CHAPTER 4: TECHNOLOGY

4.22.

Multipath TCP is an example of an emerging technology likely to have implications for
IP matching. Most mobile devices can access the internet through both WiFi and a
mobile phone data connection, utilising one or the other at one time. Technologies
such as Multipath TCP will enable the splitting of traffic between these two methods of
access, increasing the number of requests that will have to be made for
communications data and making the IP matching process more complex.

4.23.

Mobile Edge Computing is also likely to diminish the quantity of data entering the
central network. It brings content closer to the user by moving it from the central
network to the edge of networks. The benefits are faster delivery and better quality for
the user, for example, less buffering. However, this is likely to mean fewer
communications entering the core network and so lesser volumes of data available for
collection.

4.24.

Nomadic wireless technology provides devices with access to an internet connection
within a limited area: for example, the localised WiFi Access Points offered by coffee
shops in order to encourage custom. Users are transient and access to the internet
by a device can only be traced to a timeslot in the specified premises. If the device
connects to the internet elsewhere an identifier called a MAC address will recur,
however it is possible to change MAC addresses.

4.25.

The internet provides opportunities for undetected communications:
(a)

Anyone can set up an email address or social networking profile using a
pseudonym.18

(b)

Criminal gangs can use gaming consoles to communicate.19

(c)

Opportunities for covert communications via the internet include the use of
internet cafes and hidden web pages (see 4.67-4.70 below).

(d)

Encryption software, discussed in more detail below, can be used to hide the
content of communications.

(e)

An instant messaging service called Wickr allows users to send encrypted and
self-destructing messages.

New sources of data
4.26.

18

19

Technological change has also resulted in the explosion of open source information.
This describes all information that is in the public domain, such as social networking
sites, websites, blogs and many specific open source data and service providers.

A glimpse into the future of online identities can be found in patents granted to Apple in 2014 for
Automatic Avatar Creation technology and Avatar Reflecting User State technology. The former can
create a 3D icon resembling the user, while the latter will allow users to communicate via individualised
avatar expressions: L. Gonzalez, “Why Apple thinks 3D Avatars Will be the Future of Online Identities”,
PSFK, 10th April 2014.
JCDCDB Report, p. 381, citing the evidence of Peter Fahy, Chief Constable of Greater Manchester
Police.

54

Select target paragraph3