computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, e ...
, Internet geolocation is software capable of deducing the
geographic position
The geographic coordinate system (GCS) is a spherical or ellipsoidal coordinate system for measuring and communicating positions directly on the Earth as latitude and longitude. It is the simplest, oldest and most widely used of the various ...
of a device connected to the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. For example, the device's
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
can be used to determine the country, city, or ZIP code, determining its geographical location. Other methods include examination of Wi-Fi hotspots,
Data sources
An
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
is assigned to each device (e.g. computer, printer) participating in a
computer network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
that uses the
Internet Protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
IP h ...
for communication., ''DOD Standard Internet Protocol'' (January 1980) The protocol specifies that each IP packet must have a header which contains, among other things, the IP address of the sender.
There are a number of free and paid subscription geolocation
database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
s, ranging from country level to state or city—including ZIP/
post code
A postal code (also known locally in various English-speaking countries throughout the world as a postcode, post code, PIN or ZIP Code) is a series of letters or digits or both, sometimes including spaces or punctuation, included in a postal a ...
level—each with varying claims of accuracy (generally higher at the country level). These databases typically contain IP address data which may be used in firewalls, ad servers, routing, mail systems, web sites, and other automated systems where a geolocation may be useful. An alternative to hosting and querying a database is to obtain the country code for a given IP address through a
DNSBL
A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whe ...
-style lookup from a remote server.
Some commercial databases have augmented geolocation software with demographic data to enable demographic-type targeting using IP address data.
The primary source for IP address data is the
regional Internet registries
A regional Internet registry (RIR) is an organization that manages the allocation and registration of Internet number resources within a region of the world. Internet number resources include IP addresses and autonomous system (AS) numbers.
...
which allocate and distribute IP addresses amongst organizations located in their respective service regions:
* African Network Information Centre (AfriNIC)
*
American Registry for Internet Numbers
The American Registry for Internet Numbers (ARIN) is the regional Internet registry for Canada, the United States, and many Caribbean and North Atlantic islands. ARIN manages the distribution of Internet number resources, including IPv4 and IPv ...
(ARIN)
*
Asia-Pacific Network Information Centre
APNIC (the Asia Pacific Network Information Centre) is the regional Internet address registry ( RIR) for the Asia-Pacific region. It is one of the world's five RIRs and is part of the Number Resource Organization (NRO).
APNIC provides numbe ...
RFC
RFC may refer to:
Computing
* Request for Comments, a memorandum on Internet standards
* Request for change, change management
* Remote Function Call, in SAP computer systems
* Rhye's and Fall of Civilization, a modification for Sid Meier's Civ ...
9092 allows assignees to specify location of any IP
subnetwork
A subnetwork or subnet is a logical subdivision of an IP network. Updated by RFC 6918. The practice of dividing a network into two or more networks is called subnetting.
Computers that belong to the same subnet are addressed with an identical ...
they own.
Secondary sources include:
* Data mining or user-submitted geographic location data:
** Website-submitted, e.g. a weather website asking visitors for a city name to find their local forecast or pairing a user's IP address with the address information in their account profile.
** Wi-Fi positioning system through the examination of neighborhood Wi-Fi
BSSID
In IEEE 802.11 wireless local area networking standards (including Wi-Fi), a service set is a group of wireless network devices which share a ''service set identifier'' (''SSID'')—typically the natural language label that users see as a network ...
. E.g.
Mozilla Location Service
Mozilla Location Service (MLS) is an open geolocation service which allows devices to find their position by processing their received signals of publicly observable radio transmitters: cellular network antennae (and their Cell IDs), Wi-Fi acce ...
.
** Examination of neighborhood
Bluetooth
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
devices.
** Pairing a user's IP address with the
GPS location
Geodetic coordinates are a type of curvilinear coordinate system, curvilinear orthogonal coordinate system used in geodesy based on a ''reference ellipsoid''.
