Please Support SilentVector:

Showing posts with label Bitcoin. Show all posts
Showing posts with label Bitcoin. Show all posts

Monday, January 18, 2016

Bitcoin For Beginners - My Initial Experiences

Artwork courtesy of coindesk.com

The Cryptocurrency Stigma

I was honestly worried, the moment I downloaded my first Bitcoin wallet application on my phone.  I'd heard the stories in the media: Bitcoin is used by criminals, it proliferates outside the law, and he FBI hunts people that utilize it.  I expected a knock at my door as soon as the app was installed on my phone; men in dark suits were going to stuff me in the back of a van and I would never be heard from again.

There were no knocks on my door.  There was no elaborate plan to snatch this humble hacktivist.  Nothing.

What I did learn from the simple process of installing my Bitcoin wallet was an education in the usefulness and astonishingly simple user interface, yet stunning complexity of the world's most popular cryptocurrency.  All of the frightening things I'd heard equated to hot air from law enforcement, and an intriguing smear campaign that had run rampant in the media.

The most famous use of Bitcoin, and the story most Americans heard, was related to the fall of the Silk Road.  The Silk Road was an underground marketplace that took root in the Deep Web, the basement of the modern Internet.  It was designed as an experiment in Internet consumer freedom, flourished into the most sophisticated trade network of the Information Age, then was shattered into hundreds of independent shards with the conviction of Ross Ulbricht, also know as the Dread Pirate Roberts.

The trial and conviction of the Dread Pirate Roberts was equally as secretive and convoluted as the Silk Road itself.  The proceedings of Mr. Ulbricht's trial raise serious questions about due process in the United States, constitutional 4th Amendment rights that are supposed to protect citizens from illegal search and seizure, Bitcoin's value as a currency, and bring into sharp focus the extent the media will venture to discredit and slander citizens as long as it's in their best interest.(1)

Whenever I mention Bitcoin I've had reactions that range from curiosity, disdain, the currency being referred to as "Hacker Money," me being labeled as a drug dealer or human trafficker (lol), to the loss of close friends simply because of its mention.  What makes the perception of a currency so powerful?  All of the things mentioned can be just as easily purchased with government regulated currencies.  I have never been questioned, detained, or arrested for using Bitcoin exchanges or wallet applications.

The negative perception of Bitcoin was born from the obscene amount of American tax dollars spent to demonize new technology the aging leaders of the United States government haven't taken the time to attempt to understand.  That, and the fact that it is an untraceable, anonymous, non-taxed, more secure form of currency.(2)


Set Up Your Bitcoin Wallet In 10 Minutes

In preparation for writing this article, I downloaded every Bitcoin phone application and computer program I could find on the subject in late 2014.  The majority of them were well put together and functioned eloquently.  Many of them were also buggy, but I encourage the inquisitive reader to download different types of wallets for both your phone and your computer.  Caution though, many products that seem legitimate are sometimes laced with viruses, malware, and spyware (like many other types of freeware).  If you are not looking to become a cryptocurrency engineer, I would suggest using Mycelium Bitcoin Wallet for a phone, and Bitcoin Core(3) for a computer.  These were the easiest programs for me to use and had some of the favorable ratings.

To find the Mycelium application, use your phone to navigate to the Google Play store or Apple Store and search for the "Mycelium Bitcoin Wallet" application.  It's icon looks like this:



Mycelium Bitcoin Wallet permissions include:



- Mycelium uses your camera's video and phone functions to scan QR codes to transfer funds to and from yours and others' Bitcoin wallets.

- The network-based location service will not be enabled if your WiFi connection is turned off.  It is my recommendation that Wifi be turned off any time you are making financial transactions on your phone unless it is necessary to complete the transaction.  If you had your WiFi router configured by your cable guy out of convenience or necessity, leave your WiFi turned off while making any kind of financial transaction on your smart phone.

- Many common financial applications receive this blanket permission to utilize the "control Near Field Communication, full network access, receive data from Internet, and view network connections."  Similar to WiFi connections, keep Near Field Communication (NFC) as well as Bluetooth shut off during financial transactions unless they are the primary means of completing your transaction.  The last three components under the communications icon should be obvious: your phone will need to utilize these to be a phone instead of a doorstop anyway.

- Vibration is utilized for haptic feedback while using the application.  If you have unique power conservation settings on your phone that alter the strength of your signal when the device sleeps, the last permission prevents your phone from erroneously cancelling a transaction by disconnecting the application when the phone sleeps.

- If you are concerned with any of these permissions, please look them up and further educate yourself on their features as well as compare them to banking applications on your phone.  The more you know, the more educated your decisions will be about how you choose to manage your strong digital security posture.

After you have downloaded, scanned (usually automatically through your phone's factory default application), and installed the application, touch the Mycelium icon to open the app.  You will see the following splash screen:




The first time you install Mycelium, you will be asked a few basic questions about your currency and language preferences.  To write the article, I chose to use English and the United States Dollar (USD).  For easy reading and reference, I have used a bold font on menu navigation items and italicized portions of the text that are interesting, but not absolutely required for the most basic operations in Mycelium.

Your Bitcoin wallet's Balance screen will load, and should look similar to the next image.  At this point your Bitcoin Wallet is already fully functional (hopefully that took you less than 10 minutes), but I have highlighted (and occluded) some areas on the next picture so you can start learning about your new financial tool, as well as Bitcoin itself:




1 - Your CryptoAccount sequence, or Bitcoin address, is similar to a bank account number.  They are a unique identifier that is (currently) between 26 and 35 alphanumeric characters that begins with either a 1 or a 3.  You don't need to write this particular type of CryptoAccount number down though; the kind of account we're working in right now changes this number every time you complete a transaction, or when you ask it to.  Your account number is encoded into the Quick Response (QR) code located to the right of your CryptoAccount number.  QR codes are a type of machine-readable matrix barcodes that can be scanned to input information into a computer, eliminating the need to type your account number.(4) 

- The type of Bitcoin address currently displayed is known as an HD (hierarchnial deterministic) wallet account.  A deterministic CryptoAccount uses a textual reference point, known as a "seed" to mathematically forge a new CryptoAccount number during the processing of each transaction.  Even though the CryptoAccount number changes, the seed does not, which enables the continuity of your account and funds as you transact using your Bitcoin wallet.  Don't worry, when your Mycelium wallet was created, your seed was created automatically.  We will talk more about seeds (and how important they are) later in the article, as well as single address Bitcoin addresses.

2 - On top, block 2 shows how much Bitcoin (BTC) is currently in your wallet.  On bottom, Mycelium displays the conversion value of the BTC contained in my wallet, displayed in my currency of choice (USD).  The bottom number in block 2 is directly related to the values contained in block 3.

- If there was any emotional reaction to the balance in my account, I would like to use the opportunity to bring up a valid point: I have several Bitcoin wallets, "for reasons."  As long as you can keep your seeds straight, I would highly encourage you to keep your fattest cryptocurrency wallet on the most permanent device you own for reasons I'll explain in a moment.

3 - Block 3 shows the Bitcoin-to-currency of your choice's exchange rate based off of a Bitcoin market rating (in this case, Bitstamp).  Similar to a stock exchange, as the demand increases for Bitcoin, the price for one BTC will fluctuate upward.  When Bitcoin is perceived to be less useful and its demand is diminished, it value withers downward.  This supply and demand cycle is reflected by how much one BTC is seen as worth, collectively.(5)  There are also smart phone applications that will do Bitcoin currency conversions.(6)


How To Make Bitcoin Wallet Deposits

This portion of the article will give us a break from the Mycelium Bitcoin Wallet application for a moment while we discuss how to get currency into your CryptoAccount.  The recommended way to get money into your Bitcoin wallet is to deposit cash into a Bitcoin ATM.


Bitcoin ATM (CoinOutlet) located at the Overstock.com headquarters building at
6350 South 3000 East in Salt Lake City, Utah.

Most Bitcoin ATM's I have used require deposits in increments of $20.00.  You do not need to buy a whole Bitcoin at a time.  To add funds to your Bitcoin wallet, there is usually a fee of 0.0001BTC (the recent equivalent of $0.25 to $0.30USD).  Follow the instructions on the ATM, scan your CryptoAccount's QR code when prompted, deposit bills one at a time, and collect your transaction receipt.  Moments your session with the Bitcoin ATM is complete, you will see a confirmation of funds entering your account underneath your account balance in your Bitcoin wallet.  You have just transferred hard currency into a Bitcoin system called the Blockchain (more information on the Blockchain and its associated jargon can be found about half way through one of my previous articles).

