anonymous blog
{{Short description|Internet phenomenon}}
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers.{{cite web|title=Anonymous Blogging with Wordpress & Tor|url=http://advox.globalvoices.org/projects/guide/#writeoffline|website=Global Voices Advocacy|publisher=Global Voices Online|access-date=19 October 2014}} Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in whistleblower cases), a government (in countries that monitor or censor online communication), or another group.
Deanonymizing techniques
Fundamentally, deanonymization can be divided into two categories:
- Social correlation compares known details about a person's life with the contents of an anonymous blog to look for similarities. If the author does not attempt to conceal their identity, social correlation is a very straightforward procedure: a simple correlation between the "anonymous" blogger's name, profession, lifestyle, etc., and the known person. Even if an author generally attempts to conceal their identity (by not providing their name, location, etc.), the blog can be deanonymized by correlating seemingly innocuous, general details.{{cite web|title=How to Blog Safely|url=https://www.eff.org/wp/blog-safely|website=Electronic Frontier Foundation|date=11 April 2005 |access-date=19 October 2014}}
- Technical identification determines the author's identity through the blog's technical details. In extreme cases, technical identification entails looking at the server logs, the Internet provider logs, and payment information associated with the domain name.
These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification.
Types
Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories:
- Political: A commentary on the political situation within a country, where being open may risk prosecution.{{cite news|title=For the love of change and blogging|publisher=Times of Oman|date=February 15, 2010|author=Sandhya Menon}} Anonymous blogging can also add power to a political debate, such as in 2008 when blogger Eduwonkette, later revealed as Columbia University sociology graduate student Jennifer Jennings, successfully questioned New York Mayor Michael Bloomberg's takeover of New York schools.{{cite news |author=Schemo, Diana |date=September 8, 2008 |title=Wonder wonk unmasked |work=New York magazine |publisher=New York Media |url=http://nymag.com/news/intelligencer/49527/}}
- Revolutionary and counter-revolutionary: These can either be inspiring activity or counter activity, often against a violent state apparatus. For example, Salam Pax, the Baghdad blogger, wrote for The Guardian newspaper under a pseudonym that he could shed only when Saddam Hussein no longer ruled in Iraq. Similar bloggers appeared during the Arab Spring.{{cite web|url=https://www.theguardian.com/commentisfree/2011/jun/13/open-door-anonymous-blogger|title=Open door: The authentication of anonymous bloggers|author=Chris Elliott|work=The Guardian|date=13 June 2011|access-date=2012-06-02}}
- Dissident: Dissident blogs may document life under an oppressive or secretive regime, while not actively promoting or inspiring revolutionary or counter-revolutionary action. Mosul Eye, which has described life under ISIL occupation in Mosul, Iraq, has been called one of the few reliable sources of information on life inside the city since it began in June 2014.{{cite magazine|last1=Wright|first1=Robin|title=The Secret Eye Inside Mosul|url=http://www.newyorker.com/news/news-desk/the-secret-eye-inside-mosul|access-date=1 November 2016|magazine=The New Yorker|date=27 October 2016}}
- Religious: Views and comments about religious view points and issues, perhaps questioning some written standpoints.{{cite news|title=Media, spiritualities and social change|publisher=Reference & Research Book News|date=August 1, 2011}}
- Whistleblower: The whistleblower blog is a modern-day twist on the classical "insider spotting illegality" theme. This can cover all sectors or issues. Among the most notable is that by the Irish Red Cross head of the international department Noel Wardick, who highlighted that €162,000 in donations to the 2004 Indian Ocean earthquake and tsunami had sat in an account for over three years. After spending over €140,000 on private investigators and legal expenses to find the whistle blower, including court orders to obtain Wardick's identity from UPC and Google,Charlie Taylor (27 August 2010) [http://www.irishtimes.com/newspaper/ireland/2010/0827/1224277687034.html "Red Cross blogger reveals identity"] Irish Times the IRC disciplined and later dismissed Wardick. In 2010, an internal enquiry into Wardick's allegations found other such bank accounts, and proposals to overhaul the IRC's management were discussed in the Dáil on 15 December. Questions were answered by Tony Killeen, then the Minister of Defence. Wardick later successfully sued the IRC for unfair dismissal.{{Cite web|title=Irish Red Cross: 15 Dec 2010: Dáil debates (KildareStreet.com)|url=https://www.kildarestreet.com/debates/?id=2010-12-15.496.0|access-date=2020-12-06|website=www.kildarestreet.com}}
- Company insider: A company employee or insider reports on company operations and issues from within the organisation. The most famous is probably the Dooce.com blogger Heather Armstrong,{{cite news|title=Need-to-know basics of workplace blogging|publisher=Voice of America, Work & Family Life|date=October 1, 2006|author=Flynn, Nancy}} who was fired for writing satirical accounts of her experiences at a dot-com startup on her personal blog, [http://www.dooce.com/ dooce.com].{{cite news | url=http://news.bbc.co.uk/1/hi/entertainment/4659469.stm#dooce | title = Summary about Dooce By BBC | date=July 20, 2005 | access-date=January 5, 2010 | work=BBC News | first=Darren | last=Waters}}
- Community pressure: Written by a citizen of an area, on a particular subject, to bring about a change. In 2007, reporter and blogger Mike Stark came out in support of anonymous blogger Spocko, who was trying to bring what he called "violent commentary" on San Francisco area radio station KSFO to the attention of its advertisers.{{cite news
|title=KSFO radio hosts take on blogger's allegations
|work=The San Francisco Chronicle
|date=January 13, 2007
|author=Joe Garofoli
|url=http://docs.newsbank.com/openurl?ctx_ver=z39.88-2004&rft_id=info:sid/iw.newsbank.com:NewsBank:SFCB&rft_val_format=info:ofi/fmt:kev:mtx:ctx&rft_dat=116A27CE7AA56998&svc_dat=InfoWeb:aggregated4&req_dat=0D10F2CADB4B24C0}}
- Experience/Customer Service: Most experience blogs focus on personal insights or views of customer service, frequently with dissatisfaction. Most anonymous experience blogs are written anonymously as they allow the customer/user to keep experiencing and using the service, and reporting/blogging, while nudging at a defined and appropriate level against the target organisation. Among these are Sarah Wu's/Mrs Q. [http://fedupwithlunch.com/ "Fed Up With Lunch" blog], a chronicle of her experience as an adult eating Chicago area high school lunch every day for a year,{{cite news|title=Explore life's conundrums|publisher=Honolulu Star|date=February 5, 2012 |author=Thomas, Christine}} which has now been turned into a book.{{cite book|title=Fed Up with Lunch: The School Lunch Project|author=Sarah Wu/Mrs Q.|publisher=# Chronicle Books|date=October 5, 2011|isbn=978-1452102283|url-access=registration|url=https://archive.org/details/fedupwithlunchho0000wusa}}
- Personal: The personal blog strays into personal life in ways that allow more risk taking and open in terms of detail. Hence, many of these blogs are sexual in nature,{{cite book|title=Girl With a One Track Mind: Exposed: Further Revelations of a Sex Blogger|author=Abby Lee|publisher=Pan|date=5 Mar 2010|isbn=978-0330509695}} although many also exist for those with health problems and disabilities and how they see the world and cope with its challenges. Some of the latest personal blogs are seen by many as extended group therapy, covering issues including weight loss.{{cite news|title=THE LATEST WEAPON TO FIGHT EXTRA FLAB - BLOGGING!|publisher=Hindustan Times|date=January 27, 2009}}
Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as the Mafia using anonymous blogs against mayors and local administrators in Italy.{{cite news|title=Fewer bullets, more blogging|publisher=The Sunday Herald|date=December 4, 2011}}
How online identity is determined
=IP addresses=
An IP address is a unique numerical label assigned to a computer connected to a computer network that uses the Internet Protocol for communication.{{IETF RFC|760}}, DOD Standard Internet Protocol (January 1980) The most popular implementation of the Internet Protocol would be the Internet (capitalized, to differentiate it from smaller internetworks). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a Regional Internet registry, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead, DHCP is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence.
=Word and character frequency analysis=
Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized.{{cite web|last1=Schneier|first1=Bruce|title=Identifying People by their Writing Style|url=https://www.schneier.com/blog/archives/2011/08/identifying_peo_2.html|website=Schneier on Security|access-date=20 October 2014}} This is known as stylometry; adversarial stylometry is the study of techniques for resisting such stylistic identification.
See also
References
{{reflist|2}}
External links
{{Wiktionary}}
{{wikiquote|Blogging}}
- [https://archive.today/20150218205600/http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VB3-4JH47F6-5&_user=10&_handle=V-WA-A-W-AB-MsSAYZW-UUA-U-AAVYYUUEZC-AAVZBYADZC-YBADCWEZW-AB-U&_fmt=summary&_coverDate=12/31/2006&_rdoc=5&_orig=browse&_srch=%23toc%235915%232006%23999779997%23619171!&_cdi=5915&view=c&_acct=C000050221&_version=1&;_urlVersion=0&_userid=10&md5=3a78d26b9ff73d0a9c37060c8bed6dbc Computer Law and Security Report Volume 22 Issue 2, Pages 127-136] blogs, Lies and the Doocing by Sylvia Kierkegaard (2006)
- [https://www.eff.org/bloggers/lg/ Legal Guide for bloggers] by the Electronic Frontier Foundation
{{Blog topics}}
- [http://bagushikmatiar.eu.org Blog Personal]