preview

Gagnet Nation Analysis

Better Essays

J. Lanum
Mr. Triemstra
A.P. Lang
13 May 16
Sockpuppets, Batman, and The Key to Digital Privacy “Dragnet Nation” author Julia Angwin and Bruce Wayne are surprisingly similar. Both have struggles with keeping private life private, dealing with baddies, and being a bit paranoid. However, unlike Batman, “Dragnet Nation” isn’t groundbreaking. Yet despite stating obvious facts, and doing more to entice paranoia than inform, Angwin does have a solid underlying point: They key to online privacy is pseudonymity. Providing false information in order to protect oneself and others, is quite simple to apply, and can deter social engineering attacks. Be that as it may, pseudonymity can be used for less noble purposes. When …show more content…

Free from the accountability that a real name holds, people have the option to create sockpuppets, or fake online identities. The difference between using a fake identity to protect personal data, and using a fake identity in the case of a sockpuppet, is one of intent. Sockpuppets are usually created to spread lies, and garner attention. Such was the story of a teenage girl named Kaycee. Kaycee vividly described the details of her battle with leukemia, creating much attention and a following. In 2001, Kaycee died, prompting a flurry of grief and heartbreak online. The only catch was that Kaycee didn’t exist, and instead was a sockpuppet created by Debbie Swenson …show more content…

Nojeim, Director of the Project on Freedom, Security and Technology at the Center for Democracy and Technology stated, “Approaches
 to
 cybersecurity 
that
 would
 eliminate 
pseudonymous 
and
 anonymous 
speech
 online
 would
 put 
privacy 
at
 risk, chill
 free
 expression
 and
 erode 
the 
Internet’s essential 
openness. As 
the
 founders
 of 
our 
country 
recognized,
 anonymity
 and 
pseudonymity 
play 
essential
 roles
 in 
allowing 
political
 views 
to 
be 
aired.
” So while the key to online privacy may be pseudonymity, what happens when this key is abused? If no laws enforcing boundaries for pseudonyms online are created, can criminals keep hiding behind fraudulent online

Get Access