1,146
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

Coordinating and doxing data: Hong Kong protesters’ and government supporters’ data strategies in the age of datafication

ORCID Icon &
Pages 355-372 | Received 19 Jan 2021, Accepted 01 Dec 2022, Published online: 17 Feb 2023

ABSTRACT

Scholars across various disciplines have discussed the role of ICTs and social media in contentious politics and social movements. Other studies have also highlighted the duality of data particularly in the context of contentious politics: data is simultaneously an object of political struggle and a weapon in repertoires of political struggle. Taking the protesters’ collective and networked program of sousveillance during the 2019 Hong Kong Anti-ELAB Movement as an example, this article examines protesters’ and pro-establishment’s engagement with data, the datafication of police as proxies of the state, and attitudes towards various forms of ‘veillance’. The doxing at the heart of this case study provides an example in which data as constituents of movement repertoire and data as a contentious issue in its own right are conflated. This article bridges the surveillance and social movement literature by examining data practice and doxing during the protest.

Introduction

Hong Kong offers a unique case to consider the intersection of data and contentious politics. The city’s postcolonial history has positioned the jurisdiction as an ‘open’ exception with reference to a ‘closed’ China. However, in contrast to the narrative of an ‘open, smart city’, the legislative framework inherited from the British colonial government defining the role of data and guaranteeing rights to information remains weak (Hoyng, Citation2021; Meng et al., Citation2019). Access to data has been framed as a service, rather than a right by the Hong Kong government, and as a privilege by private sector corporations (Hoyng, Citation2021). The resulting information asymmetry has led to Hong-Kong-based data intermediaries to engage in ‘counter-data action’ by building their own datasets (Meng et al., Citation2019). In the context of increased tension over Hong Kong’s postcolonial political and cultural identity, cross-border data mobility under China’s Greater Bay Area planFootnote1 and the vague definition of ‘personal data’Footnote2, activists and citizens have begun to exploit, contest and reimagine the norms around the openness of data. Most recently, this contestation over data in Hong Kong took place during the Anti-Extradition Law Amendment Bill (Anti-ELAB) movement of 2019.Footnote3

The networked and datafied contentious performances seen during the movement provide a unique context to re-examine the nexus between data-driven governance and individual data practice during times of contention. The Hong Kong government adopted a hybrid strategy of repression and policing that blended ‘hard’ and ‘soft’ methods (Wang et al., Citation2020). ‘Hard strategies’ included the forceful suppression of rallies with tear gas and water cannon. ‘Soft strategies’, on the other hand, included the collection of protesters’ data through facial recognition software (Mozur, Citation2019), transport usage records and social media posts. In response to datafication and surveillance carried out by the state (and pro-government supporters), protesters engaged in anti-surveillance practices such as wearing masks, destroying CCTV cameras, and disabling the facial recognition login on their phone to disrupt the government’s ability to collect biometric information. They also appropriated the techniques of the state through an organized program of doxing – the public exposure of private information without consent – that crowdsourced and publicized information about police and people suspected of being ‘snitches’. This weaponization of data influenced the movement’s dynamic and the contentious performances exchanged between the state and protesters. Police started wearing masks and stopped prominently displaying their badge numbers to conceal their identity from protesters (Mozur, Citation2019). Government supporters also collected and publicized images of individuals participating in illegal activities such as ‘unsanctioned’ protests and the destruction of property on platforms such as hkleaks.pk and reboot-thug-archive. The doxing campaigns seen in the Hong Kong Anti-ELAB protests of 2019 serve as a case study that neatly encapsulates the duality of data – that data is simultaneously an object of political struggle and a weapon in repertoires of political struggle (Beraldo & Milan, Citation2019; van der Graaf et al., Citation2016).

This article sets out from the assumption that datafication now also exists as a foundational structure within society that can create and remove opportunities for change, particularly during episodes of contention. We situate doxing as a practice that sits at the nexus of Beraldo and Milan’s (Citation2019) data as weapon/data as stakes dichotomy. This dichotomy is particularly relevant in the Anti-ELAB movement case because we see an overlap in both means and objects of datafied contention between the two politically opposed groups. We explore the specific dynamics of doxing as an individual and a collective performance within Hong Kong’s contentious repertoire. Doxing, when done collectively in the context of contentious politics, is shown to shift power dynamics between claimants, as doxers take on the practices of (or even the role) of the state. Thus, in certain contexts, doxing can become an organized program of either ‘sousveillance’ (the surveilled subject is ‘gazing back at (state) power from below’) or ‘surveillance’ depending on the ideological positioning of the doxers vis-a-vis the state. This assertion frames doxing, typically seen as an unethical practice, as something that can be justified, even morally appropriate, in certain circumstances. Making a judgement on this ethical paradox, as well as qualitatively interrogating the way Hong Kongers perceive this paradox, are beyond the scope of this study and warrant further research.

We focus on the discourses about doxing police and their families on LIHKGFootnote4, as well as two Telegram channels (Dadfindboy and Youcangotojail) organized by protest sympathizers and government supporters respectively to examine the various strategies, target audiences, and moral justifications given for doxing. Linkages between these moral justifications and the persuasive functions of movements (Benford & Snow, Citation2000; Stewart et al., Citation2007) can be drawn – which further connects individual instances of doxing as a data practice with collective identity in the movement (Milan, Citation2015; Trottier, Citation2017). Our findings suggest that doxing in the Hong Kong example changed the power relations between police, protesters, and government supporters; it also became forms of sousveillance and surveillance that blended more traditional image-based monitoring techniques with contemporary techniques of datafication. We conclude by discussing the consequences of connecting individual data practices with the proactive mobilization of collective identity and the (re)definition of moral boundaries.

Literature review

Contentious data politics

Studies of contentious politics and data activism have shed light on the importance of agency, power, and practice in the digital age (Beraldo & Milan, Citation2019; Flesher Fominaya & Gillan, Citation2017; Pellegrino et al., Citation2019). Contentious politics refers to when ‘ordinary people – often in alliance with more influential citizens and with changes in public mood – join forces in confrontation with elites, authorities, and opponents’ (Tarrow, Citation2011: 7). It can occur over any issue and manifest itself through a variety of mediums, including data. Data are contentious in nature (Beraldo & Milan, Citation2019; Milan & van der Velden, Citation2016) and are often repurposed for various political purposes such as mobilization, surveillance and repression (Dencik et al., Citation2016). Beraldo and Milan’s (Citation2019) claim a paradigm shift has occurred in datafication – from data politics to the contentious politics of data. They (2019: 2) define the latter as:

The multiplicity of bottom-up, transformative initiatives interfering with and/or hijacking dominant, top-down processes of datafication, by contesting existing power relations and narratives and/or by re-appropriating data practices and infrastructure for purposes distinct from the intended.

In this sense, data activism can serve as a ‘heuristic tool’ that can be used to explore how activism evolves in response to big data (Milan & van der Velden, Citation2016, p. 66). The term ‘data activism’ has emerged to describe the adoption of data to reach movement goals or to engage in contestation (Kazansky et al., Citation2019; Lehtiniemi & Haapoja, Citation2020). Data activism can take many forms and be ‘pro-active’ as well as ‘re-active’. The former refers to instances where data are used as part of civic engagement, advocacy, and campaigning for social change, whereas the latter focuses on how individuals and groups resist corporate intrusion into their private lives, datafication and state surveillance (Pellegrino et al., Citation2019; Schrock, Citation2016). Doxing can be both a pro-active and re-active form of data activism and has increasingly been seen in contentious events of recent years such as the Arab Spring, the Black Lives Matter movement and the Anti-ELAB movement of Hong Kong. In these contexts, doxing is a practice grounded in datafication and thus inextricably linked to surveillance.

Surveillance, anti-surveillance and sousveillance

To connect surveillance studies and social movement research, we need to first start with studies on policing protest (della Porta et al., Citation2006; Earl & Soule, Citation2006; Jackson et al., Citation2019). Surveillance – or ‘watching from above’—is typically understood as a form of disciplinary power wielded by the state or capital (Foucault, Citation1977). With specific reference to surveillance and social movements, research has focused on the repression-protest nexus (Jackson et al., Citation2019; Schlembach, Citation2018), in other words how policing and protester tactics mutually shape each other and political opportunity structures. Studies have explored the effects, real and perceived, that surveillance has on human behavior and mobilization. Many (e.g. Ullrich & Wollinger, Citation2011) have highlighted the connection between prominently displayed surveillance devices such as CCTV cameras and compliance with the law. Others (Lyon, Citation2018; Stoycheff et al., Citation2019) have considered how less visible forms of surveillance, such as network infiltration and the datafication of individuals (whether it be by states or big-tech), have prompted self-censorship and thus had a ‘chilling effect’ on the mobilization of dissent. Individuals are shown to be enmeshed within a ‘surveillance assemblage’ (Haggerty & Ericson, Citation2000; Ullrich & Knopp, Citation2018), comprising multiple layers of surveillance actors, including the government, police, their peers, opponents and the general public. Peer-to-peer surveillance has become increasingly easy with advancements in personal technological devices and is particularly important in the context of contention over national (or in Hong Kong’s case, local) identity, as it connects popular (people-driven) surveillance practices to state power (Bitso et al., Citation2012).

Efforts to resist surveillance and equalize embedded power asymmetries have also become popular topic of research. Some (Dencik et al., Citation2016; Hermida & Hernández-Santaolalla, Citation2018) have focused on anti-surveillance, whereby individuals adopt practices that disrupt or evade the government’s attempts to collect their information. Scholars (Maragkou, Citation2019; Wood & Thompson, Citation2018) have discussed the role of crowdsourced information which ‘facilitate[s] surveillance discovery, avoidance, and counter-surveillance.’ Others (Mann & Ferenbok, Citation2013; Mann, Citation2005, Citation2013) in the field of surveillance studies have highlighted the emergence of a new kind of ‘veillance’—sousveillance—whereby the subject is ‘gazing back at (state) power from below’ in order to document misconduct and foster accountability. To date, literature concerned with sousveillance has focused on wearable devices that capture, process, store, recall and transmit human sensory information and thus has predominantly considered the individualized nature of sousveillance as a contentious performance. This article provides an example of sousveillance that is focused on a practice not considered as such before and highlights how it can be a highly coordinated, networked program that transcends individuals, and further constitutes a movement repertoire in influencing collective identity. Furthermore, we extend discussion of how sousveillance (and surveillance) has been integrated into mobilization framing and persuasion (Benford & Snow, Citation2000; Stewart et al., Citation2007).

Doxing and data ethics

Doxing refers to the public exposure of private documents and information without consent (such as photos, phone numbers, and home addresses) online, with the intent to humiliate, harass, intimidate, punish and/or blackmail targets, or condemn certain actions and ideas (Carty & Reynoso Barron, Citation2019; Fish & Follis, Citation2016). In light of the damaging effects doxing can have on its targets, it is typically seen as unethical (McNealy, Citation2018). However, doxing has been increasingly connected with digital activism and framed as a technique sometimes necessary to reveal wrong-doing or hold wrong-doers to account (Douglas, Citation2016). The practice enables users to redefine what counts as acceptable conduct and contest the boundaries of what the state defines as acceptable intervention. From this perspective, Trottier (Citation2017) describes certain kinds of doxing as ‘digital vigilantism’, a user-led policing that defies, distrusts, or supplements police and the state who are unable or unwilling to prosecute perceived offenses. In this framework, the goals of doxing are broadened to include responding to crimes, preventing offenses, providing information, and negotiating values.

To navigate between ‘justifiable’ and ‘unjustifiable’ instances of doxing, scholars have developed several typologies that categorize the intention behind doxing, the type of information leaked and the consequences the information release will have on the doxed subject. Douglas (Citation2016), for example, distinguished between doxing that de-anonymizes, targets, and de-legitimizes its subject. In this framework, de-anonymizing doxing publicizes personal information that establishes the identity of a previously anonymous person; targeting doxing refers to releases of information about an individual’s circumstances that are not publicly shared; and lastly, de-legitimizing doxing discloses intimate information that harms the integrity of an individual. Trottier (Citation2017) categorizes doxing along several axes including: doxer, target, and/or law enforcement. MacAllister (Citation2017) conceptualizes the purpose of doxing from a legal standpoint. She suggests three functions: to ‘punch down’ a target either as a symbolic act, to enact revenge or punishment, or simply for the ‘fun’ of it; to increase the transparency of an issue or group to the public, heightening attention to newsworthy information; or to expose a perceived injustice.

Data and methods

Following Douglas (Citation2016) and Trottier’s (Citation2017) definitions that characterize doxing as the release of private information on a public platform, we chose two platforms – LIHKG and Telegram – commonly used by movement and government sympathizers to ‘name and shame’ perceived opponents. LIHKG was launched in Hong Kong in November, 2016. It is a Reddit-like, multi-category discussion forum that allows people registered with an institutional or ISP email (not gmail or hotmail) to sign up and anonymously post, upload, vote, and chat. On LIHKG, users can vote discussion threads up or down and thereby popularity drives which threads will be presented first. During the Anti-ELAB Movement, LIHKG became popular amongst protesters to exchange ideas, disseminate information, and make decisions (Lee, Citation2020). Telegram, by contrast, is a not-for-profit, encrypted, cloud-based messaging app. It distinguishes itself from other platforms such as Facebook and Google by emphasizing its commitment to privacy, and is therefore popular among protesters to share information and organize activities (Maragkou, Citation2019).

We examined posts on LIHKG specifically related to doxing to get a sense of discourse on doxing the police and their families. To gain insight into how protesters and government supporters actually doxed their perceived opponents, we chose to further investigate posts on two Telegram channels created with the stated purpose to dox perceived opponents: DadfindboyFootnote5 and Youcangotojail channelFootnote6. Dadfindboy was established on 7 July 2019, with the stated purpose of publicly releasing the private information of police officers to de-anonymize them. Youcangotojail channel was established on 24 November 2019. The stated goal of Youcangotojail channel is to take collective action against ‘rioters’ because their practices are ‘illegal’ and ‘disturbing the social stability’.

Protest-related posts on LIHKG and Telegram are predominantly written in colloquial Cantonese, the language spoken in Hong Kong. This lowers the barrier of entry for Hong Kongers to participate in conversations on the protests while simultaneously limiting those who cannot read traditional Chinese characters from engagement. This infrastructure provides what Tufekci (Citation2017) describes as ‘network internalities’, the benefits and collective capabilities obtained from the constant work of negotiation and interaction required to maintain the networks as functioning and durable social and political structures.

Methodologically, first, we registered an account with each platform to review the content available and understand any differences between publicly available information and the information available to members only. We concluded that the content available to members and non-members is similar in the channels this research focuses on. Based on the linguistic conventions adopted by users (e.g. ‘dog’ is a common usage referring to the police), we scraped LIHKG posts that included the following keywords in their titles: ‘dadfindboy’, ‘bad cop + doxing’, ‘cop’s wife’, ‘cop’s son/daughter’, ‘bad cop + punish’, ‘fifty cents army’Footnote7, ‘dog’s badge number’, ‘dog’s home’, ‘dog’s name’, among others. A total of 154,920 posts were scraped. We then used a data analytic program, KNIMEFootnote8, to filter out duplicated posts, posts that only contained emojis or the words ‘push’ and ‘pin’, and removed posts that were made outside the period of study (before June 2019 when the protest started). After these processes, 37051 posts remained. We exported all posts from the two channels (10,965 from Dadfindboy and 1,062 from Youcangotojail) into Excel spreadsheets for manual coding. We developed a coding matrix with examples. Our research assistants first coded 50 posts which were exchanged amongst the team to test inter-coder reliability. This data is sensitive, even more so since the passage of the 2020 National Security Law (NSL). To enhance the privacy and security of the data as well as the researchers, the scraped data was stored outside of Hong Kong. Access to the data was protected by password and only granted to coders.

Coding matrix

Key foci of this research are to map the citizenry’s datafication of the state (and each other), the role doxing played in mobilization and to understand the individual and collective elements of doxing within the context of contentious politics. To achieve these aims, it is important to distill: 1) the type of information participants collected and released; 2) the real or intended consequences of the information release; 3) the sentiments used to frame the release – particularly those that reference a collective identity; 4) how the posts align with the persuasive functions of movement. Thus, we developed a coding matrix (see ) drawn from Marx’s (Citation1999) seven types of identity knowledge and Douglas (Citation2016) and Trottier’s (Citation2017) types and intent of doxing.

Table 1. The coding matrix for the two Telegram channels.

The disclosure of police and protester information in the Dadfindboy and Youcangotojail Telegram channels fits the criteria to be both de-anonymizing and targeted types of doxing, by virtue of being posted in forums established with the specific purposes of revealing the perceived opponents’ identity to yield consequences (punishment). Thus, to interrogate differences in the types of doxing within this setting, we introduced an additional criterion to distinguish between posts that merely de-anonymized subjects and those that actively sought to target subjects. Posts that released information and contained some narrative calling for the harassment of or action against subjects were treated as targeting doxing.

For LIHKG data, to further explore the intent behind the doxing practices, we supplemented the three categories listed above with sentiment and content analysis in order to understand how doxing configured the persuasive functions of social movements. To increase the data accuracy and be more target-oriented in the sentiment analysis, we used a process of inductive coding whereby we reviewed 1,000 posts and identified regularly appearing terms and the dominant sentiments they convey. The dominant linguistic devices include: cheers, insults, curses, sarcasm and patronization.

Findings

Channel content and positioning

Perhaps unsurprisingly, users in both Dadfindboy and Youcangotojail channels posted content not expressly related to doxing. Dissemination of news, attitudes towards data collection and educative material appeared in similar proportions on both channels. Interesting differences in the discourse found on the two channels were also observed. As suggests, although Dadfindboy has the reputation of being a channel dedicated to doxing, doxing only makes up 42% of its content. In contrast, the content of Youcangotojail is more concentrated on doxing (78%). The rest of the post includes sharing the news (9%), data tactics education (6%), and other physical world (non-data related) strategies such as making gas bombs or when to retreat.

Table 2. Post content of the two Telegram channels.

We examined the linguistic devices utilized by participants across LIHKG and the two Telegram channels (see ). We found that although insults and sarcasm are prevalent overall, Youcangotojail appeared to have more sarcasm and condescension, whereas in Dadfindboy and on LIHKG insults were the dominant method of expression. As suggests, on LIHKG the comments containing insults and curses mostly targeted the police, whereas a higher proportion of sarcastic comments were directed towards China supporters and the spouses of police officers.

Table 3. Linguistic device on LIHKG directed at target.

Table 4. Linguistic device of the two Telegram channels and LIHKG.

On Telegram, users in Youcangotojail used a more varied range of linguistic techniques than those in Dadfindboy. Interrogating the temporal dimension of the data highlighted shifts in the use of linguistic devices over time (see ). Users in Youcangotojail cycled through four linguistic devices – sarcasm, insults, sarcasm again, and finally condescension. The shift between these techniques coincides with key phases in the protest cycle. In contrast, up until the passage of the NSL in June 2020, users in Dadfindboy consistently employed insults to express themselves, giving the appearance of a protracted protest event between November 2019-June 2020. The prevalence (and peak) of insults and threats from late September to late-October 2019 coincides with the most violent period of the movement. It is likely this linguistic departure from the pro-democracy movement’s motto of being ‘peaceful, rational and non-violent’ (wo-lei-fei) is linked to the escalating episodes of violence between protesters and police. In May 2020, there is a drop in the use of insults towards police and sarcasm becomes more widely used. This change in linguistic device is probably the result of the increased legal cost of insulting police officers under the revised political opportunity structure created by the Chinese state through the NSL. The apparently coordinated use of linguistic devices by both channels also confirms the emergence of a contentious repertoire as Tilly (Citation2006, Citation2008) defines it.

Figure 1. The line graph of sentiments on the two Telegram channels over time (BAOBAO here refers to Youcangotojail channel).

Figure 1. The line graph of sentiments on the two Telegram channels over time (BAOBAO here refers to Youcangotojail channel).

Protesters infiltrated Youcangotojail and posted images and videos of the attacks in Yuen Long carried out by masked men in white shirts against movement sympathizers. These posts asked users to widely share these footages to allow people around the world to know how riotous and violent these ‘protesters’ are. These users adopted satire to achieve the goal of balancing anti-protest discourse as well as mobilizing more people in support of protest.

Evolution of doxing as a contentious repertoire

Activity on Dadfindboy peaked between July and October of 2019, the time when street protests were at their peak, and also the time between the announcement of the Extradition Bill and its withdrawal in October 2019. The datafied practice of collecting and releasing police officers’ information as contentious practices matured quickly. In the beginning of Dadfindboy’s existence, participants simply posted photos of individual police officers and numbered them in chronological order of appearance. Others would respond with information and quote the reference number, thus giving the impression that the number of appearance was a ‘reference number’ in a cataloguing system for a ‘database’ of officer information. After July of 2019, photos that showed police officers with family members and their social media contact details also began appearing. Posts progressively became more detailed and by the end of July a template for posting information was established. The template encouraged participants to provide as much detailed information as possible about the police officer, their spouse and their children. The creation of a template emphasized collective ownership of and responsibility for the collation and use of the information in meaningful ways. The template was often used in isolation, that is to say that users did not add their own views or commentary to the post. This had the effect of framing the post as a pseudo neutral, factual information release or ‘database entry’. In October 2019, citing the malicious intent of the Telegram channels’ organizers, the Hong Kong High Court granted an interim injunction to ban the doxing of Hong Kong police officers on Telegram LIHKG (Chan, Citation2019). This decision symbolized the state’s denunciation of doxing.

In response to Dadfindboy, government supporters established Youcangotojail channel in November 2019. Activity on Youcangotojail channel was highest between November 2019 and January 2020, with a small spike in traffic again in May 2020 when protests against the introduction of the NSL occurred. ‘Anti-protester surveillance’, ‘anti-violence’, and ‘anti-riot’, were the major expressions that appeared within the channel’s discourse. The data collected in this channel typically included photographs of protesters engaging in ‘violent’ and ‘illegal activities’, and the location where the photo was taken, rather than providing information based on a template. Data collection and sharing practices in this channel did not evolve to the same degree as was seen in Dadfindboy. Participants posted photos of people attending rallies and captioned the photo with the date, time and place the photo was taken. These practices combined created the impression of an alliance between users and the police. Users framed themselves as releasing information about illegal activities that police could follow up and take action on. This ‘adopted’ proximity to state power may have influenced the connective logic among users on Youcangotojail channel. With an assumption that the state has ‘better’ surveillance capacity and technology, detailed templates for data input become unnecessary.

Supporting Tilly’s (Citation2006, Citation2008) conceptualization of contentious repertoire, the performances exchanged between the claimant-object pairing evolved dialectically and ultimately to shifts in the political opportunity structure. The contentious repertoire based in the digital world influenced and shifted the course of the contentious repertoire manifest in the physical world. The exposure of police officer’s personal information led them to stop wearing identification badges and start wearing masks to cover their faces (Mozur, Citation2019).

Targets, types and intent of doxing

Three claimant-object pairings were observed across LIHKG and the two Telegram channels. In Youcangotojail, government supporters positioned themselves as claimants against movement supporters. In Dadfindboy and on LIHKG, the police and their families were targeted by movement supporters. After the passage of the NSL a third claimant-object pairing emerged on LIHKG – movement participants and individuals suspected of being members of the fifty cents army, who are thought to be surveilling and reporting the protesters. Users were alive to the possibility that their networks had been infiltrated by government supporters and police, and discourse participants engaged in surveillance of the posted content. Any posts that seemed suspicious were flagged and identifying information about the poster was collected and publicized. A google document titled ‘the user accounts of fifty cents who posted fake news on LIHKG’ was created. The information shared includes the user IDs of participants believed to be members of the fifty cents army. To substantiate the assertions, the online behaviors of the individual were documented (such as commenting in support of greater unification between Hong Kong and China, remarks against independence, and spreading fake news), and links to the individual’s social media profiles were included. Going beyond these obvious differences in doxing targets, an interesting variation was observed between the two channels. During the period of study, 65% of data releases in Dadfindboy targeted individual officers. The remaining 35% of releases related to the officers’ family members. In Youcangotojail channel, a different pattern is seen—67% of data releases relate to groups of people and only 33% focus on a specific individual. The difference in intended use of the data (to assist police identify protesters) is a likely explanation for this (see ).

Table 5. Types of doxing on two TG channels.

Doxing that targeted its subjects was the dominant type of doxing seen on Youcangotojail and Dadfindboy (see ). In Dadfindboy, the identity knowledge types most released included officer’s legal name, locatability and pseudonyms such as badge numbers and car number plates. However, posts in Youcangotojail channel rarely released identity knowledge of the types Marx’s (Citation1999) set out. Instead, Youcangotojail channel’s users practice of posting photographs containing a few protesters’ faces suggests an assumption that in the age of advanced facial recognition software, an individual’s face can now be an identity knowledge type that can be used to find out an individual’s legal name and locatability.

Table 6. Intent of doxing in two TG channels.

The Telegram channels played the role of coordinating actions that go beyond discussion on social media. Participants came up with practices that used the private data of police as a weapon to instigate the harassment of these individuals. Examples included putting the addresses and phone numbers of police officers on to flyers advertising the sale or rent of apartments, school enrollment and restaurant deals. This practice thus drew in unsuspecting civilians as those interested in buying or renting an apartment were co-opted into the harassment of police officers. Other strategies focused on generating anxiety of the unknown, for example one post stated:

Extending punishment to their wives and children is not just about doxing per se, we want to create a scenario in which the police will be fearful of their children being bullied on campus, or having something ‘extra’ in their meals when eating in a restaurant …

By justifying the doxing of wives and children as parties linked to but distinct from the primary target of the doxing – police officers, this comment suggests an awareness that doxing in certain circumstances might be denounced, which means people might find it morally questionable and therefore an unacceptable tactic.

Justification for doxing

In Dadfindboy, the justifications given for doxing typically fall into one of two categories. That the police ‘deserve’ the treatment, or that the threat to Hong Kong’s democratic freedoms necessitates extreme measures like doxing. In the former line of reasoning, police are framed as agents of Chinese state power, excessively violent and/or as having questionable morals. Examples include: ‘#XXX, has a history of stealing and secretly filming ladies’ underwear, beware of this pervert everyone!’; ‘a dog has to be responsible for its misbehavior, it’s not innocent!’ and ‘so many people and their parents and friends are hit by the police, don’t they [the police] need to pay the price for the violence?’ In the latter, the power disparity between the people and the state is highlighted, so too is the importance of movement aims such as democracy. Comments in this category are in closer alignment with the commonly cited aims of the movement. Examples include: ‘We can’t fight against the police, they have powerful weapons, but we can create influence in their everyday lives … ’

In Youcangotojail government supporters justify doxing with reference to ‘maintaining social stability.’ Protesters are often framed as ‘rioters’ or ‘cockroaches’—a slur implying they are subhuman but resilient – which provides the rationale for harsh and cruel treatment against protesters. Photographs of protesters are often captioned with descriptions such as ‘sneaky cockroaches hanging around the streets, must be doing something bad’; ‘ … a group of rioters used hammers and sticks to attack the police and destroy shops. It’s nowhere close their claims of being peaceful, rational, and non-violent’; ‘there will and must be karma for the rioters who doxed the police; you followed the police car and then we follow you!’ Posts were also accompanied by remarks such as ‘remember you can go to jail’ or ‘you dare to protest in the street then I dare to take photos of you!’

Discussion

The 2019 Hong Kong protest has substantiated that data practices are of increasing importance in social movements’ strategies as well as a debated subject. Empirically, this article has documented the creative incorporations of data-based practice into Hong Kong’s contentious repertoire. Through data practice and perception of it, the action repertoire changed and new forms of mobilization/conflict also emerged (Flesher Fominaya & Gillan, Citation2017; van der Graaf et al., Citation2016). Unlike the #MeToo movement in China, India, and Turkey (Bitso et al., Citation2012), in the Hong Kong case we saw two ideologically opposed groups weaponizing data against each other in the same way (doxing), and the same data objects (legal name, locatability, and pattern knowledge) becoming the source of contention. However, the justification of these practices was very different. In the situation where opposing camps have weaponized data in the same way, and the same data objects are the subject of contention, the different moral justifications of doxing cause us to rethink the positionality of data as weapon vis-a-vis data as object. This extends Beraldo and Milan’s (Citation2019) observation of the coinciding aspects of data by showing that the relationship between these components does not just exist in a constant state of contradiction as the means and the object of contention. Instead, the weaponization (means) and data objects (ends) can be aligned and realigned with each other in a form of symbiosis where means and ends are used to mutually justify the doxers’ ultimate end – the de-legitimization of their opponent.

Datafication and power

The state’s datafication of individuals through the collection of legal names, locateability and pattern knowledge was a technique refracted through participants and shone back onto the state. When used by protesters, the process of datafication enabled the various levels of identity of police officers to be brought together. Datafication in this instance positioned officers as members of a whole community, with a name, address and family members rather than as individuals identified by numbers. This has important consequences for power dynamics. De-anonymizing the police officers (e.g. disclosing their badge numbers) and casting them as individuals, as citizens, strips them of their powers as police and the protection of their government role. Instead, it places them on par with protesters. This removal of the role, in other places, has given police officers and other government officials the opportunity to take action as individuals (as we saw in Black Lives Matter protests where policemen supported protesters). However, in this case, removing the distinction between the officers’ private and public lives has resulted in significant damage at the personal level.

By the same token, the datafication of the protesters by government supporters had the effect of changing their social status. Collecting footage of other citizens positioned government supporters as proxies of the state, sort of ‘watchmen’. Then, through the process of sharing the information publicly (and thus with the state) individual participants became agents of the state. Further, the practice of posting photos of protesters captioned with the misdeeds they are alleged to have committed removes their identity as citizens standing up for their rights and the legitimacy that is afforded by such identity. The photos become a contemporary ‘wanted poster’ framing protesters as criminals who will be sought by the authorities.

Data is weaponized for ‘veillance’

Collecting and revealing personal data has become an important individually executed, yet collective strategy that can be used to challenge or reinforce existing power asymmetries. At one level, these findings highlight the individualized nature of doxing as a contentious performance that originates and is implemented in an individual’s daily life through personal frames. Individuals post the personal information of others, in separate but connected (by virtue of being co-located in a Telegram channel) acts of doxing. The desired outcomes of these acts of doxing also lie at the individual level. Participants in Dadfindboy seek to increase the police’s fears and disrupt or damage the personal lives of police officers and their family members, whereas Youcangotojail aims to trigger legal charges against protesters as private citizens. When viewed as part of a coordinated and collaborative campaign, the individual instances of doxing can be seen as coordinated programs of sousveillance and surveillance in the respective cases of Dadfindboy and Youcangotojail channel. The concentration of doxing, and therefore data, in two locations had the effect of converting the data into a database that was searchable and could be manipulated if additional steps were taken. The data practices in both instances were consistent with surveillance techniques employed by the state. Thus, our findings drawn from LIHKG and the two Telegram channels suggest that the doxing in the Hong Kong example became forms of sousveillance and surveillance that blended more traditional image-based monitoring techniques with more contemporary techniques of datafication.

Conclusion

Situating doxing within the ontologies of data activism comes up against the norms of data release in other contexts, and challenges our understanding of what ethical data practices are and when information releases are justifiable. Our finding that doxing can be a form of sousveillance or surveillance has the effect of conflating several distinct processes each with their own moral codices. Doxing is typically associated with malicious intent and as an unethical practice in light of the damage that can be done to targets. Surveillance has both positive and negative connotations whilst sousveillance is generally understood to be an acceptable practice motivated by a sense of justice. The ethical grey zone in which doxing stands, as a form of data-activism, could pose limits to its use as a protest tactic and negatively influence the legitimacy of movement participants and their claims. The justifiability of doxing as a form of data-activism requires further research. Specific attention should be given to determining the proportion of individuals whose data was released that experienced damage, the nature of the damage experienced, and the perceptions the general public hold of doxing.

Acknowledgements

We would like to thank Shao-Fang (Christine) Kao for scraping the data from LIKHG and Mei Ling (Jay) Chan for data analysis. We appreciate the help of Ruiheng (Peter) Li and Lok Hei (Ken) Liu with manually coding the data from the two Telegram channels. The draft was presented at the paper development workshop organized by Stefania Milan and Davide Beraldo, and work-in-progress workshop by the Society for Hong Kong Studies (SHKS). We appreciate the valuable feedback from the participants, especially Vassilis Charitsis, Cristina Flesher Fominaya, Stefania Milan, Davide Beraldo, Francis Lee, Ching Kwan Lee, and Edmund W. Cheng. We extend our thanks to Samson Yuen, two anonymous reviewers, and the guest editors for their constructive comments and suggestions.

Disclosure statement

No potential conflict of interest was reported by the authors.

Additional information

Funding

The work was supported by the Strategic Priority Funding scheme, Arts, Design and Architecture (ADA), University of New South Wales [SPF02].

Notes on contributors

Yao-Tai Li

Yao-Tai Li is a Lecturer of Sociology and Social Policy in the School of Social Sciences at University of New South Wales, Australia. He holds a Ph.D. in Sociology from the University of California, San Diego. His research interests include contentious politics, identity, and social media. His work has been published in several scholarly journals including British Journal of Sociology, The China Quarterly, World Development, Urban Studies, New Media and Society, Big Data & Society, Work, Employment and Society, The Sociological Review, Ethnic and Racial Studies, Discourse & Society, Social Science Computer Review, Journal of Contemporary Asia, among others.

Katherine Whitworth

Katherine Whitworth received her Ph.D. in political economy from the University of Sydney, Australia. Her research interests include political legitimacy, social welfare, contentious politics, Hong Kong and Chinese politics. Her work has been published in scholarly journals such as The China Quarterly, Big Data & Society, Urban Studies, World Development, Journal of Contemporary Asia, Journal of Consumer Culture, Social Science Computer Review, and International Migration. She is currently conducting a project on the Lennon Walls with Yao-Tai Li.

Notes

2. The Office of the Privacy Commissioner for Personal Data (PCPD) defines ‘personal data’ as ‘information which relates to a living individual and can be used to identify that individual.’ See: https://www.pcpd.org.hk/english/data_privacy_law/ordinance_at_a_Glance/ordinance.html.

3. Millions took to the streets of Hong Kong in protest against a proposed amendment to the Extradition Law, that would permit the extradition of individuals within Hong Kong’s jurisdiction to China.

4. The online forum LIHKG is widely regarded as a central communication platform for Anti-ELAB movement supporters (Lee, Citation2020).

5. See: https://t.me/s/Dadfindboy. It is one of the leading channels created in response to police officers not wearing identification badges. It then evolved to even advocate for harassment and violence against police officers (Maragkou, Citation2019).

7. ‘Fifty cents army’ is responsible for uncovering the state’s extensive efforts to delude negative content, and fostering a more legitimate vision of the party (Repnikova & Fang, Citation2018).

9. Carrie Lam is the current Chief Executive of Hong Kong since 2017.

References

  • Benford, R., & Snow, D. (2000). Framing processes and social movements: An overview and assessment. Annual Review of Sociology, 26, 611–639. https://doi.org/10.1146/annurev.soc.26.1.611
  • Beraldo, D., & Milan, S. (2019). From data politics to the contentious politics of data. Big Data & Society, 6(2), 1–11. https://doi.org/10.1177/2053951719885967
  • Bitso, C., Fourie, I., & Bothma, T. (2012). Trends in Transition from Classical Censorship to Internet Censorship: Selected Country Overviews. The International Federation of Library Association (IFLA). https://www.ifla.org/publications/trends-in-transition-from-classical-censorship-to-intenet-censorship-selected-country-o
  • Carty, V., & Reynoso Barron, F. G. (2019). Social movements and new technology: The dynamics of cyber activism in the digital age. In B. Berberoglu (Ed.), The Palgrave Handbook of Social Movements, Revolution, and Social Transformation (pp. 373–397). Springer.
  • Chan, H. (2019). Hong Kong court grants temporary injunction against inciting violence via messaging app Telegram and LIHKG forum. Retrieved from Hong Kong Free Press: https://hongkongfp.com/2019/10/31/hong-kong-court-grants-temporary-injunction-inciting-violence-via-messaging-app-telegram-lihkg-forum/
  • della Porta, D., Peterson, A., & Reiter, H. (Eds.). (2006). The policing of transnational protest. Ashgate.
  • Dencik, L., Hintz, A., & Cable, J. (2016). Towards data justice? The ambiguity of anti-surveillance resistance in political activism. Big Data & Society, 3(2), 1–12. https://doi.org/10.1177/2053951716679678
  • Douglas, D. M. (2016). Doxing: A conceptual analysis. Ethics and Information Technology, 18(3), 199–210. https://doi.org/10.1007/s10676-016-9406-0
  • Earl, J., & Soule, S. (2006). Seeing blue: A police-centered explanation of protest policing. Mobilization: An International Quarterly, 11(2), 145–164. https://doi.org/10.17813/maiq.11.2.u1wj8w41n301627u
  • Fish, A., & Follis, L. (2016). Gagged and doxed: Hacktivism’s self-incrimination complex. International Journal of Communication, 10, 3281–3300.
  • Flesher Fominaya, C., & Gillan, K. (2017). Navigating the technology-media-movements complex. Social Movement Studies, 16(4), 383–402. https://doi.org/10.1080/14742837.2017.1338943
  • Foucault, M. (1977). Discipline and Punish: The birth of the prison. Penguin.
  • Haggerty, K. D., & Ericson, R. V. (2000). The surveillance assemblage. The British Journal of Sociology, 51(4), 605–622. https://doi.org/10.1080/00071310020015280
  • Hermida, A., & Hernández-Santaolalla, V. (2018). Twitter and video activism as tools for counter-surveillance: The case of social protests in Spain. Information, Communication & Society, 21(3), 416–433. https://doi.org/10.1080/1369118X.2017.1284880
  • Hoyng, R. (2021). From open data to “grounded openness”: Recursive politics and postcolonial struggle in Hong Kong. Television & New Media, 22(6), 703–720. https://doi.org/10.1177/1527476420931444
  • Jackson, W., Gilmore, J., & Monk, H. (2019). Policing unacceptable protest in England and Wales: A case study of the policing of anti-fracking protests. Critical Social Policy, 39(1), 23–43. https://doi.org/10.1177/0261018317753087
  • Kazansky, B., Torres, G., van der Velden, L., Wissenbach, K. R., & Milan, S. (2019). Data for the social good: Toward a data-activist research agenda. In A. Daly & M. Mann (Eds.), Good data (pp. 244–259). Institute of Network Cultures.
  • Lee, F. (2020). Solidarity in the Anti-Extradition Bill movement in Hong Kong. Critical Asian Studies, 52(1), 18–32. https://doi.org/10.1080/14672715.2020.1700629
  • Lehtiniemi, T., & Haapoja, J. (2020). Data agency at stake: MyData activism and alternative frames of equal participation. New Media & Society, 22(1), 87–104. https://doi.org/10.1177/1461444819861955
  • Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press.
  • MacAllister, J. M. (2017). The doxing dilemma: Seeking a remedy for the malicious publication of personal information. Fordham Law Review, 85(5), 2451–2483.
  • Mann, S. (2005). Sousveillance and Cyborglogs: A 30-Year empirical voyage through ethical, legal, and policy issues. Presence Teleoperators and Virtual Environments, 14(6), 625–646. https://doi.org/10.1162/105474605775196571
  • Mann, S. (2013). Veillance and reciprocal transparency: Surveillance versus sousveillance, ARGlass, lifeglogging, and wearable computing. Available at: http://wearcam.org/veillance/veillance.pdf
  • Mann, S., & Ferenbok, J. (2013). New Media and the power politics of sousveillance in a surveillance-dominated world. Surveillance & Society, 11(1/2), 18–34. https://doi.org/10.24908/ss.v11i1/2.4456
  • Maragkou, E. (2019). “Dadfindboy”: How activists in Hong Kong are hijacking state tools of surveillance. Retrieved from: http://mastersofmedia.hum.uva.nl/blog/2019/09/23/dadfindboy-how-activists-in-hong-kong-are-hijacking-state-tools-of-surveillance/
  • Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112. https://doi.org/10.1080/019722499128565
  • McNealy, J. (2018). What is doxxing, and why is it so scary? Retrieved from The Conversation: https://theconversation.com/what-is-doxxing-and-why-is-it-so-scary-95848
  • Meng, A., DiSalvo, C., Tsui, L., & Best, M. (2019). The social impact of open government data in Hong Kong: Umbrella Movement protests and adversarial politics. The Information Society, 35(4), 216–228. https://doi.org/10.1080/01972243.2019.1613464
  • Milan, S. (2015). From social movements to cloud protesting: The evolution of collective identity. Information, Communication & Society, 18(8), 887–900. https://doi.org/10.1080/1369118X.2015.1043135
  • Milan, S., & van der Velden, L. (2016). The alternative epistemologies of data activism. Digital Culture & Society, 2(2), 57–74. https://doi.org/10.14361/dcs-2016-0205
  • Mozur, P. (2019). In Hong Kong Protests, Faces Become Weapons. Retrieved from The New York Times: https://www.nytimes.com/2019/07/26/technology/hong-kong-protests-facial-recognition-surveillance.html
  • Pellegrino, G., Söderberg, J., & Milan, S. (2019). Datafication from below: Epistemology, ambivalences, challenges. Tecnoscienza: Italian Journal of Science and Technology Studies, 10(1), 89–113.
  • Repnikova, M., & Fang, K. (2018). Authoritarian participatory persuasion 2.0: Netizens as thought work collaborators in China. Journal of Contemporary China, 27(113), 763–779. https://doi.org/10.1080/10670564.2018.1458063
  • Schlembach, R. (2018). Undercover policing and the spectre of ‘domestic extremism’: The covert surveillance of environmental activism in Britain. Social Movement Studies, 17(5), 491–506. https://doi.org/10.1080/14742837.2018.1480934
  • Schrock, A. R. (2016). Civic hacking as data activism and advocacy: A history from publicity to open government data. New Media & Society, 18(4), 581–599. https://doi.org/10.1177/1461444816629469
  • Stewart, C. J., Smith, C. A., & Denton, R. E. (2007). Persuasion and social movements. Waveland Press.
  • Stoycheff, E., Liu, J., Xu, K., & Wibowo, K. (2019). Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects. New Media & Society, 21(3), 602–619. https://doi.org/10.1177/1461444818801317
  • Tarrow, S. (2011). Power in Movement: Social Movements and Contentious Politics. Cambridge University Press.
  • Tilly, C. (2006). Regimes and repertoires. University of Chicago Press.
  • Tilly, C. (2008). Contentious performances. Cambridge University Press.
  • Trottier, D. (2017). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 30(1), 55–72. https://doi.org/10.1007/s13347-016-0216-4
  • Tufekci, Z. (2017). Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press.
  • Ullrich, P., & Knopp, P. (2018). Protesters’ reactions to video surveillance of demonstrations: Counter-moves, security cultures, and the spiral of surveillance and counter-surveillance. Surveillance & Society, 16(2), 183–202. https://doi.org/10.24908/ss.v16i2.6823
  • Ullrich, P., & Wollinger, G. R. (2011). A surveillance studies perspective on protest policing: The case of video surveillance of demonstrations in Germany. Interface: A Journal for and About Social Movements, 3(1), 12–38.
  • van der Graaf, A., Otjes, S., & Rasmussen, A. (2016). Weapon of the weak? The social media landscape of interest groups. European Journal of Communication, 31(2), 120–135. https://doi.org/10.1177/0267323115612210
  • Wang, P., Joosse, P., & Cho, L. L. (2020). The evolution of protest policing in a hybrid regime. The British Journal of Criminology, 60(6), 1523–1546. https://doi.org/10.1093/bjc/azaa040
  • Wood, M. A., & Thompson, C. (2018). Crowdsourced countersurveillance: A countersurveillant assemblage? Surveillance & Society, 16(1), 20–38. https://doi.org/10.24908/ss.v16i1.6402