Artists Against 419

Internet vigilantism is the phenomenon of vigilantic acts taken through the Internet or carried out using applications that depend on the Internet. The term encompasses vigilantism against scams, crimes, and non-Internet related behavior.

Some have suggested that the internet’s lack of central control has prompted a tendency towards vigilante reactions against certain behaviors in the same way that they have prompted those behaviors to occur in the first place.

Scam baiting is the practice of feigning interest in a scam in order to manipulate the scammer behind it. The purpose of scam baiting might be to waste the scammers’ time, embarrass him or her, cause them to reveal information which can be passed on to legal authorities in the hope that they will be prosecuted, get them to spend money, or simply to amuse the baiter.

Scam baiting emerged in response to email based frauds such as the common Nigerian 419 scam. Many websites publish transcripts of correspondences between baiters and scammers, and also publish their “trophies” online, which include videos and images scam baiters have obtained from scammers.

Public shaming

The social networking tools of the World Wide Web have been used as a tool to easily and widely publicize instances of perceived anti-social behavior.

David Furlow, chairman of the Media, Privacy and Defamation Committee of the American Bar Association, has identified the potential privacy concerns raised by websites facilitating the distribution of information that is not part of the public record (documents filed with a government agency), and has said that such websites “just [give] a forum to people whose statements may not reflect truth.”

Notable examples

Kittens killed in vacuum bag

In December 2010, a video clip was posted on YouTube of a young man placing two kittens into a vacuum bag and suffocating them. Thousands of online protests and detectives claim that the man is male model Luka Magnotta and he has been hunted since. Even though there is no confirmed evidence linking him to the crime, he has had millions of death threats and had to leave the country and change his name. It was reported in news agencies around the world.

YouTube cat abuse incident

In February 2009, an incident involving the posting on YouTube of a video clip in which a domestic cat, named Dusty, was beaten and tortured by a 14-year-old boy calling himself “Timmy”. After about 30,000 viewings, this clip and the account were removed by YouTube as a violation of their terms of service.  Members of the 4chan messageboard investigated the incident, and by extrapolating from the poster’s YouTube user name and the background in the video, they identified the abuser. As a result of these complaints, the Comanche County Sheriff’s Department investigated the incident, and two suspects were arrested. Dusty survived the abuse, and was placed in the care of a local vet. Both the assailant and the cameraman were charged with animnal cruelty; as both are juveniles, punishment could include “psychological counseling, court monitoring until they turn 18, community service to provide restitution for treatment of animals, and/or placement in court custody.”

Dog Poop Girl

In 2005 in South Korea, bloggers targeted a woman who refused to clean up when her dog defecated on the floor of a Seoul subway car, labeling her “Dog Poop Girl” (rough translation into English). Another commuter had taken a photograph of the woman and her dog, and posted it on a popular Korean website. Within days, she had been identified by internet vigilantes, and much of her personal information was exposed on the World Wide Web in an attempt to punish her for the offense. The story received mainstream attention when it was widely reported in South Korean media. The public humiliation led the woman to quit university, according to reports.

The reaction by Korean citizens to the incident prompted several Korean newspapers to run editorials voicing concern over Internet vigilantism. One paper quoted Daniel Solove as saying that the woman was the victim of a “cyber-posse, tracking down norm violators and branding them with digital Scarlet Letters.” Another called it an “Internet witch-hunt,” and went on to say that “the Internet is turning the whole society into a kangaroo court.

[edit] The kitten killer of Hangzhou

In 2006, Wang Jue (王珏), a Chinese nurse appearing in a disturbing internet crush video stomping a kitten with her stilettos, gave herself up to authorities after bloggers and some print media started a campaign to trace back the recording. In the beginning, she was labeled as the kitten killer of Hangzhou, because it was believed she was from there; but some internauts recognized an island in northern Heilongjiang province.

Wang posted an apology on the Luobei city government official website. She said she was recently divorced and didn’t know what to do with her life. The cameraman, a provincial TV employee, and she lost their jobs when internauts discovered their identities.[14][15]

Stephen Fowler and Wife Swap

Stephen Fowler, an English expatriate and venture capitalist businessman, gained notoriety after his performance on ABC‘s Wife Swap (originally aired Friday January 30, 2009) when his wife exchanged positions in his family with a woman from Missouri for a two-week period. In response to her rule changes (standard procedure for the second week in the show) he insulted his guest and, in doing so, groups including the lower classes, soldiers, and the overweight. Several websites were made in protest against his behaviour, such as StephenFowlerSucks.com. After the show, and after watching the Wife Swap video, his wife, a professional life coach, reported that she had encouraged him to attend professional behaviour counselling. Businesses with only tangential connection to Fowler publicly disclaimed any association with him due to the negative publicity. He resigned positions on the boards of two environmental charities to avoid attracting negative press.

