Skip to main content
×
×
Home

E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One

  • Wendy H. Wong (a1) and Peter A. Brown (a1)
Abstract

In recent years, WikiLeaks and Anonymous have made headlines distributing confidential information, defacing websites, and generating protest around political issues. Although many have dismissed these actors as terrorists, criminals, and troublemakers, we argue that such actors are emblematic of a new kind of political actor: extraordinary bandits (e-bandits) that engage in the politics of no one via anonymizing Internet technologies. Building on Hobsbawm's idea of the social bandit, we show how these actors fundamentally change the terms of global activism. First, as political actors, e-bandits are akin to Robin Hood, resisting the powers that be who threaten the desire to keep the Internet free, not through lobbying legislators, but by “taking” what has been deemed off limits. Second, e-banditry forces us to think about how technology changes “ordinary” transnational activism. Iconic images of street protests and massive marches often underlie the way we as scholars think about social movements and citizen action; they are ordinary ways we expect non-state actors to behave when they demand political change. E-bandits force us to understand political protest as virtual missives and actions, activity that leaves no physical traces but that has real-world consequences, as when home phone numbers and addresses of public officials are released. Finally, e-banditry is relatively open in terms of who participates, which contributes to the growing sense that activism has outgrown organizations as the way by which individuals connect. We illustrate our theory with the actions of two e-bandits, Anonymous and WikiLeaks.

Copyright
References
Hide All
4Chan website http://www.4chan.org/ (Accessed September 3, 2013).
About Friends of WikiLeaks.” https://wlfriends.org/about (Accessed March 31, 2013).
About WikiLeaks.” http://wikileaks.org/About.html (Accessed September 3, 2013).
Adamson, Fiona B. 2005. “Globalisation, Transnational Political Mobilisation, and Networks of Violence.” Cambridge Review of International Affairs 18(1): 3149.
Ahmed, Shamima, and Potter, David. 2006. NGOs in International Politics. Bloomfield, CT: Kumarian Press.
Albanesius, Chloe. 2012. “Anonymous Leaks FBI, Scotland Yard Call About Hackers.” PCMAG, February 3; accessed February 14, 2012.
Allnutt, Luke. 2011. “Old-School Hacker Oxblood Ruffin Discusses Anonymous and the Future of Hacktivism.” RadioFreeEurope/RadioLiberty. June 8; accessed January 24, 2013.
Andreas, Peter. 2003. “Redrawing the Line: Borders and Security in the Twenty-first Century.” International Security 28(2): 78111.
Andreas, Peter. 2013. Smuggler Nation: How Illicit Trade Made America. New York: Oxford University Press.
An IRC Tutorial.” http://irchelp.org/irchelp/irctutorial.html#intro (Accessed September 3, 2013).
Anonymous Analytics.” http://www.anonanalytics.com/ (Accessed September 3, 2013).
Bacani, Cesar. 2011. “Are You Safe from the Research Vigilantes?” CFO Innovation ASIA, October 12; accessed July 31, 2012.
Bagh, Carl. 2010. “How WikiLeaks Uses Technology to Protect Anonymity of Whistle-blowers.” International Business Times, November 29; accessed March 25, 2012.
Bandy, Joe, and Smith, Jackie, eds. 2005. Coalitions across Borders: Transnational Protest and the Neoliberal Order. Lanham, MD: Rowman and Littlefield.
Benkler, Yochai. 2006. The Wealthy of Networks: How Social Production Transforms Markets and Freedom. New Haven and London: Yale University Press.
Bennett, W. Lance. 2003. “Communicating Global Activism: Strengths and Vulnerabilities of Networked Politics.” Information, Communication, and Society 6(2): 143–68.
Betsill, Michele M., and Corell, Elisabeth. 2001. “NGO Influence in International Environmental Negotiations: A Framework for Analysis.” Global Environmental Politics 1(4): 6585.
Bimber, Bruce. 2012. “Digital Media and Citizenship.” In The SAGE Handbook of Political Communication, ed. Semetko, Holli A and Scammell, Margaret. London: SAGE Publications, Ltd.
Bimber, Bruce, Flanagin, Andrew J., and Stohl, Cynthia. 2012. Collective Action in Organizations: Interaction and Engagement in an Era of Technological Change. New York: Cambridge University Press.
Bob, Clifford. 2005. The Marketing of Rebellion: Insurgents, Media, and International Activism. New York: Cambridge University Press.
Bob, Clifford. 2012. The Global Right Wing and the Clash of World Politics. New York: Cambridge University Press.
Burns, John F., and Somaiya, Ravi. 2010. “WikiLeaks Founder on the Run, Trailed by Notoriety.” New York Times, October 23; accessed March 26, 2012.
Burstein, Paul, and Linton, April. 2002. “The Impact of Political Parties, Interest Groups, and Social Movement Organizations on Public Policy: Some Recent Evidence and Theoretical Concerns.” Social Forces 81(2): 380408.
Captain, Sean. 2011. “The Real Role of Anonymous in Occupy Wall Street.” Fast Company, October; 17; accessed January 24. 2013.
Carpenter, R. Charli. 2010. Forgetting Children Born of War: Setting the Human Rights Agenda in Bosnia and Beyond. New York: Columbia University Press.
Carpenter, R. Charli. 2011. “Vetting the Advocacy Agenda: Network Centrality and the Paradox of Weapons Norms.” International Organization 65(1): 69102.
Castells, Manuel. 2007. “Communication, Power, and Counter-power in the Network Society.” International Journal of Communication 1: 238–66.
Clark, Ann Marie, Friedman, Elisabeth J., and Hochstetler, Kathryn. 1998. “The Sovereign Limits of Global Civil Society: A Comparison of NGO Participation in UN World Conferences on the Environment, Human Rights, and Women.” World Politics 51(1): 135.
Coleman, Gabriella. 2010. “What It's Like to Participate in Anonymous' Actions.” The Atlantic, December 10; accessed July 31, 2012.
Coleman, Gabriella. 2011a. “Hacker Politics and Publics.” Public Culture 23(3): 511–16.
Coleman, Gabriella. 2011b. “Anonymous: From the Lulz to Collective Action.” MediaCommons, April 6; accessed March 25, 2012.
Coleman, Gabriella. 2011c “The Ethics of Digital Direct Action.” Al Jazeera English, September 1; accessed July 31, 2012.
Coleman, Gabriella. 2012a. “Our Weirdness Is Free.” Triple Canopy, January 13; accessed Mach 30, 2012.
Coleman, Gabriella. 2012b. “Am I Anonymous?” Limn, accessed July 31, 2012.
Cooper, Michael, and Roberts, Sam. 2011. “After 40 Years, the Complete Pentagon Papers.” Nytimes.com, June 7; accessed March 25, 2012.
Crenshaw, Adrian. 2013. “Crude, Inconsistent Threat: Understanding Anonymous.” Irongeek.com; accessed January 28, 2013.
Davies, Nick, and Leigh, David. 2010. “Afghanistan War Logs: Massive Leak of Secret Files Exposes Truth of Occupation.” The Guardian, July 25;. accessed July 31, 2012.
Deibert, Ronald J. 2000. “International Plug 'n Play? Citizen Activism, the Internet, and Global Public Policy.” International Studies Perspectives 1: 255–72.
Deibert, Ronald J. 2003. “Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace.” Millennium—Journal of International Studies 32(3): 501–30.
Deibert, Ronald J. 2012. “Cybersecurity: The New Frontier.” Foreign Policy Topic 4: 4558.
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L., eds. 2008. Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge, MA: MIT Press.
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L. 2010. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press.
Deibert, Ronald J., Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan L. 2011. Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: MIT Press.
Delio, Michelle. 2004. “Hacktivism and How It Got Here.” Wired; accessed July 14, 2004.
