Site hosted by Angelfire.com: Build your free website today!
 

The Erotic Ontology of Cyberspace

                                      Michael Heim
 

This is a chapter from Michael Heim's book The Metaphysics of
Virtual Reality (New York: Oxford University Press, 1993: 82-108.
It is used here with the permission of the author and Oxford
University Press.
 

Cyberspace is more than a breakthrough in electronic media or in
computer interface design. With its virtual environments and
simulated worlds, cyberspace is a metaphysical laboratory, a tool
for examining our very sense of reality.

When designing virtual worlds, we face a series of reality
questions. How, for instance, should users appear to themselves
in a virtual world? Should they appear to themselves in
cyberspace as one set of objects among others, as third-person
bodies that users can inspect with detachment? Or should users
feel themselves to be headless fields of awareness, similar to our
phenomenological experience? Should causality underpin the
cyberworld so that an injury inflicted on the user's cyberbody
likewise somehow damages the user's physical body? And who
should make the ongoing design decisions? If the people who
make simulations inevitably incorporate their own perceptions
and beliefs, loading cyberspace with their prejudices as well as
their insights, who should build the cyberworld? Should multiple
users at any point be free to shape the qualities and dimensions
of cyber entities? Should artistic users roam freely, programming
and directing their own unique cyber cinemas that provide
escape from the mundane world? Or does fantasy cease where
the economics of the virtual workplace begins? But why be
satisfied with a single virtual world? Why not several? Must we
pledge allegiance to a single reality? Perhaps worlds should be
layered like onion skins, realities within realities, or be loosely
linked like neighborhoods, permitting free aesthetic pleasure to
coexist with the task-oriented business world. Does the meaning
of "reality"--and the keen existential edge of experience--weaken as
it stretches over many virtual worlds?

Important as these questions are, they do not address the
ontology of cyberspace itself, the question of what it means to be
in a virtual world, whether one's own or another's world. They do
not probe the reality status of our metaphysical tools or tell us
why we invent virtual worlds. They are silent about the essence or
soul of cyberspace. How does the metaphysical laboratory fit into
human inquiry as a whole? What status do electronic worlds have
within the entire range of human experience? What perils haunt
the metaphysical origins of cyberspace?

In what follows, I explore the philosophical significance of
cyberspace. I want to show the ontological origin from which
cyber entities arise and then indicate the trajectory they seem to
be on. The ontological question, as I see it, requires a
two-pronged answer. We need to give an account of (1) the way
entities exist within cyberspace and (2) the ontological status of
cyberspace--the construct, the phenomenon--itself. The way in
which we understand the ontological structure of cyberspace will
determine how realities can exist within it. But the structure of
cyberspace becomes clear only once we appreciate the distinctive
way in which things appear within it. So we must begin with the
entities we experience within the computerized environment.

My approach to cyberspace passes first through the ancient
idealism of Plato and moves onward through the modern
metaphysics of Leibniz. By connecting with intellectual
precedents and prototypes, we can enrich our self-understanding
and make cyberspace function as a more useful metaphysical
laboratory.

Our Marriage to Technology

The phenomenal reality of cyber entities exists within a more
general fascination with technology, and the fascination with
technology is akin to aesthetic fascination. We love the simple,
clear-cut linear surfaces that computers generate. We love the
way that computers reduce complexity and ambiguity, capturing
things in a digital network, clothing them in beaming colors, and
girding them with precise geometrical structures. We are
enamored of the possibility of controlling all human knowledge.
The appeal of seeing society's data structures in cyberspace--if we
begin with William Gibson's vision--is like the appeal of seeing the
Los Angeles metropolis in the dark at five thousand feet: a great
warmth of powerful, incandescent blue and green embers with
red stripes that beckons the traveler to come down from the cool
darkness. We are the moths attracted to flames, and frightened
by them too, for there may be no home behind the lights, no
secure abode behind the vast glowing structures. There are only
the fiery objects of dream and longing.

Our love affair with computers, computer graphics, and computer
networks runs deeper than aesthetic fascination and deeper than
the play of the senses. We are searching for a home for the mind
and heart. Our fascination with computers is more erotic than
sensuous, more spiritual than utilitarian. Eros, as the ancient
Greeks understood, springs from a feeling of insufficiency or
inadequacy. Whereas the aesthete feels drawn to casual play and
dalliance, the erotic lover reaches out to a fulfillment far beyond
aesthetic detachment.

The computer's allure is more than utilitarian or aesthetic; it is
erotic. Instead of a refreshing play with surfaces, as with toys or
amusements, our affair with information machines announces a
symbiotic relationship and ultimately a mental marriage to
technology. Rightly perceived, the atmosphere of cyberspace
carries the scent that once surrounded Wisdom. The world
rendered as pure information not only fascinates our eyes and
minds, but also captures our hearts. We feel augmented and
empowered. Our hearts beat in the machines. This is Eros.

Cyberspace entities belong to a broad cultural phenomenon of
the last third of the twentieth century: the phenomenon of
computerization. Something becomes a phenomenon when it
arrests and holds the attention of a civilization. Only then does
our shared language articulate the presence of the thing so that
it can appear in its steady identity as the moving stream of
history.

Because we are immersed in everyday phenomena, however, we
usually miss their overall momentum and cannot see where they
are going or even what they truly are. A writer like William Gibson
helps us grasp what is phenomenal in current culture because he
captures the forward movement of our attention and shows us
the future as it projects its claim back into our present. Of all
writers, Gibson most clearly reveals the intrinsic allure of
computerized entities, and his books--Neuromancer, Count Zero,
and Mona Lisa Overdrive--point to the near-future, phenomenal
reality of cyberspace. Indeed, Gibson coined the word cyberspace.

The Romance of Neuromancer

For Gibson, cyber entities appear under the sign of Eros. The
fictional characters of Neuromancer experience the computer
matrix--cyberspace--as a place of rapture and erotic intensity, of
powerful desire and even self-submission. In the matrix, things
attain a supervivid hyper-reality. Ordinary experience seems dull
and unreal by comparison. Case, the data wizard of
Neuromancer, awakens to an obsessive Eros that drives him back
again and again to the information network:

     A year [in Japan] and he still dreamed of cyberspace, hope
     fading nightly.... [S]till he'd see the matrix in his sleep,
     bright lattices of logic unfolding across that colorless
     void.... [H]e was no [longer] console man, no cyberspace
     cowboy.... But the dreams came on in the Japanese night
     like livewire voodoo, and he'd cry for it, cry in his sleep,
     and wake alone in the dark, curled in his capsule in some
     coffin hotel, his hands clawed into the bedslab, . . . trying
     to reach the console that wasn't there.[1]

The sixteenth-century Spanish mystics John of the Cross and
Teresa of Avila used a similar point of reference. Seeking words
to connote the taste of spiritual divinity, they reached for the
language of sexual ecstasy. They wrote of the breathless union of
meditation in terms of the ecstatic blackout of consciousness, the
llama de amor viva piercing the interior center of the soul like a
white-hot arrow, the cauterio suave searing through the dreams of
the dark night of the soul. Similarly, the intensity of Gibson's
cyberspace inevitably conjures up the reference to orgasm, and
vice versa:

     Now she straddled him again, took his hand, and closed it
     over her, his thumb along the cleft of her buttocks, his
     fingers spread across the labia. As she began to lower
     herself, the images came pulsing back, the faces,
     fragments of neon arriving and receding. She slid down
     around him and his back arched convulsively. She rode
     him that way, impaling herself, slipping down on him again
     and again, until they both had come, his orgasm flaring
     blue in a timeless space, a vastness like the matrix, where
     the faces were shredded and blown away down hurricane
     corridors, and her inner thighs were strong and wet
     against his hips.[2]

But the orgasmic connection does not mean that Eros's going
toward cyberspace entities terminates in a merely physiological
or psychological reflex. Eros goes beyond private, subjective
fantasies. Cyber Eros stems ultimately from the ontological drive
highlighted long ago by Plato. Platonic metaphysics helps clarify
the link between Eros and computerized entities.

In her speech in Plato's Symposium, Diotima, the priestess of love,
teaches a doctrine of the escalating spirituality of the erotic drive.
She tracks the intensity of Eros continuously from bodily
attraction all the way to the mental attention of mathematics and
beyond. The outer reaches of the biological sex drive, she
explains to Socrates, extend to the mental realm where we
continually seek to expand our knowledge.

On the primal level, Eros is a drive to extend our finite being, to
prolong something of our physical selves beyond our mortal
existence. But Eros does not stop with the drive for physical
extension. We seek to extend ourselves and to heighten the
intensity of our lives in general through Eros. The psyche longs to
perpetuate itself and to conceive offspring, and this it can do, in a
transposed sense, by conceiving ideas and nurturing awareness
in the minds of others as well as our own. The psyche develops
consciousness by formalizing perceptions and stabilizing
experiences through clearly defined entities. But Eros motivates
humans to see more and to know more deeply. So, according to
Plato, the fully explicit formalized identities of which we are
conscious help us maintain life in a "solid state," thereby keeping
perishability and impermanence at bay.

Only a short philosophical step separates this Platonic notion of
knowledge from the matrix of cyberspace entities. (The word
matrix, of course, stems from the Latin for "mother," the
generative-erotic origin). A short step in fundamental
assumptions, however, can take centuries, especially if the step
needs hardware support. The hardware for implementing
Platonically formalized knowledge took centuries. Underneath,
though, runs an ontological continuity, connecting the Platonic
knowledge of ideal forms to the information systems of the
matrix. Both approaches to cognition first extend and then
renounce the physical embodiment of knowledge. In both, Eros
inspires humans to outrun the drag of the "meat"--the flesh--by
attaching human attention to what formally attracts the mind. As
Platonists and Gnostics down through the ages have insisted,
Eros guides us to Logos.

The erotic drive, however, as Plato saw it, needs education to
attain its fulfillment. Left on its own, Eros naturally goes astray
on any number of tangents, most of which come from sensory
stimuli. In the Republic, Plato tells the well-known story of the
Cave in which people caught in the prison of everyday life learn to
love the fleeting, shadowy illusions projected on the walls of the
dungeon of the flesh. With their attention forcibly fixed on the
shadowy moving images cast by a flickering physical fire, the
prisoners passively take sensory objects to be the highest and
most interesting realities. Only later, when the prisoners manage
to get free of their corporeal shackles, do they ascend to the
realm of active thought, where they enjoy the shockingly clear
vision of real things, things present not to the physical eyes but to
the mind's eye. Only by actively processing things through mental
logic, according to Plato, do we move into the upper air of
reliable truth, which is also a lofty realm of intellectual beauty
stripped of the imprecise impressions of the senses. Thus the
liberation from the Cave requires a reeducation of human desires
and interests. It entails a realization that what attracts us in the
sensory world is no more than an outer projection of ideas we
can find within us. Education must redirect desire toward the
formally defined, logical aspects of things. Properly trained, love
guides the mind to the well-formed, mental aspects of things.

Cyberspace is Platonism as a working product. The cybernaut
seated before us, strapped into sensory-input devices, appears to
be, and is indeed, lost to this world. Suspended in computer
space, the cybernaut leaves the prison of the body and emerges
in a world of digital sensation.

This Platonism is thoroughly modern, however. Instead of
emerging in a sensationless world of pure concepts, the
cybernaut moves among entities that are well formed in a special
sense. The spatial objects of cyberspace proceed from the
constructs of Platonic imagination not in the same sense that
perfect solids or ideal numbers are Platonic constructs, but in the
sense that inFORMation in cyberspace inherits the beauty of
Platonic FORMS. The computer recycles ancient Platonism by
injecting the ideal content of cognition with empirical specifics.
Computerized representation of knowledge, then, is not the direct
mental insight fostered by Platonism. The computer clothes the
details of empirical experience so that they seem to share the
ideality of the stable knowledge of the Forms. The mathematical
machine uses a digital mold to reconstitute the mass of empirical
material so that human consciousness can enjoy an integrity in
the empirical data that would never have been possible before
computers. The notion of ideal Forms in early Platonism has the
allure of a perfect dream. But the ancient dream remained airy, a
landscape of genera and generalities, until the hardware of
information retrieval came to support the mind's quest for
knowledge. Now, with the support of the electronic matrix, the
dream can incorporate the smallest details of here-and-now
existence. With an electronic infrastructure, the dream of perfect
FORMS becomes the dream of inFORMation.

Filtered through the computer matrix, all reality becomes
patterns of information. When reality becomes indistinguishable
from information, then even Eros fits the schemes of binary
communication. Bodily sex appears to be no more than an
exchange of signal blips on the genetic corporeal network.
Further, the erotic-generative source of formal idealism becomes
subject to the laws of information management. Just as the later
Taoists of ancient China created a yin-yang cosmology that
encompassed sex, cooking, weather, painting, architecture,
martial arts, and the like, so too the computer culture interprets
all knowable reality as transmissible information. The conclusion
of Neuromancer shows us the transformation of sex and
personality into the language of information:

     There was a strength that ran in her, . . . [s]omething he'd
     found and lost so many times. It belonged, he knew--he
     remembered--as she pulled him down, to the meat, the
     flesh the cowboys mocked. It was a vast thing, beyond
     knowing, a sea of information coded in spiral and
     pheromone, infinite intricacy that only the body, in its
     strong blind way, could ever read.

     . . . [H]e broke [the zipper], some tiny metal part shooting
     off against the wall as salt-rotten cloth gave, and then he
     was in her, effecting the transmission of the old message.
     Here, even here, in a place he knew for what it was, a
     coded model of some stranger's memory, the drive held.

     She shuddered against him as the stick caught fire, a
     leaping flare that threw their locked shadows across the
     bunker wall.[3]

The dumb meat once kept sex private, an inner sanctum, an
opaque, silent, unknowable mystery. The sexual body held its
genetic information with the strength of a blind, unwavering
impulse. What is translucent you can manipulate, you can see.
What stays opaque you cannot scrutinize and manipulate. It is an
alien presence. The meat we either dismiss or come up against;
we cannot ignore it. It remains something to encounter. Yet here,
in Neuromancer, the protagonist, Case, makes love to a sexual
body named Linda. Who is this Linda?

Gibson raises the deepest ontological question of cyberspace by
suggesting that the Neuromancer master-computer simulates the
body and personality of Case's beloved. A simulated, embodied
personality provokes the sexual encounter. Why? Perhaps because
the cyberspace system, which depends on the physical space of
bodies for its initial impetus, now seeks to undermine the
separate existence of human bodies that make it dependent and
secondary. The ultimate revenge of the information system comes
when the system absorbs the very identity of the human
personality, absorbing the opacity of the body, grinding the meat
into information, and deriding erotic life by reducing it to a
transparent play of puppets. In an ontological turnabout, the
computer counterfeits the silent and private body from which
mental life originated. The machinate mind disdainfully mocks
the meat. Information digests even the secret recesses of the
caress. In its computerized version, Platonic Eros becomes a
master of artificial intelligence, CYBEROS, the controller, the
Neuromancer.

The Inner Structure of Cyberspace

Aware of the phenomenal reality of cyber entities, we can now
appreciate the backdrop that is cyberspace itself. We can sense a
distant source radiating an all-embracing power. For the creation
of computerized entities taps into the most powerful of our
psychobiological urges. Yet so far, this account of the distant
source as Eros tells only half the story. For although Platonism
provides the psychic makeup for cyberspace entities, only modern
philosophy shows us the structure of cyberspace itself.

In its early phases--from roughly 400 B.C. to A.D. 1600--
Platonism exclusively addressed the speculative intellect,
advancing a verbal-mental intellectuality over physical actuality.
Later, Renaissance and modern Platonists gradually injected new
features into the model of intelligence. The modern Platonists
opened up the gates of verbal-spiritual understanding to concrete
experiments set in empirical space and time. The new model of
intelligence included the evidence of repeatable experience and
the gritty details of experiment. For the first time, Platonism
would have to absorb real space and real time into the objects of
its contemplation.

The early Platonic model of intelligence considered space to be a
mere receptacle for the purely intelligible entities subsisting as
ideal forms. Time and space were refractive errors that rippled
and distorted the mental scene of perfect unchanging realities.
The bouncing rubber ball was in reality a round object, which
was in reality a sphere, which was in reality a set of concentric
circles, which could be analyzed with the precision of Euclidian
geometry. Such a view of intelligence passed to modern
Platonists, and they had to revise the classical assumptions.
Thinkers and mathematicians would no longer stare at the sky of
unchanging ideals. By applying mathematics to empirical
experiment, science would absorb physical movement in
space/time through the calculus. Mathematics transformed the
intelligent observer from a contemplator to a calculator. But as
long as the calculator depended on feeble human memory and
scattered printed materials, a gap would still stretch between the
longing and the satisfaction of knowledge. To close the gap, a
computational engine was needed.

Before engineering an appropriate machine, the cyberspace
project needed a new logic and a new metaphysics. The new
logic and metaphysics of modernity came largely from the work
of Gottfried Leibniz. In many ways, the later philosophies of Kant,
Schopenhauer, Nietzsche, and Heidegger took their bearings
from Leibniz.

As Leibniz worked out the modern Idealist epistemology, he was
also experimenting with protocomputers. Pascal's calculator had
been no more than an adding machine; Leibniz went further and
produced a mechanical calculator that could also, by using
stepped wheels, multiply and divide. The basic Leibnizian design
became the blueprint for all commercial calculators until the
electronics revolution of the 1970s. Leibniz, therefore, is one of
the essential philosophical guides to the inner structure of
cyberspace. His logic, metaphysics, and notion of
representational symbols show us the hidden underpinnings of
cyberspace. At the same time, his monadological metaphysics
alerts us to the paradoxes that are likely to engulf cyberspace's
future inhabitants.

Leibniz's Electric Language

Leibniz was the first to conceive of an "electric language," a set of
symbols engineered for manipulation at the speed of thought. His
De arte combinatoria (1666) outlines a language that became the
historical foundation of contemporary symbolic logic. Leibniz's
general outlook on language also became the ideological basis
for computer-mediated telecommunications. A modern Platonist,
Leibniz dreamed of the matrix.

The language that Leibniz outlined is an ideographic system of
signs that can be manipulated to produce logical deductions
without recourse to natural language. The signs represent
primitive ideas gleaned from prior analysis. Once broken down
into primitives and represented by stipulated signs, the
component ideas can be paired and recombined to fashion novel
configurations. In this way, Leibniz sought to mechanize the
production of new ideas. As he described it, the encyclopedic
collection and definition of primitive ideas would require the
coordinated efforts of learned scholars from all parts of the
civilized world. The royal academies that Leibniz promoted were
the group nodes for an international republic of letters, a
universal network for problem solving.

Leibniz believed all problems to be, in principle, soluble. The first
step was to create a universal medium in which conflicting ideas
could coexist and interrelate. A universal language would make it
possible to translate all human notions and disagreements into
the same set of symbols. His universal character set,
characteristica universalis, rests on a binary logic, one quite unlike
natural discourse in that it is neither restricted by material
content nor embodied in vocalized sound. Contentless and silent,
the binary language can transform every significant statement
into the terms of a logical calculus, a system for proving
argumentative patterns valid or invalid, or at least for connecting
them in a homogeneous matrix. Through the common binary
language, discordant ways of thinking can exist under a single
roof. Disagreements in attitude or belief, once translated into
matching symbols, can later yield to operations for ensuring
logical consistency. To the partisans of dispute, Leibniz would
say, "Let us upload this into our common system, then let us sit
down and calculate." A single system would encompass all the
combinations and permutations of human thought. Leibniz longed
for his symbols to foster unified scientific research throughout the
civilized world. The universal calculus would compile all human
culture, bringing every natural language into a single shared
database.

Leibniz's binary logic, disembodied and devoid of material
content, depends on an artificial language remote from the
words, letters, and utterances of everyday discourse. This logic
treats reasoning as nothing more than a combining of signs, as a
calculus. Like mathematics, the Leibnizian symbols erase the
distance between the signifiers and the signified, between the
thought seeking to express and the expression. No gap remains
between symbol and meaning. Given the right motor, the
Leibnizian symbolic logic--as developed later by George Boole,
Bertrand Russell, and Alfred North Whitehead and then applied
to electronic switching circuitry by Shannon--can function at the
speed of thought. At such high speed, the felt semantic space
closes between thought, language, and the thing expressed.
Centuries later, John von Neumann applied a version of Leibniz's
binary logic when building the first computers at Princeton.

In his search for a universal language of the matrix, Leibniz to
some extent continued a premodern, medieval tradition. For
behind his ideal language stands a premodern model of human
intelligence. The medieval Scholastics held that human thinking,
in its pure or ideal form, is more or less identical with logical
reasoning. Reasoning functions along the lines of a superhuman
model who remains unaffected by the vagaries of feelings and
spatiotemporal experience. Human knowledge imitates a Being
who knows things perfectly and knows them in their deductive
connections. The omniscient Being transcends finite beings. Finite
beings go slowly, one step at a time, seeing only moment by
moment what is happening. On the path of life, a finite being
cannot see clearly the things that remain behind on the path or
the things that are going to happen after the next step. A divine
mind, on the contrary, oversees the whole path. God sees all the
trails below, inspecting at a single glance every step traveled,
what has happened, and even what will happen on all possible
paths below. God views things from the perspective of the
mountaintop of eternity.

Human knowledge, thought Leibniz, should emulate this visio dei,
this omniscient intuitive cognition of the deity. Human knowledge
strives to know the way that a divine or an infinite Being knows
things. No temporal unfolding, no linear steps, no delays limit
God's knowledge of things. The temporal simultaneity, the
all-at-once-ness of God's knowledge serves as a model for human
knowledge in the modern world as projected by the work of
Leibniz. What better way, then, to emulate God's knowledge than
to generate a virtual world constituted by bits of information? To
such a cyberworld human beings could enjoy a God-like instant
access. But if knowledge is power, who would handle the
controls that govern every single particle of existence?

The power of Leibniz's modern logic made traditional logic seem
puny and inefficient by comparison. For centuries, Aristotle's logic
had been taught in the schools. Logic traditionally evaluated the
steps of finite human thought, valid or invalid, as they occur in
arguments in natural language. Traditional logic stayed close to
spoken natural language. When modern logic absorbed the steps
of Aristotle's logic into its system of symbols, modern logic
became a network of symbols that could apply equally to
electronic switching circuits as to arguments in natural language.
Just as non-Euclidian geometry can set up axioms that defy the
domain of real circles (physical figures), so too modern logic
freed itself of any naturally given syntax. The universal logical
calculus could govern computer circuits.

Leibniz's "electric language" operates by emulating the divine
intelligence. God's knowledge has the simultaneity of
all-at-onceness, and so in order to achieve a divine access to
things, the global matrix functions like a net to trap all language
in an eternal present. Because access need not be linear,
cyberspace does not, in principle, require a jump from one
location to another. Science fiction writers have often imagined
what it would be like to experience traveling at the speed of light,
and one writer, Isaac Asimov, described such travel as a "jump
through hyperspace." When his fictional space ship hits the speed
of light, Asimov says that the ship makes a special kind of leap. At
that speed, it is impossible to trace the discrete points of the
distance traversed. In the novel The Naked Sun, Asimov depicts
movement in hyperspace:

     There was a queer momentary sensation of being turned
     inside out. It lasted an instant and Baley knew it was a
     Jump, that oddly incomprehensible, almost mystical,
     momentary transition through hyperspace that transferred
     a ship and all it contained from one point in space to
     another, light years away. Another lapse of time and
     another Jump, still another lapse, still another Jump.[4]

Like the fictional hyperspace, cyberspace unsettles the felt logical
tracking of the human mind. Cyberspace is the perfect computer
environment for accessing hypertext if we include all human
perceptions as the "letters" of the "text." In both hyperspace and
hypertext, linear perception loses track of the series of discernible
movements. With hypertext, we connect things at the speed of a
flash of intuition. The interaction with hypertext resembles
movement beyond the speed of light. Hypertext reading and
writing supports the intuitive leap over the traditional step-by-step
logical chain. The jump, not the step, is the characteristic
movement in hypertext. As the environment for sensory hypertext,
cyberspace feels like transportation through a frictionless,
timeless medium. There is no jump because everything exists,
implicitly if not actually, all at once. To understand this lightning
speed and its perils for finite beings, we must look again at the
metaphysics of Leibniz.

Monads Do Have Terminals

Leibniz called his metaphysics a monadology, a theory of reality
describing a system of "monads." From our perspective, the
monadology conceptually describes the nature of beings who are
capable of supporting a computer matrix. The monadology can
suggest how cyberspace fits into the larger world of networked,
computerized beings.

The term monadology comes from the Greek monas, as in
"monastic," "monk," and "monopoly." It refers to a certain kind of
aloneness, a solitude in which each being pursues its appetites in
isolation from all other beings, which also are solitary. The
monad exists as an independent point of vital willpower, a
surging drive to achieve its own goals according to its own
internal dictates. Because they are a sheer, vital thrust, the
monads do not have inert spatial dimensions but produce space
as a by-product of their activity. Monads are nonphysical,
psychical substances whose forceful life is an immanent activity.
For monads, there is no outer world to access, no larger,
broader vision. What the monads see are the projections of their
own appetites and their own ideas. In Leibniz's succinct phrase:
"Monads have no windows."

Monads may have no windows, but they do have terminals. The
mental life of the monad--and the monad has no other life--is a
procession of internal representations. Leibniz's German calls
these representations Vorstellungen, from vor (in front of) and
stellen (to place). Realities are representations continually placed
in front of the viewing apparatus of the monad, but placed in such
a way that the system interprets or represents what is being
pictured. The monad sees the pictures of things and knows only
what can be pictured. The monad knows through the interface.
The interface represents things, simulates them, and preserves
them in a format that the monad can manipulate in any number
of ways. The monad keeps the presence of things on tap, as it
were, making them instantly available and disposable, so that the
presence of things is represented or "canned." From the vantage
point of physical phenomenal beings, the monad undergoes a
surrogate experience. Yet the monad does more than think about
or imagine things at the interface. The monad senses things, sees
them and hears them as perceptions. But the perceptions of
phenomenal entities do not occur in real physical space because
no substances other than monads really exist. Whereas the
interface with things vastly expands the monad's perceptual and
cognitive powers, the things at the interface are simulations and
representations.

Yet Leibniz's monadology speaks of monads in the plural. For a
network to exist, more than one being must exist; otherwise,
nothing is there to be networked. But how can monads
coordinate or agree on anything at all, given their isolated
nature? Do they even care if other monads exist? Leibniz tells us
that each monad represents within itself the entire universe. Like
Indra's Net, each monad mirrors the whole world. Each monad
represents the universe in concentrated form, making within itself
a mundus concentratus. Each microcosm contains the
macrocosm. As such, the monad reflects the universe in a living
mirror, making it a miroir actif indivisible, whose appetites drive it
to represent everything to itself--everything, that is, mediated by
its mental activity. Since each unit represents everything, each
unit contains all the other units, containing them as represented.
No direct physical contact passes between the willful mental
units. Monads never meet face-to-face.

Although the monads represent the same universe, each one sees
it differently. The differences in perception come from differences
in perspective. These different perspectives arise not from
different physical positions in space--the monads are not physical,
and physical space is a by-product of mental perception--but from
the varying degrees of clarity and intensity in each monad's
mental landscape. The appetitive impulses in each monad
highlight different things in the sequence of representational
experience. Their different impulses constantly shift the scenes
they see. Monads run different software.

Still, there exists, according to the monadology, one actual
universe. Despite their ultimately solitary character, the monads
belong to a single world. The harmony of all the entities in the
world comes from the one underlying operating system. Although
no unit directly contacts other units, each unit exists in
synchronous time in the same reality. All their representations are
coordinated through the supervisory role of the Central Infinite
Monad, traditionally known as God. The Central Infinite Monad,
we could say, is the Central System Operator (sysop), who
harmonizes all the finite monadic units. The Central System
Monad is the only being that exists with absolute necessity.
Without a sysop, no one could get on line to reality. Thanks to the
Central System Monad, each individual monad lives out its
separate life according to the dictates of its own willful nature
while still harmonizing with all the other monads on line.

Paradoxes in the Cultural Terrain of Cyberspace

Leibniz's monadological metaphysics brings out certain aspects
of the erotic ontology of cyberspace. Although the monadology
does not actually describe computerized space, of course, it does
suggest some of the inner tendencies of computerized space.
These tendencies are inherent in the structure of cyberspace and
therefore affect the broader realities in which the matrix exists.
Some paradoxes crop up. The monadological metaphysics shows
us a cultural topography riddled with deep inconsistencies.

