Internet vigilantism
   HOME

TheInfoList



OR:

Internet vigilantism is the act of carrying out
vigilante Vigilantism () is the act of preventing, investigating and punishing perceived offenses and crimes without legal authority. A vigilante (from Spanish, Italian and Portuguese “vigilante”, which means "sentinel" or "watcher") is a person who ...
activities through the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior. The expanding scope of media savvy and online interaction has enabled vigilantes to utilize methods specific to the internet in order to distribute justice to parties they consider to be corrupt, but who have not committed a formal crime or have not been held accountable by the criminal justice system. Internet Vigilantism originated in the early 2000s and has since evolved to include a variety of methods such as hacking, baiting, and public shaming. Internet vigilantism changes in cultural and political drive depending on location, and has varying relationships to state authority depending on context. There are many internet vigilante groups as well as individuals.


Description

The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one's own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck identifies the four main forms of internet vigilantism as: flagging, investigation, hounding, and organized denunciation. Also referred to by Steve Man as Sousveillance, meaning "to watch from below", internet vigilantism can work as a type of peer surveillance. This is based on the premise that shame can be used as a form of social control. Augustė Dementavičienė defines the phenomena through the concept of Swarms, which are "Short term relationships between consumers formed for the purpose of achieving a goal". There are muddied overlaps between internet vigilantism and cyber
bullying Bullying is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate. The behavior is often repeated and habitual. One essential prerequisite is the perception (by the bully or by others) of an ...
, as both utilize public shaming methods, and cyber
bullying Bullying is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate. The behavior is often repeated and habitual. One essential prerequisite is the perception (by the bully or by others) of an ...
may sometimes be conducted under the guise of internet vigilantism. This is in the case that the vigilante "realizes they aren't achieving social justice but utilize it as a means of rationalizing their acts". Cyber
Bullying Bullying is the use of force, coercion, hurtful teasing or threat, to abuse, aggressively dominate or intimidate. The behavior is often repeated and habitual. One essential prerequisite is the perception (by the bully or by others) of an ...
often involves publishing of private information to publicly humiliate the target, but is typically driven by the bully's ability to get away with harassment, rather than a desire for social change. Digital vigilantism can also overlap with digital activism, as the awareness of a social issue may increase due to the dissemination of information and weaponization of visibility associated with digital vigilante tactics.  Visibility enables the broadening of social outrage, and is used in digital social justice campaigns such as #MiTuInChina.


Methods

The following are methods of Internet vigilantism that have been used or proposed for use:


Online shaming

The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression. Online shaming may be used to get
revenge Revenge is committing a harmful action against a person or group in response to a grievance, be it real or perceived. Francis Bacon described revenge as a kind of "wild justice" that "does... offend the law ndputteth the law out of office." P ...
(for example, in the form of revenge pornography), stalk,
blackmail Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. It is often damaging information, and it may be revealed to fa ...
, or to threaten other internet users. Emotions, social media as a cultural product, and the mediascape, are all important factors as to how online shaming is perceived.


Doxing

The act of publishing personal details online to incur social punishment of the target. In 2019, the Kentucky Senate proposed a bill to ban the doxxing of children after a teenager, Nick Sandmann and a Native American activist, Nathan Phillips were filmed in a confrontation at a protest rally which went viral. Sandmann's father claimed his son endured "The most sensational Twitter attack on a minor child in the history of the internet."


Reintegrative shaming

Public shaming based on the perspective that the act is meant to shame the behavior rather than the target, and that the target can be redeemed and reintegrated into society. This approach utilizes shame as a means of social control and deterrent from deviating from social norms.


Human flesh search engine

A method originating in China in the early 2000s, which works as a cyber manhunt. It consists of crowdsourcing and pooling together information from the public via online forums to conduct vigilante justice through the internet.


Information entropy

In the field of internet vigilantism, information entropy is an act intended to disrupt online services.


Denial of Service attacks

DoS and DDoS attacks, a form of information entropy, involve a widespread effort to make a website inaccessible to legitimate users. The method is to overwhelm the website with traffic so that it crashes. DoS attacks grew in popularity due to Low Orbit Ion Cannon (LOIC), which is an open source application that enables denial of service attacks.


Hacktivism

Hacking which is used as a form of political activism.


Scam baiting

When vigilantes interact with scammers simply to waste their time and resources. Others, such as Northern Irish scam baiter Jim Browning, carry out investigative operations infiltrating call centres and intervening in the case of victims who are scammed out of their money.


Identity theft activism

Identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
activism is similar to scam baiting but deals with identity theft.


Legality

In 2002 in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
, Representative
Howard Berman Howard Lawrence Berman (born April 15, 1941) is an American attorney and retired politician who served as a U.S. representative from California from 1983 to 2013. A member of the Democratic Party, he represented the state's 26th congressional d ...
proposed th
''Peer to Peer Piracy Prevention Act''
which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
computer networks. Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."
Smith College Smith College is a private liberal arts women's college in Northampton, Massachusetts. It was chartered in 1871 by Sophia Smith and opened in 1875. It is the largest member of the historic Seven Sisters colleges, a group of elite women's coll ...
assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as
metal detector A metal detector is an instrument that detects the nearby presence of metal. Metal detectors are useful for finding metal objects on the surface, underground, and under water. The unit itself, consist of a control box, and an adjustable shaft, ...
s at
airport An airport is an aerodrome with extended facilities, mostly for commercial air transport. Airports usually consists of a landing area, which comprises an aerially accessible open space including at least one operationally active surfa ...
s.


Origins

Cyber Vigilantism originated in the early 2000s. It gained traction as a widespread social phenomena in China, where it has been used as a method of exposing government corruption and utilizing civic engagement. It is also a means of sharing previously censored or unavailable information. The popularity of these activities arose due to the Human flesh search engine, which enables the conduction of cyber manhunts. The first of these manhunts was conducted in 2006, when a video surfaced online of a woman killing a kitten with her high heels. A similar example can be seen in the Netflix TV show Don't F**k with Cats: Hunting an Internet Killer, in which a widespread effort by internet vigilantes is made to track down a serial cat murderer on the internet, who had been posting anonymous videos of their activities. In 2008, cyber vigilantism was used in Shenzhen China to expose a government official for attempted child molestation. Surveillance videos from the restaurant in which the assault took place were released on the internet to expose the official, as he had claimed his government position would protect him from incurring any punishment. Cyber Vigilantism has also been used to punish online bullies. For example, the case of Megan Meier, a teenager who committed suicide due to online bullying. The perpetrators were
doxxed Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the internet. Historically, the term has been used interchangeably to refer to both the aggregation of this in ...
by bloggers who committed themselves to ensuring their social punishment and loss of employment. In
Singapore Singapore (), officially the Republic of Singapore, is a sovereign island country and city-state in maritime Southeast Asia. It lies about one degree of latitude () north of the equator, off the southern tip of the Malay Peninsula, bor ...
, cyber vigilantism became a popular form of peer surveillance and is largely viewed as a form of civic engagement. Whereas acts of online vigilantism in China have largely been used as a means of punishment and exposing social corruption, cases in
Singapore Singapore (), officially the Republic of Singapore, is a sovereign island country and city-state in maritime Southeast Asia. It lies about one degree of latitude () north of the equator, off the southern tip of the Malay Peninsula, bor ...
revolve mainly around exposing fellow citizens for inconsiderate behavior such as not cleaning up after one's dog. Online shaming is viewed by the vigilantes as redintegrative shaming, as they claim their actions are a means of shaming the behavior rather than the perpetrator. This brand of vigilantism is seen as being in line with the morals of a largely collectivist society. Internet Vigilantism can also take the form of Dark Justice, such as when vigilante pedophile hunters pose as children online in order to ensnare sexual predators.


Relationship to Authority

Digital vigilantism can be viewed as a menace to the authorities, or an expression of digital citizenship, depending on the context. Vigilantes may view their actions as digital citizenship if they are seeking to improve the safety of online interaction. According to K.K Silva, "Vigilantes’ responses to perceived malicious activity have reportedly caused the loss of digital evidence, thereby obstructing law enforcement's effort in ascertaining attribution and jurisdiction over cybercrime offences." Therefore internet vigilantism is generally in opposition to legitimate criminal investigations, and viewed as tampering with evidence. However, there are cases in which internet Vigilantism is legally protected, such as when it falls under laws relating to protection of the other. There have also been cases in which vigilantes have cooperated with criminal justice investigations, such as the cases of
BrickerBot BrickerBot was malware that attempted to permanently destroy ( "brick") insecure Internet of Things devices. BrickerBot logged into poorly-secured devices and ran harmful commands to disable them. It was first discovered by Radware after it attac ...
and WannaCry ransomware attack. In both of these cases, vigilantes cooperated with authorities, utilizing cyber
crime In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in C ...
methods to fight cyber
crime In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in C ...
and prevent further damage. Conversely, Internet Vigilantism can also work for the interests of the Government or for the government, as is sometimes the case in
Russia Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-ei ...
. Two non profit groups practicing internet vigilantism, Liga Bezopasnogo Interneta (LBI, Safe Internet League), and Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), attempted to pass a bill that would enable unpaid volunteers to regulate the internet, also known as the Cyber Cossak movement. These groups argue that their aim is to identify content that is extreme or dangerous for children such as child porn, and track down the creators of the content", however the bill has drawn a lot of skepticism from those who argue it is reminiscent of Soviet era peer surveillance, and that it's a breach of data privacy rights. The Russian youth group Nashi (youth movement), who conducted a vigilante project called StopXam (organization), has even been publicly supported by
Vladimir Putin Vladimir Vladimirovich Putin; (born 7 October 1952) is a Russian politician and former intelligence officer who holds the office of president of Russia. Putin has served continuously as president or prime minister since 1999: as prime min ...
, who has posed for a picture with them. The group became prominent in the Russian media through publicly shaming bad drivers and filming their (often violent) altercations with them. The group fell out of favor with the Russian government and was liquidated after targeting an Olympic Athlete. In the case of the Unite the Right
rally Rally or rallye may refer to: Gatherings * Demonstration (political), a political rally, a political demonstration of support or protest, march, or parade * Pep rally, an event held at a United States school or college sporting event Sports ...
in
Charlottesville Charlottesville, colloquially known as C'ville, is an independent city in the Commonwealth of Virginia. It is the county seat of Albemarle County, which surrounds the city, though the two are separate legal entities. It is named after Queen ...
Virginia Virginia, officially the Commonwealth of Virginia, is a state in the Mid-Atlantic and Southeastern regions of the United States, between the Atlantic Coast and the Appalachian Mountains. The geography and climate of the Commonwealth are ...
, internet vigilantism was used to help police track down violent protestors, as well as bring justice when the police were considered by the public to be doing so inadequately. This included
doxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the internet. Historically, the term has been used interchangeably to refer to both the aggregation of this in ...
and public shaming of the protestors via Twitter.


Internet Vigilante Groups

There are many internet vigilante groups permeating the internet, with different motivations and levels of anonymity.
Anonymous (group) Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Chu ...
A hacktivist group responsible for
Operation Payback Operation or Operations may refer to: Arts, entertainment and media * ''Operation'' (game), a battery-operated board game that challenges dexterity * Operation (music), a term used in musical set theory * ''Operations'' (magazine), Multi-Ma ...
Liga Bezopasnogo Interneta (LBI, Safe Internet League) A Russian non-profit dedicated to regulating extremist material online. Molodezhnaia Sluzhba Bezopasnost (Youth Security Service) A Russian non-profit dedicated to regulating extremist material online. StopXam (organization), also known as "Stop a Douchebag", is a Russian youth group that publicly shames bad drivers via online videos. Zomri A Slovak online community which publishes political satire on Facebook, in means of inspiring civic engagement.


See also

*
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
*
Call-out culture Cancel culture, or rarely also known as call-out culture, is a phrase contemporary to the late 2010s and early 2020s used to refer to a form of ostracism in which someone is thrust out of social or professional circles—whether it be online, on ...
*
Conflict-of-interest editing on Wikipedia Conflict-of-interest (COI) editing on Wikipedia occurs when editors use Wikipedia to advance the interests of their external roles or relationships. The type of COI editing of most concern on Wikipedia is paid editing for public relations (PR) ...
*
Crowdsourcing Crowdsourcing involves a large group of dispersed participants contributing or producing goods or services—including ideas, votes, micro-tasks, and finances—for payment or as volunteers. Contemporary crowdsourcing often involves digita ...
* Human flesh search engine *
Internet activism Internet activism is the use of electronic communication technologies such as social media, e-mail, and podcasts for various forms of activism to enable faster and more effective communication by citizen movements, the delivery of particular inf ...
*
Patriotic hacking Patriotic hacking is a term for computer hacking or system cracking in which citizens or supporters of a country, traditionally industrialized Western countries but increasingly developing countries, attempt to perpetrate attacks on, or block at ...
* Scam baiting


References


Further reading

* Cheong, P. H., & Gong, J. (2010)
Cyber vigilantism, transmedia collective intelligence, and civic participation.
, Chinese Journal of Communication, 3(4), 471–487. * Byrne, Dara N
419 Digilantes and the Frontier of Radical Justice Online.
Radical History Review, Vol. 117, 2013, p. 70-82. * Rolon, Dario N
Vigilancia informatica y responsabilidad penal de los proveedores de internet
* Lennon Y.C. Chang and Ryan Poon (2016)
Internet Vigilantism: Attitudes and Experiences of University Students in Hong Kong
, International Journal of Offender Therapy and Comparative criminology. () *Lennon Chang and Andy Leung (2015)
An introduction of cyber-crowdsourcing (human flesh searching) in the Greater China region
In Smith, R., Cheung, R and Lau, L. (eds) Cybercrime Risks and Responses: Eastern and Western Perspectives (pp, 240–252). NY: Palgrave.


External links


'From flash mob to lynch mob'
CNN, June 5, 2007 {{DEFAULTSORT:Internet Vigilantism Vigilantism