Wikileaks and the battle for the Internet

Nobody knows which major happenings of the moment will have lasting importance. News may be the first draft of history, but as all writers know, most first drafts end up in the trash. Who can say how much weight historians will assign even to a 9/11; for all its seemingly epoch-making importance it may be eclipsed by developments we can’t foresee, and may get only a nod when the histories of our day are written.

So to Time magazine’s decision to crown Mark Zuckerberg, the wunderkind behind Facebook, as its Person of the Year, while bypassing Wikileaks founder Julian Assange, who the magazine’s editor declared would be no more than “a footnote five years from now.”

Whether Time is right, only time will tell. But I think not. To me, the continuing Wikileaks affair has the makings of a watershed moment in media history, the opening salvo in a war over information supremacy in the Digital Age.

This is a big deal. The quiet ferocity of the U.S.-led reprisal against Wikileaks for publishing government secrets attests to how seriously authorities are taking this:

– The presumed leaker of the material that annoyed Washington is a young Army private named Bradley Manning; though not formally charged, Manning has been jailed for months in a brutal solitary confinement usually reserved for irredeemable multiple offenders and apparently intended to destroy his mind.

– Assange himself has been hunted down in Britain with a zeal so exceptional it would be surprising if he’d been accused of genocide, not some borderline misconduct in a Swedish bedroom. He may yet be charged with espionage.

– Global paymasters Visa, Mastercard and PayPal suddenly decided duty compelled them to cut off financial services to Wikileaks, and a bank account it maintained in Geneva was shut down by Swiss authorities, a rare departure from Switzerland’s ancestral embrace of absolutely anyone whose checks clear.

Beyond that, one can only imagine the secret countermeasures being undertaken—securing files, deterring and tracking down would-be pilferers, monitoring Wikileaks visitors, feeding the site bogus information to undermine its credibility.

Wikileaks itself is tough and resourceful. It has been embarrassing governments worldwide since it launched in December 2006, a nimble, carefully engineered global network with 20 servers and hundreds of domain names, intended, as Assange told the New Yorker magazine earlier this year, to be “an uncensorable system for untraceable mass document leaking and public analysis.” Its designers say removing material from Wikileaks would practically require dismantling the Internet itself.

In reprisal for the financial services cutoff, Wikileaks’ allies targeted the companies with a denial of service attack meant to incapacitate them with a flood of traffic. So-called hacktivist initiatives such as Anonymous and the Swiss Pirate Party have mobilized hyper-sophisticated networks of committed geeks rallying to the cause.  Like Wikileaks itself, these networks are smart and elusive, and reside in shifting constellations of encrypted computers that are all but impossible to detect, let alone silence.

In a thoughtful column in the Washington Post, Tim Hwang, an Internet researcher formerly with Harvard’s Berkman Center, proposes “long war” as a metaphor for the faceoff between a freewheeling, decentralized Internet culture and the forces of an offline world built on centralization—between those, he says, who want to remake the world in the Internet’s image and those who want the Internet reshaped in the world’s image.

To me, the effort to develop, populate and control the rich new digital space has been a kind of colonization. Spearheaded by the military—the Internet began as a computer network designed to survive nuclear attack—powerful institutions from government and business implanted their operations online as a way to extend their legacy dominion. But the New World casts a spell of its own over the settlers, some of them anyway, intoxicated by the promise of an informational universe of greater freedom, egalitarianism and accountability. Thus do decolonization movements arise.

What should be clear is just how politically agnostic the digital world really is. True, the technologies enable unification of control over oceans of secret information, and permit breathtaking surveillance and unparalleled intrusions into hitherto private realities.

But the Internet also arrived shrink-wrapped in millennialist promise, as a transformative and emancipatory event offering an unprecedented universalization of the capacity to know, to speak and to be heard, an equalization of expressive rights that enables every schnook with a laptop to be a broadcaster.

That tension will be at the core of fierce conflicts for years to come, regardless of today’s success of Wikileaks or of those who want it crushed.

-30-

2 thoughts on “Wikileaks and the battle for the Internet

  1. Ed, you’re doing a fine job of following this story–and extracting its true meaning. Can you imagine the lengths Nixon would have gone to to silence Wikileaks, given his attacks on W&B? I think you are correct in predicting that this juggernaut is just getting started. It is all part of the re-emergence of journalism, in a powerful and universal new form.

  2. Sir:

    I’m not as enthusiastic about your Wikileaks comments as I am about virtually everything else of yours I see.

    It’s fine as a matter of lofty principle to wonder if we’d have gone into Iraq if we’d known more doubting and doubtful stuff earlier. And it’s fun to watch the embarrassment of U.S. officials when the frank mutterings of mid-level foreign-service bureaucrats threaten to undermine international relationships.

    But I am unhappy about Wikileaks on two levels. The first is I have not the slightest idea that these clowns would redact seriously dangerous stuff, whatever you and I might dream up as seriously damaging to world peace or international relations. There are in fact some things that should not be part of the public forum.

    The second is how are groups of people to develop policy or understanding, based on a deep level of insight and information, if they can’t communicate it to one another without fear of universal publication? I guess they could use a secure telephone, until some anarchist found a way to tap into that communication medium. Maybe just hop on a plane and meet in some faraway archipelago to whisper in each other’s ear. But government officials and corporate officers gotta be able to speak frankly to each other.

    Yeah, of course I get “open covenants, openly arrived at.” And public policy developed in secret often is bad policy. But I am not convinced that total public openness, expecting Joe Sixpack, Sarah Palin and Glenn Beck to have the gumption and knowledge and sophistication to handle unvarnished information, is a reliable way to manage this complex world of ours. Do we really want Mr. Karzai to be publicly confronted with an honest U.S. assessment of his reliability, honesty and stability. And shouldn’t policy makers be aware of his shortcomings?

    So I’m not thrilled with the implications of your vision of the new information age.

    Plus, as ever, I agree with you — on the govt secrecy problem. But that’s a different problem, not necessarily solved by what I (incorrectly?) gathered was an uncensored data dump. The propriety of excessive govt secrecy and the virtue of unrestrained exposure are entirely different problems, regardless of how obliquely they might be linked. (Somebody once make me learn what “analyze” means — break an issue into its constituent parts — and I’ve never forgotten it.)

    Yer friendly curmudgeon.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s