Internet geolocation

Last updated

In computing, Internet geolocation is software capable of deducing the geographic position of a device connected to the Internet. [1] For example, the device's IP address can be used to determine the country, city, or ZIP code, determining its geographical location. [2] Other methods include examination of Wi-Fi hotspots, [3] a MAC address, image metadata, or credit card information.[ citation needed ]

Contents

Data sources

An IP address is assigned to each device (e.g. computer, printer) participating in a computer network that uses the Internet Protocol for communication. [4] The protocol specifies that each IP packet must have a header which contains, among other things, the IP address of the sender.

There are a number of free and paid subscription geolocation databases, ranging from country level to state or city—including ZIP/post code level—each with varying claims of accuracy (generally higher at the country level). These databases typically contain IP address data which may be used in firewalls, ad servers, routing, mail systems, web sites, and other automated systems where a geolocation may be useful. An alternative to hosting and querying a database is to obtain the country code for a given IP address through a DNSBL-style lookup from a remote server. [5]

Some commercial databases have augmented geolocation software with demographic data to enable demographic-type targeting using IP address data. [2]

The primary source for IP address data is the regional Internet registries which allocate and distribute IP addresses amongst organizations located in their respective service regions:

The registries allow assignees to specify country and geographical coordinates of each assigned block. [6] Starting from 2021 RFC 9092 allows assignees to specify location of any IP subnetwork they own. [7]

Secondary sources include:

Accuracy is improved by:

Errors

If geolocation software maps IP addresses associated with an entire county or territory to a particular location, such as the geographic center of the territory, this can cause considerable problems for the people who happen to live there, as law enforcement authorities and others may mistakenly assume any crimes or other misconduct associated with the IP address to originate from that particular location.

For example, a farmstead northeast of Potwin, Kansas became the default site of 600 million IP addresses when the Massachusetts-based digital mapping company MaxMind changed the putative geographic center of the contiguous United States from 39.8333333,-98.585522 to 38.0000,-97.0000. [10] Since 2012, a family in Pretoria, South Africa, has been regularly visited by police or angry private citizens who believed their stolen phones were to be found in the family's backyard. This was also the result of geolocation by MaxMind. The company used the National Geospatial-Intelligence Agency's coordinates for Pretoria, which pointed to the family's house, to represent IP addresses associated with Pretoria. [11]

Privacy

A distinction can be made between co-operative and oppositional geolocation. In some cases, it is in the interest of users to be accurately located, for example, so that they can be offered information relevant to their location. In other cases, users prefer not to disclose their location for privacy or other reasons. [12]

Technical measures for ensuring anonymity, such as proxy servers, can be used to circumvent restrictions imposed by geolocation software. Some sites detect the use of proxies and anonymizers, and may either block service or provide non-localized content in response. [13]

Applications

Geolocation technology has been under development only since 1999, and the first patents were granted in 2004. [14] The technology is already widely used in multiple industries, [15] including e-retail, banking, media, telecommunications, education, travel, [16] hospitality, entertainment, health care, online gaming and law enforcement, for preventing online fraud, complying with regulations, managing digital rights [17] and serving targeted marketing content and pricing. [18] Additionally, the U.S. Federal Communications Commission (FCC) has proposed that geolocation software might be leveraged to support 9-1-1 location determination. [19]

An IP address or the related unique URL may also be investigated with basic functions, typing from the keyboard two instructions: ping and traceroute. [20] In Unix-like systems, they are available as a command line tool. In the same way, Microsoft Windows has the prompt of DOS working with those instructions.

Criminal investigations

Banks, software vendors and other online enterprises in the US and elsewhere became subject to strict "know your customer" laws imposed by the USA PATRIOT Act, the Bank Secrecy Act, the US Treasury Department's Office of Foreign Assets Control and other regulatory entities in the US and Europe from the early twenty-first century. These laws are intended to prevent money laundering, trafficking with terrorist organizations, and trading with banned nations. When it is possible to identify the true location of online visitors, geolocation can protect banks from participating in the transfer of funds for illicit purposes. More and more prosecuting bodies are bringing cases involving cyber-crimes such as cyber-stalking and identity theft. Prosecutors often have the capability of determining the IP address data necessary to link a computer to a crime. [21]

Fraud detection

Online retailers and payment processors use geolocation to detect possible credit card fraud by comparing the user's location to the billing address on the account or the shipping address provided. A mismatch – an order placed from the US on an account number from Tokyo, for example – is a strong indicator of potential fraud. IP address geolocation can be also used in fraud detection to match billing address postal code or area code. [22] Banks can prevent "phishing" attacks, money laundering and other security breaches by determining the user's location as part of the authentication process. Whois databases can also help verify IP addresses and registrants. [23]

Government, law enforcement and corporate security teams use geolocation as an investigatory tool, tracking the Internet routes of online attackers to find the perpetrators and prevent future attacks from the same location.

Geomarketing

Since geolocation software can get the information of user location, companies using geomarketing may provide web content or products that are famous or useful in that specific location. Advertisements and content on a website that uses geolocation software in the form of an API (also referred to as "IP API" or "IP address geolocation API") may be tailored to provide the information that a certain user wants. [24]

Regional licensing

Internet movie vendors, online broadcasters who serve live streaming video of sporting events, or certain TV and music video sites that are licensed to broadcast their videos of episodes/music videos are permitted to serve viewers only in their licensed territories. By geolocating viewers, they can be certain of obeying licensing regulations. [25] Online gambling websites must also know where their customers violate gambling laws, or risk doing so.

Jim Ramo, chief executive of movie distributor Movielink, said studios were aware of the shortcomings going in and have grown more confident now that the system has been shown to work. [26]

Gaming

A location-based game is a type of pervasive gamefor smartphones or other mobile devices in which the gameplay evolves and progresses via a player's real-world location which is typically obtained by GPS functionality from the device. [27]

Social networking

An infographic illustrating and comparing the popularity of different geosocial networking services in August 2010 Geosocial-universal-infographic.jpg
An infographic illustrating and comparing the popularity of different geosocial networking services in August 2010
Geosocial networking is a type of social networking in which geographic services and capabilities such as geocoding and geotagging are used to enable additional social dynamics. [28] [29] User-submitted location data or geolocation techniques can allow social networks to connect and coordinate users with local people or events that match their interests. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking.

See also

Related Research Articles

<span class="mw-page-title-main">Internet</span> Global system of connected computer networks

The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and performance in the process.

<span class="mw-page-title-main">Wardriving</span> Search for wireless networks with mobile computing equipment

Wardriving is the act of searching for Wi-Fi wireless networks as well as cell towers, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet.

IP address blocking or IP banning is a configuration of a network service that blocks requests from hosts with certain IP addresses. IP address blocking is commonly used to protect against brute force attacks and to prevent access by a disruptive address. It can also be used to restrict access to or from a particular geographic area; for example, syndicating content to a specific region through the use of Internet geolocation.

<span class="mw-page-title-main">Captive portal</span> Web page displayed to new users of a network

A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

<span class="mw-page-title-main">Geotagging</span> Act of associating geographic coordinates to digital media

Geotagging, or GeoTagging, is the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RSS feeds and is a form of geospatial metadata. This data usually consists of latitude and longitude coordinates, though they can also include altitude, bearing, distance, accuracy data, and place names, and perhaps a time stamp.

<span class="mw-page-title-main">Google Analytics</span> Web analytics service from Google

Google Analytics is a web analytics service offered by Google that tracks and reports website traffic and also the mobile app traffic & events, currently as a platform inside the Google Marketing Platform brand. Google launched the service in November 2005 after acquiring Urchin.

In marketing, geomarketing is a discipline that uses geolocation in the process of planning and implementation of marketing activities. It can be used in any aspect of the marketing mix — the product, price, promotion, or place. Market segments can also correlate with location, and this can be useful in targeted marketing.

<span class="mw-page-title-main">Computer network</span> Network that allows computers to share resources and communicate with each other

A computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.

<span class="mw-page-title-main">Geotargeting</span> Website content based on a visitors location

In geomarketing and internet marketing, geotargeting is the method of delivering different content to visitors based on their geolocation. This includes country, region/state, city, metro code/zip code, organization, IP address, ISP, or other criteria. A common usage of geotargeting is found in online advertising, as well as internet television with sites such as iPlayer and Hulu. In these circumstances, content is often restricted to users geolocated in specific countries; this approach serves as a means of implementing digital rights management. Use of proxy servers and virtual private networks may give a false location.

