Judge Questions IP as Evidence in Raunchy Case
Until recently, courts of law have had the power to force Internet Service Providers to hand over customer details based on IP (Internet Protocol) address information, which is used to identify a user connected to the Internet. But now one judge has refused to make such an order, questioning the accuracy of the method.
An IP is a number that identifies a particular device such as a computer or a router connected to a network. In theory, there is a straight correlation between one device and one IP address. In practice, though, a single IP address does not necessarily mean one computer or one specific user connected to the Internet.
Hijacked and Dynamic IP Address Difficult to Discern
For example, several computers could use one router and thus use one IP address; in some cases a hacker could "hijack" this Internet connection of a wireless router without the owner's knowledge or permission and, in doing so, use its IP address.
In such a case, it would be difficult to discern exactly who was connected to the IP address, if a crime was committed.
Another example issue is that Internet Service Providers (ISPs) don't always assign permanent IP addresses to users, but rather, they use what is called dynamic IP addresses, which are leased to users over a specific time period, and only when a user has made a connection to the Internet.
In other words: because dynamic IP addresses change so often, it would be incredibly difficult to pinpoint exactly who used what IP, unless courts had access to such a detailed log.
IP Address Usually Enough to Bring Action
In the past, this hasn't stopped legal cases being brought on the basis of an IP address, which is often the only information available to an investigator.
A common example used in court cases is when the copy right holder for music or movies (example: Warner Bothers) is able to trace an IP address which allegedly and illegally shared copyrighted files online. The IP address can usually be traced to a specific Internet provider through public records.
In most cases, the relevant lawyers will either directly request an ISP hand over customer details or ask a court to order the ISP to do so. This has led to many complaints of mistaken identity.
Judge Warns Innocents Could Be Under Pressure
In a recent court case in Illinois, Judge Harold Baker rejected such a request from a Canadian producer of legal adult material.
Baker noted a previous case involving the online distribution of illegal child smut (completely unconnected to the current case) in which such an IP address "identification" proved false. Eventually, the person accused as the offender was proven innocent. (Source: arstechnica.com)
According to Baker, there's too great a chance that not only could such a mistake be made in this case, but that the computer users named in the process might be so embarrassed by the connection that they make a false confession rather than risk facing a trial. (Source: archive.org)
Baker therefore rejected the application for identification, saying that he's unwilling to proceed with the case until at least one individual suspect is specifically named by the would-be plaintiffs, and even then, the named individual would have to reside under the jurisdiction of his court.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.