The examples and perspective in this article deal primarily with the United States, with some coverage of other countries, and do not represent a worldwide view of the subject.(April 2023) |
Doxing, also spelled doxxing, is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent. [1] [2] [3] Historically, the term has been used to refer to both the aggregation of this information from public databases and social media websites (like Facebook), and the publication of previously private information obtained through criminal or otherwise fraudulent means (such as hacking and social engineering).[ citation needed ]
The aggregation and provision of previously published material is generally legal, though it may be subject to laws concerning stalking and intimidation. [4] Doxing may be carried out for reasons such as online shaming, extortion, and vigilante aid to law enforcement. [5] [6] It also may be associated with hacktivism .
"Doxing" is a neologism. It originates from a spelling alteration of the abbreviation "docs", for "documents", and refers to "compiling and releasing a dossier of personal information on someone". [7] Essentially, doxing is revealing and publicizing the records of an individual, which were previously private or difficult to obtain.
The term dox derives from the slang "dropping dox", which, according to Wired contributor Mat Honan, was "an old-school revenge tactic that emerged from hacker culture in 1990s". Hackers operating outside the law in that era used the breach of an opponent's anonymity as a means to expose them to harassment or legal repercussions. [7]
Consequently, doxing often carries a negative connotation because it can be a means of revenge via the violation of privacy. [8]
The practice of publishing personal information about individuals as a form of vigilantism predates the Internet, via physical media such as newspapers and pamphlets. For example, in response to the Stamp Act 1765 in the Thirteen Colonies, radical groups such as the Sons of Liberty harassed tax collectors and those who did not comply with boycotts on British goods by publishing their names in pamphlets and newspaper articles. [9] [10]
Outside of hacker communities, the first prominent examples of doxing took place on internet discussion forums on Usenet in the late 1990s, including users circulating lists of suspected neo-Nazis, [11] later racists. [12] Also in the late 1990s, a website called the Nuremberg Files had launched, featuring the home addresses of abortion providers and language that implied website visitors should stalk and kill the people listed. [11]
In 2012, when then- Gawker reporter Adrian Chen revealed the identity of Reddit troll Violentacrez as Michael Brutsch, Reddit users accused Chen of doxing Brutsch and declared "war" on Gawker. In the mid-2010s, the events of the Gamergate harassment campaign brought the term into wider public use. Participants in Gamergate became known for releasing sensitive information about their targets to the public, sometimes with the intent of causing the targets in question physical harm. Caroline Sinders, a research fellow at the Center for Democracy and Technology, said that "Gamergate, for a lot of people, for mainstream culture, was the introduction to what doxxing is". [11]
According to The Atlantic , from 2014 to 2020, "the doxxing conversation was dominated by debate around whether unmasking a pseudonymous person with a sizable following was an unnecessary and dangerous invasion of their privacy." [13] In 2014, when Newsweek attempted to search for the pseudonymous developer of Bitcoin, the magazine was accused of doxing by cryptocurrency enthusiasts. In 2016, when an Italian journalist attempted to search for the identity of the pseudonymous Italian novelist Elena Ferrante, the journalist was accused of gendered harassment and Vox referred to the search as "the doxxing of Elena Ferrante." In 2020, when The New York Times indicated that it was planning on publishing the real name of the California psychiatrist running the Slate Star Codex blog, fans of the blog accused the Times of doxing. The person behind the blog accused the Times of threatening his safety and claimed that he started a "major scandal" that resulted in the Times losing hundreds or thousands of subscriptions. [11]
In 2022, BuzzFeed News reporter Katie Notopoulos used public business records to identify the previously pseudonymous founders of the Bored Ape Yacht Club. Greg Solano, one of the founders of the club, claimed that he "got doxxed against [his] will". [11]
In April 2022, The Washington Post reporter Taylor Lorenz revealed the identity of the person behind the Twitter account Libs of TikTok as Chaya Raichik, who works in real estate. This resulted in Raichik and right-wingers accusing Lorenz of doxing. [11]
Pro-Israel NGOs including the Israel on Campus Coalition and Canary Mission have been accused of doxing Palestinian activists by releasing public dossiers through flyers and their websites. [14] [15] The Israel-Hamas war saw a surge in doxing activities in the United States. Right wing advocacy group Accuracy in Media sent doxing trucks to Yale University and Columbia University, displaying the names and faces of students deemed anti-Israel under a banner labeling them "leading antisemites" on campus. [16] [17] Similarly, Canary Mission published the identities and images of Harvard University students involved in the circulation of an open letter, published on October 7th, that held "the Israeli regime entirely responsible for all unfolding violence". [18] [19]
Doxware is a cryptovirology attack invented by Adam Young and further developed with Moti Yung that carries out doxing extortion via malware. It was first presented at West Point in 2003. The attack is rooted in game theory and was originally dubbed "non-zero-sum games and survivable malware". [20]
The attack is summarized in the book Malicious Cryptography as follows:
The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus. [21]
Doxware is the converse of ransomware. In a ransomware attack (originally called cryptoviral extortion), the malware encrypts the victim's data and demands payment to provide the needed decryption key. In the doxware cryptovirology attack, the attacker or malware steals the victim's data and threatens to publish it unless a fee is paid. [22]
Once people have been exposed through doxing, they may be targeted for harassment through methods such as actual harassment in person, fake signups for mail subscriptions, food deliveries, bombarding the address with letters, or through “swatting”—the intentional dispatching of armed police teams (S.W.A.T.) to a person's address via falsely reported tips or through fake emergency services phone calls. The act of reporting a false tip to police—and the subsequent summoning of an emergency response team (ERT)—is an illegal, punishable offense in most jurisdictions, due to ERTs being compromised and potentially unavailable for real emergencies. [23] It is, at the very least, an infraction in most US states (for first-time offenders); if multiple attempts are made, the charge increases to a misdemeanor (especially when the intention is harassment-based). Further repercussions include fines ranging from as low as US$50 up to US$2,000, six months spent in county jail, or both the fine and imprisonment. [24]
A hacker may obtain an individual's dox without making the information public. A hacker may look for this information to extort or coerce a known or unknown target. A hacker may also harvest a victim's information to break into their Internet accounts or take over their social media accounts. [7]
Doxing has also occurred in dating apps. In a survey conducted in 2021, 16% of respondents reported suffering doxing because of them. [25] In a 2018 qualitative study about intimate partner violence, 28 out of 89 participants (both professionals and survivors) reported the exposure of the victim's private information to third parties through digital technologies as a form of humiliation, shaming or harm frequently practiced by abusers, that may include the disclosure of intimate images and impersonation of the victim. [26]
Victims may also be shown their details as proof that they have been doxed as a form of intimidation. The perpetrator may use this fear to gain power over victims in order to extort or coerce. Doxing is therefore a standard tactic of online harassment and has been used by people associated with the Gamergate and vaccine controversies. [27]
There are different motivations for doxing. They include doing it to reveal harmful behavior and hold the offender accountable. Others use it to embarrass, scare, threaten, or punish someone. It's also often used for cyberstalking, which could result in making someone fear for their safety. Researchers have pointed out that some instances of doxing can be justified, such as when it reveals harmful behavior, but only if the act of doxing also aligns with the public. [28]
Parallel to the rise of doxing has been the evolution of cybersecurity, internet privacy, the Online Privacy Alliance, and companies that provide anti-doxing services. Most recently, high-profile groups like the University of California Berkeley [29] have made online guidance for protecting its community members from doxing. Wired published an article on dealing with doxing, in which Eva Galperin, from the Electronic Frontier Foundation, advised people to "Google yourself, lock yourself down, make it harder to access information about you." [30]
In 2024, the Australian government announced they would introduce new legislation to criminalise doxing due to an incident in which the personal details of over 600 people from a WhatsApp group of Jewish Australians was leaked. Some of the people whose details were leaked received threats to harm their reputation as well as death threats. [31] [32] The proposed legislation, which includes a law that makes doxing punishable by jail time, has received bipartisan support, and support from Prime Minister Anthony Albanese. [31] [33]
In 2006 Austria passed its anti-stalking law, and in 2016 cyber-mobbing became a criminal offense. [34] While as of the end of 2024 doxing is no specific offense, the laws mentioned are used in cases of online violence. [35] Since Austria is an EU-member state, EU law (DSGVO) applies. [36]
From March 1, 2020, the People's Republic of China's "Regulations on the Ecological Governance of Online Information Content" has been implemented, clarifying that users and producers of online information content services and platforms must not engage in online violence, doxing, deep forgery, data fraud, account manipulation and other illegal activities. [37]
As of 2021, it is a criminal offense in Hong Kong to dox, where doxing is defined as releasing private or non-public information on a person for the purposes of "threatening, intimidation, harassment or to cause psychological harm". Persons convicted under this statute are liable to imprisonment for up to 5 years, and a fine of HK$1,000,000 (US$128,324.40). [38]
In Germany, doxing was added to the criminal code in September 2021 as Endangering Dissemination of Personal Data (Section 126a of the Criminal Code). Since then, the publication of freely accessible data is punishable by a prison sentence of up to two years or a fine, and the publication of data that is not freely accessible is punishable by a prison sentence of up to three years or a fine. The dissemination of the data and its content must be suitable and, under the circumstances, intended to expose the person concerned or persons close to them to a crime directed against them or another unlawful act against sexual self-determination, physical integrity, personal freedom or against an object of significant value. By referring to Section 86 of the Criminal Code, which criminalizes the Dissemination of Propaganda Material of Unconstitutional and Terrorist Organizations , the Endangering Dissemination of Personal Data is not punishable if it is socially appropriate and "the act serves civic education, the defense against unconstitutional efforts, art or science, research or teaching, the reporting on current events or history or similar purposes" (Section 86 Paragraph 4 of the Criminal Code). [39]
In 2021, due to increasing doxing incidents targeting Dutch activists, politicians, journalists and others, a new law against doxing was proposed by then Minister of Justice and Security Ferdinand Grapperhaus. The law states it is a felony to share personal data with the intent of intimidation, harassment or work-hindering and carries a maximum penalty of a two-years prison sentence or a fine of €25,750 (US$28,204). The penalty shall be increased by a third when targeted at certain public figures. [40] The proposed law passed both houses of parliament and went into effect on 1 January 2024. [41] [42] [43] [44]
Early in 2025 the War in Court project digitally released a list of names of nearly half a million suspected wartime Nazi collaborators. [45]
Under the Article 137 "Invasion of Personal Privacy" public sharing of personal information, using mass media, Internet, [46] even public events, is considered a crime and shall be punishable by a fine of up to eighteen months in wage, or by compulsory labor for a term of up to three hundred sixty hours, or by corrective labor for a term of up to one year, or by forced labor for a term of up to two years. with deprivation of the right to hold certain positions or engage in certain activities for a term of up to three years or without it, or arrest for a term of up to four months, or imprisonment for a term of up to two years with deprivation of the right to hold certain positions or engage in certain activities for a term of up to three years.
Copying the information and obtaining it illegally are separate offences as well. [46]
South Korea is one of the few countries with a criminal statute that specifically addresses doxing. Article 49 of "Act on promotion of information and communications network utilization, and information protection" prohibits unlawful collection and dissemination of private information such as full name, birth date, address, likeliness, and any other information that is deemed sufficient to identify specific person(s) when viewed in summation, regardless of intent. [47] In practice, however, due to the ambiguous nature of "unlawful collection" of private information in the statute, legal actions are often based upon article 44 from the same act, which prohibits insulting an individual with derogatory or profane language, and defamation of an individual through the dissemination of either misinformation or privileged factual information that may potentially damage an individual's reputation or honor (which often occurs in a doxing incident). This particular clause enforces harsher maximum sentences than a "traditional" defamation statute existing in the Korean criminal code. It was originally enacted partially in response to the rise in celebrity suicides due to cyberbullying.
