| overview 
 perspectives
 
 frameworks
 
 agencies
 
 CII
 
 desktops
 
 criminals
 
 messaging
 
 vandalism
 
 fraud
 
 authentication
 
 anonymity
 
 pseudonymity
 
 malware
 
 crypto
 
 geolocation
 
 economics
 
 insurance
 
 liability
 
 kids
 
 s-business
 
 appraisal
 
 self-help
 
 forensics
 
 
 
 
 
 
 
 
 
 
 
 
  related
 Guides:
 
 Governance
 
 Information
 Economy
 
 Consumers
 & Trust
 
 Privacy
 
 
 
  related
 Profiles:
 
 Identity
 Theft
 
 Forgery &
 Forensics
 
 Surveillance
 
 |  Geolocation 
 This page considers geolocation technologies and issues.
 
 It covers -
 Other 
                        perspectives are provided in the discussion elsewhere 
                        on this site regarding geospatial privacy and the discussion 
                        of tools such as ANPR.
 
  introduction 
 Despite claims that the internet is necessarily and invariably 
                        borderless there is substantial expert support for claims 
                        that it will be possible to develop geolocation technologies 
                        that enable law enforcement agencies (and businesses) 
                        to locate an activity within a particular part of cyberspace.
 
 Like activity offline, that geolocation won't work in 
                        all instances. The technologies pose a range of policy 
                        issues (for example privacy) and operational problems. 
                        They've been dismissed by some experts. They have also 
                        received cautious support from figures such as Vint Cerf.
 
 One example is the 1996 paper 
                        by Dorothy Denning & Peter MacDoran on Location-Based 
                        Authentication: Grounding Cyberspace for Better Security.
 
 Most geolocation services work by matching an individual 
                        user's internet protocol address - discussed here 
                        - to a geographical location. That matching is broadly 
                        similar to identifying the location of a user of a fixed 
                        line phone on the POTS by deconstructing national and 
                        area codes.
 
 In practice there is no authoritative database that matches 
                        single IP addresses with physical locations. That's resulted 
                        in fuzziness, with geolocation service providers such 
                        as Quova and Akamai needing to develop their own databases.
 
 Geolocation has a range of uses, of which content restriction 
                        and fraud management have gained most attention. Some 
                        businesses are using geolocation services to deliver location-specific 
                        content and, of course, to facilitate the assembly of 
                        demographic information.
 
 We'll be adding more detailed pointers, with a discussion 
                        of particular technologies and issues.
 
 
  issues 
 A 2005 report for the Canadian government commented that
  
                        Location 
                          technologies introduce new challenges with respect to 
                          privacy policy and law. For instance, how does consent 
                          operate when one is in a continuous circuit? Should 
                          consent be given only once, when signing up to use the 
                          cellphone, when the user is to be tracked every moment 
                          thereafter? Significantly, location information may 
                          be combined with other data to create profiles with 
                          yet another dimension, place, added to the previously 
                          existing mix. The parallels with already existing surveillance 
                          based on neighbourhood or on virtual movement on the 
                          internet suggest that such data will indeed be valuable. 
                          While parental tracking of teenagers may raise only 
                          privacy issues, important though they may turn out to 
                          be, commercial and law enforcement use of such data 
                          could well be significant for social sorting. The other, 
                          already existing, data are used to enable discrimination 
                          and differential treatment for different categories 
                          of persons and location data could well add one more 
                          dimension to the same processes.  It 
                        continued that  
                        Concerns 
                          about the misuse of location data are of more than one 
                          sort. One concern is that, with the integrated usage 
                          of mobile computing devices, location tracking devices 
                          and communication networks, there is potential for abuse 
                          of such technology through surreptitious or unwarranted 
                          tracking of the user. While forms of stalking 
                          may spring to mind, other more prosaic misuses may occur 
                          when tracking devices are used to regulate users....
 Another important concern under the misuse heading is 
                          that, in addition to current personal information that 
                          has been collected from a user, the use of location-based 
                          technology in tandem with wireless technology now adds 
                          geographical location information to the catalogue of 
                          personal information acquired. Marketing companies are 
                          especially interested in such data, indeed with increasing 
                          strategic integration between marketing and security 
                          agencies, these data may well turn out to have considerable 
                          added value. ...
 
 Other concerns include the vulnerability of the new 
                          location technologies to unauthorized interception. 
                          A number of critics complain that mobile computing devices 
                          possess weak communications security. Currently, wireless 
                          communication is poorly encrypted, leading many users 
                          to wonder how vulnerable they really are to hackers 
                          and war-drivers. When mobile computing devices are partnered 
                          with GPS and mobile technology, a user’s location 
                          and the context they are working within in realtime 
                          can become vulnerable to penetration alongside their 
                          communication content.
  applications 
 Internet, wireless and satellite location-based Services 
                        (LBS) encompass -
 
                        safety 
                          applications - for example automatic caller location 
                          schemes for emergency services so that ambulance, fire 
                          or other assistance may be sent to the correct locationsurveillance 
                          schemes such as Digital 
                          Angel - leveraging wireless or wireless-&-GPS technology 
                          and typically alerting operators of the schemes if the 
                          'target' (a child, aged care facility resident, sex 
                          offender, stalker 
                          or person with an AVO) moves away from a wireless base 
                          station (eg moves outside fifty metres on home detention) 
                          or comes into proximity of a station (eg comes near 
                          a school).affinity 
                          services - such as the dating 
                          service described here, 
                          using bluetooth, wireless net or mobile phone-based 
                          geolocation technologies to signal that a person with 
                          particular attributes is in an individual's vicinitybilling 
                          applications - automatic payment services permitting 
                          users to receive discounts on services such as calls 
                          made based on their location. information 
                          applications - map or other information actively requested 
                          by the user based on current location, for example location-based 
                          traffic updates to drivers or directions to desired 
                          restaurants or events.logistics 
                          tracking applications - using vehicle, item based or 
                          person-based devices that enable tracking of items or 
                          people on a realtime or quasi-realtime basis (eg for 
                          managing taxi/parcel delivery fleets).advertisement 
                          applications deliver location-sensitive content (including 
                          SMS and email) through messages to a user's mobile device, 
                          whether requested or otherwise  services 
 Commercial and free products and services include
 
                        QuovaEdgeScapeVerifia's 
                          NetGeoNetAcuityInfoSplit 
                          IP2locationactivetargetMaxmindjavainetlocator GeoURL 
                        offers a 'location-to-URL reverse directory', based on 
                        inclusion of geographical coordinates in website metadata 
                        - 
                        This 
                          will allow you to find URLs by their proximity to a 
                          given location. Find your neighbor's blog, perhaps, 
                          or the web page of the restaurants near you.  As 
                        of September 2005 GeoURL listed 192,590 sites. It competes 
                        with the GeoTags 
                        location-based search engine.
 
  studies 
 The 2005 Location Technologies: Mobility, Surveillance 
                        and Privacy (PDF) 
                        report to the Office of the Privacy Commissioner of Canada 
                        considers location technologies and their social impact, 
                        "inspired by the recent advent of real-time tracking 
                        technologies that create new concerns for Canadians and 
                        for Canadian policy provisions". It is complemented 
                        by GIS & Crime Mapping (New York: Wiley 2005) 
                        by Spencer Chainey & Jerry Ratcliffe.
 
 Studies regarding locational privacy issues are highlighted 
                        in the privacy guide elsewhere on this site. They include 
                        Michael Curry's paper 
                        In Plain & Open View: GIS and the Problem of Privacy 
                        and  Digital Places: Living with Geographic 
                        Information Technologies (London: Routledge 1998), 
                        Harlan Onsrud's Ethical Issues in the Use and Development 
                        of GIS (PDF), 
                        Nicholas Chrisman's Exploring Geographic Information 
                        Systems (New York: Wiley 1997), Ground Truth: The 
                        Social Implications of Geographic Information Systems 
                        (New York: Guilford 1997) edited by John Pickles, the 
                        1996 paper GIS & Society: The Social Implications 
                        of How People, Space and Environment Are Represented in 
                        GIS (PDF) 
                        by Trevor Harris & Daniel Weiner and Geographic 
                        Information Science: Mastering the Legal Issues (Milton: 
                        Wiley 2005) by George Cho.
 
 For 'presence' see Intelligent Environments: Spatial 
                        Aspects of the Information Revolution (Amsterdam: 
                        North Holland 1997) edited by Peter Droege and other works 
                        highlighted in the Networks & the GII guide 
                        elsewhere 
                        on this site.
 
 
 
 
 
 
 
  next 
                        page  (economics) 
 
 
 | 
                       
                          |