Geolocation software

Last updated

In computing, geolocation software is software that is capable of deducing the geolocation of a device connected to the Internet. The identification of a device's IP address can be used to determine the country, city, or post/ZIP code, determining an object's geographical location. [1] Other methods include examination of a MAC address, image metadata, or credit card information.

Contents

Data sources

An IP address is assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. [2] The protocol specifies that each IP packet must have a header which contains, among other things, the IP address of the sender of the packet.

There are a number of free and paid subscription geolocation databases, ranging from country level to state or city—including ZIP/post code level—each with varying claims of accuracy (generally higher at the country level). These databases typically contain IP address data which may be used in firewalls, ad servers, routing, mail systems, web sites, and other automated systems where geolocation may be useful. An alternative to hosting and querying a database is to obtain the country code for a given IP address through a DNSBL-style lookup from a remote server. [3]

Some commercial databases have augmented geolocation software with demographic data to enable demographic-type targeting using IP address data. [1]

The primary source for IP address data is the regional Internet registries which allocate and distribute IP addresses amongst organizations located in their respective service regions:

Secondary sources include:

Accuracy is improved by:

Errors

If geolocation software maps IP addresses associated with an entire county or territory to a particular location (such as the geographic center of the territory), this can cause considerable problems for the people who happen to live there, as law enforcement authorities and others may mistakenly assume any crimes or other misconduct associated with the IP address to originate from that particular location.

For example, a farmstead northeast of Potwin, Kansas became the default site of 600 million IP addresses (due to their lack of fine granularity) when the Massachusetts-based digital mapping company MaxMind changed the putative geographic center of the contiguous United States from 39.8333333,-98.585522 to 38.0000,-97.0000. [5] Since 2012, a family in Pretoria, South Africa, has been regularly visited by police or angry private citizens who believed their stolen phones were to be found in the family's backyard. This was also the result of geolocation by MaxMind. The company used the National Geospatial-Intelligence Agency's coordinates for Pretoria, which pointed to the family's house, to represent IP addresses associated with Pretoria. [6]

Privacy

A distinction can be made between co-operative and oppositional geolocation. In some cases, it is in the interest of users to be accurately located, for example, so that they can be offered information relevant to their location. In other cases, users prefer to not disclose their location for privacy or other reasons. [7]

Technical measures for ensuring anonymity, such as proxy servers, can be used to circumvent restrictions imposed by geolocation software. Some sites detect the use of proxies and anonymizers, and may either block service or provide non-localized content in response. [8]

Applications

Geolocation technology has been under development only since 1999, and the first patents were granted in 2004. [9] The technology is already widely used in multiple industries, [10] including e-retail, banking, media, telecommunications, education, travel, [11] hospitality, entertainment, health care, online gaming and law enforcement, for preventing online fraud, complying with regulations, managing digital rights [12] and serving targeted marketing content and pricing. [13] Additionally, the U.S. Federal Communications Commission (FCC) has proposed that geolocation software might be leveraged to support 9-1-1 location determination. [14]

An IP address or the related unique URL may also investigated with basic functions, typing from the keyboard two instructions: ping and traceroute. [15] In Unix-like systems, they are available as a command line tool. In the same way, Microsoft Windows has the prompt of DOS working with those instructions.

Criminal investigations

Banks, software vendors and other online enterprises in the USA and elsewhere became subject to strict "know your customer" laws imposed by the USA PATRIOT Act, the Bank Secrecy Act, the US Treasury Department's Office of Foreign Assets Control and other regulatory entities in the US and Europe from the early twenty-first century. These laws are intended to prevent money laundering, trafficking with terrorist organizations, and trading with banned nations. When it is possible to identify the true location of online visitors, geolocation can protect banks from participating in the transfer of funds for illicit purposes. More and more prosecuting bodies are bringing cases involving cyber-crimes such as cyber-stalking and identity theft. Prosecutors often have the capability of determining the IP address data necessary to link a computer to a crime. [16]

Fraud detection

Online retailers and payment processors use geolocation to detect possible credit card fraud by comparing the user's location to the billing address on the account or the shipping address provided. A mismatch – an order placed from the US on an account number from Tokyo, for example – is a strong indicator of potential fraud. IP address geolocation can be also used in fraud detection to match billing address postal code or area code. [17] Banks can prevent "phishing" attacks, money laundering and other security breaches by determining the user's location as part of the authentication process. Whois databases can also help verify IP addresses and registrants. [18]

Government, law enforcement and corporate security teams use geolocation as an investigatory tool, tracking the Internet routes of online attackers to find the perpetrators and prevent future attacks from the same location.

Geo marketing

Since geolocation software can get the information of user location, companies using geomarketing may provide web content or products that are famous or useful in that specific location. Advertisements and content on a website that uses geolocation software in the form of an API (also referred to as "IP API" or "IP address geolocation API") may be tailored to provide the information that a certain user wants. [19]

Regional licensing

Internet movie vendors, online broadcasters who serve live streaming video of sporting events, or certain TV and music video sites that are licensed to broadcast their videos of episodes/music videos are permitted to serve viewers only in their licensed territories. By geolocating viewers, they can be certain of obeying licensing regulations. [20] Online gambling websites must also know where their customers violate gambling laws, or risk doing so.

Jim Ramo, chief executive of movie distributor Movielink, said studios were aware of the shortcomings going in and have grown more confident now that the system has been shown to work. [21]

Gaming

A location-based game is a type of pervasive gamefor smartphones or other mobile devices in which the gameplay evolves and progresses via a player's real-world location which is typically reported via GPS.

See also

Related Research Articles

In connection-oriented communication, a data stream is a sequence of digitally encoded coherent signals used to transmit or receive information that is in the process of being transmitted. A data stream is a set of extracted information from a data provider. It contains raw data that was gathered out of users' browser behavior from websites, where a dedicated pixel is placed. Data streams are useful for data scientists for big data and AI algorithms supply. The main data stream providers are data technology companies.

A web portal is a specially designed website that brings information from diverse sources, like emails, online forums and search engines, together in a uniform way. Usually, each information source gets its dedicated area on the page for displaying information ; often, the user can configure which ones to display. Variants of portals include mashups and intranet "dashboards" for executives and managers. The extent to which content is displayed in a "uniform way" may depend on the intended user and the intended purpose, as well as the diversity of the content. Very often design emphasis is on a certain "metaphor" for configuring and customizing the presentation of the content and the chosen implementation framework or code libraries. In addition, the role of the user in an organization may determine which content can be added to the portal or deleted from the portal configuration.

Proxy server Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources. A proxy server thus functions on behalf of the client when requesting service, potentially masking the true origin of the request to the resource server.

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.

Internet privacy right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet; a subset of data privacy

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing.

Geolocation Identification of the real-world geographic location of an object

Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal. In its simplest form, geolocation involves the generation of a set of geographic coordinates and is closely related to the use of positioning systems, but its usefulness is enhanced by the use of these coordinates to determine a meaningful location, such as a street address.

Web analytics is the measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. However, Web analytics is not just a process for measuring web traffic but can be used as a tool for business and market research, and to assess and improve the effectiveness of a website. Web analytics applications can also help companies measure the results of traditional print or broadcast advertising campaigns. It helps one to estimate how traffic to a website changes after the launch of a new advertising campaign. Web analytics provides information about the number of visitors to a website and the number of page views. It helps gauge traffic and popularity trends which is useful for market research.

Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may access the World Wide Web directly using the Hypertext Transfer Protocol, or through a web browser. While web scraping can be done manually by a software user, the term typically refers to automated processes implemented using a bot or web crawler. It is a form of copying, in which specific data is gathered and copied from the web, typically into a central local database or spreadsheet, for later retrieval or analysis.

Web content Content encountered as part of the user experience on websites

Web content is the textual, visual, or aural content that is encountered as part of the user experience on websites. It may include—among other things—text, images, sounds, videos, and animations.

In marketing, geomarketing is a discipline that uses geolocation in the process of planning and implementation of marketing activities. It can be used in any aspect of the marketing mix – the product, price, promotion, or place. Market segments can also correlate with location, and this can be useful in targeted marketing.

Anonymous web browsing refers to the utilization of the World Wide Web that hides a user's personally identifiable information from websites visited. Anonymous web browsing can be achieved via proxy servers, virtual private networks and other anonymity programs such as Tor. These programs work by sending information through a series of routers in order to hide the source and destination of information. However, there is never a guarantee of anonymity with these servers. These programs are still susceptible to traffic analysis. Proxy servers, which have a central point of knowledge, are also susceptible to collection of data by authorities. Moreover, cookies, browser plugins, and other information can be used to uniquely identify a user even if a user has hidden the IP address.

Geotargeting method of determining the geolocation of a website visitor and delivering different content to that visitor based on their location

Geotargeting in geomarketing and internet marketing is the method of determining the geolocation of a website visitor and delivering different content to that visitor based on their location. This includes country, region/state, city, metro code/zip code, organization, IP address, ISP or other criteria. A common usage of geo targeting is found in online advertising, as well as internet television with sites such as iPlayer and Hulu. In these circumstances, content is often restricted to users geolocated in specific countries; this approach serves as a means of implementing digital rights management. Use of proxy servers and virtual private networks may give a false location.

Geobytes is a global company specializing in geolocation and anti-spam software. Geobytes was incorporated in the State of Delaware, USA in 1999 making it one of the oldest companies in the online geolocation industry.

