After WikiLeaks, Us

Contributed by Finn Brunton NYU / University of Michigan
April 04, 2011
finnb's picture

The 1918 Sears, Roebuck catalog features a spectacular ad for a device called the “Home Motor.” It’s a five pound electric motor you plug into “city current,” and it provides motive power through a series of peripherals you hook up to it: blades for a fan, paddles for a beater/mixer, a rotary arm for turning a mechanical sewing machine, and so on — even a compact vibrator, “with three attachments.” There is something obviously, gloriously absurd about this object now: a home only needs one motor! What happened, of course, was that small electric motors migrated into every appliance; each had their own. A single source of power in the home was the introductory step.

WikiLeaks, the organization, is a genuine 21st-century event. It has a core team of highly skilled programmers, working relationships with media outlets and a few trustworthy ISPs and political bodies, immense goodwill within the geek and hacker communities, and the assistance of groups like Anonymous. Nonetheless, it remains quite contingent and fragile, laced with internal dissent and leadership issues. It commands attention now, but, if it is to be truly successful, it will be the first word rather than the last, the advent of a method rather than the founding of a lone institution. If we are lucky and we create some tools and ideas (about which more below), it is the beginning, not the end, of a new strategy and infrastructure for leaking, one built on anonymous drop boxes, encrypted communication, and distributed publishing. WikiLeaks will be, in more than one sense, the Home Motor of this school of activism. If we know what we’re doing, WikiLeaks as such could ultimately be the least interesting thing about WikiLeaks — the first, the crudest, and the most bound to prior orders of publicity, of the strategies to come.

This is not to downplay the hard work, the courage, and the daring the WikiLeaks organization. However, the model now most closely associated with WikiLeaks — the receipt, analysis and redaction of leaked materials inside the organization, and their targeted release in collaboration with major media organizations — is only one among many. Birgitta Jónsdóttir has argued in favor of handing off targeted leaks to particular activist organizations best placed to make use of them, rather than the high-visibility international news event of “megaleaks.” Daniel Domscheit-Berg’s OpenLeaks project, sprung from a critique along similar lines, separates the submission of documents from their publication by providing drop boxes for anonymous web site submissions — so every group can have their own channel for leaks. Rather than the single point of global submission and distribution, many regional WikiLeaks clones or variants are appearing: IndoLeaks (for Indonesia), BrusselsLeaks (the EU), Rospil (Russian, devoted to the crowdsourced analysis of publicly available budgeting documents), ThaiLeaks (Thai-related material on WikiLeaks), BalkanLeaks (the Balkans generally), PinoyLeaks (the Philippines; their superb slogan is “Those who engage in Monkey Business should beware of the Monkey-Eating Eagle”), PirateLeaks (the Czech Republic), TuniLeaks (Tunisia-specific materials from the WikiLeaks cable releases) … There are direct journalistic leaks channels appearing, as well — consider Al Jazeera’s Transparency Unit (returning error messages as of this writing, for some reason), the venue through which the Palestine Papers were leaked, which is a fairly straightforward drop box system.

There is no better place than a transitional space like The New Everyday to look to the future, and claim: The centralized motor of WikiLeaks was the first step, and the future belongs to a proliferation of platforms for leaks, power distributed and tailored to its use and its need. We will not just see leak-seeking organizations for cultures, language groups, and nations, but for specific areas of specialization and interest, like pharmaceuticals, agribusiness, mining and resource extraction, finance and banking, manufacturing, intelligence — the kind of areas where skilled analysis of the material may be necessary, and where groups with existing histories of activism are well-placed to put the material in context, redact anything irresponsible to release, and frame it for maximum impact. Every movement will have the possibility of secure leaks available to it.

This is not a prediction of inevitability, however. (Nor is it a wholly positive future; I’ll also raise some problems of consequence which must be addressed — but let us assume that the positive elements of a society with anonymous leaking as a part of the toolbox outweigh the negatives.) If we would like to live in this world, there are several urgent problems that need to be addressed and tools that need to be built. While they overlap somewhat, they can be loosely grouped as infrastructural, social, and legal challenges:


The means for securely and anonymously submitting materials are already fairly well established — though of course they can be improved, and constant vigilance is needed for potential attacks. Real difficulties lie on the publication side, as the struggle to keep WikiLeaks online demonstrates. There are two aspects to this problem:

  • We need to create simple and reliable means for mirroring sites and to navigate to those sites in a trustworthy way, so that adversaries leaning on your ISP (so your material is removed from the server) and pulling your DNS (so that readers can no longer navigate to your domain name) can’t expunge your data. There are alternative systems for a peer-to-peer domain name infrastructure being developed; a similar longer term project being discussed is the creation of a protocol to mirror sites over BitTorrent, so that if the main site is under attack, it can pass requests on to peers without the reader/requester having to leave their browser — a step towards a truly uncensorable network.

  • WikiLeaks, as the bellwether, has made clear that the funding and donation system is broken when it comes to supporting anything truly contentious or potentially problematic. Methods are needed for funding organizations that are releasing leaked material in their moment of greatest need, when they may be operating overseas and under close governmental scrutiny. Projects like Bitcoin (AnonNews is currently taking Bitcoin donations) suggest steps in this direction — though a far simpler solution may lie not in the creation of new transaction systems, but in existing nonprofits and activist groups managing leaks as one aspect of their operation, which doesn’t imperil their funding stream and access to their resources.

Finally, an additional infrastructural element we must work on is a system for undetectably copying documents and other materials. The Afghan War logs and the SIPRnet cables were likely flukes, with nothing on a similar scale to be made available to authorized users again without systems for logging access and requests, and provided in formats that are very difficult to download to a local machine or circulate online. Techniques and workflows for gathering data and making it portable will be vital.


The points of real security failure for an organization with leak-receiving capabilities are social, not technical. The sole alleged source to be compromised in the history of WikiLeaks appears to have been identified by discussing his activities with a colleague he thought trustworthy. For secure leaking to be a viable and distributed strategy, three elements would be helpful:

  • People who work with leaks in an organization must have training in operations security and risk management — the tradecraft of learning how to travel, communicate, behave and collaborate in secure ways. OPSEC and its related disciplines are already well understood in the military and intelligence communities; we need an activist/geek-friendly training program to produce leak recipients capable of protecting their organizations and themselves.

  • One crucial step in that regard would be greater general familiarity with secure communication online. It has never been easier to browse safely (using Tor), encrypt e-mail (using programs like GPG), and chat both securely and deniably (using the Off-the-Record protocol). Spread these habits, so you and your colleagues can use them before they become urgently necessary.

  • The act of leaking puts one at potentially enormous risk for the sake of moral courage. It’s easy to be dismissive of social security failures — just don’t talk about what you’ve done, to anyone, ever — but the need for companionship and solidarity, especially given the danger a leaker faces, is profound. To keep secrets of that magnitude, without the benefit of friend, therapist, or confessional, is wearing. A way to enable community and alliance without the danger of discovery would be well worthwhile.

The last issue is a legal one — not simply the legal status of leak-distributing groups, the freedom of speech issues they face, and so on, but clarifying the gray area of legal protection for those who mirror the information. If mirroring is to play its necessary role in the distributed publication of leaks in the future, those who would create mirror sites need to know the risks they run, in terms of their hosting services (can my hosting contract or personal website be terminated?), their relationship to their employers, and the possibility of pressure from the government. What can they expect, and what means of redress are available to them?

Problems of consequence

Finally, there are problems of the longer-term consequences the wide availability of secure leaking; I don’t have answers to these questions, and I invite comments.

  • Authentication. The culture of journalistic leaks includes existing relationships of trust, and their patient cultivation, between the journalist and the leaker. It’s how journalists keep from disseminating disinformation and propaganda. In the absence of trust between leakers and the fourth estate, where one can’t know the other, how do we avoid irresponsible and scurrilous and outright fabricated information? Worst case scenario number one: the first 21st-century Protocols of the Elders of Zion, a hate-justifying counterfeit whose pretense of legitimacy partially springs from presenting itself as secret knowledge revealed. Do we need anonymous reputational systems to build trusted relationships with repeat leakers? Double agents have already demonstrated the technique of building trust through true, secret, but nonvital information that builds the relationship for lies down the road.

  • Analysis. WikiLeaks works very hard to maintain their analytic layer for the leaks they receive, and journalism has historically had people who will read through all those tedious pages of Pentagon memos to put the significant story together. Can we trust the magic pixie dust of crowdsourcing to handle this? Are we building in stovepiping (as in Cheney wanting to read all the raw intelligence, pre-analysis, and feeding his own paranoia and desire for unilateral power) for the entire population? Will good information actually drive out bad? Worst case scenario number two: a population whipped into a frenzy and marching to war because of the kind of wildly overstated threats presented by self-serving informers and spies with their own agendas — the sort of stuff actual intelligence analysts know to discard, filter, or read with a grain of contextual salt. It’s the Iraq War all over again, but we did it to ourselves. Imagine Glenn Beck and his epigones getting their hands on such material.

  • The end of libel. Worst case scenario three, from the city-state of Florence (among other Renaissance metropoli): the tamburo, or anonymous letter-box, which existed for citizens to drop secret denunciations of one another, leading to a constant series of political struggles in which the accused could never face their accusers. Like political character attacks and the work of oppo research, but vastly more widespread, a culture of rampant self-policing, informers, and the possibility of betrayal.

With those problems said, and awaiting further thought, I would like to close with the positive dimension of the leaking project. There come moments, sometimes, in human lives when an exigent power comes over us, against all rational and self-interested calculation, to act for what we take to be good in the face of institutions, individuals, and cultures that would prefer not to know, and would prefer to say, in the words of Alphonso Lingis, “what one says, what everyone and anyone says.” We are faced with a call of conscience — Heidegger called it the voice of the friend, Nietzsche the “evil conscience” that obliges us to step forward, to be uniquely and particularly human. There are many ways to answer this demand; one way, if the person called is in a position to do so, is to release secret information, take another step towards the whole picture, and enter into history. What we are in a position to do, by following the lead of WikiLeaks and building the capacity for a multiplicity of leaks, is to enable many others to answer their call of conscience, to make them more addressable by ethical demand. We can make WikiLeaks itself the least interesting part of a new environment of personal privacy and institutional disclosure.

Work on this essay was supported by grants from the National Science Foundation (CNS/NetS 1058333), and the AFSOR-MURI Presidio grant. It has been partially inspired and largely improved by conversation with a number of people who would prefer not be credited. Thank you very much; you know who you are. I invite further thoughts in private as well as here — instructions for emailing or IMing with me securely are available on my website,