Where Are They Now?: The Costs and Benefits of Doxxing Far-Right Extremists
Keywords:
Doxxing, Far-Right Extremism, Antifascism, Former Extremists, Deradicalization, DisengagementAbstract
Research on far-right extremism has grown substantially over the last decade, owing to the rise of Trump, attacks such as the one in Christchurch and Buffalo, as well as the mainstreaming of hate speech and polarization. In addition to research, there have been antifascist activists who have been engaged in doxxing members of the far right who are part of our schools, our militaries, and governments. Releasing the private information of members of far-right movements to the public has created interesting policy and law enforcement dilemmas. With respect to law enforcement, can doxxing be used as a tool to force individuals to disengage from groups? For social media companies, doxxing violates their terms of service, but should an exception be made in these instances since it purportedly serves a public interest? For this paper, we interviewed 10 former members of the far right who have experienced doxxing over the last several years. The paper explores what happened, the immediate and long-term effects of doxxing on their lives, and ongoing challenges of being exposed against their will. We conclude with some policy recommendations related to the costs and benefits of doxxing on these individuals but also society at large.
References
Amarasingam, A., Argentino, M.-A., & Macklin, G. (2022, July). The Buffalo attack: The cumulative momentum of far-right terror. CTC Sentinel, 15(7). https://ctc.westpoint.edu/the-buffalo-attack-the-cumulative-momentum-of-far-right-terror/
Amarasingam, A., St-Amant, M., & Jones, D. A. (2024, June). ‘Run silent, run deep’: Examining right-wing extremism in the military. Perspectives on Terrorism, 18(2).
Anderson, B., & Wood, M. (2021). Doxxing: A scoping review and typology. In J. Bailey, A. Flynn, & N. Henry (Eds.), The Emerald international handbook of technology facilitated violence and abuse (pp. 205-226). Emerald Publishing Limited. https://www.emerald.com/insight/publication/doi/10.1108/9781839828485
Chen, Q., Chan, K. L., & Cheung, A. S. Y. (2018). Doxxing victimization and emotional problems among secondary school students in Hong Kong. International Journal of Environmental Research and Public Health, 15(12). https://pubmed.ncbi.nlm.nih.gov/30486402/
Cheung, A. (2021). Doxxing and the challenge to legal regulation: When personal data become a weapon. In J. Bailey, A. Flynn, & N. Henry (Eds.), The Emerald international handbook of technology facilitated violence and abuse (pp. 577-594). Emerald Publishing Limited. https://www.emerald.com/insight/content/doi/10.1108/978-1-83982-848-520211041/full/html
Clubb, G., Altier, M.-B., Kobayashi, Y., Davies, G., & Brownsord, E. (2024). Combating the Terrorist Stigma: Communicating Rehabilitation and Reducing Barriers to Reintegration. Terrorism and Political Violence, 1-18. doi:10.1080/09546553.2024.2317801
Colton, J. S., Holmes, S., & Walwema, J. (2017). From NoobGuides to #OpKKK: Ethics of Anonymous’ tactical technical communication. Technical Communication Quarterly, 26(1), 59-75. https://doi.org/10.1080/10572252.2016.1257743
Douglas, D. M. (2016). Doxxing: A conceptual analysis. Ethics and Information Technology, 18, 199-210. https://doi.org/10.1007/s10676-016-9406-0
Franz, A., & Thatcher, J. B. (2023). Doxxing and doxxees: A qualitative analysis of victim experiences and response. ECIS 2023 Research Papers. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1396&context=ecis2023_rp
Gómez, Á., Morales, J. F., Hart, S., Vázquez, A., & Swann, W. B. (2011). Rejected and Excluded Forevermore, but Even More Devoted:Irrevocable Ostracism Intensifies Loyalty to the Group Among Identity-Fused Persons. Personality and Social Psychology Bulletin, 37(12), 1574-1586. doi:10.1177/0146167211424580
Kimball, M. A. (2017). Tactical technical communication. Technical Communication Quarterly, 26(1), 1-7. https://doi.org/10.1080/10572252.2017.1259428
Matthews, R. S., Aghili, S., & Lindskog, D. (2014). A study of doxxing, its security implications and mitigation strategies for organizations. Concordia University of Edmonton. https://concordia.ab.ca/wp-content/uploads/2017/04/Roney_Mathews.pdf?x60138
Meredith, K. and Horgan, J. (2024). After they leave: exploring post-exit distress in former violent extremists. Journal for Deradicalization. No. 38. https://journals.sfu.ca/jd/index.php/jd/article/view/865
Moreham, N. A. (2014). Beyond information: Physical privacy in English law. Cambridge Law Journal, 73(2), 350-377. https://www.cambridge.org/core/journals/cambridge-law-journal/article/abs/beyond-information-physical-privacy-in-english-law/793E5B27E6B326634C74542A80A042C5
Naeem, M., Ozuem, W., Howell, K., and Ranfagni, S., 2023. A step-by-step process of thematic analysis to develop a conceptual model in qualitative research. International Journal of Qualitative Methods, 22, pp.1–18. DOI: 10.1177/16094069231205789.
Pfundmair, M. (2018). Ostracism promotes a terroristic mindset. Behavioral Sciences of Terrorism and Political Aggression, 11(2), 134-148. doi:10.1080/19434472.2018.1443965
Veilleux-Lepage, Y., Daymon, C., & Amarasingam, A. (2020, December). The Christchurch attack report: Key takeaways on Tarrant’s radicalization and attack planning. ICCT Perspective. https://www.icct.nl/publication/christchurch-attack-report-key-takeaways-tarrants-radicalization-and-attack-planning
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Amarnath Amarasingam, Brad Galloway
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.