Blacklist (computing) Criteria to control computer access

In computing, a blacklist or blocklist is a basic access control mechanism that allows through all elements, except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, which means only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked until an additional step is performed.

The W3C Geolocation API is an effort by the World Wide Web Consortium (W3C) to standardize an interface to retrieve the geographical location information for a client-side device. It defines a set of objects, ECMAScript standard compliant, that executing in the client application give the client's device location through the consulting of Location Information Servers, which are transparent for the application programming interface (API). The most common sources of location information are IP address, Wi-Fi and Bluetooth MAC address, radio-frequency identification (RFID), Wi-Fi connection location, or device Global Positioning System (GPS) and GSM/CDMA cell IDs. The location is returned with a given accuracy depending on the best location information source available.

Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.

A web beacon is one of various techniques used on web pages and email, to unobtrusively allow checking that a user has accessed some content. Web beacons are typically used by third parties to monitor the activity of users at a website for the purpose of web analytics or page tagging. They can also be used for email tracking. When implemented using JavaScript, they may be called JavaScript tags.

Lantern (software) Internet censorship circumvention software

Lantern is a free and open-source peer-to-peer internet censorship circumvention tool, used for casual web browsing. It provides a way to bypass state-sanctioned filtration through a network of trusted users, but it's not an anonymity tool like Tor. Using Lantern, users in countries having free internet access can share their bandwidth with those who are in countries where the network is partly blocked. Network connections will be dispersed between multiple computers running Lantern so it will not put undue stress on a single connection or computer.

SaferSurf Software product

SaferSurf is a software product for anonymous internet surfing. Aside from offering web anonymity, it has several other features, such as a geolocation proxy service bypassing country restrictions. SaferSurf runs centrally on a server and doesn't need a local installation.

References

  1. 1 2 Holdener, Anthony T. (2011). HTML5 Geolocation. O'Reilly Media. p. 11. ISBN   9781449304720.
  2. RFC   760, DOD Standard Internet Protocol (January 1980)
  3. "IP geolocation (The NetOp Organization)". 2009-01-28. Archived from the original on 2009-01-25. Retrieved 2009-02-04.
  4. An example is the guessed city provided by hostip.info.
  5. Hill, Kashmir (2016-04-10). "How an internet mapping glitch turned a random Kansas farm into a digital hell". Fusion. Retrieved 2016-04-10.
  6. Hill, Kashmir (10 January 2019). "How Cartographers for the U.S. Military Inadvertently Created a House of Horrors in South Africa". Gizmodo. Retrieved 10 January 2019.
  7. "Nitke vs. Ashcroft - Expert report of Seth Finkelstein". 2003-11-10. Retrieved 2004-11-15.
  8. RealNetworks detects proxies and anonymizers; Google serves non-localized content if location is in doubt. "Geolocation: Don't Fence Web In". Wired. 2004-07-12. Archived from the original on 2006-05-14.
  9. "Digital Envoy wins Geotargeting Patent". 2004-06-29. Archived from the original on June 17, 2011. Retrieved 2010-04-19.
  10. ClientSideNews, Nov/Dec 2010 issue, Page 6 “You Can Really Do That? – The Power of Geolocation Technology”
  11. Marketing Magazine, February 10, 2011 “Thetrainline brings Digital Element on board for localised ad task”
  12. Music Streaming site we7 Cranks up the Volume for Digital Rights Management and Ad Targeting Archived 2010-12-06 at the Wayback Machine
  13. "Geolocation and Federalism on the Internet: Cutting Internet Gambling's Gordian Knot". 2009-10-04. SSRN   1433634 .Missing or empty |url= (help)
  14. "FCC Strengthens Enhanced 911 Location Accuracy Requirements for Wireless Services" (PDF). Archived from the original (PDF) on August 11, 2011. Retrieved April 27, 2017.
  15. "File traceroute-geolocation" . Retrieved March 24, 2017.
  16. Los Angeles Deputy District Attorney, Wendy Segall Hides Evidence.
  17. Vacca, John R. (2003). Identity Theft. Prentice Hall Professional. p. 400. ISBN   9780130082756.
  18. Barba, Robert (2017-11-18). "Sharing your location with your bank seems creepy, but it's useful". The Morning Call . Retrieved 2018-01-10.
  19. Internet Retailer “Personalized web site content gives retailers an edge’, June 25, 2010
  20. "CinemaNow appeases studios by locating Web surfers". CNet. 2001-02-26. Retrieved 2010-04-22.
  21. "Geolocation: Don't Fence Web In". Wired News. Associated Press. 2004-07-12. Archived from the original on 2006-09-09. Retrieved 2006-09-28.