They include geodetic latitude (north/south) , ''longitude'' (east/west) , and ellipsoi ...
of a device that's using such an IP address.
* Data contributed by
Internet service provider
An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s.
*
Guesstimate
''Guesstimate'' is an informal English portmanteau of ''guess'' and ''estimate'', first used by American statisticians in 1934 or 1935.Class C range and/or gleaned from network
hops
Hops are the flowers (also called seed cones or strobiles) of the hop plant ''Humulus lupulus'', a member of the Cannabaceae family of flowering plants. They are used primarily as a bittering, flavouring, and stability agent in beer, to whi ...
.
* Network routing information collected to the end point of the IP address.
* Analysis of linguistic data from the device, using pretrained models that show that some term is frequently mentioned in a certain location (e.g. "the T" vs "the El" vs. "the subway").
Accuracy is improved by:
*
Data scrubbing
Data scrubbing is an error correction technique that uses a background task to periodically inspect main memory or storage for errors, then corrects detected errors using redundant data in the form of different checksums or copies of data. Data ...
Statistical analysis
Statistical inference is the process of using data analysis to infer properties of an underlying distribution of probability.Upton, G., Cook, I. (2008) ''Oxford Dictionary of Statistics'', OUP. . Inferential statistical analysis infers propertie ...
of user submitted data.
* Utilizing third-party tests conducted by reputable organizations.
Errors
If geolocation software maps IP addresses associated with an entire county or territory to a particular location, such as the geographic center of the territory, this can cause considerable problems for the people who happen to live there, as law enforcement authorities and others may mistakenly assume any crimes or other misconduct associated with the IP address to originate from that particular location.
For example, a farmstead northeast of
Potwin, Kansas
Potwin is a city in Butler County, Kansas, Butler County, Kansas, United States. It is named after the town site land owner Charles Potwin. As of the 2020 United States census, 2020 census, the population of the city was 421.
History
Early hi ...
became the default site of 600 million
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es when the Massachusetts-based digital mapping company MaxMind changed the putative
geographic center of the contiguous United States
The geographic center of the United States is a point approximately north of Belle Fourche, South Dakota at . It has been regarded as such by the U.S. National Geodetic Survey (NGS) since the additions of Alaska and Hawaii to the United State ...
from 39.8333333,-98.585522 to 38.0000,-97.0000. Since 2012, a family in
Pretoria
Pretoria () is South Africa's administrative capital, serving as the seat of the Executive (government), executive branch of government, and as the host to all foreign embassies to South Africa.
Pretoria straddles the Apies River and extends ...
, South Africa, has been regularly visited by police or angry private citizens who believed their stolen phones were to be found in the family's backyard. This was also the result of geolocation by MaxMind. The company used the
National Geospatial-Intelligence Agency
The National Geospatial-Intelligence Agency (NGA) is a combat support agency within the United States Department of Defense whose primary mission is collecting, analyzing, and distributing geospatial intelligence (GEOINT) in support of national ...
's coordinates for Pretoria, which pointed to the family's house, to represent IP addresses associated with Pretoria.
Privacy
A distinction can be made between ''co-operative'' and ''oppositional'' geolocation. In some cases, it is in the interest of users to be accurately located, for example, so that they can be offered information relevant to their location. In other cases, users prefer not to disclose their location for privacy or other reasons.
Technical measures for ensuring
anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
, such as
proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a request ...
s, can be used to circumvent restrictions imposed by geolocation software. Some sites detect the use of proxies and anonymizers, and may either block service or provide non-localized content in response.
marketing
Marketing is the process of exploring, creating, and delivering value to meet the needs of a target market in terms of goods and services; potentially including selection of a target audience; selection of certain attributes or themes to emph ...
content and
pricing
Pricing is the process whereby a business sets the price at which it will sell its products and services, and may be part of the business's marketing plan. In setting prices, the business will take into account the price at which it could acqui ...
