Paper: Scambaiters, Human Flesh Search Engine, Perverted justice, and Internet Haganah: Villains, Avengers, or Saviors on the Internet?

Title: ‘Scambaiters, Human Flesh Search Engine, Perverted justice, and Internet Haganah: Villains, Avengers, or Saviors on the Internet?’
Author(s): Andreas Zingerle
Email: andreas.zingerle (at) ufg.ac.at

Published at: ISEA 2015, Vancouver, Canada.

Abstract: In recent years, Internet users have been increasingly participating in so called digilantes or cyber-vigilante communities, becoming self-appointed avengers of justice who wade through the Internet to hunt down unlawful netizens. These groups see the legal mechanisms for criminal punishment as ineffective and use social networks to crowd-source both the prosecution and the execution of punishment. I conducted an experimental investigation into these justice-seeking activist groups to compare the ‘scambaiting’ anti-fraud movement and their methods and similar web-formations like ‘Perverted justice’, ‘Human Flesh Search Engine’ and ‘Internet Haganah’. Each group’s motives are presented with recent examples, and parallels are drawn to similar projects carried out by journalists, artists or activists. Mass mediated prosecutions entertain popular culture and are used to regulate social norms. It was found that vigilante communities use congruent techniques in gathering intelligence and use comparable prosecution methods like shaming, humiliation, cyber bullying, or doxing. Furthermore, moral concerns of these deviant actions and possibilities of governmentality are discussed.

Keywords: Vigilante online communities, digilantism, hacktivism.

 

Download the pdf

 

References:

1. AA419, ‘Artists Against 419’, http://wiki.aa419.org

2. Albertson, M. (2012). ‘Secretive group expands role in cybermonitoring’, http://www.examiner.com/article/secretive-group-expands-role-cybermonitoring

3. Arizona Daily Star, ‘Border deaths database’, http://azstarnet.com/online/databases/border-deaths-database/

4. Associated Press, (2005), ‘Immigrant protests border volunteers’actions’, http://www.nbcnews.com/id/7424693/ns/us_news-security/t/immigrant-protests-border-volunteers-actions/#.U1jSWMd4HLc

5. Bazzichelli, T., ‘Networked Disruption’, Rethinking oppositions in art, hacktivism and the business of social networking, 2013, Digital Aesthetics Research Center, Aarhus, Denmark.

6. Cha, A., ‘Watchdogs Seek Out the Web’s Bad Side’, http://www.washingtonpost.com/wp_dyn/content/article/2005/04/24/AR2005042401062.html
7. Chandler, J. (2006), ‘Robin Hood: Development of a Popular Hero’, http://d.lib.rochester.edu/robin-hood/text/chandler-robin-hood-development-of-a-popular-hero
8. Cheong, P. H., & Gong, J. (2010). ‘Cyber Vigilantism, Transmedia Collective Intelligence, and Civic Participation’. Chinese Journal of Communication, 3(4), 471-487.
9. Conway, M. (2007). ‘Terrorism and Internet Governance: Core Issues’. In Disarmament Forum (Vol. 2007, No. 3, pp. 23-34). United Nations.

10. Dominguez, R., ‘Zaps Net Interface’, http://www.thing.net/~rdom/zapsTactical/zaps.html

11.EDT-Medienkunstnetz, http://www.medienkunstnetz.de/werke/flutnetz/

12. Egan, V., Hoskinson, J., & Shewan, D. (2011). ‘Perverted justice: A content analysis of the language used by offenders detected attempting to solicit children for sex’. Antisocial behavior: Causes, correlations and treatments, 20(3), 273.
13. Electronic Civil Disobedience, http://www.thing.net/~rdom/ecd/ecd.html

14. Ethington, P. J. (1987). ‘Vigilantes and the Police: The Creation of a Professional Police Bureaucracy in San Francisco’, 1847–1900. Journal of Social History, 21(2), 197-227.

15. Hogan, Michael. ‘Mads Brugger, “The Ambassador” Director, Takes Exploitation To A Whole New Level’, http://www.huffingtonpost.com/2012/08/29/mads- brugger-the-ambassador_n 1840044.html

16. Huey, L., Nhan, J., & Broll, R. (2012). ‘“Uppity civilians” and “cyber-vigilantes”: The role of the general public in policing cyber-crime”. Criminology and Criminal Justice, 1748895812448086.

17. Isherwood, J., ‘Liberia to sue The Ambassador’, http://politiken.dk/newsinenglish/ECE1705916/liberia-to- sue-the-ambassador/

18. Kohm, S. A. (2009). ‘Naming, shaming and criminal justice: Mass-mediated humiliation as entertainment and punishment’. Crime, Media, Culture, 5(2), 188-205.

19. Kringiel, D. (2012), ‘Echte Superhelden – Der Maskenmann von nebenan’, http://www.spiegel.de/einestages/real-life-superheroes-echte-superhelden-a-947635.html

20. Kroft, S. (2010), ‘Watching the Border: The Virtual Fence’, http://www.cbsnews.com/news/watching-the-border-the- virtual-fence/

21. Laorden, C., Galán-García, P., Santos, I., Sanz, B., Hidalgo, J. M. G., Bringas, P. G. (2013, January). ‘Negobot: A conversational agent based on game theory for the detection of paedophile behaviour’. In International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions (pp. 261-270). Springer Berlin Heidelberg.

22. Lindsay, J., Salah Eddin Barhoum, ‘Boston Teen Stunned To Be Portrayed As Bombing Suspect’, http://www.huffingtonpost.com/2013/04/18/salah-eddin-barhoum-bosto_n_3112892.html

23. Mac Kinnon, R., ‘RConversation: From Red Guards to Cyber Vigilantism to Where Next?’, http://rconversation.blogs.com/rconversation/2009/02/from-red-guards-to-cyber-vigilantism-to-where-next.html.
24. Miller, R., (2005), ‘Four Sites Targeted by Mugu Marauder Now Offline’, http://news.netcraft.com/archives/2005/02/28/four_sites_targeted_by_mugu_marauder_now_offline.html

25. Musgrave, J. (2010). ‘Cybercop earns fame but fuels skepticism’, Palmbeach Post online news, http://www.palmbeachpost.com/news/news/cybercop-earns-fame-but-fuels-skepticism-1/nL9HJ/
26. McNeal, G. S. (2006). Cyber Embargo: Countering the Internet Jihad. Case W. Res. J. Int’l L., 39, 789.

27. Nakamura, L. (2014). ‘“I WILL DO EVERYthing That Am Asked”: Scambaiting, Digital Show-Space, and the Racial Violence of Social Media’. Journal of Visual Culture, 13(3), 257-274.

28. Paul, I. (2011), ‘’Borderhaunt’, http://www.ianalanpaul.com/borderhaunt-2011/

29. Perverted Justice Archives, ‘The full evidence regarding Louis William Conradt, Jr.’, http://perverted-justice.com/?archive=Inxs00

30. Sheets, C., ‘10 Boston Marathon Bombing “Suspects” 4chan and Reddit Found”, http://www.ibtimes.com/10-boston-marathon-bombing-suspects-4chan-reddit-found-photos-1199213

31. Tangen, P., ‘The Real Life Superhero Project’, http://www.reallifesuperheroes.com/

32. Tuovinen, Lauri, et al. ‘Baits and beatings: vigilante justice in virtual communities.’ Proceedings of CEPE (2007): 397-405.

33. Ultrascan Advanced Global Investigations, http://www.ultrascan-agi.com/public_html/html/419_volunteers.html

34. Wang, B., Hou, B., Yao, Y., & Yan, L. (2009, October). ‘Human flesh search model incorporating network expansion and gossip with feedback’. In Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (pp. 82-88). IEEE Computer Society.

35. Weisbud, A., ‘Internet Haganah’, http://internet- haganah.com/haganah/

36. Yi-Tsen, L. (2011) ‘The power of the online public opinion. A case study on Human-Flesh Search’.

37. Zhuo-chao, Y. (2009). ‘The legitimate limit of human flesh search engine’. Public Administration & Law, 7, 039.

38. Zingerle, A., & Kronman, L. (2013, October). ‘Humiliating Entertainment or Social Activism? Analyzing Scambaiting Strategies Against Online Advance Fee Fraud’. In Cyberworlds (CW), 2013 International Conference on (pp. 352-355). IEEE.

39. Zingerle, A., ‘How to obtain passwords of online scammers by using social engineering methods’. In Cyberworlds (CW), 2014 International Conference on Cyberworlds. IEEE.