1993-02-28 - Reasons for Anonymity–A Long Selection

Header Data

From: tcmay@netcom.com (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: a834f198747063ecfb44dec5e2ac387e293122881b9d2220f775cc3ab8fb1e96
Message ID: <9302280811.AA12278@netcom.netcom.com>
Reply To: N/A
UTC Datetime: 1993-02-28 08:13:48 UTC
Raw Date: Sun, 28 Feb 93 00:13:48 PST

Raw message

From: tcmay@netcom.com (Timothy C. May)
Date: Sun, 28 Feb 93 00:13:48 PST
To: cypherpunks@toad.com
Subject: Reasons for Anonymity--A Long Selection
Message-ID: <9302280811.AA12278@netcom.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


The  following is part of an outline dealing with the topics on this list,
maintained since 1990 for a novel-in-progress (the writing, that is) I've
been working on for several years, off and on. In addition to using various
databases and hypertext systems (ArchiText, from Brainpower, and
StorySpace, from Eastgate Systems) for character developoment and plots, I
have also relied heavily on MORE, a powerful outline processor from
Symantec (MORE 3.0 is the direct descendent of ThinkTank, and feature
"cloning," where a branch of the outline can be replicated in many places,
allowing immediate hypertext-like jumps to distant parts of the outline,
and also maintaining database coherency). 

Several people have requested that I make good on my offer to post certain
parts of these notes, especially the parts dealing with "crypto anarchy"
and how it may get developed, how it may be fought by the law enforcement
types, what it can be used for, etc.

As an exeriment, I'll post here just one medium-sized branch, from deep in
the outline tree. "Reasons for Anonymity" seems in line with current list
interest. (Note that most of these comments were written in 1990-91, so
they may be slightly dated.) 

If the reaction is favorable, maybe I'll post more. Or, there may be other
options, such as placing parts of the outline in the archive site.

I've converted the nested outline structure to a flattened,
Harvard-labelled text file. It may still not be the easiest to read,
especially as many of the entries are intended only to jog my memory and to
help me organize my thinking.

Hope someone likes it.


Reasons for Anonymity and Digital Pseudonyms

I.  many of the same reasons as with Caller ID, but many 
new reasons as well

II.  Physical Threats

A.  "corporate terrrorism" is not a myth: drug dealers and 
other "marginal" businessmen face this every day

1.  extortion, threats, kidnappings

B.  and many businesses of the future may well be less 
"gentlemanly" than the conventional view has it

1.  witness the bad blood between Intel and AMD, and 
then imagine it getting ten times worse

2.  and national rivalries, even in ostensibly legal 
businesses (think of arms dealers), may cause more 
use of violence

3.  Mafia and other organized crime groups may try to 
extort payments or concessions from market 
participants, causing them to seek the relative 
protection of anonymous systems

a)  with reputations

4.  Note that calls for the threatened to turn to the police 
for protection has several problems

a)  the activities may be illegal or marginally illegal (this 
is the reason the Mafia can often get involved and 
why it may even sometimes have a positive effect, 
acting as the cop for illegal activities)

b)  the police are often too busy to get involved, what 
with so much physical crime clogging the courts

C.  extortion and kidnappings can be done using these 
very techniques of cryptoanarchy, thus causing a kind 
of arms race

D.  battered and abused women and families may need 
the equivalent of a "witness protection program"

1.  because of the ease of tracing credit card purchases, 
with the right bribes and/or court orders (or even 
hacking), battered wives may seek credit cards under 
pseudonyms

a)  and some card companies may oblige, as a kind of 
politically correct social gesture

b)  or groups like NOW and Women Against Rape may 
even offer their own cards

(1)  perhaps backed up by some kind of escrow fund

(2)  could be debit cards

E.  people who participate in cyberspace businesses may 
fear retaliation or extortion in the real world

1.  threats by their governments (for all of the usual 
reasons, plus kickbacks, threats to close them down, 
etcl)

2.  ripoffs by those who covet their success...

III.  Needed for Certain Kinds of Reputation-Based 
Systems

A.  a respected scientist may wish to float a speculative 
idea

1.  and be able to later prove it was in fact his idea

IV.  Legal Protection

A.  many transactions may be deemed illegal in some 
jursidictions

1.  even in some that the service or goods provider has no 
control over

a)  example: gun makers being held liable for firearms 
deaths in the District of Columbia (though this was 
recently cancelled)

2.  the maze of laws may cause some to seek anonymity 
to protect themselves against this maze

B.  "deep pockets"

1.  it will be in the interest of some to hide their 
identities so as to head off these kinds of lawsuits 
(filed for whatever reasons, rightly or wrongly)

2.  postings and comments may expose the authors to 
lawsuits for libel, misrepresentation, unfair 
competition, and so on (so much for free speech in 
these beknighted states)

3.  employers may also be exposed to the same suits, 
regardless of where their employees posted from

a)  on the tenuous grounds that an employee was acting 
on his employer's behalf, e.g., in defending an Intel 
product on Usenet

4.  this, BTW, is another reason for people to seek ways to 
hide some of their assets-to prevent confiscation in 
deep pockets lawsuits (or family illnesses, in which  
various agencies try to seize assets of anybody they 
can)

5.  and the same computers that allow these transactions 
will also allow more rapid determination of who has 
the deepest pockets!

C.  moonlighting employees (the original concern over 
Black Net and AMIX)

1.  employers may have all kinds of concerns, hence the 
need for employees to hide their identities

2.  note that this interects with the licensing and zoning 
aspects

D.  to beat zoning and licensing requirements

E.  Scenario: Anonymous organ donor banks

1.  e.g., a way to "market" rare blood types, or whatever, 
without exposing one's self to forced donation or other 
sanctions

a)  "forced donation" involves the lawsuits filed by the 
potential recipient

b)  at the time of offer, at least...what happens when the 
deal is consummated is another domain

2.  and a way to avoid the growing number of 
government stings

F.  avoidance of prosecution or damage claims for 
writing, editing, distributing, or selling such 
"damaging" materials is yet another reason for 
anonymous systems to emerge: those involved in the 
process will seek to immunize themselves from the 
various tort claims that are clogging the courts

1.  producers, distributors, directors, writers, and even 
actors of x-rated or otherwise "unacceptable" material 
may have to have the protection of anonymous 
systems

2.  imagine fiber optics and the proliferation of videos 
and talk shows....bluenoses and prosecutors will use 
"forum shopping" to block access, to prosecute the 
producers, etc.

V.  Anonymity in Requesting Information, Services, 
Goods

A.  a la the controversy over Caller ID and 900 numbers: 
people don't want their telephone numbers (and 
hence identities) fed into huge consumer-preference 
data banks

1.  of the things they buy, the videos they rent, the books 
they read. etc. (various laws protect some of these 
areas, like library books, video rentals)

2.  subscription lists are already a booming resale 
market...this will get faster and more finely "tuned" 
with electronic subscriptions: hence the desire to 
subscribe anonymously

B.  some examples of "sensitive" services that anonymity 
may be desired in (especially related to computers, 
modems, BBSes)

1.  reading unusual or sensitive groups: alt.sex.bondage, 
etc.

a)  or posting to these groups!

b)  recent controversy over NAMBLA may make such 
protections more desirable to some (and parallel calls 
for restrictions!)

2.  posting to such groups, especially given that records 
are perpetual and that government agencies read and 
file postings (an utterly trivial thing to do)

3.  requesting help on personal issues (equivalent to the 
"Name Witheld" seen so often)

4.  discussing controversial political issues (and who 
knows what will be controversial 20 years later when 
the poster is seeking a political office, for example?)

a)  given that some groups have already (1991) posted the 
past postings of people they are trying to smear!

