Anonymity on the InternetBy Jacob Palme <jpalme@dsv.su.se>
and Mikael Berglund [1] French translation of this paper AbstractHow is anonymity used on the Internet? How anonymous is an
Internet user, and how can an Internet user achieve anonymity? What are
the pros and cons of anonymity on the Internet? Is anonymity controlled
by laws specially directed at regulating anonymity? How should laws on
anonymity in the Internet be constructed? Should the EU establish a common
directive on how anonymity is to be handled in the member states?
Latest change: 02-07-30 11:58 This document in HTML format: This document in PDF format:
|
Types of AnonymityIn this paper, the word "message" is used to designate
any communication unit (e-mail, newsgroup article, web page, pamphlet,
book, rumour, etc.) Anonymity means that the real author of a message is not
shown. Anonymity can be implemented to make it impossible or very difficult
to find out the real author of a message. A common variant of anonymity is pseudonymity, where another
name than the real author is shown. The pseudonym is sometimes kept
very secret, sometimes the real name behind a pseudonym is openly known,
such as Marc Twain as a pseudonym for Samuel Clemens
or Ed McBain as a pseudonym for Evan Hunter , whose original
name was Salvatore A. Lombino . A person can even use multiple
different pseudonyms for different kinds of communication. An advantage with a pseudonym, compared with complete
anonymity, is that it is possible to recognize that different messages
are written by the same author. Sometimes, it is also possible to write
a letter to a pseudonym (without knowing the real person behind it)
and get replies back. It is even possible to have long discourses between
two pseudonyms, none of them knowing the real name behind the other's
pseudonym. A disadvantage, for a person who wants to be anonymous, is
that combining information in many messages from the same person may
make it easier to find out who the real person is behind the pseudonym.
A variant of pseudonymity is deception [Donath 1996],
where a person intentionally tries to give the impression of being someone
else, or of having different authority or expertise. Anonymity before the InternetAnonymity is not something which was invented with the
Internet. Anonymity and pseudonymity has occurred throughout history.
For example, William Shakespeare is probably a pseudonym, and the real
name of this famous author is not known and will probably never be known.
Anonymity has been used for many purposes. A well-known person may use a pseudonym to write messages,
where the person does not want people's preconception of the real author
color their perception of the message. Also other people may want to hide certain information
about themselves in order to achieve a more unbiased evaluation of their
messages. For example, in history it has been common that women used
male pseudonyms, and for Jews to use pseudonyms in societies where their
religion was persecuted. Anonymity is often used to protect the privacy of people,
for example when reporting results of a scientific study, when describing
individual cases. Many countries even have laws which protect anonymity
in certain circumstances. Examples: A person may, in many countries, consult a priest, doctor
or lawyer and reveal personal information which is protected. In some
cases, for example confession in catholic churches, the confession booth
is specially designed to allow people to consult a priest, without seeing
him face to face. The anonymity in confessional situations is however not
always 100 %. If a person tells a lawyer that he plans a serious crime,
some countries allow or even require that the lawyer tell the police.
The decision to do so is not easy, since people who tell a priest or
a psychologist that they plan a serious crime, may often do this to
express their feeling more than their real intention. Many countries have laws protecting the anonymity of tip-offs
to newspapers. It is regarded as important that people can give tips
to newspapers about abuse, even though they are dependent on the organization
they are criticizing and do not dare reveal their real name. Advertisement in personal sections in newspapers are almost
always signed by a pseudonym for obvious reasons. Is Anonymity Good or Bad?In summary, anonymity and pseudonymity can be used for
good and bad purposes. And anonymity can in may cases be desirable for
one person and not desirable for another person. A company may, for
example, not like an employee to divulge information about improper
practices within the company, but society as a whole may find it important
that such improper practices are publicly exposed. Good purposes of anonymity and pseudonymity: + People dependent on an organization, or afraid
of revenge, may divulge serious misuse, which should be revealed. Anonymous
tips can be used as an information source by newspapers, as well as
by police departments, soliciting tips aimed at catching criminals.
Everyone will not regard such anonymous communication as good. For example,
message boards established outside companies, but for employees of such
companies to vent their opinions on their employer, have sometimes been
used in ways that at least the companies themselves were not happy about
[Abelson 2001]. Police use of anonymity is a complex issue, since the
police often will want to know the identity of the tipper in order to
get more information, evaluate the reliability or get the tipper as
a witness. Is it ethical for police to identify the tipper if it has
opened up an anonymous tipping hotline? + People in a country with a repressive political regime
may use anonymity (for example Internet-based anonymity servers in other
countries) to avoid persecution for their political opinions. Note that
even in democratic countries, some people claim, rightly or wrongly, that
certain political opinions are persecuted. [Wallace
1999] gives an overview of uses of anonymity to protect political
speech. Every country has a limit on which political opinions are allowed,
and there are always people who want to express forbidden opinions, like
racial agitation in most democratic countries. + People may openly discuss personal stuff which
would be embarrassing to tell many people about, such as sexual problems.
Research shows that anonymous participants disclose significantly more
information about themselves [Joinson 2001].
+ People may get more objective evaluation of their
messages, by not showing their real name. + People are more equal in anonymous discussions,
factors like status, gender, etc., will not influence the evaluation
of what they say. + Pseudonymity can be used to experiment with role
playing, for example a man posing as a woman in order to understand
the feelings of people of different gender. + Pseudonymity can be a tool for timid people to
dare establish contacts which can be of value for them and others, e.g.
through contact advertisements. There has always, however, also been a dark side of anonymity:
– Anonymity can be used to protect a criminal
performing many different crimes, for example slander, distribution of
child pornography, illegal threats, racial agitation, fraud, intentional
damage such as distribution of computer viruses, etc. The exact set of
illegal acts varies from country to country, but most countries have many
laws forbidding certain "informational" acts, everything from
high treason to instigation of rebellion, etc., to swindling. – Anonymity can be used to seek contacts
for performing illegal acts, like a pedophile searching for children
to abuse or a swindler searching for people to rip off. – Even when the act is not illegal, anonymity
can be used for offensive or disruptive communication. For example,
some people use anonymity in order to say nasty things about other people.
The border between illegal and legal but offensive use
is not very sharp, and varies depending on the law in each country.
Anonymity on the InternetEven though anonymity and pseudonymity is not something
new with the Internet, the net has increased the ease for a person to
distribute anonymous and pseudonymous messages. Anonymity on the Internet
is almost never 100 %, there is always a possibility to find the perpetrator,
especially if the same person uses the same way to gain anonymity multiple
times. In the simplest case, a person sends an e-mail or writes
a Usenet news article using a falsified name. Most mail and news software
allows the users to specify whichever name they prefer, and makes no
check of the correct identity. Using web-based mail systems like Hotmail,
it is even possible to receive replies and conduct discussions using
a pseudonym. The security for the anonymous user is not very high in
this case. The IP number (physical address) of the computer used is
usually logged, often also the host name (logical name). Many people
connect to the Internet using a temporary IP number assigned to them
for a single session. But also such numbers are logged by the ISP (Internet
Service Provider) and it is possible to find out who used a certain
IP number at a certain time, provided that the ISP assists in the identification.
There are also other well-known methods for breaking anonymity, for
example elements can be included on a web page, which communicates information
without knowledge of the person watching the web page. Some ISPs have
a policy of always assisting such searches for the anonymous users.
