Anonymous Blogger
   HOME

TheInfoList



OR:

An anonymous blog is a
blog A blog (a Clipping (morphology), truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries also known as posts. Posts are typically displayed in Reverse chronology, reverse chronologic ...
without any acknowledged author or contributor. Anonymous bloggers may achieve
anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
through the simple use of a
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in
whistleblower Whistleblowing (also whistle-blowing or whistle blowing) is the activity of a person, often an employee, revealing information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe, unethical or ...
cases), a government (in countries that monitor or censor online communication), or another group.


Deanonymizing techniques

Fundamentally, deanonymization can be divided into two categories: *Social
correlation In statistics, correlation or dependence is any statistical relationship, whether causal or not, between two random variables or bivariate data. Although in the broadest sense, "correlation" may indicate any type of association, in statistics ...
compares known details about a person's life with the contents of an anonymous blog to look for similarities. If the author does not attempt to conceal their identity, social correlation is a very straightforward procedure: a simple correlation between the "anonymous" blogger's name, profession, lifestyle, etc., and the known person. Even if an author generally attempts to conceal their identity (by not providing their name, location, etc.), the blog can be deanonymized by correlating seemingly innocuous, general details. *Technical identification determines the author's identity through the blog's technical details. In extreme cases, technical identification entails looking at the server logs, the
Internet provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non ...
logs, and payment information associated with the
domain name In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority, or control. Domain names are often used to identify services provided through the Internet, such as websites, email services, and more. ...
. These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification.


Types

Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories: *Political: A commentary on the political situation within a country, where being open may risk prosecution. Anonymous blogging can also add power to a political debate, such as in 2008 when blogger Eduwonkette, later revealed as
Columbia University Columbia University in the City of New York, commonly referred to as Columbia University, is a Private university, private Ivy League research university in New York City. Established in 1754 as King's College on the grounds of Trinity Churc ...
sociology graduate student Jennifer Jennings, successfully questioned New York Mayor
Michael Bloomberg Michael Rubens Bloomberg (born February 14, 1942) is an American businessman and politician. He is the majority owner and co-founder of Bloomberg L.P., and was its CEO from 1981 to 2001 and again from 2014 to 2023. He served as the 108th mayo ...
's takeover of New York schools. *Revolutionary and counter-revolutionary: These can either be inspiring activity or counter activity, often against a violent state apparatus. For example,
Salam Pax Salam Pax is the pseudonym of Salam Abdulmunem (), aka Salam al-Janabi (), under which he became the "most famous blogger in the world" during and after the 2003 invasion of Iraq. Along with a massive readership, his site "Where is Raed?" recei ...
, the ''Baghdad blogger'', wrote for ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' newspaper under a pseudonym that he could shed only when
Saddam Hussein Saddam Hussein (28 April 1937 – 30 December 2006) was an Iraqi politician and revolutionary who served as the fifth president of Iraq from 1979 until Saddam Hussein statue destruction, his overthrow in 2003 during the 2003 invasion of Ira ...
no longer ruled in
Iraq Iraq, officially the Republic of Iraq, is a country in West Asia. It is bordered by Saudi Arabia to Iraq–Saudi Arabia border, the south, Turkey to Iraq–Turkey border, the north, Iran to Iran–Iraq border, the east, the Persian Gulf and ...
. Similar bloggers appeared during the
Arab Spring The Arab Spring () was a series of Nonviolent resistance, anti-government protests, Rebellion, uprisings, and Insurgency, armed rebellions that spread across much of the Arab world in the early 2010s. It began Tunisian revolution, in Tunisia ...
. *Dissident: Dissident blogs may document life under an oppressive or secretive regime, while not actively promoting or inspiring revolutionary or counter-revolutionary action. '' Mosul Eye'', which has described life under ISIL occupation in Mosul, Iraq, has been called one of the few reliable sources of information on life inside the city since it began in June 2014. *Religious: Views and comments about religious view points and issues, perhaps questioning some written standpoints. *Whistleblower: The whistleblower blog is a modern-day twist on the classical "insider spotting illegality" theme. This can cover all sectors or issues. Among the most notable is that by the Irish Red Cross head of the international department Noel Wardick, who highlighted that
The euro sign () is the currency sign used for the euro, the official currency of the eurozone. The design was presented to the public by the European Commission on 12 December 1996. It consists of a stylized letter E (or epsilon), crossed by t ...
162,000 in donations to the
2004 Indian Ocean earthquake and tsunami On 26 December 2004, at 07:58:53 local time ( UTC+7), a major earthquake with a magnitude of 9.2–9.3 struck with an epicentre off the west coast of Aceh in northern Sumatra, Indonesia. The undersea megathrust earthquake, known in the sci ...
had sat in an account for over three years. After spending over €140,000 on private investigators and legal expenses to find the whistle blower, including court orders to obtain Wardick's identity from UPC and Google, the IRC disciplined and later dismissed Wardick. In 2010, an internal enquiry into Wardick's allegations found other such bank accounts, and proposals to overhaul the IRC's management were discussed in the Dáil on 15 December. Questions were answered by Tony Killeen, then the Minister of Defence. Wardick later successfully sued the IRC for
unfair dismissal In labour law, unfair dismissal is an act of employment termination made without good reason or contrary to the country's specific legislation. Situation per country Australia Australia has long-standing protection for employees in relation to ...
. *Company insider: A company employee or insider reports on company operations and issues from within the organisation. The most famous is probably the Dooce.com blogger Heather Armstrong, who was fired for writing satirical accounts of her experiences at a dot-com startup on her personal blog
dooce.com
*Community pressure: Written by a citizen of an area, on a particular subject, to bring about a change. In 2007, reporter and blogger Mike Stark came out in support of anonymous blogger Spocko, who was trying to bring what he called "violent commentary" on
San Francisco San Francisco, officially the City and County of San Francisco, is a commercial, Financial District, San Francisco, financial, and Culture of San Francisco, cultural center of Northern California. With a population of 827,526 residents as of ...
area radio station KSFO to the attention of its advertisers. *Experience/Customer Service: Most experience blogs focus on personal insights or views of
customer service Customer service is the assistance and advice provided by a company to those who buy or use its products or services, either in person or remotely. Customer service is often practiced in a way that reflects the strategies and values of a firm, and ...
, frequently with dissatisfaction. Most anonymous experience blogs are written anonymously as they allow the customer/user to keep experiencing and using the service, and reporting/blogging, while nudging at a defined and appropriate level against the target organisation. Among these are Sarah Wu's/Mrs Q
"Fed Up With Lunch" blog
a chronicle of her experience as an adult eating
Chicago Chicago is the List of municipalities in Illinois, most populous city in the U.S. state of Illinois and in the Midwestern United States. With a population of 2,746,388, as of the 2020 United States census, 2020 census, it is the List of Unite ...
area
high school A secondary school, high school, or senior school, is an institution that provides secondary education. Some secondary schools provide both ''lower secondary education'' (ages 11 to 14) and ''upper secondary education'' (ages 14 to 18), i.e., ...
lunch every day for a year, which has now been turned into a book. *Personal: The personal blog strays into personal life in ways that allow more risk taking and open in terms of detail. Hence, many of these blogs are sexual in nature, although many also exist for those with health problems and disabilities and how they see the world and cope with its challenges. Some of the latest personal blogs are seen by many as extended
group therapy Group psychotherapy or group therapy is a form of psychotherapy in which one or more therapists treat a small group of clients together as a group. The term can legitimately refer to any form of psychotherapy when delivered in a group format, i ...
, covering issues including
weight loss Weight loss, in the context of medicine, health, or physical fitness, refers to a reduction of the total body mass, by a mean loss of fluid, body fat (adipose tissue), or lean mass (namely bone mineral deposits, muscle, tendon, and other conn ...
. Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as the Mafia using anonymous blogs against mayors and local administrators in
Italy Italy, officially the Italian Republic, is a country in Southern Europe, Southern and Western Europe, Western Europe. It consists of Italian Peninsula, a peninsula that extends into the Mediterranean Sea, with the Alps on its northern land b ...
.


