The Four Horsemen of the Infocalypse refers to those who use the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
to facilitate crime or (pejoratively) to rhetorical approaches evoking such criminals.
The phrase is a play on
Four Horsemen of the Apocalypse
The Four Horsemen of the Apocalypse are figures in the Christian scriptures, first appearing in the Book of Revelation, a piece of apocalypse literature written by John of Patmos.
Revelation 6 tells of a book or scroll in God's right hand t ...
. There is not a universally agreed definition of who the Horsemen are.
Terrorist
Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
s,
pedophile
Pedophilia ( alternatively spelt paedophilia) is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children. Although girls typically begin the process of puberty a ...
s/child molesters, and
organized crime
Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally th ...
like
drug dealer
A drug is any chemical substance that causes a change in an organism's physiology or psychology when consumed. Drugs are typically distinguished from food and substances that provide nutritional support. Consumption of drugs can be via inhalati ...
s,
intellectual property pirates, and
money launderers
Money laundering is the process of concealing the origin of money, obtained from illicit activities such as drug trafficking, corruption, embezzlement or gambling, by converting it into a legitimate source. It is a crime in many jurisdictions ...
are cited commonly.
One of the most famous definitions is in ''
The Cyphernomicon'' by the
cypherpunk
A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
writer and engineer
Tim May, which states:
Digital rights activist
Cory Doctorow
Cory Efram Doctorow (; born July 17, 1971) is a Canadian-British blogger, journalist, and science fiction author who served as co-editor of the blog '' Boing Boing''. He is an activist in favour of liberalising copyright laws and a proponent of ...
frequently cites "software pirates, organized crime, child pornographers, and terrorists". Other sources use slightly different descriptions, but generally refer to similar activities.
History
The term was
coined by
Timothy C. May in 1988. May referred to "child pornographers, terrorists, drug dealers, etc.". May used the phrase to express disdain for what he perceived as "
Think of the children
"Think of the children" (also "What about the children?") is a cliché that evolved into a rhetorical tactic. In the literal sense, it refers to children's rights (as in discussions of child labor). In debate, however, it is a plea for pity t ...
" argumentation by government officials and others seeking to justify limiting the civilian use of
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
tools. Connotations related to such argumentation continue to be attached to the phrase, and it is more commonly used by those who wish to deride various restrictions on Internet activity than by those who support such restrictions.
Examples of "Four Horsemen" argumentation
The four supposed threats may be used all at once or individually, depending on the circumstances:
In 2015, the
UK Conservative party
The Conservative Party, officially the Conservative and Unionist Party and also known colloquially as the Tories, is one of the two main political parties in the United Kingdom, along with the Labour Party. It is the current governing party, ...
claimed that their proposed “new communications data legislation will strengthen our ability to disrupt terrorist plots, criminal networks, and organized child grooming gangs”, echoing the "child pornographers, terrorists, drug dealers, etc." quote of Timothy C. May.
Later in 2015,
Gamma Group
Gamma Group is an Anglo-German technology company that sells surveillance software to governments and police forces around the world. The company has been strongly criticised by human rights organisations for selling its FinFisher software to u ...
released a statement claiming that their surveillance technology is used "against terrorist threats, drug cartels, other major organized crime, and paedophile rings."
as justification for concerns that it was being used to target opposition politicians and media groups in
Uganda
}), is a landlocked country in East Africa. The country is bordered to the east by Kenya, to the north by South Sudan, to the west by the Democratic Republic of the Congo, to the south-west by Rwanda, and to the south by Tanzania. The sou ...
. With money-laundering treated as a major organised crime, this quote matches very closely with the list given in the Cypherpunk FAQ.
See also
*
Crypto Wars
Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencie ...
*
Fear, uncertainty and doubt
Fear, uncertainty and doubt (often shortened to FUD) is a propaganda tactic used in sales, marketing, public relations, politics, polling and cults. FUD is generally a strategy to influence perception by disseminating negative and dubious or ...
References
{{Reflist
External links
*
The Cyphernomicon' by Timothy May
Cybercrime
Computer security
Rights
Four Horsemen of the Apocalypse