IP catching as an investigative tool in Germany

IP catching as an investigative tool in Germany

IP catching is not a bitter play, but rather a controversial real-time surveillance measure used by German law enforcement agencies to identify unknown persons via their IP address, often with anonymization services such as Tor. Technically, it obliges internet providers to record connection data to target systems in real time, whereby content data is also temporarily recorded and supposedly deleted immediately.

This method harbors considerable risks for the privacy and fundamental rights of normal citizens due to “third-party involvement”, as it collects data from many uninvolved parties. The lack of an explicit legal basis and a lack of transparency are key points of criticism. IP catching differs from data retention or telecommunications surveillance through real-time recording and a focus on de-anonymization, but shares mass data collection with measures such as radio cell searches. Criticism from civil society calls for clear legal regulation and a reorganization of digital intervention powers to protect the rule of law and fundamental rights.

1. Introduction to IP catching: definition and how it works

1.1 What is IP catching?

IP catching is an investigative measure used by the BKA to identify unknown persons by IP address in order to filter out a person from the anonymous mass of online services or Tor users. It differs from commercial IP tracking (website analysis, marketing) due to its governmental, fundamental rights-relevant “dragnet” approach to mass collection. The secrecy and lack of transparency promote a “surveillance creep” that undermines democratic control and the protection of fundamental rights.

1.2 Technical modus operandi

IP catching obliges internet service providers (ISPs) to monitor and record all access to a defined “target system” in real time. The initial, automatic recording of “content data”, which according to the authorities is deleted immediately and should technically never leave the provider before only filtered traffic data is transmitted, is controversial.

If the time of access is known, the BKA asks the ISP for the assigned IP address, which the provider provides as “qualified inventory data information” using inventory data. This is crucial because of dynamic IP addresses. IP catching is used to de-anonymize Tor users by means of “timing analyses”, which use synchronized time stamps and packet volumes to assign anonymous traffic. The US software “Good Listener” is to be used for this purpose.

Timing attacks on Tor show an arms race between anonymization and surveillance. The technical accessibility of content data, even temporarily, underlines the invasiveness. Surveillance technologies are developing faster than legal safeguards, which undermines democratic control over state powers and can erode fundamental rights.

2. Legal framework and application in Germany

2.1. stated legal basis

IP catching is not explicitly defined by law, but is based by authorities on Section 100g StPO (traffic data) and Section 100j (2) StPO (inventory data information). Authorities argue that Section 100a StPO (telecommunications surveillance) is not necessary, as content data is deleted immediately and technically never leaves the provider. This lack of legal definition and the expansive interpretation of existing norms enable the use of a powerful surveillance method without sufficient democratic debate, which represents a significant deficit in the rule of law.

2.2 Judicial oversight and requirements

A court order is required for IP catching as data is collected in real time. However, the effectiveness of this oversight is questionable as judges often lack specific legal guidance and technical understanding to adequately assess proportionality. This highlights a systemic gap where legal frameworks lag behind technological advances, making substantive fundamental rights protection difficult.

3. Risks and threats to citizens’ privacy and fundamental rights

3.1 The principle of “third party interference”

IP catching is a “mass data collection” that affects a large number of uninvolved persons. This “unavoidable third-party involvement” is similar to radio cell queries or IMSI catchers. Legal commentaries call for a particularly careful proportionality check. Indiscriminate data collection of millions of innocent people to identify a suspect normalizes mass surveillance and undermines privacy by treating everyone as a potential suspect.

3.2. impact on informational self-determination and the “chilling effect”

IP catching directly interferes with the fundamental right to informational self-determination. The lack of transparency and public awareness of such measures can trigger a “chilling effect”. Citizens could censor themselves or refrain from legitimate online activities for fear of surveillance. This impairs democratic participation and freedom of expression, as trust in digital spaces as places of free exchange erodes.

3.3. concerns regarding the temporary collection of content data

IP catching technically requires the initial collection of “content data”, which is supposedly deleted immediately. Critics see this intermediate technical step as legally problematic, as data is collected that should not be accessible. The lack of verifiable protocols for “immediate deletion” raises concerns about trust and legal compliance. The discrepancy between the technical reality and the legal definition of “collection” and “storage” can undermine the protection of fundamental rights.

