You are on page 1of 14

What’s in a Name?

Some Reections
on the Sociology of Anonymity

Gary T. Marx
Department of Sociology, University of Colorado, Boulder, Colorado, USA

ª You ought to have some papers to show who you are,º


To paraphrase Mark Twain, reports of either the recent death the police of® cer advised me.
or coming dominance of anonymity have been greatly exaggerated. ª I do not need any paper. I know who I am,º I said.
This article is a beginning effort to lay out some of the concep- ª Maybe so. Other people are also interested in knowing
tual landscape needed to better understand anonymity and iden- who you are.º
ti® ability in contemporary life. I suggest seven types of identity Ð B. Traven, The Death Ship
knowledge, involving legal name, location, symbols linked and not
linked back to these through intermediaries, distinctive appear- A major consequence of new surveillance and commu-
ance and behavior patterns, social categorization, and certi® cation nications technologies is the potential both to decrease and
via knowledge or artifacts. I identify a number of major rationales increase anonymity. Powerful surveillance technologies
and contexts for anonymity (free ¯ ow of communication, protec- can inexpensively, ef® ciently, and silently break through
tion, experimentation) and identi® ability (e.g., accountability, reci- borders that have historically protected anonymity and
procity, eligibility) and suggest a principle of truth in the nature other aspects of personal information.1 Anonymity may
of naming, which holds that those who use pseudonyms on the In- also be undermined by new biometric forms of identi® ca-
ternet in personal communications have an obligation to indicate
tion such as DNA, retinal, voice, and olfactory patterns.
they are doing so. I also suggest 13 procedural questions to guide
the development and assessment of any internet policy regarding
The ease of merging previously unrelated data and creat-
anonymity. ing permanent records via audio and video recordings may
also reduce the de facto anonymity that resulted from the
absence of an observer, the failure of memory, and weak
Keywords anonymity, electronic communication, ethics, identi® ca- means of data analysis. The ª ocular proofº demanded by
tion, privacy, pseudonymity, surveillance Othello of his wife’s in® delity comes in an ever-expanding
variety of forms.
Received 25 November 1997; accepted 30 August 1998. In contrast, new ways of communicating using encryp-
Gary T. Marx was a fellow at the Woodrow Wilson International tion and through Internet services, which offer the op-
Center for Scholars, Washington, DC, to whom he is grateful for the portunity to use pseudonyms and forwarding services that
wonderful environment in which this article was prepared. He is also strip all identifying marks, may increase some forms of
grateful to Terry Bynum and Ann Wood for their extensive comments anonymity. The personal identity of interlocutors is more
and to several ª anonymousº reviewers for this journal. dif® cult to ascertain, absent other sensory cues or codes
Versions of this paper were delivered at a conference on Anony- for authentication. The newness also means that neither
mous Communication on the Net, Irvine, CA, American Associa- formal nor informal norms have suf® ciently developed.
tion for the Advancement of Science, November 1997, and at their The issue of anonymous communication on the Net is
annual meetings in Philadelphia. This draws from a forthcoming book
part of a broader set of surveillance issues that includes
Windows into the Soul: Surveillance and Society in an Age of High
Technology, based on the American Sociological Association-Duke
the ubiquitous ª cookiesº question as well (cookies are re-
University Jensen Lectures. mote programs that can monitor a web page user’ s on-line
Address correspondence to Gary T. Marx, 4615 New Sweden behavior and can even invade the user’ s hard drive without
Avenue, Bainbridge Island, WA 98110, USA. E-mail: Gary.Marx the user’ s knowledge or consent). These in turn are part of
@Colorado.edu. Web: http://socsci.colorado.edu /« marxg/garyhome. the still larger issue of visibility and insulation in a society
html undergoing rapid technological change.
The Information Society, 15:99±112, 1999
Copyright ° c 1999 Taylor & Francis
0197-2243 /99 $12.00 + .00 99
100 G. T. MARX

To paraphrase Mark Twain, reports of either the re- ing the fact that particular information exists (e.g., that a
cent death or coming dominance of anonymity have been pseudonym is in use) and to its content.
greatly exaggerated.2 We are as ill-served by sweeping Ironically, anonymity is fundamentally social. Ano-
statements about the end of privacy as we are about the nymity requires an audience of at least one person. One
appearance of a golden age of technologically protected cannot be anonymous on top of a mountain if there is no
communication. The systematic study of computers, pri- form of interaction with others and if no one is aware of
vacy, and anonymity is in its infancy. Conceptually, the the person. Compare the solitude of the Beach Boys’ song
multiple dimensions involved here have not been speci- ª In My Room,º a lonely, introspective, plaint to unrequited
® ed, nor of course have they been measured in a systematic love, to Petula Clark’s desire to experience the freedom
empirical fashion that would permit reaching broad con- of being ª Downtownº where ª no one knows your name.º
clusions. The situation is also dynamicÐ research docu- While similar, only the latter is an example of anonymity.6
menting a clear problem (or its absence) can be a factor in
subsequent developments. SEVEN TYPES OF IDENTITY KNOWLEDGE
This article lays out some of the conceptual landscape
surrounding anonymity and identi® ability in contempo- Identity knowledge has multiple components and there
rary society. The emphasis is on the cultural levelÐ on are degrees of identi® ability. At least seven broad types
normative expectations and justi® cations, more than on of identity knowledge can be speci® ed (Table 1). These
describing actual behavior. 3 It is also on the anonymity are (1) legal name, (2) locatability, (3) pseudonyms that
of individuals rather than of groups or organizations. (Of can be linked to legal name and/or locatabilityÐ literally
course these may be linked, as with in® ltrators using a form of pseudo-anonymity, (4) pseudonyms that cannot
pseudonyms working for false-front intelligence agencies.) be linked to other forms of identity knowledgeÐ the equi-
I offer some de® nitions and conceptual distinctions valent of ª realº anonymity (except that the name chosen
and identify seven dimensions of identity knowledge. I may hint at some aspects of ª realº identity),7 (5) pattern
specify social settings where the opposing values of anony- knowledge, (6) social categorization, and (7) symbols of
mity or identi® ability are required by law, policy, or social eligibility/noneligibility.
expectations. I then suggest 13 questions re¯ ecting seve- 1. Identi® cation may involve a person’ s legal name.
ral ethical traditions to guide policy development and as- Even though names such as John Smith may be
sessment in this area. While the tone of the article is widely shared, the assumption is made that there
tentative in the face of the rapidity of change and the is only one John Smith born to particular parents at
complexity of the issues, I conclude by offering one broad a given time and place. Name usually involves con-
principle involving truth in the nature of naming that I nection to a biological or social lineage and can be
think should apply to computer mediated personal com- a key to a vast amount of other information. It tends
munications. to convey a literal meaning (e.g., the child of Joseph
and Mary). This aspect of identi® cation is usually
DEFINITIONS AND CONCEPTS the answer to the question ª Who are you?º
The use of ® rst names only, as was said to tradi-
Let us ® rst de® ne anonymity and relate it to privacy, con- tionally be the case for both providers and clients
® dentiality, and secrecy. Anonymity is one polar value of in houses of ill repute, can offer partial anonymity.
a broad dimension of identi® ability versus nonidenti® abi- The question of whether full, last, ® rst, or no name is
lity. To be fully anonymous means that a person cannot expected in social settings may appear to be a trivial
be identi® ed according to any of the seven dimensions
of identity knowledge to be discussed later.4 This in turn
is part of a broader variable involving the concealment TABLE 1
and revelation of personal information and of information Types of identity knowledge
more generally.5 1. Legal name
Identity knowledge is an aspect of informational pri-
2. Locatability
vacy. The latter involves the expectation that individuals
3. Pseudonyms linked to name or location
should be able to control information about themselves. 4. Pseudonyms that are not linked to name or location
Privacy can be differentiated from con® dentiality, which a. For policy reasons
involves a relationship of trust between two or more peo- b. Audience does not realize it’s a pseudonym
ple in which personal information is known but is not to
5. Pattern knowledge
be revealed to others, or is to be revealed only under res-
6. Social categorization
tricted conditions. Secrecy refers to a broader category
7. Symbols of eligibility/noneligibility
of information protection. It can refer to both withhold-
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 101