How online identity is determined


IP addresses

An
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
is a unique numerical label assigned to a computer connected to a
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
that uses the
Internet Protocol The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP ...
for communication., ''DOD Standard Internet Protocol'' (January 1980) The most popular implementation of the Internet Protocol would be the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
(capitalized, to differentiate it from smaller internetworks). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a
Regional Internet registry A regional Internet registry (RIR) is an organization that manages the allocation and registration of Internet number resources within a region of the world. Internet number resources include IP addresses and autonomous system (AS) numbers. ...
, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead,
DHCP The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a clie ...
is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence.


Word and character frequency analysis

Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. This is known as
stylometry Stylometry is the application of the study of linguistic style, usually to written language. Argamon, Shlomo, Kevin Burns, and Shlomo Dubnov, eds. The structure of style: algorithmic approaches to understanding manner and meaning. Springer Scie ...
; adversarial stylometry is the study of techniques for resisting such stylistic identification.


See also

*
Anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
*
Anonymous web browsing Anonymous web browsing may refer to one of the following: * Private browsing * Dark web *Tor (network) Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thous ...
* List of anonymously published works *
Citizen journalism Citizen journalism, also known as collaborative media, participatory journalism, democratic journalism, guerrilla journalism, grassroots journalism, or street journalism, is based upon members of the community playing an active role in the pro ...
*
Mix network Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
*
Anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
*
Tor (anonymity network) Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traf ...
* I2P


References


External links


Computer Law and Security Report Volume 22 Issue 2, Pages 127-136
blogs, Lies and the Doocing by
Sylvia Kierkegaard Sylvia Mercado Kierkegaard was a Philippine jurist who specialized in computer law. Her research covered a wide range of topics, including comparative contract law, alternative dispute resolution, intellectual property rights, European Union ...
(2006)
Legal Guide for bloggers
by the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
{{Blog topics
Blog Personal
Blogging Internet terminology Non-fiction genres Internet privacy Anonymity