Internet vigilantism

From Wikipedia, the free encyclopedia

Internet vigilantism (sometimes e-vigilantism or digilantism) is the phenomenon of vigilantism occurring on the Internet or carried out by way of the Internet. The term encompasses both vigilantism against Internet scams or crimes, and using the Internet as an additional tool in furthering vigilante responses to non-Internet related behaviour.

Some have suggested that the Internet's lack of central control has prompted a tendency towards vigilante reactions against certain behaviours in the same way that they have prompted those behaviours to occur in the first place.[1]

Contents

[edit] Methods

Methods of Internet vigilantism that have been used or proposed for use have included:

[edit] Scam baiting

Main article: Scam baiting

Scam baiting is the practice of feigning interest in a scam in order to manipulate the scammer behind it. The purpose of scam baiting might be to waste the scammers' time, embarrass him or her, cause them to reveal information which can be passed on to legal authorities in the hope that they will be prosecuted, get them to spend money, or simply to amuse the baiter.

Scam baiting emerged in response to e-mail based frauds such as the common Nigerian 419 scam[2]. Many websites publish transcripts of correspondences between baiters and scammers, and also publish their "trophies" online, which include videos and images scam baiters claim to have obtained from scammers.

[edit] Public shaming

The communications and social networking tools of the Internet have been used as a tool to easily and widely publicise instances of perceived anti-social behaviour.

In 2005 in South Korea, bloggers targeted a woman who refused to clean up when her dog defecated on the floor of a Seoul subway car, labelling her "dog shit girl" (rough translation into English). Another commuter had taken a photograph of her and her dog, and posted it on a popular Korean website.[3] Within days, she had been identified by internet vigilantes, and much of her personal information was exposed on the Internet in an attempt to punish her for the offense. The story received mainstream attention when it was widely reported in South Korean media, and was discussed in Korean communities in the United States as well. The public humiliation led the woman to quit her university, according to reports[4].

The reaction by Korean netizens to the incident prompted several Korean newspapers to run editorials voicing concern over Internet vigilantism. One paper quoted Daniel Solove as saying that the woman was the victim of a "cyber-posse, tracking down norm violators and branding them with digital Scarlet Letters."[5] Another called it an "Internet witch-hunt," and went on to say that "[t]he Internet is turning the whole society into a kangaroo court."[6]

Other notable instances also include the case of Evan Guttman and his friend's stolen Sidekick II [7], and the case of Jesse McPherson and his stolen Xbox 360, Powerbook and TV.[8]

David Furlow, chairman of the Media, Privacy and Defamation Committee of the American Bar Association, has identified the potential privacy concerns raised by websites facilitating the distribution of information that is not part of the public record (documents filed with a government agency), and has said that such websites "just [give] a forum to people whose statements may not reflect truth."[9]

[edit] Counter-terrorism

Shannen Rossmiller is an American judge, serving in Montana, who has a controversial role as a vigilante online terrorist-hunter, posing as militant anti-American Muslim radicals online, hoping to attract the eye of those with similar mindsets.[10]

[edit] Anti-pedophile activism

Perverted Justice, is a well-known example of an anti-pedophile organization that aims to expose and convict adults who solicit minors in order to commit child sexual abuse on the Internet. They often collaborate with law enforcement and television crews. Some freely hosted blogs claim to expose real or potential child sex offenders.

Another initiative, Predator Hunter, headed by Wendell Kreuth, aims to track down and expose the pornography-related activities of alleged 'sexual predators'. In 2002, Kreuth disclosed details of his activities in an interview with Minnesota Public Radio.[11]

Members of an Anonymous group was identified as responsible for the arrest of suspected pedophile Chris Forcand. They contacted the police after some members were "propositioned" by Forcand with "disgusting photos of himself".[12] Anonymous were described as "cyber-vigilantes who seek to out anyone who presents with a sexual interest in children".[13][14]

[edit] Identity theft activism

Main article: Identity theft

Organizations similar to vigilante action against pedophiles also target ID theft. Posing as ID thieves, they gather stolen personal information such as "dumps" (the raw encoded information contained on a payment or identification card's magnetic stripe, microchip or transponder), bank account numbers and login information, social security numbers, etc. They then pass this information on to the associated banks, to credit monitoring companies, or to law enforcement.

Other groups specialize in the removal of phishing websites, fake banks, and fraudulent online storefronts, a practice known as "site-killing". Artists Against 419 is a site specializing in the removal of fake bank websites. Such groups often use tactics like "flash-mobbing" (though the term technically refers to real-world mass gatherings) and bandwidth hogging, both of which are intentional denial-of-service attacks on the offending website, with the aim of drawing attention to the site by its hosting service or rapid consumption of the site's monthly bandwidth allowance.

[edit] Legislative framework

In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Privacy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer to peer computer networks.[1] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."[15] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.[16]

[edit] See also

[edit] References

[edit] External links