Advertisement

Secrecy and Anonymity Online

  • Angus BancroftEmail author
Chapter
Part of the Palgrave Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

This chapter considers another claimed benefit of cryptomarkets and the darknet generally, the feature that is seen as most threatening: anonymity. This chapter argues that anonymity is not the dangerous quality it appears to be. Most malicious activities do not take place using a darknet-provided cloak of anonymity. Communities can benefit from anonymity and pseudonymity. In any case, anonymity is neither an inherent quality of the darknet nor the cryptomarkets. Anonymity must be produced by the user. Even then, anonymity is contingent and temporary. It is contingent on the ability of the user to hide in the crowd, and it is temporary because of the growing capacity for various organisations to de-anonymising using blockchain analysis and other kinds of machine-learning and standard investigation techniques.

References

  1. Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty. Economics Letters, 105(3), 306–308.Google Scholar
  2. Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299–319.Google Scholar
  3. Bajc, V. (2007). Surveillance in public rituals. American Behavioral Scientist, 50(12), 1648–1673.CrossRefGoogle Scholar
  4. Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html.
  5. Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (pp. 159–168).  https://doi.org/10.1145/2103354.2103376.
  6. Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures. Journal of Consumer Culture, 10(1), 3–12.Google Scholar
  7. Branwen, G. (2015). Silk Road: Theory & practice. Retrieved from http://www.gwern.net/Silk%20Road.
  8. Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.Google Scholar
  9. Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34(3), 342–373.CrossRefGoogle Scholar
  10. Coleman, E. G., & Golub, A. (2008). Hacker practice. Anthropological Theory, 8(3), 255–277.Google Scholar
  11. Department of Electronics and Information Technology. (2015). Draft national encryption policy. New Delhi: The Indian Ministry of Communications and Information Technology.Google Scholar
  12. Durkheim, E. (2013). Durkheim: The division of labour in society. Macmillan International Higher Education, 1893.Google Scholar
  13. Fischer‐Hübner, S. (1998). Privacy and security at risk in the global information society. Information, Communication & Society, 1(4), 420–441.CrossRefGoogle Scholar
  14. Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK. Urban Studies, 43(5–6), 939–955.Google Scholar
  15. Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity. The Information Society, 15(2), 113–127.CrossRefGoogle Scholar
  16. Froomkin, A. M. (2015). From anonymity to identification. Journal of Self-Regulation and Regulation, 1, 121–138.Google Scholar
  17. Gans, H. (1962). The urban villages. New York: Free Press.Google Scholar
  18. Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224.CrossRefGoogle Scholar
  19. Geser, H. (2007). Me, my self and my Avatar: Some microsociological reflections on “second life.” Working Paper.Google Scholar
  20. Gilman, N., Goldhammer, J., & Weber, S. (Eds.). (2011). Deviant globalization: Black market economy in the 21st century. A&C Black.Google Scholar
  21. Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622.  https://doi.org/10.1080/00071310020015280.CrossRefGoogle Scholar
  22. Hales, T. C. (2014). The NSA back door to NIST. Notices of the AMS, 61(2), 190–192.Google Scholar
  23. Holt, T. J., Smirnova, O., Chua, Y. T. C., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103.Google Scholar
  24. Julian. (2015). Deanonymizing darknet data @atechdad. Available at: http://atechdad.com/deanonymizing-darknet-data/.
  25. Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity. Urban Life and Culture, 1(4), 427–451.CrossRefGoogle Scholar
  26. Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research. New Media & Society, 8(6), 859–876.CrossRefGoogle Scholar
  27. Larsson, S., & Svensson, M., (2010). Compliance or obscurity? Online anonymity as a consequence of fighting unauthorised file-sharing. Policy & Internet, 2(4), 75–103.Google Scholar
  28. Larsson, S., Svensson, M., & Kaminski, M. D. (2013). Online piracy, anonymity and social change. Convergence: The International Journal of Research into New Media Technologies, 19(1), 95–114.Google Scholar
  29. Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and Generation Y. Journal of Sociology, 51(3), 674–688.Google Scholar
  30. Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.Google Scholar
  31. Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: Cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, 19(1), 111–126.  https://doi.org/10.1080/1369118X.2015.1093531.CrossRefGoogle Scholar
  32. Martin, J. (2014). Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. London: Palgrave Macmillan.Google Scholar
  33. Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112.CrossRefGoogle Scholar
  34. Milgram, S. (1963). Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371–378.CrossRefGoogle Scholar
  35. Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz. Human Studies, 13(1), 97–101.CrossRefGoogle Scholar
  36. O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases. Fordham Law Review, 70, 2745.Google Scholar
  37. Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.Google Scholar
  38. Pfitzmann, A., & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management.Google Scholar
  39. Pratt, L. H. (1988). Lying and poetry from Homer to Pindar: Falsehood and deception in archaic Greek poetics. University of Michigan Press. Google Scholar
  40. Reader, B. (2012). Free press vs. free speech? The rhetoric of “civility” in regard to anonymous online comments. Journalism & Mass Communication Quarterly, 89(3), 495–513.CrossRefGoogle Scholar
  41. Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Y. Altshuler, Y. Elovici, & B. A. Cremers, et al. (Eds.), Security and privacy in social networks (pp. 197–223). New York, NY: Springer New York.Google Scholar
  42. Rogaway, P. (2015). The moral character of cryptographic work. IACR Cryptology ePrint Archive, 2015, 1162.Google Scholar
  43. Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46.  https://doi.org/10.1177/0263276413484941.CrossRefGoogle Scholar
  44. Schreier, F., & Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies. Geneva: Centre for the Democratic Control Armed Forces. Accessed 27 August 2015, http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf.
  45. Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11(4), 441–498.CrossRefGoogle Scholar
  46. Shilling, C., & Mellor, P. A. (2014). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity. Sociology, 49(4), 607–623.Google Scholar
  47. Spitter, M., Klaver, F., & Koot. G., et al. (2015). Authorship Analysis on Dark Marketplace Forums. In Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC). Manchester.Google Scholar
  48. Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.), Albion’s fatal tree: Crime and society in eighteenth-century England (pp. 255–344). London: Allen Lane.Google Scholar
  49. U. N. Broadband Commission for Digital Development. (2015). Cyber violence against women and girls: A world-wide wake-up call. Geneva: Broadband Commission for Sustainable Development.Google Scholar
  50. Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391.Google Scholar
  51. Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529.Google Scholar
  52. Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183–189.  https://doi.org/10.1016/j.drugpo.2013.10.009.CrossRefGoogle Scholar
  53. Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, & C.-C. J, Kuo, et al. (Eds.), Cyberspace Safety and Security (pp. 66–76). Accessed 27 July 2015, http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7. Berlin, Heidelberg: Springer.
  54. Wirth, L. (1938). Urbanism as a way of life. American Journal of Sociology, 44(1), 1–24.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.School of Social and Political ScienceUniversity of EdinburghEdinburghUK

Personalised recommendations