The Spanish Criminal Code regulates penalties for the discovery and revelation of secrets in articles 197 to 201. It establishes, in its article 197 § 1, that "whoever, in order to discover the secrets or violate the privacy of another, without their consent, seizes their papers, letters, e-mail messages or any other documents or personal effects, intercepts their telecommunications or uses technical devices for listening, transmission, recording or reproduction of sound or image, or any other communication signal, shall be punished with prison sentences of one to four years and a fine of twelve to twenty-four months". Per article 197 § 2, the same penalty punishes those who "seize, use or modify, to the detriment of a third party, reserved personal or family data of another that is registered in computer, electronic or telematic files or media, or in any other type of file or public or private record".
Those who "disseminate, disclose or transfer" the aforementioned data to third parties face a penalty of two to five prison years (one to three years of prison and fines of twelve to twenty-four months, if not directly involved in their discovery but "with knowledge of its illicit origin"). These offenses are particularly severe if made by the person responsible of the respective files, media, records or archives or through unauthorized use of personal data, if revealing of the ideology, religion, beliefs, health, racial origin or sexual life of the victim, if the victim is underage or disabled, and if it is made for economic profit. [48]
As established by the Criminal Code's reform in 2015, [49] to "disseminate, disclose or transfer to third parties images or audiovisual recordings of the one obtained with their consent in a home or in any other place out of sight of third parties, when the disclosure seriously undermines the personal privacy of that person", without the authorization of the affected person, is also punished per article 197 § 7 to three months to a year in prison and fines of six to twelve months. The offense is particularly severe if the victim is linked to the offender by marriage or an "analogous affective relationship", underage, or disabled. [48]
In the United States, there are few legal remedies for the victims of doxing. [50] Two federal laws exist that could potentially address the problem of doxing: the Interstate Communications Statute and the Interstate Stalking Statute. [51] However, as one scholar has argued, "[t]hese statutes ... are woefully inadequate to prevent doxing because their terms are underinclusive and they are rarely enforced". [51] The Interstate Communications Statute, for example, "only criminalizes explicit threats to kidnap or injure a person". [52] But in many instances of doxing, a doxer may never convey an explicit threat to kidnap or injure, but the victim could still have good reason to be terrified. [52] And the Interstate Stalking Statute "is rarely enforced and it serves only as a hollow protection from online harassment". [53]
According to at least one estimate, over three million people are stalked over the internet each year, yet only about three are charged under the Interstate Stalking Statute. [53] Accordingly, "[t]his lack of federal enforcement means that the States must step in if doxing is to be reduced." [53]
In late 2023 and early 2024, during a rash of swatting of American politicians, it became widely used as a way of encouraging attacks, as the United States possesses weak laws surrounding data privacy, with its citizens' personal information often easily accessible online due to various data brokers. [54]
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
A GPS tracking unit, geotracking unit, satellite tracking unit, or simply tracker is a navigation device normally on a vehicle, asset, person or animal that uses satellite navigation to determine its movement and determine its WGS84 UTM geographic position (geotracking) to determine its location. Satellite tracking devices may send special satellite signals that are processed by a receiver.
Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior.
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information".
Swatting is a criminal harassment act of deceiving an emergency service into sending a police or emergency service response team to another person's address. This is triggered by false reporting of a serious law enforcement emergency, such as a bomb threat, domestic violence, murder, hostage situation, or a false report of a mental health emergency, such as reporting that a person is suicidal or homicidal and may be armed, among other things.
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online.
Terms such as menacing, brandishment or brandishing refer to criminal offenses in many U.S. states which are generally defined as displaying a weapon with the intent of placing another person in fear of imminent physical injury or death.
The term “brandish” means, with respect to a firearm, to display all or part of the firearm, or otherwise make the presence of the firearm known to another person, in order to intimidate that person, regardless of whether the firearm is directly visible to that person.
— 18 U.S.C. § 924(c)(4).
Stalking is unwanted and/or repeated surveillance or contact by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The term stalking is used with some differing definitions in psychiatry and psychology, as well as in some legal jurisdictions as a term for a criminal offense.
Cyberstalking and cyberbullying are relatively new phenomena, but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose. Although there are often existing laws that prohibit stalking or harassment in a general sense, legislators sometimes believe that such laws are inadequate or do not go far enough, and thus bring forward new legislation to address this perceived shortcoming. In the United States, for example, nearly every state has laws that address cyberstalking, cyberbullying, or both.
Cyberbullying is a form of bullying or harassment using electronic means. Since the 2000s, it has become increasingly common, especially among teenagers and adolescents, due to young people's increased use of social media. Related issues include online harassment and trolling. In 2015, according to cyberbullying statistics from the i–Safe Foundation, over half of adolescents and teens had been bullied online, and about the same number had engaged in cyberbullying. Both the bully and the victim are negatively affected, and the intensity, duration, and frequency of bullying are three aspects that increase the negative effects on both of them.
Gamergate or GamerGate (GG) was a loosely organized misogynistic online harassment campaign motivated by a right-wing backlash against feminism, diversity, and progressivism in video game culture. It was conducted using the hashtag "#Gamergate" primarily in 2014 and 2015. Gamergate targeted women in the video game industry, most notably feminist media critic Anita Sarkeesian and video game developers Zoë Quinn and Brianna Wu.
Doxbin was an onion service in the form of a pastebin used to post or leak personal data of any person of interest.
Crash Override Network was a support group for victims of large scale online abuse, including revenge porn and doxing.
The Protection from Harassment Act 2014 (POHA) is a statute of the Parliament of Singapore that criminalises harassment, stalking, and other anti-social behaviour. The law is designed specifically to make acts of cyberbullying and online harassment a criminal offence.
Government hacking permits the exploitation of vulnerabilities in electronic products, especially software, to gain remote access to information of interest. This information allows government investigators to monitor user activity and interfere with device operation. Government attacks on security may include malware and encryption backdoors. The National Security Agency's PRISM program and Ethiopia's use of FinSpy are notable examples.
Emily F. Gorcenski is an American data scientist and activist who now resides in Germany. Gorcenski was a counter-protester at the Unite the Right rally in 2017, and subsequently created the site 'First Vigil' to track the trial information of white nationalists.
Nobody's Victim: Fighting Psychos, Stalkers, Pervs, and Trolls is a 2019 book by Carrie Goldberg, co-written with Jeannine Amber. It describes incidents of sexual violence experienced by Goldberg's clients and herself, as well as other famous cases. The acts of violence include rape and sexual assault, revenge porn, "doxing", "swatting", "sextortion", and abusive messages. Goldberg categorizes perpetrators as "assholes", "psychos", "pervs" or "trolls" depending on their nature, though "assholes" was omitted in the book's subtitle to avoid profanity.
Doxbin is a pastebin used to post or leak personal data of any person of interest.
The 2024 Australian Jewish doxxing incident was an instance of mass doxxing that targeted the Jewish community in Australia. It took place on 8 February 2024 when individuals describing themselves as pro-Palestine activists leaked the chat transcript and contact details of over 600 Jewish creatives and academics a in private WhatsApp group called 'J.E.W.I.S.H creatives and academics', on the grounds that members in the group had discussed ways to threaten the employment of Australian pro-Palestinian activists. Critics of the action considered the actual motivation to be antisemitism, and many sources considered the incident to be an antisemitic attack, though some defended it as a form of whistleblowing. The incident led to group members being subjected to personal threats and attacks on their places of work, and led the Australian government to make changes to Australian law regarding doxxing.