The War on Journalism cover

The War on Journalism

by Andrew Fowler

The War on Journalism delves into the pivotal role journalists play in democracy, revealing truths that challenge government control. Andrew Fowler explores the intense pressures journalists face from surveillance, economic shifts, and censorship in the digital era.

The Architecture of Radical Transparency

How do you expose the hidden mechanisms of power in a digital age? This book traces the rise of Julian Assange and WikiLeaks as both a technological experiment and a political confrontation with secrecy itself. Built from hacker subcultures and cryptographic ideals, WikiLeaks redefined journalism by transforming classified data into public information. Yet its story reveals profound contradictions: how transparency can both empower and endanger, how whistleblowing reshapes statecraft, and how technology collides with law.

From hacker ethics to global publishing

You begin in Assange’s early life—driven by movement, instability, and a restless mind for mathematics. His adolescent identity as “Mendax” in the International Subversives established a moral code: hack to learn, expose lies, and avoid harming systems. This evolved through encounters with Phil Zimmermann’s PGP and the Cypherpunk movement, which emphasized encryption as a political right. Out of these experiments grew the conviction that cryptography could dismantle hierarchies of information.

By 2006, Assange fused these strands into WikiLeaks: a global publishing engine for whistleblowers. The platform promised anonymity, authenticity, and distribution—a triad meant to protect sources while forcing institutions into daylight. Early collaborations with Cryptome and support from hackers in Iceland and Australia turned a small operation into a network capable of receiving, verifying, and releasing massive troves of files.

The revolution of leaks

When WikiLeaks published the Collateral Murder video and the Afghan and Iraq War Logs, it triggered a new media era. Millions watched the Apache helicopter footage and recognized, perhaps for the first time, how sanitized official narratives concealed wartime brutality. These releases were followed by Cablegate—a quarter of a million State Department cables revealing the inner voice of diplomacy. For protesters in Tunisia and Egypt, the revelations confirmed corruption and repression, sparking part of the Arab Spring’s oxygen.

WikiLeaks partnered with legacy giants—the Guardian, New York Times, Der Spiegel, El País and Le Monde—to authenticate and spread its material. The collaboration lent credibility yet sowed distrust. Disputes erupted over redactions, timing, and claims of mismanagement. When a leaked password published by the Guardian unlocked the entire Cablegate cache, the partnership unraveled, underscoring how fragile the balance between transparency and restraint can be.

State countermeasures and personal fallout

The leaks forced states to react. The Obama administration’s WikiLeaks Task Force and a grand jury in Virginia began exploring Espionage Act prosecutions. Corporate actors joined in: Amazon dropped hosting, and PayPal, MasterCard, and Visa froze donations. The combined pressure economically strangled WikiLeaks and radicalized its supporters—leading to hacker reprisals like Operation Payback.

Meanwhile, Assange faced legal peril in Sweden amid allegations of sexual misconduct, and a complex extradition web unfolded between Sweden, the UK, and the United States. His decision in 2012 to seek refuge in the Ecuadorian Embassy turned the drama into a geopolitical siege lasting seven years. Inside those walls, he was surveilled by his own protectors: UC Global, a Spanish security firm, secretly recorded him and his lawyers, illustrating how power finds new ways to penetrate even asylum.

The new frontier of political information

By 2016, WikiLeaks had become central to another global storm—the release of DNC and John Podesta emails during the U.S. election. Whether these came from Russian hacking or internal leaks remains disputed, but the result was undeniable: WikiLeaks became a political weapon, influencing electoral discourse and fueling debates about foreign interference, journalism ethics, and accountability.

Across chapters, you watch transparency collide with secrecy, activism collide with law, and ideals collide with human flaws. The book reveals not only how a data drop can alter regimes, but also how every radical disclosure lives in tension with ethics and trust. It invites you to ask: can truth survive the networks that carry it?


The Hacker Origins of a Publisher

Julian Assange’s roots as a hacker shape every dimension of WikiLeaks. His early years in Melbourne’s BBS culture and the International Subversives collective laid the technical and philosophical groundwork. You meet 'Mendax', a young coder who saw computers not just as tools but as instruments of moral clarity. He learned social engineering, port scanning and mainframe navigation through incursions at RMIT and Nortel, blending curiosity with conscience.