5.  Note: the difference between posting to a BBS group 
or chat line and writing a letter to an editor is 
significant

a)  partly technological: it is vastly easier to compile 
records of postings than it is to cut clippings of letters 
to editors (though this will change rapidly as scanners 
make this easy)

b)  partly sociological: people who write letters know the 
letters will be with the back issues in perpetuity, that 
bound issues will preserve their words for many 
decades to come (and could conceivably come back to 
haunt them), but people who post to BBSes probably 
think their words are temporary

c)  and there are some other factors

(1)  no editing

(2)  no time delays (and no chance to call an editor and 
retract a letter written in haste or anger)

(3)  and letters can, and often are, written with the 
"Name Witheld" signature-this is currently next to 
impossible to do on networks

(a)  though some "forwarding" services have informally 
sprung up

C.  Businesses may wish to protect themselves from 
lawsuits over comments by their employees

1.  the usual "The opinions expressed here are not those 
of my employer" may not be enough to protect an 
employer from lawsuits

a)  imagine racist or sexist comments leading to lawsuits 
(or at least being brought up as evidence of the type of 
"attitude" fostered by the company, e.g., "I've worked 
for Intel for 12 years and can tell you that blacks make 
very poor engineers.")

2.  employees may make comments that damage the 
reputations of their companies 

a)  Note: this differs from the current situation, where 
free speech takes priority over company concerns, 
because the postings to a BBS are carried widely, may 
be searched electronically (e.g., AMD lawyers search 
the UseNet postings of 1988-91 for any postings by 
Intel employees besmirching the quality or whatever 
of AMD chips), 

3.  and so employees of corporations may protect 
themselves, and their employers, by adopting 
pseudonyms

D.  Businesses may seek information without wanting to 
alert their competitors

1.  this is currently done with agents, "executive search 
firms," and lawyers

2.  but how will it evolve to handle electronic searches?

3.  there are some analogies with filings of "Freedom of 
Information Act" requests, and of patents, etc.

a)  these "fishing expeditions" will increase with time, as 
it becomes profitable for companies to search though 
mountains of electronically-filed materials

(1)  environmental impact studies, health and safety 
disclosures, etc.

(2)  could be something that some companies specialize in

E.  Anonymous Consultation Services, Anonymous 
Stringers or Reporters

1.  imagine an information broker, perhaps on an 
AMIX-like service, with a network of stringers

a)  think of the arms deal newsletter writer in Hallahan's 
The Trade, with his network of stringers feeding him 
tips and inside information

(1)  instead of meeting in secretive locations, a very 
expensive proposition (in time and travel), a secure 
network can be used

(2)  with reputations, digital pseudonyms, etc.

2.  they may not wish their actual identities known

a)  threats from employers, former employers, 
government agencies

b)  harassment via the various criminal practices that will 
become more common (e.g., the ease with which 
assailants and even assassins can be contracted for)

(1)  part of the overall move toward anonymity

c)  fears of lawsuits, licensing requirements, etc.

3.  Candidates for Such Anonymous Consultation 
Services

a)  An arms deals newsletter

(1)  an excellent reputation for accuracy and timely 
information

(2)  sort of like an electronic form of Jane's

(a)  with scandals and government concern

(3)  but nobody knows where it comes from

(4)  a site that distributes it to subscribers gets it with 
another larger batch of forwarded material

(a)  NSA, FBI, Fincen, etc. try to track it down

b)  "Technology Insider" reports on all kinds of new 
technologies

(1)  patterned after Hoffler's Microelectronics News, the 
Valley's leading tip sheet for two decades

(2)  the editor pays for tips, with payments made in two 
parts: immediate, and time-dependent, so that the 
accuracy of a tip, and its ultimate importance (in the 
judgment of the editor) can be proportionately 
rewarded

(3)  PK systems, with contributors able to encrypt and then 
publicly post (using their own means of diffusion)

(a)  with their messages containing further material, such 
as authentications, where to send the payments, etc.

c)  Lundberg's Oil Industry Survey (or similar)

(1)  i.e., a fairly conventional newsletter with publicly 
known authors

(2)  in this case, the author is known, but the identities of 
contributors is well-protected

d)  A Conspiracy Newsletter

(1)  reporting on all of the latest theories of misbehavior 
(as in the "Conspiracies" section of this outline)

(2)  a wrinkle: a vast hypertext web, with contributors able 
to add links and nodes

(a)  naturally, their real name-if they don't care about 
real-world repercussions-or one of their digital 
pseudonyms (may as well use cryptonyms) is attached

i)  various algorithms for reputations

(1)  sum total of everything ever written, somehow 
measured by other comments made, by "voting," etc.

(2)  a kind of moving average, allowing for the fact that 
learning will occur, just as a researcher probably gets 
better with time, and that as reputation-based systems 
become better understood, people come to appreciate 
the importance of writing carefully

e)  and one of the most controversial of all: Yardley's 
Intelligence Daily

(1)  though it may come out more than daily!

(2)  an ex-agent set this up in the mid-90s, soliciting 
contributions via an anonymous packet-switching 
sysem

(a)  refined over the next couple of years

(b)  combination of methods

(3)  government has been trying hard to identify the 
editor, "Yardley"

(4)  he offers a payback based on value of the 
information, and even has a "Requests" section, and a 
Classifed Ad section

(5)  a hypertext web, similar to the Conspiracy Newsletter 
above

(6)  Will Government Try to Discredit the Newsletter 
With False Information?

(a)  of course, the standard ploy in reputation-based 
systems

(b)  but Yardley has developed several kinds of filters for 
this

i)  digital pseudonyms which gradually build up 
reputations

ii)  cross-checking of his own sort

iii)  he even uses language filters to analyze the text

(c)  and so what?

i)  the world is filled with disinformation, rumors, lies, 
half-truths, and somehow things go on....

f)  Other AMIX-like Anonymous Services

(1)  Drug Prices and Tips

(a)  tips on the quality of various drugs (e.g., "Several 
reliable sources have told us that the latest Maui 
Wowie is very intense, numbers below...")

(b)  synthesis of drugs (possibly a separate subscription)

i)  designer drugs

ii)  home labs

iii)  avoiding detection

(2)  The Hackers Daily

(a)  tips on hacking and cracking

(b)  anonymous systems themselves (more tips)

(3)  Product evaluations (anonymity needed to allow 
honest comments with more protection against 
lawsuits)

4.  Newspapers Are Becoming Cocerned with the Trend 
Toward Paying for News Tips

a)  by the independent consultation services

b)  but what can they do?

c)  lawsuits are tried, to prevent anonymous tips when 
payments are involved

(1)  their lawyers cite the tax evasion and national security 
aspects

F.  Private Data Bases 

1.  any organization offering access to data bases must be 
concerned that somebody-a disgruntled customer, a 
whistleblower, the government, whoever-will call 
for an opening of the files

a)  under various "Data Privacy" laws

b)  or just in general (tort law, lawsuits, "discovery")

2.  thus, steps will be taken to isolate the actual data from 
actual users, perhaps via cutouts

a)  e.g., a data service sells access, but subcontracts out the 
searches to other services via paths that are 
untraceable

(1)  this probably can't be outlawed in general-though 
any specific transaction might later be declared illegal, 
etc., at which time the link is cut and a new one is 
established-as this would outlaw all subcontracting 
arrangements!

(a)  i.e., if Joe's Data Service charges $1000 for a search on 
widgets and then uses another possibly transitory 
(meaning a cutout) data service, the most a lawsuit 
can do is to force Joe to stop using this untraceble 
service

(b)  levels of indirection (and firewalls that stop the 
propagation of investigations)

G.  Medical Polls (a la AIDS surveys, sexual practices 
surveys, etc.)

1.  recall the method in which a participant tosses a coin 
to answer a question...the analyst can still recover the 
important ensemble information, but the "phase" is 
lost

a)  i.e., an individual answering "Yes" to the question 
"Have you ever had xyz sex?" may have really 
answered "No" but had his answer flipped by a coin 
toss

2.  researchers may even adopt sophisticated methods in 
which explicit diaries are kept, but which are then 
transmitted under an anonymous mailing system to 
the researchers

a)  obvious dangers of authentication, validity, etc.