In this way they avoid tricky decisions on when to assist and not assist
such searches. In the case of e-mail, the e-mail header itself contains a trace of the route of a message. This trace is not normally shown to recipients, but most mailers have a command named something like full headers to show this information. An example of such a trace list is shown in Figure 1 . |
sentto-1119315-3675-1008119937-jpalme=dsv.su.se@returns.groups.yahoo.com Received: from n12.groups.yahoo.com (n12.groups.yahoo.com [216.115.96.62]) by unni.dsv.su.se (8.9.3/8.9.3) with SMTP id CAA21903 for <jpalme@dsv.su.se>; Wed, 12 Dec 2001 02:19:32 +0100 (MET) X-eGroups-Return: sentto-1119315-3675-1008119937-jpalme=dsv.su.se@returns.groups.yahoo.com Received: from [216.115.97.162] by n12.groups.yahoo.com with NNFMP; 12 Dec 2001 01:19:00 -0000 Received: (qmail 11251 invoked from network); 12 Dec 2001 01:18:56 -0000 Received: from unknown (216.115.97.167) by m8.grp.snv.yahoo.com with QMQP; 12 Dec 2001 01:18:56 -0000 Received: from unknown (HELO n26.groups.yahoo.com) (216.115.96.76) by mta1.grp.snv.yahoo.com with SMTP; 12 Dec 2001 01:18:59 -0000 X-eGroups-Return: lizard@mrlizard.com Received: from [216.115.96.110] by n26.groups.yahoo.com with NNFMP; 12 Dec 2001 01:12:56 -0000 X-eGroups-Approved-By: simparl <simparl@aol.com> via web; 12 Dec 2001 01:18:15 -0000 X-Sender: lizard@mrlizard.com X-Apparently-To: web-law@yahoogroups.com Received: (EGP: mail-8_0_1_2); 11 Dec 2001 20:50:42 -0000 Received: (qmail 68836 invoked from network); 11 Dec 2001 20:50:42 -0000 Received: from unknown (216.115.97.172) by m12.grp.snv.yahoo.com with QMQP; 11 Dec 2001 20:50:42 -0000 Received: from unknown (HELO micexchange.loanperformance.com) (64.57.138.217) by mta2.grp.snv.yahoo.com with SMTP; 11 Dec 2001 20:50:40 -0000 Received: from mrlizard.com (IAN2 [192.168.1.119]) by micexchange.loanperformance.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id W11PL97B; Tue, 11 Dec 2001 12:53:11 -0800 |
Figure 1: An example of the trace headers on an e-mail
message, which in this case has passed many servers on its route from
the original sender to the final recipient. Headers are added at the
top, so the last header in the list represents the original submission
of this message. To gain higher protection of anonymity, a clever impostor
can use various techniques to make identification more difficult. Examples
of such techniques are:
Anonymity serversSince anonymity has positive uses (see above) there are
people who run anonymity servers. An anonymity server receives messages,
and resends them under another identity. There are two types of anonymity
servers:
Anonymity servers often use encryption of the communication,
especially of the communication between the real user and the server,
to increase the security against wiretapping. There are companies which market anonymity servers and
there is a research area on improving the techniques of such software
[McCullagh 2001]. People who want to achieve high security against being
revealed, often use several anonymity servers in sequence. To trace
them, each of the servers must assist or be penetrated (see Figure
2 ). If the servers are placed in different countries, tracing them
becomes even more difficult. Figure 2: Steps to hide the real identity through
several servers A user might send a message to the first anonymity server,
instructing it to send the message to the second anonymity server, which
is instructed to send the message to the final recipient. An example: Anon.penet.fiAnon.penet.fri was a pseudonymity server started by Johan
Helsingius in Finland in 1992. It was very popular by people in other
countries, since they thought that relaying messages through an anonymity
server in Finland would reduce the risk of their real identity being
divulged. At its peak, it had 500 000 registered users and transferred
10 000 messages per day. There was a lot of controversy regarding this server.
Example 1: Some people claimed that the server was used
to distribute child pornography. This was both true and false. The server
had been used to communicate between providers and consumers about child
pornography. The actual pictures, however, had not been transmitted
through the server, even though they had been wrongly marked-up as coming
from the server. The server, in fact, had such a low limit on the maximum
size of messages, that only very small pictures (less than 48 kbyte)
could be sent through it. Example 2: The server was used by a former member of the
American quasi-religious organization “Scientology Church”
to distribute secret documents from this organization to the public.
The organization asked American police for help, claiming that the messages
infringed on their copyright. The American police contacted the Finnish
police in the spring of 1996, and the Finnish police forced Helsingius
to tell them the real name behind these messages. The way in which the
police in the U.S.A. and Finland treated this issue has been criticized
afterwards. As a result of these and other cases, Helsingius stopped
his server in August 1996. The Scientology Church has also attempted to stop newsgroups
discussing the Church on the Internet using various technical means
such as falsified CANCEL commands. Statistics on the Use of Anonymity
Mikael Berglund made a study on how anonymity was used. His study was based on scanning all publicly available newsgroups in a Swedish Usenet News server, which downloaded almost everything written in Usenet News internationally in September 1995. He randomly selected a number of messages, which were pseudonymous and were shown as coming from anon.penet.fi (they may not always in reality have passed through anon.penet.fi), and classified the topic of these messages. His results were as follows: |
Percentage |
Type of message |
|
---|---|---|
30,0 % |
Discussion |
|
|
|
Common topics: Sex, hobby, work, religion, politics, ethics, software.
|
23,1 % |
Advertisements |
|
|
|
Common topics: Sexual/romantic contact advertisements dominated,
a few other advertisements also used anonymity, for example ads searching
for friends with a particular interest. The authors of contact ads were
mostly male. |
16,5 % |
Questions and answers |
|
|
|
Common topics: Computer software issues, sex, medicine and drugs.
|
13,2 % |
Texts |
|
|
|
Common topics: Pornographic texts, about 50 % heterosexual and
50 % homosexual (purported to be written by both men and women), jokes,
sometimes nasty. |
9,9 % |
Test messages |
|
|
|
To try out if the anonymity server works. |
3,7 % |
Pictures |
|
|
|
Mostly erotic/pornographic. |
0,4 % |
Computer software |
|
3,3 % |
Unclassifiable |
|
|
|
Written in a language the researcher could not read, such as several
messages in Chinese. Note the repressive political regime in China,
which may be a reason why there were several people who needed to use
an anonymity server in discussing issues in that language. |
A classification of the contents of the messages shows (the total is more than
100 since some messages had more than one topic): |
Percentage |
Topic |
---|---|
18,8 % |
Sex |
18,5 % |
Partner search ad |
9,4 % |
Test |
8,7 % |
Software |
5,8 % |
Hobby, work |
4,7 % |
Unclassified |
4,3 % |
Computer hardware |
4,0 % |
Religion |
3,6 % |
Picture |
2,5 % |
Races, racism |
2,5 % |
Politics |
2,2 % |
Internet etiquette (people complaining of other people's misuse
of the net sometimes wrote anonymously) |
1,4 % |
Personal criticism of identified person |
1,4 % |
Internet reference |
1,4 % |
Ads selling something |
1,4 % |
Psychology |
1,1 % |
War, violence |
1,1 % |
Drugs (except pharmaceutical drugs) |
1,1 % |
Ethics |
1,1 % |
Contact ad which was not partner ad |
0,7 % |
Poetry |
0,7 % |
Celebrity gossip |
0,7 % |
Pharmaceutical drugs |
0,4 % |
Fiction |
0,4 % |
Censorship |
The most commonly used newsgroups were |
Percentage |
Newsgroup |
---|---|
21,7 % |
Alt.sex.fetish.hair |
19,5 % |
alt.personals.bi |
17,4 % |
alt.sex.stories |
16,4 % |
alt.personals.poly |
15,9 % |
alt.sex.stories.gay |
13,5 % |
alt.suicide.holiday |
13,4 % |
alt.personals.bondage |
12,6 % |
alt.sex.wanted |
11,8 % |
alt.recovery.addiction.sexual |
11,7 % |
alt.personals.spanking.punishment |
11,3 % |
alt.personals.spanking |
10,9 % |
alt.binaries.pictures.boys |
10,7 % |
alt.personals.ads |
10,2 % |
alt.test |
10,0 % |
alt.personals.intercultural |
9,7 % |
alt.personal.motss |
9,1 % |
alt.sex.intergen |
8,7 % |
alt.testing.testing |
8,5 % |
alt.personals.fat |
Legal View of AnonymitySince anonymity can both be used for good and bad purposes
(see the section "Is Anonymity
Good or Bad?" above), various countries have laws both protecting
and forbidding anonymity. For example, many countries have laws protecting the anonymity
of a person giving tips to a newspapers, and laws protecting the anonymity
in communication with priests, doctors, etc. are also common. On the other hand, the obvious risk of misuse of anonymity
, has caused some countries (for example France) to try special legislation
concerning anonymity, especially on the Internet, for example laws requiring
that all messages on the Internet must be identified with the real identity
of their source. Prosecutors and judges often are negative to all kinds
of anonymity. For example, U.S. Supreme Court Justice Scalia said “The
very purpose of anonymity is to facilitate wrong by eliminating accountability”
(quoted in [Framkin 1995]). The responsibility for messages has also been treated, for
example my home country, Sweden, has a law [Sweden 1998] which (simplified)
says that a service provider has responsibility for certain kind of illegal
messages which are stored and downloadable from his service. However,
if the service provider uses certain procedures to stop abuse, the service
provider is not any more responsible. Such procedures are to accept complaints
to a complaint board, and to remove messages which are obviously illegal,
if notified of this to the complaint board. The wordings of this law shows
that the lawmakers seriously tried writing a law which reasonably well
stops misuse without preventing the free flow of information on the Internet.
For example, the words “obviously are illegal” in the law
means that the service provider need not investigate the legality in doubtful
cases. For areas where illegal messages are common, the service provider
has to scan or censor them regularly, and this has caused many Swedish
service providers to ban certain newsgroups in which illegal messages
are common (such as “white supremacy” newsgroups and certain
pornography newsgroups). LobbyingLegal authorities, such as police and prosecutors often
lobby for laws forbidding anonymity on the Internet, for example, a group
of prosecutors from different EU countries recently urged the EU to issue
a directive which forbids anonymity on the Internet. Their main argument
was that this was needed to stop illegal racial agitation. Civil liberties
organizations, on the other hand, often lobby for protection of anonymity
on the Internet, for example the American Civil Liberties Union (ACLU)
[ACLU 2000]. How to Regulate Anonymity on the InternetSince these issues are difficult and sensitive, it is not
easy to decide how to lawfully regulate anonymity on the Internet. It
is, however, important not to let the lobbying from police and prosecutors
determine this. Here is an excerpt from an EU report [EU 1999], which shows
that the authorities are aware of the issues of anonymity: In accordance with the principle of freedom of expression
and the right to privacy, use of anonymity is legal. Users may wish to
access data and browse anonymously so that their personal details cannot
be recorded and used without their knowledge. Content providers on the
Internet may wish to remain anonymous for legitimate purposes, such as
where a victim of a sexual offence or a person suffering from a dependency
such as alcohol or drugs, a disease or a disability wishes to share experiences
with others without revealing their identity, or where a person wishes
to report a crime without fear of retaliation. A user should not be required
to justify anonymous use. Anonymity may however also be used by those engaged in illegal
acts to complicate the task of the police in identifying and apprehending
the person responsible. Further examination is required of the conditions
under which measures to identify criminals for law enforcement purposes
can be achieved in the same way as in the “off-line” world.
Precedents exist in laws establishing conditions and procedures for tapping
and listening into telephone calls. Anonymity should not be used as a
cloak to protect criminals. Below is my personal idea how such a law or EU directive
might be written. I am sure others have other ideas!
References |
[Abelson 2001] |
By the Water Cooler in Cyberspace, the Talk Turns Ugly, by
Reed Abelson, New York times, 29 April 2001. http://www.nytimes.com/2001/04/29/technology/29HARA.html?searchpv=site14 |
[ACLU 2000] |
PA Court Establishes First-Ever Protections For Online Critics
of Public Officials, http://www.aclu.org/news/2000/n111500a.html
November 2000. |
[Berglund 1997] |
Usenet News and anon-penet.fi. Master's thesis, in Swedish,
DSV, Stockholm. |
[Donath 1996] |
Identity and Deception in the Virtual Community by Judith
Donath, in Kollock, P. and Smith M. (eds): Communities in Cyberspace,
Routledge, London, 1999. http://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html. |
[EU 1999] |
Working party on illegal and harmful content on the internet,
EC Report, May 1999, http://europa.eu.int/ISPO/legal/en/internet/wpen.html |
[Froomkin 1995] |
Anonymity and its enemies. Journal of Online Law, art. 4,
by A. Michael Froomkin, http://www.wm.edu/law/publications/jol/95_96/froomkin.html |
[Joinson 2001] | Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Social Psychology, 31, 177-192. |
[McCullagh 2001] |
You Can Hide From Prying Eyes, by Declan McCullagh, Wired
News, April 27, 2001 http://www.wired.com/news/politics/0,1283,43355,00.html. |
[Stoll 1989] |
The Cuckoo's Egg:Tracking a Spy Through the Maze of Computer
Espionage, by Clifford Stoll, Doubleday, New York 1989. |
[Sweden 1998] |
Act (1998:112) on Responsibility for Electronic Bulletin Boards,
in Swedish at http://www.notisum.se/rnp/sls/lag/19980112.HTM
and in English translation at http://dsv.su.se/jpalme/society/swedish-bbs-act.html |
[Wallace 1999] | Nameless in Cyberspace, anonymity on the Internet, by Jonathan D. Wallace, CATO Institute Briefing Papers, December 8, 1999. http://www.cato.org/pubs/briefs/bp-054es.html, http://www.cato.org/pubs/briefs/bp54.pdf |
[1] This paper was written by Jacob Palme, using much material from the paper "Usenet news and anon.penet.fi" by Mikael Berglund. |