Ethical hacking and early lessons

For Assange, hacking was about revealing truths—not stealing secrets for profit. He followed a principle: 'Don’t damage. Leave systems as found.' The WANK worm incident and his later police arrest in 1991 taught him that even minimal disruption could provoke maximal state response. This experience seeded a lasting suspicion of government monitoring and inspired his fixation on operational security.

His contributions to open-source systems like Strobe (a fast port scanner) and Rubberhose deniable encryption showed that technology could serve dissent. Rubberhose was protection through obscurity: it hid the existence of secrets themselves, anticipating later tools like Tails and Tor.

The Cypherpunk inheritance

Assange joined the global Cypherpunk movement—a loose network including Phil Zimmermann, John Gilmore, and Timothy May—who believed encryption was essential to civic liberty. Privacy, they argued, must be seized technically rather than granted politically. Through the PGP revolution, mailing lists, and prototypes like Cryptome, the movement fused code and ethics. WikiLeaks emerged from this ideology: encryption as political action.

When you read early WikiLeaks manifestos, they mirror Cypherpunk doctrine: resistance to surveillance, belief in mathematical truth, and distrust of bureaucratic intermediaries. Assange saw journalists as vulnerable intermediaries and sought a direct mechanism where data could 'speak for itself.'

Key lesson

Assange’s hacker past is not a prelude—it is the DNA of WikiLeaks. Every technological decision, moral argument and confrontation with states derives from those formative years of code-breaking and digital rebellion.

Understanding this history helps you see why WikiLeaks was never simply a media organization—it was the logical evolution of the 1980s–1990s hacker ethos applied to the 21st century’s information wars.


Leaks that Changed the World

When WikiLeaks began publishing the Collateral Murder video and the Afghan and Iraq War Logs, it redefined what it meant to 'report' on war. These releases exposed civilian deaths and abuses hidden under layers of classification and spin. Watching the Apache video, you witness both military precision and moral collapse—the exact contradiction Assange wanted publicized.

Operational impact and ethical debate

The Afghan War Logs (over 92,000 reports) revealed secret kill missions and Pakistani intelligence complicity. The scale raised logistical and moral alarms: how to redact responsibly without neutering truth? WikiLeaks withheld roughly 15,000 sensitive files, yet some names slipped through. Rights groups accused it of recklessness; US officials called it endangerment. But internal Pentagon reviews later found minimal concrete harm—illustrating divergence between perceived and real damage.

Cablegate and diplomatic fallout

The leak of 250,000 State Department cables—Cablegate—made secrecy a global headline. Citizens read unfiltered views about allies and rivals, from Saudi lobbying to Tunisian corruption. Protesters in North Africa used these cables to challenge dictatorships, proving that information could ignite revolutions. Yet Cablegate also invited immense backlash: governments pressured internet hosts, banks shut accounts, and media partners fractured after metadata and password missteps.

The episode solidified what this book calls “the transparency paradox”: when you reveal everything, you are blamed for the consequences of others’ dishonesty.

A key insight

Radical openness changes geopolitics not by what it shows, but by who it empowers—ordinary citizens who gain insight into the hidden scripts of power.

You can see how these leaks transformed data into diplomacy, forcing governments to operate in a world where truth could surface at any time.


The Law Strikes Back

The backlash to WikiLeaks was swift and global. The Manning case became the centerpiece: a young US Army analyst imprisoned for transmitting military files to WikiLeaks. Her confessions to hacker Adrian Lamo, and Lamo’s betrayal, framed the moral battle—truth-telling versus classified loyalty. Manning’s prosecution foreshadowed the efforts to ensnare Assange under the Espionage Act.

Espionage, extradition, and the state response

The Justice Department convened a Virginia grand jury to test whether publishing classified material could be criminalized. Legal adviser Harold Koh warned that disclosure could 'endanger diplomacy,' thus framing transparency as threat. The resulting dragnet reached across platforms: Twitter received secret subpoenas for metadata on Assange, Jacob Appelbaum, and Birgitta Jónsdóttir. Financial measures followed—payment blockages that crippled WikiLeaks’ operations.

Politically, rhetoric escalated. Joe Biden labeled Assange a “hi-tech terrorist.” By conflating publishing with espionage, officials blurred lines between journalism and national security operations. This environment made extradition a looming danger, amplified when Sweden’s sexual misconduct investigation provided a legal route.

