Revision as of 15:40, 9 March 2009 editGTBacchus (talk | contribs)Autopatrolled, Extended confirmed users, File movers, Rollbackers60,420 edits →YouTube cat abuse incident: rm unattributable text, taking sources to talk page. We'll have to rewrite this from the sources, per GFDL.← Previous edit | Latest revision as of 18:37, 28 August 2024 edit undoHelpful Raccoon (talk | contribs)Extended confirmed users8,126 edits no google searchTag: Visual edit | ||
(694 intermediate revisions by more than 100 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|Vigilante activities carried out through the Internet}} | |||
'''Internet vigilantism''' (sometimes '''e-vigilantism'''{{Fact|date=March 2009}} or '''digilantism'''{{Fact|date=March 2009}}) is the phenomenon of ] acts taken against the ] (the communication network or its ]) or carried out using applications (], ]) that depend on the Internet. The term encompasses vigilantism against scams, crimes, and non-Internet related behaviour. | |||
'''Internet vigilantism''' is the act of carrying out ] activities through the ]. The term encompasses vigilantism against alleged ], ], and non-Internet-related behavior. | |||
Some have suggested that the Internet's lack of central control has prompted a tendency towards vigilante reactions against certain behaviours in the same way that they have prompted those behaviours to occur in the first place.<ref name="crews cei">{{PDFlink | }}</ref> | |||
The expanding scope of media savvy and online interaction has enabled vigilantes to utilize methods specific to the Internet in order to distribute justice to parties they consider to be corrupt, but who have not committed a formal crime or have not been held accountable by the ].<ref>{{Cite journal|last=Trottier|first=Daniel|date=2016-04-01|title=Digital Vigilantism as Weaponisation of Visibility|journal=Philosophy & Technology|volume=30|issue=1|pages=55–72|doi=10.1007/s13347-016-0216-4|issn=2210-5433|doi-access=free|hdl=1765/98871|hdl-access=free}}</ref> | |||
==Methods== | |||
Internet vigilantism originated in the early 2000s and has since evolved to include a variety of methods such as ], baiting, and ]. Internet vigilantism changes in cultural and political drive depending on location, and has varying relationships to state authority depending on context. There are many internet vigilante groups as well as individuals. | |||
Methods of Internet vigilantism that have been used or proposed for use have included: | |||
== |
== Description == | ||
The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one's own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck identifies the four main forms of internet vigilantism as: flagging, investigation, hounding, and organized denunciation. Also referred to by Steve Man as ], meaning "to watch from below", internet vigilantism can work as a type of peer surveillance. This is based on the premise that shame can be used as a form of social control.<ref name=":0">{{Cite journal|last1=Skoric|first1=Marko M|last2=Chua|first2=Jia Ping Esther|last3=Liew|first3=Meiyan Angeline|last4=Wong|first4=Keng Hui|last5=Yeo|first5=Pei Jue|date=2010-12-18|title=Online Shaming in the Asian Context: Community Empowerment or Civic Vigilantism?|journal=Surveillance & Society|volume=8|issue=2|pages=181–199|doi=10.24908/ss.v8i2.3485|issn=1477-7487|doi-access=free}}</ref> Augustė Dementavičienė defines the phenomena through the concept of ], which are "Short term relationships between consumers formed for the purpose of achieving a goal".<ref name=":5">{{Cite journal|last=Dementavičienė|first=Augustė|date=2019-09-12|title=How the New Technologies Shapes the Understanding of the Political Act: the case of Digital Vigilantism|journal=Politologija|volume=95|issue=3|pages=33–55|doi=10.15388/polit.2019.95.4|issn=2424-6034|doi-access=free}}</ref> There are muddied overlaps between internet vigilantism and ], as both utilize public shaming methods, and cyberbullying may sometimes be conducted under the guise of internet vigilantism. This is in the case that the vigilante "realizes they aren't achieving social justice but utilize it as a means of rationalizing their acts".<ref>{{Cite journal|last1=Chang|first1=Lennon Y. C.|last2=Poon|first2=Ryan|date=2016-03-18|title=Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong Kong|url=http://dx.doi.org/10.1177/0306624x16639037|journal=International Journal of Offender Therapy and Comparative Criminology|volume=61|issue=16|pages=1912–1932|doi=10.1177/0306624x16639037|pmid=26992831|s2cid=7293022 |issn=0306-624X}}</ref> Cyberbullying often involves publishing of private information to publicly humiliate the target, but is typically driven by the bully's ability to get away with harassment, rather than a desire for social change.<ref>{{Cite journal|last1=Chan|first1=Tommy K. H.|last2=Cheung|first2=Christy M. K.|last3=Wong|first3=Randy Y. M.|date=2019-04-03|title=Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives|journal=Journal of Management Information Systems|volume=36|issue=2|pages=574–609|doi=10.1080/07421222.2019.1599500|s2cid=150424984|issn=0742-1222|doi-access=free}}</ref> Digital vigilantism can also overlap with digital activism, as the awareness of a social issue may increase due to the dissemination of information and weaponization of visibility associated with digital vigilante tactics. Visibility enables the broadening of social outrage,<ref name=":1">{{Cite thesis|title=Social norm or social harm: An exploratory study of Internet vigilantism|publisher=Iowa State University|first=Karl Allen|last=Wehmhoener|year=2010 |doi=10.31274/etd-180810-1388|doi-access=free}}</ref> and is used in digital social justice campaigns such as #MiTuInChina.<ref>{{Cite journal|last=Hou|first=Lixian|date=2020-07-02|title=Rewriting "the personal is political": young women's digital activism and new feminist politics in China|url=http://dx.doi.org/10.1080/14649373.2020.1796352|journal=Inter-Asia Cultural Studies|volume=21|issue=3|pages=337–355|doi=10.1080/14649373.2020.1796352|issn=1464-9373|access-date=2020-12-06|archive-date=2023-01-17|archive-url=https://web.archive.org/web/20230117173043/https://www.tandfonline.com/doi/full/10.1080/14649373.2020.1796352|url-status=live}}</ref> | |||
==Methods== | |||
{{main|Scam baiting}} | |||
The following are methods of internet vigilantism that have been used or proposed for use: | |||
===Online shaming=== | |||
Scam baiting is the practice of feigning interest in a ] in order to manipulate the scammer behind it. The purpose of scam baiting might be to waste the scammers' time, embarrass him or her, cause them to reveal information which can be passed on to legal authorities in the hope that they will be prosecuted, get them to spend money, or simply to amuse the baiter. | |||
<!--- Transclusion from Online shaming article. ---> | |||
{{main|Online shaming}} | |||
The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression. Online shaming may be used to get ] (for example, in the form of ]ography), ], ], or to threaten other internet users.<ref name="Shame">{{cite journal |last1=Laidlaw |first1=Emily |title=Online Shaming and the Right to Privacy |journal=Laws |date=1 February 2017 |volume=6 |page=3 |doi=10.3390/laws6010003 |url=https://www.researchgate.net/publication/313581719 |access-date=5 April 2020 |doi-access=free |archive-date=24 April 2021 |archive-url=https://web.archive.org/web/20210424120328/https://www.researchgate.net/publication/313581719_Online_Shaming_and_the_Right_to_Privacy |url-status=live }}</ref> Emotions, social media as a cultural product, and the mediascape, are all important factors as to how online shaming is perceived.<ref>{{Cite journal|last1=Dunsby|first1=Ruth M|last2=Howes|first2=Loene M|date=2018-07-03|title=The NEW adventures of the digital vigilante! Facebook users' views on online naming and shaming|url=http://dx.doi.org/10.1177/0004865818778736|journal=Australian & New Zealand Journal of Criminology|volume=52|issue=1|pages=41–59|doi=10.1177/0004865818778736|s2cid=150017891 |issn=0004-8658}}</ref> | |||
Scam baiting emerged in response to ] based frauds such as the common ]. Many websites publish transcripts of correspondences between baiters and scammers, and also publish their "trophies" online, which include videos and images scam baiters claim to have obtained from scammers. | |||
=== |
===Doxing=== | ||
{{main|Doxing}} | |||
The act of publishing personal details online to incur social punishment of the target.<ref name=":2">{{Citation|last=Serracino-Inglott|first=Philip|title=Is it OK to be an Anonymous?|date=2020-08-13|url=http://dx.doi.org/10.4324/9781003075011-18|work=The Ethics of Information Technologies|pages=243–270|publisher=Routledge|doi=10.4324/9781003075011-18|isbn=978-1-003-07501-1|access-date=2020-12-06|archive-date=2023-01-17|archive-url=https://web.archive.org/web/20230117173059/https://www.taylorfrancis.com/chapters/edit/10.4324/9781003075011-18/ok-anonymous-philip-serracino-inglott|url-status=live}}</ref> In 2019, the Kentucky Senate proposed a bill to ban the doxxing of children after a teenager, Nick Sandmann and a Native American activist, Nathan Phillips were filmed in a confrontation at a protest rally which went viral.<ref name=":8"/> Sandmann's father claimed his son endured "The most sensational Twitter attack on a minor child in the history of the Internet."<ref>{{Cite web|last=Yetter|first=Deborah|title=Father of Covington Catholic's Nick Sandmann still wants 'doxing bill'|url=https://www.courier-journal.com/story/news/politics/ky-legislature/2019/07/12/father-covington-catholics-nick-sandmann-still-wants-doxing-bill/1707929001/|access-date=2020-12-06|website=The Courier-Journal|language=en-US|archive-date=2023-01-17|archive-url=https://web.archive.org/web/20230117173058/https://www.courier-journal.com/story/news/politics/ky-legislature/2019/07/12/father-covington-catholics-nick-sandmann-still-wants-doxing-bill/1707929001/|url-status=live}}</ref> | |||
The ] tools of the World Wide Web have been used as a tool to easily and widely publicise instances of perceived anti-social behaviour. | |||
===Reintegrative shaming=== | |||
David Furlow, chairman of the Media, Privacy and Defamation Committee of the ], has identified the potential privacy concerns raised by websites facilitating the distribution of information that is not part of the ] (documents filed with a government agency), and has said that such websites "just a forum to people whose statements may not reflect truth."<ref name="snitching redeye">{{Dead link|date=March 2009}}</ref> | |||
{{main|Reintegrative shaming}} | |||
Public shaming based on the perspective that the act is meant to shame the behavior rather than the target, and that the target can be redeemed and reintegrated into society. This approach utilizes shame as a means of social control and deterrent from deviating from social norms.<ref name=":0"/> | |||
====Notable Examples==== | |||
=====Dog Poop Girl===== | |||
In ] in ], ]gers targeted ] when her ] ] on the floor of a ] car, labelling her "dog shit girl" (rough translation into English). Another commuter had taken a photograph of the woman and her dog, and posted it on a popular Korean website.<ref>{{cite web|url=http://japundit.com/archives/2005/06/30/808/ |title=Puppy poo girl |publisher=Japundit.com |date=2005-06-30 |accessdate=2009-03-03}}</ref> Within days, she had been identified by internet vigilantes, and much of her ] was exposed on the World Wide Web in an attempt to punish her for the offense. The story received mainstream attention when it was widely reported in South Korean media, and was discussed in Korean communities in the ] as well. The public humiliation led the woman to quit her ], according to reports.<ref>{{cite web|url=http://www.washingtonpost.com/wp-dyn/content/article/2005/07/06/AR2005070601953.html |title=Subway Fracas Escalates Into Test Of the Internet's Power to Shame |publisher=Washingtonpost.com |date=2005-07-07 |accessdate=2009-03-03}}</ref> | |||
===Human flesh search engine=== | |||
The reaction by Korean netizens to the incident prompted several Korean newspapers to run editorials voicing concern over Internet vigilantism. One paper quoted ] as saying that the woman was the victim of a "cyber-posse, tracking down norm violators and branding them with digital ]."<ref>{{cite web|author=Updated July.8,2005 17:59 KST |url=http://english.chosun.com/w21data/html/news/200507/200507080017.html |title=Digital Chosunilbo (English Edition) : Daily News in English About Korea |publisher=English.chosun.com |date=2005-07-08 |accessdate=2009-03-03}}</ref> Another called it an "Internet witch-hunt," and went on to say that "he Internet is turning the whole society into a ]."<ref>{{cite web|url=http://www.asiamedia.ucla.edu/article.asp?parentid=25576 |title=AsiaMedia :: Internet Witch-hunts |publisher=Asiamedia.ucla.edu |date= |accessdate=2009-03-03}}</ref> | |||
{{main|Human flesh search engine}} | |||
A method originating in China in the early 2000s, which works as a cyber manhunt. It consists of crowdsourcing and pooling together information from the public via online forums to conduct vigilante justice through the Internet.<ref name=":4">{{Cite journal|last1=Cheong|first1=Pauline Hope|last2=Gong|first2=Jie|date=December 2010|title=Cyber vigilantism, transmedia collective intelligence, and civic participation|url=http://dx.doi.org/10.1080/17544750.2010.516580|journal=Chinese Journal of Communication|volume=3|issue=4|pages=471–487|doi=10.1080/17544750.2010.516580|s2cid=89605889 |issn=1754-4750}}</ref> | |||
