Algorithmic Tumult and the Brilliance of Chelsea Manning




Thanks to Nikita Mazurov and Luciana Parisi for their help.


  1. Beecher Stowe, Harriet. 1999. Uncle Tom’s cabin. Knoxville: Wordsworth Classics.Google Scholar
  2. Calvino, Italo. 2003. American diary 1959–60. In Hermit in Paris. Trans. M. McLaughlin, 16-120. London: Penguin.Google Scholar
  3. Chelsea Manning Support Network. 2014. Accessed 15 June 2015.
  4. Coleman, E. Gabriella. 2013. Coding freedom, the ethics and aesthetics of hacking. Princeton: Princeton University Press.Google Scholar
  5. Einstein, Elizabeth. 1979. The printing press as an agent of change. Cambridge: Cambridge University Press.Google Scholar
  6. Fazi, M. Beatrice, and Fuller, Matthew. In press. Computational aesthetics. In A Companion to digital art, eds. Christiane Paul. Oxford: Blackwell.Google Scholar
  7. Fuller, Matthew, and Andrew Goffey. 2012. Evil media. Cambridge: MIT Press.Google Scholar
  8. Gaboury, Jacob. 2013. A queer history of computing. Rhizome. Accessed 15 June 2015.
  9. Goriunova, Olga. 2013. Die Kraft der Digitalen Ästhetik, uber meme, hacking und individuation. Zeitschrift fur Medienwissenschaft 8: 70–87.Google Scholar
  10. Israel, Jonathan I. 2001. Radical enlightenment, philosophy and the making of modernity, 1650–1750. Oxford: Oxford University Press, Oxford.CrossRefGoogle Scholar
  11. Kay, Alan, and Adele Goldberg. 2003. Personal dynamic media. In The New Media Reader, eds. Noah Wardrip-Fruin, and Nick Montford, 93–404. Cambridge: MIT Press.Google Scholar
  12. Kurzweil, Ray. 2005. The singularity is near, when humans transcend biology. New York: Viking.Google Scholar
  13. Li, Yue, Lidong Zhai, Zhilei Wang, and Yunlong Ren. 2013. Control method of Twitter- and SMS-based mobile botnet. In Trustworthy computing and services: International conference, ISCTCS 2012, Beijing, China, May 28-June 2, 2012, Revised Selected Papers, eds. Xu. Wu Yuyu Yuan, and Yueming Lu, 644–650. Heidelberg: Springer.CrossRefGoogle Scholar
  14. Mendez, Juan. 2012. Report of the Special Rapporteur on torture, and other cruel, inhuman or degrading treatment or punishment, Addendum, observations on communications transmitted to governments and replies received, United Nations General Assembly, 74–75.Google Scholar
  15. Northup, Solomon. 2014. Twelve years a slave. London: Penguin.Google Scholar
  16. Parisi, Luciana. 2013. Contagious architecture, computation, aesthetics and space. Cambridge: MIT Press.Google Scholar
  17. Sampson, Tony. 2012. Virality, contagion theory in the age of networks. Minneapolis: University of Minnesota Press.CrossRefGoogle Scholar
  18. Statement in Support of Providence Inquiry – US vs Private First Class (PFC) Bradley E. Manning (U). 29 January 2013. Accessed 15 Jun 2015.
  19. Stone-Gross, Brett, Thorsten Holz, Gianluca Stringhini, and Giovanni Vigna. 2011. The underground economy of spam: A botmaster’s perspective of coordinating large-scale spam campaigns. In LEET’11 Proceedings of the 4th USENIX Conference on large-scale exploits and emergent threats. Berkley: USENIX Association.Google Scholar
  20. Terranova, Tiziana. 2014. Debt and autonomy: Lazzarato and the constituent powers of the social, The New Reader 1, Accessed 15 June 2015.
  21. Watkins, Ali, Jonathan S. Landay, and Marisa Taylor. 2014. CIA’s use of harsh interrogation went beyond legal authority. Senate report says, McClatchyDC, 11 April. Accessed 15 Jun 2015.
  22. Welch, Peter. 2014. Programming sucks. In Still Drinking, 27th April. Accessed 15 Jun 2015.
  23. Woolf, Virginia. 2004. The waves. London: Vintage.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Goldsmiths University of LondonLondonUnited Kingdom

Personalised recommendations