[Air-L] Ensuring Anonymity when online - long

John white, Ph.D. john.white at wku.edu
Tue Feb 3 06:32:41 PST 2009


All,

A researcher has asked an interesting question:

> I am in the process of embarking on my own internet-based study that 
 > assesses internet child pornography related behaviors. I have
 > run into several challenges with regard to the anonymity of
 > data, as such data may be particularly interesting to law
 > enforcement. I am writing to call on your expertise in working
 > to resolve this issue. Given that you assessed illegal activities,
 > how did you prevent against the possibility of law enforcement
 > seizing data and connecting it to individuals via IP addresses


My reply:

> If I read your note correctly, you are most concerned about IP matches 
 > against a source computer.  The simplest way to defeat this would be
 > to identify multiple proxy servers that 'wash' this information away.
> 
> In essence, you encourage participants to utilize one of the many 
 > free servers that have been established on the internet.  You
 > can also make arrangements with your own University to have the IP
 > logs scrubbed on a regular basis (or even turned off).  Frankly, you
 > can set up almost any computer to act a server with these logs set
 > to 'off'.  You cannot block the ip logs on intervening 'hops' in
 > the data stream, but using a proxy server for entry, and your own
 > server that doesn't keep originating IPs complicates any tracing of
 > the source computer.
> 
> Wikipedia has an entry on proxy servers that is written in English:
> http://en.wikipedia.org/wiki/Proxy_server
> 
> There is also a website that appears to rank proxy servers:
> http://www.topfreeproxy.com/
> 
> There is also a program, administered through NIH that allows a 
 > researcher to obtain a government document declaring the project of
 > such interest to public health that none of the collected information
 > can be used by law enforcement, regardless of how much they would
 > like to obtain it.  Dr. Duncan is more aware of this particular
 > procedure than I am and could best answer any questions should
 > you seek this classification.
> 
> You can also arrange to have the survey hosted on a web site in the 
 > EU, which has a better history of enforcing privacy laws over the
 > past decade.  Additionally, identifying proxy servers overseas, may add
 > a further layer of security.
> 
> Lastly, you can obtain a security certificate and arrange for the 
 > data transmission to be secure using 128 bit encryption.  That way
 > the data stream is as secure as possible.  The technical personnel
 > at your University can help create a secure webpage for you.
> 
> There may be other security holes in your protocol I'm not aware of, 
 > but I can think of some procedures that will work in your favor:
> 
> 1) Lots of studies on the internet. The fact it is so large makes 
 > it harder to stumble across your site.
> 2) Block search engine access so you don't show up in Goggle/Yahoo, 
 > etc.  They use bots (autonomous programs) that search and check for
 > permission to search a page.
> 3) Don't link from other pages.  Create a stand alone survey where 
 > you have to type in a unique address to get the page.

Now, what other suggestions can be made as I am certain this will occur 
again in my own research and others?

JW

-- 
======================================================================
John B. White, Ph.D.                |               john.white at wku.edu
Dept. of Public Health - WKU        |             Office: 270.745.5867
College Heights Blvd.               |                Fax: 270.745.4437
Bowling Green, KY 42101-3576        |   http://www.wku.edu/~john.white
======================================================================



More information about the Air-L mailing list