Jump to content

Internet vigilantism

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Dynex811 (talk | contribs) at 02:54, 22 May 2010 (→‎YouTube cat abuse incident). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Internet vigilantism is the phenomenon of vigilantic acts taken through the Internet (the communication network or its service providers) or carried out using applications (World Wide Web, e-mail) that depend on the Internet. The term encompasses vigilantism against scams, crimes, and non-Internet related behavior.

Some have suggested that the internet's lack of central control has prompted a tendency towards vigilante reactions against certain behaviors in the same way that they have prompted those behaviors to occur in the first place.[1]

Methods

The following are methods of Internet vigilantism that have been used or proposed for use:

Scam baiting

Scam baiting is the practice of feigning interest in a scam in order to manipulate the scammer behind it. The purpose of scam baiting might be to waste the scammers' time, embarrass him or her, cause them to reveal information which can be passed on to legal authorities in the hope that they will be prosecuted, get them to spend money, or simply to amuse the baiter.

Scam baiting emerged in response to e-mail based frauds such as the common Nigerian 419 scam. Many websites publish transcripts of correspondences between baiters and scammers, and also publish their "trophies" online, which include videos and images scam baiters have obtained from scammers.

Public shaming

The social networking tools of the World Wide Web have been used as a tool to easily and widely publicize instances of perceived anti-social behavior.

David Furlow, chairman of the Media, Privacy and Defamation Committee of the American Bar Association, has identified the potential privacy concerns raised by websites facilitating the distribution of information that is not part of the public record (documents filed with a government agency), and has said that such websites "just [give] a forum to people whose statements may not reflect truth."[2]

Notable examples

YouTube cat abuse incident

A video of a young male physically abusing a cat was posted on YouTube. After 30,000 views, YouTube removed the video and blocked the hosting account. Anonymous members investigated, identifying the individual as Kenny Glenn and reported him to local law enforcement. Two minors were arrested on charges of cruelty to animals.[3][4]

Dog Poop Girl

In 2005 in South Korea, bloggers targeted a woman who refused to clean up when her dog defecated on the floor of a Seoul subway car, labeling her "dog poop girl" (rough translation into English). Another commuter had taken a photograph of the woman and her dog, and posted it on a popular Korean website.[5] Within days, she had been identified by internet vigilantes, and much of her personal information was exposed on the World Wide Web in an attempt to punish her for the offense. The story received mainstream attention when it was widely reported in South Korean media, and was discussed in Korean communities in the United States as well. The public humiliation led the woman to quit her university, according to reports.[6]

The reaction by Korean citizens to the incident prompted several Korean newspapers to run editorials voicing concern over Internet vigilantism. One paper quoted Daniel Solove as saying that the woman was the victim of a "cyber-posse, tracking down norm violators and branding them with digital Scarlet Letters."[7] Another called it an "Internet witch-hunt," and went on to say that "the Internet is turning the whole society into a kangaroo court."[8]

Evan Guttman and the Stolen Sidekick

Other notable instances also include the case of Evan Guttman and his friend's stolen Sidekick II smartphone,[9][10] and the case of Jesse McPherson and his stolen Xbox 360, Powerbook, and TV.[11][12]

Amir Massoud Tofangsazan

Amir Tofangsazan is a resident of Barnet, United Kingdom of Iranian origin who is alleged to have defrauded Thomas Sawyer, an eBay buyer also in the UK.[13] In an example of Internet vigilantism, Sawyer erected a satirical blog and popularized it in order to shame Tofangsazan into refunding his money and apologizing. The Blogger username he used is laptopguy.

Sawyer allegedly received, although two months late, a laptop of lower specifications than those advertised. Furthermore, the appliance was allegedly not operable even with the new charger it required. Sawyer was eventually able to recover data stored on the hard disk of the laptop, upon which it is claimed that he discovered numerous items of personal and financial information relating to Amir and his family, as well as pornography (including images depicting foot fetishism and male homosexuality), and what appear to be camera phone images of the legs of women on the London Underground. He was also able to gain access to Amir's email, and mass-mail contacts in his address book with instructions on how to access a blog featuring the aforementioned photos and information.[14][15][16]

In October 2009, Tofangsazan was convicted of defrauding the Financial Times and was sentenced to two years in jail.[17]

Zhang Ya & Sichuan Earthquake

In 2008, a girl called Zhang Ya (张雅) from Liaoning province, Northeast China, posted a 4 minute video of herself complaining about the amount of attention the Sichuan earthquake victims were receiving on television.[18] An intense response from Internet vigilantes[19] resulted in the girl's personal details[20] (even including her blood type) being made available online, as well as dozens of abusive video responses on Chinese websites and blogs.[21] The girl was taken into police custody for three days as protection from vigilante death threats.[22]

Stephen Fowler and Wife Swap

Stephen Fowler, an English expatriate and venture capitalist businessman, gained notoriety after his performance on ABC's Wife Swap (originally aired Friday January 30, 2009) when his wife exchanged positions in his family with a woman from Missouri for a two-week period. In response to her rule changes (standard procedure for the second week in the show) he insulted his guest and, in doing so, groups including the lower classes, soldiers, and the overweight. Several websites were made in protest against his behaviour, such as StephenFowlerSucks.com.[23][24] After the show, and after watching the Wife Swap video, his wife, a professional life coach, reported that she had encouraged him to attend professional behaviour counselling. Businesses with only tangential connection to Fowler publicly disclaimed any association with him due to the negative publicity.[25] He resigned positions on the boards of two environmental charities to avoid attracting negative press.

Cyclist abuser Incident

In 2008, Patrick Pogan, a rookie police officer, body-slamming Christopher Long , a free-spirited cyclist, surfaced on the Internet. The altercation happened when members of Critical Mass conducted a bicycling advocacy event at Time Square. [26] The officer claimed the cyclist had veered into him, and so the biker was charged with assault, disorderly conduct and resisting arrest.

The video [27] went viral on the internet and after being viewed for over 2 million times. The charges against the cyclist were later dropped and Pogan was found to be guilty and was convicted for lying about confrontation with cyclist. [28]

Vigilante group torments Mother

In 2009, a Facebook group was started, accusing a single mother for the death of a 13 month old child in her foster care. It was the Mother's, then-common-law husband who pleaded guilty to manslaughter and the mother was not accused of any wrongdoing. [29]

The Facebook group identifies the mother, her ex-husband which is a violation of all laws. The group which was started to stop child murderers, does not explain how it plans to accomplish the goal. Instead the group discusses only this particular incident and has many posts directly attacking the mother and accusing her.

Distributed denial of service

A DDoS attack can be used to take down malicious websites, such as those being used for phishing or drive-by downloads. Thousands of people generate traffic to a website, flooding it such that it goes over quota or simply can't serve that many requests in a timely manner.

Counter-terrorism

Shannen Rossmiller is an American judge, serving in Montana, who has a controversial role as a vigilante online terrorist-hunter, posing as militant anti-American Muslim radicals online, hoping to attract the eye of those with similar mindsets.[30]

Anti-pedophile internet vigilantism

Perverted Justice is a well-known example of an anti-pedophile organization that aims to expose and convict adults who, using email or web sites, solicit minors in order to commit child sexual abuse. They often collaborate with television crews. Some freely hosted blogs claim to expose real or potential child sex offenders.

Another initiative, Predator Hunter, headed by Wendell Kreuth, aims to track down and expose the pornography-related activities of alleged 'sexual predators'. In 2002, Kreuth disclosed details of his activities in an interview with Minnesota Public Radio.[31]

Members of the subculture "Anonymous" have also been credited for seeking out pedophiles and collaborating with law enforcement.[32][33] They describe themselves as a collection of individuals united by ideas. They left a mark with the arrest of Canadian pedophile, Chris Forcand.

In the UK, the Internet Watch Foundation cooperate with ISPs to filter access to certain internet sites. As an unelected body with no accountability, transparency or appeal mechanism they fulfil many of the requirements of vigilantism. In particular, the punishment the IWF use (restricting access to domains via a proxy) is technically poor and results in damage to organisations and individuals unconnected with the object of their disapproval.

Anti-racism activism

Few online use tactics similar to anti-pedophile activists to combat racism, harassing and destroying racist groups on MySpace and other social web services.

Identity theft activism

Organizations similar to vigilante action against pedophiles also target ID theft. Posing as ID thieves, they gather stolen personal information such as "dumps" (the raw encoded information contained on a payment or identification card's magnetic stripe, microchip or transponder), bank account numbers and login information, social security numbers, etc. They then pass this information on to the associated banks, to credit monitoring companies, or to law enforcement.

Other groups specialize in the removal of phishing websites, fake banks, and fraudulent online storefronts, a practice known as "site-killing". Artists Against 419 is a web site specializing in the removal of fake bank websites. Such groups often use tactics like DDoS attacks on the offending website, with the aim of drawing attention to the site by its hosting service or rapid consumption of the site's monthly bandwidth allowance. The Artists Against 419 always argued their tools were not a denial-of-service attack. At any rate they abandoned such tactics some time ago.[34]

Profit

Some companies engage in internet vigilantism for profit. One such example is MediaDefender, a company which used methods such as entrapment, P2P poisoning, and DDoS attacks.

Political activism

Groups may engage in internet vigilantism to spread a political message, or to exert nationalism. One example is the Heart China phenomenon which occurred within the People's Republic of China and various overseas Chinese diaspora communities. Chinese netizens were outraged by events such as protests during the 2008 Olympic Torch Relay and claims of biased reporting from western media, and so blogs, forums and websites throughout the Chinese-speaking world were filled with nationalistic sentiment.[35] One website, Anti-CNN, claimed that media such as CNN and BBC reported selectively regarding the 2008 Tibetan unrest and provided a one-sided argument. The Anti-CNN website provided screenshots of news reports with alleged evidence of media bias.[36] Additionally, statistics show that more than one million MSN Messenger users added "(L)China" to the beginning of their display name prior to the torch relay incident in Paris, in protest to the Tibetan independence movement and in support of victims of the 2008 Sichuan earthquake.[37] Chinese hackers also claim to have hacked the websites of CNN and Carrefour (a French shopping chain, allegedly supporting Tibetan independence),[38] while websites and forums gave tutorials on how to launch a DDoS attack specifically on the CNN website.

Real crime vigilantes

Some people form themselves into vigilante groups aiming (overtly) to "investigate" high profile cases, but in reality often their (covert) goal is to harass those people associated in some way with the crime, but against whom no successful case has been made in the courts. Recent cases include the death of JonBenét Ramsey in the USA and the Disappearance of Madeleine McCann in the UK. Operators of these sites may be counting on the limited purview of libel laws on the Internet in order to make allegations against people that might otherwise pursue defamation cases against them were the allegations published via other media. [citation needed]

Anti-Software Piracy Internet Vigilantism

An example cited on the tech news site securityfocus.com by Kevin Poulsen illustrates how two coders implemented and distributed a program that disguised itself as activation key generators and cracks for illegal software circulating on peer-to-peer file sharing sites. The duo researched software that was popular on these file sharing sites and tagged their code with their names. As soon as the software was executed, it displayed a large message, “Bad Pirate! So, you think you can steal from software companies do you? That's called theft, don't worry your secret is safe with me. Go thou and sin no more." The software then called back to a central server and logged the file name under which it was executed, amount of time the message was displayed on the downloader’s computer screen and their IP address. The information gathered was then re-posted onto a public website showing the downloader’s IP address and country of origin. The program also had a unique ID embedded into each downloaded copy of it for tracking purposes to keep track of how it traversed the different networks. [39]

Legislative framework

In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer to peer computer networks.[1] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."[40] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.[41]

