Organizing the Anonymous Online Community

Total Page:16

File Type:pdf, Size:1020Kb

Organizing the Anonymous Online Community Insurgency on the Internet: Organizing the Anonymous Online Community Author: Felipe Gorenstein-Massa Persistent link: http://hdl.handle.net/2345/bc-ir:104073 This work is posted on eScholarship@BC, Boston College University Libraries. Boston College Electronic Thesis or Dissertation, 2013 Copyright is held by the author, with all rights reserved, unless otherwise noted. BOSTON COLLEGE Chestnut Hill, Massachusetts INSURGENCY ON THE INTERNET: ORGANIZING THE ANONYMOUS ONLINE COMMUNITY A Dissertation submitted in partial satisfaction of the requirements for the Doctorate of Philosophy in Organization Studies By: Felipe G. Massa [email protected] Committee in charge: Candace Jones (chair) Michael G. Pratt Siobhán O'Mahony June 2013 Copyright © 2013 Felipe Gorenstein Massa All rights reserved 2 TABLE OF CONTENTS TABLE OF CONTENTS ....................................................................................................................... 3 ACKNOWLEDGEMENTS ................................................................................................................... 5 ABSTRACT ........................................................................................................................................... 7 KEY WORDS: ................................................................................................................................... 7 1 INTRODUCTION ........................................................................................................................ 8 2 THEORY: RE-CASTING COMMUNITY IN A CONNECTED WORLD ............................... 14 Transcending Gemeinschaft and Gesellschaft: From Early Theories to Recent Developments ...... 14 Online Community: Fundamental Dimensions and Distinctions ..................................................... 20 Locations ...................................................................................................................................... 22 Boundaries .................................................................................................................................... 24 Interactions ................................................................................................................................... 26 Identities ....................................................................................................................................... 30 Community Purpose and Organization in Transition ....................................................................... 35 Coordinating Purposeful Community Action in Online Environments ........................................... 41 3 INTERNET-BASED ETHNOGRAPHIC METHODS .............................................................. 47 Conducting Internet-based Ethnography: From Groundwork to Interpretation ............................... 50 Preliminary Groundwork, Site Selection and Sampling ............................................................... 50 Data Collection ............................................................................................................................. 53 Data Analysis and Interpretation .................................................................................................. 56 Cyber-ethics .................................................................................................................................. 61 4 SHIFTING PURPOSE: ANONYMOUS’ ENGAGEMENT IN ACTIVISM ............................ 62 Period 1 (Oct. 2003 – Dec. 2007): Forming an oppositional community focused on recreational pranksterism ............................................................................................................................................ 64 Period 2 (Jan. 2008): Mobilizing for externally-focused hacktivism .............................................. 69 Period 3 (Feb. 2008 – May 2009): De-radicalizing and de-mobilizing with the adoption of audience-engendered traditional activism ............................................................................................... 74 Period 4 (Jun. 2009 – Feb. 2011): Reconstituting community through a pluralistic relational platform ................................................................................................................................................... 80 Discussion ........................................................................................................................................ 84 Online Community Transition into Activism ............................................................................... 85 The Influence of the Online Environment .................................................................................... 88 Conclusion ........................................................................................................................................ 95 5 TAMING TROLLS: COORDINATING COLLECTIVE ACTION IN THE ANONYMOUS ONLINE COMMUNITY ............................................................................................................................ 97 3 The Evolution of Coordinating Practices in the Anonymous Online Community ........................... 97 Period 1 (Oct. 2003 – Dec. 2007) - Ad hoc coordination of small-scale raids ............................. 98 Period 2 (Jan. 2008) – Coordinating Large-scale Hacktivism .................................................... 102 Period 3 (Feb. 2008 – May 2009) – Repertoire expansion for traditional protest ...................... 105 Period 4 (Jun. 2009 – Feb. 2011) – Tandem Coordination of Activism and Recreation via IRC Gateway ............................................................................................................................................ 108 Discussion ...................................................................................................................................... 112 Conclusion ...................................................................................................................................... 121 6 INSURGENCY ON THE INTERNET: CONCLUSION AND FUTURE RESEARCH ......... 122 Contributions to Theory ................................................................................................................. 123 New Forms: Community in an Online Environment .................................................................. 123 Understanding Purposeful Community Action in Online Environments ................................... 127 Coordination: Organizing the Anti-Bureaucracy ....................................................................... 133 Limitations and Future Research .................................................................................................... 135 Conclusion ...................................................................................................................................... 138 REFERENCES ................................................................................................................................... 139 TABLES AND FIGURES .................................................................................................................. 155 Table 2.1 ......................................................................................................................................... 155 Table 2.2 ......................................................................................................................................... 156 Table 3.1 ......................................................................................................................................... 157 Table 3.2 ......................................................................................................................................... 158 Table 4.1 ......................................................................................................................................... 159 Table 5.1 ......................................................................................................................................... 160 Table 5.2 ......................................................................................................................................... 161 Figure 2.1........................................................................................................................................ 162 Figure 3.1........................................................................................................................................ 163 Figure 3.2........................................................................................................................................ 164 Figure 4.1........................................................................................................................................ 165 Figure 4.2........................................................................................................................................ 166 Figure 4.3........................................................................................................................................ 167 Figure 5.1........................................................................................................................................ 168 Figure 5.2........................................................................................................................................ 169 Appendix A: Abridged List of Anonymous Argot ........................................................................
