Skip to main content

2021 | OriginalPaper | Buchkapitel

Infrastructural Power: Dealing with Abuse, Crime, and Control in the Tor Anonymity Network

verfasst von : Ben Collier

Erschienen in: Cybercrime in Context

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter reports on the first empirical criminological research on the Tor Project, the organisation which develops the Tor anonymity network. There has been little focus as yet by cybercrime researchers on the human factors shaping the platforms and infrastructures on which the Internet depends. These are emerging as powerful technologies of control and profound sites of resistance in contemporary societies, increasingly taking on responsibility for enormous user communities and the crime and abuse which come with them. Of these, I focus on Tor, an international anonymity infrastructure which offers its users extremely strong protections against online surveillance and censorship. Tor has become a particularly important subject of criminological research on online crime. However, there is as yet no criminological research which deals with how the people who develop and maintain Tor understand these issues. Through interviews and archival research, I study how this community perceive Tor’s use for crime and harm and how they navigate these issues in practice, identifying three distinct sites at which Tor deals with crime, and three concomitant ways of making sense of Tor’s crime problem (conceptualised as ‘social worlds’ of Tor). I explore how Tor has developed from a disruptive character to an increasingly governmental one and the implications of this for understanding the role of platforms and infrastructures in the governance of online crime more broadly.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Notable examples of this include www.​openprivacy.​ca and social media platforms such as Mastodon.
 
