Fact-checked by Grok 2 weeks ago

WikiScanner

WikiScanner is a publicly accessible online tool created by American programmer Virgil Griffith in 2007 that matches anonymous edits on Wikipedia articles to the IP addresses of the computers used, thereby attributing those changes to specific organizations, governments, or institutions. The tool operates by cross-referencing Wikipedia's publicly available edit history with databases of known IP address ranges owned by corporations, agencies, and other entities, enabling users to search for edits linked to particular organizations or browse by article. Griffith developed WikiScanner to promote transparency and combat undisclosed conflicts of interest in Wikipedia's collaborative editing process, arguing that revealing institutional origins of edits would encourage accountability and reduce manipulative alterations. Upon its release, WikiScanner uncovered numerous examples of self-serving edits, such as computers at the CIA altering entries on the Iraq War to downplay casualty figures, Diebold employees removing criticism of their voting machines, and various corporations excising negative information about their products or practices from Wikipedia pages. Government networks, including those from the U.S. FBI, Canadian parliamentary offices, and others, were also implicated in politically motivated changes, such as softening critiques of policies or historical events. These revelations sparked widespread media attention and debates about Wikipedia's vulnerability to biased editing by powerful actors, challenging assumptions of the platform's impartiality and prompting calls for stricter policies on anonymous contributions from institutional IPs. Although Griffith discontinued the original site in 2007 due to high operational costs, the tool's legacy influenced subsequent efforts to monitor Wikipedia edits and underscored the importance of provenance in crowd-sourced knowledge repositories.

Development and Background

Creator and Initial Motivation

Virgil Griffith, a researcher in computation and neural systems who was pursuing graduate studies at the California Institute of Technology, developed WikiScanner as a software tool to trace anonymous Wikipedia edits back to their originating IP addresses and associated organizations. Released publicly on August 14, 2007, the tool cross-referenced Wikipedia's edit history with databases of known IP ranges from corporations, governments, and other institutions, enabling users to identify potential conflicts of interest in article modifications. Griffith, who had previously worked as an undergraduate researcher at the Santa Fe Institute, built the initial version using publicly available data without Wikipedia's direct involvement or endorsement. Griffith's stated motivation combined a desire to expose institutional influence on Wikipedia content with a more pointed intent to generate scrutiny for entities he viewed unfavorably. In interviews following the launch, he described developing WikiScanner "to create minor disasters for companies and organizations I dislike (and) to see what 'gets fixed.'" This approach aimed to highlight instances of self-serving edits, such as corporations softening critical coverage of themselves or governments altering politically sensitive entries, thereby deterring future manipulations and promoting greater in the encyclopedia's collaborative process. While Griffith acknowledged the tool's potential to reduce and sabotage on , his emphasis on targeted "disasters" reflected a rather than a purely neutral auditing mechanism, aligning with his self-described role as a "troublemaker" in probing institutional behaviors.

Launch and Early Iterations

WikiScanner was publicly released on August 14, 2007, by , a graduate student in computation and neural systems at the and researcher at the . The tool consisted of a searchable that correlated anonymous Wikipedia edits with originating addresses, mapping them to organizations or entities via lookups and other . This initial version processed millions of edits, enabling users to identify patterns such as corporate or governmental alterations to articles. The launch prompted rapid media coverage, with Wired News reporting on the tool the same day, highlighting revelations like edits from CIA computers to articles on the and from Diebold to its own election machine entry. and soon followed, documenting instances of insider editing by corporations, political groups, and institutions, which fueled discussions on Wikipedia's neutrality. Griffith stated that the scanner aimed to promote by exposing potential conflicts of in collaborative editing. Early iterations faced operational challenges, including high server costs exceeding several thousand USD monthly, leading Griffith to temporarily take the site offline shortly after launch. By July , Griffith introduced WikiScanner 2.0, incorporating enhancements such as automated detection of "interesting" edits—those potentially self-serving or biased—and integration with trademark databases to better link edits to specific companies. This update also included a companion tool for broader anonymity probing, reflecting iterative improvements to efficiency and scope while maintaining the core IP-tracing mechanism.

Technical Functionality

Core Mechanism and Data Sources

WikiScanner's core mechanism relied on Wikipedia's public edit history to extract IP addresses associated with anonymous edits, then mapping those addresses to organizational owners via external databases. This cross-referencing process created a searchable repository linking edits to entities such as corporations, governments, or institutions based on IP allocation records. The tool processed Wikipedia's full archive of anonymous contributions, which logged the originating IP for each change without requiring user registration. For its initial release in August 2007, WikiScanner analyzed approximately 34.4 million such edits, recorded between February 7, 2002, and August 4, 2007, from 2.668 million unique IP addresses. These logs were accessible through Wikipedia's article history features, providing a verifiable trail of timestamps, edit summaries, and IPs for every unattributed modification. To identify IP owners, the system drew from IP geolocation and databases, including commercial tools like IP2Location software, which correlated addresses with roughly 187,500 organizations. Public regional Internet registries, such as those maintaining allocation data, supplemented this by detailing IP block ownership assigned to specific networks or entities. This dual-database approach—Wikipedia's edit records paired with IP ownership mappings—enabled queries by organization name to surface relevant edits, though it could not distinguish individual users within a network. The mechanism inherently limited analysis to anonymous edits, excluding those by logged-in accounts, which Wikipedia attributes to usernames rather than IPs, thereby preserving editor pseudonymity in those cases.

Features and Limitations in Operation

WikiScanner operated by cross-referencing IP addresses from anonymous Wikipedia edits with public databases such as ARIN and RIPE to identify the originating organizations or entities. Users could search the tool's database, which contained over 34 million entries linking edits to specific institutions, allowing quick identification of potential conflicts of interest in article modifications. The interface enabled queries by organization name, IP address, or article topic, displaying timestamps, edit summaries, and the associated Wikipedia revisions for transparency. Key operational features included automated detection of edits from corporate or governmental networks, highlighting instances where entities appeared to alter content related to themselves or competitors, such as removals of negative information. It focused exclusively on anonymous edits, excluding those by registered users, and relied on Wikipedia's publicly available edit history dumps for data processing. In practice, the tool facilitated real-time scrutiny during its active period, with updates like WikiScanner 2.0 in adding improved edit prioritization to surface suspicious changes more efficiently. Despite these capabilities, WikiScanner had significant limitations in accuracy and scope due to the inherent challenges of IP-based attribution. It could not pinpoint individual editors, only associating edits with broad networks or organizations, which often encompassed thousands of users and led to ambiguous attributions. False positives were common, as IP ownership databases might misattribute addresses from shared public , dynamic assignments, or outdated records, while false negatives occurred when editors used proxies, VPNs, or to mask their origins. The tool's reliance on static IP registries meant it struggled with mobile or residential IPs, reducing reliability for non-institutional edits. Additionally, it ceased active maintenance after initial releases, limiting its ability to handle evolving data formats or incorporate newer tracing methods.

Key Discoveries

Edits from Corporations and Industries

WikiScanner revealed numerous instances of edits to Wikipedia articles originating from IP addresses associated with corporate networks, often appearing to serve the interests of the editing organizations by removing critical content or altering portrayals. These findings, publicized in August 2007 shortly after the tool's launch, highlighted patterns of self-interested modifications, such as downplaying controversies or competitors' advantages, though companies frequently attributed such actions to unauthorized employee use rather than official policy. One prominent example involved Diebold, a manufacturer of machines, where edits from a company computer in 2005 removed paragraphs criticizing the security vulnerabilities of its systems, including references to documented exploits demonstrated at a . Similarly, computers were used in to edit the article, softening descriptions of wildlife damage by changing phrases like "killed thousands of sea otters, birds and seals" to more neutral language emphasizing cleanup efforts and compensation paid. Edits from PepsiCo's network targeted the by deleting sections on health risks associated with and links, while Wal-Mart computers in 2005 modified entries on employee compensation and labor practices, attempting to reframe criticisms of low wages and union opposition as balanced disputes. Dell's corporate edited on and allegations, removing accusations of pre-installing tracking software on PCs, and Anheuser-Busch (owner of ) altered the entry to replace "orcas" with "killer whales" and excise a paragraph on concerns, with an employee later acknowledging responsibility on the 's talk page. Competitive editing also emerged, as computers in Apple's IP range added negative commentary to Microsoft-related articles, such as emphasizing antitrust issues, while Microsoft-linked edits reciprocated by highlighting Apple's product flaws. The attempted to update its own entry with promotional product details, but these were reverted for lacking neutrality. Such disclosures prompted varied corporate responses, including policy reviews on engagement, underscoring the tool's role in exposing potential conflicts in anonymous contributions from industry sources.

Edits from Government and Political Entities

WikiScanner revealed numerous anonymous edits originating from IP addresses associated with agencies and political organizations, often involving alterations to articles on sensitive political or military topics. While many such edits were routine or neutral, several instances suggested efforts to mitigate criticism or reshape narratives in favor of the editing entities. For example, computers linked to the U.S. (CIA) were used on August 15, 2003, to modify the entry on the U.S.-led invasion of , removing a reference to civilian casualties in a graphic detailing war deaths. Similarly, CIA-linked edits altered the article on former CIA Director , changing the description of his 1996 death from drowning under suspicious circumstances to explicitly state it as suicide. Edits from the U.S. (FBI) targeted the article, deleting passages that described it as a prison and emphasized its controversial status, with changes occurring around 2006. In , over 11,000 Wikipedia modifications were traced to IP addresses from government offices, including the and Environment Canada, with notable activity involving articles on parliamentarians and policy issues as of August 2007. Political party affiliations also surfaced in WikiScanner data, such as edits from a U.S. computer in 2003 that replaced "occupying forces" with "liberating forces" in the article to portray the post-invasion role more positively. These discoveries highlighted potential conflicts of interest, prompting scrutiny over whether government and partisan actors were leveraging anonymous editing to influence public records, though defenders argued some changes corrected inaccuracies without overt bias.

Other Notable Institutional Edits

WikiScanner revealed numerous edits originating from IP addresses associated with academic institutions, often involving alterations to articles on topics. For instance, computers on the University of Florida's network were used to make changes that insulted rival universities or questioned the validity of other schools' rankings, as documented in analyses of over 100 edits traced to UF IPs between 2004 and 2007. Similarly, IP addresses were linked to approximately 4,150 Wikipedia modifications, including potentially self-serving updates to entries unrelated to UH but reflective of institutional access patterns. These findings highlighted how university networks facilitated anonymous edits that could promote or defend institutional interests, though IP tracing alone does not confirm the editors' affiliations or intentions. Edits from religious organizations drew particular scrutiny for removing critical content. Computers tied to the were used to excise negative references from the organization's article, such as descriptions of its practices as abusive or cult-like, with multiple instances occurring in 2006 and early 2007. In one case, a Scientology-linked edit deleted a paragraph labeling the church's tactics as potentially harmful. Likewise, a State IP address was employed on August 14, 2006, to delete evidence from the article on leader implicating him in a 1972 IRA car bombing, replacing it with a neutral statement that no evidence existed. Such modifications underscored patterns of institutional self-censorship, where edits softened controversies tied to the editing entity's profile.

Reception and Reactions

Media Coverage and Public Discourse

WikiScanner garnered significant media attention shortly after its public release on August 14, 2007, with outlets highlighting its revelations of edits originating from addresses associated with governments, corporations, and other institutions. The tool's exposure of edits, such as those from CIA computers altering entries on Iranian President and Saudi Arabia's foreign policy, was prominently featured in on August 15, 2007, framing it as evidence of institutional influence on content. Similarly, reported on August 19, 2007, that WikiScanner uncovered dozens of insider edits, including attempts by companies like Diebold to remove negative information from their articles, emphasizing the tool's role in tracing over 30 million edits to organizational sources. International coverage amplified the tool's impact, with on August 16, 2007, detailing over 11,000 changes to Canadian parliamentary articles traced via WikiScanner, portraying it as a mechanism to expose "underhanded editors." Australian media outlets reported on August 24, 2007, anonymous edits by staff in Howard's office, sparking debates on political interference in public knowledge platforms. on August 15, 2007, credited creator with automating manual IP tracing, noting its potential to deter biased editing by publicizing origins. similarly covered the tool's ability to match edits to networks, citing examples of corporate attempts to sanitize pages. Public discourse positioned WikiScanner as a catalyst for transparency in collaborative editing, with Griffith describing it in a December 9, , New York Times Magazine profile as empowering ordinary users to investigate institutional footprints without relying on Wikipedia's internal moderation. Reactions largely praised its democratizing effect, as seen in Wired's coverage of traffic surges following revelations of edits by entities like the CIA and Diebold, though some discussions raised preliminary concerns about IP-based attribution's accuracy in identifying individual actors. Broader conversations, including in academic analyses, linked the tool to global scandals that questioned anonymity's role in knowledge production, particularly in non-English Wikipedias like editions, where it prompted defenses of pseudonymous contributions. Overall, the discourse underscored WikiScanner's contribution to skepticism toward unchecked institutional edits, fostering calls for enhanced edit logging without widespread condemnation of the tool itself.

Wikipedia Community and Administrative Response

Jimmy Wales, co-founder of , expressed strong support for WikiScanner, describing it as "fabulous" and stating that it adds transparency to Wikipedia editing by helping to identify potential conflicts of interest in anonymous contributions. A spokeswoman acknowledged that some edits traced by the tool, such as those from government computers altering sensitive political entries, appeared to violate 's existing conflict-of-interest guidelines, which prohibit self-serving modifications. The broader Wikipedia community, including volunteer editors and administrators, largely regarded the revelations as confirmation of the platform's built-in safeguards rather than evidence of systemic vulnerability. Administrators routinely patrol and revert suspicious anonymous IP-based edits, a process that predated WikiScanner and relies on community vigilance to maintain neutrality; data from the tool showed that while notable conflicts existed, the majority of traced edits were minor or benign, often quickly corrected through reversion logs. No immediate policy overhauls were enacted solely in response, as Wikipedia's guidelines on paid editing and conflict of interest—formalized in essays like WP:COI—already discouraged such practices, though the tool prompted heightened scrutiny of institutional IP ranges in ongoing discussions. Administrative actions following WikiScanner's launch focused on case-by-case enforcement, such as blocking specific addresses linked to repeated promotional edits from corporate networks, but emphasized that editing's openness is a core feature balanced by accountability mechanisms like edit histories and talk page . Community forums highlighted that the tool's exposure of biases reinforced the value of requiring accounts for contentious topics, indirectly encouraging more users to register and disclose affiliations, though adoption rates for logged-in editing remained steady without mandated changes.

Impact and Legacy

Effects on Wikipedia Editing Practices

The exposure of institutional edits via WikiScanner heightened scrutiny of anonymous IP-based contributions within the , prompting editors to more vigilantly review changes from organizational networks for signs of bias or self-promotion. This led to increased reversion rates for suspicious edits and greater emphasis on verifying the neutrality of modifications originating from corporate or governmental , as community members cross-referenced them against known conflict-of-interest patterns. Wikipedia founder endorsed the tool, stating it provided "an additional level of " by leveraging publicly available edit histories to reveal origins of potentially manipulative changes, thereby deterring overt conflicts of interest without altering core platform mechanics. In practice, this encouraged anonymous editors from sensitive institutions to either register user accounts for or abstain from direct alterations to articles on related topics, reducing traceable instances of promotional or defensive editing post-2007. While no formal policy overhauls ensued—Wikipedia's pre-existing guidelines already prohibited paid or advocacy-driven edits—the WikiScanner incidents reinforced administrative practices, such as flagging IP ranges for monitoring and advising against "insider editing" in guideline discussions. Spokespersons noted that such exposures mitigated risks of undue influence, fostering a norm where editors prioritized disclosure or third-party involvement for conflicted topics to maintain article integrity. Over time, this contributed to a decline in high-profile institutional IP edits, as organizations internalized the ease of detection via public databases.

Broader Implications for Online Transparency

WikiScanner's public disclosure of institutional edits underscored the inherent vulnerabilities in anonymous contribution models prevalent across crowdsourced platforms, where IP-traced alterations revealed attempts by corporations, governments, and political entities to shape narratives without . By compiling on approximately 34.4 million edits from 2.6 million sources, the empirically demonstrated how opaque enables conflicts of , prompting a causal link between unattributed changes and diminished trust in collective knowledge production. This exposure highlighted that in attribution is essential to mitigate , as edits obscure motives and allow powerful actors to exert disproportionately, a dynamic observable in platforms beyond where institutional persists. The tool's revelations catalyzed developments in accountability mechanisms, such as WikiDashboard, a introduced in 2008 to edit histories, conflict indicators, and contributor patterns, thereby enhancing social transparency and enabling users to assess article reliability more effectively. Wikipedia and researchers noted that such interventions reduce the chilling effects of undetected biases, fostering self-correcting behaviors among editors through heightened scrutiny. In broader terms, WikiScanner illustrated the trade-offs of pseudonymity in open systems: while anonymity encourages broad participation, it invites strategic distortions unless countered by robust tracing and disclosure protocols, influencing subsequent policies that prioritize verifiable provenance over untraced inputs. Ultimately, WikiScanner advanced causal realism in online by evidencing that tools can deter covert agenda-pushing, yet empirical studies post-launch indicate persistent challenges, including evasion via proxies or VPNs, which underscore the need for layered in decentralized ecosystems. Its extends to advocating for systemic reforms in , where empirical tracking of edits correlates with higher integrity, countering narratives from biased institutional sources that might minimize such risks to preserve open-access ideals without addressing power asymmetries. This has informed debates on platform governance, emphasizing that true demands not mere access to logs but proactive exposure of affiliations to sustain public confidence.

Subsequent Tools and Evolutions

In 2008, , the creator of WikiScanner, released enhancements and new tools under the WikiWatcher project to extend IP-based attribution and detect manipulative editing patterns. The updated WikiScanner incorporated U.S. Patent and Trademark Office data to flag edits from organizational IPs to pages related to company trademarks or affiliates, aiming to surface potential conflicts more efficiently than the original version. A companion tool, WikiGanda, analyzed prolonged edit wars between rival entities, such as national governments or corporations, by identifying repeated reversions over sensitive topics like historical events. These developments addressed limitations in the initial tool, such as manual searching, by automating suspicion detection while still relying on anonymous IP correlations. Parallel to these efforts, WikiDashboard emerged as a visualization overlay for articles, providing metrics on edit persistence, reversion rates, and editor demographics to evaluate article stability and potential bias without direct tracing. Developed by researchers at PARC and presented at 2008, it integrated directly with Wikipedia's interface to display dynamic graphs of revision histories, enabling users to assess social dynamics like anonymous versus registered edits or rapid changes indicative of disputes. This tool shifted focus from origin attribution to behavioral transparency, helping readers gauge content reliability through empirical edit patterns rather than solely institutional sources. By 2014, WikiWash introduced real-time monitoring capabilities, allowing users to observe live edits across pages via an open-source . Created by journalists at Metro News , it streamed updates from Wikipedia's event streams, highlighting additions, deletions, and reverts as they occurred, with filters for specific articles or editors to detect "wikiwashing"—attempts to sanitize controversial content. Unlike static database queries in WikiScanner, WikiWash emphasized immediacy for investigative purposes, such as tracking corporate or political interventions during , though it faced scalability challenges with Wikipedia's high edit volume. These tools collectively evolved WikiScanner's core premise of exposing undisclosed influences toward more proactive, multifaceted analysis, incorporating , metrics, and visual aids, though they remained limited to public edit logs and IP mappings without access to checkuser functions. Later developments, including academic frameworks for inauthentic editing detection, built on similar principles but integrated for broader tracking beyond IPs.

Criticisms and Debates

Technical and Methodological Shortcomings

WikiScanner's core methodology involves cross-referencing anonymous Wikipedia edits with IP addresses from public databases to infer organizational origins, but this approach is constrained to edits by unregistered users, whose IP addresses are publicly logged by Wikipedia. Registered editors, who comprise a significant portion of contributors, obscure their IPs, rendering their potentially conflicted edits undetectable by the tool. Attribution via IP remains probabilistic rather than definitive, as the tool links edits only to a network or organization, not to specific individuals or confirming official endorsement. For instance, an edit from a corporate could originate from an employee acting independently, a guest on the network, or even unauthorized access, without implying institutional sanction. Creator emphasized that the scanner traces solely to the IP-owning entity, noting that work-hour edits might suggest organizational involvement but lack certainty. The reliance on third-party IP databases, such as , introduces further inaccuracies, as these mappings can be outdated, incomplete, or erroneous due to IP reassignments, dynamic addressing, or unlisted private ranges behind firewalls. Large institutions like universities or corporations often share IP blocks among thousands of users, amplifying risks of misattribution and false positives. Evasion is straightforward, enabling actors to bypass detection by registering accounts, using VPNs, proxies, or non-organizational IPs, which circumvents the tool's scope entirely. This methodological gap limits WikiScanner's utility for comprehensive conflict-of-interest monitoring, as sophisticated or cautious editors can maintain anonymity without traceable footprints.

