Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

De-anonymising social media

By Chris Whitfield - posted Thursday, 30 January 2020


There’s little doubt that the growth of online social media has conferred substantial benefits by helping friends and families to stay in touch, assisting groups of like-minded people to exchange views and the like.

However, there’s a darker side in that social media also provides a ready medium supporting undesirable and outright criminal behaviour.

This darker side is exacerbated by (i) easy anonymity, (ii) the personal nature of much of the information exchanged on social media, allowing personal details to be easily acquired by those of malign intent and (iii) its capacity for the rapid spreading of “fake news”.

Advertisement

Individuals can be targeted for bullying, slander/blackmail, fraud and the like while would-be terrorists, overzealous activists, noisy minorities and foreign powers can and do exploit “confirmation bias” and the gullibility of a section of the general population to promote their ends.

Examples from the newspapers include various suicides, life savings stolen, incitement to civil disobedience including farm invasions, alleged tampering in elections, faked tear-jerking pictures promoting a particular political view of the current bushfires and most recently, the children of Tasmania’s Premier, Will Hodgman, being targeted. 

It is certainly the case that the victims of online bullying would do well to “walk away” before contemplating self-harm but, even if they all did, the intrinsic difficulties with social media remain. What was a benign youth in 2007 has, 12 years later, become a difficult adult requiring a degree of legal oversight.

Before widespread electronic communication, and particularly before widespread use of social media, such offences were brought to the courts traditionally using evidence including documents and wiretaps.  With the widespread introduction of mobile phones, the recording of personal details associated with each account was mandated to ensure these devices did not become anonymous.

Where possible, and as a matter of principle, it is better to expose social media to existing law and existing enforcement methods rather than introduce overspecialised specific legislation relating only to social media.  This approach avoids needless nitpicking distinctions such as those between what is a phone and what is a GPS navigator introduced by legislation relating to the use of phones while driving.

The matter then reduces to one of ensuring the availability of verifiable evidence of social media interactions and the parties to them. A major problem here is that the social media platforms are operated by offshore companies whose primary interest is financial rather than addressing legal difficulties in another country and that their expressed concern is much greater than any effective action. Zuckerberg’s performance in the US Senate hearing says it all.

Advertisement

That control of social media is possible is amply demonstrated by examples such as Xi’s China and Putin’s Russia; the problem is to find an effective, yet less draconian, solution that is acceptable in a liberal democracy.

My proposal is to implement what is effectively a CCTV camera on social media transactions.  It is vital that (i) collected data remains secure in the hands of some trusted agency and (ii) that access is limited and granted only via a court warrant.

There is already legislation requiring that Internet Service Providers (ISPs) keep track of metadata. These providers also have identifying details of those who use their service.  All that is required is that either the ISPs store transactions between their users and the various social media providers or, much preferably, relay such transactions to a secure storage facility elsewhere.

  1. Pages:
  2. Page 1
  3. 2
  4. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

7 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

Chris Whitfield has a background in IT.

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Article Tools
Comment 7 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy