Skip to main content

Limitations of Anonymization

  • Chapter
  • First Online:
  • 1338 Accesses

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

As previously mentioned, the Internet users’ intentions to stay anonymous in the Internet are manifold and range from legal to a wide range of illegal reasons.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See Chap. 3.

  2. 2.

    Pseudonymity is characterized by the use of a false name and for the most part eventuates in anonymity; see Sect. 1.1.

  3. 3.

    See Sect. 2.2.2.1(1).

  4. 4.

    See Chap. 2, footnote 6.

  5. 5.

    See exemplary attacks of “Anonymous” vs. Stratfor, Sect. 2.1.3.

  6. 6.

    See Sect. 4.3.

  7. 7.

    See Sect. 4.5.

  8. 8.

    United States—Measures affecting the cross-border supply of gambling and betting services (US—Gambling), WT/DS285/R, Panel Report, para 6.467.

  9. 9.

    Id. para 6.465.

  10. 10.

    China—Measures affecting trading rights and distribution services for certain publications and audiovisual entertainment products, WT/DS363/R, Panel Report, para 7.763.

  11. 11.

    US—Gambling, supra note 9, para 6.468.

  12. 12.

    See Sect. 3.1.3.1.

  13. 13.

    See Chap. 3.

  14. 14.

    The group of appellants consists of a journalist, an active politician and two associates of a law firm (German Federal Constitutional Court 2008: Sects. 116–118) who blamed a personality right violation, precisely a violation of the fundamental right in confidentiality and integrity of information technology systems, also referred to as “right to online privacy” or “computer confidentiality and integrity right” (Weber 2011a, p. 128); for an evaluation of this decision see Weber 2008, pp. 94–97.

  15. 15.

    See Chap. 3, footnote 8.

  16. 16.

    ECHR: Autronic AG vs. Switzerland, judgment of 22 May 1990, No. 17/1989/175/231, § 57; Rekvényi vs. Hungary, judgment of 20 May 1999, No. 25390/94, § 34.

  17. 17.

    ECHR, The Sunday Times I vs. The United Kingdom (Series A No. 30), judgment of 26 April 1979, §§ 54 ss.

  18. 18.

    ECHR: Handyside vs. The United Kingdom, judgment of 7 June 1976, No. 5493/72, § 46; The Sunday Times I vs. United Kingdom (Series A No 30), judgment of 26 April 1979, § 59; The Observer and Guardian vs. The United Kingdom, judgment of 26 November 1991, No. 13585/88, § 59; Krone Verlag GmbH & Co. KG vs. Asustria, judgment of 26 February 2002, No. 34315/96, § 34.

  19. 19.

    ECHR, Dichand and Others vs. Austria, judgment of 26 February 2002, No. 29271/95, § 1.

  20. 20.

    ECHR: The Observer and Guardian vs. The United Kingdom, judgment of 26 November 1991, No. 13585/88, § 59; Thoma vs. Luxembourg, judgment of 29 March 2001, No. 38432/97, § 43; Perna vs. Italy, judgment of 25 July 2001, No. 48898/99, § 38.

  21. 21.

    Non-consensual “searches” of a person are illegal unless authorized by law, i.e. by legislation or as a matter of common law, comp. Jackson 2011: 21.082.

  22. 22.

    Human Rights Committee, International Covenant on Civil and Political Rights, 102nd Session, 12 September 2011, CCPR-C-GC/34, No. 23.

  23. 23.

    ECHR: Kegan vs. Irland, judgment of 26 May 1994, No. 16969/90, § 49; McGinley and Egan vs. The United Kingdom, judgment of 9 June 1998, No. 10/1997/794/995–996, § 98; Guerra and Others vs. Italy, judgment of 19 February 1998, No. 14967/89, § 58; Christine Goodwin vs. The United Kingdom, judgment of 11 July 2002, No. 28957/95, §§ 71/2; compare also Weber and Sommerhalder 2007, p. 97.

  24. 24.

    ECHR, Appleby and Others vs. The United Kingdom, judgment of 6 May 2003, No. 44306/98, § 39/40.

  25. 25.

    ECHR, Appleby and Others vs. The United Kingdom, judgment of 6 May 2003, No. 44306/98, § 40.

  26. 26.

    For more detailed information regarding the enforcement of copyright see Sect. 4.5.

  27. 27.

    The four other spaces are land, sea, air and outer space.

  28. 28.

    See homepage of the ITU, overview.

  29. 29.

    HLEG Global Strategic Report 2008, http://www.itu.int/osg/csd/cybersecurity/gca/docs/global_strategic_report.pdf.

  30. 30.

    The five work areas are legal measures, technical and procedural measures, organisational structures, capacity building and international cooperation, see supra note 30.

  31. 31.

    The ITU launched the Child Online Protection Initiative together with several UN agencies. The initiative’s key objectives are among others the identification of risks to children in cyberspace, the creation of awareness and the development of practical tools for minimizing risks; see http://www.itu.int/osg/csd/cybersecurity/gca/cop/.

  32. 32.

    The ITU considered the collaboration as “the world’s first comprehensive alliance against cyberthreats”; see speech by ITU Secretary-General Dr Hamadoun I. Touréhttp, opening ceremony of the WSIS Forum, 16 May 2011, http://www.itu.int/en/osg/speeches/Pages/2011-05-16.aspx.

  33. 33.

    The Additional Protocol to the Convention on Cybercrime was adopted by the Council of Europe Committee of Ministers on 7 November 2002, open also to non-CoE-countries.

  34. 34.

    States having ratified the Additional Protocol are requested to criminalize the dissemination of racist and xenophobic material and xenophobic-motivated threats and results through computer systems.

  35. 35.

    Schjølberg and Ghernaouti-Hélie 2009 with a detailed proposal for a preliminary Model Law on Cybercrime Legislation based on the recommendations that were adopted in a broad agreement by the global High-Level Experts Group on Cybersecurity (for HLEG see 4.3.2.2), and recommendations on additional provisions due to the technological development since 2001.

  36. 36.

    For more details regarding the U.S. Supreme Court’s standpoint regarding the relationship between the First Amendment and defamation see Solove 2007, p. 125.

  37. 37.

    See Sect. 2.2 .

  38. 38.

    Fraud and counterfeiting of non-cash means of payment often operate on an international scale.

  39. 39.

    Claiming to be the “largest European hacker club” (CCC 2011a), the German hacker association CCC founded in Berlin, Germany, in 1981 and based in Germany and other German-speaking countries assesses itself as a mediator between the poles of technical and social development. According to its preamble, the CCC urges for the appreciation of the right to a worldwide, unhampered information exchange as being a human right since within today’s information society living and working without Internet access is almost inconceivable (CCC 2011b). Furthermore, the CCC stands up for more transparency in governments, freedom of information and fights for everyman’s right for free universal access to computers and technological infrastructure. The political activities of the Chaos Computer Club bear on the revelation of shortcomings and the disclosure of security loopholes, partially by intentionally breaking through existing safety appliances as undertaken in 1996 by demonstrating an attack against Microsoft’s ActiveX technology.

  40. 40.

    Even though this description is misleading since the Greeks finessed the Trojans and not vice versa.

  41. 41.

    As for instance applications that pretend to be antivirus programs.

  42. 42.

    See R. Moir, Defining Malware: FAQ, 1 October 2003, http://technet.microsoft.com/en-us/library/dd632948.aspx.

  43. 43.

    Trojan horses are often sent to a computers via email to legitimate users of the system.

  44. 44.

    The often used term lawful interception, also referred to as wiretapping, directly at the source (“source wiretapping”) (CCC 2011a) of the communication, describes the monitoring of a suspect’s Internet telephony by accessing to one of the end-devices involved using Trojan horse software. By definition, this procedure can only be used for wiretapping Internet telephony; the solely usage for conducting a lawful interception has to be enforced by appropriate technical and legal means (CCC 2011a). Moreover, for the protection of the overheard person’s human rights, the conduct of a lawful interception requires a warrant; the Global Lawful Interception Industry Forum lists many of these different legislations, as does the Council of Europe secretariat. For example, in the United Kingdom the law is known as RIPA (Regulation of Investigatory Powers Act) and in the United States there is an array of federal and state criminal law, in particular the Communications Assistance for Law Enforcement Act (CALEA).

  45. 45.

    See supra note 36.

  46. 46.

    The investigated Trojan was developed by the company DigiTask; see exemplary Rosenbach, Stark and Winter 2011.

  47. 47.

    The software in question was used by various state officials, see exemplary Rosenbach Stark and Winter 2011; German news agency 2011.

