networks.” In Networked Politics: Agency, Power, and Governance, ed. Kahler, Miles. Ithaca, NY: Cornell University Press.Google Scholar
Kenney, Michael. 2010. “Beyond the Internet: Metis, Techne, and the Limitations of Online Artifacts for Islamist Terrorists.” Terrorism and Political Violence 22(2): 177–97.Google Scholar
Keohane, Robert O., and Nye, Joseph S.. 1974. “Transgovernmental Relations and International Organizations.” World Politics 27(1): 3962.Google Scholar
Khagram, Sanjeev, Riker, James V., and Sikkink, Kathryn, eds. 2002. Restructuring World Politics. Minneapolis: University of Minnesota Press.Google Scholar
Khatchadourian, Raffi. 2010. “No Secrets.” Newyorker.com, June 7; accessed March 25. 2012.Google Scholar
Klotz, Audie. 2002. “Transnational Activism and Global Transformations: The Anti-Apartheid and Abolitionist Experiences.” European Journal of International Relations 8(1): 4976.Google Scholar
Lake, David A. 2002. “Rational Extremism: Understanding Terrorism in the Twenty-first Century.” Dialogue-IO 1(1): 1529.Google Scholar
Langman, Lauren. 2005. “From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements.” Sociological Theory 23(1): 4274.Google Scholar
La Roche, Julia. 2011. “This Is Awesome: Hacker Group ‘Anonymous’ Doing Securities Analysis, Attempting To Blow Up Chinese Frauds.” Business Insider, October 4; accessed July 31, 2012.Google Scholar
Leigh, David. 2010. “Iraq War Logs Reveal 15,000 Previously Unlisted Civilian Deaths.” The Guardian, October 22;. July 31, 2012.Google Scholar
Lennard, Natasha. 2012a. “Hackers Hit Ohio School Football Team over Gangrape.” Salon.com, December 27; accessed January 29, 2013.Google Scholar
Lennard, Natasha. 2012b. “Anonymous Hits Westboro Baptist Church over Sandy Hook Picket Plans.” Salon.com, December 16; accessed January 29, 2013.Google Scholar
Lennard, Natasha. 2012c. “Anonymous Retaliates to Israel's Gaza Internet Threat.” Salon.com, November 15;. accessed January 29, 2013.Google Scholar
Leonard, Andrew. 2012. “Celebrating Anonymous: The Hackers' Big Year.” Salon.com, December 27;. accessed 29 January 29, 2013.Google Scholar
Levy, Steven. 2010. Hackers. Sebastapol, CA: O'Reilly Media, Inc.Google Scholar
Lipschutz, Ronnie D. 1992. “Reconstructing World Politics: The Emergence of Global Civil Society.” Millennium—Journal of International Studies 21(3): 389420.Google Scholar
Lipset, Seymour Martin. 1994. “The Social Requisites of Democracy Revisited: 1993 Presidential Address.” American Sociological Review 59(1): 122.Google Scholar
Ludlow, Peter. 2010. “WikiLeaks and Hacktivist Culture.” The Nation, October 4.Google Scholar
Lynch, Marc. 2011. “After Egypt: The Limits and Promise of Online Challenges to the Authoritarian Arab State.” Perspectives on Politics 9(2): 301–10.Google Scholar
Mackey, Robert. 2010. “Victory for WikiLeaks in Icelands Parliament.” The Lede, New York Times, June 17; accessed January 29, 2013.Google Scholar
Marc Garneau on Privilege.” http://openparliament.ca/debates/2012/2/29/marc-garneau-1/only/ (Accessed August 5, 2012).Google Scholar
Masnick, Mike. 2011. “Leaked HBGary Documents Show Plan To Spread WikiLeaks Propaganda For BofA … And ‘Attack’ Glenn Greenwald.” Techdirt, February 10; accessed January 29, 2013.Google Scholar
Mathews, Jessica T. 1997. “Power Shift.” Foreign Affairs 76(1): 5066.Google Scholar
McAdam, Doug, McCarthy, John D., and Zald, Mayer N.. 1996. Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings. Cambridge: Cambridge University Press.Google Scholar
McCarthy, John D., and Zald, Mayer N.. 1973. The Trend of Social Movements. Morristown, NJ: General Learning.Google Scholar
McCarthy, John D., and Zald, Mayer N.. 1975. “Organizations Intellectuals and the Criticism of Society.” Social Service Review 49: 344–62.Google Scholar
