Skip to main content

Secrecy and Anonymity Online

  • Chapter
  • First Online:
The Darknet and Smarter Crime

Part of the book series: Palgrave Studies in Cybercrime and Cybersecurity ((PSCYBER))

  • 1210 Accesses

Abstract

This chapter considers another claimed benefit of cryptomarkets and the darknet generally, the feature that is seen as most threatening: anonymity. This chapter argues that anonymity is not the dangerous quality it appears to be. Most malicious activities do not take place using a darknet-provided cloak of anonymity. Communities can benefit from anonymity and pseudonymity. In any case, anonymity is neither an inherent quality of the darknet nor the cryptomarkets. Anonymity must be produced by the user. Even then, anonymity is contingent and temporary. It is contingent on the ability of the user to hide in the crowd, and it is temporary because of the growing capacity for various organisations to de-anonymising using blockchain analysis and other kinds of machine-learning and standard investigation techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty. Economics Letters, 105(3), 306–308.

    Google Scholar 

  • Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299–319.

    Google Scholar 

  • Bajc, V. (2007). Surveillance in public rituals. American Behavioral Scientist, 50(12), 1648–1673.

    Article  Google Scholar 

  • Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html.

  • Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (pp. 159–168). https://doi.org/10.1145/2103354.2103376.

  • Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures. Journal of Consumer Culture, 10(1), 3–12.

    Google Scholar 

  • Branwen, G. (2015). Silk Road: Theory & practice. Retrieved from http://www.gwern.net/Silk%20Road.

  • Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.

    Google Scholar 

  • Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34(3), 342–373.

    Article  Google Scholar 

  • Coleman, E. G., & Golub, A. (2008). Hacker practice. Anthropological Theory, 8(3), 255–277.

    Google Scholar 

  • Department of Electronics and Information Technology. (2015). Draft national encryption policy. New Delhi: The Indian Ministry of Communications and Information Technology.

    Google Scholar 

  • Durkheim, E. (2013). Durkheim: The division of labour in society. Macmillan International Higher Education, 1893.

    Google Scholar 

  • Fischer‐Hübner, S. (1998). Privacy and security at risk in the global information society. Information, Communication & Society, 1(4), 420–441.

    Article  Google Scholar 

  • Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK. Urban Studies, 43(5–6), 939–955.

    Google Scholar 

  • Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity. The Information Society, 15(2), 113–127.

    Article  Google Scholar 

  • Froomkin, A. M. (2015). From anonymity to identification. Journal of Self-Regulation and Regulation, 1, 121–138.

    Google Scholar 

  • Gans, H. (1962). The urban villages. New York: Free Press.

    Google Scholar 

  • Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224.

    Article  Google Scholar 

  • Geser, H. (2007). Me, my self and my Avatar: Some microsociological reflections on “second life.” Working Paper.

    Google Scholar 

  • Gilman, N., Goldhammer, J., & Weber, S. (Eds.). (2011). Deviant globalization: Black market economy in the 21st century. A&C Black.

    Google Scholar 

  • Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622. https://doi.org/10.1080/00071310020015280.

    Article  Google Scholar 

  • Hales, T. C. (2014). The NSA back door to NIST. Notices of the AMS, 61(2), 190–192.

    Google Scholar 

  • Holt, T. J., Smirnova, O., Chua, Y. T. C., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103.

    Google Scholar 

  • Julian. (2015). Deanonymizing darknet data @atechdad. Available at: http://atechdad.com/deanonymizing-darknet-data/.

  • Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity. Urban Life and Culture, 1(4), 427–451.

    Article  Google Scholar 

  • Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research. New Media & Society, 8(6), 859–876.

    Article  Google Scholar 

  • Larsson, S., & Svensson, M., (2010). Compliance or obscurity? Online anonymity as a consequence of fighting unauthorised file-sharing. Policy & Internet, 2(4), 75–103.

    Google Scholar 

  • Larsson, S., Svensson, M., & Kaminski, M. D. (2013). Online piracy, anonymity and social change. Convergence: The International Journal of Research into New Media Technologies, 19(1), 95–114.

    Google Scholar 

  • Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and Generation Y. Journal of Sociology, 51(3), 674–688.

    Google Scholar 

  • Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.

    Google Scholar 

  • Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: Cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, 19(1), 111–126. https://doi.org/10.1080/1369118X.2015.1093531.

    Article  Google Scholar 

  • Martin, J. (2014). Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. London: Palgrave Macmillan.

    Google Scholar 

  • Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112.

    Article  Google Scholar 

  • Milgram, S. (1963). Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371–378.

    Article  Google Scholar 

  • Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz. Human Studies, 13(1), 97–101.

    Article  Google Scholar 

  • O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases. Fordham Law Review, 70, 2745.

    Google Scholar 

  • Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.

    Google Scholar 

  • Pfitzmann, A., & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management.

    Google Scholar 

  • Pratt, L. H. (1988). Lying and poetry from Homer to Pindar: Falsehood and deception in archaic Greek poetics. University of Michigan Press.

    Google Scholar 

  • Reader, B. (2012). Free press vs. free speech? The rhetoric of “civility” in regard to anonymous online comments. Journalism & Mass Communication Quarterly, 89(3), 495–513.

    Article  Google Scholar 

  • Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Y. Altshuler, Y. Elovici, & B. A. Cremers, et al. (Eds.), Security and privacy in social networks (pp. 197–223). New York, NY: Springer New York.

    Google Scholar 

  • Rogaway, P. (2015). The moral character of cryptographic work. IACR Cryptology ePrint Archive, 2015, 1162.

    Google Scholar 

  • Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46. https://doi.org/10.1177/0263276413484941.

    Article  Google Scholar 

  • Schreier, F., & Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies. Geneva: Centre for the Democratic Control Armed Forces. Accessed 27 August 2015, http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf.

  • Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11(4), 441–498.

    Article  Google Scholar 

  • Shilling, C., & Mellor, P. A. (2014). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity. Sociology, 49(4), 607–623.

    Google Scholar 

  • Spitter, M., Klaver, F., & Koot. G., et al. (2015). Authorship Analysis on Dark Marketplace Forums. In Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC). Manchester.

    Google Scholar 

  • Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.), Albion’s fatal tree: Crime and society in eighteenth-century England (pp. 255–344). London: Allen Lane.

    Google Scholar 

  • U. N. Broadband Commission for Digital Development. (2015). Cyber violence against women and girls: A world-wide wake-up call. Geneva: Broadband Commission for Sustainable Development.

    Google Scholar 

  • Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391.

    Google Scholar 

  • Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529.

    Google Scholar 

  • Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183–189. https://doi.org/10.1016/j.drugpo.2013.10.009.

    Article  Google Scholar 

  • Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, & C.-C. J, Kuo, et al. (Eds.), Cyberspace Safety and Security (pp. 66–76). Accessed 27 July 2015, http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7. Berlin, Heidelberg: Springer.

  • Wirth, L. (1938). Urbanism as a way of life. American Journal of Sociology, 44(1), 1–24.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angus Bancroft .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bancroft, A. (2020). Secrecy and Anonymity Online. In: The Darknet and Smarter Crime. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26512-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26512-0_10

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26511-3

  • Online ISBN: 978-3-030-26512-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics