IP and Petreaus

The Office of the Privacy Commissioner of Canada publishes new research that shows how much information can be gathered from an IP address. They perform a number of standard lookups such as WHOIS to build a profile of a given IP address and more importantly the person behind that IP address:  you are not as anonymous as you’d like to be.

Somewhat more interesting is the walkthrough of the The Petraeus incident, which shows in detail how ISPs, Google and the like manage their logs and provide them on a court order.

  1. An individual received a number of “anonymous” harassing e-mails and asked the FBI to investigate. Copies of the e-mails were made available to the FBI;
  2. Although the messages were sent from an anonymizing service, the IP addresses from which they were sent were available in the e-mail headers;
  3. From knowledge of the source IP address(es), the FBI was able to identify the organization to which the IP address(es) had been allocated (typically a telecommunications service provider(s);
  4. Upon receipt of administrative subpoenas11, which are issued by law enforcement authorities without judicial oversight, thetelecommunications service provider(s) then provided subscriber information about the IP addresses used to access the originating email account, as well as any other e-mail accounts that were accessed from the same IP address(es). It has been reported that Google gave the FBI information about every IP address used when accessing that account12
  5. The ISP associated the IP addresses with various locations, including hotels;;
  6. Knowing the physical locations from which the e-mails were sent, the FBI was able to obtain lists of people who were at those locations when the messages were sent through the use of administrative subpoenas13
  7. One name kept appearing in guest lists during the times the messages were sent, so this individual was considered the most likely suspect; and;
  8. It was at this point that the FBI sought and obtained a warrant to get access to the contents of the anonymous email account.

The FBI was able to obtain the following information without having to obtain a warrant:

  1. The IP address(es) from which the harassing e-mails were sent;
  2. The names of the telecommunications service providers to whom those address(es) were assigned;The subscriber information associated with the e-mail account used to send the e-mails, along with information about other e-mail accounts that were accessed from the same IP address(es);
  3. The organizations – in this case hotels – to whom the telecommunications service provider had assigned the IP address(es); and
  4. Lists of guests who were registered at those hotels at the time the emails were sent.

Report cached here


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s