IPv6 Crime Attribution

The migration from IPv4 to IPv6 is intended to fix a large number of problems that have been identified through many years of global use, not least of which is the shortage of available IPv4 addresses. One of the challenges with IPv4 that has not, apparently, been adequately considered is the crime attribution characteristics of IPv6 technologies. The challenge of crime attribution on the Internet is an important one and a careful balance needs to be struck between the needs of law enforcement, the rights of crime victims and the right to privacy of the vast majority of Internet users who have no involvement in any sort of criminality.

Publications

  • Analysis of the Crime Attribution Characteristics of Various IPv6 Address Assignment Techniques
    • IPv6 provides several mechanisms through which hosts can be assigned an IP address including manual configuration, DHCPv6 and Stateless Address Autoconfiguration (SLAAC). This document examines the crime attribution characteristics of the address assignment techniques, as well as several other related technologies.
    • Published in the independent submission stream in April 2018.
  • A Model for Storing IPv6 Stateless Address Autoconfiguration Crime Attribution Records in a Privacy Sensitive Way
    • The need for individual right to privacy and the need for law enforcement to be able to effectively investigate crime are sometimes portrayed as being irreconcilably in direct conflict with each other. Both needs are legitimate and ignoring the challenges presented by areas of conflict will not make the problem go away. The document presents a conceptual model that allows for both sets of requirements to be met simultaneously.  The reason for this publication is to show that, with some creative thinking, it is possible to identify win-win solutions that simultaneously achieve both privacy and law enforcement goals.
    • Published in the independent submission stream in May 2018.

 

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site you are accepting the use of cookies in accordance with our privacy policy.
Privacy Policy Accept