Cyberspace supplants physical space. We see this happening
already in the familiar cyberspace of on-line communication--
telephone, e-mail, newsgroups, and so forth. When on line, we
break free, like the monads, from bodily existence.
Telecommunication offers an unrestricted freedom of expression
and personal contact, with far less hierarchy and formality than
are found in the primary social world. Isolation persists as a
major problem of contemporary urban society, and I mean
spiritual isolation, the kind that plagues individuals even on
crowded city streets. With the telephone and television, the
computer network can function as a countermeasure. The
computer network appears as a godsend in providing forums for
people to gather in surprisingly personal proximity--especially
considering today's limited band widths--without the physical
limitations of geography, time zones, or conspicuous social
status. For many, networks and bulletin boards act as computer
antidotes to the atomism of society. They assemble the monads.
They function as social nodes for fostering those fluid and
multiple elective affinities that everyday urban life seldom, in fact,
supports.

Unfortunately, what technology gives with one hand, it often
takes away with the other. Technology increasingly eliminates
direct human interdependence. While our devices give us greater
personal autonomy, at the same time they disrupt the familiar
networks of direct association. Because our machines automate
much of our labor, we have less to do with one another.
Association becomes a conscious act of will. Voluntary
associations operate with less spontaneity than do those having
sprouted serendipitously. Because machines provide us with the
power to flit about the universe, our communities grow more
fragile, airy, and ephemeral even as our connections multiply.

Being a body constitutes the principle behind our separateness
from one another and behind our personal presence. Our bodily
existence stands at the forefront of our personal identity and
individuality. Both law and morality recognize the physical body
as something of a fence, an absolute boundary, establishing and
protecting our privacy. Now the computer network simply
brackets the physical presence of the participants, by either
omitting or simulating corporeal immediacy. In one sense, this
frees us from the restrictions imposed by our physical identity. We
are more equal on the net because we can either ignore or create
the body that appears in cyberspace. But in another sense, the
quality of the human encounter narrows. The secondary or
stand-in body reveals only as much of ourselves as we mentally
wish to reveal. Bodily contact becomes optional; you need never
stand face-to-face with other members of the virtual community.
You can live your own separate existence without ever physically
meeting another person. Computers may at first liberate societies
through increased communication and may even foment
revolutions (I am thinking of the computer printouts in Tiananmen
Square during the 1989 prodemocracy uprisings in China). They
have, however, another side, a dark side.

The darker side hides a sinister melding of human and machine.
The cyborg, or cybernetic organism, implies that the conscious
mind steers--the meaning of the Greek kybernetes--our organic life.
Organic life energy ceases to initiate our mental gestures. Can we
ever be fully present when we live through a surrogate body
standing in for us? The stand-in self lacks the vulnerability and
fragility of our primary identity. The stand-in self can never fully
represent us. The more we mistake the cyberbodies for ourselves,
the more the machine twists ourselves into the prostheses we are
wearing.

Gibson's fiction inspired the creation of role-playing games for
young people. One of these games in the cybertech genre, The
View from the Edge: The Cyberpunk Handbook, portrays the visage
of humanity twisted to fit the shapes of the computer prosthesis.
The body becomes literally "meat" for the implantation of
information devices. The computer plugs directly into the bones
of the wrist or skull and taps into major nerve trunks so that the
chips can send and receive neural signals. As the game book
wryly states:

     Some will put an interface plug at the temples (a "plug
     head"), just behind the ears (called a Frankenstein") or in
     the back of the head (a "puppethead"). Some cover them
     with inlaid silver or gold caps, others with wristwarmers.
     Once again, a matter of style. Each time you add a
     cybernetic enhancement, there's a corresponding loss of
     humanity. But it s not nice, simple and linear. Different
     people react differently to the cyborging process.
     Therefore, your humanity loss is based on the throw of
     random dice value for each enhancement. This is
     important, because it means that sheer luck could put you
     over the line before you know it. Walk carefully. Guard your
     mind.[5]

At the computer interface, the spirit migrates from the body to a
world of total representation. Information and images float
through the Platonic mind without a grounding in bodily
experience. You can lose your humanity at the throw of the dice.

Gibson highlights this essentially Gnostic aspect of cybertech
culture when he describes the computer addict who despairs at
no longer being able to enter the computer matrix: "For Case,
who'd lived for the bodiless exultation of cyberspace, it was the
Fall. In the bars he'd frequented as a cowboy hotshot, the elite
stance involved a certain relaxed contempt for the flesh. The
body was meat. Case fell into the prison of his own flesh."[6] The
surrogate life in cyberspace makes flesh feel like a prison, a fall
from grace, a descent into a dark confusing reality. From the pit
of life in the body, the virtual life looks like the virtuous life.
Gibson evokes the Gnostic-Platonic-Manichean contempt for
earthy, earthly existence.

Today's computer communication cuts the physical face out of
the communication process. Computers stick the windows of the
soul behind monitors, headsets, and datasuits. Even video
conferencing adds only a simulation of face-to-face meeting, only
a representation or an appearance of real meeting. The living,
nonrepresentable face is the primal source of responsibility, the
direct, warm link between private bodies. Without directly
meeting others physically, our ethics languishes. Face-to-face
communication, the fleshly bond between people, supports a
longterm warmth and loyalty, a sense of obligation for which the
computer-mediated communities have not yet been tested.
Computer networks offer a certain sense of belonging, to be sure,
but the sense of belonging circulates primarily among a special
group of pioneers. How long and how deep are the personal
relationships that develop outside embodied presence? The face
is the primal interface, more basic than any machine mediation.
The physical eyes are the windows that establish the
neighborhood of trust. Without the direct experience of the human
face, ethical awareness shrinks and rudeness enters. Examples
abound. John Coates, spokesperson for the WELL in northern
California says: "Some people just lose good manners on line. You
can really feel insulated and protected from people if you're not
looking at them-- nobody can take a swing at you. On occasion,
we've stepped in to request more diplomacy. One time we had to
ask someone to go away."[7]

At the far end of distrust lies computer crime. The machine
interface may amplify an amoral indifference to human
relationships. Computers often eliminate the need to respond
directly to what takes place between humans. People do not just
observe one another, but become "lurkers." Without direct human
presence, participation becomes optional. Electronic life converts
primary bodily presence into telepresence, introducing a remove
between represented presences. True, in bodily life we often play
at altering our identity with different clothing, masks, and
nicknames, but electronics installs the illusion that we are "having
it both ways," keeping our distance while "putting ourselves on the
line." On-line existence is intrinsically ambiguous, like the
purchased passion of the customers in the House of Blue Lights
in Gibson's Burning Chrome: "The customers are torn between
needing someone and wanting to be alone at the same time,
which has probably always been the name of that particular
game, even before we had the neuroelectronics to enable them to
have it both ways."[8] As the expanding global network permits
the passage of bodily representations, "having it both ways" may
reduce trust and spread cynical anomie.

A loss of innocence therefore accompanies an expanding network.
As the on-line culture grows geographically, the sense of
community diminishes. Shareware worked well in the early days
of computers, and so did open bulletin boards. When the size of
the user base increased, however, the spirit of community
diminished, and the villains began appearing, some introducing
viruses. Hackers invisibly reformatted hard disks, and shareware
software writers moved to the commercial world. When we speak
of a global village, we should keep in mind that every village
makes villains, and when civilization reaches a certain degree of
density, the barbaric tribes return, from within. Tribes shun their
independent thinkers and punish individuality. A global
international village, fed by accelerated competition and driven
by information, may be host to an unprecedented barbarism.
Gibson's vision of cyberspace works like a mental aphrodisiac, but
it turns the living environment--electronic and real--into a harsh,
nightmarish jungle. This jungle is more than a mere cyberpunk
affectation, a matter of aestheticizing grit or conflict or rejection.
It may also be an accurate vision of the intrinsic energies
released in a cyberized society.

An artificial information jungle already spreads out over the
world, duplicating with its virtual vastness the scattered
geography of the actual world. The matrix already multiplies
confusion, and future cyberspace may not simply reproduce a
more efficient version of traditional information. The new
information networks resemble the modern megalopolis, often
described as a concrete jungle (New York) or a sprawl (Los
Angeles). A maze of activities and hidden byways snakes around
with no apparent center. Architecturally, the network sprawl
suggests the absence of a philosophical or religious absolute.
Traditional publishing resembles a medieval European city, with
the center of all activity, the cathedral or church spire, guiding
and gathering all the communal directions and pathways. The
steeple visibly radiates like a hub, drawing the inhabitants into a
unity and measuring the other buildings on a central model.
Traditionally, the long-involved process of choosing which texts to
print or which movies or television shows to produce serves a
similar function. The book industry, for instance, provides readers
with various cues for evaluating information. The publishers
legitimize printed information by giving clues that affect the
reader's willingness to engage in reading the book. Editorial
attention, packaging endorsements by professionals or
colleagues, book design, and materials all add to the value of the
publisher's imprint. Communication in contemporary cyberspace
lacks the formal clues. In their place are private
recommendations or just blind luck. The electronic world, unlike
the traditional book industry, does not protect its readers or
travelers by following rules that set up certain expectations.
Already, in the electric element, the need for stable channels of
content and reliable processes of choice grows urgent.

If cyberspace unfolds like existing large-scale media, we might
expect a debasement of discriminating attention. If the economics
of marketing forces the matrix to hold the attention of a critical
mass of the population, we might expect a flashy liveliness and a
flimsy currency to replace depth of content. Sustained attention
will give way to fast-paced cuts. One British humanist spoke of
the HISTORY forum on Bitnet in the following terms: "The
HISTORY network has no view of what it exists for, and of late
has become a sort of bar-room courthouse for pseudo-historical
discussion on a range of currently topical events. It really is, as
Glasgow soccer players are often called, a waste of space."
Cyberspace without carefully laid channels of choice may become
a waste of space.

The Underlying Fault

Finally, on-line freedom seems paradoxical. If the drive to
construct cyber entities comes from Eros in the Platonic sense,
and if the structure of cyberspace follows the model of Leibniz's
computer God, then cyberspace rests dangerously on an
underlying fault of paradox. Remove the hidden recesses, the lure
of the unknown, and you also destroy the erotic urge to uncover
and reach further; you destroy the source of yearning. Set up a
synthetic reality, place yourself in a computer-simulated
environment, and you undermine the human craving to penetrate
what radically eludes you, what is novel and unpredictable. The
computer God's-eye view robs you of your freedom to be fully
human. Knowing that the computer God already knows every
nook and cranny deprives you of your freedom to search and
discover.

Even though the computer God's eye view remains closed to the
human agents in cyberspace, they will know that such a view
exists. Computerized reality synthesizes everything through
calculation, and nothing exists in the synthetic world that is not
literally numbered and counted. Here Gibson's protagonist gets a
brief glimpse of this superhuman, or inhuman, omniscience:

     Case's consciousness divided like beads of mercury, arcing
     above an endless beach the color of the dark silver clouds.
     His vision was spherical, as though a single retina lined
     the inner surface of a globe that contained all things, if all
     things could be counted.

     And here things could be counted, each one. He knew the
     number of grains of sand in the construct of the beach (a
     number coded in a mathematical system that existed
     nowhere outside the mind that was Neuromancer). He
     knew the number of yellow food packets in the canisters in
     the bunker (four hundred and seven). He knew the number
     of brass teeth in the left half of the open zipper of the
     saltcrusted leather jacket that Linda Lee wore as she
     trudged along the sunset beach, swinging a stick of
     driftwood in her hand (two hundred and two).[9]

The erotic lover reels under the burden of omniscience: "If all
things could be counted . . ." Can the beloved remain the beloved
when she is fully known, when she is fully exposed to the analysis
and synthesis of binary construction? Can we be touched or
surprised--deeply astonished--by a synthetic reality, or will it
always remain a magic trick, an illusory prestidigitation?

With the thrill of free access to unlimited corridors of information
comes the complementary threat of total organization. Beneath
the artificial harmony lies the possibility of surveillance by the
all-knowing Central System Monad. The absolute sysop wields
invisible power over all members of the network. The infinite CSM
holds the key for monitoring, censoring, or rerouting any piece of
information or any phenomenal presence on the network. The
integrative nature of the computer shows up today in the ability of
the CSM to read, delete, or alter private e-mail on any
computer-mediated system. Those who hold the keys to the
system, technically and economically, have access to anything on
the system. The CSM will most likely place a top priority on
maintaining and securing its power. While matrix users feel
geographical and intellectual distances melt away, the price they
pay is their ability to initiate uncontrolled and unsupervised
activity.

According to Leibniz's monadology, the physical space perceived
by the monads comes as an inessential by-product of experience.
Spatiotemporal experience goes back to the limitations of the
fuzzy finite monad minds, their inability to grasp the true roots of
their existence. From the perspective of eternity, the monads exist
by rational law and make no unprescribed movements. Whatever
movement or change they make disappears in the lightning speed
of God's absolute cognition. The flesh, Leibniz maintained,
introduces a cognitive fuzziness. For the Platonic imagination,
this fuzzy incarnate world dims the light of intelligence.

Yet the erotic ontology of cyberspace contradicts this preference
for disembodied intelligibility. If I am right about the erotic basis
of cyberspace, then the surrogate body undoes its genesis,
contradicts its nature. The ideal of the simultaneous
all-at-once-ness of computerized information access undermines
any world that is worth knowing. The fleshly world is worth
knowing for its distances and its hidden horizons. Thankfully, the
Central System Monad never gets beyond the terminals into the
physical richness of this world. Fortunately, here in the broader
world, we still need eyes, fingers, mice, modems, and phone
lines.

Gibson leaves us the image of a human group that instinctively
keeps its distance from the computer matrix. These are the
Zionites, the religiously tribal folk who prefer music to computers
and intuitive loyalties to calculation. The Zionites constitute a
human remnant in the environmental desolation of Neuromancer:

     Case didn't understand the Zionites.

     . . . The Zionites always touched you when they were
     talking, hands on your shoulder. He [Case] didn't like
     that....

     "Try it, " Case said [holding out the electrodes of the
     cyberspace deck].

     [The Zionite Aerol] took the band, put it on, and Case
     adjusted the trodes. He closed his eyes. Case hit the
     power stud. Aerol shuddered. Case jacked him back out.
     "What did you see, man?"

     "Babylon," Aerol said, sadly, handing him the trodes and
     kicking off down the corridors.[10]

As we suit up for the exciting future in cyberspace, we must not
lose touch with the Zionites, the body people who remain rooted
in the energies of the earth. They will nudge us out of our heady
reverie in this new layer of reality. They will remind us of the
living genesis of cyberspace, of the heartbeat behind the
laboratory, of the love that still sprouts amid the broken slag and
the rusty shells of oil refineries "under the poisoned silver sky."
 
 

*****************
 

Identity and the virtual community

    Identity plays a key role in virtual communities. In communication, which is the
    primary activity, knowing the identity of those with whom you communicate is
    essential for understanding and evaluating an interaction. Yet in the disembodied
    world of the virtual community, identity is also ambiguous. Many of the basic cues
    about personality and social role we are accustomed to in the physical world are
    absent. The goal of this paper is to understand how identity is established in an online
    community and to examine the effects of identity deception and the conditions that give
    rise to it.

    In the physical world there is an inherent unity to the self, for the body provides a
    compelling and convenient definition of identity. The norm is: one body, one identity.
    Though the self may be complex and mutable over time and circumstance, the body
    provides a stabilizing anchor. Said Sartre in Being and Nothingness, ``I am my body
    to the extent that I am,'' The virtual world is different. It is composed of information
    rather than matter. Information spreads and diffuses; there is no law of the
    conservation of information. The inhabitants of this impalpable space are also diffuse,
    free from the body's unifying anchor. One can have, some claim, as many electronic
    personas as one has time and energy to create.

    ``One can have...?'' Who is this ``one''? It is, of course, the embodied self, the body
    that is synonymous with identity, the body at the keyboard. The two worlds are not
    really disjoint. While it is true that a single person can create multiple electronic
    identities that are linked only by their common progenitor, that link, though invisible
    in the virtual world, is of great significance. What is the relationship among multiple
    personas sharing a single progenitor? Do virtual personas inherit the qualities - and
    responsibilities - of their creators? Such questions bring a fresh approach to ancient
    inquiries into the relationship between the self and the body - and a fresh urgency.
    Online communities are growing rapidly and their participants face these questions,
    not as hypothetical thought experiments, but as basic issues in their daily existence. A
    man creates a female identity; a high school student claims to be an expert on viruses.
    Other explorers in virtual space develop relationships with the ostensible female,
    relationships based on deep-seated assumptions about gender and their own sexuality;
    patients desperate for a cure read the virtual virologist's pronouncements on new
    AIDS treatments, believing them to be backed by real-world knowledge. For
    assessing the reliability of information and the trustworthiness of a confidant, identity
    is essential. And care of one's own identity, one's reputation, is fundamental to the
    formation of community.

    Identity cues are sparse in the virtual world, but not non-existent. People become
    attuned to the nuances of email addresses and signature styles. New phrases evolve
    that mark their users as members of a chosen subculture. Virtual reputations are
    established and impugned. By looking closely at these cues, at how they work and
    when they fail, we can learn a great deal about how to build vibrant on-line
    environments.

    The Usenet environment

    This paper examines identity and deception in the context of the Usenet newsgroups.
    Although technically simple - they are essentially structured bulletin boards - a
    complex social structure has evolved within them. Unlike many MUDs, which are
    intended as fantasy worlds, most of Usenet is meant to be non-fiction; the basic
    premise is that the users are who they claim to be. There is, however, a significant
    variance between newsgroups as to what constitutes a real or legitimate identity. And
    there are numerous cases of identity deception, from the pseudo-naive trolls to the
    name-switching spammers.

    People participate in Usenet newsgroups for a variety of reasons. They may be
    seeking information or companionship, advocating an operating system or a religion.
    As in the real world, their motivations may be complex: both the desire to be helpful
    and the desire to be noticed may prompt the writing of a lengthy exposition. For most
    participants, identity - both the establishment of their own reputation and the
    recognition of others - plays a vital role.

    Information exchange is a basic function of Usenet. Requests for information are very
    common and answers, both right and wrong, are usually forthcoming. In the real world
    we may believe a story if it was published in The Wall Street Journal and dismiss it if
    it appeared in The National Enquirer. With Usenet, there is no editorial board
    ensuring standards of reliability; each posting comes direct from the writer. Thus, the
    writer's identity - in particular, claims of real-world expertise or history of accurate
    online contributions - plays an important role in judging the veracity of an article.
    Similarly, knowing the writer's motivation - e.g. political beliefs, professional
    affiliations, personal relationships - can greatly affect how we interpret his or her
    statements. Is the persuasive posting about the virtues of a new compiler coming from
    a programmer who has evaluated its code output or from a marketer of the product?
    The reader who knows that the author stands to gain from promoting a product or an
    idea is likely to doubt the veracity of the claims [Aronson 95].

    The cost of identity deception to the information-seeking reader is potentially high.
    Misinformation, from poor nutritional advice to erroneous interpretations of
    drug-smuggling law, is easy to find on the net - and it is more likely to be believed
    when offered by one who is perceived to be an expert [Aronson 95]. The limited
    identity cues may make people accept at face value a writer's claims of credibility: it
    may take a long time - and a history of dubious postings - until people start to wonder
    about the actual knowledge on a self-proclaimed expert.

    Providing affiliation and support is another important function of Usenet [Sproull &
    Kiesler 91, Wellman 97]. Here, too, identity is central. The sense of shared
    community requires that the participants be sympathetic to the ideas around which the
    group is based; even if they disagree, there needs to be some fundamental common
    ground. Trust in the shared motivations and beliefs of the other participants - in other
    words, their social identity - is essential to the sense of community [Beniger 87].

    Identity also plays a key role in motivating people to actively participate in
    newsgroup discussions. It is easy to imagine why people may seek information on the
    net: they have a problem and would like a solution. What prompts someone to
    answer? Why take the effort to help an unknown and distant person? Altruism is often
    cited: people feel a desire or obligation to help individuals and to contribute to the
    group [Constant et al. 95]. Yet selfless goodwill alone does not sustain the thousands
    of discussions: building reputation and establishing one's online identity provides a
    great deal of motivation. There are people who expend enormous amounts of energy
    on a newsgroup: answering questions, quelling arguments, maintaining FAQs[1].
    Their names - and reputations - are well-known to the readers of the group: other
    writers may defer to their judgement, or recommend that their ideas be sought in an
    argument. In most newsgroups, reputation is enhanced by posting intelligent and
    interesting comments, while in some others it is enhanced by posting rude flames or
    snide and cutting observations. Though the rules of conduct are different, the ultimate
    effect is the same: reputation is enhanced by contributing remarks of the type admired
    by the group. To the writer seeking to be better known, a clearly recognizable display
    of identity is especially important. No matter how brilliant the posting, there is no
    gain in reputation if the readers are oblivious to whom the author is.
 
 

Models of honesty and deception

    The approach of this paper is ethnographic - an interpretation of closely examined
    social discourse [Geertz 73]. As a framework for the examination I will look at the
    virtual community as a communication system, its inhabitants as signallers and
    receivers.

    Examples of identity deception abound in the animal world[2]. The deception is quite
    harmful to those deceived, whose costs range from a lost meal to loss of life.
    However, it is beneficial to the deceivers, who gain food, free child care, or their
    own safety. What maintains the balance between honest and deceptive signalling and
    why, since it can be so beneficial to the deceiver, isn't deception more common? Why
    don't more harmless butterflies mimic the bad-tasting monarch? And why don't weak,
    undesirable mates just pretend to be strong, desirable ones?

    There is not a simple answer to this question; there is not even agreement among
    biologists as to how common, or effective, is deception. If a signal becomes very
    unreliable due to excessive cheating it ceases to convey information - it stops being a
    signal. Yet there are stable systems of deception, where the percentage of deceivers
    does not overwhelm the population, and the signal remains information-bearing,
    however imperfectly. And there are signals that are inherently reliable: signals that
    are difficult, or impossible, to cheat.

    Biologists and game theorists have developed an analytical framework for modeling
    the interplay between honesty and deception in a communication system. Of especial
    interest to us is the work done by Amotz Zahavi and others in examining what makes a
    signal reliable. Zahavi proposed the ``Handicap Principle'', which states that

        ...[F]or every message there is an optimal signal, which best amplifies the asymmetry between an
        honest signaller and a cheater. For example, wasting money is a reliable signal for wealth because a
        cheater, a poor individual claiming to be rich, does not have money to throw away; the message of
        strength may be displayed reliable by bearing heavy loads; and confidence may be displayed by
        providing an advantage to a rival. [Zahavi 93b]

    Signals that follow the handicap principle are called assessment signals. They are
    costly and the cost is directly related to the trait being advertised. Big horns on a stag
    are an assessment signal for strength, for the animal must be quite strong and healthy
    to support these massive growths. The horns are a signal: potential rivals or mates
    need not directly test the stag's strength; they can simply look at the size of the horns.
    The thick neck of a brawny bouncer in a bar sends a similar signal in the human world
    and few patrons demand a personal exhibition of strength. Assessment signals are
    reliable, since sending an assessment signal requires that the sender possess the
    relevant trait.

    Signals that do not follow the handicap principle are called conventional signals.
    Here, the signal is correlated with a trait is by custom or convention: the sender need
    not possess the trait in order to make the signal. Wearing a T-shirt that says ``Gold's
    Gym Powerlifter'' or signing ``Mr. Deadlift'' in your letters to a weight-lifting
    newsgroup is a signal of strength, but not a reliable one. Anyone can wear the shirt or
    type the signature: no feats of strength are involved in the signal's production.
    Conventional signals are open to deception. If being thought of as strong is highly
    desirable, it seems reasonable that many people, weak or strong, would choose to
    wear ``Powerlifter'' T-shirts. Yet, if T-shirt wearing by the weak becomes prevalent,
    the signal loses its meaning as an indicator of strength. Conventional signals can thus
    be unstable: due to excessive deception, a once meaningful signal can become noise.

    Since assessment signals are so reliable, and conventional ones not, why use the latter
    at all? One reason is that conventional signals are often less costly, for both the
    signaller and the receiver [Dawkins & Guilford 91]. If the costs associated with
    deception are relatively low, then a conventional signal may be more suitable than a
    more reliable, but costly, assessment signal. Think of a job applicant. The text in a
    resume is a conventional signal, for one can write down an impressive job history
    without having actually experienced it. Statements made during an extensive interview
    are more like assessment signals, for one must have actually acquired the knowledge
    in order to display it. It is much quicker and easier (that is, less costly) for the
    employer to just look at the resume, but the chances of being deceived are much
    higher. If the costs of deception are high - say, the job is a responsible one and an
    inexperienced employee may cause a great deal of harm - then it will be worth making
    the effort to make the costlier evaluation.

    The spread of deception can be limited. In particular, imposing a cost to being caught
    deceiving - that is, punishing deception - is a deterrent [Hauser 92]. Going back to our
    resume example, there is usually little penalty for being caught padding one's
    employment history when seeking, say, a waitressing job, whereas the punishment for
    being caught amplifying one's medical qualifications may be quite severe. By
    imposing high costs on deception a social system can make conventional signals more
    reliable.

    There are costs to imposing the punishment. For a deceptive signaller to be caught,
    someone must make the effort to assess the honesty of the signal (termed the cost of
    probing among biologists). In addition to the time and energy thus expended, probing
    may itself have high costs if the probee turns out to be honest [Dawkins & Guilford
    91]. For instance, imagine probing the strength of our ``Powerlifter'' T-shirt wearers
    by challenging them to a fight. If the wearer is ``deceptive'', he or she will lose the
    challenge - and quite likely be dissuaded from misleading T-shirt practices. If,
    however, the wearer is ``honest'', it is the prober who loses.

    Applying the model is an interpretive process. Even in the relatively simple world of
    biological signalling, there is often disagreement about whether a particular signal is
    inherently or conventionally tied to a trait (see Dawkins & Guilford 91 and Zahavi
    93b for opposing views). Interpreting the social world of cyberspace is far a more
    subjective process. The purpose of the model is to help articulate the arguments: it is
    a framework on which to begin sorting out the intricate and often murky discussion
    about identity in cyberspace.
 
 

The anatomy of a Usenet letter

    Usenet news is accessible by millions of people all over the world [3]. Subscribers
    range from the highly technical to the computer illiterate, from young children playing
    with their parents' account to homebound elderly people using the Net for social
    contact, from young American urban professionals to radical Afghani Muslims. Some
    are posting from work accounts, knowing their boss monitors on-line exchanges;
    others are posting from a recreational service, entertaining themselves by playing an
    imaginary character.

    There are several hundred discussion groups, covering topics ranging from computer
    networking protocols to gun-control and vegetarian cooking. Some newsgroups
    encourage anonymous postings; in others such postings are coldly ignored. Some
    newsgroups are close-knit communities, in which people refer to each other by name
    and ask after each other's friends and family members. Others are primarily places to
    exchange information, repositories of knowledge where one can submit a question and
    receive a (possibly correct) answer. Some groups provide a warm, trusting and
    supportive atmosphere, while others promote a raw and angry free-for-all.

    This range of styles, topics, and participants makes Usenet an especially interesting
    focus for this study. Although the groups share the a common technology and interface,
    the social mores - writing style, personal interactions, and clues about identity - vary
    greatly from forum to forum.

    In the mediated world of the Usenet newsgroups, the letter is not only the basic form
    of communication, but one's primary means for self-presentation. In the following
    section, we will take a close look at the anatomy of a Usenet letter and at how identity
    is established or concealed within it.

                               Example 1: A Usenet Letter
                      header
                            Owen@netcom.com (Owen Koslov)
                            Re: Brine Shrimp
                            Mon, 24 Jan 1994 09:38:23 GMT
                            Newsgroups: sci.aquaria,rec.aquaria
                            In article fdorrance@aol.com (F. Dorrance) writes:
        Message body (extract from
               original question)
                            >> I tried to hatch some brine shrimp for my fish. I could
                            >> only get the shrimp to live for 2 days. Could someone
                            >> tell me what to feed them and give me details on
                            >> hatching them.
          Message body (response)
                            You are not supposed to keep them alive for longer than a day or so. They
                            should be fed to the fish as soon as they hatch. Otherwise, you need the type of
                            set up you'd expect in a regular saltwater tank: low bio-load, plenty of water
                            circulation, and adequate filtration. You can feed the shrimp OSI's APR or
                            other commercial invert foods, or use green water. In all cases, unless you are
                            doing it on a large scale, buying live brine shrimp at a shop is simpler, faster and
                            easier.
                    Signature
                            -- Owen Koslov at home (owen@netcom.com) or work
                            (okoslov@veritas.com)
 

    Example 1 is a typical Usenet letter. In this example, the writer is offering advice in
    response to a request for information. What does the reader of this posting know about
    Mr. Koslov [4]? Clues can be found in each part of the letter: the header provides the
    writer's name and email address, the body of the letter reveals voice and something of
    the history of the exchange, the signature shows the writer as he or she chooses to be
    identified.

    The account name - basic ID

    The most straightforward form of identification is the writer's account name (i.e.
    email address). This information is automatically included in the header by the
    posting software. It appears in the article lists Usenet readers skim to find postings of
    interest and it is the data used in killfiles to identify writers one finds onerous [5]. The
    automatically inserted account name may be the only overt identifier in the posting;
    while people do not always sign their letters, all postings must have the senders
    account name in the header.

    A close look at the account name, a seemingly simple identification signal, proves to
    be quite interesting for it touches on issues ranging from the reputations of various
    virtual neighborhoods to techniques for detecting identity deception. There may be a
    clear and straightforward mapping from an account name to a real-world individual -
    or it may be deliberately opaque. The domain (account names are in the form
    name@domain, where domain is the organization that provides the account) yields
    contextual clues about the writer - and about the reliability of the header information.

    While the name of the individual writer may be unfamiliar, often the name of the
    domain is not. Like notes written on letterhead, a posting submitted from a
    well-known site shares in its reputation: a posting about oceanography has added
    authority if it came from whoi.edu (Woods Hole Oceanographic Institute) and a
    question about security breaches may seem more intriguing if it came from .mil (the
    U.S. military).

    The domain is a virtual neighborhood and, as with real world neighborhoods, some
    names bring to mind a wealth of demographic data. The domain may correspond to a
    real world place, indicating that the writer is in, say, Thailand or Israel or working at
    Raytheon or Greenpeace. Even some of the commercial services have distinctive
    reputations: San Francisco's The Well is tie-dyed and politically active while New
    York City's Echo is black-clad and arts-oriented. There are ``poor'' neighborhoods,
    addresses that reveal a limited budget:

        >> jake@cleveland.freenet.edu
        >> Hacker wanted to disassemble commercial program and rewrite to our specs.
        >> This is not a B.S. post, we willpay BIG $$$ to have this service performed.
        >> Email for details.

        Nobody with ``BIG $$$'' to spend is going to be writing that message from Cleveland Freenet. :-)

    And, while there are not yet any recognized ``wealthy'' virtual neighborhoods, it is
    probably only a matter of time until exclusive on-line addresses become symbols of
    status.

    To understand the significance of the domain it is useful to distinguish between
    institutional and commercial accounts. Institutional accounts are online addresses
    from universities, research labs and corporations; they are given to people because of
    an association with the institute. Commercial accounts are available for a fee from
    various service providers. Unlike the institutional accounts, these commercial
    accounts do not imply any affiliation; they simply mean that the user has signed up for
    the service.

    In the early days of the net, all accounts were institutional. Most sites were big
    universities and laboratories and the users were academics and researchers at these
    institutes. Today, the situation is more complex and not all postings are from
    recognizable institutes. Some are from small businesses unknown to the reader; others
    are accounts from commercial service providers -somewhat like electronic post
    office boxes. Furthermore, as net access becomes widespread, a posting from a
    research lab domain no longer necessarily means a researcher sent it. Support staff as
    well as scientists have computers: the posting from Woods Hole may be from a
    prominent oceanographer - or a temporary receptionist. There is a great deal of
    contextual and other information to be found in the domain name, but it needs to be
    evaluated within the culture of the net and of the organizations that provide access.

    The opening up of the online world to anyone with a computer and modem has met
    with quite a bit of resistance from the original residents. Most maligned are
    newcomers who have accounts with the consumer-oriented commercial services such
    as Prodigy and America Online (AOL). Postings with aol.com addresses are
    sometimes greeted with derision; newsgroups such as alt.aol-sucks exist solely to
    spurn America Online subscribers. This resistance is partly a reaction to the loss of
    exclusivity - access to online communication no longer means one is at the forefront of
    technology - but there are also substantive differences between the postings of the old
    guard and the newcomers.

        I have to admit, i do have an account on prodigy, becasue my mom has had it for a few years, and it
        was free for me, i never use it though, it's embarassing.. I think i'd be the same way if i had AOL, i
        would be embarassed to post or reply or just be seen anywhere with a loser@aol.com address. I
        guess it just seems that they are so stupid..

                                                              - alt.2600

    Some of the differences are stylistic. The consumer-oriented services offer their own
    communication forums in which the conversational conventions are quite different
    than within Usenet. For instance, in an AOL chat room, it is fine to simply respond
    ``yes'' to a statement. On Usenet, where each statement is a stand-alone posting, it is
    considered poor manners to post a response with no added content and with no
    indication of the original statement. Newcomers to Usenet from AOL, accustomed to
    chat room style interactions, frequently post one word rejoinders, infuriating other
    Usenet users and adding to the image of AOL-based participants as thoughtless and
    ignorant of local customs.

    There are also differences in accountability. The holder of an institutional account - a
    student or employee - has reasons, such as a job or degree, for remaining in good
    standing with the account provider. A user who engages in malicious or illegal
    activity online stands to lose more than just the account: a number of students have
    been disciplined - and some expelled - for violations of institutional policy. The
    relationship of a subscriber to a commercial service is much less consequential.
    While most services have policies about what constitutes acceptable behavior, the
    repercussions for infractions are limited to termination of service - an inconvenience,
    certainly, but not the equivalent of demotion or firing. In other words, higher
    punishment costs can be imposed on the institutional account.

    Institutional accounts are also less private than commercial accounts. A work- or
    school-based account name is known within the organization and there are many
    people who can make a direct connection between the name on a posting and the real
    world person. For the writer using an institutional account, the online world is a
    public forum in which he or she can be seen by numerous colleagues and
    acquaintances. With a commercial account, it is up to the user to decide who should
    know the link between physical self and virtual appellation. Some services allow
    subscribers only a single account name and the user thus has some concern about the
    reputation that attaches to that name. Some consumer-oriented commercial services
    make it easy for subscribers to create multiple, fictitious names and to keep their real
    names from appearing on their postings. The anonymity of these accounts makes them
    popular for disruptive and harassing posting.

    Truly anonymous postings can be sent using anonymous remailers. These are
    forwarding services which will strip all identifying information from a letter and then
    forward it, anonymously or under a pseudonym, to the intended recipient or
    newsgroup. The pseudonymous address added by many, though not all, remailers
    clearly indicates that the posting is anonymous: an12321@anon.penet.fi and
    anon-remailer@utopia.hacktic.nl are typical. While remailers can be used
    maliciously, their primary use is to provide privacy. Anonymous posts are common in
    groups where the participants reveal highly personal information and many of the
    support groups (e.g. alt.support.depression) periodically provide instructions on how
    to use an anonymous remailer. Use of a remailer can also be a political statement, an
    affirmation that one supports citizen's right to privacy (which includes anonymity,
    access to strong encryption tools, etc.) and opposes government and corporate
    surveillance.

    Many Usenet participants frown upon anonymous postings:

        I don't like dealing with anyone that uses an anonymous remailer! I will, however, assume you are
        doing this for 'legitimate' reasons and try to render assistance.

                                                       - comp.unix.security

        The anonymous address and excessive crossposting were a bit much don't you think? I'll humour
        you this time...

                                                              - alt.2600

    These writers felt compelled to point out their disapproval of anonymous posting
    before answering the question. And the stigma of writing anonymously was clearly
    felt by an451494@anon.penet.fi, the writer of an innocuous request for reviews of a
    human interface, who signed his posting with his real name and the note ``sorry; my
    employer doesn't like seeing me posting to news-groups''.

    The account name is thus an important, but limited, form of online identification. It is
    important because it is ubiquitous: all postings must have the account name in the
    header. It is a key marker of individual identity: although there is not always a
    one-to-one mapping between an account name and a real world person (accounts may
    be shared, some people have several accounts), the account name is generally
    perceived to refer to a single person (or persona). And it may provide some
    contextual information about the writer, information that, while quite sketchy, may be
    the only such cues in the posting.

    Identity in voice and language

    The contents of the posting can reveal a great deal more about the writer. It may
    include overtly identity-related data: name, age, etc. More importantly, it provides a
    chance to get a sense of the writer's ``voice'' and to see how he or she interacts with
    others in the on-line social environment.

    Erving Goffman, in his classic work The Presentation of Self in Everyday Life
    distinguished between the ``expressions given'' and the ``expressions given off''. The
    former are the deliberately stated messages indicating how the one wishes to be
    perceived; the latter are the much more subtle - and sometimes unintentional -
    messages communicated via action and nuance [Goffman 59]. Both forms of
    expression are subject to deliberate manipulation, but the ``expression given off'' may
    be much harder to control. One can write ``I am female'', but sustaining a voice and
    reactions that are convincingly a woman's may prove to be quite difficult for a man.

    Is the ``expression given off'' an assessment or conventional signal? Even in the real
    world, with its far richer array of social nuance, imposters exist. Drag queens,
    confidence men, undercover spies - all are adept at mimicking subtle social codes.
    Yet, although nuance is not an infallible indication of a social role, the experience of
    living the part greatly influences one's ability to play it: years of socialization make
    most women adept at playing the role of woman in their culture and one can argue that
    the cost in time that it takes to fully attain the role makes it an assessment signal [6]. Is
    the same true in the virtual world - is there sufficient complexity to the nuances in a
    Usenet exchange for one's experience in living a role to be revealed in the
    ``expression given off''?

    Looking again at Example 1, from the header and signature we know the writer's name
    (Owen Koslov), we know that he writes both from home (as owen@netcom.com) and
    from work (okoslov@veritas.com). Neither location tells us a great deal about the
    author - netcom is a commercial service provider and veritas.com is not a
    well-known company. The writer's history on the net reveals much more. A look at
    recent articles shows that he is a fairly frequent writer, not only on sci.aquaria, but
    also on the closely related groups rec.aquaria and alt.aquaria. Indoor aquaria seem to
    be his passion. He provides a fellow killifish fancier with the address of a
    mailing-list devoted solely to killifish. He writes several letters a day on aquaria
    related topics. We learn that he has perhaps too many fish: ``I wish I had your
    discipline in keeping the number of species down. I have 9 species of lampeyes
    alone...'' His letters are usually answers to questions posed by others, his voice is
    usually authoritative, pedantic, occasionally dryly humorous. Here are selections
    (ellipses mine) from his response to someone who said to avoid charcoal in tanks
    with plants.

        While activated carbon does adsorb more than just organic carbons, a categorical statement like
        that is inaccurate. Carbon may remove some trace minerals, but I challenge you to substantiate the
        statement that it is a ``bad thing'' for live plants. ... Further more, Dick Boyd's Chemi-Pure uses
        activated carbon as one of its ingredients and I am yet to hear one credible report of it negatively
        affecting live plants. The late Dr. Bridge had used a mix of activated carbon and peatmoss as a
        filtration medium for his planted show tank and reported excellent results.

    Over time, the frequent contributors to a newsgroup creates a strong impression. The
    reader of rec.aquaria is likely to be familiar with these postings and has come to
    some conclusion about both Mr. Koslov's reliability and his personality. Although this
    writer says little about himself, there is a great deal of expression given off.

    Writing style can identify the author of an posting. A known and notorious net
    personality hoping to appear online under a fresh name may have an easier time
    disguising his or her header ID than the identity revealed in the text. The introduction
    to the cypherpunks newsgroup includes this warning:

        The cypherpunks list has its very own net.loon, a fellow named L. Detweiler. The history is too long
        for here, but he thinks that cypherpunks are evil incarnate. If you see a densely worded rant
        featuring characteristic words such as ``medusa'', ``pseudospoofing'', ``treachery'', ``poison'', or
        ``black lies'', it's probably him, no matter what the From: line says.

                                                    - Cypherpunks mailing list

    In this case, where the usual assessment signal - the name in the header - is believed
    to be false, language is used as a more reliable signal of individual identity.

    Language is also an important indication of group identity. ``[R]egarding group
    membership, language is a key factor - an identification badge - for both self and
    outside perception.'' [Saville-Troike 82] Language patterns evolve within the
    newsgroups as the participants develop idiosyncratic styles of interaction - especially
    phrases and abbreviations. Some are common to all groups: BTW, IMHO, YMMV
    (By The Way, In My Humble Opinion, Your Mileage May Vary). Others are of
    limited extent: MOB, ONNA (Mother Of the Bride, Oh No Not Again - used in
    misc.kids.pregnancy by women who were trying to get pregnant to report the monthly
    disappointment). New words are coined and ordinary words gain new meaning:
    flame, spam, troll, newbie. Using these phrases expresses ones identification with the
    online community - it is akin to moving to a new region and picking up the local
    accent.

    Participants interpret these language cues according to their own position within the
    social group. A newsgroup can be home to two or more factional groups, each of
    which tries to establish its style and views as the rightful culture of the group.
    Alt.2600 is a newsgroup devoted to computer hacking and related topics. Being a
    hacker - or appearing to be one - has recently gained mass popularity, and would-be
    hackers and trend-conscious teens have adopted a style of writing that features
    alternative spellings (such as ``kewl'' for ``cool'') and random capitalization. Older or
    more experienced hackers felt compelled to separate themselves from the crowd. In a
    thread called ``Attn LaMerZ and Wana-B's'', one wrote:

        ATTENTION you are not a hacker if you have seen the movie HACKERS. ATTENTION you are
        not a hacker if you post here looking for AOLHELL, free AOL, Unix passwords, crackerjack, or
        virus creation lab. ATTENTION you are not a hacker if you HaVE A PrOOBLEM WiTh YOuR
        CaPS LOckS KeY.

                                                               -alt.2600

    Here, the language markers one group developed to distinguish themselves are a sign
    of scorn for the other.

    The signature

    Language markers such as the above are an important element in signatures, which are
    the on-line world's most deliberate identity signals. The signature is added at the
    discretion of the user, though once designed, it is usually appended automatically to
    postings. It may be an electronic business card, an elaborate work of self-expression,
    a cryptic remark, or simply a name. Not everyone uses one, and they are far more
    prevalent in certain forums than others. Although the signature itself is an easy to copy
    conventional signal, it is often used as a means to link to more robust and reliable
    indicators of identity and to show writer's the affiliation with a subgroup.

    Signatures can be used to anchor the virtual persona to the real world person. The net
    is a great leveler: no one knows if you are male or female, boss or underling,
    gray-haired or adolescent; ``on the Internet, nobody knows you're a dog''. This is not
    to your advantage if in the real world you hold some authority: no one can see that you
    are a respected professional at work in your office, not a teenager logging in from a
    bedroom. One use of the signature is to present real world credentials: your full name,
    title, department, office phone number; enough information so that someone could, if
    they were curious, check to see that you were really who you claimed to be. Such
    business-card signatures are common in the technical newsgroups. Advice from
    someone who's job title is ``Unix System Specialist'' or ``Director, Software
    Development'' has added weight, particularly if it is in a known and respected
    company (for the important sounding ``Director of Software Development'' at
    unknown ``ABC Software Co.'' may be also be the founder and sole employee). These
    signatures imply that the writer is posting in his or her official, employed capacity -
    willing to publicly stand behind the statements.

    One newsgroup that contains many business-card signatures is comp.security.unix.
    The discussion here is about how to make unix systems secure - and about known
    system flaws. While many of the participants are system administrators of major
    institutions, others are just learning how to set up a system in a fledgling company and
    some, of course, are hoping to learn how to break into systems. Someone posting a
    question may wish to include credentials to assure potential responders that the
    question is legitimate, not a disguised dig for information from a would-be hacker. A
    posting suggesting that administrators improve their sites by changing this or that line
    of code in the system software could be a furtive attempt get novice administrators to
    introduce security holes; a signature verifying the legitimacy of the writer alleviates
    this suspicion. Identity deception is a big concern of the participants in this group, and
    they are very aware of signatures and their implications.

    An important new use of the signature is to refer to the writer's home page on the
    World Wide Web. Like the business card signature, the Web address may contain
    credentials - and much more. A home page may provide a detailed portrayal of its
    subject: people include everything from resumes and papers to photographs and lists
    of favorite foods. A person's presence on the Web has depth and nuance not found in
    the ephemeral Usenet environment and a writer's self-presentation on the Web can
    provide a very enlightening context for understanding his or her postings.

    Signatures often include a disclaimer, saying something to the effect that ``These are
    my opinions and not those of my employers''. For many people, participating in Usenet
    newsgroups occupies a sometimes awkward position between work and private life.
    The newsgroups may be an important resource for one's work; they may also be a
    purely recreational past-time. Whether a posting is about signal processing or
    Argentinian culture, if sent from one's work account it will show up under the
    company's electronic letter-head. The disclaimer proclaims that the writer is
    appearing as himself, not as an official company spokesman.

    Signatures are also used to establish one's ties to online groups. Many signatures
    contain computer jokes and phrases, showing that the writer is a programmer - a
    member of the old guard of the net.

                           Example 2: Programmer signatures

      a.#include <stddisclmer.h>

      b.Write failed on /dev/brain: file system full

      c.Doom: 5% Health, 0% Armor, 59 cent Tacos, Lets Go!

      d.Dave Mescher dmescher@csugrad.cs.vt.edu
        GCS d H>+ s+:- g+ p3 au a-- w+ v,--->! C++++,++ UU++++,
        A$ P-- L-3- E--- N++ K- W--- M V-- po Y+ t--- 5 jx R G+
        !tv b++ D- B--- e+,* u+ h- f+ r(+,++)@ !n,--- y?

    In a), the phrase #include <stddisclmer.h> uses a C language construct to make a
    reference to the disclaimer signature. It has both the effect of being a disclaimer (the
    writer is not speaking officially) and of proclaiming the writer's affinity to the C
    programming world. b) uses the format of a common Unix error message. For the
    Unix-literate reader, the phrase is familiar and the joke obvious; for others it is simply
    obscure. Similarly, c) plays off the scoring style of the popular computer game Doom.
    Signatures such as these are often individual creations, meant to be used only by their
    author. Since one needs to be familiar with a subculture in order to make a joke in its
    vocabulary, these signatures, when original, show their author's familiarity with the
    programming world. Furthermore, the world in which they are used is small. A writer
    who simply copies the clever phrase of another is likely to quickly come to the
    attention of the potentially irate creator. The possible cost of copying - public
    humiliation through accusations of plagiarism - is quite high. (Smitten by a phrase too
    witty not to use, some writers have taken to using other's signatures - with
    attribution.).

    These signatures are what Fiske calls ``producerly'' writings, easily accessible yet
    playing with complex mixes of vocabularies and codes [Fiske 89]. Such puns, he
    says, entertain both through the process of discovering the layers of meaning and in
    their juxtaposition of social contexts. ``Write failed on /dev/brain: file system full'' is
    not only a play on Unix error messages, but can also be read as a comment on
    information overload - or as a subtle jab at those who post, but seem not to absorb
    anyone else's comments. ``#include <stddisclmr.h>'' in addition to mixing the culture
    of Usenet with the code of C programmers, also refers to the numbing ubiquity of
    disclaimers.

    The signature in d), which includes the writer's ``Geek Code'' is a bit different.
    Proclaiming one' s ``geek identity'' - both one's identification with geeks as a group
    and one's particular and individual type of geekiness - is the purpose of this code:

        How to tell the world you are a geek, you ask? Use the universal Geek code. By joining the geek
        organization, you have license to use this special code that will allow you to let other un-closeted
        geeks know who you are in a simple, codified statement.

                                      -Robert Hayden, The Code of the Geeks, 1995.

    The Code consists of a series of descriptive categories and modifiers. The first
    category is G, Geek type. GCS stands for Computer Science Geek (GSS would be
    Social Science Geek). The second category, d, is for dress style. In the example
    above d is without modifiers, meaning: ``I dress a lot like those found in catalog ads.
    Bland, boring, without life or meaning''. There are many possibilities, ranging from
    ``d++: I tend to wear conservative dress such as a business suit'' to ``!d: No clothing.
    Quite a fashion statement, don't you think?''. The Geek Code can become quite
    complex. For instance, the modifier ``>'' means moving towards. Thus, the symbol
    H>+ above is interpreted as someone whose hair (H) is striving to achieve (>)
    shoulder length (+). The Code is full of inside jokes, e.g. !H, the code for baldness,
    refers to the computer language convention of ! meaning negation. It is also full of
    cultural references: to operating systems, to Internet personalities, to TV shows and to
    various games. One has to be quite dedicated to decipher a Geek Code, but its
    primary message - identification with the online ``geek'' world - is easily perceived
    by anyone who knows what a geek code looks like.

    The Geek Code has inspired a number of other identity codes. The Goth Code has
    categories for dress style, body piercings, musical taste; the Magic Code provides the
    means to express one's opinions of the Kabbala, Aleister Crowley, and one's own
    supernatural powers; the Cat Code has categories ranging from breed to purr volume.
    The Codes seem to have originated in the gay and lesbian on-line community, inspired
    both by the handkerchief codes of the gay bar scene and (according to the introduction
    to the progenitor of all the codes, the Bear Code) by the astronomical classification
    schemes for stars and galaxies. Until recently, seeing these codes in a signature would
    be a puzzle to all but the initiated. Today, the Web has made finding esoteric
    information - such as the decoding scheme for the Muffdiva Code - simply a matter of
    a quick net search. The codes still function as subcultural membership markers, though
    their meaning is now open. They can now function as a tourist's introduction to the
    subculture, enumerating the features of greatest interest to the group.

    Some signature styles are unique to particular newsgroups. Often they refer to the
    writer's role within that group. For example, soc.couples.wedding is a newsgroup
    devoted to planning weddings from the fine points of invitation writing protocols to
    advice about how to deal with hostile in-laws. The participants include people who
    are engaged to be married, people who would like to be engaged to married, and
    people who like giving advice. The brides-to-be are the central group: they ask
    questions, they share their experiences, they write to complain about their caterers,
    bridesmaids and future mother-in-laws. And they have developed their own signature
    pattern:

        Joan (and Mike, May 27, 1995)
        Amy (& Chris Sept. 7, 1996)

    A similar signature pattern is found on misc.kids.pregnancy, where the expectant
    mothers sign with the baby's due date. These signatures show the special status of the
    writer: as bride- or mother-to-be, her real world situation is the focus of the group's
    interest. The signatures also highlight the temporal nature of this identity. The readers
    know the stages of wedding preparation and pregnancy. Responses to letters often
    include references to the signature (``June 10th - I'm getting married the next day! Are
    you nervous yet?'') even if the body of the letter was unrelated to the writer's wedding.

    An especially well-defined community has emerged in the group rec.motorcycles,
    where an online club, called the Denizens of Doom (DoD), has formed. The DoD
    began as a satire of the newsgroup and of real motorcycle clubs, but is now a real
    club, with memberships lists and real-world badges. Members get DoD numbers,
    which they use in their signatures. One must apply for membership, and, while the
    procedure is not terribly secret, it does take a bit of knowing who's who in the group
    to apply: a DoD number in a signature means that the writer is not a newcomer to the
    group. Here is a signature from rec.motorcycles:

        whiteb1@aol.com (Ben White)
        AMA # 580866 COG # 1844
        DoD # 1747 Better watch out, He turned me loose!
        '95 VFR 750 5 bucks more, I coulda got a red one
        '85 Shadow
        No more Connie

    In addition to the DoD number, it features the writer's membership in the American
    Motorcycle Association plus the motorcycles he owns (or used to own); this signature
    is a virtual world substitute for the colors and badges of real-world biking.

    Finally, signatures make it easier to quickly identify the writer. In the uniform
    environment of ASCII text, there is little to visually distinguish one letter from another
    and it is easy confuse two writers with similar names, or to simply not notice the
    attribution at all. Signatures are easily recognized, identifying the writer at a glance.

    Individual recognition is important in many newsgroups. Participants in arguments
    often call each other by name - both heated flames and supportive letters are often
    written as person-to-person missives. On-line status is recognized and there is
    deferral to respected members. This writer, himself an aerobics instructor, described
    a modification he had made to a move, and then asked:

        Bill Whedon and Larry DeLuca, Are you There? You guys have seemed to be the most vocal AND
        concientious... By turning lunges into squats, have Lori and I traded one problem for another?

                                                      - misc.fitness.aerobics

    High status participants get special treatment. A bridal consultant who contributes
    frequently to soc.couples.wedding asked the newsgroup to help her plan a vacation.
    Such a request is quite outside the group's domain, and would normally result in a
    sharp requests to keep the postings on topic; instead, several people enthusiastically
    wrote in with advice and suggestions. The signature is an important technique for
    insuring that one's postings are accredited to one's name.

    From the header to the signature, identity cues are scattered throughout the Usenet
    letter, from declarations of one's name, age, sexual orientation, to the subtler
    ``expressions given off'' through voice and vocabulary. The virtual world's
    subcultures have developed their own patois, with codes and linguistic patterns that
    identify affiliated participants. And people have found ways to control the degree of
    personal identity they wish to expose online, from authentication through business
    card signatures to the private cloak of anonymous remailers.
 
 

Deceptions and manipulations

    Yet these identity cues are not always reliable. The account name in the header can be
    faked, identity claims can be false, social cues can be deliberately misleading.

    Many varieties of identity deception can be found within the Usenet newsgroup. Some
    are quite harmful to individuals or to the community; others are innocuous, benefitting
    the performer without injuring the group. Some are clearly deceptions, meant to
    provide a false impression; others are more subtle identity manipulations, similar to
    the adjustments in self-presentation we make in many real world situations.

    Trolls

    In the spring of 1995 a new user appeared in the wedding newsgroups. She signed her
    letters Cheryl, the name on her account was ultimatego@aol.com and her letters
    espoused a rigid interpretation of formal etiquette. The discussion in these groups is
    often about how to have a wedding on a limited budget. When the women would talk
    about using balloons for decorations, Ultimatego would post that balloons were
    vulgar; when the discussion turned to do-it-yourself laser-printing she would interject
    that only engraving is acceptable to people with taste. Some readers were intimidated
    by her intimations of upper-crust social knowledge; others were infuriated by her
    condescending remarks. When she wrote that people who could not get married in full
    formal splendor should not have a wedding at all but should simply go to city hall, an
    intense and angry exchange ensued. At this point, someone said that Ultimatego was
    probably a troll.

        Are you familiar with fishing? Trolling is where you set your fishing lines in the water and then slowly
        go back and forth dragging the bait and hoping for a bite. Trolling on the Net is the same concept -
        someone baits a post and then waits for the bite on the line and then enjoys the ensuing fight.

    Trolling is a game about identity deception, albeit one that is played without the
    consent of most of the players. The troll attempts to pass as a legitimate participant,
    sharing the group's common interests and concerns; the newsgroup members, if they
    are cognizant of trolls and other identity deceptions, attempt to both distinguish real
    from trolling postings and, upon judging a poster to be a troll, make the offending
    poster leave the group. Their success at the former depends on how well they - and
    the troll - understand identity cues; their success at the latter depends on whether the
    troll's enjoyment is sufficiently diminished or outweighed by the costs imposed by the
    group.

    Trolls can be costly in several ways. A troll can disrupt the discussion on a
    newsgroup, disseminate bad advice, and damage the feeling of trust in the newsgroup
    community. Furthermore, in a group that has become sensitized to trolling - where the
    rate of deception is high - many honestly naive questions may be quickly rejected as
    trollings. This can be quite off-putting to the new user who upon venturing a first
    posting is immediately bombarded with angry accusations. Even if the accusation is
    unfounded, being branded a troll is quite damaging to one's online reputation.

    Rec.motorcycles is a free-wheeling group where tough-guy banter mixes with advice
    about riding techniques and equipment. Being able to ride on a challenging bike in
    difficult conditions is respected - but attempting feats beyond one's capabilities is
    greatly disapproved of. Beginners who want to start out on a powerful bike are likely
    to be severely lectured. Provoking this response is the goal of flame-seeking trolls.

        Subject: New Rider; what bike? Is ZX11 good to start with?
        From: crystllthr@aol.com (CrystlLthr)
        Organization: America Online, Inc. (1-800-827-6364)

        Hi. I am a college junior and am interested in buying my first motorcycle. I've seen the Kawasaki
        ZX11 and think it looks pretty hot. Would this be a good bike to buy. Money is no problem. My
        dad will buy me anything I want. Also, I've heard that you should get a turbo kit from Mr. Turbo in
        Houston, because the bike needs more power. Any other modifications suggested? Also, where
        should I go to learn to ride?

        Derick Nichols
        Tulane University

    A few took this posting seriously. Some responded angrily:

        Cool Derick. Great bike! The turbo kit will make it awesome. Don't worry about learning to ride,
        just go pick it up and ride it home. Good idea though to have your dad buy a coffin and funeral plot
        at the same time. I think they offer a deal on those when you get a zx-11 as your first bike. Oh yeah.
        Don't worry about hitting any manhole covers on your way home - if you warp the wheel you can
        always sue the city.

    Others tried to be helpful:

        Well, I agree with Sherry [quoted above].though i problby wouldnt have put in quite like that.
        Derick, if you have never ridden before maybe you can start with something a bit smaller. You dont
        hae to buy your first bike nwe.,that way, when you otgrow it, you wont have put a lot of money into
        it (if you bought it cash), or if you financed, you can get out ot it easier.

    Most readers, however, decided it was a troll:

        This has got to be bait, right?????

        Sounds like extreme flamebait to me..
        Yes, get the ZX, (a used '91.) I'll buy the resulting wreck for parts for $100.00 :-)

    Several pointed out the discrepancy between the signature and the domain:

        >> This has got to be bait, right?????
        Since the "college junior" is not coming from an .edu address, then I would guess yes it does. :-)

        College junior @ aol.com? Bad bait, too obvious.

    Still, as with many issues of online identity, the question of Derick's intentions
    remained unresolved:

        >> >>I worry about people like this on motorcycles.
        >>I worry about people like this behind on computers. No matter how lame the bait someone will
        bite.
        What scares me even more is teh possibility that it isn't bait....

    In a group such as rec.motorcycles an occasional troll is not too harmful. The troll's
    game of testing the participants' astuteness is not too far in spirit from the newsgroup's
    normal banter and remarks such as ``Bad bait, too obvious'' imply the testing goes
    both way. A better troll would be admired for cleverness; the offense here was not
    trolling per se, but doing it so poorly.

    In other groups the presence of a troll can inflict quite a bit of harm by undermining
    the trust of the community. The wedding newsgroups that Ultimatego frequented
    consist of women (and a few men) from very disparate backgrounds discussing the
    planning of a highly emotional event fraught with concerns about family, tradition,
    money, and status. The culture that has evolved frowns upon any authoritative
    statement of the ``right'' way to do things and writers frame their advice with phrases
    such as ``in my opinion'' or ``it is often done this way''. Ultimatego's early posts were
    not overtly offensive, but their formal and imperative voice was at odds with the
    conversational tone of the other participants.

    One woman wrote:

        Hi Everyone, Some of my coworkers and I were wondering if it is still considered a faux pas to
        wear white to someone else's wedding. One of the girls just got married and said she noticed that
        about 20 women (400 guests) wore white outfits. It didn't bug her, but another guest commented
        about it later. thanks, Jaime (and Jet) 03-09-96

    Ultimatego responded:

        Dear Jaime,

        It is consider improper to wear white at a whedding, since it appears to compete with the bride. The
        guests were improperly dressed. It is taboo to wear black...even as a fashion statement since it is
        associated traditionally with mourning.

        Kindly,
        Cheryl.

    Had Ultimatego maintained this persona, it is quite possible that she would have been
    accepted as the wedding groups' duenna, uninvited but not entirely unwelcome.
    However, Ultimatego's facade kept slipping. She went from chilly to rude, her proper
    grammar sliding into vicious name calling. Participants who could otherwise count on
    a generally supportive reaction from the group found themselves subject to
    Ultimatego's attacks. To someone seeking advice about a painful issue, such as a
    parent who is refusing to come to the wedding, the feeling that part of the audience
    was motivated by hostility or perverse humor was inhibiting.

    Some trolls post deliberately misleading information. In rec.pets.cats a writer named
    keffo suggested deterring cats from clawing furniture and chewing on wires by
    spraying hydrogen peroxide at them. Again, the readers' reactions were mixed.
    Rec.pets.cats has had a great deal of experience with Usenet pranks and many readers
    immediately cried ``troll!''. Others believed that she was well-meaning and simply did
    not know that such a technique would be extremely painful to the cat; the fact that she
    claimed to be a girl in 8th grade helped to explain her naivete. And some readers
    thought it was a reasonable suggestion, at least until a number of more knowledgeable
    ones explained the danger to the cat's eyes. Although past experience had taught the
    readers of rec.pets.cats that ignoring hostile posts was the best approach, this case
    was a bit different:

        Personally I find her type of marginal sadism towards cats as disturbing as the more overt
        alt.t*steless stuff, in that she could actually convince people that her suggestions are harmless. Do
        people who don't wear contacts know how painful it is to get the wrong solution in their eyes? I
        think this type of insidious troll needs stamping on as much as any other, with the proviso that in this
        case it is important that other people quickly point out the cruelty of her suggestions; other trolls, I
        think, should be ignored completely.

    Responding to a troll is very tempting, especially since these posts are designed to
    incite. Yet this is where the troll can cause the most harm, by diverting the discussion
    off the newsgroup topic and into a heated argument. Instead, most groups advise
    ignoring such posts, both to keep the discussion topical and in the hope that, if
    ignored, the troll will go away. Several point newcomers to FAQs that explain how to
    use a killfile, which is a filter that allows one to avoid seeing any postings by a
    particular person or on a given topic. (Indeed, an extensive description of killfile
    techniques in a group's FAQ is a kind of virtual scar-tissue, an indication that they
    have had previous trouble with trolls or flame-wars.)

    Rebuking the offending writer privately through email is also often recommended, for
    it does not derail the group's discussion. Such a response can be quite effective in
    stopping someone whose goal was not primarily to annoy others:

        I would like to apologize, to any and all of you who downloaded the junk I posted... Again I am
        sorry and will be more carefull in the future. Oh and I would like to thank the hundreds of you sent
        me E-Mail bringing it to my attention.

                                                        - comp.cad.autocad

    though it may encourage the troll whose intent was to inflame. If, however, the writer
    uses a false name and address, such contact is not be possible.

    Responding to a troll can be costly. One may be unpleasantly insulted, as happened to
    this person who tried to explain to keffo (who, it later transpired, was actually a male
    university student) the error of her ways:

        I have tried twice to communicate with Kristen (Keffo) (by e-mail). I have found that she is nothing
        but a foul mouthed, uneducated, little girl who lacks respect for anything Adults;Education; Culture;
        Life; etc. I have received nothing but insulting profanity from this child. I explained that IF she
        wanted to be accepted by this group that she should issue a **Blanket Apology** to the group -- I
        was told what to do with my ``Blanket Apology''.''

    Others who have responded in person to newsgroup harassers have been
    mail-bombed or have had their own system administrator - or boss - contacted and
    told that they were making trouble on-line.

    Contacting the offender's system administrator is usually done as a last resort, when it
    is clear that the rules of Usenet etiquette have been transgressed. Mail to keffo's
    postmaster complaining about the increasingly hostile postings resulted in the account
    being closed:

        Actually, keffo is a male university student. I've had enough of these complaints though, so don't
        expect to hear from him again. This is the last straw.

    How seriously the system administrators or other authorities take such complaints
    varies greatly from provider to provider. Some may do nothing; others may be very
    quick to expel a user based on even a spurious complaint.

    Category deception

    Our perception of others is not one of wholly unique individuals, but of patterns of
    social categories. Our first impressions, based on brief observation, determine the
    basic social categories in which we place the new acquaintance, and which shape our
    subsequent and more detailed interpretations of their motives and behaviors [Simmel
    71]. It can take significant evidence to change this initial categorization - we are more
    likely to reinterpret the events than to re-evaluate the basic classification [Aronson
    95].

    The troll is engaging in category deception. By giving the impression of being a
    particular type - a conservative etiquette zealot helping brides avoid errors in taste, a
    young girl sharing her discoveries about cat care, an earnest college junior shopping
    for his first motorcycle - the troll manipulates the readers' initial interpretations of his
    or her postings. Only when the contradictions between the troll's actions and the
    expectations raised by the category assessment strongly conflict does the deception
    begin to unravel; when, in Goffman's performance metaphor, the troll speaks out of
    character. Still, many readers attempt to reinterpret the actions rather than disbelieve
    the identification. The decisive moment in the group's realization that the postings are
    coming from a troll is when someone offers evidence that the real person behind the
    virtual identity is at odds with the one presented.

    There are many other varieties of on-line category deception. Gender deception
    [O'Brien 97, Turkle 95] is the classic one, especially in the MUDs and in chatrooms
    where sex is a predominate topic of conversation (or at least, a very significant
    subtext to the discussion). In the Usenet newsgroups, gender deception appears to be
    much less common, except in forums where sex and gender are the main
    conversational topics. Similar category deceptions, e.g. age deception, do occur in
    Usenet; however, since many cases are not obvious, it is impossible to know how
    often or to what degree this occurs.

    What does seem to be quite common here is status enhancement. Many newsgroups
    have some exemplary model: the consummate hacker in alt.2600, the cool biker in
    rec.motorcycles, the well-built body in misc.fitness.weights. The participant who
    tries to pass as an incarnation of the ideal is closely examined by the others in the
    group. Status in these groups is prized and, for those who claim on it is legitimate (or
    who have quite thoroughly deceived the others), accepting claims of dubious
    provenance would lessen the value and exclusiveness of their own position.

        WE all know Barry is a pathetic puppy, but his recent freaking out about my posting a picture of me
        has really set him off. I have many times told him to post a picture of himself so he can put up or
        shut up about ``how ripped an huge'' he claims to be.

                                                       - misc.fitness.weights

    The verbal claim of being muscular is a conventional signal. A change in the
    environment (the advent of the Web) has made it possible to send a more reliable
    signal of muscularity - a photograph. A prominent member of the group (the author of
    the above quote) put his photograph online, thus strengthening his claim to status (the
    photo is very impressive). Most participants applauded this effort, saying that they
    found it helpful to see what another participant looked like and reassuring to know
    that this writer's claims of expertise were indeed backed by his appearance. ``Barry'',
    however, greeted it with a great deal of hostility and renewed claims of his own
    strength; he was then challenged by many others to prove his words - to back up the
    conventional verbal signal with the assessment signal of a photograph.

    In some groups the postings themselves are assessment signals for a salient trait. In
    rec.arts.poetry, aspiring poets submit their verses for critique by their peers; in
    comp.lang.perl programmers provide elegantly coded solutions in response to
    requests for help. An interesting example is alt.hackers. This is a moderated group,
    meaning that postings cannot be submitted directly to the newsgroup, but must be sent
    to the moderator, who (in ordinary moderated groups) filters out irrelevant or
    otherwise unacceptable material and posts the rest. Alt.hackers uses this mechanism,
    but without any actual moderator: to post to the group one must be able to figure out
    how to hack the news system. In such groups status claims and posturing are far less
    pervasive. This is especially noticeable in the contrast between alt.hackers and it's
    non-assessment analogue alt.2600. Posts to the former tend to be on topic and
    informative; those to the latter are often (when they are not completely off-topic)
    escalating boasts about petty criminal prowess.

        Why is it that everyone keeps posting that they can do amazing things,yet no proof has surfaced?
        Making up all this is easy because no one can rebute it, yet no one has confirmed these either. Don't
        post this crap unless you have some way of confirming it.

                                                              - alt.2600

    Impersonation

    Not all on-line deception is involves categories. Individual identity - one's claim to
    be a particular individual, either in the physical or the real world - can also be
    challenged. A particularly costly form of identity deception is impersonation. If I can
    pass as you, I can wreck havoc on your reputation, either on-line or off.

    Compared to the physical world, it is relatively easy to pass as someone else online
    since there are relatively few identity cues [7]. A surprising number of impersonated
    postings are made simply by signing the target's name, without copying the writing
    style or forging the header information. Even more surprising is how successful such
    crude imitations can be. Readers may pay little attention to the header information - or
    they may encounter the forgery in a subsequent posting, quoted without the header.

    How harmful are such impersonations depends upon how defamatory the faked
    postings are and whether readers believe the false attribution. When impersonations
    are made in a newsgroup in order to discredit one of the group's participants, the
    target is likely to notice and post a denial:

        I am very disturbed to find that after only two weeks of Internet use, I am already being
        'impersonated' by another user... Is this really so easy to do? Or did this person have to work at it?
        I discovered postings to a Newsgroup that appeared to come from me...but which in fact did not

                                                         - alt.alien.visitors

    Since Usenet postings are not necessarily read in sequence some readers may read the
    forgery and miss the one that reveals the deception. This is especially likely if the
    faked posting set off an acrimonious flame-war: many readers will simply skip the
    rest of the thread and any subsequent postings made by the apparent participants.

    Some of the most harmful impersonations are done without deliberate malice towards
    the victim, who may simply have inadvertently provided a useful identity for the
    impersonator to hide behind. New computer user are warned to guard their passwords
    carefully and to be sure to log off of public terminals. It can be very difficult to prove
    that one did not actually write the words that are clearly traceable to one's account.

        I would like to think everyone for bringing to our attention the outrageous message that was posted
        to this group several days ago... After talking with the owner of the account that generated this post.
        It has become clear that this is a case of a new user leaving the terminal before logging off. I ask that
        you please refrain from sending mail to this user (ST40L) regarding the post. He is shaken from the
        incident and has learned a valuable lesson the hard way.

                                                        - soc.culture.jewish

    In this case, the user convinced the administrators that the posting (an anti-Semitic
    letter) was forged. Still, he must deal with the fact that a message that he finds
    abhorrent went out under his name. (This is particularly unfortunate since the debut of
    searchable Usenet archives. A search for letters written by this user will turn up the
    forgery, but not clarifications written by others, such as the one above.)

    Identity concealment

    Many individual identity deceptions are acts of omission, rather than commission;
    they involve hiding one's identity.

    Sometimes identity is hidden to circumvent killfiles. Killfiles are filters that allow
    you to skip unwanted postings: if you put someone in your killfile, you will see no
    more of their postings. While killfiles may sound like the electronic version of the
    ostrich putting its head in the sand, they are said to be very effective in keeping a
    newsgroup readable. Those using a killfile no longer see the offending posts and are
    not tempted to respond, thus lowering the number of angry, off-topic postings. To the
    person who has been killfiled, Usenet becomes a corridor of frustratingly shut doors:
    one can shout, but cannot be heard. Some writers, determined to have their say,
    continuously switch the name under which their postings appear.

