leaking in Dekker & Barok 2017

phenomena.1 Perhaps the biggest change is the ongoing
See for example
shift from mapping people, events, and places towards
Features. Accessed
synthesizing discourses.
28 May 2016.
A turning point occurred during my studies at the
Piet Zwart Institute, in the Networked Media programme
from 2010–2012, which combined art, design, software,
and theory with support in the philosophy of open source
and prototyping. While there, I was researching aspects of
the networked condition and how it transforms knowledge,
sociality and economics: I wrote research papers on leaking
as a technique of knowledge production, a critique of the
social graph, and on the libertarian values embedded in the
design of digital currencies. I was ready for more practice.
When Aymeric Mansoux, one of the tutors, encouraged me
to develop my then side-project Monoskop into a graduation
work, the timing was good.
The website got its own domain, a redesign, and most
crucially, the Monoskop wiki was restructured from its
focus on media art and culture towards the much wider
of the arts and humanities. It turned to a media
Symposium. Accessed
28 May 2016.

leaking in Elbakyan 2016

in the UNT Digital Library._

_The presentation was entitled "Why Science is Better with Communism? The Case
of Sci-Hub." Below is an edited transcript of the presentation produced by
Regina Anikina and Kevin Hawkins, with a translation by Kevin Hawkins and Anna

**Martin Halbert** : We have a recent addition to our lineup of speakers that
we'll start off the day with: Alexandra Elbakyan. As many of you know,
Alexandra is a Kazakhstani graduate student, computer programmer, and the
creator of the controversial Sci-Hub site. The New York Times has compared her
to Edward Snowden for leaking information and because she avoids American law,
but Ars Technica has compared her to Aaron Swartz--so a controversial figure.
We thought it was very important to include her in the dialog about open
access because we want, in this symposium series, to include all the different
perspectives on copyright, intellectual property, open access, and access to
scholarly information. So I'm delighted that we're actually able to have her
here via Skype to present.


**Alexandra Elbakyan** : First of all, thank you for inviting me to share my
views. My name is Alexandra. As you might have

leaking in Liang 2012

er of Things: An Archaeology of the
Human Sciences,_ (New York: Pantheon, 1970).

Ibid, xv.

In Foucault, “Different Spaces,” which was presented as a lecture to the
_Architecture Studies Circle_ in 1967, a few years after the writing of _The
Order of Things_.

ist utopias
continues to retreat, while on the other, a more immediate crisis of faith has
accompanied the widespread sense of diminishing economic prospects felt in so
many places. Not to mention...

## [Shadow Libraries](/journal/37/61228/shadow-libraries/)


Over the last few monsoons I lived with the dread that the rain would
eventually find its ways through my leaky terrace roof and destroy my books.
Last August my fears came true when I woke up in the middle of the night to
see my room flooded and water leaking from the roof and through the walls.
Much of the night was spent rescuing the books and shifting them to a dry
room. While timing and speed were essential to the task at hand they were also
the key hazards navigating a slippery floor...


## [Captives of the Cloud: Part I](/journal/37/61232/captives-of-the-cloud-


We are the voluntary prisoners of the cloud; we are being watched over by
governments we did not elect. Wael Ghonim, Google's Egyptian executive, said:
“If you want to liberate

leaking in Sollfrank 2018

les are served to users and automatically added to LibGen (if
not already present). According to _Nature_ magazine, Sci-Hub hosts around 60
million academic papers and was able to serve 75 million downloads in 2016. On
a daily basis 70,000 users access approximately 200,000 articles.

The founder of the meta library Sci-Hub is Kazakh programmer Alexandra
Elbakyan, who has been sued by large publishing houses and was convicted twice
to pay almost 20 million US$ in compensation for the losses her activities
allegedly have caused, which is why she had to go underground in Russia. For
illegally leaking millions of documents the _New York Times_ compared her to
Edward Snowden in 2016: “While she didn’t reveal state secrets, she took a
stand for the public’s right to know by providing free online access to just
about every scientific paper ever published, ranging from acoustics to
zymology.” 21 In the same year the prestigious _Nature_ magazine elected her
as one of the ten most influential people in science. 22 Unlike other
persecuted people, she went on the offensive and started to explain her
actions and motives in court documents and blog posts. Sci-Hub encourages new
ways of distr