  48. 48.

    The term “Bundestrojaner” is colloquially used to describe the government malware concept (CCC 2011a). The software is also referred to as R2D2, see exemplary: http://cetatti.com/blog/2011/10/german-officials-admit-to-using-r2d2-trojan-to-spy-on-citizens/.

  49. 49.

    Telephone calls made by using the software application “Skype” to a recipient simultaneously using the application “Skype” are free of charge. Additionally, “Skype” enables its users to do instant messaging, to transfer files and to do videoconferencing over the Internet.

  50. 50.

    See supra note 45.

  51. 51.

    Beyond that the Bundestrojaner is said to be capable of monitoring traffic from 15 programs, see Constantin 2011.

  52. 52.

    The command and control server is located on an IP address belonging to the provider Web intellects in Columbus, Ohio; (CCC 2011c, p. 3).

  53. 53.

    Hence, the networks remote control and tempering by third parties cannot be precluded; (CCC 2011c, p. 4).

  54. 54.

    See Sect. 4.2.2.

  55. 55.

    The German Code of Criminal Procedure (StPO).

  56. 56.

    For accomplishing lawful interceptions and online surveillances.

  57. 57.

    In November 2011, German authorities discovered a neo-Nazi terror cell in Germany.

  58. 58.

    The National Democratic Party of Germany is a far-right political party in Germany.

  59. 59.

    Miscellaneous contributions in Swiss newspapers, see exemplary Schaffner 2011, p. 4 or Fontana 2011, p. 12.

  60. 60.

    See Tschentscher 2011 and miscellaneous online contributions exemplary: http://www.eurasiareview.com/15102011-switzerland-law-enforcement-admits-use-of-spy-software/ and http://worldradio.ch/wrs/news/wrsnews/switzerland-admits-using-spy-software~print.shtml.

  61. 61.

    The Swiss Federal Council implemented the revised Regulation on the Surveillance of Post and Telecommunications Traffic starting January 1, 2012, see http://www.admin.ch/aktuell/00089/index.html?lang=de&msg-id=42332.

  62. 62.

    See Sect. 4.4.1.2.

  63. 63.

    See supra note 45.

  64. 64.

    Commonly a warrant is needed to accomplish a lawful interception or online search.

  65. 65.

    See Sect. 4.3.3.

  66. 66.

    Article 19: Search and seizure of stored computer data.

  67. 67.

    See Sect. 2.2.

  68. 68.

    In recent years a number of attorneys specialized on copyright law whereby the dispatch of cease-and-desist letters increased.

  69. 69.

    The purpose of “Kino.to” was to collect links to attractive audiovisual content and to promote these links at the website next to advertisements. These advertisements to a great extent contained illegal material themselves, such as links to destructive software or deceptive web services; for further details see Moeller 2011.

  70. 70.

    “Megaupload.com” is led by Kim Dotcom, formerly known as Kim Schmitz or Kim Tim Jim Vestor, a German entrepreneur living in Auckland, New Zealand, and having his place in business in Hong Kong.

  71. 71.

    See supra note 20.

  72. 72.

    Anonymous’ “operation payback” describes a decentralized and coordinated group of attacks on opponents of Internet piracy and pro-copyright organisations starting in 2010.

  73. 73.

    See Sect. 2.1.3.

  74. 74.

    LOIC is an open source network stress testing and denial-of-service attack application.

  75. 75.

    The subsequent passage is partly based on Weber 2011c.

  76. 76.

    The business model of Logistep AG, a Swiss enterprise, consists in collecting IP addresses of Internet users who participate in P2P networks and make available works, protected by Copyright Law, to third persons without having the copyright holder’s permission. Acting (at least indirectly) on behalf of the right holders Logistep delivers the respective IP addresses to the prosecutors in criminal proceedings enabling them to request from the relevant Internet Service Providers the disclosure of the name of the respective Internet participant; for more detailed information see Weber 2011b.

  77. 77.

    In that case both static and dynamic IP addresses were qualified as personal data.

  78. 78.

    See Sect. 2.2.2.

  79. 79.

    See Sect. 4.3.3.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rolf H. Weber .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Weber, R.H., Heinrich, U.I. (2012). Limitations of Anonymization. In: Anonymization. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-4066-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4066-5_4

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4065-8

  • Online ISBN: 978-1-4471-4066-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics