Abstract
This chapter looks at the rise of online vigilantism in the modern era. It seeks to define the actions of online vigilantes and explores the motivations and the actions undertaken by those who engage in these extra-legal activities. Throughout the chapter, these actions will be discussed within the parameters of crowdsourced vigilantism in the United States and the People’s Republic of China, cybersecurity counter hacking, hacktivism, online shaming, and scambaiting. This will be followed by the examination of the ethics and legality of the tasks undertaken by those engaged in online vigilantism as well as a theoretical lens through which to discuss the topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abad-Santos, A. (2013, April). Reddit’s ‘find Boston bombers’ founder says ‘it was a disaster’ but ‘incredible’. Retrieved from https://www.theatlantic.com/national/archive/2013/04/reddit-find-boston-bombers-founder-interview/315987/
Allnitt, L. (2011, June). Old-school hacker Oxblood Ruffin discusses anonymous and the future of hacktivism. Radio Free Europe Radio Liberty. Retrieved from http://www.rferl.org/content/hacker_oxblood_ruffin_discusses_anonymous_and_the_future_of_hacktivism/24228166.html
Anonymous. (2006). The road to Chad/Darfour. [Collection of primary source emails and timelines]. Retrieved from https://www.419eater.com/html/RoadToChadDarfur/index.html
BBC News. (2011, January). China hit-and-run driver sentenced to six years in jail. Retrieved from http://www.bbc.co.uk/news/world-asia-pacific-12317756
BBC News. (2013, April). Reddit apologizes for Boston online ‘witch hunt’. Retrieved from https://www.bbc.com/news/technology-22263020
Blee, K. M. (2005). Racial violence in the United States. Ethnic and Racial Studies, 28(4), 599–619.
Boehler, P. (2013, May). Pictured: Henan residents on rampage over Honda driver’s sense of entitlement. South China Morning Post. Retrieved from http://www.scmp.com/news/china/article/1247402/pictured-henan-residents-rampage-over-honda-drivers-sense-entitlement
Bosman, J., & Robertson, C. (2014, November). A quiet wedding for Darren Wilson. The New York Times. Retrieved from https://www.nytimes.com/news/ferguson/2014/11/24/quiet-wedding-for-darren-wilson-police-officer-in-ferguson-shooting/
CBS News. (2014, November). Documents describe Ferguson officer’s account of fatal shooting. Retrieved from https://www.cbsnews.com/news/documents-describe-ferguson-officers-version-of-fatal-shooting/
Chang, L., & Poon, R. (2017). Internet vigilantism: Attitudes and experiences of university students toward cyber crowdsourcing in Hong Kong. International Journal of Offender Therapy and Comparative Criminology, 61(16), 1912–1932. https://doi.org/10.1177/0306624X16639037.
Cheong, P. H., & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3(4), 471–487.
Chicago Tribune. (2018, April). Key moments in the 2013 Boston Marathon bombing. Retrieved from https://www.chicagotribune.com/sports/breaking/ct-boston-marathon-bombing-key-moments-20180413-story.html
Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.
CNN Staff. (2013, April). What we know about the Boston terrorist attack. Retrieved from https://edition.cnn.com/2013/04/18/us/boston-marathon-things-we-know
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. In Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND Corporation (Vol. 239, p. 288).
Dewar, R. (2014). The ‘triptych of cyber security’: A classification of active cyber defence, 6th annual conference on cyber conflict. In P. Brangetto, M. Maybaum, & J. Stinissen (Eds.), 6th International conference on cyber conflict, Tallinn, Estonia (pp. 7–27). NATO Cooperative Cyber Defense Center of Excellence. Retrieved from https://www.ccdcoe.org/uploads/2018/10/CyCon_2014.pdf#page=20
Dockterman, E. (2015, July). Cecil the lion: Dentist who shot lion writes letter to patients. TIME. Retrieved from http://time.com/3977018/cecil-lion-walter-palmer-letter/
Dumsday, T. (2009). On cheering Charles Bronson: The ethics of vigilantism. The Southern Journal of Philosophy, 47(1), 49–67.
Gallagher, S. (2011, October). Anonymous takes down darknet child porn site on tor network. Retrieved from http://arstechnica.com/business/2011/10/anonymous-takes-down-darknet-child-porn-site-on-tor-network/
Gibbs, S. (2015, August). Ashley Madison condemns attack as experts confirm database is real. Retrieved from https://www.theguardian.com/technology/2015/aug/19/ashley-madisons-hacked-customer-files-posted-online-as-threatened-say-reports
Goldstein, D. M. (2003). “In our own hands”: Lynching, justice, and the law in Bolivia. American Ethnologist, 30(1), 22–43.
Gurr, R. T. (2016). Why men rebel: Fortieth anniversary edition. New York: Routledge. (Originally published in 1970).
Gutierrez, R. (2007, September). Rights-El Salvador: Death squads still operating. Retrieved from https://web.archive.org/web/20071108233217/http://www.ipsnews.net/news.asp?idnews=39143
Haas, N., de Keijse, J., & Bruinsma, G. (2014). Public support for vigilantism, confidence in police and police responsiveness. Policing and Society: An International Journal of Research and Policy, 24(2), 224–241. https://doi.org/10.1080/10439463.2013.784298.
Halpern, J. (2015, August). The man who shot Michael Brown. The New Yorker. Retrieved from https://www.newyorker.com/magazine/2015/08/10/the-cop
Hoffman, W., & Levite, A. (2017). Private sector cyber defense: Can active measures help stabilize cyberspace? Carnegie Endowment for International Peace. Retrieved from https://carnegieendowment.org/files/Cyber_Defense_INT_final_full.pdf
Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017). Exploring the subculture of ideologically motivated cyber-attackers. Journal of Contemporary Criminal Justice, 33(3), 212–233. https://doi.org/10.1177/1043986217699100.
Internet Crime Complaint Center. (2017). 2017 Internet crime report. Retrieved from https://pdf.ic3.gov/2017_IC3Report.pdf
Johnston, L. (1996). What is vigilantism? British Journal of Criminology, 36(2), 220–236.
Khimm, S. (2017, April). Hunting child predators with Canada’s freelance vigilantes. Esquire. Retrieved from https://www.esquire.com/news-politics/a54240/creep-catchers-canada-pedophile-hunters/
Koganzon, R. (2015). Review: The politics of digital shaming. The New Atlantis, 45, 118–126.
Left, S. (2001, May). Chinese and American hackers declare ‘cyberwar’. The Guardian. Retrieved from https://www.theguardian.com/technology/2001/may/04/china.internationalnews
Lemon, S. (2008, May). Chinese police detain woman over quake video. PC World. Retrieved from http://www.pcworld.com/article/146171/article.html
Leyden, J. (2011, October). Anonymous shuts down hidden child abuse hub. Retrieved from http://www.theregister.co.uk/2011/10/24/anonymous_fight_child_abuse_network/
Lopez, P. (2015, August). The global fallout of the Ashley Madison hack. Retrieved from https://www.france24.com/en/20150820-global-fall-out-ashley-madison-hack
Murphy, T. (2014, December). The rise and fall of Twitter’s most infamous right-wing troll. Mother Jones. Retrieved from https://www.motherjones.com/politics/2014/12/charles-chuck-johnson-gotnews-rolling-stone/
Nhan, J., Huey, L., & Broll, R. (2015). Digilantism: An analysis of crowdsourcing and the Boston Marathon bombings. The British Journal of Criminology, 57(2), 341–367.
Norlock, K. (2017). Online shaming. Social Philosophy Today, 33, 187–197.
Post-Dispatch Staff. (2018). Four years ago today: Darren Wilson not indicted in Michael Brown’s death, violence erupts in Ferguson. Retrieved from https://www.stltoday.com/news/local/crime-and-courts/four-years-ago-today-darren-wilson-not-indicted-in-michael/article_cc091c9a-db9b-5cf7-9cfd-a66abdf45887.html#3
Ronson, J. (2015a, February). How one stupid tweet blew up Justine Sacco’s life. Retrieved from https://www.nytimes.com/2015/02/15/magazine/how-one-stupid-tweet-ruined-justine-saccos-life.html
Ronson, J. (2015b). So you’ve been publicly shamed. New York: Riverhead Books.
Rosenbaum, H. J., & Sederberg, P. C. (1974). Vigilantism: An analysis of establishment violence. Comparative Politics, 6(4), 541–570.