Sweden, asylum, and surveillance

Assange’s flight into the Ecuadorian Embassy in 2012 transformed his case from judiciary to geopolitics. Ecuador granted asylum citing risk of US persecution. For seven years British police waited outside while Ecuador faced pressures: by 2019, a new government invited UK officers in. Yet inside the embassy, Assange’s conversations were recorded by UC Global, a Spanish contractor allegedly sharing feeds with US officials. Those tapes threatened legal integrity by violating attorney–client privilege.

Key takeaway

When surveillance penetrates legal defense, due process collapses. The Assange case demonstrates how intelligence frameworks can quietly override judicial boundaries.

In tracing these legal battles, you see modern states deploying integrated power—law, finance, technology—to neutralize disruptive publishers, defining the future of press freedom itself.


Inside WikiLeaks: Ideals and Fractures

Inside WikiLeaks, ideals collided with ego and governance breakdowns. Early collaborators like Daniel Domscheit-Berg and the Wau Holland Foundation complained of opacity, autocracy, and missing funds. Despite immense public donations, staff remained unpaid and critical systems failed after resignations closed submission channels. The result: an organization brilliant at encryption but fragile at human management.

Leadership and control

Assange inspired fanatic loyalty and deep resentment. His intelligence and mission discipline coexisted with paranoia and domination. Tensions with Domscheit-Berg led to threats and loss of crucial access codes, stalling WikiLeaks’ leaks pipeline. This episode mirrors many start-up revolutions—which collapse under their founder’s temperament before external enemies strike.

Security lapses and unintended risks

When the Guardian accidentally revealed a password used for encrypted cables, the full corpus went public—unredacted. Metadata listing embassy locations allowed governments to cross-reference threats. This was the cost of decentralized control: idealists often underestimate operational complexity. The book portrays this moment as an ethical crack—the point where transparency began to harm those it sought to protect.

Operational insight

Encryption without governance is brittle. Technical mastery cannot substitute for trust, communication, and clear responsibility when human lives depend on secrecy.

WikiLeaks’ collapse in internal cohesion underscores a deeper paradox: to fight secrecy you still need disciplined confidentiality within your own ranks.


Leaks, Elections, and the Information Battlefield

The 2016 U.S. election transformed WikiLeaks from transparency platform to political actor. The publication of DNC and John Podesta emails shifted public opinion, triggering partisan crises. These emails documented Democratic favoritism against Bernie Sanders and campaign strategies, fueling Donald Trump’s momentum and fracturing internal unity within American liberal politics.

Hack or leak?

Official charges pointed to Russian intelligence, tied to the persona Guccifer 2.0 and DC Leaks. Yet Assange’s allies, including Craig Murray, insisted the source was domestic—a leak, not a foreign hack. This dispute reshaped narratives of interference, sovereignty, and journalism: was WikiLeaks a conduit of state power or merely fulfilling its mission of disclosure regardless of origin?

Political weaponization

By timing releases to coincide with major campaign moments, WikiLeaks inadvertently became part of electoral warfare. Critics accused Assange of seeking to damage Clinton; supporters hailed him for exposing hypocrisy. The controversy revealed how data in the digital age functions as ammunition—capable of altering elections without a single vote changed.

Core reflection

The 2016 saga shows that transparency has become a geopolitical strategy. Once information escapes control, every actor—state or civilian—competes to weaponize it.

This final arc demonstrates that WikiLeaks’ legacy is not just about stolen cables but about redefining informational power in the age of permanent digital exposure.


The Legacy of Radical Transparency

In the end, the book leaves you with a paradox. WikiLeaks reconfigured how societies confront state secrets, yet its own methods exposed new ethical voids. By forging alliances across hackers, journalists, and activists, it made possible both global accountability and new forms of manipulation. The Assange saga—from hacker prodigy to political prisoner—becomes a mirror reflecting our era’s contradictions: the hunger for truth, the fear of exposure, and the unresolved struggle between privacy and transparency.

You finish understanding that the question is no longer whether governments can keep secrets—but whether democracies can survive the constant ending of secrecy itself.

Dig Deeper

Get personalized prompts to apply these lessons to your life and deepen your understanding.

Go Deeper

Get the Full Experience

Download Insight Books for AI-powered reflections, quizzes, and more.