H.  Medical testing: many reasons for people to seek 
anonymity

1.  AIDS testing is the preeminent example

2.  but also testing for conditions that might affect 
insurablity or employment (e.g.,  people may go to 
medical havens in Mexico or wherever for tests that 
might lead to uninsurability should insurance 
companies learn of the "precondition")

3.  except in AIDS and STDs, it is probably both illegal 
and against medical ethics to offer anonymous 
consultations

a)  perhaps people will travel to other countries

VI.  Anonymity in Belonging to Certain Clubs, Churches, 
or Organizations

A.  people fear retaliation or embarassment should their 
membership be discovered, now or later

1.  e.g., a church member who belongs to controversial 
groups or clubs

B.  mainly, or wholly, those in which physical contact or 
other personal contact is not needed (a limited set)

C.  similar to the cell-based systems described elsewhere

D.  Candidates for anonymous clubs or organizations

1.  Earth First!, Act Up, Animal Liberation Front, etc.

2.  NAMBLA and similar controversial groups

E.  all of these kinds of groups have very vocal, very 
visible members, visible even to the point of seeking 
out television coverage

F.  but there are probably many more who would join 
these groups if there identities could be shielded from 
public group, for the sake of their careers, their 
families, etc.

G.  ironically, the corporate crackdown on outside 
activities considered hostile to the corporation (or 
exposing them to secondary lawsuits, claims, etc.) may 
cause greater use of anonymous systems

1.  cell-based membership in groups

H.  the growth of anonymous membership in groups 
(using pseudonyms) has a benefit in increasing 
membership by people otherwise afraid to join, for 
example, a radical environmental group

VII.  Anonymity in Giving Advice or Pointers to 
Information

A.  suppose someone says who is selling some illegal or 
contraband product...is this also illegal?

B.  hypertext systems will make this inevitable

VIII.  Anonymous Voting in Clubs, Organizations, 
Churches, etc.

A.  a major avenue for spreading CA methods: "electronic 
blackballing," weighted voting (as with number of 
shares)

1.  e.g., a corporation, perhaps one of JH's, issues "voting 
tokens," which can be used to vote anonymously

a)  or even sold to others (like selling shares, except 
selling only the voting right for a specific election is 
cheaper, and many people don't much care about 
elections)

2.  a way to protect against deep pockets lawsuits in, say, 
race discrimination cases

a)  wherein a director is sued for some action the 
company takes-anonymity will give him some legal 
protection, some "plausible deniability"

3.  is possible to set up systems (cf. Salomaa) in which 
some "supervotes" have blackball power, but the use 
of these vetos is indistinguishable from a standard 
majority rules vote

a)  i.e., nobody, except the blackballer(s), will know 
whether the blackball was used!

b)  will the government seek to limit this kind of 
protocol?

(1)  claiming discrimination potential or abuse of voting 
rights?

B.  will Justice Department (or SEC) seek to overturn 
anonymous voting?

1.  as part of the potential move to a "full disclosure" 
society?

2.  related to antidiscrimination laws, accountability, etc.

C.  Anonymous Voting in Reputation-Based Systems 
(Journals, Markets)

1.  customers can vote on products, on quality of service, 
on the various deals they've been involved in

a)  not clear how the voting rights would get distributed

b)  the idea is to avoid lawsuits, sanctions by vendors, etc. 
(as with the Bose suit)

2.  Journals

a)  a canonical example, and one which I must include, 
as it combines anonymous refereeing (already 
standard, in primitive forms), hypertext (links to 
reviews), and basic freedom of speech issues

b)  this will likely be an early area of use

3.  this whole area of consumer reviews may be a way to 
get CA bandwidth up and running (lots of 
PK-encrypted traffic sloshing around the various nets)

IX.  the 100% traceability of public postings to UseNet and 
other bulletin boards is very stifling to free expression 
and becomes one of the main justifications for the use 
of anonymous (or pseudononymous) boards and nets

A.  there may be calls for laws against such compilation, 
as with the British data laws, but basically there is 
little that can be done when postings go to tens of 
thousands of machines and are archived in perpetuity 
by many of these nodes and by thousands of readers

B.  readers who may incorporate the material into their 
own postings, etc. (hence the absurdity of the British 
law)









Thread