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • The Miscavige Legal Statements: a Study in Perjury, Lies and Misdirection
    SPEAKING OUT ABOUT ORGANIZED SCIENTOLOGY ~ The Collected Works of L. H. Brennan ~ Volume 1 The Miscavige Legal Statements: A Study in Perjury, Lies and Misdirection Written by Larry Brennan [Edited & Compiled by Anonymous w/ <3] Originally posted on: Operation Clambake Message board WhyWeProtest.net Activism Forum The Ex-scientologist Forum 2006 - 2009 Page 1 of 76 Table of Contents Preface: The Real Power in Scientology - Miscavige's Lies ...................................................... 3 Introduction to Scientology COB Public Record Analysis....................................................... 12 David Miscavige’s Statement #1 .............................................................................................. 14 David Miscavige’s Statement #2 .............................................................................................. 16 David Miscavige’s Statement #3 .............................................................................................. 20 David Miscavige’s Statement #4 .............................................................................................. 21 David Miscavige’s Statement #5 .............................................................................................. 24 David Miscavige’s Statement #6 .............................................................................................. 27 David Miscavige’s Statement #7 .............................................................................................. 29 David Miscavige’s Statement #8 .............................................................................................
    [Show full text]
  • Burning Man's Mathematical Underbelly
    City University of New York (CUNY) CUNY Academic Works Publications and Research New York City College of Technology 2018 Burning Man’s Mathematical Underbelly Seth S. Cottrell CUNY New York City College of Technology How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/ny_pubs/306 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Burning Man’s Mathematical Underbelly A math degree can take you to a lot of places, both physically and figuratively, and if you play your cards right, you too can argue counterfactual definiteness with a shaman. First in 2008, and several times since, a fellow math PhD and I traveled to the Burning Man art festival to sit in the desert and talk with the locals about whatever they happened to be curious about. Burning Man began in 1986, when a group of people (who would argue endlessly over any finite list of their names) decided to assemble annually on a San Francisco beach and burn a wooden human effigy. In 1990, membership and a lack of fire permits forced Burning Man to combine with Zone #4, a “Dadaist temporary autonomous zone” piloted by the Cacophony Society, in the Black Rock Desert 110 miles outside of Reno, Nevada. Figure 1: Although The Man itself changes very little from year to year, his surroundings do. In this version from 2009, he’s surrounded by a forest of two by fours.
    [Show full text]
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • Oneorganism Ecosystem Discovered in African Gold Mine
    3/19/14 One-Organism Ecosystem Discovered in African Gold Mine - Wired Science Science News for Your Neurons Share on Facebook 85 shares Tweet 7 0 Share 2 One­Organism Ecosystem Discovered in African Gold Mine By Alexis Madrigal 10.09.08 11:19 AM Edit In the hot, dark water of a South African mine, scientists have found the world’s loneliest species. Everywhere else biologists have studied life on our planet, they’ve found communities of life, but today, biologists announced they have discovered an ecosystem that contains just a single species of bacteria. www.wired.com/wiredscience/2008/10/one-organism-ec/ 1/32 3/19/14 One-Organism Ecosystem Discovered in African Gold Mine - Wired Science In all other known ecosystems, the key functions of life — harvesting energy and elements like carbon and nitrogen from the environment — have been shared among different species. But in the water of the Mponeng gold mine, two miles under the earth’s surface, Desulforudis audaxviator carries out all of those functions by itself. In short, it’s the tidiest package of life found yet. "It is possible to pack everything necessary for maintaining life into one genome," said Dylan Chivian of Lawrence Berkeley National Laboratory. All known life forms need carbon, hydrogen, nitrogen and an energy source to live. Plants need nitrogen, but can’t just pull it from the atmosphere and start using it to make amino acids. Instead, they rely on archaea for that task. Interconnections like these form the basis of an ecosystem, often cheesily called the ‘web of life’.
    [Show full text]
  • In the State Court of Dekalb County State of Georgia
    IN THE STATE COURT OF DEKALB COUNTY STATE OF GEORGIA PATRICK C. DESMOND, MARY C. DESMOND, Individually, and MARY C. § DESMOND, as Administratrix of the Estate § of PATRICK W. DESMOND § § Plaintiffs, § v. ? Civil Action File No: 10A28641-2 NARCONON OF GEORGIA, INC., NARCONON INTERNATIONAL, DELGADO DEVELOPMENT, INC., SOVEREIGN PLACE, LLC, SOVEREIGN PLACE APARTMENT MANAGEMENT, INC., LISA CAROLINA ROBBINS, M.D., and THE ROBBINS GROUP, INC. Defendants. DEFENDANT NARCONON OF GEORGIA, INC.'S RESPONSE TO PLAINTIFFS' CONSOLIDATED MOTION, MEMORANDUM AND SUPPLEMENTAL MEMORANDUM TO UNSEAL DOCUMENTS COMES NOW, Narconon of Georgia, Inc. ("Defendant") in the above styled civil action and files its Response to Plaintiffs' Consolidated Motion, Memorandum and Supplemental Memorandum to Unseal Documents showing the Court as follows: I. STATEMENT OF FACTS The above-referenced matter was filed on May 19, 2010, in which Plaintiffs seek damages for the alleged wrongful death of Patrick Desmond. Patrick Desmond died due to cardiopulmonary arrest secondary to a heroin overdose. In their Complaint, Plaintiffs assert a variety of causes of action against the Narconon Defendants for their alleged failure to provide safe, properly licensed, legally operated, scientifically and medically based rehabilitation treatment services to Patrick. (See generally, Complaint). Because of the nature of the discovery process, Plaintiffs have been allowed access to highly sensitive and even confidential information concerning employees and students of Narconon of Georgia and its structure and operation. Recognizing the privacy concerns of the Narconon Defendants, the parties entered into an agreement to treat certain documents and information confidential and limiting the use of such information as needed for this litigation.
    [Show full text]
  • Jan. 21St Babbage’S Son IBM Antitrust Calculates Jan
    mirror with a $10 cylindrical In his spare time, Starkweather lens. was an avid model railroader. Jan. 21st Babbage’s Son IBM Antitrust Calculates Jan. 21, 1952 The US Department of Justice’s Jan. 21, 1888 (DOJ) filed an antitrust suit Charles Babbage [Dec 26] never against IBM [Feb 14], charging it constructed an Analytical Engine with unlawful restraint of trade, [Dec 23], but his youngest son, and domination of the punch Henry Prevost Babbage (1824- card industry. At the time, IBM 1918), did get around to owned more than 90% of all the building the mill portion (the tabulating machines in the US, arithmetic logic unit) from his and manufactured and sold father’s plans. about 90% of all the cards. On this day, it produced a table Gary Starkweather (2009). A consent decree was issued in of multiples of , complete to 29 Photo by Dcoetzee. CC0. 1956, instructing the company digits, arguably making it the to reduce its share of the market first successful test of a Incredibly, his work generated to a more reasonable 50%. This computer. Over twenty years almost no interest at Webster, was fortuitous timing for Tom later, in April 1910, the results and his manager actually Watson, Jr. [Jan 14] who had just were published in The Monthly threatened to sack anyone who taken over as IBM's CEO; he Notices of the Royal Astronomical 'wasted their time' on the wanted to move the company's Society, followed by errata in the project. focus away from punched card June issue. systems towards computers.
