Tempo123 (talk | contribs)
Replace paywalled academic source with archived version from discord CDN (received from original author after requesting from them on Discord) and archive again.
Tempo123 (talk | contribs)
 
(One intermediate revision by the same user not shown)
Line 4: Line 4:


===Complaints from law enforcement agencies===
===Complaints from law enforcement agencies===
Law enforcement agencies find it harder to identify criminals behind an IPv4 address used by thousands of people. As a result the agency may have to tap connections of all users sharing that address to identify the criminal. <ref>{{Cite web |last=European Cybercrime Centre (EC3) |date=17 Oct 2017 |title=Are you sharing the same IP address as a criminal? Law enforcement call for the end of Carrier Grade NAT (CGN) to increase accountability online |url=https://www.europol.europa.eu/media-press/newsroom/news/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online |website=europol.europa.eu |url-status=live |archive-url=http://web.archive.org/web/20260113094744/https://www.europol.europa.eu/media-press/newsroom/news/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online |archive-date=13 Jan 2026}}</ref><ref name=":0">{{Cite web |last=Gözükara |first=Furkan |date=12 Aug 2020 |title=Challenges and possible severe legal consequences of application users identification from CNG-Logs |url=https://megalodon.jp/2026-0322-2005-47/https://cdn.discordapp.com:443/attachments/1484862664252592178/1485093404877524992/Challenges_and_possible_severe_legal_consequences_of_application_users_identification_from_CNG-Logs.pdf?ex=69c09c83&is=69bf4b03&hm=bbcf1d7804a49737bc96785e789148610be43243902c1b1913f04ada19a67c08& |url-status=live |archive-url=https://web.archive.org/web/20260322105855if_/https://cdn.discordapp.com/attachments/1484862664252592178/1485093404877524992/Challenges_and_possible_severe_legal_consequences_of_application_users_identification_from_CNG-Logs.pdf?ex=69c09c83&is=69bf4b03&hm=bbcf1d7804a49737bc96785e789148610be43243902c1b1913f04ada19a67c08& |archive-date=22 Mar 2026 |access-date=22 Mar 2026 |website=Megalodon |series=Forensic Science International: Digital Investigation |publisher=Elsevier Ltd. |publication-date=8 Nov 2021 |via=ScienceDirect |doi=10.1016/j.fsidi.2021.301312}}</ref>
Law enforcement agencies find it harder to identify criminals behind an IPv4 address used by thousands of people. As a result the agency may have to tap connections of all users sharing that address to identify the criminal. <ref>{{Cite web |last=European Cybercrime Centre (EC3) |date=17 Oct 2017 |title=Are you sharing the same IP address as a criminal? Law enforcement call for the end of Carrier Grade NAT (CGN) to increase accountability online |url=https://www.europol.europa.eu/media-press/newsroom/news/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online |website=europol.europa.eu |url-status=live |archive-url=http://web.archive.org/web/20260113094744/https://www.europol.europa.eu/media-press/newsroom/news/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online |archive-date=13 Jan 2026}}</ref><ref name=":0">{{Cite web |last=Gözükara |first=Furkan |date=12 Aug 2020 |title=Challenges and possible severe legal consequences of application users identification from CNG-Logs |url=https://huggingface.co/MonsterMMORPG/ResearchArticles/resolve/main/Challenges_And_Possible_Severe_Legal_Consequences_Of_Application_Users_Identification_From_Cng-Logs.pdf |url-status=live |archive-url=https://web.archive.org/web/20260325105054if_/https://cas-bridge.xethub.hf.co/xet-bridge-us/69bf4baa046cd4daeb7bf0ef/460ad5a86be835d6d5c2434ebdb40c7324de08a7b6f3d26e95174b89ef4420b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=cas%2F20260325%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20260325T105052Z&X-Amz-Expires=3600&X-Amz-Signature=d98dba8455c48d3cee4724a97d2628edb13f7984e8c5cd7ef9caf0e803ede057&X-Amz-SignedHeaders=host&X-Xet-Cas-Uid=public&response-content-disposition=inline%3B+filename*%3DUTF-8%27%27Challenges_And_Possible_Severe_Legal_Consequences_Of_Application_Users_Identification_From_Cng-Logs.pdf%3B+filename%3D%22Challenges_And_Possible_Severe_Legal_Consequences_Of_Application_Users_Identification_From_Cng-Logs.pdf%22%3B&response-content-type=application%2Fpdf&x-amz-checksum-mode=ENABLED&x-id=GetObject&Expires=1774439452&Policy=eyJTdGF0ZW1lbnQiOlt7IkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTc3NDQzOTQ1Mn19LCJSZXNvdXJjZSI6Imh0dHBzOi8vY2FzLWJyaWRnZS54ZXRodWIuaGYuY28veGV0LWJyaWRnZS11cy82OWJmNGJhYTA0NmNkNGRhZWI3YmYwZWYvNDYwYWQ1YTg2YmU4MzVkNmQ1YzI0MzRlYmRiNDBjNzMyNGRlMDhhN2I2ZjNkMjZlOTUxNzRiODllZjQ0MjBiMSoifV19&Signature=TY5erWEIVs-leuMB0apq-SCLJhGnVFYWJmDBnCiCK6LYI6R0CgTFCrS3fsiYTzZ9UpxRxv-OnxUjfoi6sx5lu69mUt0RkH3H-PWsOhleHZZ7AXZ5WOzUgnU2Vf8hgntr18pc4Qq6P8rycYnVbXAPLQBy2kKf1S4Hci79GdIh5yd1109m3wVcz7pbJJ9qsQ1PSp3GKrxoOdO4~GVDzR32bud2MBOUnz~ceI4HatvCClJJ9l1ZeMLEFNQmAGT2K72wzhT~gtmmrhpxIy8nj4wKJo1RD6n~T8rIgO-3BtXS8g0kFc4twMQLMV80oOBo2G22wL2rB4kWbj2WLQjNFiR5RQ__&Key-Pair-Id=K2L8F4GPSG1IFC |archive-date=25 Mar 2026 |access-date=22 Mar 2026 |website=HuggingFace |series=Forensic Science International: Digital Investigation |publisher=Elsevier Ltd. |publication-date=8 Nov 2021 |via=ScienceDirect |doi=10.1016/j.fsidi.2021.301312}}</ref>