leaking in Stalder 2018

tal condition, these forms have
likewise shifted to the level of data, and an especially innovative and
effective means of resistance []{#Page_149 type="pagebreak"
title="149"}has been the "leak"; that is, the unauthorized publication
of classified documents, usually in the form of large datasets. The most
famous platform for this is WikiLeaks, which since 2006 has attracted
international attention to this method with dozens of spectacular
publications -- on corruption scandals, abuses of authority, corporate
malfeasance, environmental damage, and war crimes. As a form of
resistance, however, leaking entire databases is not limited to just one
platform. In recent years and through a variety of channels, large
amounts of data (from banks and accounting firms, for instance) have
been made public or have been handed over to tax investigators by
insiders. Thus, in 2014, for instance, the *Süddeutsche Zeitung*
(operating as part of the International Consortium of Investigative
Journalists based in Washington, DC), was not only able to analyze the
so-called "Offshore Leaks" -- a database concerning approximately
122,000 shell companies registered in tax

stitutions that depend on keeping secrets, such as banks and
intelligence agencies, have to "share" their information internally and
rely on a large pool of technical personnel to record and process the
massive amounts of data. To accomplish these tasks, employees need the
fullest possible access to this information, for even the most secret
databases have to be maintained by someone, and this also involves
copying data. Thus, it is far easier today than it was just a few
decades ago to smuggle large volumes of data out of an

This new form of leaking, however, did not become an important method of
resistance on account of technical developments alone. In the era of big
data, databases are the central resource not only for analyzing how the
world is described by digital communication, but also for generating
that communication. The power of networks in particular is organized
through the construction of environmental conditions that operate
simultaneously in many places. On their own, the individual commands and
instructions are often banal and harmless, but as a whole they
contribute to a dynamic field that is meant to produce the results

leaking in Weinmayr 2019


Craig, Carys J. (2007) ‘Symposium: Reconstructing the Author-Self: Some
Feminist Lessons for Copyright Law’, American University Journal of Gender,
Social Policy & the Law 15.2, 207–68.

Di Franco, Karen (2014) ‘The Library Medium’, in Andrea Francke and Eva
Weinmayr (eds.), Borrowing, Poaching, Plagiarising, Pirating, Stealing,
Gleaning, Referencing, Leaking, Copying, Imitating, Adapting, Faking,
Paraphrasing, Quoting, Reproducing, Using, Counterfeiting, Repeating,
Translating, Cloning (London: AND Publishing), pp. 77–90.

Fitzpatrick, Kathleen (2018) ‘Generous Thinking The University and the Public
Good’, Humanities Commons,

Foster, Hal (1985) ‘(Post)modern Polemics’, in Recodings: Art, Spectacle,
Cultural Politics (Port Townsend, WA: Bay Press), pp. 121–38.

Foucault, Michel (1977) ‘What Is an Author?’, in [Donald F.

publishers such as the redoubtable Routledge. On the other hand,
all the user-run and user-driven initiatives like aaaaarg, or
[pad.ma](http://pad.ma), or until recently the wonderful Dr Auratheft. But,
personally, I would hesitate to assimilate such scaled-up, de-creative, user-
propelled examples with anything like “cultural piracy”. They are, through
usership, enriching what would otherwise fall prey to cultural piracy.’ Email
to the author, 1 August 2012.

See also: Andrea Francke and Eva Weinmayr (eds.), Borrowing, Poaching,
Plagiarising, Pirating, Stealing, Gleaning, Referencing, Leaking, Copying,
Imitating, Adapting, Faking, Paraphrasing, Quoting, Reproducing, Using,
Counterfeiting, Repeating, Translating, Cloning (London: AND Publishing,

[83](ch11.xhtml#footnote-443-backlink) Richard Prince’s ‘Catcher in the Rye’
forms part of the Piracy Collection. Not the book copy priced at £1,500, just
an A4 colour printout of the cover, downloaded from the Internet. On the shelf
it sits next to Salinger’s copy, which we bought at Barnes and Noble for £20.

[84](ch11.xhtml#footnote-442-backlink) Craig, ‘Symposium: Reconstructing the
Author-Self’, p. 246.



Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.