Ethical and Privacy Concerns

WikiScanner's aggregation of publicly available IP addresses from Wikipedia's edit histories with WHOIS database lookups to identify organizational affiliations sparked debates over the balance between and the erosion of in collaborative editing. Although discloses IP addresses for contributions, the tool's and public interface facilitated rapid of edits potentially linked to corporations, governments, or institutions, raising fears of indirect of individual editors using or institutional networks. This process, while leveraging , amplified risks of reputational harm or professional consequences for contributors whose personal views might be misconstrued as institutional actions, particularly in cases where edits occurred during off-hours or without employer knowledge. Privacy advocates highlighted the potential for misuse, such as or targeted , as the tool's revelations often spotlighted controversial edits without contextual verification of the editor's intent or authority. For instance, in analyses of , WikiScanner's exposures led to "trace ethnography" incidents where anonymous edits collided with real-world identities, prompting ethical questions about whether such deanonymization undermines the protective veil of pseudonymity essential to Wikipedia's open-editing model and community norms. Critics contended that even absent personal naming, associating edits with entities could enable further investigative doxxing via cross-referencing with internal logs or , thus prioritizing conflict-of-interest detection over safeguards against unintended breaches. Creator defended WikiScanner as a disincentive against surreptitious rather than an assault on , emphasizing its reliance on already-public to bolster encyclopedia credibility without aiming to unmask individuals. Nonetheless, the tool's design—lacking filters for edit context or IP sharing among multiple users—drew methodological critiques for potentially overstating institutional involvement, as dynamic IP assignments or shared networks could falsely implicate unrelated parties. These concerns echoed broader tensions in platforms, where tools enhancing traceability might deter malicious edits but simultaneously chill legitimate anonymous participation from privacy-conscious contributors, such as whistleblowers or those in repressive environments.

References

  1. [1]
    WikiScanner Creator Releases New Tools to Uncover Anonymous ...
    Jul 18, 2008 · Virgil Griffith, creator of the popular WikiScanner that exposed edits that Diebold and CIA employees were making to Wikipedia pages, ...
  2. [2]
    How the Wikipedia Scanner Works - Computer | HowStuffWorks
    Aug 21, 2007 · Virgil Griffith created the Wikipedia Scanner to catch companies and organizations who were editing Wikipedia articles to their own benefit.Missing: impact | Show results with:impact
  3. [3]
    The WikiScanner | InformationWeek
    InformationWeek's Thomas Claburn writes about a new tool created by Cal Tech grad student Virgil Griffith that scans changes to Wikipedia edits and maps the ...
  4. [4]
    Student Creates Online Tool Unmasking Wikipedia Spin Jobs
    Jan 3, 2020 · A new online tool called WikiScanner reveals answers to such questions. ... Those episodes inspired Virgil Griffith, 24, an entering CalTech ...
  5. [5]
    New tool tracks Wikipedia changes - The Daily Cougar
    Oct 17, 2007 · Griffith said on his Web site that he believes his WikiScanner can help Wikipedia strive for honesty in the content of its entries. "Wikipedia ...
  6. [6]
    CIA and FBI computers used for Wikipedia edits - Reuters
    Aug 19, 2007 · WikiScanner revealed that CIA computers were used to edit an entry on the U.S.-led invasion of Iraq in 2003. A graphic on casualties was edited ...
  7. [7]
    Seeing Corporate Fingerprints in Wikipedia Edits
    Aug 19, 2007 · Dozens of similar examples of insider editing came to light last week through WikiScanner, a new Web site that traces the source of millions of ...<|separator|>
  8. [8]
    New 'WikiScanner' exposes underhanded editors | CBC News
    Aug 16, 2007 · US graduate student Virgil Griffiths created WikiScanner, a site that can trace the IP addresses of computers that have made edits to Wikipedia entries in the ...
  9. [9]
    The WikiScanner scandals and anonymity on the Japanese Wikipedia
    Wikiscanner, the brainchild of Internet and software researcher Virgil Griffith, was a database that enabled users to track the institutional origin of ...
  10. [10]
    The Grill: WikiScanner creator Virgil Griffith | Network World
    Virgil Griffith is a doctoral candidate in computation and neural systems at the California Institute of Technology. He has been called a troublemaker, ...
  11. [11]
    Virgil Griffith, Internet Man of Mystery - The New York Times
    Nov 21, 2008 · The founder of a data-mining tool called WikiScanner, Griffith is also a visiting researcher at the mysterious Santa Fe Institute, where “complex systems” are ...
  12. [12]
    News | Santa Fe Institute
    Virgil Griffith, the creator of WikiScanner, has spent the past four summers as an undergraduate researcher at SFI. WikiScanner is a program that lets you ...Missing: initial motivation
  13. [13]
    CIA and FBI computers used for Wikipedia edits | Reuters
    Aug 20, 2007 · Griffith said he developed WikiScanner "to create minor public relations disasters for companies and organizations I dislike (and) to see what ' ...
  14. [14]
    CIA, FBI computers used to edit Wikipedia - 17/08/2007 - ABC News
    Aug 17, 2007 · Griffith says he developed WikiScanner "to create minor public relations disasters for companies and organisations I dislike [and] to see what ' ...
  15. [15]
    CIA, FBI computers used to edit Wikipedia - ABC ballarat - ABC News
    Aug 17, 2007 · The program, WikiScanner, was developed by Virgil Griffith of the Santa Fe Institute in New Mexico and posted this month on a website that was ...
  16. [16]
    Scanner Tracks Who's Changing What on Wikipedia - NPR
    Aug 16, 2007 · Wikipedia is one of the Internet's most popular fact-checking sites. But a new tool shows how the online encyclopedia, which is maintained ...<|control11|><|separator|>
  17. [17]
    HOPE 2008: Wikiscanner 2.0 - Hackaday
    Jul 18, 2008 · Another update to the Wikiscanner is based on the trademark database. In 2.0, companies are now associated with edits to their respective ...Missing: early 2007
  18. [18]
    Wikiscanning - The New York Times
    Dec 9, 2007 · Griffith created a computer program to unmask Wikipedia vandals. Here's how it works: When anonymous editors visit Wikipedia, they leave a ...
  19. [19]
    Who's behind Wikipedia: Virgil Griffith's WikiScanner investigates
    Aug 11, 2008 · The developer behind the tool, which has exposed corporations editing their own entries, discusses the value of online information.Missing: initial details
  20. [20]
    Wikipedia Scanner - Litwin Books & Library Juice Press
    Aug 18, 2007 · Wikipedia Scanner processes the entirety of Wikipedia into a database of IP addresses, and then uses other tools to connect those IP addresses ...
  21. [21]
    See Who's Editing Wikipedia - Diebold, the CIA, a Campaign - WIRED
    Aug 14, 2007 · CalTech graduate student Virgil Griffith built a search tool that traces IP addresses of those who make Wikipedia changes.
  22. [22]
    WikiScanner 2.0, an incredible project to keep an eye on
    WikiScanner (also known as Wikipedia Scanner) is a tool created by Virgil Griffith which consists of a publicly searchable database that links millions of ...
  23. [23]
    Wikiscanner reveals Apple's Wikipedia edits - ZDNET
    Aug 21, 2007 · Wikiscanner reveals Apple's Wikipedia edits · Exxon didn't hurt any critters · Dell removes spyware accusations · Wal-Mart's fighting the wage war ...<|separator|>
  24. [24]
  25. [25]
    `Wikiscanner' reveals source of edits - Taipei Times
    Aug 20, 2007 · A Republican Party computer purportedly was used after the US invasion of Iraq to change "occupying forces" to "liberating forces" in a Baath ...
  26. [26]
    New online tool traces Wikipedia edits - NBC News
    Aug 15, 2007 · Those episodes inspired Virgil Griffith, a computer scientist about to enter grad school at CalTech, to automate the process with WikiScanner.
  27. [27]
    UF users traced to Wikipedia edits - Gainesville Sun
    Sep 12, 2007 · Some users on UF's network made simple changes to the site, while others used Wikipedia to insult rival universities or cast doubts on rankings ...<|separator|>
  28. [28]
    New Online Tool Unmasks Wikipedia Edits
    Aug 16, 2007 · Many of the edits are predictably self-interested: PCs in Scientology officialdom were used to remove criticism in the church's Wikipedia entry.
  29. [29]
    Tool Exposes Wiki Editors | Times Leader
    Aug 21, 2007 · A new online tool called WikiScanner reveals answers to such questions. As the Web encyclopedia that anyone can edit, Wikipedia encourages ...Missing: works operational
  30. [30]
    CIA, Vatican 'editing Wiki pages' - ABC News
    Aug 16, 2007 · Wikipedia Scanner allegedly found that workers on the Agency's computers made edits to the page of Iran's president and also that the Vatican ...
  31. [31]
    Technology | Wikipedia 'shows CIA page edits' - BBC NEWS
    Aug 15, 2007 · An online tool that claims to reveal the identity of organisations that edit Wikipedia pages has revealed that the CIA was involved in editing entries.Missing: nonprofits NGOs
  32. [32]
    WikiScanner - Wikipedia
    In 2007, Virgil Griffith said he had to take WikiScanner down, as it was costing him "several thousand USD per month." He added below this on his WikiScanner ...Design · Media coverage and reaction · Wikipedia reaction
  33. [33]
    Anonymous Editing: Wikipedia Can Track Authors - ABC News
    Virgil Griffith, 24, wrote a program Wikiscanner that can match edits to Wikipedia entries to the computer networks from which they come. "Companies are trying ...
  34. [34]
    The WikiScanner scandals and anonymity on the Japanese Wikipedia
    Dec 1, 2018 · The Wikiscanner tool, which traced the origin of edits on Wikipedia, stirred media scandals throughout the world. Relying on a “trace ...Missing: discourse | Show results with:discourse
  35. [35]
    Wikipedia:Wikipedia Signpost/2007-09-03/WikiScanner
    WikiScanner tool expands, poses public relations problems for Dutch royal family ... The general reaction to WikiScanner has remained largely positive. The ...Missing: discourse | Show results with:discourse
  36. [36]
    Tool draws attention to firms' Wikipedia edits - PR Week
    The WikiScanner tracks anonymous edits and is able to link them to certain organizations through IP addresses. The site, which is not affiliated with Wikipedia, ...
  37. [37]
    Corporate editing of Wikipedia revealed - The New York Times
    Aug 19, 2007 · Dozens of similar examples of insider editing came to light last week through WikiScanner, a new Web site that traces the source of millions of ...Missing: early 2008
  38. [38]
    Sage Reference - WikiScanner and Political Spin Doctoring
    A major in computation and neural systems, Virgil decided to use his skills to build a program that would remove the possibility of anonymity in the Wikipedia ...
  39. [39]
    [PDF] Improving Accountability and Social Transparency in Wikipedia with ...
    Apr 10, 2008 · Here we describe a social dynamic analysis tool called. WikiDashboard which aims to improve social transparency and accountability on Wikipedia ...<|separator|>
  40. [40]
    (PDF) Lifting the veil: Improving accountability and social ...
    Here we examine whether a visualization that exposes hidden article information can impact readers' perceptions of trustworthiness in a wiki environment.<|control11|><|separator|>
  41. [41]
    Lifting the veil: improving accountability and social transparency in ...
    Here we describe a social dynamic analysis tool called WikiDashboard which aims to improve social transparency and accountability on Wikipedia articles.
  42. [42]
    Improving Accountability and Social Transparency in Wikipedia with ...
    Apr 10, 2008 · Here we describe a social dynamic analysis tool called. WikiDashboard which aims to improve social transparency and accountability on Wikipedia ...
  43. [43]
    WikiWash Lets You Track Wikipedia Edits in Real Time - ADWEEK
    Nov 7, 2014 · WikiWash was created by investigative journalist who wanted to track Wikipedia edits in real time. The prototype is open source and full of ...Missing: subsequent | Show results with:subsequent<|separator|>
  44. [44]
    A real-time editing tool for Wikipedia | Opensource.com
    Dec 25, 2014 · WikiWash is an open source tool allows anybody with a web browser to observe the history of a Wikipedia page and to see edits happen in real- ...
  45. [45]
    WikiWash wants to help users see 'what our defacto archive is up to'
    Nov 7, 2014 · “It is this real time component that makes WikiWash different, giving users the ability to track Wikipedia edits as they occur, following ...
  46. [46]
    How to Investigate Wikipedia: Our Process | FSI - Stanford University
    Jan 14, 2021 · We developed a toolkit of approaches that anyone can use to conduct their own investigations into inauthentic editing on Wikipedia.
  47. [47]
    [PDF] Is Wikipedia a Credible Source for Undergraduate Economics ...
    Developed by computer science graduate student Virgil. Griffith, Wikiscanner traces the source of millions of changes made to. Wikipedia by editors who are not ...
  48. [48]
    [PDF] Content-Based Conflict of Interest Detection on Wikipedia
    Although WikiScanner or. WikiWatchdog can be potentially used for CoI detection, they suffer from a number of limitations, for example, they don't analyse the ...