There are websites and applications available that will offer to transfer money from your credit card or bank account into your Bitcoin wallet.  To this date, I haven't found a Bitcoin application that interacts with other electronic transaction methods that I trust.

- In fact, depositing money into a Bitcoin wallet this way negates some of Bitcoin's interesting features: its untraceable anonymity and that it can be used without a bank account.  These features are preferred and can augment the overall security of your financial portfolio if used correctly.

- Many privacy-minded Bitcoin users prefer not to have Bitcoin attached to any sort of identifiable information; Bitcoin's design was constructed around this feature of anonymity.  Using a bank account or credit card to transfer money into your Bitcoin wallet undermines this feature because any transaction made with your wallet could potentially be traced back to you.  Con artists that prey on the naivety of inexperienced cryptocurrency adopters sometimes set up fake online exchanges they use to collect credit card and Personally Identifiable Information to steal identities.  Conversely, if you own Bitcoin and find a merchant that will convert it into currency and deposit it into your bank or credit card account, the same types of PII are required.  It's my advice to just stay away from Bitcoin vendors that ask for any information that could be used to electronically identify you.

Useful lists of Bitcoin ATM locations can be found at the end of this article under footnote(7).  Also, a list of businesses that accept Bitcoin is listed under footnote(8)

To withdraw currency from a Bitcoin ATM, follow the instructions provided on selling Bitcoin on the ATM, scan your CryptoAccount's QR code, and collect your transaction receipt.  Use the Bitcoin ATM's scanner to scan the QR code on your transaction receipt and the ATM will dispense the funds you requested.  Some Bitcoin ATM companies give a customer 30 minutes from the time the receipt was printed to withdraw money from the ATM is was printed by.  Bitcoin withdrawal transactions also cost 0.0001 BTC.

I thought the fees were somewhat unfair when I was new to Bitcoin, before I understood that 0.0001 BTC is the equivalent of about $0.30 cents.  After I did the math (then got smart and downloaded a Bitcoin currency converter app), I realized that utilizing Bitcoin for some common transactions saves me about $2.00 per interaction.


Important Bitcoin Wallet Functions

Before you continue playing around with your Mycelium wallet, probably the most important piece of advice I can give you is to backup your seed pass phrase.  Seeds were mentioned toward the beginning of the article, and their importance cannot be stressed enough.  If you plan on keeping any significant amount of currency in your wallet, complete the following steps:

Get a pen and paper ready, then press the menu button on your phone to bring up the Mycelium menu:


Select Backup from the menu, and you will be prompted with the following screen:



Select Yes, and be prepared to write or type your 25 word seed phrase.  Once you have recorded your seed phrase, you will be asked to re-enter it into the Mycelium application before you can continue.

The importance of your wallet seed cannot be stressed enough.  Do not give it to anyone, do not lose it, especially if you are planning on storing any significant amount of Bitcoin in the wallet.  If your phone breaks, or your house burns down, or the laptop you save the phrase on bites the dust and you cannot recall your seed phrase, those Bitcoins are lost to the abyss of the Internet forever.

To hide your seed, I would suggest opening a safe deposit box account and storing it away.  Or you can use the QR code software I mentioned earlier in the article, and carefully encode your seed phrase into a QR code, print it, and store it away in your locked filing cabinet or fireproof container you keep in your home.  You can even have the phrase engraved on the inside of a metal watch band.  However you decide to keep your phrase secret and secure, remember that it's the only way to retrieve your wallet if your device kicks the bucket.


A Few More Important Features

To create a permanent (non-HD) account to use in conjunction with a business or to accept charitable donations, click on the Accounts tab within your wallet, then click on the Add New Account icon in the top right corner of the screen:



The next screen will ask you what kind of account you would like to make.  You are already set up with a standard HD account, so you want to select Advanced to generate a new, non-HD, single account:



You will be taken to the following screen, where you should select Generate new random key near the bottom:



A new random private key will be generated for you and displayed on the following screen.  You can Shuffle the key, if for some reason that particular one doesn't fancy you.  Click on Use when you are ready to proceed:



You will be asked to name your new, single Bitcoin account.  I randomly named mine "Permanent Account" but you can choose whatever name you'd like:



After clicking OK, you will be taken back to your accounts tab and you will see your new account listed:



You will notice at the bottom of the new account the words "Backup missing" across the bottom of the new account.  Click on the new account to highlight it, then select Create Backup in the top right hand corner of your screen:



This will take you on a wild ride that is difficult to explain, because phones will not allow you to take screenshots of the procedure.  Carefully follow the instructions, write down your password, and send yourself the encrypted PDF file.

