Why it's so hard to catch online predators
Questions of legal jurisdiction and volume of postings compound challenge for police
By Janet Davison, CBC News
Posted: Oct 17, 2012 5:23 AM ET
Last Updated: Oct 18, 2012 10:14 AM ET
Among the many questions swirling after Amanda Todd's suicide, there is one that seems so basic: Who is the person whose online actions seem most responsible for sending the B.C. teen into such deep despair?
The internet hacking group Anonymous claims it has found the 15-year-old's main tormentor — a 32-year-old B.C. man it says has also made postings to child pornography sites.
Anonymous may have found the right person. Or maybe not. But in an online world, where it's easy to post anything you want under a false name and hide the computer address from which you made the comment, tracking a person's true identity can be a tall order.
"The internet affords a number of options for those who desire to hide their identity to do just that," RCMP Cpl. Laurence Trottier said via email.
"These options provide various levels of anonymity, which must be uncovered before it's possible to identify the individual's true identity."
Questions of legal jurisdiction and the overwhelming volume of postings made every day around the world compound the challenge police forces face in determining real identities in the online world.
The place to start such an investigation is often with the IP address, the identifier that reveals the computer from which a controversial post would seem to have originated.
"It’s a little bit like a phone number if you will, but for computers," says Nicolas Christin, associate director of the Information Networking Institute at Carnegie Mellon University in Pittsburgh.
"If you figure out … the IP address that was used to make a particular post or a particular threat, then the next step is to figure out which internet service provider this IP address belongs to, contact them and ask them to tell you which customer was using that IP address at that given time."
If the ISP is on board with the investigation, it might provide that information.
Trouble is, as Christin says, "it's not a foolproof method for several reasons."
One is jurisdiction. Say someone posted questionable — but not illegal — comments from a computer in the United States that seem sympathetic towards Hitler's Reich. Someone in Germany, where such comments are illegal, could take great umbrage with them.Fifteen-year-old Amanda Todd,in a photo from one of the many Facebook memorial sites set up after her suspected suicide earlier this month. (Canadian Press)
"But if you're on a machine in the United States," says Christin, "you're actually protected by the First Amendment, which means the internet service provider has absolutely no reason to turn over their data to you if you're, say, the German police.
"So that's the first problem, the problem of jurisdiction."
Another problem is that people can also use software and proxy servers to mask their true IP address.
"You can use a proxy machine, meaning instead of connecting directly from my computer, I connect to another computer and from there I make those posts," says Christin, who notes that it's "relatively easy to anonymize" your traffic on the internet.
People could also use something like the Tor network, free online software that Christin says is fairly easy to download and is "essentially a peer-to-peer network that is not used for file sharing. It's a peer-to-peer network that is used to anonymize data over the internet."
Say someone used Tor to go to the CBC.ca website and post a comment — the CBC.ca website, instead of seeing the IP address of the actual machine from which the visit is coming would see the IP address of one of the machines that participates in the Tor network
Finding the true IP address in that instance "is going to be essentially impossible," says Christin.
Legitimate reasons for online anonymity
In efforts to fight crime, that scenario poses huge problems, but there can be legitimate uses for networks such as Tor.
"If you're in Syria right now and you want to document the atrocities that are being committed there, you definitely want to do that anonymously," Christin says.
"It's a challenge, because on the one hand you've got plenty of good reasons why you want to remain anonymous on the internet particularly when it comes to reporting abuses, reporting human rights violations and so forth.
"At the same time, when you have a bullying case and if the person is careful enough to hide their tracks, it may be very, very challenging to find them."
The difficulty tracking online identities can also be compounded by the sheer volume of online messages that flow over the internet each day.
The very nature of online communication and social media can fuel the volume — in a bullying case, for example, one mean or disturbing comment could quickly be forwarded through cc-ing or bcc-ing one email message. People clicking additional "likes" on a suspect comment could also spread the harm.
"Then it gets kind of clouded as to who was the originator," says Tim Richardson, an e-commerce professor at Seneca College and the University of Toronto.
"That's the problem. Law enforcement agencies find it too difficult to winnow through all the hundreds of postings to find out who was the originating person. They end up with a lot of people who were just part of the pile-on and they're not really the bad guys."
The use of public computers in internet cafés or libraries can also help mask a true identity.
"There's been a number of cases where people who were engaging in very shady dealings were setting up throwaway email addresses from a cyber café somewhere and essentially just from that information you were not able to trace them back," says Christin.
Of course, there's still the question of how Anonymous is claiming to have been able to find Amanda Todd's tormentor, while police are publicly silent on whatever progress they may have made.
Christin says hackers don't face the same "burden of proof" that law enforcement officials do.
"If you manage to break in, you have access to the information. You're committing an illegal act in the process but you have a lot less barriers."
A hacker might be able to break into a person's Facebook page, something police wouldn't necessarily be able to do because they wouldn't have permission.
"There are some restrictions against what law enforcement can do and those restrictions, they are there for a good reason," says Christin.
"You don't want to have a police state where people can access anything they want at any time, but hacking groups typically have no such concerns and essentially break the law to have access to this information themselves."
The RCMP would not be interviewed on this issue, and would not discuss the steps it can take to try to track down the identity of an online bully or predator.
"The RCMP cannot provide information or details related to investigational tools or techniques used to identify suspects in criminal investigations," Trottier said via email.
Christin says law enforcement officials have to approach efforts to track down online identities from several angles, there is no silver bullet or magic trick.
The desire to hide online is really only an extension of capabilities we've always had, he says.
"It's also very, very easy to send an anonymous letter and never find out who sent it. That hasn't changed."
And, for better and worse, probably never will.
Top News Headlines
- Toronto Mayor Rob Ford fires chief of staff
- A week after bombshell allegations that Toronto Mayor Rob ford was videotaped smoking crack, the mayor's chief of staff was fired and Ford is continuing to stonewall reporters. more »
- Federal Court won't remove MPs over robocall allegations
- The Federal Court says it won't throw six MPs out of their seats over allegations of widespread vote suppression through automated robocalls in the 2011 federal election. more »
- Alleged Ford crack video seller not responding to calls
- The journalist who broke the story alleging Toronto Mayor Rob Ford was recorded on video smoking crack cocaine says he may never be able to get his hands on the evidence. more »
- 2nd suspect in Tim Bosma murder case to plead not guilty
- The lawyer for Mark Smich says the Oakville, Ont., resident will plead not guilty to first-degree murder in the death of Tim Bosma, the Hamilton man who disappeared earlier this month after taking two men on a test drive of his truck. more »
Latest Technology & Science News Headlines
- Twitter launches feature to 'make sure it's really you'
- Following hack attacks on the Twitter accounts of The Associated Press, the Financial Times and other media organizations by the Syrian Electronic Army, Twitter has rolled out a new feature to help prevent unauthorized logins to a user's accounts. more »
- 'Hadfield at Home' parodies astronaut's return to 'normal' life
- While the real Chris Hadfield reacclimates to Earth gravity and performs experiments in Houston, a parody of the Canadian astronaut is recreating some of his famous space moments, but with decidedly terrestrial results. more »
- 3-D printing of airway tube helps save U.S. baby
- In a medical first, doctors used plastic particles and a 3-D laser printer to create an airway splint to save the life of a baby boy who used to stop breathing nearly every day. more »
- Importers brace for fight over iPods and TVs
- Importers of popular electronics such as big-screen TVs and MP3 players are ramping up their fight against federal tariff changes, accusing the government of misleading them by offering tariff breaks that it planned to claw back later. more »
Bob McDonald's Blog
- Chris Hadfield: The gravity of gravity May. 17, 2013 9:58 AM After five months of being Superman and a media superstar, Canadian astronaut Chris Hadfield is now beginning the challenging task of adapting his mortal body and brain to life back on Earth.
Quirks & Quarks
- May 25: The Origin of Feces May. 23, 2013 9:43 AM Cow pies, scat, droppings, guano, dung, manure, night soil, poop, fecal matter, sh*t. Call it what you may, excrement plays a crucial role in evolution, culture and the environment.
- Toronto Mayor Rob Ford fires chief of staff
- 2nd suspect in Tim Bosma murder case to plead not guilty
- 2 more arrests linked to hacking death of British soldier
- Duffy says he wants to give Canadians 'full story'
- Vancouver man abandons Porsche on B.C. ferry
- Chained-teen's mom wants man who pleaded guilty 'to suffer'
- B.C. teen saves pet dog in 'terrifying' cougar attack
- Neil Macdonald: Harper no Obama when it comes to dealing with scandals
- Montreal boil-water advisory to end no earlier than 10 p.m.