Cyclist abuser Incident

In 2008, video of Patrick Pogan, a rookie police officer, body-slamming Christopher Long, a cyclist, surfaced on the Internet. The altercation happened when members of Critical Mass conducted a bicycling advocacy event at Times Square. The officer claimed the cyclist had veered into him, and so the biker was charged with assault, disorderly conduct and resisting arrest.

The charges against the cyclist were later dropped and Pogan was found to be guilty and was convicted of lying about the confrontation with the cyclist.

Vigilante group targets mother

In 2009, a Facebook group was started, accusing a single mother for the death of a 13 month old child in her foster care. It was the mother’s then common-law husband who pleaded guilty to manslaughter and the mother was not formally accused of any wrongdoing. However, the members of the group, such as the boy’s biological mother, accuse her of knowing what was going on and doing nothing to stop it.[31]

Cat dumped in wheelie bin

In August 2010, a passer-by in Coventry, England later identified as Mary Bale by 4chan‘s members,[32] was caught on a private security camera stroking a cat, named Lola, then looking around and dumping her in a wheelie bin, where she was found by her owners 15 hours later. The owners posted the video on the Internet in a bid to identify the woman, who was later interviewed by the RSPCA about her conduct. Outrage was sparked among animal lovers, and a Facebook group called “Death to Mary Bale” was created, and later removed. Police said they were speaking to the 45-year-old about her personal safety.

The woman, who at first downplayed her actions (“I thought it would be funny”, “it’s just a cat” and “didn’t see what all the fuss was about”) eventually apologised “profusely for the upset and distress”.

Bale has been convicted under the Animal Welfare Act of 2006 with causing unnecessary suffering to a cat. An additional charge of failing to provide the cat with a suitable environment was dropped. She was fined £250 and ordered to pay costs, totaling £1,436.04.

Cooks Source Incident

The food magazine Cooks Source printed an article by blogger Monica Gaudio without her permission in their November 2010 issue. Learning of the copyright violation, Gaudio emailed Judith Griggs, managing editor of Cooks Source Magazine, requesting that the magazine both apologize and also donate $130 to the Columbia School of Journalism as payment for using her work. Instead she received a very unapologetic letter stating that she (Griggs) herself should be thanked for making the piece better and that Gaudio should be glad that she didn’t give someone else credit for writing the article. During the ensuing public outcry, online vigilantes took it upon themselves to avenge Gaudio. The Cooks Source Facebook page was flooded with thousands of contemptuous comments, forcing the magazine’s staff to create new pages in an attempt to escape the protest and accuse ‘hackers’ of taking control of the original page. The magazine’s website was stripped of all content by the staff and shut down a week later.

Rabbit gate

In 2010 a case was publicized involving a young female, from Sichuan under the alias name Huang siu siu (黄小小), torturing and crushing rabbits. The group that financially sponsor the making of these videos was later revealed to be called “Crushfetish” who pay young girls to crush fish, insects, rabbits and other small animals. The girl was paid 100 yuan for each attempt, and she has been participating since 2007. Police said the group makes videos to sell overseas, and the company has allegedly made 279 animal abuse videos with a subscription fee. Because of the concurrent hosting of the 2010 Asian Games, the animal videos were only limited to hosting just a few hours a day on some websites.

Operation Dogfight

On February 9, 2011, a man supposedly located in Spain posted a video of himself torturing a Pomeranian dog. Within two days, Anonymous picked up on the incident, and began searching for the man.

After attention was brought locally by Spanish anons, a news website carried an article asking local people to remain calm, and confirming that the IP address had identified Badajoz as the location of the blogger who uploaded the video.

Distributed denial-of-service

A DDoS attack can be used to take down malicious websites, such as those being used for phishing or drive-by downloads. Thousands of people generate traffic to a website, flooding it such that it goes over quota or simply can’t serve that many requests in a timely manner.

“Operation Payback”

Main article: Operation Payback

In September 2010, the founder of Aiplex Software, Girish Kumar’s admission of using distributed denial of service attacks against known and suspected copyright violators including some large-profile P2P sites resulted in the company’s servers as well as those of the MPAA and RIAA suffering a DDoS attack themselves.[41] The attack was launched by Anonymous, coordinated through IRC; the participants have willingly given control over their LOIC to the irc, forming a voluntary botnet in order to overpower their targets.

As a result, Aiplex went offline for a full 24 hours while the MPAA’s website was unreachable for 22 hours. The RIAA, the Gallant Macmillan and ACS Law firm, as well as AFACT and the Ministry of Sound has been targeted as well.

On 16 October 2010 Anonymous launched an attack against the UK Intellectual Property Office website. The attack commenced at 17:00 GMT, causing the site to go down swiftly. It was brought back online on October 22nd. The rationale for the attack was that the site was “Perpetuating the system that is allowing the exploitative usage of copyright and intellectual property.”

Counter-terrorism

An American judge, serving in Montana, has a controversial role as a vigilante online terrorist-hunter, posing as militant anti-American Muslim radicals online, hoping to attract the eye of those with similar mindsets.

Anti-pedophile internet vigilantism

Perverted Justice is a well-known example of an anti-pedophile organization that aims to expose and convict adults who, using email or web sites, solicit minors in order to commit child sexual abuse. They often collaborate with television crews such as those from Dateline. Some freely hosted blogs claim to expose real or potential child sex offenders.

Another initiative, Predator Hunter, headed by Wendell Kreuth, aims to track down and expose the pornography-related activities of alleged ‘sexual predators’. In 2002, Kreuth disclosed details of his activities in an interview with Minnesota Public Radio.

The Australian group MAKO has used the internet to warn families about sex offenders in their areas, and to coordinate warnings about them.

Members of the subculture “Anonymous” have also been credited for seeking out pedophiles and collaborating with law enforcement. They describe themselves as a collection of individuals united by ideas. They left a mark with the arrest of Canadian pedophile, Chris Forcand.

Members of the usenet group Alt.Hackers.Malicious have also been known to target and expose child predators, taking credit for dozens of arrests and convictions. They are most well-known for breaking into the NAMBLA servers on three separate occasions, downloading and disseminating the organizations membership information as well as emails which directly led to several arrests and convictions of child sexual abuse.

Identity theft activism

Main article: Identity theft

Organizations similar to vigilante action against pedophiles also target ID theft. Posing as ID thieves, they gather stolen personal information such as “dumps” (the raw encoded information contained on a payment or identification card’s magnetic stripe, microchip or transponder), bank account numbers and login information, social security numbers, etc. They then pass this information on to the associated banks, to credit monitoring companies, or to law enforcement.

Other groups specialize in the removal of phishing websites, fake banks, and fraudulent online storefronts, a practice known as “site-killing”. Artists Against 419 is a web site specializing in the removal of fake bank websites. Such groups often use tactics like DDoS attacks on the offending website, with the aim of drawing attention to the site by its hosting service or rapid consumption of the site’s monthly bandwidth allowance. The Artists Against 419 always argued their tools were not a denial-of-service attack. At any rate they abandoned such tactics some time ago.

Profit

Some companies engage in internet vigilantism for profit. One such example is MediaDefender, a company which used methods such as entrapment, P2P poisoning, and DDoS attacks.

Other political activism

See also: Patriot hacking

Around the time of the 2008 Summer Olympics torch relay, which was marred by unrest in Tibet, Chinese hackers claim to have hacked the websites of CNN (accused of selective reporting on the 2008 Lhasa riots) and Carrefour (a French shopping chain, allegedly supporting Tibetan independence), while websites and forums gave tutorials on how to launch a DDoS attack specifically on the CNN website.

Real crime vigilantes

Some people form themselves into vigilante groups aiming (overtly) to “investigate” high profile cases, but in reality often their (covert) goal is to harass those people associated in some way with the crime, but against whom no successful case has been made in the courts. Recent cases include the death of JonBenét Ramsey in the USA and the Disappearance of Madeleine McCann in the UK. Operators of these sites may be counting on the limited purview of libel laws on the Internet in order to make allegations against people that might otherwise pursue defamation cases against them were the allegations published via other media.

Anti-software piracy Internet vigilantism

An example cited on the tech news site securityfocus.com by Kevin Poulsen illustrates how two coders implemented and distributed a program that disguised itself as activation key generators and cracks for illegal software circulating on peer-to-peer file sharing sites. The duo researched software that was popular on these file sharing sites and tagged their code with their names. As soon as the software was executed, it displayed a large message, “Bad Pirate! So, you think you can steal from software companies do you? That’s called theft, don’t worry your secret is safe with me. Go thou and sin no more.” The software then called back to a central server and logged the file name under which it was executed, amount of time the message was displayed on the downloader’s computer screen and their IP address. The information gathered was then re-posted onto a public website showing the downloader’s IP address and country of origin. The program also had a unique ID embedded into each downloaded copy of it for tracking purposes to keep track of how it traversed the different networks.

If you go to wordpress.com and select NEW and then POST this is what you can do. Your content will be links and photos I guess. Categorise as you wish.

I have categorised this under Peter, Ⓐ Hype, and Ⓐ Write; don’t worry about my use of the AO symbol but try not and let your posts go as Uncategorised.

Click on the links to your categories that WordPress include in your posts and you will see that WordPress will take a user away from your free site.

One thing about this post is that I have switched off both SHOW LIKES ON THIS POST and SHOW SHARING BUTTONS ON THIS POST.

You can’t switch off LEAVE A COMMENT unless you start paying 😉

This entry was posted in Ⓐ Hype, Ⓐ Write. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s