Remember, this process is different from your master seed backup.  Your master seed encompasses all your Mycelium wallet accounts; this process of creating and backing up a single account is for that account only.


Enjoy Your Bitcoin Wallet

Every other function within the wallet can be played around with, while you study its specific function.  Be sure to take a look at the links below to find a Bitcoin exchange near you, watch the value of Bitcoin over time (remember to always invest while it's value is low to reap the monetary benefits when it goes up), and learn more about wallets and exchanges.  Bitcoin mining, which I will probably do an article on in the future, is also an extremely interesting process that explains where your 0.0001 Bitcoins go when you complete a transaction.

I love economics and the human system of assigning "value" to something.  Studying Bitcoin and other cryptocurrencies has given me new ways to exchange goods and services, study encryption algorithms, follow a "stock market" outside of government control, and make a bit of money on the side.  It is especially interesting to watch the value of Bitcoin go up or down based on current global events, most recently the Greek and Eurozone crisis.

Now, that wasn't so bad.  Federal agents still haven't Rainbow Sixed their way through my living room window while I was writing this, or while I was buying a new coffee table with Bitcoin.  Enjoy your new wallet, encourage your friends to download Mycelium and try it out.  The most interesting functions of Mycelium happen after you begin transferring currency back and forth, and will introduce you to the amazing complexity of the Bitcoin Blockchain.

Please reference the links listed below for more information.  I wish you the best of luck in your endeavors.

SilentVector33


References & Additional Information:

(1) Inside the Dark Web - Documentary (2014) - (please watch impartially) https://youtu.be/qXajND7BQzk

(2) Bitcoin, Wikipedia - https://en.wikipedia.org/wiki/Bitcoin

(3) Bitcoin Core - https://bitcoin.org/en/download

(4) To learn more about QR codes and generate your own, visit www.the-qrcode-generator.com/

(5) To observe some Bitcoin market ratings in action, visit bitcoincharts.com/markets/.  My favorite simplified website I use as a Bitcoin ticker can be found at btcvert.com.

(6) The Bitcoin currency converter I like the most is the Bitcoin Converter by AM SOFT (@amsoft_apps).



(7) To find a Bitcoin ATM near you, utilize the following lists of locations (not nearly all-inclusive):
  • http://coinoutletatm.com/ - This company is my preferred way of exchanging US Dollars for Bitcoin because they have an outlet that can be accessed 24 hours a day, 7 days a week at Overstock's headquarters in Salt Lake City.  I have spoken with their company representatives on the phone and through email, and I can tell you first hand that they are the most kind, helpful customer service branch of any company I have ever dealt with.
  • https://localbitcoins.com/ - If you sift though the data, this website will list local Bitcoin currency exchanges and machines.  Beware though, it also lists many "businesses" that will accept MoneyGram and Western Union funds transfers in exchange for Bitcoin; many of these may be scam contacts who are out to get your money.  It also lists people (much like Mycelium does) that you can physically contact to exchange currency.  I only do this with people I actually know, but if you're feeling especially adventurous feel free to indulge.
  • http://www.coindesk.com/bitcoin-atm-map/ - CoinDesk.com is one of my favorite and most professional sites I have found for Bitcoin information and exchanges in my area.  You can also follow them on Twitter @coindesk for updates on the latest Bitcoin news.



(8) A (non-inclusive) list of businesses that accept Bitcoin:

If Bitcoin was only used to buy illegal merchandise, I doubt these companies would allow me to buy my next book or television from them with Bitcoin.

One View On Sociology & Online Anonymity




One View On Sociology and Online Anonymity



(1)
      Privacy is a crucial element in an individual’s self-actualization and rehearsal of socially constructive reflexive behaviors.  In The Human Condition (1958), Ardent argues that “privacy guarantees psychological and social depth, containing things that cannot withstand the constant presence of others on the public scene; it undergirds the public by establishing boundaries, which fix identity; and it preserves the sacred and mysterious spaces of life.  Some phenomena are different if they are not private; confessions of shame or guilt made public become boastful; over-disclosure becomes false; terror, a guilty secret; love and goodness are destroyed.”(2)  The psychological benefits of privacy are important to individuals and their personal development.  If individuals benefit from the availability of privacy, one could logically come to the conclusion society as a whole benefits from it as well.

      I should have rights to my individual intellectual property (the information I produce, regardless of its origin), access to information and choices about what I choose to ingest (to include food and medicine), freedom to choose how I make positive impact with my life, as well as how (and under what circumstances) I spend my money.  Privacy, or the perceived lack of it, plays a crucial role in how we exercise these rights within society.  Indeed, “the concept of privacy also matters for another, deeper reason.  It is intimately connected to what it is to be an autonomous person.”(3)  A surveillance state, in which privacy does not exist, affects the social psychology of its citizens, their autonomy, stunts honest creativity, and negatively impacts important catalysts for change in social institutions.


(4)

      Since the time I began taking an interest in information security, corporate information brokers and United States government privacy policy posturing do not subscribe to the concept of private matters.  They are, in fact, so against the concept that many hacktivists who have exposed poor corporate security have been imprisoned under unusual conditions.(5)(6)  Famous whistleblowers who have played a part in exposing government surveillance,(7) service-members’ blatant disregard for human life are either seeking asylum in foreign countries or are imprisoned under harsh sentences and branded as traitors.  Additionally, the technologies, forums, and groups associated with these alleged crimes (The Onion Router (TOR) network, Bitcoin, the Silk Road, and online Anonymous collective) endure an interminable onslaught of media criticism and smear campaigns; this distorts the social lens through which these entities are observed and warps the public perception of people who believe online anonymity and privacy are fundamental human rights.

As an American citizen, these are people and situations I would like to be aware of.  I want to know if the details of my personal life are being recorded, if they’re analyzed and the nature of that data’s format, and what that information will be used for.  I am creating the data; therefore I should have the right to keep it private, unless I am under the scrutiny of a legitimate criminal investigation.


(8)

      “If you’re a non-criminal, you don’t need anonymous, untraceable financial transactions.  Or you could use cash, which is still almost completely anonymous.  But criminals have a different problem when it comes to cash.  Once your criminal business becomes successful, say from dealing drugs or running sex slaves or poaching rhinos, then the cash really starts to pile up.”(9)  To that, I would like to retort without an academic reference: it is a known fact that even socially sanctioned technologies are used to commit these crimes.  Cellular telephones and printed money are used in drug and human trafficking every day.  If these new, anonymity technologies are as detrimental to society as the media portrays them to be, why did two law Drug Enforcement Administration (DEA) agents steal $800,000 in Bitcoin during the Silk Road investigation?(10)(11)  If Bitcoin is considered a “currency for criminals,” I would think public officials would have no interest in maintaining vast personal stockpiles of it; not unless they’re dealing drugs, running sex slaves, or poaching rhinos.


(12)
Because I openly use Bitcoin, does this somehow indicate I am implicated in criminal activity?  If so, would the sociological way people view my hobby be different if Bitcoin were painted under a different light by the media?  I believe so.

      Bitcoin is an unregulated, digital currency that uses a decentralized monetary system built on complex encryption algorithms.  What is fascinating about Bitcoin is that it records each transaction in a public ledger called the “blockchain,” which is fed back into the encryption algorithm that keeps Bitcoin user identities secure.  Each time a user conducts a transaction they are charged a “mining fee” to compute the transaction.  The transaction is “hashed” (transaction information is shortened into a numerical, mathematic equivalent) and an exchange event is created based on the time of the transaction, currency exchange amount, “wallet” (or Bitcoin account) number, among other electronic details.  This hash is recorded into the Bitcoin blockchain by Bitcoin “miners” (individuals who purchase Bitcoin transaction processing hardware to collecting mining fees), to be used in deriving hashes for use in future transactions.  The user is also issued a new, uniquely random wallet (or account) number after each transaction, and old wallet number is discarded.  Condensing the previous paragraph was no easy task, but by comparison, the electronic function of Bitcoin is even more mind-bogglingly complex.