Geobytes is a global company that provides geolocation and anti-spam software. Geobytes was incorporated in the State of Delaware, USA in 1999.

<span class="mw-page-title-main">Geosocial networking</span> Social network with geographic features

Geosocial networking is a type of social networking in which geographic services and capabilities such as geocoding and geotagging are used to enable additional social dynamics. User-submitted location data or geolocation techniques can allow social networks to connect and coordinate users with local people or events that match their interests. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking.

Anonymizer, Inc. is an Internet privacy company, founded in 1995 by Lance Cottrell, author of the Mixmaster anonymous remailer. Anonymizer was originally named Infonex Internet. The name was changed to Anonymizer in 1997 when the company acquired a web based privacy proxy of the same name developed by Justin Boyan at Carnegie Mellon University School of Computer Science. Boyan licensed the software to C2Net for public beta testing before selling it to Infonex. One of the first web privacy companies founded, Anonymizer creates a VPN link between its servers and its users computer, creating a random IP address, rather than the one actually being used. This can be used to anonymously report a crime, avoid spam, avoid Internet censorship, keep the users identity safe and track competitors, among other uses.

Cyril Lionel Houri is a New York-based entrepreneur who has founded two geolocation technology companies: InfoSplit, Inc. and Mexens Technology Inc.. Houri has designed IP address geolocation, WiFi and cellular positioning technologies, and has testified as an expert witness on location-based technology in LICRA vs. Yahoo!.

Mobile web analytics studies the behaviour of mobile website users in a similar way to traditional web analytics. In a commercial context, mobile web analytics refers to the data collected from the users who access a website from a mobile phone. It helps to determine which aspects of the website work best for mobile traffic and which mobile marketing campaigns work best for the business, including mobile advertising, mobile search marketing, text campaigns, and desktop promotion of mobile sites and services.

The W3C Geolocation API is an effort by the World Wide Web Consortium (W3C) to standardize an interface to retrieve the geographical location information for a client-side device. It defines a set of objects, ECMAScript standard compliant, that executing in the client application give the client's device location through the consulting of Location Information Servers, which are transparent for the application programming interface (API). The most common sources of location information are IP address, Wi-Fi and Bluetooth MAC address, radio-frequency identification (RFID), Wi-Fi connection location, or device Global Positioning System (GPS) and GSM/CDMA cell IDs. The location is returned with a given accuracy depending on the best location information source available.

Mozilla Location Service (MLS) is an open geolocation service which allows devices to find their position by processing their received signals of publicly observable radio transmitters: cellular network antennae, Wi-Fi access points, and Bluetooth beacons. The service is provided by Mozilla since 2013. The service uses Mozilla's open source software project called Ichnaea.

<span class="mw-page-title-main">SaferSurf</span> Software product

SaferSurf is a software product for anonymous internet surfing. Aside from offering web anonymity, it has several other features, such as a geolocation proxy service bypassing country restrictions. SaferSurf runs centrally on a server and doesn't need a local installation.

<span class="mw-page-title-main">HMA (VPN)</span> Virtual private network service founded in 2005

HMA is a VPN service founded in 2005 in the United Kingdom. It has been a subsidiary of the Czech cybersecurity company Avast since 2016.

References

  1. Muir, James A.; Oorschot, Paul C. Van (2009-12-14). "Internet geolocation: Evasion and counterevasion". ACM Computing Surveys. 42 (1): 4:1–4:23. doi:10.1145/1592451.1592455. ISSN   0360-0300. S2CID   16289271.
  2. 1 2 Holdener, Anthony T. (2011). HTML5 Geolocation . O'Reilly Media. p.  11. ISBN   9781449304720.
  3. 1 2 Lindner, Thomas; Fritsch, Lothar; Plank, Kilian; Rannenberg, Kai (2004). Lamersdorf, Winfried; Tschammer, Volker; Amarger, Stéphane (eds.). "Exploitation of Public and Private WiFi Coverage for New Business Models". Building the E-Service Society. IFIP International Federation for Information Processing. 146. Springer US: 131–148. doi: 10.1007/1-4020-8155-3_8 . ISBN   978-1-4020-8155-2.
  4. RFC   760, DOD Standard Internet Protocol (January 1980)
  5. "IP geolocation (The NetOp Organization)". 2009-01-28. Archived from the original on 2009-01-25. Retrieved 2009-02-04.
  6. "Geolocation". APNIC . Retrieved 5 September 2022.
  7. Bush, Randy; Candela, Massimo; Kumari, Warren "Ace"; Housley, Russ (27 July 2021). "Finding and Using Geofeed Data". IETF . Retrieved 4 September 2022.
  8. An example is the guessed city provided by hostip.info.
  9. Berggren, Max; Karlgren, Jussi; Östling, Robert; Parkvall, Mikael (2015). "Inferring the location of authors from words in their texts". arXiv: 1612.06671 [cs.CL].
  10. Hill, Kashmir (2016-04-10). "How an internet mapping glitch turned a random Kansas farm into a digital hell". Fusion. Retrieved 2016-04-10.
  11. Hill, Kashmir (10 January 2019). "How Cartographers for the U.S. Military Inadvertently Created a House of Horrors in South Africa". Gizmodo. Retrieved 10 January 2019.
  12. Plaintiff: Coalition for Sexual Freedom and the National Coalition for Sexual Freedom Foundation, Defendant: US Attorney General John Ashcroft and the United States of America (2003-11-10). "Nitke vs. Ashcroft - Expert report of Seth Finkelstein" . Retrieved 2004-11-15.
  13. RealNetworks detects proxies and anonymizers; Google serves non-localized content if location is in doubt. "Geolocation: Don't Fence Web In". Wired. 2004-07-12. Archived from the original on 2006-05-14.
  14. "Digital Envoy wins Geotargeting Patent". 2004-06-29. Archived from the original on June 17, 2011. Retrieved 2010-04-19.
  15. "ClientSideNews, Nov/Dec 2010 issue, Page 6 "You Can Really Do That? – The Power of Geolocation Technology"" (PDF). Archived from the original (PDF) on 2011-08-13. Retrieved 2010-12-14.
  16. Marketing Magazine, February 10, 2011 “Thetrainline brings Digital Element on board for localised ad task”
  17. Music Streaming site we7 Cranks up the Volume for Digital Rights Management and Ad Targeting Archived 2010-12-06 at the Wayback Machine
  18. King, Kevin F. (2009-10-04). "Geolocation and Federalism on the Internet: Cutting Internet Gambling's Gordian Knot". SSRN   1433634.{{cite web}}: Missing or empty |url= (help)
  19. "FCC Strengthens Enhanced 911 Location Accuracy Requirements for Wireless Services" (PDF). Archived from the original (PDF) on August 11, 2011. Retrieved April 27, 2017.
  20. "File traceroute-geolocation" . Retrieved March 24, 2017.
  21. Los Angeles Deputy District Attorney, Wendy Segall Hides Evidence. [ dead link ]
  22. Vacca, John R. (2003). Identity Theft. Prentice Hall Professional. p. 400. ISBN   9780130082756.
  23. Barba, Robert (2017-11-18). "Sharing your location with your bank seems creepy, but it's useful". The Morning Call . Archived from the original on 2018-01-11. Retrieved 2018-01-10.
  24. Internet Retailer “Personalized web site content gives retailers an edge’, June 25, 2010
  25. "CinemaNow appeases studios by locating Web surfers". CNet. 2001-02-26. Retrieved 2010-04-22.
  26. "Geolocation: Don't Fence Web In". Wired News. Associated Press. 2004-07-12. Archived from the original on 2006-09-09. Retrieved 2006-09-28.
  27. Trimble, Marketa. "The future of cybertravel: legal implications of the evasion of geolocation". Fordham Intell.
  28. Needleman, Rafe; Claire Cane Miller; Adrianne Jeffries (3 September 2010). "Reporters' Roundtable: Checking in with Facebook and Foursquare". CNET. Retrieved 8 October 2010.
  29. "Recommending Social Events from Mobile Phone Location Data", Daniele Quercia, et al., ICDM 2010