Internet vigilantism

Last updated

Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior.

Contents

The expanding scope of media savvy and online interaction has enabled vigilantes to utilize methods specific to the Internet in order to distribute justice to parties they consider to be corrupt, but who have not committed a formal crime or have not been held accountable by the criminal justice system. [1]

Internet vigilantism originated in the early 2000s and has since evolved to include a variety of methods such as hacking, baiting, and public shaming. Internet vigilantism changes in cultural and political drive depending on location, and has varying relationships to state authority depending on context. There are many internet vigilante groups as well as individuals.

Description

The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one's own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck identifies the four main forms of internet vigilantism as: flagging, investigation, hounding, and organized denunciation. Also referred to by Steve Man as Sousveillance, meaning "to watch from below", internet vigilantism can work as a type of peer surveillance. This is based on the premise that shame can be used as a form of social control. [2] Augustė Dementavičienė defines the phenomena through the concept of Swarms, which are "Short term relationships between consumers formed for the purpose of achieving a goal". [3] There are muddied overlaps between internet vigilantism and cyberbullying, as both utilize public shaming methods, and cyberbullying may sometimes be conducted under the guise of internet vigilantism. This is in the case that the vigilante "realizes they aren't achieving social justice but utilize it as a means of rationalizing their acts". [4] Cyberbullying often involves publishing of private information to publicly humiliate the target, but is typically driven by the bully's ability to get away with harassment, rather than a desire for social change. [5] Digital vigilantism can also overlap with digital activism, as the awareness of a social issue may increase due to the dissemination of information and weaponization of visibility associated with digital vigilante tactics. Visibility enables the broadening of social outrage, [6] and is used in digital social justice campaigns such as #MiTuInChina. [7]

Methods

The following are methods of internet vigilantism that have been used or proposed for use:

Online shaming

The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression. Online shaming may be used to get revenge (for example, in the form of revenge pornography), stalk, blackmail, or to threaten other internet users. [8] Emotions, social media as a cultural product, and the mediascape, are all important factors as to how online shaming is perceived. [9]

Doxing

The act of publishing personal details online to incur social punishment of the target. [10] In 2019, the Kentucky Senate proposed a bill to ban the doxxing of children after a teenager, Nick Sandmann and a Native American activist, Nathan Phillips were filmed in a confrontation at a protest rally which went viral. [11] Sandmann's father claimed his son endured "The most sensational Twitter attack on a minor child in the history of the Internet." [12]

Reintegrative shaming

Public shaming based on the perspective that the act is meant to shame the behavior rather than the target, and that the target can be redeemed and reintegrated into society. This approach utilizes shame as a means of social control and deterrent from deviating from social norms. [2]

Human flesh search engine

A method originating in China in the early 2000s, which works as a cyber manhunt. It consists of crowdsourcing and pooling together information from the public via online forums to conduct vigilante justice through the Internet. [13]

Information entropy

In the field of internet vigilantism, information entropy is an act intended to disrupt online services. [10]

Denial of Service attacks

DoS and DDoS attacks, a form of information entropy, involve a widespread effort to make a website inaccessible to legitimate users. The method is to overwhelm the website with traffic so that it crashes. [10] DoS attacks grew in popularity due to Low Orbit Ion Cannon (LOIC), which is an open source application that enables denial of service attacks. [14]

Hacktivism

Hacking which is used as a form of political activism. [15]

Scam baiting

When vigilantes interact with scammers simply to waste their time and resources. [6] Others, such as Northern Irish scam baiter Jim Browning, carry out investigative operations infiltrating call centres and intervening in the case of victims who are scammed out of their money. [16]

Identity theft activism

Identity theft activism is similar to scam baiting but deals with identity theft.[ clarification needed ] [6]

Legality

In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer-to-peer computer networks. [17] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm." [18] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports. [19]

Origins

Internet vigilantism originated in the early 2000s. It gained traction as a widespread social phenomena in China, where it has been used as a method of exposing government corruption and utilizing civic engagement. It is also a means of sharing previously censored or unavailable information. The popularity of these activities arose due to the Human flesh search engine, which enables the conduction of cyber manhunts. The first of these manhunts was conducted in 2006, when a video surfaced online of a woman killing a kitten with her high heels. [13] A similar example can be seen in the Netflix TV show Don't F**k with Cats: Hunting an Internet Killer, in which a widespread effort by internet vigilantes is made to track down a serial cat murderer on the Internet, who had been posting anonymous videos of their activities. In 2008, cyber vigilantism was used in Shenzhen, China to expose a government official for attempted child molestation. Surveillance videos from the restaurant in which the assault took place were released on the Internet to expose the official, as he had previously claimed his government position would protect him from incurring any punishment. [13]

Internet vigilantism has also been used to punish online bullies. For example, the case of Megan Meier, a teenager who committed suicide due to online bullying. The perpetrators were doxxed by bloggers who committed themselves to ensuring their social punishment and loss of employment. [6]

In Singapore, cyber vigilantism became a popular form of peer surveillance and is largely viewed as a form of civic engagement. Whereas acts of online vigilantism in China have largely been used as a means of punishment and exposing social corruption, cases in Singapore revolve mainly around exposing fellow citizens for inconsiderate behavior such as not cleaning up after one's dog. Online shaming is viewed by the vigilantes as reintegrative shaming, as they claim their actions are a means of shaming the behavior rather than the perpetrator. This brand of vigilantism is seen as being in line with the morals of a largely collectivist society. [2]

Internet vigilantism can also take the form of Dark Justice, such as when vigilante pedophile hunters pose as children online in order to ensnare sexual predators.

Relationship to authority

Digital vigilantism can be viewed as a menace to the authorities, or an expression of digital citizenship, depending on the context. Vigilantes may view their actions as digital citizenship if they are seeking to improve the safety of online interaction.

According to K.K. Silva, "Vigilantes' responses to perceived malicious activity have reportedly caused the loss of digital evidence, thereby obstructing law enforcement's effort in ascertaining attribution and jurisdiction over cybercrime offences." [20] Therefore internet vigilantism is generally in opposition to legitimate criminal investigations, and viewed as tampering with evidence. [20] However, there are cases in which internet vigilantism is legally protected, such as when it falls under laws relating to protection of the other. [20] There have also been cases in which vigilantes have cooperated with criminal justice investigations, such as the cases of BrickerBot and WannaCry ransomware attack. [20] In both of these cases, vigilantes cooperated with authorities, utilizing cybercrime methods to fight cybercrime and prevent further damage. [20]

Conversely, internet vigilantism can also work for the interests of the Government or for the government, as is sometimes the case in Russia. Two non profit groups practicing internet vigilantism, Liga Bezopasnogo Interneta (LBI, Safe Internet League), and Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), attempted to pass a bill that would enable unpaid volunteers to regulate the Internet, also known as the Cyber Cossak movement. [21] These groups argue that their aim is to identify content that is extreme or dangerous for children such as child porn, and track down the creators of the content", however, the bill has drawn high amounts of skepticism from those who argued that it is reminiscent of Soviet peer surveillance and a breach of data privacy rights. [21]

The Russian youth group Nashi, who conducted a vigilante project called StopXam, had been publicly supported by Vladimir Putin, who had posed for a picture with them. The group became prominent in the Russian media through publicly shaming bad drivers and filming their (often violent) altercations with them. The group fell out of favor with the Russian government and was liquidated after targeting an Olympic athlete. [22]

In the case of the Unite the Right rally in Charlottesville, Virginia, internet vigilantism was used to help police track down violent protestors, as well as bring justice when the police were considered by the public to be doing so inadequately. This included doxing and public shaming of the protestors via Twitter. [11]

Internet vigilante groups

There are many internet vigilante groups permeating the Internet, with different motivations and levels of anonymity.

See also

Related Research Articles

<span class="mw-page-title-main">Vigilantism</span> Civilian who undertakes law enforcement without legal authority

Vigilantism is the act of preventing, investigating and punishing perceived offenses and crimes without legal authority.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

Scam baiting is a form of internet vigilantism primarily used towards advance-fee fraud, IRS impersonation scams, technical support scams, pension scams, and consumer financial fraud.

<span class="mw-page-title-main">Internet fraud</span> Fraud or deception using the Internet

Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace. It is, however, differentiated from theft since, in this case, the victim voluntarily and knowingly provides the information, money or property to the perpetrator. It is also distinguished by the way it involves temporally and spatially separated offenders.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

Dog poop girl refers to a 2005 incident in South Korea which was one of the first internationally reported occurrences of doxing. In a Seoul subway car, a young woman's lap dog defecated inside the train, and the woman was photographed on another passenger's mobile phone camera after she did not clean up the mess despite numerous requests. The photos were posted on a popular Korean website and widely distributed; the woman was later identified, and her personal information was published online. The woman was publicly shamed and quit her university. Newspaper editorials then addressed the issues concerning Internet vigilantism and privacy concerns.

<span class="mw-page-title-main">Bulletproof hosting</span> Internet service for use by cyber-criminals

Bulletproof hosting (BPH) is technical infrastructure service provided by an Internet hosting service that is resilient to complaints of illicit activities, which serves criminal actors as a basic building block for streamlining various cyberattacks. BPH providers allow online gambling, illegal pornography, botnet command and control servers, spam, copyrighted materials, hate speech and misinformation, despite takedown court orders and law enforcement subpoenas, allowing such material in their acceptable use policies.

Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.

The online disinhibition effect refers to the lack of restraint one feels when communicating online in comparison to communicating in-person. People tend to feel safer saying things online which they would not say in real life because they have the ability to remain completely anonymous and invisible when on particular websites, and as a result, free from potential consequences. Apart from anonymity, other factors such as asynchronous communication, empathy deficit, or individual personality and cultural factors also contribute to online disinhibition. The manifestations of such an effect could be in both positive and negative directions; thus, online disinhibition could be classified as either benign disinhibition or toxic disinhibition.

<span class="mw-page-title-main">Internet police</span> Term describing governmental and official involvement in cyber policing

Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing the Internet in a number of countries. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship and propaganda.

<span class="mw-page-title-main">Anti-pedophile activism</span> Form of activism

Anti-pedophile activism encompasses opposition to pedophiles, pedophile advocacy groups, child pornography, and child sexual abuse.

Human flesh search engine is a Chinese term for the phenomenon of distributed researching using Internet media such as blogs and forums. Internet media, namely dedicated websites and Internet forums, are in fact platforms that enable the broadcast of request and action plans concerning human flesh search and that allow the sharing of online and offline search results. Human flesh search has two eminent characteristics. First, it involves strong offline elements including information acquisition through offline channels and other types of offline activism. Second, it always relies on crowdsourcing: web users collaborate to share information, conduct investigations, and perform other actions concerning people or events of common interest.

Researchers study Social media and suicide to find if a correlation exists between the two. Some research has shown that there may be a correlation.

There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.

Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers and adolescents, due to the communication technology advancements and young people's increased use of such technologies. Cyberbullying is when someone, typically a teenager, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.

Online shaming is a form of public shaming in which targets are publicly humiliated on the internet, via social media platforms, or more localized media. As online shaming frequently involves exposing private information on the Internet, the ethics of public humiliation has been a source of debate over internet privacy and media ethics. Online shaming takes many forms, including call-outs, cancellation, doxing, negative reviews, and revenge porn.

Participatory surveillance is community-based monitoring of other individuals. This term can be applied to both digital media studies and ecological field studies. In the realm of media studies, it refers to how users surveil each other using the internet. Either through the use of social media, search engines, and other web-based methods of tracking, an individual has the power to find information both freely or non freely given about the individual being searched. Issues of privacy emerge within this sphere of participatory surveillance, predominantly focused on how much information is available on the web that an individual does not consent to. More so, disease outbreak researchers can study social-media based patterns to decrease the time it takes to detect an outbreak, an emerging field of study called infodemiology. Within the realm of ecological fieldwork, participatory surveillance is used as an overarching term for the method in which indigenous and rural communities are used to gain greater accessibility to causes of disease outbreak. By using these communities, disease outbreak can be spotted earlier than through traditional means or healthcare institutions.

Ghana has one of the highest rates of cybercrime in the world, ranking 7th in a 2008 Internet Crime Survey. The most popular form of cybercrime in Ghana is cyberfraud and is typically achieved via credit card fraud. However, recent decreases in universal credit card usage has seen the expansion of other cybercrimes such as blackmail and hacking. This growth in crime has warranted a government response, with policies specifically addressing the cyberspace being developed. This has necessitated various studies including a cyber security maturity study which was inaugurated by the Ministry of Communications and conducted by the Global Cyber Security Capacity Center (GCSCC) of the University of Oxford in collaboration with the World Bank.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam.

Cybersecurity in popular culture examines the various ways in which the themes and concepts related to cybersecurity have been portrayed and explored in different forms of popular culture, such as music, movies, television shows, and literature. As the digital age continues to expand and the importance of protecting computer systems, networks, and digital information grows, the awareness and understanding of cybersecurity have increasingly become a part of mainstream culture. Popular culture often portraits the gloomy underworld of cybersecurity, where unconventional tactics are used to combat a diverse range of threats to individuals, businesses, and governments. The integration of dark and mysterious elements into cybersecurity stories helps create a sense of uncertainty, rule-breaking, and intriguing ambiguity. This captures the public's attention and highlights the high stakes involved in the ongoing struggle to protect our digital world. This article highlights the creative works and cultural phenomena that have brought cybersecurity issues to the forefront, reflecting society's evolving relationship with technology, privacy, and digital security.

References

  1. Trottier, Daniel (2016-04-01). "Digital Vigilantism as Weaponisation of Visibility". Philosophy & Technology. 30 (1): 55–72. doi: 10.1007/s13347-016-0216-4 . hdl: 1765/98871 . ISSN   2210-5433.
  2. 1 2 3 Skoric, Marko M; Chua, Jia Ping Esther; Liew, Meiyan Angeline; Wong, Keng Hui; Yeo, Pei Jue (2010-12-18). "Online Shaming in the Asian Context: Community Empowerment or Civic Vigilantism?". Surveillance & Society. 8 (2): 181–199. doi: 10.24908/ss.v8i2.3485 . ISSN   1477-7487.
  3. Dementavičienė, Augustė (2019-09-12). "How the New Technologies Shapes the Understanding of the Political Act: the case of Digital Vigilantism". Politologija. 95 (3): 33–55. doi: 10.15388/polit.2019.95.4 . ISSN   2424-6034.
  4. Chang, Lennon Y. C.; Poon, Ryan (2016-03-18). "Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong Kong". International Journal of Offender Therapy and Comparative Criminology. 61 (16): 1912–1932. doi:10.1177/0306624x16639037. ISSN   0306-624X. PMID   26992831. S2CID   7293022.
  5. Chan, Tommy K. H.; Cheung, Christy M. K.; Wong, Randy Y. M. (2019-04-03). "Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives". Journal of Management Information Systems. 36 (2): 574–609. doi: 10.1080/07421222.2019.1599500 . ISSN   0742-1222. S2CID   150424984.
  6. 1 2 3 4 Wehmhoener, Karl Allen (2010). Social norm or social harm: An exploratory study of Internet vigilantism (Thesis). Iowa State University. doi: 10.31274/etd-180810-1388 .
  7. Hou, Lixian (2020-07-02). "Rewriting "the personal is political": young women's digital activism and new feminist politics in China". Inter-Asia Cultural Studies. 21 (3): 337–355. doi:10.1080/14649373.2020.1796352. ISSN   1464-9373. Archived from the original on 2023-01-17. Retrieved 2020-12-06.
  8. Laidlaw, Emily (1 February 2017). "Online Shaming and the Right to Privacy". Laws. 6: 3. doi: 10.3390/laws6010003 . Archived from the original on 24 April 2021. Retrieved 5 April 2020.
  9. Dunsby, Ruth M; Howes, Loene M (2018-07-03). "The NEW adventures of the digital vigilante! Facebook users' views on online naming and shaming". Australian & New Zealand Journal of Criminology. 52 (1): 41–59. doi:10.1177/0004865818778736. ISSN   0004-8658. S2CID   150017891.
  10. 1 2 3 Serracino-Inglott, Philip (2020-08-13), "Is it OK to be an Anonymous?", The Ethics of Information Technologies, Routledge, pp. 243–270, doi:10.4324/9781003075011-18, ISBN   978-1-003-07501-1, archived from the original on 2023-01-17, retrieved 2020-12-06
  11. 1 2 Legocki, Kimberly V.; Walker, Kristen L.; Kiesler, Tina (2020-02-17). "Sound and Fury: Digital Vigilantism as a Form of Consumer Voice". Journal of Public Policy & Marketing. 39 (2): 169–187. doi:10.1177/0743915620902403. ISSN   0743-9156. S2CID   213315677.
  12. Yetter, Deborah. "Father of Covington Catholic's Nick Sandmann still wants 'doxing bill'". The Courier-Journal. Archived from the original on 2023-01-17. Retrieved 2020-12-06.
  13. 1 2 3 Cheong, Pauline Hope; Gong, Jie (December 2010). "Cyber vigilantism, transmedia collective intelligence, and civic participation". Chinese Journal of Communication. 3 (4): 471–487. doi:10.1080/17544750.2010.516580. ISSN   1754-4750. S2CID   89605889.
  14. "LOIC will tear us apart: DDoS tool development and design", The Coming Swarm : DDoS Actions, Hacktivism, and Civil Disobedience on the Internet, Bloomsbury Academic, pp. 109–135, 2014, doi: 10.5040/9781628926705.0012 , ISBN   978-1-62356-822-1
  15. Bandler, J.; Merzon, Antonia (22 June 2020). Law Enforcement's Cybercrime Investigation. Semantic Scholar. pp. 220–244. doi:10.1201/9781003033523-13. ISBN   9781003033523. S2CID   225726296.
  16. Bhattacharjee, Yudhijit (27 January 2021). "Who's Making All Those Scam Calls?". The New York Times. Archived from the original on 27 January 2021. Retrieved 27 January 2021.
  17. "Giving Chase in Cyberspace" (PDF). Archived from the original (PDF) on 2018-05-16. Retrieved 2007-06-06.
  18. "The Truth About The Peer To Peer Piracy Prevention Act". Writ.news.findlaw.com. 2002-10-01. Archived from the original on 2011-06-03. Retrieved 2009-03-03.
  19. "Let Hollywood Hack". Techcentralstation.com. Archived from the original on 2005-02-10. Retrieved 2009-03-03.
  20. 1 2 3 4 5 Bandler, John; Merzon, Antonia (2020-06-22), "Law Enforcement's Cybercrime Investigation", Cybercrime Investigations, Boca Raton, FL: CRC Press, pp. 220–244, doi:10.1201/9781003033523-13, ISBN   978-1-003-03352-3, S2CID   225726296, archived from the original on 2023-01-17, retrieved 2020-10-29
  21. 1 2 3 4 Daucé, Françoise; Loveluck, Benjamin; Ostromooukhova, Bella; Zaytseva, Anna (2019). "From Citizen Investigators to Cyber Patrols: Volunteer Internet Regulation in Russia". Laboratorium: Russian Review of Social Research (3): 46–70. doi: 10.25285/2078-1938-2019-11-3-46-70 . ISSN   2076-8214.
  22. 1 2 Gabdulhakov, Rashid (2019). "Heroes or Hooligans? Media Portrayal of StopXam (Stop a Douchebag) Vigilantes in Russia". Laboratorium: Russian Review of Social Research (3): 16–45. doi: 10.25285/2078-1938-2019-11-3-16-45 . ISSN   2076-8214.
  23. "is it ok to be an anonymous - Google Search". www.google.com. Archived from the original on 2022-10-07. Retrieved 2020-10-29.
  24. Vicenová, Radka; Trottier, Daniel (2020-04-02). ""The first combat meme brigade of the Slovak internet": hybridization of civic engagement through digital media trolling". The Communication Review. 23 (2): 145–171. doi: 10.1080/10714421.2020.1797435 . hdl: 1765/129742 . ISSN   1071-4421.

Further reading