(13)
Bitcoin has come under scrutiny because of its decentralized nature, “lack of clarity about its legal structure,” and “creates challenges for regulatory authorities.”(14)  Comprehensively, Bitcoin derives its value from the dollars exchanged into the blockchain, but ultimately from the perceived level of privacy it can provide to its users regardless of structure or regulation.
Recently, a prominent Bitcoin dealer began “stress testing” the Bitcoin blockchain by introducing a large volume of transactions that were of little value; they were of less value than the mining fee collected by Bitcoin miners, which put significant strain on the blockchain transaction network.(15)  Since the stress tests began, the Bitcoin software development core engineers have been submitting proposals to expand the transaction capability of the Bitcoin network.(16)
Anyone who enjoyed profitable Bitcoin trading in the first half of this year woke to bad news on July 11, 2015, after Bitcoin reached a peak of $310.00 for the 2015 year.  Investors watched Bitcoin’s value slide and by August the currency had been devalued by nearly a third to $213.00.
 

(17)
The devaluation indicates two important points about anonymity services: first, there is nothing broken about the Bitcoin blockchain except that its core functional promise of anonymity and privacy had been undermined.  Second, while it is encouraging that Bitcoin’s Developer Core is addressing the problem through Bitcoin Improvement Proposals (BIP), at least one of the proposals would utilize a software mechanism (called a “hard XT fork”) that could potentially reveal a user’s identity or location, while also exposing users of an online anonymity service called The Onion Router (Tor) network.(18)  Proposals of this type caused the Bitcoin to lose value even more drastically than anticipated, and sewed distrust amongst Tor users.

As an example of monetary values placed on anonymizing services and their related software, Bitcoin is only one product.  The entire situation implicates it in an entirely new arena of online anonymity: a human’s right to privacy on the Internet.
      The Onion Router (Tor) anonymity network comes bundled in a powerful suite of privacy and encryption software named TAILS Linux.  Tor circumvents typical Internet Protocol (IP) address assignment methods and makes it appear as if the user’s computer is located in another country.
There is an ambiguous controversy surrounding Tor.  On one hand, the infamous illicit drug market Silk Road was built using Tor technology.  On the other hand, this technology is immeasurably valuable in protecting activists, “journalists, whistleblowers, domestic abuse victims, and dissidents living under repressive regimes.”(19)

Within the computer science field, it is rumored that United States federal agencies have attempted to arrest control of (at least parts of) the Tor network.  As a skeptic, I tentatively dismissed these rumors as conspiracy theories and consigned them to the back of my head for use in a future information security thriller novel.  However, on September 10, 2015, an article was published describing the interaction between a library in New Hampshire that wanted to offer Tor services to its patrons, and the Department of Homeland Security (DHS).  I whole-heartedly agree with the library’s position, even if Tor is merely used for educational purposes within the library.  I was baffled at the reasons for DHS’s reservation in allowing the library to offer Tor services; DHS spokesman Shawn Neudauer was quoted in the article, saying “the protections that Tor offers can be attractive to criminal enterprises or actors and HSI [Homeland Security Investigations] will continue to pursue those individuals who seek to use the anonymizing technology to further their illicit activity.”(20)
While I was reading the article, I asked myself why citizens of the city were not being asked to offer their opinions on the issue.  Near the bottom, the library’s director reflected my concerns, saying “we need to find out what the community thinks.  The only groups that have been represented so far are the Police Department and City Hall.”  The article was updated on September 16, 2015, mentioning the “overwhelming support from the community to restart its participation in the anonymous Web browsing project.”(21)


(22)
The library board Chairman Francis Oscadal, at a meeting about the Tor service, said “with any freedom there is risk, it came to me that I could vote in favor of the good… or I could vote against the bad.  I’d rather vote for the good because there is value to this.”(23)  The community support for Tor is just a small example of public interest in anonymity technology.  Another, much broader example of public interest in anonymity, clothed as a global sociological Internet movement, is the group Anonymous.


(24)
Anonymous is an Internet collective with no central leadership, which uses its vast membership and a number ideological propinquities found within its members to carry out vigilante forms of social justice.  They were founded within the Internet message board 4chan.org and evolved into the first Internet collective to physically protest in the streets while conducting disruptive operations online simultaneously.


(25)
I agree that a portion of Anonymous’ activities, both on and off-line, are morally questionable.  Modern Anonymous is fractured and misdirected, but there must be a social mechanism that is not being fulfilled elsewhere if so many citizens flock to its ranks.  Dabbling in Anonymous’ communications, even momentarily, reveals a jarring (but often respectable) point of view that seeks to be a new type of online “agent of socialization” by bringing attention to issues of racial discrimination, animal cruelty, pedophilia, government overreach, and the atrocities of war.(26)
 
  

(27)
If nothing else, it seems the collective thrust of its members is to burst the bubble of comfort that citizens surround themselves with, in a much less-carefully packaged material than is delivered from main-stream media companies.  Media produced by Anonymous often depicts the Guy Fawkes mask wearing activists as typical people, powerfully poised to restore justice and power to the common citizen.


(28)
In 2011, a prominent member of Anonymous and co-founder of the infamous hacking group LulzSec(29) became an informant for the United States Federal Bureau of Investigation (FBI).(30)  Other members who chose to “unmask” themselves became targets of law enforcement sting operations, which led to a convoluted string of convictions under questionable circumstances.(31)(32)(33)


(34)
Why does fear of unknown, and recently-invented methods of social construction and digital protest illicit such a fierce response from authority?  Dissenting opinion and competition between ideas is healthy for the development of more enlightened ideas and social change, but also seem to provide enough “evidence” of crimes by Internet security activists, privacy advocates, and disruptive journalists to convict them, geographically banish them, or place them in solitary confinement.  Not only does this disrupt the communications for prominent advocates for these technologies, but it distorts the sociological narrative of remaining members by inciting fear and self-censorship.

If so many people subscribe to these collective values, why are they not spoken about publicly and encouraged as a contradictory point of view in wider debate?  My belief is, they challenge the purpose and roles of long-standing social institutions (such as government, the war on drugs, the monetary system, and war in general), change the dynamics of typical roles within a society, and in some ways it puts power back into the hands of members of society when they cannot be pursued or prosecuted for their most genuine beliefs unless they reveal their identities. 

      Within the complex debate of one’s right to privacy, the point is often lost between the laws of the land and the responsibilities and roles of citizens within society.  This causes an ambiguously poignant, yet sometimes hopeful paroxysm in what I feel my role is within society: to be unafraid, give a second look to technology that protects the human rights of individuals, and educate others in this technology’s intended utility.

      The Internet isn't going away.  Human beings will continue to use it to socially organize, to express our concerns, and our most fervent hopes.


(35)



Works Cited:
(1) Grabpage.info (n.d.) Privacy Banner. [computer generated graphic]. Retrieved from http://grabpage.info/t/www.bing.com:80/images/search?q=Entrepreneurial+Consulting+Services+Banner&FORM=RESTAB

(2) Ardendt, H. (1958). The Human Condition.  Chicago: University of Chicago Press.

(3) Lynch, M. P. (June 22, 2013). Privacy and the Threat to the Self.  Retrieved from http://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/?_r=0

(4) Alienteitsolutions.net (n.d.) Privacy Banner. [photograph, computer generated graphic]. Retrieved from http://www.alienteitsolutions.net/wp-content/uploads/2015/06/privacy_banner_img_large.jpg

(5) Farivar, C. (April 6, 2015). Barrett Brown Suddenly Stripped of Prison e-mail After Talking to Press. Retrieved from http://arstechnica.com/tech-policy/2015/04/barrett-brown-suddenly-stripped-of-prison-e-mail-after-talking-to-press/

(6) Rozsa, M. (June 24, 2015). Solitary Confinement is Torture.  Retrieved from http://www.dailydot.com/opinion/solitary-confinement-mental-illness-barrett-brown/

(7) Bamford, J. (August 8, 2013). Edward Snowden: The Untold Story. Retrieved from http://www.wired.com/2014/08/edward-snowden/

(8) Wired Magazine (September 2014) Cover2. [magazine cover, photograph]. Retrieved from http://www.wired.com/wp-content/uploads/2014/08/cover2.png

(9) Moss, S. (July 13, 2010). Julian Assange: The Whistleblower. Retrieved http://www.theguardian.com/media/2010/jul/14/julian-assange-whistleblower-wikileaks

(10) Jeong, S. (April 17, 2015). Could the Crimes of Two Corrupt Agents Free Ross Ulbricht? Retrieved from http://www.forbes.com/sites/sarahjeong/2015/04/17/could-the-crimes-of-two-corrupt-agents-free-ross-ulbricht/

(11) Greenberg, A. (March 30, 2015). DEA Agent Charged With Acting as a Paid Mole for Silk Road. Retrieved from http://www.wired.com/2015/03/dea-agent-charged-acting-paid-mole-silk-road/

(12) BTCNews.com.au (n.d.) Handcuffs and Bitcoin Props. [photograph]. Retrieved from http://btcnews.com.au/banks-warn-bitcoin-poses-potential-terrorist-threat.html