Literatur
Zurück zum Zitat Aldridge, J., & Decary-Hétu, D. (2016). Cryptomarkets and the future of illicit drug markets. The Internet and Drug Markets, 2, 23–32. Aldridge, J., & Decary-Hétu, D. (2016). Cryptomarkets and the future of illicit drug markets. The Internet and Drug Markets, 2, 23–32.
Zurück zum Zitat Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016). “What if you live on top of a bakery and you like cakes?” Drug use and harm trajectories before, during and after the emergence of silk road. International Journal of Drug Policy, 35, 50–57.CrossRef Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016). “What if you live on top of a bakery and you like cakes?” Drug use and harm trajectories before, during and after the emergence of silk road. International Journal of Drug Policy, 35, 50–57.CrossRef
Zurück zum Zitat Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. John Wiley & Sons. Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. John Wiley & Sons.
Zurück zum Zitat Box, S., & Muncie, J. (2002). Crime, power and ideological mystification. Criminology: A reader (p. 81). Taylor and Francis: Abingdon.CrossRef Box, S., & Muncie, J. (2002). Crime, power and ideological mystification. Criminology: A reader (p. 81). Taylor and Francis: Abingdon.CrossRef
Zurück zum Zitat Clarke, A. E., & Star, S. L. (2008). The social worlds framework: A theory/methods package. The Handbook of Science and Technology Studies, 3, 113–137. Clarke, A. E., & Star, S. L. (2008). The social worlds framework: A theory/methods package. The Handbook of Science and Technology Studies, 3, 113–137.
Zurück zum Zitat Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96. Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96.
Zurück zum Zitat Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. Washington, DC: Naval Research Lab.CrossRef Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. Washington, DC: Naval Research Lab.CrossRef
Zurück zum Zitat Foucault, M. (1991). The Foucault effect: Studies in governmentality. Chicago, IL: University of Chicago Press. Foucault, M. (1991). The Foucault effect: Studies in governmentality. Chicago, IL: University of Chicago Press.
Zurück zum Zitat Garland, D. (1997). Governmentality and the problem of crime: Foucault, criminology, sociology. Theoretical Criminology, 1(2), 173–214.CrossRef Garland, D. (1997). Governmentality and the problem of crime: Foucault, criminology, sociology. Theoretical Criminology, 1(2), 173–214.CrossRef
Zurück zum Zitat Gillespie, T. (2018). Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. London: Yale University Press. Gillespie, T. (2018). Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. London: Yale University Press.
Zurück zum Zitat Gürses, S., Kundnani, A., & Van Hoboken, J. (2016). Crypto and empire: The contradictions of counter-surveillance advocacy. Media, Culture & Society, 38(4), 576–590.CrossRef Gürses, S., Kundnani, A., & Van Hoboken, J. (2016). Crypto and empire: The contradictions of counter-surveillance advocacy. Media, Culture & Society, 38(4), 576–590.CrossRef
Zurück zum Zitat Kohl, U. (2013). Google: The rise and rise of online intermediaries in the governance of the internet and beyond (part 2). International Journal of Law and Information Technology, 21(2), 187–234.CrossRef Kohl, U. (2013). Google: The rise and rise of online intermediaries in the governance of the internet and beyond (part 2). International Journal of Law and Information Technology, 21(2), 187–234.CrossRef
Zurück zum Zitat Lyon, D. (2014). Surveillance, dnowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 205395171454186.CrossRef Lyon, D. (2014). Surveillance, dnowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 205395171454186.CrossRef
Zurück zum Zitat Marechal. (2018). Use signal, use Tor? The political economy of digital rights technology. PhD thesis. Marechal. (2018). Use signal, use Tor? The political economy of digital rights technology. PhD thesis.
Zurück zum Zitat Milan, S. (2013). Social movements and their technologies: Wiring social change. New York, NY: Springer.CrossRef Milan, S. (2013). Social movements and their technologies: Wiring social change. New York, NY: Springer.CrossRef
Zurück zum Zitat Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7–38.CrossRef Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7–38.CrossRef
Zurück zum Zitat Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.CrossRef Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.CrossRef
Zurück zum Zitat Pinch, T. (2010). The invisible technologies of Goffman’s sociology from the merry-go-round to the internet. Technology and Culture, 51(2), 409–424.CrossRef Pinch, T. (2010). The invisible technologies of Goffman’s sociology from the merry-go-round to the internet. Technology and Culture, 51(2), 409–424.CrossRef
Zurück zum Zitat Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118.CrossRef Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118.CrossRef
Zurück zum Zitat Sandvig, C., Hamilton, K., Karahalios, K., & Langbort, C. (2014). Auditing algorithms: Research methods for detecting discrimination on internet platforms. Data and Discrimination: Converting Critical Concerns into Productive Inquiry, 22, 1–23. Sandvig, C., Hamilton, K., Karahalios, K., & Langbort, C. (2014). Auditing algorithms: Research methods for detecting discrimination on internet platforms. Data and Discrimination: Converting Critical Concerns into Productive Inquiry, 22, 1–23.
Zurück zum Zitat Schulze, M. (2017). Clipper meets apple vs. FBI: A comparison of the cryptography discourses from 1993 and 2016. Media and Communication, 5(1), 54–62.CrossRef Schulze, M. (2017). Clipper meets apple vs. FBI: A comparison of the cryptography discourses from 1993 and 2016. Media and Communication, 5(1), 54–62.CrossRef
Zurück zum Zitat Star, S. L., & Griesemer, J. R. (1989). Institutional ecology, translations’ and boundary objects: Amateurs and professionals in Berkeley’s Museum of Vertebrate Zoology, 1907–39. Social Studies of Science, 19(3), 387–420.CrossRef Star, S. L., & Griesemer, J. R. (1989). Institutional ecology, translations’ and boundary objects: Amateurs and professionals in Berkeley’s Museum of Vertebrate Zoology, 1907–39. Social Studies of Science, 19(3), 387–420.CrossRef
Zurück zum Zitat Suzor, N. P., et al. (2019). What do we mean when we talk about transparency? Toward meaningful transparency in commercial content moderation. International Journal of Communication, 13, 18. Suzor, N. P., et al. (2019). What do we mean when we talk about transparency? Toward meaningful transparency in commercial content moderation. International Journal of Communication, 13, 18.
Zurück zum Zitat Valverde, M. (2009). Beyond discipline and punish: Foucault’s challenge to criminology. Carceral Notebooks, 4, 201–224. Valverde, M. (2009). Beyond discipline and punish: Foucault’s challenge to criminology. Carceral Notebooks, 4, 201–224.
Zurück zum Zitat West, S. (2017). Raging against the machine: Network gatekeeping and collective action on social media platforms. Media and Communication, 5(3), 28–36.CrossRef West, S. (2017). Raging against the machine: Network gatekeeping and collective action on social media platforms. Media and Communication, 5(3), 28–36.CrossRef
Zurück zum Zitat Yar, M. (2012). Virtual utopias and dystopias: The cultural imaginary of the Internet. In Utopia: Social theory and the future (pp. 179–195). Burlington, VT: Ashgate. Yar, M. (2012). Virtual utopias and dystopias: The cultural imaginary of the Internet. In Utopia: Social theory and the future (pp. 179–195). Burlington, VT: Ashgate.
Zurück zum Zitat Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75–89.CrossRef Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75–89.CrossRef
Metadaten
Titel
Infrastructural Power: Dealing with Abuse, Crime, and Control in the Tor Anonymity Network
verfasst von
Ben Collier
Copyright-Jahr
2021
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-60527-8_16