=====Evan Guttman and the Stolen Sidekick===== | |||
Other notable instances also include the case of Evan Guttman and his friend's stolen ],<ref>http://www.nytimes.com/2006/06/21/nyregion/21sidekick.html?n=Top/Reference/Times%20Topics/Subjects/L/Lost%20and%20Found%20Property</ref><ref>{{cite web|url=http://technology.timesonline.co.uk/tol/news/tech_and_web/article678838.ece |title=The internet mob builds a worldwide web of punishment - Times Online |publisher=Technology.timesonline.co.uk |date= |accessdate=2009-03-03}}</ref> and the case of Jesse McPherson and his stolen ], ], and TV.<ref>{{cite web|last=Norris |first=Michele |url=http://www.npr.org/templates/story/story.php?storyId=89318806 |title=Robbery Victim Uses Internet to Track X-Box Thief |publisher=NPR |date=2008-04-02 |accessdate=2009-03-03}}</ref><ref>{{cite web|url=http://www.theage.com.au/news/web/cyber-vigilantes-foil-gadget-thief/2008/03/26/1206207172792.html |title=Cyber vigilantes foil gadget thief - web - Technology |publisher=theage.com.au |date= |accessdate=2009-03-03}}</ref> | |||
===Information entropy=== | |||
=====Chinese College Boys harassing teacher===== | |||
A number of serious cases of internet vigilante behaviour occurred in China. In 2007 two college boys filmed themselves making trouble in class and harassing their 70 year old teacher. Their film was posted on Youtube as Beijing Boy' Netizens found the school, posted details of the culprits and hacked into their online accounts. The case was taken up in mainstream Chinese media. | |||
In the field of internet vigilantism, information entropy is an act intended to disrupt online services.<ref name=":2" /> | |||
=====Zhang Ya & Sichuan Earthquake===== | |||
In 2008, a girl called ] (张雅) from ] province, ], posted a 4 minute video of herself complaining about the amount of attention the ] victims were receiving on television. An intense response from Internet vigilantes resulted in the girl's personal details (even including her blood type) being made available online, dozens of abusive video responses on Chinese websites and blogs. The girl was taken into police custody for three days. | |||
=== |
===Denial of Service attacks=== | ||
{{main|Denial-of-service attack}} | |||
'''Stephen Fowler''' is an ] ] and ] ], who gained notoriety after his performance on ABC's '']'' originally aired Friday January 30, 2009, wherein his wife exchanged positions in his family with a woman from ] for a two-week period. After verbally abusing the woman without provocation, and insulting a wide range of people including soldiers and the overweight, several websites were made in protest against his behaviour, such as www.StephenFowlerSucks.com.<ref>{{cite web|url=http://tv.yahoo.com/blog/husbands-behaving-badly--120 |title=Husbands Behaving Badly - Yahoo! TV Blog |publisher=Tv.yahoo.com |date= |accessdate=2009-03-03}}</ref><ref>{{cite web|last=Thomas |first=Owen |url=http://valleywag.gawker.com/5148821/wife-swap-star-apologizes-for-having-worst-husband-in-world |title=Jerks: 'Wife Swap' Star Apologizes for Having Worst Husband in World |publisher=Valleywag.gawker.com |date=2009-02-07 |accessdate=2009-03-03}}</ref> After the show, and after watching the video of his tantrums, his wife, a professional ], reported that she had encouraged him to attend professional behavior counseling. Businesses with only tangential connection to Fowler had to publicly disclaim any association with him due to the negative publicity.<ref>{{cite web|url=http://seattlepi.nwsource.com/business/399231_theinsider09.html |title=The Insider: TV viewers stuff wrong inbox over 'Wife Swap' |publisher=Seattlepi.nwsource.com |date=2009-02-08 |accessdate=2009-03-03}}</ref> He voluntarily resigned his positions on the boards of two environmental-oriented charities to avoid tainting their reputations. | |||
DoS and DDoS attacks, a form of information entropy, involve a widespread effort to make a website inaccessible to legitimate users. The method is to overwhelm the website with traffic so that it crashes.<ref name=":2" /> DoS attacks grew in popularity due to ] (LOIC), which is an open source application that enables denial of service attacks.<ref name=":3">{{Citation|title=LOIC will tear us apart: DDoS tool development and design|work=The Coming Swarm : DDoS Actions, Hacktivism, and Civil Disobedience on the Internet|year=2014|pages=109–135 |publisher=Bloomsbury Academic|doi=10.5040/9781628926705.0012|isbn=978-1-62356-822-1|doi-access=free}}</ref> | |||
===Distributed Denial of Service=== | |||
===Hacktivism=== | |||
{{main|DDoS}} | |||
{{main|Hacktivism}} | |||
Hacking which is used as a form of political activism.<ref name=LE_1>{{cite book| last1=Bandler| first1=J.| last2=Merzon| first2=Antonia| title=Law Enforcement's Cybercrime Investigation| publisher=Semantic Scholar| pages=220–244| date=22 June 2020| doi=10.1201/9781003033523-13| isbn=9781003033523| s2cid=225726296}}</ref> | |||
A DDoS attack can be used to take down malicious websites, such as those being used for phishing or ]. Basically, thousands of people generate traffic to a website, flooding it such that it goes over quota or simply can't serve that many requests in a timely manner. For example, users of ] have frequently attempted to overload the site ] (and often succeeded) because the latter has a penchant for taking material from other websites (including YTMND) and passing it off as its own. {{Fact|date=March 2009}} | |||
== |
===Scam baiting=== | ||
{{main|Scam baiting}} | |||
When vigilantes interact with scammers simply to waste their time and resources.<ref name=":1" /> Others, such as Northern Irish scam baiter ], carry out investigative operations infiltrating call centres and intervening in the case of victims who are scammed out of their money.<ref>{{Cite news |last=Bhattacharjee |first=Yudhijit |date=27 January 2021 |title=Who's Making All Those Scam Calls? |work=The New York Times |url=https://www.nytimes.com/2021/01/27/magazine/scam-call-centers.html |access-date=27 January 2021 |archive-date=27 January 2021 |archive-url=https://web.archive.org/web/20210127100511/https://www.nytimes.com/2021/01/27/magazine/scam-call-centers.html |url-status=live }}</ref> | |||
People engage in internet vigilantisms trying to further many causes. | |||
=== |
===Identity theft activism=== | ||
] activism is similar to scam baiting but deals with identity theft.{{clarify|date=November 2021}}<ref name=":1" /> | |||
] is an ] judge, serving in ], who has a controversial role as a ] online terrorist-hunter, posing as militant anti-American Muslim radicals online, hoping to attract the eye of those with similar mindsets.<ref>http://www.theregister.co.uk/2005/07/27/bbc_al_qaeda_internet/</ref> | |||
==Legality== | |||
===Anti-pedophile activism=== | |||
In 2002 in the ], ] ] proposed the , which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on ] computer networks.<ref name="crews cei">{{cite web|title=Giving Chase in Cyberspace|url=http://www.cei.org/pdf/5569.pdf|access-date=2007-06-06|archive-date=2018-05-16|archive-url=https://web.archive.org/web/20180516041922/http://www.cei.org/pdf/5569.pdf|url-status=dead}}</ref> Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."<ref name="findlaw berman">{{cite web |url=http://writ.news.findlaw.com/commentary/20021001_berman.html |title=The Truth About The Peer To Peer Piracy Prevention Act |publisher=Writ.news.findlaw.com |date=2002-10-01 |access-date=2009-03-03 |archive-date=2011-06-03 |archive-url=https://web.archive.org/web/20110603231529/http://writ.news.findlaw.com/commentary/20021001_berman.html |url-status=live }}</ref> ] assistant professor James D. Miller acknowledged the threats to the privacy of legitimate internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as ]s at ]s.<ref name="miller hollywood hack">{{cite web|url=http://www.techcentralstation.com/082202B.html|archive-url=https://web.archive.org/web/20050210184712/http://www.techcentralstation.com/082202B.html|archive-date=2005-02-10 |title=Let Hollywood Hack |publisher=Techcentralstation.com |access-date=2009-03-03}}</ref> | |||
== Origins == | |||
{{main|Anti-pedophile activism}} | |||
Internet vigilantism originated in the early 2000s. It gained traction as a widespread social phenomena in China, where it has been used as a method of exposing government corruption and utilizing civic engagement. It is also a means of sharing previously censored or unavailable information. The popularity of these activities arose due to the ], which enables the conduction of cyber manhunts. The first of these manhunts was conducted in 2006, when a video surfaced online of a woman killing a kitten with her high heels.<ref name=":4" /> A similar example can be seen in the Netflix TV show ], in which a widespread effort by internet vigilantes is made to track down a serial cat murderer on the Internet, who had been posting anonymous videos of their activities. In 2008, cyber vigilantism was used in ], China to expose a government official for attempted child molestation. Surveillance videos from the restaurant in which the assault took place were released on the Internet to expose the official, as he had previously claimed his government position would protect him from incurring any punishment.<ref name=":4" /> | |||
Internet vigilantism has also been used to punish online bullies. For example, the case of ], a teenager who committed suicide due to online bullying. The perpetrators were ] by bloggers who committed themselves to ensuring their social punishment and loss of employment.<ref name=":1" /> | |||
] is a well-known example of an anti-pedophile organization that aims to expose and convict adults who, using email or web sites, solicit minors in order to commit child sexual abuse. They often collaborate with law enforcement and television crews. Some freely hosted ] claim to expose real or potential child sex offenders. | |||
In ], cyber vigilantism became a popular form of peer surveillance and is largely viewed as a form of civic engagement. Whereas acts of online vigilantism in China have largely been used as a means of punishment and exposing social corruption, cases in ] revolve mainly around exposing fellow citizens for inconsiderate behavior such as not cleaning up after one's dog. Online shaming is viewed by the vigilantes as ], as they claim their actions are a means of shaming the behavior rather than the perpetrator. This brand of vigilantism is seen as being in line with the morals of a largely collectivist society.<ref name=":0" /> | |||
Another initiative, Predator Hunter, headed by Wendell Kreuth, aims to track down and expose the pornography-related activities of alleged 'sexual predators'. In 2002, Kreuth disclosed details of his activities in an interview with Minnesota Public Radio.<ref>, ]], retrieved ]]</ref> Members of the subculture ] have also been credited for seeking out pedophiles and collaborating with law enforcement.<ref name="PoliceReport"> | |||
{{cite news | |||
|author=Constable George Schuurman, Public Information, for Detective Constable Janelle Blackadar, Sex Crimes Unit | |||
|title=Man facing six charges in Child Exploitation investigation, Photograph released, Chris Forcand, 53 | |||
|url=http://www.torontopolice.on.ca/newsreleases/pdfs/13073.pdf | |||
|work=News Release | |||
|publisher=] | |||
|format=PDF | |||
|date=2007-12-06 | |||
|accessdate=2008-02-25 | |||
}} | |||
</ref><ref name="Jenkins"> | |||
{{cite news | |||
|author=Jonathan Jenkins | |||
|title=Man trolled the web for girls: cops | |||
|url=http://cnews.canoe.ca/CNEWS/Crime/2007/12/07/4712680-sun.html | |||
|work=] | |||
|publisher=] | |||
|date=2007-12-07 | |||
|accessdate=2008-02-19 | |||
}} | |||
</ref> | |||
== Relationship to authority == | |||
===Anti-racism activism=== | |||
Digital vigilantism can be viewed as a menace to the authorities, or an expression of digital citizenship, depending on the context. Vigilantes may view their actions as digital citizenship if they are seeking to improve the safety of online interaction. | |||
According to K.K. Silva, "Vigilantes' responses to perceived malicious activity have reportedly caused the loss of digital evidence, thereby obstructing law enforcement's effort in ascertaining attribution and jurisdiction over cybercrime offences."<ref name=":32">{{Citation|last1=Bandler|first1=John|title=Law Enforcement's Cybercrime Investigation|date=2020-06-22|url=http://dx.doi.org/10.1201/9781003033523-13|work=Cybercrime Investigations|pages=220–244|location=Boca Raton, FL|publisher=CRC Press|isbn=978-1-003-03352-3|access-date=2020-10-29|last2=Merzon|first2=Antonia|doi=10.1201/9781003033523-13|s2cid=225726296|archive-date=2023-01-17|archive-url=https://web.archive.org/web/20230117173104/https://www.taylorfrancis.com/chapters/mono/10.1201/9781003033523-13/law-enforcement-cybercrime-investigation-john-bandler-antonia-merzon|url-status=live}}</ref> Therefore internet vigilantism is generally in opposition to legitimate criminal investigations, and viewed as tampering with evidence.<ref name=":32" /> However, there are cases in which internet vigilantism is legally protected, such as when it falls under laws relating to protection of the other.<ref name=":32" /> There have also been cases in which vigilantes have cooperated with criminal justice investigations, such as the cases of ] and ].<ref name=":32" /> In both of these cases, vigilantes cooperated with authorities, utilizing ] methods to fight cybercrime and prevent further damage.<ref name=":32" /> | |||
Many online use tactics similar to anti-pedophile activists to combat ], harrassing and destroying racist groups on ] and other social web services. | |||
Conversely, internet vigilantism can also work for the interests of the Government or for the government, as is sometimes the case in ]. Two non profit groups practicing internet vigilantism, Liga Bezopasnogo Interneta (LBI, Safe Internet League), and Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), attempted to pass a bill that would enable unpaid volunteers to regulate the Internet, also known as the Cyber Cossak movement.<ref name=":43">{{Cite journal|last1=Daucé|first1=Françoise|last2=Loveluck|first2=Benjamin|last3=Ostromooukhova|first3=Bella|last4=Zaytseva|first4=Anna|date=2019|title=From Citizen Investigators to Cyber Patrols: Volunteer Internet Regulation in Russia|journal=Laboratorium: Russian Review of Social Research|issue=3|pages=46–70|doi=10.25285/2078-1938-2019-11-3-46-70|issn=2076-8214|doi-access=free}}</ref> These groups argue that their aim is to identify content that is extreme or dangerous for children such as child porn, and track down the creators of the content", however, the bill has drawn high amounts of skepticism from those who argued that it is reminiscent of Soviet peer surveillance and a breach of ] rights.<ref name=":43"/> | |||
===Identity theft activism=== | |||
{{main|Identity theft}} | |||
Organizations similar to vigilante action against pedophiles also target ID theft. Posing as ID thieves, they gather stolen personal information such as "dumps" (the raw encoded information contained on a payment or identification card's magnetic stripe, microchip or transponder), bank account numbers and login information, social security numbers, etc. They then pass this information on to the associated banks, to credit monitoring companies, or to law enforcement. | |||
The Russian youth group ], who conducted a vigilante project called ], had been publicly supported by ], who had posed for a picture with them. The group became prominent in the Russian media through publicly shaming bad drivers and filming their (often violent) altercations with them. The group fell out of favor with the Russian government and was liquidated after targeting an Olympic athlete.<ref name=":52">{{Cite journal|last=Gabdulhakov|first=Rashid|date=2019|title=Heroes or Hooligans? Media Portrayal of StopXam (Stop a Douchebag) Vigilantes in Russia|journal=Laboratorium: Russian Review of Social Research|issue=3|pages=16–45|doi=10.25285/2078-1938-2019-11-3-16-45|issn=2076-8214|doi-access=free}}</ref> | |||
Other groups specialize in the removal of ] websites, fake banks, and fraudulent online storefronts, a practice known as "site-killing". is a web site specializing in the removal of fake bank websites. Such groups often use tactics like DDoS attacks on the offending website, with the aim of drawing attention to the site by its hosting service or rapid consumption of the site's monthly ] allowance. The Artists Against 419 always argued their tools were not a denial-of-service attack. At any rate they abandoned such tactics some time ago.{{Fact|date=August 2008}} | |||
In the case of the ] in ], ], internet vigilantism was used to help police track down violent protestors, as well as bring justice when the police were considered by the public to be doing so inadequately. This included ] and public shaming of the protestors via Twitter.<ref name=":8">{{Cite journal|last1=Legocki|first1=Kimberly V.|last2=Walker|first2=Kristen L.|last3=Kiesler|first3=Tina|date=2020-02-17|title=Sound and Fury: Digital Vigilantism as a Form of Consumer Voice|journal=Journal of Public Policy & Marketing|volume=39|issue=2|pages=169–187|doi=10.1177/0743915620902403|s2cid=213315677 |issn=0743-9156|doi-access=}}</ref> | |||
===Profit=== | |||
== Internet vigilante groups == | |||
Some companies engage in internet vigilantism for profit. One such example is ], a company which used methods such as entrapment, P2P poisoning, and DDoS attacks. | |||
There are many internet vigilante groups permeating the Internet, with different motivations and levels of anonymity. | |||
* ], a hacktivist group responsible for ]<ref name=":2" /> | |||
===Political activism=== | |||
* Liga Bezopasnogo Interneta (LBI, Safe Internet League), a Russian non-profit dedicated to regulating extremist material online.<ref name=":43"/> | |||
Groups may engage in internet vigilantism to spread a political message, or to exert nationalism. One example is the ] phenomenon which occurred within the ] and various overseas ] communities. Chinese ] were outraged by events such as protests during the ] and claims of biased reporting from western media, and so blogs, forums and websites throughout the Chinese-speaking world were filled with nationalistic sentiment.<ref>{{cite web|url=http://www.anti-cnn.com/forum/en/viewthread.php?tid=1452 |title=Example of forum post in English: "Let me tell you why we're angry with Korean" Anti-CNN Forums |publisher=Anti-cnn.com |date= |accessdate=2009-03-03}}</ref> One website, ], claimed that media such as ] and ] reported selectively regarding the ] and provided a one-sided argument. The Anti-CNN website provided screenshots of news reports with alleged evidence of media bias.<ref>{{cite web|url=http://www.anti-cnn.com |title=Anti-CNN website |publisher=Anti-cnn.com |date= |accessdate=2009-03-03}}</ref> Additionally, statistics show that more than one million MSN Messenger users added "(L)China" to the beginning of their display name prior to the torch relay incident in Paris, in protest to the ].<ref>{{cite web|last=Tan |first=Kenneth |url=http://shanghaiist.com/2008/04/16/nationalist-netizens-on-msn-messenger-heart-china.php |title=(L) China: Nationalist netizens on MSN Messenger |publisher=Shanghaiist |date=2008-04-16 |accessdate=2009-03-03}}</ref> Chinese hackers also claim to have hacked the websites of ] and ] (a French shopping chain, allegedly supporting Tibetan independence),<ref>SBS Dateline, 6 Aug 2008 video link </ref> while websites and forums gave tutorials on how to launch a ] attack specifically on the CNN website. | |||
* Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), a Russian non-profit dedicated to regulating extremist material online.<ref name=":43" /> | |||
* ] (also known as "Stop a Douchebag"), a Russian youth group that publicly shames bad drivers via online videos.<ref name=":52"/> | |||
==Legislative framework== | |||
* Zomri, a Slovak online community which publishes political satire on Facebook, in means of inspiring civic engagement.<ref>{{Cite journal|last1=Vicenová|first1=Radka|last2=Trottier|first2=Daniel|date=2020-04-02|title="The first combat meme brigade of the Slovak internet": hybridization of civic engagement through digital media trolling|journal=The Communication Review|volume=23|issue=2|pages=145–171|doi=10.1080/10714421.2020.1797435|issn=1071-4421|doi-access=free|hdl=1765/129742|hdl-access=free}}</ref> | |||
In ] in the ], ] ] proposed the '']'', which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on ] computer networks.<ref name="crews cei" /> Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."<ref name="findlaw berman">{{cite web|url=http://writ.news.findlaw.com/commentary/20021001_berman.html |title=The Truth About The Peer To Peer Piracy Prevention Act |publisher=Writ.news.findlaw.com |date=2002-10-01 |accessdate=2009-03-03}}</ref> ] assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as ]s at ]s.<ref name="miller hollywood hack">{{cite web|url=http://techcentralstation.com/082202B.html |title=Let Hollywood Hack |publisher=Techcentralstation.com |date= |accessdate=2009-03-03}}</ref> | |||
==See also== | ==See also== | ||
{{columns-list|colwidth=20em|}} | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
==References== | |||
* ] | |||
{{Reflist|30em}} | |||
*] | |||
* ] | |||
== |
==Further reading== | ||
* Cheong, P. H., & Gong, J. (2010) “”, Chinese Journal of Communication, 3(4), 471–487. | |||
{{reflist|2}} | |||
* Byrne, Dara N. Radical History Review, Vol. 117, 2013, p. 70-82. {{doi|10.1215/01636545-2210464}} | |||
* Rolon, Dario N. | |||
* Lennon Y.C. Chang and Ryan Poon (2016) “”, International Journal of Offender Therapy and Comparative criminology. ({{doi|10.1177/0306624X16639037}}) | |||
*Lennon Chang and Andy Leung (2015) “” In Smith, R., Cheung, R and Lau, L. (eds) Cybercrime Risks and Responses: Eastern and Western Perspectives (pp, 240–252). NY: Palgrave. {{doi|10.1057/9781137474162_16}} | |||
==External links== | ==External links== | ||
* , CNN, June 5, 2007 | * , CNN, June 5, 2007 | ||
{{Anonymous and the_Internet}} | |||
{{Anonymous and the Internet}} | |||
] | |||
{{Scams and confidence tricks}} | |||
{{DEFAULTSORT:Internet Vigilantism}} | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] |
Latest revision as of 18:37, 28 August 2024
Vigilante activities carried out through the InternetInternet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior.
The expanding scope of media savvy and online interaction has enabled vigilantes to utilize methods specific to the Internet in order to distribute justice to parties they consider to be corrupt, but who have not committed a formal crime or have not been held accountable by the criminal justice system.
Internet vigilantism originated in the early 2000s and has since evolved to include a variety of methods such as hacking, baiting, and public shaming. Internet vigilantism changes in cultural and political drive depending on location, and has varying relationships to state authority depending on context. There are many internet vigilante groups as well as individuals.
Description
The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one's own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck identifies the four main forms of internet vigilantism as: flagging, investigation, hounding, and organized denunciation. Also referred to by Steve Man as Sousveillance, meaning "to watch from below", internet vigilantism can work as a type of peer surveillance. This is based on the premise that shame can be used as a form of social control. Augustė Dementavičienė defines the phenomena through the concept of Swarms, which are "Short term relationships between consumers formed for the purpose of achieving a goal". There are muddied overlaps between internet vigilantism and cyberbullying, as both utilize public shaming methods, and cyberbullying may sometimes be conducted under the guise of internet vigilantism. This is in the case that the vigilante "realizes they aren't achieving social justice but utilize it as a means of rationalizing their acts". Cyberbullying often involves publishing of private information to publicly humiliate the target, but is typically driven by the bully's ability to get away with harassment, rather than a desire for social change. Digital vigilantism can also overlap with digital activism, as the awareness of a social issue may increase due to the dissemination of information and weaponization of visibility associated with digital vigilante tactics. Visibility enables the broadening of social outrage, and is used in digital social justice campaigns such as #MiTuInChina.
Methods
The following are methods of internet vigilantism that have been used or proposed for use:
Online shaming
Main article: Online shamingThe act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression. Online shaming may be used to get revenge (for example, in the form of revenge pornography), stalk, blackmail, or to threaten other internet users. Emotions, social media as a cultural product, and the mediascape, are all important factors as to how online shaming is perceived.
Doxing
Main article: DoxingThe act of publishing personal details online to incur social punishment of the target. In 2019, the Kentucky Senate proposed a bill to ban the doxxing of children after a teenager, Nick Sandmann and a Native American activist, Nathan Phillips were filmed in a confrontation at a protest rally which went viral. Sandmann's father claimed his son endured "The most sensational Twitter attack on a minor child in the history of the Internet."
Reintegrative shaming
Main article: Reintegrative shamingPublic shaming based on the perspective that the act is meant to shame the behavior rather than the target, and that the target can be redeemed and reintegrated into society. This approach utilizes shame as a means of social control and deterrent from deviating from social norms.
Human flesh search engine
Main article: Human flesh search engineA method originating in China in the early 2000s, which works as a cyber manhunt. It consists of crowdsourcing and pooling together information from the public via online forums to conduct vigilante justice through the Internet.
Information entropy
In the field of internet vigilantism, information entropy is an act intended to disrupt online services.
Denial of Service attacks
Main article: Denial-of-service attackDoS and DDoS attacks, a form of information entropy, involve a widespread effort to make a website inaccessible to legitimate users. The method is to overwhelm the website with traffic so that it crashes. DoS attacks grew in popularity due to Low Orbit Ion Cannon (LOIC), which is an open source application that enables denial of service attacks.
Hacktivism
Main article: HacktivismHacking which is used as a form of political activism.
Scam baiting
Main article: Scam baitingWhen vigilantes interact with scammers simply to waste their time and resources. Others, such as Northern Irish scam baiter Jim Browning, carry out investigative operations infiltrating call centres and intervening in the case of victims who are scammed out of their money.
Identity theft activism
Identity theft activism is similar to scam baiting but deals with identity theft.
Legality
In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer-to-peer computer networks. Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm." Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.
Origins
Internet vigilantism originated in the early 2000s. It gained traction as a widespread social phenomena in China, where it has been used as a method of exposing government corruption and utilizing civic engagement. It is also a means of sharing previously censored or unavailable information. The popularity of these activities arose due to the Human flesh search engine, which enables the conduction of cyber manhunts. The first of these manhunts was conducted in 2006, when a video surfaced online of a woman killing a kitten with her high heels. A similar example can be seen in the Netflix TV show Don't F**k with Cats: Hunting an Internet Killer, in which a widespread effort by internet vigilantes is made to track down a serial cat murderer on the Internet, who had been posting anonymous videos of their activities. In 2008, cyber vigilantism was used in Shenzhen, China to expose a government official for attempted child molestation. Surveillance videos from the restaurant in which the assault took place were released on the Internet to expose the official, as he had previously claimed his government position would protect him from incurring any punishment.
Internet vigilantism has also been used to punish online bullies. For example, the case of Megan Meier, a teenager who committed suicide due to online bullying. The perpetrators were doxxed by bloggers who committed themselves to ensuring their social punishment and loss of employment.
In Singapore, cyber vigilantism became a popular form of peer surveillance and is largely viewed as a form of civic engagement. Whereas acts of online vigilantism in China have largely been used as a means of punishment and exposing social corruption, cases in Singapore revolve mainly around exposing fellow citizens for inconsiderate behavior such as not cleaning up after one's dog. Online shaming is viewed by the vigilantes as reintegrative shaming, as they claim their actions are a means of shaming the behavior rather than the perpetrator. This brand of vigilantism is seen as being in line with the morals of a largely collectivist society.
Relationship to authority
Digital vigilantism can be viewed as a menace to the authorities, or an expression of digital citizenship, depending on the context. Vigilantes may view their actions as digital citizenship if they are seeking to improve the safety of online interaction.
According to K.K. Silva, "Vigilantes' responses to perceived malicious activity have reportedly caused the loss of digital evidence, thereby obstructing law enforcement's effort in ascertaining attribution and jurisdiction over cybercrime offences." Therefore internet vigilantism is generally in opposition to legitimate criminal investigations, and viewed as tampering with evidence. However, there are cases in which internet vigilantism is legally protected, such as when it falls under laws relating to protection of the other. There have also been cases in which vigilantes have cooperated with criminal justice investigations, such as the cases of BrickerBot and WannaCry ransomware attack. In both of these cases, vigilantes cooperated with authorities, utilizing cybercrime methods to fight cybercrime and prevent further damage.
Conversely, internet vigilantism can also work for the interests of the Government or for the government, as is sometimes the case in Russia. Two non profit groups practicing internet vigilantism, Liga Bezopasnogo Interneta (LBI, Safe Internet League), and Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), attempted to pass a bill that would enable unpaid volunteers to regulate the Internet, also known as the Cyber Cossak movement. These groups argue that their aim is to identify content that is extreme or dangerous for children such as child porn, and track down the creators of the content", however, the bill has drawn high amounts of skepticism from those who argued that it is reminiscent of Soviet peer surveillance and a breach of data privacy rights.
The Russian youth group Nashi, who conducted a vigilante project called StopXam, had been publicly supported by Vladimir Putin, who had posed for a picture with them. The group became prominent in the Russian media through publicly shaming bad drivers and filming their (often violent) altercations with them. The group fell out of favor with the Russian government and was liquidated after targeting an Olympic athlete.
In the case of the Unite the Right rally in Charlottesville, Virginia, internet vigilantism was used to help police track down violent protestors, as well as bring justice when the police were considered by the public to be doing so inadequately. This included doxing and public shaming of the protestors via Twitter.
Internet vigilante groups
There are many internet vigilante groups permeating the Internet, with different motivations and levels of anonymity.
- Anonymous, a hacktivist group responsible for Operation Payback
- Liga Bezopasnogo Interneta (LBI, Safe Internet League), a Russian non-profit dedicated to regulating extremist material online.
- Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), a Russian non-profit dedicated to regulating extremist material online.
- StopXam (also known as "Stop a Douchebag"), a Russian youth group that publicly shames bad drivers via online videos.
- Zomri, a Slovak online community which publishes political satire on Facebook, in means of inspiring civic engagement.
See also
- Anonymous
- Call-out culture
- Conflict-of-interest editing on Misplaced Pages
- Crowdsourcing
- Human flesh search engine
- Internet activism
- Patriotic hacking
- Scam baiting
- Vigilantism in the United States of America
References
- Trottier, Daniel (2016-04-01). "Digital Vigilantism as Weaponisation of Visibility". Philosophy & Technology. 30 (1): 55–72. doi:10.1007/s13347-016-0216-4. hdl:1765/98871. ISSN 2210-5433.
- ^ Skoric, Marko M; Chua, Jia Ping Esther; Liew, Meiyan Angeline; Wong, Keng Hui; Yeo, Pei Jue (2010-12-18). "Online Shaming in the Asian Context: Community Empowerment or Civic Vigilantism?". Surveillance & Society. 8 (2): 181–199. doi:10.24908/ss.v8i2.3485. ISSN 1477-7487.
- Dementavičienė, Augustė (2019-09-12). "How the New Technologies Shapes the Understanding of the Political Act: the case of Digital Vigilantism". Politologija. 95 (3): 33–55. doi:10.15388/polit.2019.95.4. ISSN 2424-6034.
- Chang, Lennon Y. C.; Poon, Ryan (2016-03-18). "Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong Kong". International Journal of Offender Therapy and Comparative Criminology. 61 (16): 1912–1932. doi:10.1177/0306624x16639037. ISSN 0306-624X. PMID 26992831. S2CID 7293022.
- Chan, Tommy K. H.; Cheung, Christy M. K.; Wong, Randy Y. M. (2019-04-03). "Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives". Journal of Management Information Systems. 36 (2): 574–609. doi:10.1080/07421222.2019.1599500. ISSN 0742-1222. S2CID 150424984.
- ^ Wehmhoener, Karl Allen (2010). Social norm or social harm: An exploratory study of Internet vigilantism (Thesis). Iowa State University. doi:10.31274/etd-180810-1388.
- Hou, Lixian (2020-07-02). "Rewriting "the personal is political": young women's digital activism and new feminist politics in China". Inter-Asia Cultural Studies. 21 (3): 337–355. doi:10.1080/14649373.2020.1796352. ISSN 1464-9373. Archived from the original on 2023-01-17. Retrieved 2020-12-06.
- Laidlaw, Emily (1 February 2017). "Online Shaming and the Right to Privacy". Laws. 6: 3. doi:10.3390/laws6010003. Archived from the original on 24 April 2021. Retrieved 5 April 2020.
- Dunsby, Ruth M; Howes, Loene M (2018-07-03). "The NEW adventures of the digital vigilante! Facebook users' views on online naming and shaming". Australian & New Zealand Journal of Criminology. 52 (1): 41–59. doi:10.1177/0004865818778736. ISSN 0004-8658. S2CID 150017891.
- ^ Serracino-Inglott, Philip (2020-08-13), "Is it OK to be an Anonymous?", The Ethics of Information Technologies, Routledge, pp. 243–270, doi:10.4324/9781003075011-18, ISBN 978-1-003-07501-1, archived from the original on 2023-01-17, retrieved 2020-12-06
- ^ Legocki, Kimberly V.; Walker, Kristen L.; Kiesler, Tina (2020-02-17). "Sound and Fury: Digital Vigilantism as a Form of Consumer Voice". Journal of Public Policy & Marketing. 39 (2): 169–187. doi:10.1177/0743915620902403. ISSN 0743-9156. S2CID 213315677.
- Yetter, Deborah. "Father of Covington Catholic's Nick Sandmann still wants 'doxing bill'". The Courier-Journal. Archived from the original on 2023-01-17. Retrieved 2020-12-06.
- ^ Cheong, Pauline Hope; Gong, Jie (December 2010). "Cyber vigilantism, transmedia collective intelligence, and civic participation". Chinese Journal of Communication. 3 (4): 471–487. doi:10.1080/17544750.2010.516580. ISSN 1754-4750. S2CID 89605889.
- "LOIC will tear us apart: DDoS tool development and design", The Coming Swarm : DDoS Actions, Hacktivism, and Civil Disobedience on the Internet, Bloomsbury Academic, pp. 109–135, 2014, doi:10.5040/9781628926705.0012, ISBN 978-1-62356-822-1
- Bandler, J.; Merzon, Antonia (22 June 2020). Law Enforcement's Cybercrime Investigation. Semantic Scholar. pp. 220–244. doi:10.1201/9781003033523-13. ISBN 9781003033523. S2CID 225726296.
- Bhattacharjee, Yudhijit (27 January 2021). "Who's Making All Those Scam Calls?". The New York Times. Archived from the original on 27 January 2021. Retrieved 27 January 2021.
- "Giving Chase in Cyberspace" (PDF). Archived from the original (PDF) on 2018-05-16. Retrieved 2007-06-06.
- "The Truth About The Peer To Peer Piracy Prevention Act". Writ.news.findlaw.com. 2002-10-01. Archived from the original on 2011-06-03. Retrieved 2009-03-03.
- "Let Hollywood Hack". Techcentralstation.com. Archived from the original on 2005-02-10. Retrieved 2009-03-03.
- ^ Bandler, John; Merzon, Antonia (2020-06-22), "Law Enforcement's Cybercrime Investigation", Cybercrime Investigations, Boca Raton, FL: CRC Press, pp. 220–244, doi:10.1201/9781003033523-13, ISBN 978-1-003-03352-3, S2CID 225726296, archived from the original on 2023-01-17, retrieved 2020-10-29
- ^ Daucé, Françoise; Loveluck, Benjamin; Ostromooukhova, Bella; Zaytseva, Anna (2019). "From Citizen Investigators to Cyber Patrols: Volunteer Internet Regulation in Russia". Laboratorium: Russian Review of Social Research (3): 46–70. doi:10.25285/2078-1938-2019-11-3-46-70. ISSN 2076-8214.
- ^ Gabdulhakov, Rashid (2019). "Heroes or Hooligans? Media Portrayal of StopXam (Stop a Douchebag) Vigilantes in Russia". Laboratorium: Russian Review of Social Research (3): 16–45. doi:10.25285/2078-1938-2019-11-3-16-45. ISSN 2076-8214.
- Vicenová, Radka; Trottier, Daniel (2020-04-02). ""The first combat meme brigade of the Slovak internet": hybridization of civic engagement through digital media trolling". The Communication Review. 23 (2): 145–171. doi:10.1080/10714421.2020.1797435. hdl:1765/129742. ISSN 1071-4421.
Further reading
- Cheong, P. H., & Gong, J. (2010) “Cyber vigilantism, transmedia collective intelligence, and civic participation.”, Chinese Journal of Communication, 3(4), 471–487.
- Byrne, Dara N. 419 Digilantes and the Frontier of Radical Justice Online. Radical History Review, Vol. 117, 2013, p. 70-82. doi:10.1215/01636545-2210464
- Rolon, Dario N. Vigilancia informatica y responsabilidad penal de los proveedores de internet
- Lennon Y.C. Chang and Ryan Poon (2016) “Internet Vigilantism: Attitudes and Experiences of University Students in Hong Kong”, International Journal of Offender Therapy and Comparative criminology. (doi:10.1177/0306624X16639037)
- Lennon Chang and Andy Leung (2015) “An introduction of cyber-crowdsourcing (human flesh searching) in the Greater China region” In Smith, R., Cheung, R and Lau, L. (eds) Cybercrime Risks and Responses: Eastern and Western Perspectives (pp, 240–252). NY: Palgrave. doi:10.1057/9781137474162_16
External links
- 'From flash mob to lynch mob', CNN, June 5, 2007
Anonymous and the Internet | ||
---|---|---|
Related websites | ||
Groups | ||
Activities | ||
Internet portal |