Digital Vigilantism as Weaponisation of Visibility

This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area of study. In addition to literature on vigilantism and citizen-led violence, this paper draws from key works in surveillance (Haggerty and Ericsson, British Journal of Sociology, 51, 605–622, 2000) as well as visibility studies (Brighenti 2007; Goldsmith, British Journal of Criminology, 50(5), 914–934, 2010) in order to situate how digital media affordances and cultures inform both the moral and organisational dimensions of digital vigilantism. Digital vigilantism is a process where citizens are collectively offended by other citizen activity, and coordinate retaliation on mobile devices and social platforms. The offending acts range from mild breaches of social protocol to terrorist acts and participation in riots. The vigilantism includes, but is not limited to a ‘naming and shaming’ type of visibility, where the target’s home address, work details and other highly sensitive details are published on a public site (‘doxing’), followed by online as well as embodied harassment. The visibility produced through digital vigilantism is unwanted (the target is typically not soliciting publicity), intense (content like text, photos and videos can circulate to millions of users within a few days) and enduring (the vigilantism campaign may be top search item linked to the target, and even become a cultural reference). Such campaigns also further a merging of digital and physical spaces through the reproduction of localised and nationalist identities (through ‘us/them’ distinctions) on global digital platforms as an impetus for privacy violations and breaches of fundamental rights.

[1]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[2]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[3]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[4]  Emmanuel Le Roy Ladurie,et al.  Montaillou: The Promised Land of Error , 1975 .

[5]  E. Potgieter,et al.  Development and Change , 1976 .

[6]  Gary T. Marx,et al.  Undercover: Police Surveillance in America , 1988 .

[7]  D. Harvey,et al.  The Condition of Postmodernity , 2020, The New Social Theory Reader.

[8]  C. Dandeker Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day , 1990 .

[9]  W. Culberson Vigilantism: Political History of Private Power in America , 1990 .

[10]  Joshua Meyrowitz,et al.  Redefining the situation: Extending dramaturgy into a theory of social change and media effects , 1990 .

[11]  L. Johnston WHAT IS VIGILANTISM , 1996 .

[12]  Leslie Haddon,et al.  Design and the domestication of information and communication technologies: technical change and everyday life , 1996 .

[13]  D. Brin The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .

[14]  G. Armstrong,et al.  The Maximum Surveillance Society: The Rise of CCTV , 1999 .

[15]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[16]  R. Reiner The Rise of Virtual Vigilantism: crime reporting since World War II , 2001 .

[17]  Barry Wellman,et al.  Little Boxes, Glocalization, and Networked Individualism , 2001, Digital Cities.

[18]  C. Lund Precarious Democratization and Local Dynamics in Niger: Micro–Politics in Zinder , 2001 .

[19]  Andreas Wittel Toward a Network Sociality , 2001 .

[20]  Jason Nolan,et al.  Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments. , 2002 .

[21]  M. Andrejevic The Work of Watching One Another: Lateral Surveillance, Risk, and Governance , 2002 .

[22]  Morten Madsen Living for home: policing immorality among undocumented migrants in Johannesburg , 2004 .

[23]  B. Oomen Vigilantism or alternative citizenship? The rise of Mapogo a Mathamaga , 2004 .

[24]  L. Buur,et al.  Introduction: vigilantism and the policing of everyday life in South Africa , 2004 .

[25]  J. Thompson,et al.  The New Visibility , 2005 .

[26]  S. Wilkins The Digital Sublime: Myth, Power, and Cyberspace , 2005 .

[27]  Undermining the Rule of Law: Democratization and the Dark Side of Police Reform in Mexico , 2006, Latin American Politics and Society.

[28]  Henry Jenkins Convergence Culture: Where Old and New Media Collide , 2006 .

[29]  D. Lyon Surveillance Studies: An Overview , 2007 .

[30]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[31]  Daniel J. Solove The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .

[32]  Andrea Mubi Brighenti,et al.  Visibility A Category for the Social Sciences , 2007 .

[33]  Heidi E. Buchanan,et al.  Collectivism vs. Individualism in a Wiki World: Librarians Respond to Jaron Lanier's Essay “Digital Maoism: The Hazards of the New Online Collectivism” , 2007 .

[34]  Manuel Castells,et al.  Communication Power and Counter-power in the Network Society , 2007 .

[35]  J. Galtung Cultural Violence , 1990 .

[36]  Clay Shirky Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .

[37]  K. O’Hara,et al.  Lifelogging: Privacy and empowerment with memories for life , 2008 .

[38]  Kingsley Dennis,et al.  Viewpoint: Keeping a Close Watch – The Rise of Self-Surveillance and the Threat of Digital Exposure , 2008 .

[39]  Anders Albrechtslund,et al.  Online Social Networking as Participatory Surveillance , 2008, First Monday.

[40]  David Lyon,et al.  Identifying Citizens: ID Cards as Surveillance , 2009 .

[41]  James Martin Vigilantes unmasked: an exploration of informal criminal justice in contemporary South Africa , 2009 .

[42]  Hal Niedzviecki The Peep Diaries: How We're Learning to Love Watching Ourselves and Our Neighbors , 2009 .

[43]  Anne S.Y. Cheung,et al.  China Internet going wild: Cyber-hunting versus privacy protection , 2009, Comput. Law Secur. Rev..

[44]  Oscar H. Gandy,et al.  Coming to Terms with Chance: Engaging Rational Discrimination and Cumulative Disadvantage , 2009 .

[45]  Christena E. Nippert-Eng,et al.  Islands of Privacy , 2010 .

[46]  Jenny L. Davis Architecture of the personal interactive homepage: constructing the self through MySpace , 2010, New Media Soc..

[47]  Andrew Goldsmith,et al.  Policing's New Visibility , 2010 .

[48]  Danah Boyd,et al.  I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..

[49]  Alison Powell Emerging Issues in Internet Regulation: The Unstable Role of Wikileaks and Cyber-Vigilantism , 2011 .

[50]  D. Trottier Policing Social Media , 2012 .

[51]  Daniel Trottier,et al.  Social Media as Surveillance: Rethinking Visibility in a Converging World , 2012 .

[52]  D. Trottier,et al.  The 2011 Vancouver Riot and the Role of Facebook in Crowd-Sourced Policing , 2012 .

[53]  James B. Rule,et al.  “Needs” for surveillance and the movement to protect privacy , 2012 .

[54]  Joshua Reeves If You See Something, Say Something: Lateral Surveillance and the Uses of Responsibility , 2012 .

[55]  Nathan Jurgenson The IRL Fetish , 2012 .

[56]  Sherman Young,et al.  Media Convergence: Networked Digital Media in Everyday Life , 2012 .

[57]  Laura Huey,et al.  ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime , 2013 .

[58]  C. Fuchs The Anonymous movement in the context of liberalism and socialism , 2013 .

[59]  J. V. van Dijck,et al.  Understanding Social Media Logic , 2013 .

[60]  Gary T. Marx,et al.  The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes , 2013, IEEE Security & Privacy.

[61]  D. Trottier Identity Problems in the Facebook Era , 2013 .

[62]  D. Porta Can Democracy Be Saved?: Participation, Deliberation and Social Movements , 2013 .

[63]  Laurence Cox,et al.  Review: Donatella della Porta. Can Democracy be Saved? Participation, Deliberation and Social Movements. Cambridge and Malden, MA: Polity, 2013. $69.95 hardcover / $24.95 paperback , 2014 .

[64]  Christian Fuchs,et al.  Social Media and the Public Sphere , 2014 .

[65]  D. Trottier Big Data Ambivalence: Visions and Risks in Practice , 2014 .

[66]  R. Fox,et al.  Public Engagement with the Criminal Justice System in the Age of Social Media , 2014 .

[67]  Kate Starbird,et al.  Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .

[68]  G. Bruinsma,et al.  Public support for vigilantism, confidence in police and police responsiveness , 2014 .

[69]  Daniel Trottier,et al.  Crowdsourcing CCTV surveillance on the Internet , 2014 .

[70]  J. Birks Networks of Outrage and Hope: Social Movements in the Internet Age , 2014 .

[71]  J. Walsh Watchful Citizens , 2014 .

[72]  Michael Fisher,et al.  An abstract formal basis for digital crowds , 2014, Distributed and Parallel Databases.

[73]  Ben Brucato,et al.  Policing Made Visible: Mobile Technologies and the Importance of Point of View , 2015 .

[74]  M. Mareš,et al.  Vigilantism during democratic transition , 2015 .

[75]  Laura Huey,et al.  “Just Being Mean to Somebody Isn’t a Police Matter”: Police Perspectives on Policing Cyberbullying , 2015 .

[76]  D. Trottier Coming to terms with social media monitoring: Uptake and early assessment , 2015 .

[77]  Kevin D. Haggerty,et al.  Policing on camera , 2017 .