leaking in Weinmayr 2019


//www.ca2.uscourts.gov/decisions/isysquery/f6e88b8b-48af-401c-
96a0-54d5007c2f33/1/doc/11-1197_complete_opn.pdf#xml=http://www.ca2.uscourts.gov/decisions/isysquery
/f6e88b8b-48af-401c-
96a0-54d5007c2f33/1/hilite/](http://www.ca2.uscourts.gov/decisions/isysquery
/f6e88b8b-48af-401c-
96a0-54d5007c2f33/1/doc/11-1197_complete_opn.pdf%23xml=http://www.ca2.uscourts.gov/decisions/isysquery
/f6e88b8b-48af-401c-96a0-54d5007c2f33/1/hilite/)

Craig, Carys J. (2007) ‘Symposium: Reconstructing the Author-Self: Some
Feminist Lessons for Copyright Law’, American University Journal of Gender,
Social Policy & the Law 15.2, 207–68.

Di Franco, Karen (2014) ‘The Library Medium’, in Andrea Francke and Eva
Weinmayr (eds.), Borrowing, Poaching, Plagiarising, Pirating, Stealing,
Gleaning, Referencing, Leaking, Copying, Imitating, Adapting, Faking,
Paraphrasing, Quoting, Reproducing, Using, Counterfeiting, Repeating,
Translating, Cloning (London: AND Publishing), pp. 77–90.

Fitzpatrick, Kathleen (2018) ‘Generous Thinking The University and the Public
Good’, Humanities Commons,

Foster, Hal (1985) ‘(Post)modern Polemics’, in Recodings: Art, Spectacle,
Cultural Politics (Port Townsend, WA: Bay Press), pp. 121–38.

Foucault, Michel (1977) ‘What Is an Author?’, in [Donald F.
Bouchard](https://www.amazon.co.uk/s/ref=dp_byline_sr_book_2?ie=UTF8&text=Donald+F.+Bouchard
&search-alias=books-uk&field-author=Donald+F.+Bouchard&sort=relevancerank)
(ed.), Language, Counter-Memory, Practice: Selected Essays and Interviews
(Ithaca, NY: Cornell Univers


day are Google and its subsidiaries
like YouTube (through the institutionalized rip-off of user-generated value
broadly known as Page-Rank), Facebook, and of course Warner Bros etc., but
also academic publishers such as the redoubtable Routledge. On the other hand,
all the user-run and user-driven initiatives like aaaaarg, or
[pad.ma](http://pad.ma), or until recently the wonderful Dr Auratheft. But,
personally, I would hesitate to assimilate such scaled-up, de-creative, user-
propelled examples with anything like “cultural piracy”. They are, through
usership, enriching what would otherwise fall prey to cultural piracy.’ Email
to the author, 1 August 2012.

See also: Andrea Francke and Eva Weinmayr (eds.), Borrowing, Poaching,
Plagiarising, Pirating, Stealing, Gleaning, Referencing, Leaking, Copying,
Imitating, Adapting, Faking, Paraphrasing, Quoting, Reproducing, Using,
Counterfeiting, Repeating, Translating, Cloning (London: AND Publishing,
2014).

[83](ch11.xhtml#footnote-443-backlink) Richard Prince’s ‘Catcher in the Rye’
forms part of the Piracy Collection. Not the book copy priced at £1,500, just
an A4 colour printout of the cover, downloaded from the Internet. On the shelf
it sits next to Salinger’s copy, which we bought at Barnes and Noble for £20.

[84](ch11.xhtml#footnote-442-backlink) Craig, ‘Symposium: Reconstructing the
Author-Self’, p. 246.

[85](ch11.xhtml#footnote-441-backlink) Michel Foucault, ‘What Is an Author?’,
in [Donald F.
Bouchard](https://www.amazon.co.uk/s/ref=dp_byline_sr_book_2?ie=UTF8&text=Donald+F.+Bouchard
&search-alias=books-


leaking in Stalder 2018


rching assessment of
things, it falls somewhat short, for every form of power provokes its
own forms of resistance.[^61^](#c3-note-0061){#c3-note-0061a} In the
context of post-democracy under the digital condition, these forms have
likewise shifted to the level of data, and an especially innovative and
effective means of resistance []{#Page_149 type="pagebreak"
title="149"}has been the "leak"; that is, the unauthorized publication
of classified documents, usually in the form of large datasets. The most
famous platform for this is WikiLeaks, which since 2006 has attracted
international attention to this method with dozens of spectacular
publications -- on corruption scandals, abuses of authority, corporate
malfeasance, environmental damage, and war crimes. As a form of
resistance, however, leaking entire databases is not limited to just one
platform. In recent years and through a variety of channels, large
amounts of data (from banks and accounting firms, for instance) have
been made public or have been handed over to tax investigators by
insiders. Thus, in 2014, for instance, the *Süddeutsche Zeitung*
(operating as part of the International Consortium of Investigative
Journalists based in Washington, DC), was not only able to analyze the
so-called "Offshore Leaks" -- a database concerning approximately
122,000 shell companies registered in tax
havens[^62^](#c3-note-0062){#c3-note-0062a} -- but also the "Luxembourg
Leaks," which consisted of 28,000 pages of documents demonstrating the
existence of secret and extensive tax deals between national authorities
and multinational corpora


note-0064){#c3-note-0064a} His leaks benefited from
technical []{#Page_150 type="pagebreak" title="150"}advances, including
the new forms of cooperation which have resulted from such advances.
Even institutions that depend on keeping secrets, such as banks and
intelligence agencies, have to "share" their information internally and
rely on a large pool of technical personnel to record and process the
massive amounts of data. To accomplish these tasks, employees need the
fullest possible access to this information, for even the most secret
databases have to be maintained by someone, and this also involves
copying data. Thus, it is far easier today than it was just a few
decades ago to smuggle large volumes of data out of an
institution.[^65^](#c3-note-0065){#c3-note-0065a}

This new form of leaking, however, did not become an important method of
resistance on account of technical developments alone. In the era of big
data, databases are the central resource not only for analyzing how the
world is described by digital communication, but also for generating
that communication. The power of networks in particular is organized
through the construction of environmental conditions that operate
simultaneously in many places. On their own, the individual commands and
instructions are often banal and harmless, but as a whole they
contribute to a dynamic field that is meant to produce the results
desired by the planners who issue them. In order to reconstruct this
process, it is necessary to have access to these large amounts of data.
With such information at hand, it is possible to relocate t

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.