A 2016 survey conducted by the European Cybercrime Centre revealed that 90% of EU Member State cyber divisions regularly encountered errors related to CGNAT technologies during investigations, sometimes forcing them to discontinue cases or employ more resource-intensive approaches. <ref>{{Cite web |last=European Police Office (Europol) |first=page 57-58 |title=IOCTA 2016 INTERNET ORGANISED CRIME THREAT ASSESSMENT |url=https://www.europol.europa.eu/iocta/2016/resources/iocta-2016.pdf |website=europol.europa.eu |url-status=live |archive-url=https://web.archive.org/web/20260216020928/https://www.europol.europa.eu/iocta/2016/resources/iocta-2016.pdf |archive-date=16 Feb 2026}}</ref><ref name=":0" />
A 2016 survey conducted by the European Cybercrime Centre revealed that 90% of EU Member State cyber divisions regularly encountered errors related to CGNAT technologies during investigations, sometimes forcing them to discontinue cases or employ more resource-intensive approaches. <ref>{{Cite web |last=European Police Office (Europol) |first=page 57-58 |title=IOCTA 2016 INTERNET ORGANISED CRIME THREAT ASSESSMENT |url=https://www.europol.europa.eu/iocta/2016/resources/iocta-2016.pdf |website=europol.europa.eu |url-status=live |archive-url=https://web.archive.org/web/20260216020928/https://www.europol.europa.eu/iocta/2016/resources/iocta-2016.pdf |archive-date=16 Feb 2026}}</ref><ref name=":0" />