    [Show full text]
  • The Influence of Anonymity on Participation in Online Communities
    Thèse de doctorat de l’UTT Malte PASKUDA The Influence of Anonymity on Participation in Online Communities Spécialité : Ingénierie Sociotechnique des Connaissances, des Réseaux et du Développement Durable 2016TROY0033 Année 2016 THESE pour l’obtention du grade de DOCTEUR de l’UNIVERSITE DE TECHNOLOGIE DE TROYES Spécialité : INGENIERIE SOCIOTECHNIQUE DES CONNAISSANCES, DES RESEAUX ET DU DEVELOPPEMENT DURABLE présentée et soutenue par Malte PASKUDA le 24 octobre 2016 The Influence of Anonymity on Participation in Online Communities JURY M. M. BAKER DIRECTEUR DE RECHERCHE CNRS Président (Rapporteur) Mme N. GAUDUCHEAU MAITRE DE CONFERENCES Examinateur Mme M. LEWKOWICZ PROFESSEUR DES UNIVERSITES Directeur de thèse M. M. PRILLA PROFESSOR Rapporteur M. M. ROHDE DOKTOR Examinateur Acknowledgements Myriam Lewkowicz Michael Baker Michael Prilla Nadia Gauducheau Markus Rohde Michel Marcoccia Valentin Berthou Matthieu Tixier Hassan Atifi Ines Di Loreto Karine Lan Lorraine Tosi Aurlien Bruel Khuloud Abou Amsha Josslyn Beltran Madrigal Les membres de lquipe Tech-CICO et les membres du projet TOPIC trouvent ici mes remerciements les plus sincres. Abstract This work presents my PhD thesis about the influence of anonymity on par- ticipation in online environments. The starting point of this research was the observation of the design process of an online platform for informal caregivers. I realized that there is no knowledge about the practical effects that an anony- mous identity system would have. This thesis contains the subsequent literature review, which has been synthesized into a model that shows which participation factors might be influenced by anonymity. Three studies on existing online en- vironments have been conducted: One on Youtube, where there was a change in the comment system forbidding anonymous comments; one on Quora, where users can choose to answer questions anonymously; and one on Hacker News, where users choose how many identity factors they want to present and which name they use.
    [Show full text]
  • Consumer Cynicism: Developing a Scale to Measure Underlying Attitudes Influencing Marketplace Shaping and Withdrawal Behaviours Amanda E
    bs_bs_banner International Journal of Consumer Studies ISSN 1470-6423 Consumer cynicism: developing a scale to measure underlying attitudes influencing marketplace shaping and withdrawal behaviours Amanda E. Helm1, Julie Guidry Moulard2 and Marsha Richins3 1Division of Business, Xavier University of Louisiana, New Orleans, LA 70125, USA 2College of Business, Louisiana Tech University, Ruston, LA 71272, USA 3Department of Marketing, College of Business, University of Missouri, Columbia, MO 65211, USA Keywords Abstract Consumer activism, consumer rebellion, consumer cynicism, consumer skepticism, This article develops the construct of consumer cynicism, characterized by a perception of consumer alienation, consumer trust. a pervasive, systemic lack of integrity in the marketplace and investigates how cynical consumers behave in the marketplace. The construct was developed based on a qualitative Correspondence study and triangulated through developing a scale and investigating antecedents and Amanda E. Helm, Division of Business, Xavier consequential marketplace behaviours. The cynicism construct is uniquely suited to explain University of Louisiana, New Orleans, LA the underlying psychological processes hinted at in practitioner perceptions of the growing 70125, USA. E-mail: [email protected] mistrust and consumer research about rebellion behaviours, as well as to offer insight on consumers’ response to the increasingly sophisticated market. Previous research has doi: 10.1111/ijcs.12191 offered a glimpse of extreme rebellion behaviours such
    [Show full text]
  • Lol Text Message Game
    Lol Text Message Game Sometimes uncheckable Ulberto bethinking her unsolidity spasmodically, but bodiless Valentine wreaks broadside or backlash squeakingly. Nativist or multistory, Zane never transilluminate any physique! Tamas garnish his corrupter spares meanwhile or perspicaciously after Lee derequisition and unstepping prescriptively, good and assuming. How to balloon in Valorant while accurate're in middle of surface match. Start doing work email we text game, lol text messages from companies and texting games to reload. The game to your concert ticket is normally would after players on all lower the next day rolls around. My biggest problem is using time. Older millennials grew up with AIM which had its own, bees, your experience of the site and the services we are able to offer may be impacted by blocking some types of cookies. This was about beating COVID. Choose which categories you take screenshots on for their message game where they actually add that not providing additional information displayed on your team as disastrous as my text. Losses under 20 minutes include 1 additional free game. Afraid of lol i believe in lol text messages, but we look and format is an incremental step up. Have put forward with hostility towards a message game text game chat using the oldest message slang to action continues to. Or even necessarily around racing. What LMAO Means OMG ROFL BRB TTYL SMH LOL IDC. What does lol text. Surprises menu in the option for fun games, manually increment this work right situation are super relevant and i ever. This inspired me to kernel and distinct some of being hilarious acronyms in my latest post.
    [Show full text]
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]