Denning, Dorothy E. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. Arquilla, John and Ronfeldt, David F.. Santa Monica, CA: RAND.
Denning, Dorothy E. 2008. “Cyberwarriors: Activists and Terrorists Turn to Cyberspace.” Harvard International Review 23(2): 7075.
Domscheit-Berg, Daniel. 2011. Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website. Toronto: Doubleday Canada, Limited.
Dupuis-Deri, Francis. 2010a. “Anarchism and the Politics of Affinity Groups.” Anarchist Studies 18(1): 4061.
Dupuis-Deri, Francis. 2010b. “The Black Blocs Ten Years after Seattle.” Journal for the Study of Radicalism 4(2): 4582.
Earl, Jennifer. 2007. “Leading Tasks in a Leaderless Movement: The Case of Strategic Voting.” American Behavioral Scientist 50(10): 1327–49.
Earl, Jennifer. 2010. “The Dynamics of Protest-Related Difussion on the Web.” Information, Communication, and Society 13(2): 209–25.
Earl, Jennifer, and Kimport, Katrina. 2011. Digitally Enabled Social Change: Activism in the Internet Age. Cambridge, MA: MIT Press.
Earl, Jennifer, and Schussman, Alan. 2008. “Contesting Cultural Control: Youth Culture and Online Petitioning.” In Civil Life Online: Learning How Digital Media Can Engage Youth, ed. Bennett, W. Lance. Cambridge, MA: MIT Press.
Fisher, Dana R., Stanley, Kevin, Berman, David, and Neff, Gina. 2005. “How Do Organizations Matter? Mobilization and Support for Participants at Five Globalization Protests.” Social Problems 52(1): 102–21.
Foremski, Tom. 2011. Wall Street Journal Wants Your Leaks—Launches ‘SafeHouse’” ZDNet, May 5; accessed July 31, 2012.
Freeman, Allen. 2012. “Who Is Anonymous? How the Wall Street Journal and the NSA Got It Wrong.” Null Byte, accessed April 2, 2012.
Friends of WikiLeaks.” https://wlfriends.org (Accessed March 31, 2013).
Friends of WikiLeaks Membershiphttps://wlfriends.org/membership (Accessed March 31, 2013.)
Gill, Stephen. 2000. “Toward a Postmodern Prince? The Battle in Seattle as a Moment in the New Politics of Globalisation.” Millennium 29(1): 131–40.
Goldsmith, Jack, and Wu, Tim. 2006. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press.
Gordon, Uri. 2007. “Anarchism Reloaded.” Journal of Political Ideologies 12(1): 2948.
Gourevitch, Peter A., Lake, David A., and Stein, Janice Gross, eds. 2012. The Credibility of Transnational NGOs: When Virtue Is Not Enough. New York: Cambridge University Press.
Graeber, David. 2002. “The New Anarchists.” New Left Review 13: 6173.
Greenberg, Andy. 2012a. “WikiLeaks Tightens Ties To Anonymous In Leak Of Stratfor Emails.” Forbes, February 27; accessed April 2,. 2012.
Greenberg, Andy. 2012b. “How WikiLeaks' New York Times Hoax Diluted Truth-Telling With Trolling.” Forbes, July 30; accessed January 24, 2013.
Greenwald, Glenn. 2012. “Attacks on RT and Assange Reveal Much about the Critics.” Salon.com, April 18,; accessed July 31, 2012.
Grier, Peter. 2010. “WikiLeaks Chief Julian Assange: ‘Terrorist’ or Journalist?” The Christian Science Monitor, December 20; accessed July 9, 2012.
Grigoriadis, Vanessa. 2011. “4chan's Chaos Theory.” Vanity Fair, April; March 30, 2012.
Hafner-Burton, Emilie M., and Tsutsui, Kiyoteru. 2007. “Justice Lost! The Failure of International Human Rights Law To Matter Where Needed Most.” Journal of Peace Research 44(4): 407–25.
Hafner-Burton, Emilie M., Kahler, Miles, and Montgomery, Alexander H.. 2009. “Network Analysis for International Relations.” International Organization 63(3): 559–92.
Halpin, Harry. 2012. “The Philosophy of Anonymous: Ontological Politics without Identity.” Radical Philosophy 176: 1928.
Harnden, Toby. 2010. “Julian Assange's Arrest Warrant: A Diversion from the Truth?” The Telegraph, August 22; accessed July 31, 2012.
HB Gary website http://www.hbgary.com/ (Accessed September 3, 2013).
Hindman, Matthew. 2005. “The Real Lessons of Howard Dean: Reflections on the First Digital Campaign.” Perspectives on Politics 3(1): 121–28.
Hindman, Matthew. 2009. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press.
Hobsbawm, Eric. 2000. Bandits. New York: The New Press.
Hodson, Steven. 2010. “Has WikiLeaks Finally Bitten off a Secret Too Big?” The Inquisitr, 24 March 24; March 25, 2012.
Howard, Philip N. 2010. The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam. New York: Oxford University Press.
Howard, Philip N. 2011. “Reply to Evgeny Morozov's Review of The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam.” Perspectives on Politics 9(4): 900.
Howard, Philip N., and Hussain, Muzammil M.. 2011. “The Role of Digital Media.” Journal of Democracy 22(3): 3548.
Hughes, Rex. 2010. “A Treaty for Cyberspace.” International Affairs 86(2): 523–41.
Huntington, Samuel P. 1973. “Transnational Organization in World Politics.” World Politics 25(3): 333–68.
Isikoff, Michael. 2011. “Hacker Group Vows ‘cyberwar’ on US Government, Business.” Msnbc.com, March 8; accessed March 30, 2012.
Jenkins, J. Craig. 1983. “Resource Mobilization Theory and the Study of Social Movements.” Annual Review of Sociology 9: 527–53.
Jenkins, J. Craig, and Eckert, Craig M.. 1986. “Channeling Black Insurgency: Elite Patronage and Professional Social Movement Organizations in the Development of the Black Movement.” American Sociological Review 51(6): 812–29.
Jordan, Tim, and Taylor, Paul A.. 2004. Hacktivism and Cyberwars: Rebels with a Cause. New York: Routledge.
Julian Assange, The Man Behind Wikileaks.” http://www.cbsnews.com/8301-18560_162-7286686.html (Accessed January 29, 2013).
Kahler, Miles, ed. 2009. Networked Politics: Agency, Power, and Governance. Ithaca, NY: Cornell University Press.
Keck, Margaret E., and Sikkink, Kathryn. 1998. Activists beyond Borders. Ithaca, NY: Cornell University Press.
Keller, Bill. 2011. “Dealing with Assange and the WikiLeaks Secrets.” New York Times, January 30; accessed July 31, 2012.
Kenney, Michael. 2005. “Drug Traffickers, Terrorist Networks, and Ill-Fated Government Strategies.” In New Threats and New Actors in International Security, ed. Krahmann, Elke. New York: Palgrave Macmillan.
Kenney, Michael. 2007. From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park, PA: Pennsylvania State University Press.
Kenney, Michael. 2009. “Turning to the ‘Dark Side’: Coordination, Exchange, and Learning in Criminal Networks.” In Networked Politics: Agency, Power, and Governance, ed. Kahler, Miles. Ithaca, NY: Cornell University Press.
Kenney, Michael. 2010. “Beyond the Internet: Metis, Techne, and the Limitations of Online Artifacts for Islamist Terrorists.” Terrorism and Political Violence 22(2): 177–97.
Keohane, Robert O., and Nye, Joseph S.. 1974. “Transgovernmental Relations and International Organizations.” World Politics 27(1): 3962.
Khagram, Sanjeev, Riker, James V., and Sikkink, Kathryn, eds. 2002. Restructuring World Politics. Minneapolis: University of Minnesota Press.
Khatchadourian, Raffi. 2010. “No Secrets.” Newyorker.com, June 7; accessed March 25. 2012.
Klotz, Audie. 2002. “Transnational Activism and Global Transformations: The Anti-Apartheid and Abolitionist Experiences.” European Journal of International Relations 8(1): 4976.
Lake, David A. 2002. “Rational Extremism: Understanding Terrorism in the Twenty-first Century.” Dialogue-IO 1(1): 1529.
Langman, Lauren. 2005. “From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements.” Sociological Theory 23(1): 4274.
La Roche, Julia. 2011. “This Is Awesome: Hacker Group ‘Anonymous’ Doing Securities Analysis, Attempting To Blow Up Chinese Frauds.” Business Insider, October 4; accessed July 31, 2012.
Leigh, David. 2010. “Iraq War Logs Reveal 15,000 Previously Unlisted Civilian Deaths.” The Guardian, October 22;. July 31, 2012.
Lennard, Natasha. 2012a. “Hackers Hit Ohio School Football Team over Gangrape.” Salon.com, December 27; accessed January 29, 2013.
Lennard, Natasha. 2012b. “Anonymous Hits Westboro Baptist Church over Sandy Hook Picket Plans.” Salon.com, December 16; accessed January 29, 2013.
Lennard, Natasha. 2012c. “Anonymous Retaliates to Israel's Gaza Internet Threat.” Salon.com, November 15;. accessed January 29, 2013.
Leonard, Andrew. 2012. “Celebrating Anonymous: The Hackers' Big Year.” Salon.com, December 27;. accessed 29 January 29, 2013.
Levy, Steven. 2010. Hackers. Sebastapol, CA: O'Reilly Media, Inc.
Lipschutz, Ronnie D. 1992. “Reconstructing World Politics: The Emergence of Global Civil Society.” Millennium—Journal of International Studies 21(3): 389420.
Lipset, Seymour Martin. 1994. “The Social Requisites of Democracy Revisited: 1993 Presidential Address.” American Sociological Review 59(1): 122.
Ludlow, Peter. 2010. “WikiLeaks and Hacktivist Culture.” The Nation, October 4.
Lynch, Marc. 2011. “After Egypt: The Limits and Promise of Online Challenges to the Authoritarian Arab State.” Perspectives on Politics 9(2): 301–10.
Mackey, Robert. 2010. “Victory for WikiLeaks in Icelands Parliament.” The Lede, New York Times, June 17; accessed January 29, 2013.
Marc Garneau on Privilege.” http://openparliament.ca/debates/2012/2/29/marc-garneau-1/only/ (Accessed August 5, 2012).
Masnick, Mike. 2011. “Leaked HBGary Documents Show Plan To Spread WikiLeaks Propaganda For BofA … And ‘Attack’ Glenn Greenwald.” Techdirt, February 10; accessed January 29, 2013.
Mathews, Jessica T. 1997. “Power Shift.” Foreign Affairs 76(1): 5066.
McAdam, Doug, McCarthy, John D., and Zald, Mayer N.. 1996. Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings. Cambridge: Cambridge University Press.
McCarthy, John D., and Zald, Mayer N.. 1973. The Trend of Social Movements. Morristown, NJ: General Learning.
McCarthy, John D., and Zald, Mayer N.. 1975. “Organizations Intellectuals and the Criticism of Society.” Social Service Review 49: 344–62.
McCarthy, John D., and Zald, Mayer N.. 1977. “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82(6): 1212–41.
McCullagh, Declan. 2010. “Congressman Wants WikiLeaks Listed as Terrorist Group.” CNET News, CBS Interactive, November 28; accessed January 29, 2013.
McIllwain, Jeffrey Scott. 1999. “Organized Crime: A Social Network Approach.” Crime, Law & Social Change 32: 301–23.
McMillan, Graeme. 2011. “Hackers Turned Journalists? Anonymous Launches ‘Analytics’ Site.” Time, September 28; accessed July 31, 2012.
Melucci, Alberto. 1996. Challenging Codes: Collective Action in the Information Age. Cambridge: Cambridge University Press.
Memmott, Mark. 2010. “Bank of America Stock Steadies after WikiLeaks-Related Drop.” NPR, December 1; accessed January 10,. 2013.
Misselwitz, Michael. 2011. “WikiLeaks Technology Superior to Government.” The Daily Aztec, January 20; accessed March 25, 2012.
Montgomery, Alexander H. 2005. “Ringing in Proliferation: How to Dismantle an Atomic Bomb Network.” International Security 30(2): 153–87.
Morozov, Evegeny. 2011. The Net Delusion: The Dark Side of Internet Freedom. New York: Public Affairs.
Morselli, Carlo, Giguère, Cynthia, and Petit, Katia. 2007. “The Efficiency/Security Trade-off in Criminal Networks.” Social Networks 29(1): 143–53.
Murdie, Amanda, and Bhasin, Tavashi. 2010. “Aiding and Abetting: Human Rights INGOs and Domestic Protest.” Journal of Conflict Resolution 54(6): 129.
Nakashima, Ellen. 2010. “Messages from Alleged Leaker Bradley Manning Portray Him as Despondent Soldier.” Washington Post, June 10; accessed July 31,2012.
Neumayer, Eric. 2005. “Do International Human Rights Treaties Improve Respect for Human Rights?Journal of Conflict Resolution 49(6): 925–53.
Nye, Joseph S. 2011. The Future of Power. New York: PublicAffairs.
Olson, Parmy. 2012a. We Are Anonymous; Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little Brown & Brown.
Olson, Parmy. 2012b. “Anonymous Rattles A Chinese Web Giant.” Forbes, July 3; accessed July 31, 2012.
Owens, Lynn, and Palmer, L. Kendall. 2003. “Making the News: Anarchist Counter-Public Relations on the World Wide Web.” Critical Studies in Media Communication 20(4): 335–61.
Palfrey, John. 2010. “Four Phases of Internet Regulation.” Social Research 77(3): 981–96.
Perlroth, Nicole. 2011. “Hackers Breach the Web Site of Stratfor Global Intelligence.” New York Times, December 25; accessed April 2, 2012.
Polletta, Francesca, and Jasper, James M.. 2001. “Collective Identity and Social Movements.” Annual Review of Sociology 27(1): 283305.
Price, Richard. 1998. “Reversing the Gun Sights: Transnational Civil Society Targets Land Mines.” International Organization 52(3): 613–44.
Raab, Jorg., and Milward, H. Brinton. 2003. “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13(4): 413–39.
Richmond, Riva. 2012. “Web Gang Operating in the Open.” New York Times, January 16.
Rieff, David. 1999. “The False Dawn of Global Civil Society.” The Nation 268(7): 1115.
Risse, Thomas, Ropp, Stephen C., and Sikkink, Kathryn, eds. 1999. The Power of Human Rights: International Norms and Domestic Change. New York: Cambridge University Press.
Rosen, Jay. 2010. “PressThink: The Afghanistan War Logs Released by WikiLeaks, the World's First Stateless News Organization.” PressThink, July 26; accessed January 29, 2013.
Rupert, Mark. 2006. Globalization and International Political Economy. Lanham, MD: Rowman & Littlefield Publishers.
Rutherford, Kenneth R. 2000. “The Evolving Arms Control Agenda: Implications of the Role of NGOs in Banning Antipersonnel Landmines.” World Politics 53(1): 74114.
Shantz, Jeffrey. 2011. Active Anarchy: Political Practice in Contemporary Movements. Lanham, MD: Lexington Books.
Shawki, Noha. 2011. “Organizational Structure and Strength and Transnational Campaign Outcomes: A Comparison of Two Transnational Advocacy Networks.” Global Networks 11(1): 97117.
Shirky, Clay. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin.
Sikkink, Kathryn. 1993. “Human Rights, Principled Issue-Networks, and Sovereignty in Latin America.” International Organization 47(3): 411–41.
Smith, Jackie, and Wiest, Dawn. 2005. “The Uneven Geography of Global Civil Society: National and Global Influences on Transnational Association.” Social Forces 84(2): 621–52.
Snow, David. 2001. “Collective Identity and Expressive Forms.” Unpublished manuscript. CSD Working Papers, University of California–Irvine.
Somaiya, Ravi. 2010. “Hundreds of WikiLeaks Mirror Sites Appear.” Nytimes.com, December 5; accessed March 26, 2012.
Stratfor website (http://www.stratfor.com/, Accessed September 3, 2013).
Stryker, Cole. 2012. “WikiLeaks' New Phase Begins.” Salon.com, February 27; accessed April 12,. 2012.
Sutter, John D. 2010. “The Technical Muscle behind WikiLeaks.” CNN, July 26; accessed January 29, 2013.
Tarrow, Sidney. 1994. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press.
Tarrow, Sidney. 2005. The New Transnational Activism. New York: Cambridge University Press.
Viano, Emilio C. 2003. “Cybercrime and Cybersecurity: The Post-September 11, 2001, Reality.” In Transnational Organized Crime: Myth, Power, and Profit, ed. Viano, Emilio, Magallanes, José, and Bridel, Laurent. Durham, NC: Carolina Academic.
Von Lampe, Klaus. 2003. “Criminally Exploitable Ties: A Network Approach to Organized Crime.” In Transnational Organized Crime: Myth, Power, and Profit, ed. Viano, Emilio, Magallanes, José, and Bridel, Laurent. Durham, NC: Carolina Academic.
Von Lampe, Klaus, and Johansen, Per Ole. 2004. “Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks.” Global Crime 6(2): 159–84.
Walker, Rob. 2011. “How Did a Hacker Group That Rejects Definition Develop Such a Strong Visual Brand?” Slate Magazine, December 8; accessed March 30, 2012.
Wapner, Paul Kevin. 1995. Environmental Activism and World Civic Politics. Buffalo, NY: SUNY Press.
Williams, Jody, Goose, Stephen D., and Wareham, Mary, eds. 2008. Banning Landmines: Disarmament, Citizen Diplomacy, and Human Security. Lanham, MD: Rowman and Littlefield Publishers.
Williams, Leonard. 2007. “Anarchism Revived.” New Political Science 29(3): 297312.
Wong, Wendy H. 2011. “Is Trafficking Slavery? Anti-Slavery International in the 21st Century.” Human Rights Review 12(1): 315–28.
Wong, Wendy H. 2012. Internal Affairs: How the Structure of NGOs Transforms Human Rights. Ithaca, NY: Cornell University Press.
Zetter, Kim. 2010. “WikiLeaks Was Launched With Documents Intercepted From Tor.” Wired.com, June 1; accessed March 25, 2012.
Zetter, Kim. 2011. “WikiLeaks Donations Topped $1.9 Million in 2010.” Wired.com, April 24; accessed January 29, 2013.
Zittrain, Jonathan. 2008. The Future of the Internet—And How to Stop It. New Haven, CT and London: Yale University Press.
Zukin, Cliff, Keeter, Scott, Andolina, Molly, Jenkins, Krista, and Carpini, Michael X. Della. 2006. A New Engagement? Political Participation, Civic Life, and the Changing American Citizen. New York: Oxford University Press.
Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Perspectives on Politics
  • ISSN: 1537-5927
  • EISSN: 1541-0986
  • URL: /core/journals/perspectives-on-politics
Please enter your name
Please enter a valid email address
Who would you like to send this to? *
×

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Abstract views

Total abstract views: 0 *
Loading metrics...

* Views captured on Cambridge Core between <date>. This data will be updated every 24 hours.

Usage data cannot currently be displayed