U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Protecting Your Anonymity Online: Keeping Your Cover in Undercover Internet Investigations

NCJ Number
207928
Journal
Law Enforcement Technology Volume: 31 Issue: 11 Dated: November 2004 Pages: 8,10,12,14
Author(s)
Mark Malcolm; Brian Girardi
Date Published
November 2004
Length
4 pages
Annotation
This article reviews Internet investigation techniques and provides guidance on developing an undercover identity for Internet investigations.
Abstract
The Internet has become an attractive form of communication for criminals because of the anonymity it provides. In order to pursue these criminals, investigators must also lurk on message boards and chat rooms while attempting to disguise their identities as law enforcement officers. Investigators generally use either active or passive techniques to root out online criminals. Passive techniques involve obtaining information from open sources on the Internet, such as from newsgroups or Web sites, name service lookup, WHOIS queries, and GeoLookup queries. Active investigation techniques, such as traceroute and ping methods, allow investigators to trace the physical path taken by Internet data back to the point of origin. Active techniques are riskier for investigators to use because they can be easily identified by a knowledgeable target. Criminals can also use these methods against law enforcement officers, identifying the location and owner of the computer being used by the officer. Creating an undercover identity is critically important for Internet investigators. Guidelines for protecting the online identity of investigators are offered and include obtaining a non-attributable credit card and choosing an ambiguous username.