World Library  
Flag as Inappropriate
Email this Article

Internet vigilantism

Article Id: WHEBN0006582852
Reproduction Date:

Title: Internet vigilantism  
Author: World Heritage Encyclopedia
Language: English
Subject: Scam baiting, Human flesh search engine, Anonymous (group), Timeline of events associated with Anonymous, Aiplex Software
Collection: Internet Vigilantism, Vigilantism
Publisher: World Heritage Encyclopedia

Internet vigilantism

Internet vigilantism is the phenomenon of vigilante acts taken through the Internet (the communication network or its service providers) or carried out using applications (World Wide Web, e-mail) that depend on the Internet. The term encompasses vigilantism against scams, crimes, and non-Internet related behavior. It was termed digilantism[1] in the wake of the Boston Marathon Bombing.

Some have suggested that the Internet's lack of central control has prompted a tendency towards vigilante reactions against certain behaviors in the same way that they have prompted those behaviors to occur in the first place.[2]


  • Methods 1
    • Scam baiting 1.1
    • Public shaming 1.2
    • Distributed denial-of-service 1.3
      • "Project Chanology" 1.3.1
      • "Operation Payback" 1.3.2
      • Alan Ralsky spamming incident 1.3.3
      • MegaUpload Retaliation 1.3.4
    • Counter-terrorism 1.4
    • Google bombing 1.5
    • Lizard Squad Attacks 1.6
    • Anti-pedophile Internet vigilantism 1.7
    • Identity theft activism 1.8
    • Profit 1.9
    • Other political activism 1.10
    • Real crime vigilantes 1.11
    • Anti-software piracy Internet vigilantism 1.12
  • Prevention 2
  • Legislative framework 3
  • See also 4
  • References 5
  • Further reading 6
  • External links 7


The following are methods of Internet vigilantism that have been used or proposed for use:

Scam baiting

Scam baiting is the practice of feigning interest in a scam in order to manipulate the scammer behind it. The purpose of scam baiting might be to waste the scammers' time, embarrass him or her, cause them to reveal information which can be passed on to legal authorities in the hope that they will be prosecuted, get them to spend money, or simply to amuse the baiter.

Scam baiting emerged in response to e-mail based frauds such as the common Nigerian 419 scam. Many websites publish transcripts of correspondences between baiters and scammers, and also publish their "trophies" online, which include videos and images scam baiters have obtained from scammers.

Public shaming

The social networking tools of the World Wide Web have been used as a tool to easily and widely publicize instances of perceived anti-social behavior.

David Furlow, chairman of the Media, Privacy and Defamation Committee of the American Bar Association, has identified the potential privacy concerns raised by websites facilitating the distribution of information that is not part of the public record (documents filed with a government agency), and has said that such websites "just [give] a forum to people whose statements may not reflect truth."[3]

After some controversial incidents of public shaming, the popular link-sharing and discussion website Reddit introduced a strict rule against the publication of non-public personally-identifying information via the site (colloquially known on Reddit and elsewhere as "doxing"). Those who break the rule are subject to a site-wide ban, and their posts and even entire communities may be removed for breaking the rule.

In 2015, online shaming was the subject of a book So You've Been Publicly Shamed by Jon Ronson

Distributed denial-of-service

A DDoS attack can be used to take down malicious websites, such as those being used for phishing or drive-by downloads. Thousands of people generate traffic to a website, flooding it such that it goes over quota or simply can't serve that many requests in a timely manner.

"Project Chanology"

Project Chanology was a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group that defines itself as ubiquitous. The project was started in response to the Church of Scientology's attempts to remove material from a highly publicized interview with Scientologist Tom Cruise from the Internet in January 2008.

Project Chanology began its campaign by organizing and delivering a series of denial-of-service attacks against Scientology websites. The group was successful in taking down local and global Scientology websites intermittently from January 18, 2008 until at least January 25, 2008. Anonymous had early success rendering major Scientology websites inaccessible and leaking documents allegedly stolen from Scientology computers. This resulted in a large amount of coverage on social bookmarking websites.[4]

"Operation Payback"

In September 2010, the founder of Aiplex Software, Girish Kumar's admission of using distributed denial of service attacks against known and suspected copyright violators including some large-profile P2P sites resulted in the company's servers as well as those of the MPAA and RIAA suffering a DDoS attack themselves.[5] The attack was launched by Anonymous, coordinated through IRC; the participants have willingly given control over their LOIC to the irc, forming a voluntary botnet in order to overpower their targets.