(13) Wired Magazine (n.d.) Bitcoin Artwork. [computer generated image]. Retrieved from http://www.wired.co.uk/news/archive/2015-08/03/bitcoin-users-criminals-computer-programmers-study

(14) Shcherbak, S. (2014). How Should Bitcoin Be Regulated? Retrieved from http://www.ejls.eu/15/183UK.pdf

(15) Buntinx, J. P. (September 16, 2015). CoinWallet Keeps Stress Testing Bitcoin Network Indirectly. Retrieved from http://digitalmoneytimes.com/crypto-news/coinwallet-keeps-stress-testing-bitcoin-network-indirectly/

(16) Genjix (September 19, 2015). Bitcoin Improvement Proposals. Retrieved from https://en.bitcoin.it/wiki/Bitcoin_Improvement_Proposals

(17) CoinBase (September 14, 2015) CoinBase Currency Comparison Before and After the XT Fork Bitcoin Improvement Proposal (BIP). [Chart screen-shots]. Retrieved from https://www.coinbase.com/charts

(18) Galt, J. S. (August 20, 2015). Bitcoin XT Fork Can ‘Blacklist’ Tor Exits, May Reveal Users’ IP Addresses. Retrieved from http://cointelegraph.com/news/115153/bitcoin-xt-fork-can-blacklist-tor-exits-may-reveal-users-ip-addresses

(19) Smith, G. (August 19, 2013). Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan. Retrieved from http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html

(20) Angwin, J. (September 10, 2015). First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email. Retrieved from https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email

(21) Biello, P. (September 16, 2015). N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor. Retrieved from http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor

(22) ProPublica.org (September 10, 2015) Library Tor. [photograph]. Retrieved from https://www.propublica.org/images/ngen/gypsy_og_image/20150910-library-tor-1200x630.jpg

(23) Doyle-Burr, N. (September 16, 2015). Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library. Retrieved from http://www.vnews.com/home/18620952-95/despite-law-enforcement-concerns-lebanon-board-will-reactivate-privacy-network-tor-at-kilton-library



(26) Newman, D. M. (2014). Sociology: Exploring the Architecture of Everyday Life (10th Edition). p. 134. SAGE Publications, Inc. ISBN 978-1-4522-7594-9.

(27) DigitalJournal (February 23, 2014) Old Screen Shot (Website Has Since Changed). [screen shot] Retrieved from http://www.digitaljournal.com/news/world/facebook-pedophiles-being-exposed-by-anonymous/article/372667

(28) elRobotPescador.com (July 20, 2015) Anonymous. [photograph] Retrieved from http://i.ytimg.com/vi/jrCDJfiI7vw/maxresdefault.jpg

(29) Olsen, P. (2012). We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Little, Brown. p. 248. ISBN 978-0-316-21354-7.

(30) Pilkington, E. (December 9, 2014). Anonymous Superhacker Turned FBI Informant Sabu Remains Defiant Over Snitching. Retrieved from http://www.theguardian.com/us-news/2014/dec/09/hacker-sabu-defends-informing-anonymous-fbi-interview

(31) Hankoff, N. (March 16, 2015). Bilk Road: The Unconstitutional Trial of Ross Ulbricht. Retrieved from http://www.voicesofliberty.com/article/bilk-road-the-unconstitutional-trial-of-ross-ulbricht/

(32) Mian, R. (April 4, 2014). Barrett Brown: American Journalist, Whistleblower & Prisoner. Retrieved from https://www.longislandpress.com/2014/04/04/barrett-brown-american-journalist-whistleblower-prisoner/

(33) Newman, A. (November 18, 2013). Activist hacker Hammond Slams Government Crimes at Sentencing. Retrieved from http://www.thenewamerican.com/usnews/crime/item/16973-activist-hacker-hammond-slams-government-crimes-at-sentencing

(34) IBTimes.co.uk (n.d.) Anonymous Mask. [photograph] Retrieved from http://d.ibtimes.co.uk/en/full/1390974/anonymous-mask-tayeb-abu-shehada.png?w=198&h=135&l=50&t=40


(35) ABC News (January 7, 2015). Je Suis Charlie: Not Afraid. [photograph] Retrieved from http://a.abcnews.go.com/images/International/ap_paris_shooting_12_kb_150107_1_16x9_992.jpg