McCarthy, John D., and Zald, Mayer N.. 1977. “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82(6): 1212–41.Google Scholar
McCullagh, Declan. 2010. “Congressman Wants WikiLeaks Listed as Terrorist Group.” CNET News, CBS Interactive, November 28; accessed January 29, 2013.Google Scholar
McIllwain, Jeffrey Scott. 1999. “Organized Crime: A Social Network Approach.” Crime, Law & Social Change 32: 301–23.Google Scholar
McMillan, Graeme. 2011. “Hackers Turned Journalists? Anonymous Launches ‘Analytics’ Site.” Time, September 28; accessed July 31, 2012.Google Scholar
Melucci, Alberto. 1996. Challenging Codes: Collective Action in the Information Age. Cambridge: Cambridge University Press.Google Scholar
Memmott, Mark. 2010. “Bank of America Stock Steadies after WikiLeaks-Related Drop.” NPR, December 1; accessed January 10,. 2013.Google Scholar
Misselwitz, Michael. 2011. “WikiLeaks Technology Superior to Government.” The Daily Aztec, January 20; accessed March 25, 2012.Google Scholar
Montgomery, Alexander H. 2005. “Ringing in Proliferation: How to Dismantle an Atomic Bomb Network.” International Security 30(2): 153–87.Google Scholar
Morozov, Evegeny. 2011. The Net Delusion: The Dark Side of Internet Freedom. New York: Public Affairs.Google Scholar
Morselli, Carlo, Giguère, Cynthia, and Petit, Katia. 2007. “The Efficiency/Security Trade-off in Criminal Networks.” Social Networks 29(1): 143–53.Google Scholar
Murdie, Amanda, and Bhasin, Tavashi. 2010. “Aiding and Abetting: Human Rights INGOs and Domestic Protest.” Journal of Conflict Resolution 54(6): 129.Google Scholar
Nakashima, Ellen. 2010. “Messages from Alleged Leaker Bradley Manning Portray Him as Despondent Soldier.” Washington Post, June 10; accessed July 31,2012.Google Scholar
Neumayer, Eric. 2005. “Do International Human Rights Treaties Improve Respect for Human Rights?Journal of Conflict Resolution 49(6): 925–53.Google Scholar
Nye, Joseph S. 2011. The Future of Power. New York: PublicAffairs.Google Scholar
Olson, Parmy. 2012a. We Are Anonymous; Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little Brown & Brown.Google Scholar
Olson, Parmy. 2012b. “Anonymous Rattles A Chinese Web Giant.” Forbes, July 3; accessed July 31, 2012.Google Scholar
Owens, Lynn, and Palmer, L. Kendall. 2003. “Making the News: Anarchist Counter-Public Relations on the World Wide Web.” Critical Studies in Media Communication 20(4): 335–61.Google Scholar
Palfrey, John. 2010. “Four Phases of Internet Regulation.” Social Research 77(3): 981–96.Google Scholar
Perlroth, Nicole. 2011. “Hackers Breach the Web Site of Stratfor Global Intelligence.” New York Times, December 25; accessed April 2, 2012.Google Scholar
Polletta, Francesca, and Jasper, James M.. 2001. “Collective Identity and Social Movements.” Annual Review of Sociology 27(1): 283305.Google Scholar
Price, Richard. 1998. “Reversing the Gun Sights: Transnational Civil Society Targets Land Mines.” International Organization 52(3): 613–44.Google Scholar
Raab, Jorg., and Milward, H. Brinton. 2003. “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13(4): 413–39.Google Scholar
Richmond, Riva. 2012. “Web Gang Operating in the Open.” New York Times, January 16.Google Scholar
Rieff, David. 1999. “The False Dawn of Global Civil Society.” The Nation 268(7): 1115.Google Scholar
Risse, Thomas, Ropp, Stephen C., and Sikkink, Kathryn, eds. 1999. The Power of Human Rights: International Norms and Domestic Change. New York: Cambridge University Press.Google Scholar
Rosen, Jay. 2010. “PressThink: The Afghanistan War Logs Released by WikiLeaks, the World's First Stateless News Organization.” PressThink, July 26; accessed January 29, 2013.Google Scholar
Rupert, Mark. 2006. Globalization and International Political Economy. Lanham, MD: Rowman & Littlefield Publishers.Google Scholar
Rutherford, Kenneth R. 2000. “The Evolving Arms Control Agenda: Implications of the Role of NGOs in Banning Antipersonnel Landmines.” World Politics 53(1): 74114.Google Scholar
Shantz, Jeffrey. 2011. Active Anarchy: Political Practice in Contemporary Movements. Lanham, MD: Lexington Books.Google Scholar
Shawki, Noha. 2011. “Organizational Structure and Strength and Transnational Campaign Outcomes: A Comparison of Two Transnational Advocacy Networks.” Global Networks 11(1): 97117.Google Scholar
Shirky, Clay. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin.Google Scholar
Sikkink, Kathryn. 1993. “Human Rights, Principled Issue-Networks, and Sovereignty in Latin America.” International Organization 47(3): 411–41.Google Scholar
Smith, Jackie, and Wiest, Dawn. 2005. “The Uneven Geography of Global Civil Society: National and Global Influences on Transnational Association.” Social Forces 84(2): 621–52.Google Scholar
Snow, David. 2001. “Collective Identity and Expressive Forms.” Unpublished manuscript. CSD Working Papers, University of California–Irvine.Google Scholar
Somaiya, Ravi. 2010. “Hundreds of WikiLeaks Mirror Sites Appear.” Nytimes.com, December 5; accessed March 26, 2012.Google Scholar
Stratfor website (http://www.stratfor.com/, Accessed September 3, 2013).Google Scholar
Stryker, Cole. 2012. “WikiLeaks' New Phase Begins.” Salon.com, February 27; accessed April 12,. 2012.Google Scholar
Sutter, John D. 2010. “The Technical Muscle behind WikiLeaks.” CNN, July 26; accessed January 29, 2013.Google Scholar
Tarrow, Sidney. 1994. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press.Google Scholar
Tarrow, Sidney. 2005. The New Transnational Activism. New York: Cambridge University Press.Google Scholar
Viano, Emilio C. 2003. “Cybercrime and Cybersecurity: The Post-September 11, 2001, Reality.” In Transnational Organized Crime: Myth, Power, and Profit, ed. Viano, Emilio, Magallanes, José, and Bridel, Laurent. Durham, NC: Carolina Academic.Google Scholar
Von Lampe, Klaus. 2003. “Criminally Exploitable Ties: A Network Approach to Organized Crime.” In Transnational Organized Crime: Myth, Power, and Profit, ed. Viano, Emilio, Magallanes, José, and Bridel, Laurent. Durham, NC: Carolina Academic.Google Scholar
Von Lampe, Klaus, and Johansen, Per Ole. 2004. “Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks.” Global Crime 6(2): 159–84.Google Scholar
Walker, Rob. 2011. “How Did a Hacker Group That Rejects Definition Develop Such a Strong Visual Brand?” Slate Magazine, December 8; accessed March 30, 2012.Google Scholar
Wapner, Paul Kevin. 1995. Environmental Activism and World Civic Politics. Buffalo, NY: SUNY Press.Google Scholar
Williams, Jody, Goose, Stephen D., and Wareham, Mary, eds. 2008. Banning Landmines: Disarmament, Citizen Diplomacy, and Human Security. Lanham, MD: Rowman and Littlefield Publishers.Google Scholar
Williams, Leonard. 2007. “Anarchism Revived.” New Political Science 29(3): 297312.Google Scholar
Wong, Wendy H. 2011. “Is Trafficking Slavery? Anti-Slavery International in the 21st Century.” Human Rights Review 12(1): 315–28.Google Scholar
Wong, Wendy H. 2012. Internal Affairs: How the Structure of NGOs Transforms Human Rights. Ithaca, NY: Cornell University Press.Google Scholar
Zetter, Kim. 2010. “WikiLeaks Was Launched With Documents Intercepted From Tor.” Wired.com, June 1; accessed March 25, 2012.Google Scholar
Zetter, Kim. 2011. “WikiLeaks Donations Topped $1.9 Million in 2010.” Wired.com, April 24; accessed January 29, 2013.Google Scholar
Zittrain, Jonathan. 2008. The Future of the Internet—And How to Stop It. New Haven, CT and London: Yale University Press.Google Scholar
Zukin, Cliff, Keeter, Scott, Andolina, Molly, Jenkins, Krista, and Carpini, Michael X. Della. 2006. A New Engagement? Political Participation, Civic Life, and the Changing American Citizen. New York: Oxford University Press.Google Scholar