As a result, Aiplex went offline for a full 24 hours while the MPAA's website was unreachable for 22 hours. The RIAA, the Gallant Macmillan and ACS Law firm, as well as AFACT and the Ministry of Sound has been targeted as well.

On 16 October 2010, Anonymous launched an attack against the UK Intellectual Property Office website. The attack commenced at 17:00 GMT, causing the site to go down swiftly. It was brought back online on October 22. The rationale for the attack was that the site was "Perpetuating the system that is allowing the exploitative usage of copyright and intellectual property."[6]

Alan Ralsky spamming incident

In December 2002, convicted spammer Alan Ralsky was interviewed by the Detroit News. In the interview, Ralsky defended his position by arguing that spamming was a "perfectly legal business." He also claimed that he would never quit spamming and expressed interest at some of the newest spamming technologies such as "stealth spamming".[7]

Shortly afterwards, this article was posted on Slashdot, a popular technology news site. In response to Ralsky's remarks, the members of Slashdot posted his personal information and urged people to use this information to subscribe Ralsky to a number of free mailing subscriptions for the purpose of sending junk mail to his home. As a result, Ralsky's home received bags of mail daily.[8]

MegaUpload Retaliation

In response to MegaUpload's seizure by the US Department of Justice and FBI, the hacker group Anonymous announced on Twitter, "We Anonymous are launching our largest attack ever on government and music industry sites. Lulz. The FBI didn't think they would get away with this did they? They should have expected us." Later that week, as many as 10 sites had been taken offline in response to the Megaupload shutdown including the FBI, Universal Music, RIAA (Recording Industry Association of America) and Hadopi - the French government agency responsible for "protecting creative works on the Internet" and "the attacks were carried out by spreading links via Twitter and other parts of the Internet which carried out distributed denial-of-service attacks".[9]


An American judge, serving in Montana, has a controversial role as a vigilante online terrorist-hunter, posing as militant anti-American Muslim radicals online, hoping to attract the eye of those with similar mindsets.[10]

Google bombing

Google bombing is a process where website owners manipulate Internet search ranking algorithms to link searches for one term to another term. A group of activists chose to manipulate Google by adding hyperlinks to Michael Moore with the anchor text "miserable failure", so that a person searching for the term "miserable failure" was more likely to find political figures.

The campaign for the neologism "santorum" started with a contest held in May 2003 by Dan Savage, a columnist and LGBT rights activist. Savage asked his readers to create a definition for the word "santorum" in response to then-U.S. Senator Rick Santorum's views on homosexuality, and comments about same sex marriage. In his comments, Santorum had stated that "In every society, the definition of marriage has not ever to my knowledge included homosexuality. That's not to pick on homosexuality. It's not, you know, man on child, man on dog, or whatever the case may be." Savage announced the winning entry, which defined "santorum" as "the frothy mixture of lube and fecal matter that is sometimes the byproduct of anal sex". He created a web site, (and, to promote the definition, which became a top Internet search result displacing the Senator's official website on many search engines, including Google, Yahoo! Search, and Bing. Savage offered in May 2010 to remove the site if Santorum donated $5 million to Freedom to Marry, an advocacy group for same-sex marriage.[11]

Lizard Squad Attacks

In September of 2014 the hacker group 'Lizard Squad' made multiple DDoS attacks on a variety of online games that include Destiny, Call of Duty: Ghosts, FIFA Madden, and Sims 4. The game servers were brought offline multiple times which caused a large commotion in the gaming community and on Twitter.[12]

Anti-pedophile Internet vigilantism

Dateline. Some freely hosted blogs claim to expose real or potential child sex offenders.