issue that only a sociologist could love.8 But it is essarily the same as being unknown. Some infor-
in fact the kind of little detail in which big social mation is always evident in face-to-face interaction,
meanings may reside. because we are all ambulatory autobiographies con-
2. Identi® cation can refer to a person’ s address. This tinuously and unavoidably emitting data for others’
involves location and ª reachability,º whether in ac- senses and machines. The uncontrollable leakage
tual or cyberspace (a telephone number, a mail or of some information is a condition of physical and
e-mail address, an account number). This need not social existence. This has been greatly expanded by
involve knowing the actual identity or even a pseudo- new technologies. The patterned conditions of urban
nym. But it does involve the ability to locate and take life mean that we identify many persons we don’ t
various forms of action, such as blocking, grant- ª knowº (that is, we know neither their names, nor
ing access, delivering or picking up, charging, pe- do we know them personally). In everyday encoun-
nalizing, rewarding, or apprehending. 9 It answers a ters (say, riding the subway each day at 8 a.m.) we
ª whereº rather than a ª whoº question.10 This can may come to ª knowº other riders in the sense of re-
be complicated by more than one person using the cognizing them. Skilled graf® ti writers may become
same address. well known by their ª tagsº (signed nicknames) or
3. Identi® cation may involve alphabetic or numerical just their distinctive style, even as their real identity
symbols such as a social security number or bio- is unknown to most persons (Ferrell, 1996). Persons
metric patterns or pseudonyms that can be linked making anonymous postings to a computer bulletin
back to a person or an address under restricted con- board may come to be ª knownº by others because
ditions. A trusted intermediary and con® dential- of the content, tone, or style of their communica-
ity are often involved here. These in effect create tions. Similarly, detectives may attribute reoccurring
a buffer and are a compromise solution in which crimes to a given individual even though they don’ t
some protection is given to literal identity or loca- know the person’ s name (e.g., the Unabomber, the
tion, while meeting needs for some degree of iden- Son of Sam, the Red Light Bandit, Jack the Ripper).
ti® cation. As with name, the symbol is intended to There are also prosocial examples, such as anony-
refer to only one individual (but unlike a given name, mous donors with a history of giving in predictable
which can be shared, letters and numbers are suf® - ways that makes them ª knownº to charities. They
cient as unique identi® ers, whereas when there is are anonymous in the sense that their name and lo-
more than one John Smith in question, unique iden- cation is not known, but they are different from the
tity requires matching to other aspects of identity, anonymous donor who gives only once.
such as birth date and parents or address). 11 Exam- 6. Identi® cation may involve social categorization.
ples include the number given to persons calling tip Many sources of identity are social and do not differ-
hot lines for a reward, anonymous bank accounts, entiate the individual from others sharing them (e.g.,
on-line services that permit the use of pseudonyms gender, ethnicity, religion, age, class, education, re-
in chat rooms and on bulletin boards, and represen- gion, sexual orientation, linguistic patterns, organi-
tations of biometric patterns. zational memberships and classi® cations, health sta-
4. Identi® cation may involve symbols, names, or tus, employment, leisure activities). Simply being
pseudonyms that cannot in the normal course of at certain places at particular times can also be a key
events be linked back to a person or an address by to presumed identity.
intermediaries. This may be because of a protective 7. Identi® cation may involve certi® cation in which the
policy against collecting the information. For exam- possession of knowledge (secret passwords, codes)
ple, in some states those tested for AIDS are given a or artifacts (tickets, badges, tattoos, uniforms) or
number and receive results by calling in their num- skills (performances such as the ability to swim) la-
ber without ever giving their name or address. Or bels one as a particular kind of person to be treated
it may be because a duped audience does not know in a given way. This is categorical and identi® es
that the person they are dealing with is using fraud- the possessor as an eligible or ineligible person with
ulent identi® cationÐ for example spies, undercover no necessary reference to anything more (although
operatives, and con artists.12 the codes and symbols can be highly differentiated
5. Identi® cation may be made by reference to distinc- with respect to categories of person and levels of eli-
tive appearance or behavior patterns of persons gibility). This is vital to contemporary discussions
whose actual identity or locatability is not known because it offers a way of balancing control of per-
(whether because of the impersonal conditions of sonal information with legitimate needs such as for
urban life or secrecy). Being unnamed is not nec- reimbursement (e.g., toll roads, phones, photocopy
102 G. T. MARX

machines, subways) and excluding system abusers.


Smart-card technologies with encryption and seg-
· News media sources such as ª Deep Throatº
of Watergate ill fame.
mentation make this form of increased importance. · Unsigned or pseudonymous political com-
munications. 15

Socially Sanctioned Contexts of Concealment · The use of pen names and the nom de
plume. 16
and Revelation
· Groups investigating human rights and
other abuses and those reporting to them
What is the ecology or ® eld of identity revelation/conceal-
ment? How are these distributed in social space and time? (including mass media investigative re-
What structures and processes can be identi® ed? When porters and social reform groups using
and why does society require or expect (whether by laws, stings and in® ltration).
policies, or manners) that various aspects of identity will 2. To obtain personal information for research in which
not be revealed? Under what conditions does the opposite persons are assumed not to want to give publicly
applyÐ that is, when is the revelation of the various aspects attributable answers or data. For example:
of identity expected by law, policy, or custom? · Studies of sexual and criminal behavior
and other social research.17
The lists that follow, while not exhaustive, hopefully
cover the most common contexts in which anonymity and · Informational audits.
identi® ability are viewed as socially desirable. I have clas- · Medical research.
3. To encourage attention to the content of a mes-
si® ed these by their major justi® cations (Table 2).
sage or behavior rather than to the nominal char-
acteristics of the messenger which may detract
Rationales in Support of (Full or Partial) Anonymity.13
from that. For example, persons with a well-known
1. To facilitate the ¯ ow of information and communi- public reputation writing in a different area may
cation on public issues (this is the ª if you kill the want to avoid being ª typecastº or having their rep-
messenger you won’ t hear the bad newsº rationale). utations affected or not taken seriously (a profes-
Some examples: sor who writes detective stories, a religious leader
· Hot lines for reporting problems and vio-
lations, various communication channels
who writes about her doubts about religion). In the
words of ªAnonymous,º the author of Primary Col-
for whistle-blowers. ors, ª I wanted the book to be reviewed, not the au-
· Witnesses at Congressional hearings or in
investigative media reports who are visible
thor.º Another example is for dramatic reasons, to
® t cultural images of what a stage name should be
behind a screen and whose voice may be or to enhance presumed marketability, as with ® lm
electronically distorted.14 stars changing ethnic minority names to short An-
glicized names (Bernard Schwartz to Tony Curtis,
Issur Danielovitch to Isidore Demsky to Kirk Dou-
TABLE 2 glas, or strippers with names such as Candy Barr,
Rationales for anonymity Blaze Star, and Beverly Hills).18
4. To encourage reporting, information seeking, com-
1. To facilitate the ¯ ow of information
municating, sharing, and self help for conditions
2. To obtain personal information for research
that are stigmatizing and/or that can put the per-
3. To encourage attention to the content of the message
son at a strategic disadvantage or are simply very
4. To encourage reporting, information seeking, and self-help
personal. Some examples are:
5. To obtain a resource or encourage action
involving illegality · Self-help requests and discussion and sup-
port groups for alcohol, drug, and family
6. To protect donors or those taking controversial but
abuse, sexual identity, mental and physical
socially useful action
illness.
7. To protect strategic economic interests
8. To protect one’ s time, space, and person · Tests for AIDS and other socially transmit-
ted sexual diseases, pregnancy.
9. To aid judgments based on speci® ed criteria
10. To protect reputation and assets · Sociability experiences among persons
who are shy or uncomfortable in face-to-
11. To avoid persecution
face interaction.
12. To enhance rituals, games, play, and celebrations
13. To encourage experimentation and risk-taking · Communicating about personal problems
and issues with technologically distanced
14. To protect personhood
(and presumably safer) strangers (Virnoche,
15. Traditional expectations
1997).
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 103

