Online uncovering in Hong Kong

Last updated

Online uncovering, also called doxing, is the practice of revealing private information about an individual or organization gathered from online sources. Methods include searching public databases, social media and email accounts, and hacking. When done by private individuals it is a form vigilantism. It can also be used by law enforcement departments. For example, it helped the Hong Kong Police Force [1] to investigate the background information of suspects. [2] Driven by the prevalence of the internet and online forums such as the Golden Forum, online uncovering has become a social phenomenon in Hong Kong. It is used to shame, harass, and tarnish of reputation of the victims.

Details

Online uncovering is a kind of cyber bullying. [3] With online uncovering, the personal information, like the occupation, family members, home address, and telephone numbers, of the victims will be disclosed without any permission, which causes a great nuisance to them. People may spread out one's information to humiliate one, make one ashamed and infringe on one's privacy. [4] Also, people tend to share videos of people's misconduct in public to the Internet, stirring up discussions and debates, also online uncovering of the people in the videos.

Examples

YearIncidentsReasons
2013$10 red pocket girl

She dissatisfied with the amount of pocket money her relative gave, and vented her anger on Facebook. [5]

2012Haklam event

He claimed he is a member of triad society in city forum and the strange dressing and behavior had aroused public awareness. [6]

2012$500 Material girl

She rejected people to come to her wedding if they only gave $500 for blessing. [7]

2010Giving-seat boy

A teenager who claimed that he was a child although he was a secondary 5 student. He was blamed by netizens after his video of occupying seats unreasonably was uploaded on YouTube. [8]

200930% off material girl

A lady was dissatisfied unilaterally with the unreasonable pricing of building materials company. In an attempt to vent her anger on the Internet, she was doubted by many netizens and finally led to uncovering of her. [9]

2006 Uncle Bus EventHe argued with other as other passengers dissatisfied with his loud voice on a Kowloon Motor Bus bus. [10] [11]

Method Used

There are various uncovering methods. Most cases are attributed to the victims’ mismanagement of personal information online. [12]

Search Engine

Hackers will utilize engines such as Google to uncover the personal information through blogs, social networking websites or forums.

Software cracker

Hackers will uncover the IP address of the targeted person through interception software. They can also uncover personal information by discovering the Internet Services Provider of the IP address. Installing spyware and virus to the computer could misappropriate personal information either easily.

Social Engineering

Social Engineering means hackers tempt the target to disclose personal information via multiple approaches. They may also collect and gather information from the cyber friends of the target. Such actions may likely breach the law.

Forum

Some HK online forums such as Golden Forum have set the (Betray Friends page) to encourage netizens to post the photos of their fellows. But information disclosure is forbidden.

Impacts on Victims

Positive side

Most of the victims in online uncovering were doing something inappropriate, from maltreating animals to impolite actions. Through online uncovering, victims’ inappropriate actions would be pointed out. They would realize they were doing something wrong and make apologies or follow up actions. Just take the case of maltreating cat last year as an example. A student from City University maltreated his cat in hall and a picture was taken and posted on social networks. After the online uncovering, he made apology and promised maltreatments would not happen again. [13]

Negative side

After online uncovering, victims’ personal information would be found out and circulated on the internet; such as, telephone number, address and photos. They would be annoyed by nonstop phone calls or even recognized by others on the street and criticized them. These all made them face a high pressure and some even suffer from mental illness, the case of material girl $500 was one of the examples. [14]

Related Research Articles

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Social engineering (security)</span> Psychological manipulation of people into performing actions or divulging confidential information

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior.

Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.

<span class="mw-page-title-main">Anonymous (hacker group)</span> Decentralized hacktivist group

Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.

<span class="mw-page-title-main">Cyberethics</span> Ethics of online activities

Cyberethics is "a branch of ethics concerned with behavior in an online environment". In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet." For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online.

<span class="mw-page-title-main">Christina Chan</span>

Christina Chan is a political activist in Hong Kong, known for her stand on human rights, democracy and Tibetan independence. She is enrolled in a premaster's degree in philosophy in the University of Hong Kong.

Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

Cyberbullying is a form of bullying or harassment using electronic means. It has become increasingly common, especially among teenagers and adolescents, due to young people's increased use of social media. Related issues include online harassment and trolling. In 2015, according to cyberbullying statistics from the i–Safe Foundation, over half of adolescents and teens had been bullied online, and about the same number had engaged in cyberbullying. Both the bully and the victim are negatively affected, and the intensity, duration, and frequency of bullying are three aspects that increase the negative effects on both of them.

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

The following outline is provided as an overview of and topical guide to computer security:

<span class="mw-page-title-main">Beauty beggar</span> Internet slang

Beauty beggar is a derogatory name for beauty bloggers or beauty YouTubers who capitalize their fame to promote cosmetics so as to obtain sponsorship, in the form of testers or money, from cosmetics companies. It is a Hong Kong internet slang that originated from discussions on Instagram and Hong Kong Golden Forum.

A cyber manhunt in Hong Kong is a term for the behavior of tracking down and exploring an individual's private information via internet media. A cyber manhunt generally involves netizens and is regarded as the purpose of a cyber judgment to the target through blaming, shaming, and naming culprits.

Cantonese Internet Slang is an informal language originating from Internet forums, chat rooms, and other social platforms. It is often adapted with self-created and out-of-tradition forms. Cantonese Internet Slang is prevalent among young Cantonese speakers and offers a reflection of the youth culture of Hong Kong.

Vastaamo was a Finnish private psychotherapy service provider founded in 2008. On 21 October 2020, Vastaamo announced that its patient database had been hacked. Private information obtained by the perpetrators was used in an attempt to extort Vastaamo and, later, its clients. The extorters demanded 40 bitcoins, roughly worth 450,000 euros at the time, and threatened to publish the records if the ransom was not paid. To add pressure to their demands, the extorters published hundreds of patient records a day on a Tor message board.

The Shanghai police database leak refers to the unauthorized disclosure of sensitive personal information and police case data from the Shanghai National Police Database, also known as the SHGA Database, in early July 2022. The leaked data, totaling over 23 terabytes, includes details of more than one billion Chinese residents, encompassing names, addresses, birthplaces, resident ID card numbers, phone numbers, photos, mobile phone numbers, and information on criminal cases. The data was made available for sale on the internet by an unidentified hacker, who demanded a price of 10 bitcoins.

References

  1. 互聯網發展迅速網絡搜尋屢助破案
  2. 偷龍轉鳳盜iphone賊落網
  3. 逾三成學生遭網絡欺凌
  4. 影響——扭曲價值觀 遇不滿放網上
  5. 收$10利是 港女咒派發者 遭起底 變網上欺凌對象
  6. Haklam Homepage
  7. 準新娘︰人情500元不要來
  8. 探射燈:末代會考生淪「巴士毒男」
  9. 網絡聲討「寸爆七折港女」
  10. The Bus Uncle
  11. Uncle Bus
  12. 起底文化流行 網絡欺凌惹關注
  13. "City University student who taped his cat to a wall turns himself in". South China Morning Post . 2012-12-17. Archived from the original on 2015-04-18.
  14. 「港女500」擺午餐婚宴喊住認錯