Another initiative, Predator Hunter, headed by Wendell Kreuth, aims to track down and expose the pornography-related activities of alleged 'sexual predators'. In 2002, Kreuth disclosed details of his activities in an interview with Minnesota Public Radio.[13]

The Australian group MAKO has used the Internet to warn families about sex offenders in their areas,[14] and to coordinate warnings about them.[15]

Members of the subculture "Anonymous" have also been credited for seeking out pedophiles and collaborating with law enforcement.[16][17] They describe themselves as a collection of individuals united by ideas. They left a mark with the arrest of Canadian pedophile, Chris Forcand. In early November 2011, Anonymous launched Operation Darknet, which targeted websites that distribute and traffic child pornography. Anonymous reportedly leaked the personal details of more than 1,100 pedophiles to Pastebin, and invited the FBI and Interpol to investigate the information for leads.

Members of the Usenet group Alt.Hackers.Malicious have also been known to target and expose child predators, taking credit for dozens of arrests and convictions. They are most well known for breaking into the NAMBLA servers on three separate occasions, downloading and disseminating the organizations membership information as well as emails which directly led to several arrests and convictions of child sexual abuse.

In June, Anonymous members claimed to have located and identified two predators in Edmonton, Alberta, Canada. After passing on the information and "evidence" including a video purportedly showing one of the alleged pedophiles attempting to lure youths, Edmonton police announced they would not be able to lay charges due to a lack of real evidence. They also stated that Anonymous' interference and public attacks on their integrity in the media, while not providing them with what they needed in private was keeping them from legitimate cases currently being worked. An e-mailed statement to media from Alberta Law Enforcement Response Teams’ Integrated Child Exploitation (ICE) Unit in Edmonton said, "The video postings this week have not only hampered our investigations, but have also distracted our ICE team and investigators from other work," adding "The time we have spent dealing with these videos has been at the expense of other important child sexual exploitation investigations." ICE followed up by saying they are committed to working with any tipster who can help them stop child exploitation, including Anonymous.[18]

In 2012, an unidentified group located at began exposing potential Internet predators in New York and the surrounding areas with the use of decoy profiles. Conversations which identify the individual by name are posted on the Internet, usually followed by interrogatory phone calls made to the subject for the purpose of obtaining a confession. The subjects are then left to deal with the consequences of their actions, with the evidence of their inappropriate contact with minors spread through social media.[19]

Identity theft activism

Organizations similar to vigilante action against pedophiles also target ID theft. Posing as ID thieves, they gather stolen personal information such as "dumps" (the raw encoded information contained on a payment or identification card's magnetic stripe, microchip or transponder), bank account numbers and login information, social security numbers, etc. They then pass this information on to the associated banks, to credit monitoring companies, or to law enforcement.

Other groups specialize in the removal of phishing websites, fake banks, and fraudulent online storefronts, a practice known as "site-killing". Artists Against 419 is a web site specializing in the removal of fake bank websites. Such groups often use tactics like DDoS attacks on the offending website, with the aim of drawing attention to the site by its hosting service or rapid consumption of the site's monthly bandwidth allowance. The Artists Against 419 always argued their tools were not a denial-of-service attack. At any rate they abandoned such tactics some time ago.[20]


Some companies engage in Internet vigilantism for profit. One such example is MediaDefender, a company which used methods such as entrapment, P2P poisoning, and DDoS attacks.

Other political activism

Around the time of the 2008 Summer Olympics torch relay, which was marred by unrest in Tibet, Chinese hackers claim to have hacked the websites of CNN (accused of selective reporting on the 2008 Lhasa riots[21]) and Carrefour (a French shopping chain, allegedly supporting Tibetan independence),[22] while websites and forums gave tutorials on how to launch a DDoS attack specifically on the CNN website.

Real crime vigilantes

Some people form themselves into vigilante groups aiming (overtly) to expose injustice, whitewash and cover-ups in high profile criminal cases against innocent victims, often children. Recent cases include the death of JonBenét Ramsey in the USA and the disappearance in Portugal of the British girl Madeleine McCann.

Anti-software piracy Internet vigilantism

An example cited on the tech news site by Kevin Poulsen illustrates how two coders implemented and distributed a program that disguised itself as activation key generators and cracks for illegal software circulating on peer-to-peer file sharing sites. The duo researched software that was popular on these file sharing sites and tagged their code with their names. As soon as the software was executed, it displayed a large message, “Bad Pirate! So, you think you can steal from software companies do you? That's called theft, don't worry your secret is safe with me. Go thou and sin no more." The software then called back to a central server and logged the file name under which it was executed, amount of time the message was displayed on the downloader’s computer screen and their IP address. The information gathered was then re-posted onto a public website showing the downloader’s IP address and country of origin. The program also had a unique ID embedded into each downloaded copy of it for tracking purposes to keep track of how it traversed the different networks. [23]


Many sites have taken measures to prevent vigilantism. One form is the reporting and deletion of any sensitive information regarding an individual or group that can lead to their identity being known. Admins, moderators, users, and bots all take action to find and detect doxing.

Legislative framework

In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer-to-peer computer networks.[2] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."[24] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.[25]

See also


  1. ^ "Dawn Of The Digilante". TechCrunch. 2013-04-21. Retrieved 2014-05-29. 
  2. ^ a b Giving Chase in Cyberspace  PDF
  3. ^ Tracy Swartz, RedEye (2007-05-31). "The wide world of cyber snitching". Chicago Tribune. Retrieved 2014-05-29. 
  4. ^ ""Hackers Declare War on Scientology: A shadowy Internet group has succeeded in taking down a Scientology Web site after effectively declaring war on the church and calling for it to be destroyed."". 2008-01-25. Retrieved 2008-01-25. 
  5. ^ "DDoS attack against the MPAA and RIAA servers (Hungarian)". 2010-09-22. Retrieved 2010-09-30. 
  6. ^ "Anonymous Takes Out UK Intellectual Property Office Website". TorrentFreak. 
  7. ^ "Spam king lives large off others' e-mail troubles (English)". 2002-11-22. Archived from the original on 2002-11-24. Retrieved 2013-03-27. 
  8. ^ "10 Big Cases of Revenge (English)". 2002-11-22. Retrieved 2013-03-27. 
  9. ^ "Hackers retaliate over Megaupload website shutdown (English)". BBC News. 2012-01-20. Retrieved 2013-03-27. 
  10. ^ "Internet has 'given Al Qaeda wings' claims BBC potboiler". The Register. 2005-07-27. Retrieved 2014-05-29. 
  11. ^ Mencimer, Stephanie (September–October 2010). "Rick Santorum's Anal Sex Problem". Mother Jones.  
  12. ^ Hacker Group Lizard Squad Takes Down Destiny, Call of Duty, FIFA And More. (2014, September 24). Retrieved March 25, 2015, from http://www.forbes.coms/insertcoin/2014/09/29/hacker-group-lizard-squad-takes-down-destiny-call-of-duty-fifa-and-more/
  13. ^ Chasing online predators, April 15, 2002, retrieved May 21, 2007
  14. ^ Kim Wheatley (2007-02-22). "Public warned about abuser". The Advertiser. 
  15. ^ "Dad's anger at sex offender's approach - Local News - Geelong, VIC, Australia". 2007-12-17. Retrieved 2012-03-12. 
  16. ^ Constable George Schuurman, Public Information, for Detective Constable Janelle Blackadar, Sex Crimes Unit (2007-12-06). "Man facing six charges in Child Exploitation investigation, Photograph released, Chris Forcand, 53" (PDF). News Release ( 
  17. ^ Jonathan Jenkins (2007-12-07). "Man trolled the web for girls: cops".  
  18. ^ [1]
  19. ^
  20. ^ "New Bandwidth Policy - aa419". Retrieved 2012-03-12. 
  21. ^ "Anti-CNN website". Retrieved 2009-03-03. 
  22. ^ SBS Dateline, 6 Aug 2008 [2] video link
  23. ^ Kevin Poulsen (2004-03-18). "Anti-piracy vigilantes track file sharers". Retrieved 2012-03-12. 
  24. ^ "The Truth About The Peer To Peer Piracy Prevention Act". 2002-10-01. Retrieved 2009-03-03. 
  25. ^ "Let Hollywood Hack". Retrieved 2009-03-03. 

Further reading

  • Byrne, Dara N. 419 Digilantes and the Frontier of Radical Justice Online. Radical History Review, Vol. 117, 2013, p. 70-82. doi:10.1215/01636545-2210464
  • Rolon, Dario N. Vigilancia informatica y responsabilidad penal de los proveedores de internet:

External links

  • 'From flash mob to lynch mob', CNN, June 5, 2007
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.