        I gave up trying to killfile Grubor and his myriad aliases when my filter file exceeded 10k. I am not
        joking about this. Admittedly only half was Johnny-boy; the other half was phone-sex spams. Still,
        4-5k just on one person is a little ridiculous.

                                                            - news.groups

    The killfile program looks for the account name in the header, which is usually
    inserted automatically by the posting software. The reason someone can create
    ``myriad aliases'' has to do with the transformation of the header from an assessment
    to a conventional signal.

    Until recently, header information was quite reliable. Most people accessed Usenet
    with software that inserted the account name automatically - one had to be quite
    knowledgeable to change the default data. Today, many programs simply let the writer
    fill in the name and address to be used, making posting with a false name and site is
    much easier. The astute observer may detect suspicious anomalies in the routing data
    (the record of how the letter passed through the net) that can expose a posting from a
    falsified location[8]. Yet few people are likely to look that closely at a posting unless
    they have reason to be suspicious about its provenance.

    With the header data becoming a conventional signal, such deception may be quite
    wide-spread. There are many benefits to using a pseudonym on-line and, unless the
    writer is imposing a cost on the group (i.e. being a nuisance or impersonating another
    participant) there is little reason to pay the costs of verifying each posting.

    People have many reasons for not wanting their real names to be revealed online:

        As far as letting you know my name or giving you my fingerprints or whatever else you demand, no
        I don't think so. There is more going on in this net than just misc.fitness.weights. I'm involved in the
        net war in alt.religion.scientology. Those cultists have so far raided 4 of their net critics on bogus
        copyright violation charges, and in one case they placed a large amount of LSD on the toothbrush of
        a person who was raided, a couple of days before he was to undergo a video deposition. In my city
        they have been convicted of several crimes, including infiltrating the municipal, provincial, and
        federal police forces. No, I will not give out my name just to satify your curiousity. Deal with it.

                                                       - misc.fitness.weights

    There can be real harm in being ``seen'' online. One Usenet troublemaker forwards
    postings to their authors' supervisors, claiming that they were inappropriate uses of
    the net and that the author is a troll, etc. Although the original posts are completely
    legitimate (questions about integer precision in database packages and the like) many
    managers know little about Usenet culture and will assume that the employee must
    have been doing something wrong - and doing it on company time and under the
    company name. In an online discussion about this case, several people mentioned that,
    although they had free Internet access through work, they subscribed to a commercial
    service for their personal use, particularly for Usenet discussion: ``I'd rather pay an
    ISP to maintain a home account than risk getting some nut-case harassing my
    employers''.

    Privacy is a common reason for using a pseudonym, for Usenet is an exposed public
    forum in which the writers have no control over who reads their posts. People who
    are embarrassed use pseudonyms, such as system administrators who are asking how
    to fix something with which they ought to be familiar. People who are revealing
    extremely personal data (as in alt.support.depression) or who are discussing matters
    of dubious legality (as in rec.drugs.psychedelic) often use anonymous remailers.
    Finally, some people may simply not want their participation in Usenet, no matter how
    innocuous, to be public knowledge.

    It is useful to distinguish between pseudonymity and pure anonymity. In the virtual
    world, many degrees of identification are possible. Full anonymity is one extreme of a
    continuum that runs from the totally anonymous to the thoroughly named. A
    pseudonym, though it may be untraceable to a real-world person, may have a
    well-established reputation in the virtual domain; a pseudonymous message may thus
    come with a wealth of contextual information about the sender. A purely anonymous
    message, on the other hand, stands alone.

    Anonymity (including pseudonymity) is very controversial in the on-line world. On
    one side, anonymity is touted as the savior of personal freedom, necessary to ensure
    liberty in an era of increasingly sophisticated surveillance. It ``allows people to
    develop reputations based on the quality of their ideas, rather than their job, wealth,
    age, or status.'' [May 94]. On the other side, it is condemned it as an invitation to
    anarchy, providing cover for criminals from tax-evaders to terrorists. The ``very
    purpose of anonymity'', said Supreme Court Justice Scalia, is to ``facilitate wrong by
    eliminating accountability.'' [quoted in Froomkin 95].

    There merit to both sides of the argument, much of it contingent on the distinction
    between anonymity and pseudonymity. Many of the strongest proponents of
    cryptographic privacy would agree that ``anonymous community'' is an oxymoron;
    their ideal is a pseudonymous world with merit-based reputations [May 94]. Purely
    anonymous individuals are capable of communicating with each other, but there is no
    accretion of personal histories in their interactions: reputation of any kind is
    impossible in a purely anonymous environment. The motivation for many of the
    qualities we associate with community, from cooperative behavior to creative
    endeavor, depends on the existence of distinct and persistent personas.

    An interesting question is the accountability of a pseudonymous persona. The
    sanctions to offensive on-line behavior can be roughly divided into two main
    categories: those that involve making a connection to a real world person and those
    that do not. Complaints to a system administrator or other real-world authority are in
    the former category; killfiles and public castigation are in the latter. E-mail flames are
    somewhere in-between - one must know an electronic address that the offender
    accesses in order for them to be seen at all, but that address may be quite securely
    pseudonymous in relation to the real-world identity. In an electronic environment in
    which pseudonyms are prevalent, only the sanctions that do not require a connection
    to the real world are practical. While these mechanisms can only discourage, and not
    eliminate, outlawed behavior, they can have a significant effect [Kollock & Smith 95].
 
 

The evolving virtual world

    In the world of biology, changes in signalling behavior may occur quite slowly, over
    evolutionary time. In the world of human interaction, changes can occur quite quickly.
    If excessive deception makes a signal lose its meaning, it can be replaced by a more
    reliable assessment signal or the community may begin to punish deception. In the
    virtual world, both the participants and the environment itself change: the participants
    establish new styles of interaction and the environment evolves as it is further
    designed and developed.

    Killfiles are a good example of a social action that is poorly supported by the existing
    technology. One of the basic features (or drawbacks) of Usenet is that the readers are
    invisible. On the positive side, this lends it an aura of intimacy that would quite
    possibly be lacking if each writer were viscerally aware of the enormous number of
    people who follow the newsgroup. On the negative side, it makes the fact that one is
    ignoring someone very hard to indicate. The need to publicly turn away from someone
    can be seen in the custom of sending a posting that says ``Plonk!'', in response to that
    last-straw posting that caused one to killfile someone - ``plonk'' is the sound of
    dropping the offender into the killfile.

        > Why do people feel the need to announce to the whole world that they have
        > justplonked someone? Big deal. It happens all the time. Plonk 'em and get
        > on with your life.

        ``On the Internet, no one can hear your killfile.'' Sometimes it is not only neccisary to regard
        someone as an idoit, you have to make them aware of it as well. I just wonder where they got the
        idea that killfiles have sound effects...

                                                         - alt.cypherpunks

    The counterpart of ``plonk'' is the posting that simply says ``yes, I agree!''. These
    affirmations show that a particular opinion has enthusiastic backers and they provide
    a way to indicate an affiliation to an idea or person. These are frowned upon in
    Usenet etiquette because as a full-scale posting, they require too much time and effort
    to download, given the minimal information they include.

    The online world is a wholly built environment. The architects of a virtual space -
    from the software designers to the site administrators -shape the community in a more
    profound way than do their real-world counterpart. People eat, sleep, and work in
    buildings; the buildings affect how happily they do these things. But the buildings do
    not completely control their perception of the world. In the electronic domain, the
    design of the environment is everything. Whether or not you know that other people
    are present or privy to a conversation, whether you can connect an on-line identity to
    a real-world person, whether you have only a faint notion of the personalities of those
    around you or a vibrant and detailed impression - this is all determined by the design
    of the environment.

    How can Usenet - or other discussion-based systems - be redesigned to allow for
    better communication of social cues? Systems that are able to show participants or
    participant behavior - how other readers have navigated a newsgroup or how close or
    far other readers place themselves from an idea or person - are technically feasible.
    The real question is how they would effect the Usenet community. My prediction is
    that making the social patterns more visible would increase the strength of social
    pressures, making the community both more orderly and less spontaneous. But
    predicting the social ramifications of technology is difficult, especially when the
    whole environment is in constant flux.

    For example, Usenet postings used to be ephemera, remaining available for only days
    or weeks before they disappeared from the net. Starting in 1995, several news
    archives have become available. These archives extend the lifetime of a posting
    indefinitely and, more significantly, they are searchable. One can request a listing of
    someone's entire Usenet oeuvre. Without such a search mechanism, finding all of
    someone's postings was nearly impossible: you might know that they were a frequent
    contributor to, say, the nutrition and medical groups, but have no idea that they spent
    their evenings as a verbal warrior in the ethnic disputes on soc.culture.turkey or
    writing baby-talk ``meow-chat'' postings to rec.pets.cats. The archives bring forth all
    of one's contributions for public examination, removed from the social context for
    which they were written. It involves a paradigm shift, from perceiving Usenet as a
    series of effectively private areas, bounded not by technical means but by their sheer
    numbers and parochial focus, to seeing it as a public repository of neatly
    cross-referenced postings.

    This is not necessarily a harmful development for the Usenet community. One of the
    drawbacks of the virtual world has been that one's view of others is sketchy and
    one-sided. Being able to gather a more complex image of one's fellow participants
    can deepen the social ties as the users see each other as more fully-rounded
    individuals [Sproull & Kiesler 91]. Again, prediction is tricky. As awareness of the
    new paradigm increases, people may become far more concerned with managing their
    on-line reputation, resulting in widespread use of multiple pseudonyms - and an even
    murkier view of who's who on-line.

    The Usenet reader's picture of the other participants is also being filled in by the Web.
    Whereas the archives present a documentary recording, the Web-based home page
    presents a crafted self-presentation [Donath & Robertson 94], showing how one
    wishes to appear - which can, of course, be quite inadvertently revealing [Goffman
    59]. As home pages grow increasingly elaborate, their value to their creator grows.
    While it may not be terribly costly to discard, say, a name on AOL in order to escape
    from the consequences of actions done under it, one is far less inclined to abandon an
    online presence that has taken great effort to create. With an increasing number of
    articles signed with the writer's Web page, the Usenet readers gain both a deeper
    context for understanding an author's view, and a greater commitment by participants
    in the virtual environment.

    Here again, the social ramifications may be unexpected. In a forum where a link to
    one's Web page is the norm, the opportunity to explore multiple persona's may be
    greatly curtailed (though perhaps given greater depth, if one was then motivated to
    create a elaborate series of pseudonymous portraits). For most people, one Web
    presence suffices - and it is often an official one, created for one's employer, one with
    a picture revealing age, race, gender, etc. The cost of deception would certainly be
    higher - the question remains whether that is necessarily a good thing.

    New ways of establishing and of hiding identity are evolving in the virtual world.
    There is no formula that works best in all forums: balancing privacy and
    accountability, reliability and self-expression, security and accessibility requires a
    series of compromises and trade-offs whose value is very dependent on the goals of
    the group and of the individuals that comprise it. The role of this paper has been to
    examine closely the approaches - the signals - that have developed in a very diverse
    yet technically simple environment. What we have seen is a world of complex
    interactions, one that intermingles people from disparate real-world cultures and
    disparate virtual-world cultures; a world in which the boundaries exist only as social
    mechanisms and are both fluid and surprisingly durable. It is a world in which a
    technology built for the exchange of scientific data among a small class of academics
    and professionals has evolved into a communications forum in which information is
    still exchanged, but so is support and affiliation and adolescent bonding and outbursts
    of anger. It is a world that has evolved an intricate system of signals and behaviors
    that aid in establishing identity and in controlling identity deception.

    (Draft 3.0)
 
 

Footnotes

    [1] A FAQ (Frequently Asked Questions) is a document that contains many of the
    facts and anecdotes relevant to a group; their purpose is to answer these questions
    before they are asked - yet again - in the newsgroup. A FAQ may be quite long and
    require much an effort to create and keep up to date. [Return]

    [2] Examples include "femme fatale" fireflies, brood parasites such as the cuckoo and
    the cowbird, and Batesian mimics such as the burrowing owl and the viceroy
    butterfly. "Femme fatale" fireflies are predatory females of the species Photuris who
    are able to mimic the flash pattern of females of the species Photinus. The deceptive
    Photuris female signals, the unsuspecting Photinus male approaches, and the predatory
    female attacks and eats him. Brood parasites lay their eggs in the nest of another bird.
    The unwitting adop tive parent hatches the egg and raises the parasite, often at the
    expense of its own offspring. Batesian mim ics are harmless species that imitate
    species that are repellent to predators or competitors: the Viceroy butterfly resembles
    the bad-tasting Monarch; the hissing call of the burrowing owl sounds like a rattle
    snake's rattle. [Return]

    [3] News is accessible by anyone with Internet access. How many people that is at a
    given moment is debate able, but it is agreed that the number is growing exponentially.
    (Oct 1994 estimate 13.5 million: should update this number as close to publication as
    possible - could be 10x or more this number by 1997). [Return]

    [4] Names and other identifying features have been changed. [Return]

    [5] Killfiles are used to filter out postings by people or about topics one does not
    wish to read. For more about killfiles see Identity concealment. [Return]

    [6] This is not to say that these "parts" are necessarily straightforward. See O'Brien
    97 for a discussion of the complexity of gender roles - and the added intricacy of their
    virtual manifestation. [Return]

    [7] There exists a technological solution to this problem. A digital signature can
    ensure that a message has not been altered since it was signed and, given various
    levels of certification, it can guarantee that a particular person was the signer.
    Interestingly, the certification of identity is personal trust. Individuals vouch for indi
    viduals and their personal guarantees become a part of one's digital signature. If I
    know nothing about the people who vouched for you, the guarantee is meaningless.).
    They are currently rather difficult to use, though this is a problem more of interface
    than underlying technology. As encryption and decryption become an integrated part
    of the virtual environment, the appearance of a real, vouched-for persona may begin to
    differ markedly from other, more ephemeral beings. (See [Garfinkel 95] for a full
    technical exposition). [Return]

    [8] A letter posted to Usenet is distributed through the net by being passed from the
    sender's machine through a series of Usenet sites, each of which distributes it to a
    number of other sites. When it finally reaches a particular reader's machine, it may
    have passed through 20 or more sites or "hops", each of which records its name on the
    header of the posting. While the exact route a posting from A-B will take is not
    predictable (one of the distinctive technological features of the Internet is its ability to
    re-route itself around down machine and clogged regions), obvious peculiarities in
    the route are signs of a forged message.

****