Rosenthal, E., & Sanger, D. (2001, April). U.S. plane in China after it collides with Chinese jet. The New York Times. Retrieved from https://www.nytimes.com/2001/04/02/world/us-plane-in-china-after-it-collides-with-chinese-jet.html
Schmidle, N. (2018, May). The digital vigilantes who hack back: American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without breaking the law? The New Yorker. Retrieved https://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-back
Segall, L. (2015, September). Pastor outed on Ashley Madison commits suicide. Retrieved from https://money.cnn.com/2015/09/08/technology/ashley-madison-suicide/index.html
Selk, A. (2018, February). Internet scammers are terrible. This troll is their nightmare. The Washington Post. Retrieved from https://www.washingtonpost.com/news/the-intersect/wp/2018/02/08/internet-scammers-are-terrible-this-troll-is-their-nightmare/?noredirect=on&utm_term=.2fbdbd4b68e6
Silva, K. (2018). Vigilantism and cooperative criminal justice: Is there a place for cybersecurity vigilantes in cybercrime fighting? International Review of Law, Computers & Technology, 32(1), 21–36. https://doi.org/10.1080/13600869.2018.1418142.
Smallridge, J., Wagner, P., & Crowl, J. (2016). Understanding cyber-vigilantism: A conceptual framework. Journal of Theoretical and Philosophical Criminology, 8(1), 57–70.
Tan, K. (2008, May). Online lynch mobs find second post-quake target; Liaoning girl detained by the police. Shanghaiist. Retrieved from http://shanghaiist.com/2008/05/22/online_lynch_mo.php
Tankebe, J. (2009). Policing, and procedural justice: Ghanaian vigilantism and the rule of law. Law & Society Review, 43(2), 245–270. Retrieved from https://www.jstor.org/stable/29734190
Tao, A. (2013, May). “I come from an influential family,” says Honda driver who nicks 10-year old girl inciting near-riot. Beijing Cream. Retrieved from http://beijingcream.com/2013/05/i-come-from-an-influential-family-says-honda-driver/
Tuovinen, L., & Röning, J. (2007). Baits and beatings: Vigilante justice in virtual communities. In Proceedings of CEPE 2007. The 7th international conference of computer ethics: philosophical enquiry (pp. 397–405).
Wade, C. (2014, April). The Reddit reckoning. Retrieved from https://slate.com/technology/2014/04/reddit-and-the-boston-marathon-bombings-how-the-site-reckoned-with-its-own-power.html
Weisburd, D. (1988). Vigilantism as community social control: Developing a quantitative criminological model. Journal of Quantitative Criminology, 4(2), 137–153. Retrieved from https://www.jstor.org/stable/23365643
Wildlife Watch. (2018, March). Cecil the lion’s final hours revealed by Oxford scientists in new book. National Geographic. Retrieved from https://news.nationalgeographic.com/2018/03/wildlife-watch-cecil-trophy-hunting-andrew-loveridge/
Wines, M. (2010, November). China’s censors misfire in abuse-of-power case. Herald-Tribune. Retrieved from http://www.heraldtribune.com/article/20101118/ZNYT03/11183012
Withnall, A. (2013, December). PR executive Justine Sacco apologises after losing her job over racist aids ‘joke’ provoked #hasjustinelandedyet Twitter storm. Retrieved from https://www.independent.co.uk/news/people/news/pr-executive-justine-sacco-apologises-after-losing-job-over-racist-aids-joke-provoked-9020809.html
Yan, S. (2018, October). Pick up poo or we take the dog: Chinese city rolls out ‘social credit’ system for pet owners. Retrieved from https://www.telegraph.co.uk/news/2018/10/30/pick-poo-take-dog-chinese-city-rolls-social-credit-system-pet/
Zingerle, A. (2014a). The art of trickery: Methods to establish first contact in internet scams. Paper presented at xCoAx conference 2014, Porto, Portugal. Retrieved from http://www.andreaszingerle.com/publication-the-art-of-trickery-methods-to-establish-first-contact-in-internet-scams/
Zingerle, A. (2014b). Towards a categorization of scambaiting strategies against online advance fee fraud. International Journal of Art, Culture, and Design Technologies, 4(2), 39–50. Retrieved from http://www.andreaszingerle.com/publication-towards-a-categorization-of-scambaiting-strategies/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Smallridge, J., Wagner, P. (2020). The Rise of Online Vigilantism. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_68
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_68
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences