Abstract
This chapter considers another claimed benefit of cryptomarkets and the darknet generally, the feature that is seen as most threatening: anonymity. This chapter argues that anonymity is not the dangerous quality it appears to be. Most malicious activities do not take place using a darknet-provided cloak of anonymity. Communities can benefit from anonymity and pseudonymity. In any case, anonymity is neither an inherent quality of the darknet nor the cryptomarkets. Anonymity must be produced by the user. Even then, anonymity is contingent and temporary. It is contingent on the ability of the user to hide in the crowd, and it is temporary because of the growing capacity for various organisations to de-anonymising using blockchain analysis and other kinds of machine-learning and standard investigation techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty. Economics Letters, 105(3), 306–308.
Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299–319.
Bajc, V. (2007). Surveillance in public rituals. American Behavioral Scientist, 50(12), 1648–1673.
Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html.
Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (pp. 159–168). https://doi.org/10.1145/2103354.2103376.
Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures. Journal of Consumer Culture, 10(1), 3–12.
Branwen, G. (2015). Silk Road: Theory & practice. Retrieved from http://www.gwern.net/Silk%20Road.
Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34(3), 342–373.
Coleman, E. G., & Golub, A. (2008). Hacker practice. Anthropological Theory, 8(3), 255–277.
Department of Electronics and Information Technology. (2015). Draft national encryption policy. New Delhi: The Indian Ministry of Communications and Information Technology.
Durkheim, E. (2013). Durkheim: The division of labour in society. Macmillan International Higher Education, 1893.
Fischer‐Hübner, S. (1998). Privacy and security at risk in the global information society. Information, Communication & Society, 1(4), 420–441.
Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK. Urban Studies, 43(5–6), 939–955.
Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity. The Information Society, 15(2), 113–127.
Froomkin, A. M. (2015). From anonymity to identification. Journal of Self-Regulation and Regulation, 1, 121–138.
Gans, H. (1962). The urban villages. New York: Free Press.
Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224.
Geser, H. (2007). Me, my self and my Avatar: Some microsociological reflections on “second life.” Working Paper.
Gilman, N., Goldhammer, J., & Weber, S. (Eds.). (2011). Deviant globalization: Black market economy in the 21st century. A&C Black.
Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622. https://doi.org/10.1080/00071310020015280.
Hales, T. C. (2014). The NSA back door to NIST. Notices of the AMS, 61(2), 190–192.
Holt, T. J., Smirnova, O., Chua, Y. T. C., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103.
Julian. (2015). Deanonymizing darknet data @atechdad. Available at: http://atechdad.com/deanonymizing-darknet-data/.
Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity. Urban Life and Culture, 1(4), 427–451.
Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research. New Media & Society, 8(6), 859–876.
Larsson, S., & Svensson, M., (2010). Compliance or obscurity? Online anonymity as a consequence of fighting unauthorised file-sharing. Policy & Internet, 2(4), 75–103.
Larsson, S., Svensson, M., & Kaminski, M. D. (2013). Online piracy, anonymity and social change. Convergence: The International Journal of Research into New Media Technologies, 19(1), 95–114.
Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and Generation Y. Journal of Sociology, 51(3), 674–688.
Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.
Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: Cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, 19(1), 111–126. https://doi.org/10.1080/1369118X.2015.1093531.
Martin, J. (2014). Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. London: Palgrave Macmillan.
Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112.
Milgram, S. (1963). Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371–378.
Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz. Human Studies, 13(1), 97–101.
O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases. Fordham Law Review, 70, 2745.
Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.
Pfitzmann, A., & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management.
Pratt, L. H. (1988). Lying and poetry from Homer to Pindar: Falsehood and deception in archaic Greek poetics. University of Michigan Press.
Reader, B. (2012). Free press vs. free speech? The rhetoric of “civility” in regard to anonymous online comments. Journalism & Mass Communication Quarterly, 89(3), 495–513.
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Y. Altshuler, Y. Elovici, & B. A. Cremers, et al. (Eds.), Security and privacy in social networks (pp. 197–223). New York, NY: Springer New York.
Rogaway, P. (2015). The moral character of cryptographic work. IACR Cryptology ePrint Archive, 2015, 1162.
Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46. https://doi.org/10.1177/0263276413484941.
Schreier, F., & Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies. Geneva: Centre for the Democratic Control Armed Forces. Accessed 27 August 2015, http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf.
Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11(4), 441–498.
Shilling, C., & Mellor, P. A. (2014). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity. Sociology, 49(4), 607–623.
Spitter, M., Klaver, F., & Koot. G., et al. (2015). Authorship Analysis on Dark Marketplace Forums. In Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC). Manchester.
Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.), Albion’s fatal tree: Crime and society in eighteenth-century England (pp. 255–344). London: Allen Lane.
U. N. Broadband Commission for Digital Development. (2015). Cyber violence against women and girls: A world-wide wake-up call. Geneva: Broadband Commission for Sustainable Development.
Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391.
Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529.
Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183–189. https://doi.org/10.1016/j.drugpo.2013.10.009.
Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, & C.-C. J, Kuo, et al. (Eds.), Cyberspace Safety and Security (pp. 66–76). Accessed 27 July 2015, http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7. Berlin, Heidelberg: Springer.
Wirth, L. (1938). Urbanism as a way of life. American Journal of Sociology, 44(1), 1–24.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Bancroft, A. (2020). Secrecy and Anonymity Online. In: The Darknet and Smarter Crime. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26512-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-26512-0_10
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-26511-3
Online ISBN: 978-3-030-26512-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)