. Additionally, the U.S.
Federal Communications Commission
The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdiction ...
(FCC) has proposed that geolocation software might be leveraged to support
9-1-1
, usually written 911, is an emergency telephone number for the United States, Canada, Mexico, Panama, Palau, Argentina, Philippines, Jordan, as well as the North American Numbering Plan (NANP), one of eight N11 codes. Like other emergency nu ...
location determination.
An IP address or the related uniqueURL may also be investigated with basic functions, typing from the
keyboard
Keyboard may refer to:
Text input
* Keyboard, part of a typewriter
* Computer keyboard
** Keyboard layout, the software control of computer keyboards and their mapping
** Keyboard technology, computer keyboard hardware and firmware
Music
* Musi ...
two instructions:
ping
Ping may refer to:
Arts and entertainment Fictional characters
* Ping, a domesticated Chinese duck in the illustrated book '' The Story about Ping'', first published in 1933
* Ping, a minor character in ''Seinfeld'', an NBC sitcom
* Ping, a c ...
and
traceroute
In computing, traceroute and tracert are computer network diagnostic commands for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as th ...
. In
Unix-like
A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, although not necessarily conforming to or being certified to any version of the Single UNIX Specification. A Unix-li ...
systems, they are available as a command line tool. In the same way,
Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
has the prompt of
DOS
DOS is shorthand for the MS-DOS and IBM PC DOS family of operating systems.
DOS may also refer to:
Computing
* Data over signalling (DoS), multiplexing data onto a signalling channel
* Denial-of-service attack (DoS), an attack on a communicat ...
working with those instructions.
Criminal investigations
Banks, software vendors and other online enterprises in the US and elsewhere became subject to strict "
know your customer
Know Your Customer (KYC) guidelines in financial services require that professionals make an effort to verify the identity, suitability, and risks involved with maintaining a business relationship. The procedures fit within the broader scope of a ...
" laws imposed by the
USA PATRIOT Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of Congress, Act of the United States Congress, signed into law by President of the United States, President George W. Bush. The formal name of the statute is the Uniti ...
, the
Bank Secrecy Act
The Bank Secrecy Act of 1970 (BSA), also known as the Currency and Foreign Transactions Reporting Act, is a U.S. law requiring financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laund ...
, the
US Treasury Department
The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States, where it serves as an executive department. The department oversees the Bureau of Engraving and Printing and th ...
's
Office of Foreign Assets Control
The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the U.S. Treasury Department. It administers and enforces economic and trade sanctions in support of U.S. national security and foreign policy ob ...
and other regulatory entities in the US and Europe from the early twenty-first century. These laws are intended to prevent money laundering, trafficking with terrorist organizations, and trading with banned nations. When it is possible to identify the true location of online visitors, geolocation can protect banks from participating in the transfer of funds for illicit purposes. More and more prosecuting bodies are bringing cases involving cyber-crimes such as cyber-stalking and identity theft. Prosecutors often have the capability of determining the
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
data necessary to link a computer to a crime.
Fraud detection
Online retailers and payment processors use geolocation to detect possible
credit card fraud
Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The P ...
by comparing the user's location to the billing address on the account or the shipping address provided. A mismatch – an order placed from the US on an account number from Tokyo, for example – is a strong indicator of potential fraud. IP address geolocation can be also used in
fraud detection
In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensa ...
to match billing address postal code or area code. Banks can prevent "
phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
" attacks,
money laundering
Money laundering is the process of concealing the origin of money, obtained from illicit activities such as drug trafficking, corruption, embezzlement or gambling, by converting it into a legitimate source. It is a crime in many jurisdictions ...
and other security breaches by determining the user's location as part of the authentication process.
Whois
WHOIS (pronounced as the phrase "who is") is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomou ...
databases can also help verify
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es and registrants.
Government, law enforcement and corporate security teams use geolocation as an investigatory tool, tracking the Internet routes of online attackers to find the perpetrators and prevent future attacks from the same location.
Geomarketing
Since geolocation software can get the information of user location, companies using geomarketing may provide
web content
Web content is the wikt:text, text, visual system, visual or audio signal, audio Content (media), content that is made available online and user encountered as part of the online usage and user experience, experience on websites. It may include t ...
or products that are famous or useful in that specific location. Advertisements and content on a website that uses geolocation software in the form of an
API
An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software Interface (computing), interface, offering a service to other pieces of software. A document or standa ...
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
movie vendors, online broadcasters who serve live streaming video of sporting events, or certain TV and music video sites that are licensed to broadcast their videos of episodes/music videos are permitted to serve viewers only in their licensed territories. By geolocating viewers, they can be certain of obeying licensing regulations. Online gambling websites must also know where their customers violate gambling laws, or risk doing so.
Jim Ramo, chief executive of movie distributor Movielink, said studios were aware of the shortcomings going in and have grown more confident now that the system has been shown to work.
Gaming
A
location-based game
A location-based game (or location-enabled game, or geolocation-based game) is a type of game in which the gameplay evolves and progresses via a player's location. Location-based games must provide some mechanism to allow the player to report thei ...
is a type of
pervasive game A pervasive game is one where the gaming experience is extended out in the real world, or where the fictive world in which the game takes place blends with the physical world. The "It's Alive" mobile games company described pervasive games as "game ...
for
smartphone
A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s or other
mobile device
A mobile device (or handheld computer) is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical ...
s in which the
gameplay
Gameplay is the specific way in which players interact with a game, and in particular with video games. Gameplay is the pattern defined through the game rules, connection between player and the game, challenges and overcoming them, plot and pla ...
evolves and progresses via a player's real-world location which is typically obtained by
GPS
The Global Positioning System (GPS), originally Navstar GPS, is a Radionavigation-satellite service, satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of t ...
functionality from the device.
See also
*
Geo-blocking
Geo-blocking or geoblocking is technology that Internet filter, restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, su ...
*
Geotargeting
In geomarketing and internet marketing, geotargeting is the method of delivering different content to visitors based on their geolocation. This includes country, region/state, city, metro code/ zip code, organization, IP address, ISP, or other cri ...
*
GPS navigation software
Satellite navigation software or GPS navigation software usually falls into one of the following two categories:
# Navigation with route calculation and directions from the software to the user of the route to take, based on a vector-based map, n ...
*
Location-based service
A location-based service (LBS) is a general term denoting software services which use geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, ent ...
*
MAC address anonymization
MAC address anonymization performs a one-way function on a MAC address so that the result may be used in tracking systems for reporting and the general public, while making it nearly impossible to obtain the original MAC address from the result ...
*
Locator software
An online locator service (also known as location finder, store finder, or store locator, or similar) is a feature found on websites of businesses with multiple locations that allows visitors to the site to find locations of the business within pro ...
*
Personalization
Personalization (broadly known as customization) consists of tailoring a service or a product to accommodate specific individuals, sometimes tied to groups or segments of individuals. A wide variety of organizations use personalization to improv ...
*
W3C Geolocation API
The W3C Geolocation API is an effort by the World Wide Web Consortium (W3C) to standardize an interface to retrieve the geographical location information for a client-side device. It defines a set of objects, ECMAScript standard compliant, that e ...
*
Kinomap
Kinomap is a complete end-to-end platform for creating, hosting, sharing and using motion videos for user-generated videos. Kinomap allows uploading motion videos shot with a GPS camera or a common camera coupled with GPS track from another ...
(geolocation video software)
*
Mobile phone tracking
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers o ...
*
TV White Space Database
TV White Space database, also commonly referred to as (TV) geolocation database, is an entity that controls the TV spectrum utilization by unlicensed white spaces devices within a determined geographical area. Its sole objective is to enable unlic ...