See also

References

  1. ^ a b Template:PDFlink
  2. ^ The wide world of cyber snitching[dead link]
  3. ^ Moore, Matthew (2009-02-17). "YouTube 'cat torturer' traced by web detectives". The Daily Telegraph. London. Retrieved 2009-03-10.
  4. ^ O'Brien, Danny (2009-02-20). "Online users stick claws into torturer". The Irish Times. Retrieved 2009-03-10.
  5. ^ "Puppy poo girl". Japundit.com. 2005-06-30. Retrieved 2009-03-03.
  6. ^ Krim, Jonathan (2005-07-07). "Subway Fracas Escalates Into Test Of the internet's Power to Shame". Washingtonpost.com. Retrieved 2009-03-03.
  7. ^ Updated July.8,2005 17:59 KST (2005-07-08). "Digital Chosunilbo (English Edition) : Daily News in English About Korea". English.chosun.com. Retrieved 2009-03-03.{{cite web}}: CS1 maint: numeric names: authors list (link)
  8. ^ "AsiaMedia :: Internet Witch-hunts". Asiamedia.ucla.edu. Retrieved 2009-03-03.
  9. ^ Confessore, Nicholas (2006-06-21). "Tale of a Lost Cellphone, and Untold Static". The New York Times. Retrieved 2010-05-05.
  10. ^ "The internet mob builds a worldwide web of punishment - Times Online". London: Technology.timesonline.co.uk. 2006-06-25. Retrieved 2009-03-03.
  11. ^ Norris, Michele (2008-04-02). "Robbery Victim Uses Internet to Track X-Box Thief". NPR. Retrieved 2009-03-03.
  12. ^ "Cyber vigilantes foil gadget thief - web - Technology". theage.com.au. Retrieved 2009-03-03.
  13. ^ "'Ebay avenger' offers a truce". Daily Mail. 2006-05-30. Retrieved 2009-05-30.
  14. ^ "The Broken Laptop I Sold on Ebay". Consumerist. 2006-05-26. Retrieved 2009-05-30.
  15. ^ "UPDATE: The Broken Laptop I Sold on Ebay". Consumerist. 2006-05-30. Retrieved 2009-05-30.
  16. ^ "FOLLOWUP: The Broken Laptop I Sold On Ebay". Consumerist. 2006-06-01. Retrieved 2009-05-30.
  17. ^ 'Playboy' jailed after £60k Financial Times fraud
  18. ^ Lin, Qiu (2008-05-23). "Where angles and devils meet -- China's Internet in quake aftermath". Xinhua News Agency. Retrieved 2009-01-05.
  19. ^ 关于辽宁女张雅辱骂灾区人民的违法行为讨论
  20. ^ 有个姑娘名叫张雅
  21. ^ 我帮你找到了张雅的资料,看看满意吗?
  22. ^ 张雅 辽宁女 沈阳公安局证实:张雅被抓
  23. ^ "Husbands Behaving Badly - Yahoo! TV Blog". Tv.yahoo.com. Retrieved 2009-03-03.
  24. ^ Thomas, Owen (2009-02-07). "Jerks: 'Wife Swap' Star Apologises for Having Worst Husband in World". Valleywag.gawker.com. Retrieved 2009-03-03.
  25. ^ "The Insider: TV viewers stuff wrong inbox over 'Wife Swap'". Seattlepi.nwsource.com. 2009-02-08. Retrieved 2009-03-03.
  26. ^ Barron, James (2008-07-29). "Officer Investigated in Toppling of Cyclist". nytimes.com. Retrieved 2010-05-03.
  27. ^ Officer Patrick Pogan. youtube.com. 2008-07-30. Retrieved 2010-05-03.
  28. ^ Eligon, John (2010-04-29). "Ex-Officer Convicted of Lying About Confrontation With Cyclist". nytimes.com. Retrieved 2010-05-03.
  29. ^ Hanon, Andrew (2009-03-13). "Internet vigilante group torments mother". cnews.canoe.ca. Retrieved 2010-05-03.
  30. ^ http://www.theregister.co.uk/2005/07/27/bbc_al_qaeda_internet/
  31. ^ Chasing online predators, April 15, 2002, retrieved May 21, 2007
  32. ^ Constable George Schuurman, Public Information, for Detective Constable Janelle Blackadar, Sex Crimes Unit (2007-12-06). "Man facing six charges in Child Exploitation investigation, Photograph released, Chris Forcand, 53" (PDF). News Release. Toronto Police Service. Retrieved 2008-02-25.{{cite news}}: CS1 maint: multiple names: authors list (link)
  33. ^ Jonathan Jenkins (2007-12-07). "Man trolled the web for girls: cops". CANOE. Toronto Sun. Retrieved 2008-02-19.
  34. ^ http://wiki.aa419.org/index.php/Bandwidth_tools_FAQ
  35. ^ "Example of forum post in English: "Let me tell you why we're angry with Korean" Anti-CNN Forums". Anti-cnn.com. Retrieved 2009-03-03.
  36. ^ "Anti-CNN website". Anti-cnn.com. Retrieved 2009-03-03.
  37. ^ Tan, Kenneth (2008-04-16). "(L) China: Nationalist netizens on MSN Messenger". Shanghaiist. Retrieved 2009-03-03.
  38. ^ SBS Dateline, 6 Aug 2008 [1] video link
  39. ^ http://www.securityfocus.com/news/8279
  40. ^ "The Truth About The Peer To Peer Piracy Prevention Act". Writ.news.findlaw.com. 2002-10-01. Retrieved 2009-03-03.
  41. ^ "Let Hollywood Hack". Techcentralstation.com. Retrieved 2009-03-03.