Assassination market
An assassination market or market for assassinations is a prediction market where any party can place a bet (using anonymous electronic money, and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they "guess" the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject's death. Because the payoff is for knowing the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.[1]
Early uses of the terms "assassination market" and "market for assassinations" can be found (in both positive and negative lights) in 1994's "The Cyphernomicon"[2] by Timothy C. May, a cypherpunk. The concept and its potential effects are also referred to as assassination politics, a term popularized by Jim Bell in his 1997 essay of the same name[3][4]
It has been argued[5] that the feasibility of an assassination market precludes the development of any form of anonymous electronic money.
Left-anarchist Matt Taylor, another cypherpunk, declared in May 2001 that he was advancing assassination politics by taunting Ohio and California police online.[6] He began an initiative called Operation Soft Drill — a name which reporter Declan McCullagh wrote was created by Bell — with the stated intention of intimidating police and corporate polluters into respecting human rights.[7]
See also
References
- ^ Harkin, James (2009). Lost in Cyburbia. p. 239.
- ^ May, Timothy C. (September 10, 1994). "The Cyphernomicon: Cypherpunks FAQ and More, Version 0.666". Cypherpunks.to. pp. Sections 4 & 16. http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html. Retrieved February 28, 2011.
- ^ Bell, Jim (April 3, 1997). "Assassination Politics". Infowar. http://www.jrbooksonline.com/PDF_Books/AP.pdf. Retrieved February 28, 2011.
- ^ McCullagh, Declan (April 14, 2000). "Crypto-Convict Won't Recant". Wired News. http://www.wired.com/politics/law/news/2000/04/35620. Retrieved January 14, 2008.
- ^ http://packetstormsecurity.org/papers/contest/Richard_Kay.txt
- ^ McCullagh, Declan (June 9, 2001). "Ashcroft's Hard Line on Hardcore". Wired News. http://www.wired.com/politics/law/news/2001/06/44398?currentPage=2. Retrieved January 14, 2008.
- ^ McCullagh, Declan (May 15, 2001). "Online Cincy Cop Threats Probed". Wired News. http://www.wired.com/politics/law/news/2001/05/43771. Retrieved January 14, 2008.
- Hess, Patrick (2002). Cyberterrorism and Information War. Anmol Pubs. ISBN 9788126111619. http://books.google.com/?id=v9NSYnE3G_sC&pg=PA89&dq=%22Assassination+politics%22+Timothy.
- Thomas, Douglas; Loader, Brian (2000). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge. ISBN 9780415213264. http://books.google.com/?id=ZlkOcTP6A_AC&pg=PA126&dq=%22Assassination+politics%22+Timothy.
- Sukumaran, R. (2004). "Cryptology, digital assassination and the terrorism futures markets". Strategic Analysis 28 (2): 219–236. doi:10.1080/09700160408450129. http://www.idsa.in/system/files/strategicanalysis_sukumaran_0604.pdf.
- Clarke, R.; Dempsey, G.; Ooi, C. N.; O'Connor, R. F. (16–17 February 1998). "Technological Aspects of Internet Crime Prevention". Proc. Conf. "Internet Crime". Australian Institute for Criminology, Melbourne University.
External links