· Posting personal information such as


course grades in a public place using stu-
mining programs that correlate personal character-
istics of the consumer, context of purchase, and bar-
dent ID numbers. 19 coded sales, consumers may be more subject to ma-
5. To obtain a resource or encourage a condition us- nipulation. The gap here between being known only
ing means that involve illegality or are morally im- as ª occupantº versus being a participant in a fre-
pugnable, but in which the goal sought is seen as quent shopper program is large (although for some
the lesser evil. For example: persons this is compensated for by savings and in-
· Amnesty programs for the return of contra-
band (guns, stolen goods), ª no questions
dividualized information about their consumption
interests).
asked.º 8. To protect one’ s time, space, and person from un-
· Needle exchange programs. wanted intrusions.22 For example:
· Spies and undercover operatives (includ- · Unlisted phone numbers.
ing on-line stings using pseudonyms). · Opposition to caller-ID unless there is a
· The Federal Witness Protection Program. blocking option.23
6. To protect donors of a resource or those taking
action seen as necessary but unpopular from sub-
· Women using a neutral or male name or
an initial rather rather than a ® rst name in
sequent obligations, demands, labeling, entangle- phone and other directories, or wearing a
ments or retribution. Some examples are: veil or clothes that conceal feminine dis-
· Anonymous gift giving to charitable or- tinctiveness.
ganizations in which donors are protected
from additional demands or advertising
· Post of® ce box addresses identi® ed only
by number.
their wealth. The Judeo-Christian ethic, · Mail forward services.24
which makes virtue its own reward, sup-
ports this. The ª secret Santa,º in which
· Providing only minimal information on
warranty cards. 25
persons bring anonymous gifts to be ran-
domly distributed, is a variant.20
· Giving a fake name, or refusing to give
one’ s name when seeking commercial in-
· Sperm and egg donors, birth parents giving formation.
a child up for adoption. · Celebrities who don’ t want to be recog-
· Hiding the identity of judges of competi-
tions and in courts to protect them from
nized using assumed names and the clicheÂ
of wearing dark glasses. 26
inappropriate in¯ uence (whether persua- 9. To increase the likelihood that judgments and de-
sion, coercion or bribes) and retribution.21 cision making will be carried out according to des-
· Hangmen in England wore hoods, in part
to protect them from retaliation but per-
ignated standards and not personal characteristics
deemed to be irrelevant. For example:
haps also to enhance the drama. · Having musicians competing for orchestra
· Identi® cation numbers rather than names
worn by police.
positions perform behind a screen so that
judges can not see them.27
7. To protect strategic economic interests, whether as
a buyer or a seller. For example, a developer may
· The blind reviewing of articles for schol-
arly journals or grading student exams.
be quietly purchasing small parcels of land under
an assumed name or names, in preparation for a
· Reviewing college applications with names
and gender deleted.28
coming development (a shopping mall, university 10. To protect reputation and assets. The ª theft of
expansion, transportation system) that has not been identityº and sending of inauthentic messages has
publicly announced. A company in ® nancial dif® - emerged as a signi® cant by-product of the expan-
culty may attempt to sell goods or services under sion of electronically mediated (vs. face-to-face)
another name to avoid letting customers know how interactions. For example:
desperate it is to sell. In silent (or loud) auctions
bidders are identi® ed by a number and in the latter
· The free service set up by a Florida pro-
grammer ª FAKEMAILº in which thou-
case it may not be known who the person holding sands of bogus e-mail messages were sent
the number represents. The autonomy of individ- out using names such as Bill Clinton.
ual consumers may be enhanced when they pay
with cash or a money order, rather than an identity-
· The spreading of a variety of violations as-
sociated with the theft of identity or the cre-
revealing check, credit card, or frequent shopper ation of ® ctitious identities (Marx, 1990;
card. When merchants can use ® ne-grained data- Cavoukian, 1996).
104 G. T. MARX

11. To avoid persecution. For example: information) as trust in a relationship evolves. One
· Runaway slaves. shows respect for the other by not asking, and the
· Jews, Romanies, leftists, and homosexuals
during the Nazi period.
other is permitted the symbolic and instrumental
option of being able to volunteer it.
· Those subject to human rights violations
by repressive regimes.
The United States has particularly strong ex-
pectations here as seen in the limited conditions
12. To enhance rituals, games, play, and celebrations. under which police can require that persons iden-
Letting loose, pretending, and playing new roles tify themselves (although the California-inspired
are seen as factors in mental and social health. Part pseudo-gemeineschaft of ª hi, I’ m Bill your waiterº
of the fun and suspense of the game is not knowing might seem to contradict that). Behavior as a con-
who. For example: sumer also ® ts here. Beyond not wanting to reveal
· Halloween masks, masked balls, costume
parties, role reversal rituals in traditional
identity information that can be used in marketing,
many persons feel that the kinds of liquor, birth con-
societies re¯ ect this. Mardi Gras celebra- trol, medicines, magazines, or electronic products
tions that involve masks and cross dressing they purchase should be revealed at their discretion
are an example. and not electronically taken from them.
· The preparations around surprise parties
and some of the actual guests (though in
15. Traditional expectations. This is a bit different
from the preceding item because the custom that
this case there may be a move from anony- is honored does not appear to have emerged from a
mity or a deceptive ID to actual identi® ca- reasoned policy decision, but rather is an artifact of
tion at the gathering).29 the way a technology developed or the way group
· Some board and computer games involve
lack of clarity as to identity (either or both
life evolved. This then becomes associated with
expectations about what is normal or natural, and
the real identity of the players and hidden hence expected and preferred.
identity in the game), on-line role-playing The telephone is a good example. When caller-
and fantasy in which service providers of- ID was announced there was signi® cant public re-
fer a limited number of pseudonyms. sistance because people were accustomed to be-
13. To encourage experimentation and risk taking with- ing able to make a phone call without having to
out facing large consequences, risk of failure or em- reveal their phone number (and all it could be as-
barrassment since one’ s identity is protected. This sociated with). Caller-ID as it was ® rst offered,
is a kind of cost-free test drive of alternative iden- without blocking, changed that. Those who ar-
tities, behavior and reading material (the anti-chill gued against this were often unaware of the his-
justi® cation). For example: torical recency of their ability to phone anony-
· Pretending to be of a different gender, eth-
nicity, sexual preference, political persua-
mously. In an earlier time period when all calls
went through a local operator, this was not possible.
sion, etc. in on-line communication. The move to automatic switching was not under-
· Commercial invitations to try a product or
service free for a limited period of time
taken to enhance privacy, but because it was more
ef® cient.30 One’ s ª rightº to mail a ® rst-class letter
(although of course there is likely to be at anonymously emerged simply because at the time
least some identity trail here). the relevant postal regulations were established, the
14. To protect personhood or ª it’s none of your busi- issue of accountability of the sender was not seen
ness.º What is central here is not some instrumental as relevant. A return address was recommended,
goal as with most of the preceding items, but sim- but that was only as an aid for undeliverable let-
ply the autonomy of the person. This can be an ters (and perhaps as an incentive for recipients who
aspect of manners and involves an expectation of until 1855 had to pay the cost of the letters they
anonymity as part of respect for the dignity of the received). A postmark has always been required
person and recognition of the fact that the revelation but that appears to be more as a means of holding
of personal information is tied to intimacy (Marx, postal authorities accountable.
1994). While the revelation of name, address, or
phone number is hardly an act of profound inti- Mention may also be made of some related contexts in
macy, it is nonetheless personal. In many contexts, which anonymity is present simply because the conditions
particularly those in public involving secondary or of complex urban life permit it.31 For example (absent the
formal relations, the decision to reveal these is new technologies), not being easily identi® ed or having to
up to the individual and can be viewed as a kind identify oneself when in public is the default conditionÐ
of currency exchange (along with other personal whether sitting on a park bench, 32 walking on a crowded
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 105

street, or cheering in a stadium. Beyond there being no TABLE 3


expectation that the individual must identify him- or her- Rationales for identi® ability
self in public settings, a request from a stranger for such
identi® cation would be taken as unusual and off-putting, 1. Accountability
as would the stranger’ s offering of his or her personal iden- 2. Reputation
ti® cation information, other factors being equal (of course, 3. Dues paying and just deserts
in the quasi-public setting of a singles bar that is not the 4. Organizational appetites
case). 5. Bureaucratic eligibility
Here we encounter the interesting case of expectations 6. Interaction mediated by space and time
of privacy in public (Nissenbaum, 1997). There is an irony 7. Longitudinal research
in norms of privacy having particular cogency in public set- 8. Health and consumer protection
tings. While not codi® ed, manners in public settings and 9. Currency of friendship and intimacy
in encounters with strangers limit what can be asked of 10. Social orientation to strangers
the other and support what Erving Goffman (1963) terms
disattending. One aspect of this is to help others avoid
embarrassment and to help sustain a person’ s self-image cation, the majority of interactions of any signi® cance or
and the image presented to others of being a particular kind duration tilt toward identi® cation of at least some form. As
of person, even when the facts suggest the opposite. Here Scottish moral philosophers such as David Hume argued,
we may distinguish between not having identity knowl- human sentiments and social needs favor it. It is more
edge versus having it but pretending that one does notÐ dif® cult to do ill to others when we know who they are
granting a kind of pseudoanonymity. This may be to avoid and must face the possibility of confronting them. Mutual
unwanted claims or to collude in helping others maintain revelation is a sign of good faith that makes it easier to trust
a positive image of self. David Karp’ s (1973) study of the (not unlike the handshake, whose origin reportedly was to
privacy-sustaining behavior of patrons and employees in show that one was not carrying a weapon). It is a kind of
pornographic book stores is an example. sampling of one’ s inner worth or an early showing of part
A related case is not taking advantage of available iden- of one’ s hand. It also makes possible reciprocity, perhaps
tity information. This factor was emphasized by Simmel the most signi® cant of social processes. To paraphrase a
(1964) in commenting on the urban dweller’s tendency line from the ® lm ª Love Story,º ª being anonymous means
to screen out information and distance oneself from you never have to say you are sorry,º and that of course is
the abundance of sensory stimuli offered by busy city one of the problems.
environments. Thinking of society without personal identities is like
Another environment where a degree of de facto anony- a modern building without a foundation. The number of
mity exists is in being away from homeÐ whether as a contexts where identity is expected and even required far
tourist, traveler, or expatriate. Not only is one less likely exceeds those where its opposite is required or expected.
to be personally known, but many of the symbols (accent, Indeed, failure to identify oneself often leads to suspicion
dress, body language) that present clues to identity will rather than the reverse. As with the Lone Ranger, we ask
go uninterpreted or simply serve to put one in the broad ª Who was that masked man?º Just try the simple experi-
class of foreigner.33 Since the stranger may be seeking this ment of wearing a hood or Halloween mask throughout the
anonymity, locals may have an economic or political inter- day and note how it will surface the usually tacit norms
est in granting it. It would be interesting to study isolated regarding identi® cation and a variety of control responses.
areas and frontier towns in this regardÐ note the small Central to many of the contexts where some form of
Western town where the fugitive in the novel The Falcon identi® ability is required or at least expected, we ® nd34
and the Snowman lived (Lindsey, 1985) and was eventu- (Table 3):
ally captured, in which there was a tradition of not asking
who people were, or where they came from. 1. To aid in accountability.35 Saints and those with
strongly internalized moral codes respect the rules
regardless of whether or not they are watched (or
Rationales in Support of IdentiŽability
potentially locatable). But for others who can re-
A consideration of contexts and rationales where anony- sist anything but temptation, especially if under
mity is permitted or required must be balanced by a consid- cover of anonymity, this is less likely. Because
eration of the opposite. When is identi® ability required, individuals generally want others to think well of
expected or permitted? them and/or to avoid negative sanctions, normative
The rationales here seem simpler, clearer, and less dis- behavior is more likely when people are identi® -
puted. While there are buffers and degrees of identi® - able. One extreme form is the antimask laws of
106 G. T. MARX

some states (adopted as an anti-Ku Klux Klan stra- acteristics linkedto name and place.A characteristic
tegy). The numbers on police badges are intended of modern society is ever-increased differentiation
to hold police accountable while creating a buffer and the proliferation of ® ne-grained categories for
in their personal life from irate citizens. Contrast treating persons and of requirements for being able
that with the names worn by airline clerks and to perform various roles. This is believed to in-
on the legitimacy-con® rming badges of door-to- volve both ef® ciency and justice. These require
door solicitors.36 The current emphasis on identi- unique identities, although not necessarily actual
fying and tracking absent fathers with children names. But the latter is seen to enhance validity
supported by welfare is another example of beyond being an organizational peg. Compare, for
accountability. example, the evolution of the contemporary wallet
2. To judge reputation. In contrast to the small homo- with its space for multiple cards, with the paucity of
geneous group without strangers, mass impersonal identi® cation documents required in the 19th cen-
societies rely on name and the records and recom- tury and earlier, simpler carrying devices.
mendations it can be associated with, to determine 6. To guarantee interactions that are distanced or me-
personal qualities. In small communities where diated by time and space. This is the case with or-
membership itself is a form of vouching, these are dering by credit card or paying with a check rather
taken for granted. than cash (of course, various types of impersonal
3. To pay dues or receive just deserts. Reciprocity is vouchers such as a postal mail order offer alterna-
among the most fundamental of social forms, and tives). However, even in the latter case an address
it requires being able to locate those we interact is frequently needed to deliver goods or to handle
with. An identity peg makes it possible to have complaints and disputes. It used to be that one
guarantees (such as collateral for a loan), to ex- could simply call and make a restaurant reserva-
tract payments (of whatever sort), and to distribute tion (often using as a nom de plume the name of a
justice and rewards, although this need not always famous scholar or author). Then restaurants began
involve literal identity. asking for phone numbers and now some even re-
4. To aid ef® ciency and improve service. The modern quire a credit card number to hold the place. Such
ethos and competitive environments view knowl- identity becomes an alternative to the generalized
edge as power and generate seemingly insatiable trust more characteristic of small communities.
organizational appetites for personal information 7. To aid research. Research may bene® t from links to
to serve organizational ends and, in their words, other types of personal data. Longitudinal research
ª to better serve the customer.º 37 The extent of this may require tracking unique individuals, although
was brought home to me recently when I purchased identity can be masked with statistical techniques,
some batteries at Radio Shack with cash and was as a recent National Academy of Sciences (1995)
asked for my phone number. Perhaps the case was study recommends.
stronger with the dry cleaners I next took my clothes 8. To protect health and consumers. Health and con-
to (although the numbered receipt had always been sumer protection may require identifying individ-
suf® cient before). The clerk’s matter-of-fact man- uals with particular predispositions or experiences
ner in asking for my name and phone number and such as exposure to a substance discovered to be
cheery response ª You are a new customer, aren’ t toxic or purchasers of a product later found to have
you?º overwhelmed whatever hesitancy I might a safety defect. Concern over genetic predisposi-
have had about giving out an unlisted number.38 tions to illness may be one reason why records are
But it did not begin to match my surprise when a kept (if often con® dential) of sperm and egg donors
waiter looking down at his hand-held computer at or birth parents giving a child up for adoption. The
a restaurant I had not been to for six months asked, need to identify persons in death (as with the DNA
ª Would you like the salmon you had last time?º samples required of those in the military,40 which
The overstuffed warranty cards we are asked to ® ll are to be used only for that purpose) and the need
out offer another example. to obtain personal information helpful in a medical
5. To determine bureaucratic eligibilityÐto vote, drive emergency are other examples.
a car, ® x the sink, cut hair, do surgery, work with 9. To aid in relationship building. The currency of
children, collect bene® ts, enter or exit (whether friendship and intimacy is a reciprocal, gradual
national borders, 39 bars, or adult cinemas). Ad- revealing of personal information that starts with
ministrative needs in a complex division of labor name and location. Here information is a resource
require differentiation and complex norm enforce- like a down payment, but it also has a symbolic
ment, which in turn may depend on personal char- meaning beyond its speci® c content.
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 107

10. To aid in social orientation. It used to be said at if better data were available, but the issue would not dis-
baseball stadiums, ª You can’ t tell the players with- appear because the value con¯ icts and varied social and
out a programº (although we have seen a move psychological pressures remain.
from numbers to names on jerseys). More broadly, A wonderful cartoon shows a tanker truck with a sign
social orientation to strangers and social regulation on the back that says, ª The scienti® c community is di-
are aided by the clues about other aspects of iden- vided about this stuff. Some think it is hazardous. Some
tity presumed to be revealed by name and location don’ t.º So it is with this issue. The divisions do not re-
(e.g., ethnicity, religion, life style). ¯ ect ignorance, stupidity, ill will, and evil on one side and
empirical truth, wisdom, benevolence, and righteousness
on the other. Rather, they re¯ ect empirical truths on both
BUT IS IT GOOD OR BAD?
sides and differing value priorities. Being able to disentan-
You’ ve got to accentuate the positive gle these is vital for our understanding and for developing
eliminate the negative policy.
and look out for Mr. In-Between.
Ð 1950s popular song
Easier sung than done. The key issue for ethics and public ONE SIZE DOES NOT FIT ALL: SOME QUESTIONS
policy is, under what conditions is it right or wrong to favor TO INFORM POLICY FORMATION
anonymity or identi® ability? As the preceding examples I have cast a broad net in order to help locate networked
suggest, there are many contexts in which most persons communication within a wider social context. Apart from
would agree that some form of anonymity or identi® ability the value con¯ icts, one can hardly move directly to clarion
is desirable. But there are others where we encounter a guidelines from this, for a number of reasons involving the
thicket of moral ambiguity and competing rationales and great variety with respect to:
where a balancing act may be called for.
The public policy questions raised by technologies for 1. Types and degrees of identity knowledge.
collecting personal information are more controversial than 2. Types of communicator/recipient (children and other
many other issues such as ending poverty and disease, dependents, responsible and irresponsible adults,
in which the con¯ ict involves asking ª howº rather than law enforcers, persons vulnerable to retribution for
ª why.º The questions raised by the concealment and reve- reporting wrong-doing, those seeking information
lation of personal information are like some relationships vs. those from whom information is sought, send-
in which persons cannot live with each other, but neither ing information/communication vs. receiving it).
can they live apart. The issue becomes, under what condi- 3. The structure of communication (one-on-one, one-
tions do they coexist? So it is with anonymity and identi® - to-many, many-to-one, and reciprocal or nonrecip-
ability. There are existential dilemmas, and in many cases rocal, real or stale time, moderated and unmoderated
we are sentenced to a life of trade-offs. groups).
I often ask my students what society would be like if 4. Types of activity (browsing, requesting informa-
there was absolute transparency and no individual con- tion, posting on bulletin boards, e-mail, discussion
trol over personal informationÐ if everything that could groups).
be known about a person was available to anyone who 5. Content/goals (games, self-help groups, hot lines,
wanted to know. Conversely, what would society be like commerce, politics, science, protecting the sender
if there was absolute opaqueness such that nothing could of a communication or the recipient).
be known about anyone except what they chose to reveal? 6. The national and cultural borders that communica-
The absolute anonymity versus absolute identi® ability is tion invisibly crosses. 41
a strand of this. Both, of course, would be impossible and 7. Types of response (prohibit, require, optional but
equally unlivable, but for different reasons. To have to favor or disfavor, laws, policies, manners).
choose between repression and anarchy is hardly a choice
between a pillow and a soft place. Policies will vary and may change as conditions change.
The hopeful Enlightenment notion that with knowledge Even if one could agree on a computer policy regarding
problems will be solved holds more clearly for certain anonymity, there is no central net authority to implement
classes of physical and natural science questions than for it, and technically doing this would be dif® cult.
many social questions. Certainly those who live by the Laws to set outer limits with sanctions to aid compli-
pursuit of truth dare not rain on that parade. Yet there is a ance, policy criteria for more focused direction, technolo-
difference between knowledge as providing answers ver- gies to protect and authenticate identi® cation, and markets
sus wisdom. Current debates over anonymity and identi® - to enhance choice all have a role to play, as do manners
ability in electronic communications would greatly bene® t and custom.
108 G. T. MARX

While I don’ t want to suggest content for a prohibiting or Can the recipient respond in kind to the message
unleashing policy (with one exception), I will remain true sender?
to the generalizing impulse by focusing on procedures and
criteria for policy development. In that regard, the more
HONESTY IN CYBERSAPCE
one can answer ª yesº to the following questions, the better
a policy regarding identity knowledge is likely to be.42 The complexities and varied situations should make us sus-
These questions embody a variety of ethical rules. Ques- picious of sweeping imperatives. Policies must be crafted
tions 1±6 call for truth in the form of good science and to speci® c contexts. In the context of one-to-one personal
logic. Questions 7±9 draw on utilitarianism in minimizing communications in cyberspace, I think a strong case can
harm and maximizing bene® ts. The remaining questions be made that there should be a truth in the nature of nam-
(10±13) put forth ethical principles such as those involving ing policy. Certainly, as the preceding rationales suggest,
the dignity and rights of the individual. there are many contexts in which persons ought to be free
to call themselves whomever they want (assuming they
1. GoalsÐ Have the goals sought been clearly stated don’ t steal someone else’s identity or use a ® ctitious iden-
and weighted? tity for the purpose of harming or violating the rights of
2. Can science save us?Ð Can a strong empirical and others). Legal name is not always the preferred form of
logical case be made that a given policy regarding identity. But if there is not to be honesty in identi® cation,
identi® ability will in fact have the broad conse- then there should at least be honesty in indicating that a
quences its advocates claim? pseudonym is used.
3. ReversibilityÐ If subsequent evidence suggests If one is anonymous or uses a name that is obviously
that undesirable consequences outweigh the desir- not one’ s legal name (ª Minnie Mouse,º ª the Red Baron,º
able, can the policy be easily reversed? ª Ernest Hemingwayº ) or in which there is no pretense
4. Technical system strengthÐ Can the system, whe- to genuine identity (e.g., initials or ® rst names or 007)
ther hardware, software, or humanware, in fact de- or is in a setting where all participants know the use of
liver on the policy (that is, guarantee anonymity or pseudonyms is accepted or even expected, this is not an is-
the authenticity of a communicator’s identity)? sue. However, in most other contexts of personal relations
5. Sanctioning and revelationÐ If anonymous or where regular-sounding ® rst and last names are used as
pseudo-anonymous users violate the rules, are there pseudonyms, our culture has embedded ª identity normsº
clear standards and procedures for when they will about authenticity in personal interaction (Goffman,
be cut off and for when (and to whom) pseudoano- 1963).
nymous identities will be revealed? Absent special conditions, people are expected to be
6. System testsÐ Are there periodic efforts to test the who they claim to be. When a false name is used and
system’ s vulnerability and effectiveness and to re- discovered, as in the extreme case with con artists, the
view the policy? problem is not only material loss, but the sense of being
7. AlternativesÐ If alternative solutions are available duped and even betrayed. To pretend to be another is to
that would meet the same ends, is this the least deceive the actor and audience. It is unfair in introducing
costly? inequality into what should be an equal, reciprocal rela-
8. Unintended consequencesÐ Has adequate consid- tionship (the deceiver knows your name and that he or she
eration been given to likely/possible undesirable is deceiving you, but you don’ t know that, nor do you know
consequences? the real name of the deceiver). I think respect for the per-
9. Third partiesÐ Will innocent third parties not be son being communicated with and their expectation that
hurt by the policy, and if they will are there ways they will not be deceived should outweigh any freedom
to mitigate the harm? and liberty claims of the secret user of a pseudonym. 43
10. Democratic policy developmentÐ Have partici- The fact that cyberspace makes it so relatively easy to
pants played some role in the development of the secretly use pseudonyms in personal communications is
policy? hardly a justi® cation, even if it is a temptation. I do not
11. Informed consentÐ Are participants fully apprai- argue against the use of pseudonyms or means of identi® -
sed of the rules regarding identity knowledge un- cation other than legal name in personal communication,
der which the system operates? If they don’ t like but recipients of the communication should be informed
the rules, can they ® nd other equivalent places to when such is the case. Certainly in many contexts what
communicate? matters is continuity of personhood and the validity of
12. Golden ruleÐ Would the sender of the message be the claims the individual makes (whether of the ability to
comfortable receiving a message in the same form pay for something or of access to relevant resources or of
if the context was reversed? expertise and experience) and the person’ s legitimacy to
13. EqualityÐ Is use of the form of identi® cation equ- perform a particular role. Legal name may be irrelevant,
ally available to all parties to the communication? but veri® cation is not. The crucial issue then becomes
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 109

authentication of the pseudonymity. Smart cards and new


crypto protocols may make this easier.
· Freedom of expression and the right not to be de-
famed or harassed.
Modern technology offers a variety of ways of uncou-
pling veri® cation from unique identity. Validity, authen-
· Honesty
macy.
in communications and civility/diplo-

ticity, and eligibility can be determined without having


to know a person’ s name or location. Public policy de-
· Creativity and experimentation versus exploita-
tion and irresponsible behavior.
bates will increasingly focus on when veri® cation with
anonymity is or is not appropriate and on various inter-
· Encouragement
cess.
of whistle-blowing and due pro-

mediary mechanisms that offer pseudonymous buffers but


not full severance. Since the cognitive appetite is dif® cult
· The right to know and the right to control personal
information.
to sate, organizations will push for more rather than less
information on individuals, although they will not neces-
· The universalistic treatment due citizens and the
ef® ciency of ® ne-honed personal differentiations.
sarily want to share their information with each other.
But the availability of new technologies does not negate
· The
alone.
desire to be noticed and the need to be left

my argument against deception in those contexts where a


realistic-sounding name is offered in personal communi- Whatever action is taken, there are likely costs and
cation (of course, one can also make problematic just when gains. At best we can hope to ® nd a compass rather than a
map, and a moving equilibrium rather than a ® xed point.
a communication is personal).
Continued empirical research and policy and ethical analy-
Knowing that a pseudonym is in use permits specula-
tion as to whether or not this is appropriate and if it isn’ t, sis are central to this. The process of continual intellectual
why the veil might be in place and discounting, or quali- engagement with the issues is as important as the content
fying, the message. Such forewarning will often suggest of the solutions.
the need for greater caution than when a person’ s actual
name is used. In face-to-face interaction we have visual NOTES
and auditory cues to assess strangers; even then, common
1. A more developed statement of the new surveillance and its ex-
sense advises caution. How much truer that is when we
pression in the maximum security society is in Marx (1988, chap. 10).
lack these in cyberspace and have even less grounds for
See also the discussions in Rule (1973), Foucault (1977), Laudon
knowing the identity of strangers and if they are who they (1986), Clarke (1988), Gandy (1993), and Lyon (1994; Lyon & Zureik,
claim to be. Good manners (and in some contexts the law) 1996).
require not deceiving those we interact with about our iden- 2. One point noted by neither the ª Chicken Littlesº nor the ª Can-
tity. If this holds for conventional interactions, it should didesº is that in a free-market economy these move in tandem, if with
also hold for those mediated by technology. We are enti- lags. Caller-ID brings caller-ID blocks, anonymous forwarding ser-
tled to know when we are dealing with a pseudonymous vices, and call forwarding (which means that the caller no longer knows
identity in personal commnunications. 44 where the person called really is, even though they have a number by
In presenting this article, the truth in the nature of nam- which the person can be reached). The initial easy overhearing of cell
ing argument has often been misunderstood. I am not and cordless radio phone transmissions was soon made more dif® cult
by adding encryption.
saying that anonymous or pseudonymous communication
3. The holding of cultural beliefs can of course be seen as a kind
on the net should be banned. I am saying that if the latter is
of behavior and the beliefs I describe are inferred from behavior. This
present in personal communications, then the recipient has article suggests the kinds of quantitative data that ought to be gathered
a right to be informed of it. This does not go as far as some on actual behavior.
computer networks such as the WELL, which have a pol- 4. It would be easier to just use ª anonymity,º but that can lead us
icy against any anonymous or pseudonymous communica- to ignore the fact that there are continua with multiple dimensions and
tion. Certainly the latter can be a means of protecting one’ s that our knowledge will be deeper if we contrast it to ª identi® abilityº .
privacy in interactions with organizations, or when one The term identity knowledge is intended to include both and is less
is seeking information from a web site. Those contexts, cumbersome than ª anonymity±identi® ability.º Identity data might also
however, are different from personal communications. be used.
As the competing rationales discussed suggest, there are 5. This topic is an important strand of the sociology of personal
information, which is part of the broader sub® eld of the sociology of in-
value con¯ icts (and con¯ icting needs and consequences)
formation, which nestles within the still wider ® eld of the sociology of
here that make it dif® cult to take a broad and consistent po-
knowledge. Current developments in the area of personal identi® cation
sition in favor of or against anonymity. Some of these are: are a droplet in the sea change of information collection, processing,
and communication we are currently experiencing. Developments in
· Liberty and order. biometric identi® cation and smart card technology along with global-
· Community andandindividualism.
Accountability privacy. ization bring these issues to the surface. The debate over national ID
· cards is one element of this (Bennett, 1997; Davies, 1995).
110 G. T. MARX

6. There may be a rough parallel here to the question, ª Is there a 14. Court testimony is an interesting contrasting case. In general,
sound if a tree falls in the forest and no one is there to hear it?º I don’ t witnesses must be identi® ed and one has the right to confront ac-
know, but I do know that for anonymity to be present there must be a cusers. This is a response to the historic star-chamber, inquisition, and
person aware of the presence of another, or of actions for whom the witch-hunt abuses. This contrasts with the grand jury, which does not
identity of the responsible agent is unknown. Sometimes, of course, it is offer anonymity but does offer con® dentiality. Grants of immunity
not clear whether a human agent is responsible, as with some livestock in some ways are functionally equivalent to guarantees of anony-
killings. In rare contexts of intrigue and conspiracy, ª ® nding the guy mity. British courts sometimes permit witnesses to testify behind a
behind the guyº is like peeling an onion or nested Russian dolls in curtain.
which there is in® nite regress, and like soap bubbles they evaporate in 15. In McIntyre, executor of Estate of McIntyre, Deceased v. Ohio
your hand just as you think you have grasped them. Elections Commission, 19 April 1995, the Supreme Court held that
7. Undercover operatives, for example, are encouraged to take the First Amendment protects the anonymity of political documents
names close to their own. Gordon was originally an Anglo-Saxon name and that individuals can not be compelled to reveal their name on
but it became so popular with Jewish name changers that it came to be such documents. Justice Black in Talley v. California 362, U.S. 60,64
seen by many persons as a Jewish name (Kaplan & Bernays, 1997). (1960) claimed that ª Anonymous pamphlets, lea¯ ets, brochures and
8. Class and status issues apply here. For example, in 19th-century even books have played an important role in the progress of mankind.º
Britain some upper-class persons referred to their servants with generic The Federalist Papers are an often cited example. In contrast, Justice
names (thus butlers might be called Fred). Referring to Afro-Americans Scalia is ª sureº that ª a person who is required to put his name to a docu-
as ª boyº or ª girlº is related. This, like the uniforms of total institutions, ment is much less likely to lie than one who can lie anonymously.º To be
dehumanizes in its massi® cation and failure to uniquely identify and identi® ed as the author of a document ª promot[es] a civil and digni® ed
implicitly denies that there is anything worthy of unique note about the level of . . . debateº while anonymity ª facilitates wrong by eliminat-
person. But in offering a kind of anonymity it also tilts toward privacy. ing accountability, which is ordinarily the very purpose of anonymityº
9. The anonymous Finnish remailing service of Johan Helsingius, (McIntyre ibid.) It would be useful to submit such claims to systematic
for example, permitted recipients of anonymous communication to re- empirical test. Both are likely correct, but until the limiting conditions
spond. The name of the anonymous sender was known but kept secret are speci® ed we are left at the level of argument by assertion. A vital
(at least until Helsingius responded to a police request for the name distinction is between putting one’ s name on a document and whether
of a user posting information about the Church of Scientology). In or not that is con® dential. It is dif® cult to argue that one who puts
contrast, a California call-forwarding service (an anti-caller-ID device) his or her name on a letter of recommendation that will not be treated
automatically erases the originating phone number. The need to bill con® dentially ª is much less likely to lie.º
clients may make masking identity more dif® cult. 16. As with political communication, this partly comes under the
10. The ª whereº question need not be linked with the ª whoº ques- protection of the First Amendment. The hiding of an author’ s identity
tion. Thus the identity of fugitives is known but not how they can be may of course serve other purposes, such as marketing or avoiding
reached. Even with both known they may be unreachable, as when prohibitions on writing, as with the black-listed Hollywood writers, or
there is no extradition treaty or they are otherwise protected. For ex- female authors in the 19th century (e.g., George Sands).
ample the United States knew that Robert Vesco was in Cuba but was 17. Protection of human subjects legislation mandates con® den-
unable to arrest him there. tiality, regardless of whether federal funds are involved. This means
11. In ª Doin’ My Timeº Johnny Cash sings, ª On this old rock pile, identity is anonymous for public audiences, even if it may be initially
with a ball and chain, they call me by a number, not a name.º While known by the researchers. This example also illustrateshow anonymity
more precise and distinctive, the number may be experienced as dehu- is a socially determined property of relationships rather than something
manizing in its failure to more directly convey meaning. It is quicker inherent.
and easier to know people by their names than by a number. This may 18. A related category is persons who legally change their name.
be part of a strategy of control, as in total institutions (Goffman, 1961). For example, the boyfriend who arranged to have injury done to skater
Yet unlike other tactics such as wearing uniforms or shaving heads, this Tonya Harding’ s rival changed his name after his prison sentence. This
remains a unique identi® er even as its compulsory nature symbolically becomes the functional equivalent of a pseudonym for persons encoun-
re¯ ects power differences. tering him who are unaware of the name change. His action led to a
12. Marx (1990) considers the stimulus to fraudulent identi® cation lawsuit by a person with the same name as his new one.
from recent developments in communications technology. 19. Here the pseudonym works as a kind of secret code. But when a
13. I make these observations as a social observer and not as a social security number is used, as it often is, this creates the possibility
moralist or empiricist (in the sense of subjecting claims to some kind of theft of ID.
of empirical standard). I argue neither that these justi® cations are nec- 20. Here, however, the goal seems to be more to protect the feel-
essarily good, nor that the claimed empirical consequences (and no ings of those not able to afford expensive gifts than to protect the most
unintended or other consequences) necessarily follow. To have a pony privileged. John Marshall’s effort to have judges wear black robes as a
in those races requires analysis beyond the scope of this article. Here I means of ® ghting against classdistinctions is a relateddeindividualizing
simply take claimed justi® cations at face value and report them. This is move (Smith, 1996). An interesting contrast is with donors to polit-
a ® rst step to empirically testing such claims. Three additional tasks in- ical campaigns, who must be identi® ed, and the maneuvering around
volve (1) trying to ® nd a pattern in the attachment of moral evaluations de® ning what are obviously political groups as nonpro® ts exempt from
to the various forms of behavior, (2) sytematically relating the types of taxes and regulation.
identity knowledge in Table 1 to the rationales in Tables 2 and 3, and 21. This is a classic example of the trade-offs with this complicated
(3) as a citizen taking a moral position on what it is that the society has issue. These advantages may be purchased at a cost of accountability
normatively offered up regarding identity knowledge. on the judge’ s part. Note the recent revelations (and retrenchment)
REFLECTIONS ON THE SOCIOLOGY OF ANONYMITY 111

in Peru with respect to ª faceless courtsº concerned with terrorism in from those where the anonymity remains undiscovered or the person
which judges wore hoods or sat behind one-way mirrors. Claims that behind the mask remains undiscovered.
innocent persons were convicted and unduly severe sentences given out 30. Certainly it is possible to ® nd rationales against unrestricted
are now being considered by an appeals commission (New York Times, caller-ID. But these came after the ability to make anonymous phone
15 October 1997). calls was taken away, rather than being factors that initially produced
22. Of course, for most of these there are also illegitimate reasons it.
for wanting anonymity. But my emphasis here is on socially valued 31. This discussion is generally restricted to contexts of purposive
forms of anonymity. Caller-ID is a nice example of the complexity. anonymity where a just® cation is present or appears after the fact to
Certainly abused partners in safe houses should be permitted to have a further justify practices that have been customary. In contrast, in an
caller-ID block, while those who have abused them (if under juridical example of what might be called the unplanned conditions of compli-
supervision) should be prohibited from having it. cated life, most of the enormous quantity of literary works attributed to
23. The strength of popular sentiment here surprised the phone com- ª anonymousº are that way not out of an interest in hiding identity, but
panies, which initially offered the service with no blocking option. because the author’ s name was never recorded or has been lost.
24. Recent developments such as e-mail and call forwarding are 32. This was not the case in the former East Germany, where the
interesting in that although one may be able to ª locateº another for Stasi could collect samples of a person’s smell by rubbing a park bench
communication, that need not imply knowing where they are in a geo- with a cloth and storing it for later identi® cation by dogs, should it be
graphic sense. Traditionally with a phone number, area codes and pre- necessary.
® xes gave a clue to location, but with call forwarding they no longer do. 33. However, from a juridical standpoint, nonnatives (relative to
In the same way, most e-mail systems permit those with an address to citizens) may also be subject to greater needs to identify themselves at
use any symbols, whether a name or numbers, as a header, and e-mail the hands of the state via passports, visas, and identity cards.
may be forwarded without the sender’s knowledge. It is interesting 34. The list is far from exhaustive, and these may overlap, but I
that very rarely do individuals use other than their name. That is likely think it does touch the major categories.
to change as knowledge of how to misuse personal information via 35. One related factor noted by Simmel (1964) and documented
computers spreads. by contemporary research is the size of the group. Latane and Darley
25. I recently purchased an electric razor, which came with a war- (1970) and later researchersreport more responsible bystander behavior
ranty card and 24 marketing research questions to answer. Nowhere with smaller size groups. Of course, the smaller the size, the less likely
does it say that answering the questions is independent of the warranty. it is that the individual will be fully anonymous, but size appears to be
In the best democratic tradition, it informs me that ª returning this card an independent factor.
ensures that your voice will be heard,º since ª to deliver products that 36. I have been unable to ® nd a pattern in what telephone recep-
meet your changing needs, we must understand the types of people who tionists revealÐ some will open with a full name, some with only a ® rst
buy [our] products.º But in much smaller print, which I had to use a name, some with operator 24, and some the company name. If you
magnifying glass to read, ª your answers will . . . allow you to receive ask for their name as validation of your call and the information they
important mailings and special offers from a number of ® ne companies offered, you may or may not be successful.
whose products and services relate directly to the speci® c interests, 37. This contrast highlights another distinction: who offers the ra-
hobbies and other information indicated above.º However, there is a tionale, who seeks anonymity or identi® ability. In this case an organi-
chance to ª opt outº : ª Please check here if for some reason you would zation’s rationale for wanting the information to better serve its ends
prefer not [their italics] to participate in this opportunity.º While I favor may con¯ ict with the ends of the individual, who may view this very
democracy, I am not sure my needs are changing, and it is unclear insatiability as a reason for wanting anonymity. This suggests a four-
how receiving information from ª ® ne companiesº will help with my fold typology involving agreement or disagreement between suppliers
shaving needs (even if they were changing), nor that in turning down and consumers of the information with respect to the desirability of
an offer to receive more junk mail I have opted not ª to participate in providing or not providing identity information.
[an] opportunity.º The oblique recognition of privacy interests (ª if for 38. I assume the request was primarily for record-keeping purposes
some reasonº ), however sugar-coated and adspeak, does acknowledge and was better than asking for social security number. It certainly has
the possibility of saying ª noº to the collection of personal information no bearing on the quality of the dry cleaning. It may also have been
in irrelevant contexts. for promotional and marketing research purposes, given the vast data
26. But of course there is ambivalence here, and this is time and sources accessible from name and phone number.
place speci® c. Their essence also depends on their being recognized. 39. Compare the B. Traven quote at the start of the paper with
There are parallels re revelation and concealment for those engaged in another foreign traveler’s encounter with police: ª It’s strange . . . how,
illegal activities who also need clients and yet need to be protected. ever since I discovered that my passport was gone, I’ve felt only half
Note both their need and contempt for the paparazzi. alive. But it’s a very depressing thing in a place like this to have
27. Where the proof is in the consumption, as with listening to no proof of who you are, you knowº (Bowles, 1978, p. 164). Here
music or in a pie-eating or wine-tasting contest, this may be a good we see the eternal duality between identity residing in the re¯ ections
idea. For many complicated personnel decisions where reputation is a we obtain from others versus some primordial, presocial self. There
central factor beyond some immediate demonstration of dexterity, it is is also the interesting case of the ª Nansenº passport, which was an
impossible. of® cial document that said the holder was a person without an of® cial
28. A University of California Regent has proposed that these not passport.
be factors in admission. 40. Two marines who refused to provide this were court maritaled.
29. The socially elapsed time periods are an interesting variable. They claimed their DNA was personal and should not be taken from
Cases where there is an endpoint of revelation differ in important ways them and doubted it would only be used for the stated purpose.
112 G. T. MARX

41. The relative looseness and tolerance of the United States is of Ferrell, J. 1996. Crimes of style: Urban graf® ti and the politics of
note here and may mean higher rates of identity shielding and alter- criminality. Boston: Northeastern University Press.
ation and greater acceptance of these than is the case in most of the Foucault, M. 1977. Discipline and punish: The birth of the prison. New
world. The United States makes it easy to hide and change identities York: Vintage.
relative to Europe and Asia. For example, we do not need to carry and Gandy, O. 1993. The panoptic sort. Boulder, CO: Westview Press.
produce a national ID card or register with the local police when we Goffman, E. 1961. Asylums: Essays on the social situation of the mental
change addresses, we are not given a never-to-be-changed ID number patient. New York: Anchor.
at birth (although recent requirements for children to have social secu- Goffman, E. 1963. Stigma: Notes on the management of spoiled iden-
rity numbers comes close), and it is legally rather easy to change one’ s tity. Englewood Cliffs, NJ: Prentice Hall.
name. The value of a fresh beginning, likely supported by the idea of Kaplan, J., and Bernays, A. 1997. The Laguage of Names. New York:
coming to a new world and the frontier, also supports this. As a result, Simon and Schuster.
we may also go to greater lengths to ® nd out who people really areÐ Karp, D. 1973. Hiding in pornographic bookstores. Urban Life and
note greater U.S. reliance on private detectives, undercover operations, Culture January.
and wiretapping. Perhaps as a result, there is a greater appetite for Latane, B., and J. Darley. 1970. The unresponsive bystander: Why
gossip or curiosity about others in the United States than in EuropeÐ doesn’ t he help? New York: Appleton-Century-Crofts.
note the attention to the sexual activities of celebrities and politicians, Laudon, K. 1986. The dossier society: Value choices in the design
the talk-show revelations, and Hollywood-inspired publications such of national information systems. New York: Columbia University
as Con® dential Magazine. On the other hand, there are the British Press.
tabloids and the paparazzi. Lindsey, R. 1985. The falcon and the snowman. New York: Simon and
42. The discussion that follows is informed by Marx (1998). Schuster.
43. The more personal and sustained the interaction, the stronger Lyon, D. 1994. The electronic eye. The rise of surveillance society.
the expectation. Thus, to dress in drag on a public street is differ- Cambridge, England: Polity Press.
ent from making social friends in a bar with a person unaware of the Lyon, D., and E. Zureik, eds. 1996. Computers, surveillance and pri-
deception. To use a non-ethnic-sounding name to avoid employment vacy. Minneapolis: University of Minnesota Press.
discrimination is different from using a pseudonym with closefriends. Marx, G. 1988. Undercover: Police surveillance in America. Berkeley:
44. As Bok (1978) argues, honesty ought to be the default value. University of California Press.
Where there are exceptions, as with law enforcement or less frequently Marx, G. 1990. Fraudulent identi® cation and biography. In School
investigative journalism, the case must be af® rmatively made for why an of Justice Studies, Arizona State University, New directions in the
exception is needed, and there must be appropriate reviews, oversight, study of law and social control. New York: Plenum Press. pp. 143±
165.
and minimization of the degree of deception.
Marx, G. 1994. New telecommunication technologies require new man-
ners. Telecommunications Policy 18:
Marx, G. 1998. An ethics for the new surveillance. The Information
REFERENCES
Society 14(3):171±185.
Bennett, C. J. 1997. Pick a card: Surveillance, smart identi® cation and National Academy of Sciences. 1995. Private lives and public poli-
the structure of advanced industrial states. Paper presented at the cies. Con® dentiality and access to information in a free society.
1997 Canadian Political Science Association Annual Meetings, St. Washington, DC: National Academy of Sciences Report.
John’ s, Newfoundland. Nissenbaum, H. 1997. Toward an approach to privacy in public: Chal-
Bok, S. 1978. Lying: Moral choice in public and private life. New lenges of information technology. Ethics and Behavior 7(3):
York: Pantheon. Rule, J. 1973. Private lives, public surveillance. London: Allen-
Bowles, P. 1978. The sheltering sky. New York: Ecco Press. Lane.
Cavoukian, A. 1996. The theft of identity. Of® ce of Privacy Commis- Simmel, G. 1964. The sociology of Georg Simmel, ed. K. Wolff.
sioner, Ontario, Canada. New York: Free Press.
Clarke, R. 1988. Information technology and dataveillance. Communi- Smith, R. E. 1996. John Marshall, de® ner of a nation. New York: H.
cations of the ACM 31:29±45. Holt.
Davies, S. 1995. A case of mistaken identity: An international study of Virnoche, M. 1997. When a stranger calls: Strange making technolo-
identity cards. Toronto: Information and Privacy Commissioner of gies and the transformation of the stranger. Paper delivered at Paci® c
Ontario. Sociological Association Meetings. San Francisco, CA.

You might also like