3.4. lack of transparency and statistical recording of use

A profound point of criticism is the lack of transparency regarding the use of IP catching. Neither the frequency nor the operational procedures are made public. There is no legal obligation for statistical documentation. Authorities and telecommunications providers refuse to provide information or do not supply usage statistics. The German government classifies intelligence information as “secret”. This lack of documentation prevents effective oversight and the assessment of proportionality and social “surveillance burden”.

4. Differentiation from other surveillance measures

Comparison of IP catching with other surveillance measures

MeasureTechnical functionPrimary legal basis (Germany)Target groupData typeThird party affectedLegal definition
IP catchingReal-time capture of connections to specific target system by ISP, temporary content data capture for filtering, assignment to person using inventory data.§ Section 100g StPO, Section 100j para. 2 StPOUsers of a specific online service/server (identify unknown person from mass)IP addresses, traffic data (temporarily also content data)High (millions of uninvolved persons affected)Not explicitly defined (interpretation of existing standards)
IP tracking (commercial/targeted)Identification of IP addresses of website visitors, recording of location, device type, behavioral patterns.GDPR (consent/legitimate interest)Visitors to a website/app (behavioral analysis, marketing)IP addresses, location data (general), browsing historyLow (direct interaction with service)Yes (e.g. through GDPR as personal data)
Data retentionGeneral, unprovoked storage of communication metadata of all users by telecommunications providers.Formerly TKG, StPO (currently largely abrogated/restricted in DE)All users of a telecommunications providerTraffic data (metadata: time, duration, subscriber)High (all users)Yes (but controversial and restricted)
Telecommunications surveillance (TKÜ)Interception and recording of ongoing telecommunications content and associated traffic data.§ Section 100a StPOSpecific target personContent data, traffic dataLow (specific target person)Yes
Source telecommunication surveillance (source TKÜ / state trojans)Infiltration of a target’s terminal device with surveillance software to capture communications before encryption.§ Section 100a para. 1 sentence 2 StPO, BKAGSpecific target personContent data, traffic data, device data (comprehensive)Low (specific to target person, but with risks for IT security of third parties)Yes
Online searchRemote access and comprehensive search of stored data on the IT system of a target person.§ Section 100b StPO, BKAGSpecific target personStored data (comprehensive)Minor (specific target person)Yes
IMSI catcherImitation of a mobile phone cell for recording IMSI/IMEI data and location data of cell phones in the vicinity.StPO (analog, controversial), police lawsAll mobile devices within a certain radiusIMSI/IMEI, location dataHigh (all devices in the coverage area)No (interpretation of existing standards)
Radio cell queryQuery of connection data of all cell phones that were connected to a specific radio cell at a specific time.§ Section 100g StPOAll mobile devices in a specific geographical areaConnection data (time stamp, radio cell, phone number if applicable)High (all devices in the radio cell area)Yes (interpretation of existing standards)

4.1. IP catching vs. IP tracking (mass vs. targeted)

IP tracking (commercial/targeted): Private monitoring of IP addresses for behavioral analysis or fraud detection on specific services.

IP catching (government surveillance): Government investigative measure to identify unknown individuals from the mass of users of an online service through real-time collection of traffic data. The difference lies in the actor, purpose and scope.

4.2 IP catching vs. data retention

Data retention: General, unprovoked storage of communication metadata of all users by telecommunications providers, largely restricted in Germany.

IP catching: No storage without cause, but real-time recording of traffic data only for connections to a specific target system. This circumvents rulings on data retention by focusing on prospective data collection, even if millions of bystanders are affected.

4.3. IP catching vs. telecommunications surveillance (telecommunications surveillance / source tapping)

Telecommunications surveillance (§ 100a StPO): Interception of ongoing communication content and traffic data, highly invasive.

Source telecommunication surveillance (source telecommunication surveillance / state trojans): Installation of surveillance software on end devices to capture communications before/after encryption.

IP catching: Authorities argue that Section 100a StPO is not necessary as content data is deleted immediately and does not leave the provider. The focus is on user identification via traffic data, not content interception or device infiltration. The temporary processing of content data remains legally controversial.

4.4 IP catching vs. online searches

Online search: Remote access and comprehensive search of stored data on IT systems, comparable to a physical house search, requires a high legal threshold.

IP catching: No direct access to end devices. Focus is on monitoring network connections at ISP level for user identification, not on device data.

4.5. analogies: IMSI catcher and radio cell interception

IP catching is often compared to IMSI catchers and radio cell queries, as all three involve “third party involvement” – the indiscriminate collection of data from many uninvolved persons.

IMSI catcher: Imitates a mobile phone cell to identify and track the location of cell phones in the vicinity.

Radio cell interrogation: Interrogation of connection data of all cell phones in a radio cell at a specific time.

Common principle: All three are forms of unprovoked mass surveillance that collect data from a large number of people in order to identify a specific target. This shows a trend towards dragnet operations in state surveillance.

5. Criticism from civil society and legal experts

Key points of criticism of IP catching by civil society organizations and experts

Organization/expertPrimary point of criticismKey arguments/quotesDemand/recommendation
Netzpolitik.orgLack of legal basis, secrecy, third party involvement, temporary content data collection“IP catching: The surveillance measure that should remain secret.”; “Legal experts criticize that there is no legal basis for it.”; “The measure is not explicitly regulated, but is based on existing standards such as § 100g, § 100j StPO.”; “Technically, content data must also be recorded initially, which, according to Telefónica, is ‘immediately deleted’.”Publication of investigation documents, transparency
Legal experts (general)Lack of legal definition, far-reaching interference, proportionality problems“The term IP catching does not yet appear in legal texts, but only in legal commentaries.”; “The measure is not expressly regulated…”; “…in which millions of uninvolved persons are monitored in order to… to track down a single person.”; “serious doubts” as to whether IP catching is even permissible on existing legal basesMandatory legal basis required; careful consideration by the court
Chaos Computer Club (CCC)Lack of IT security, encroachment on fundamental rights, lack of transparency of state surveillanceGeneral stance: “advocates more transparency in government, freedom of information and the human right to communication”; criticism of “state Trojans”: “Functions that were clearly intended to violate the law were implemented in this malware”; “The covert infiltration of IT systems by government agencies must stop.”Protect people’s data; end covert infiltration of IT systems; improve data protection laws
Society for Civil Liberties (GFF)Profound interference with the rights of innocent people, need for explicit legal regulation, disproportionate surveillanceIP catching as “a profound encroachment on the rights of innocent parties”; “must be explicitly regulated by the legislator”; “defends digital liberties against disproportionate surveillance and data storage by the state and companies.”Strengthening civil rights; challenging disproportionate laws; protecting privacy and informational self-determination
Clara Bünger (Member of the Bundestag, Die Linke)Incalculable violation of fundamental rights, lack of transparency on the part of the authoritiesCriticizes “this response behavior, especially since it is an incalculable encroachment on fundamental rights”; calls for “a fundamental, fundamental rights-friendly reorganization of the digital intervention powers of law enforcement authorities.”Fundamental, fundamental rights-friendly reorganization of digital intervention powers

5.1. legal ambiguities and demand for specific legislation

IP catching is not defined in German law. This lack of an explicit legal basis is problematic as it allows the use of a “secret” surveillance measure without democratic debate or clear limits. Legal experts express “serious doubts” about the legitimacy of relying on existing norms and call for a mandatory legal basis due to the “significant encroachment on fundamental rights”. Clara Bünger (Die Linke) criticizes the lack of transparency and calls for a “fundamental, fundamental rights-friendly reorganization of digital intervention powers”. This creates a “deficit in the rule of law” that undermines legal certainty and predictability.

5.2 Position and concerns of the Chaos Computer Club (CCC)

The Chaos Computer Club (CCC), Europe’s largest “hacker association”, is committed to transparency, freedom of information and the human right to communication. The CCC consistently criticizes laws and technologies that endanger IT security or civil rights. They analyze government malware (e.g. “state trojans”) and uncover their capabilities, security gaps and violations of legal requirements. In view of the lack of legal definition, the far-reaching effects on bystanders and the technical ambiguities of IP catching, the CCC would rigorously examine and reject this measure, as it contradicts the principle of “protecting people’s data”. The CCC’s approach shows the indispensable role of technical expertise in the review of state surveillance.

5.3 Position of the Gesellschaft für Freiheitsrechte (GFF)

The Gesellschaft für Freiheitsrechte (GFF) defends fundamental and human rights through strategic litigation and legal intervention. Its core task is the defense of “digital freedom rights against disproportionate surveillance and data storage by the state and companies”. Benjamin Lück (GFF) describes IP catching as a “profound encroachment on the rights of innocent parties” and calls for explicit legal regulation. The GFF uses strategic litigation to close gaps in legal frameworks and protect fundamental rights in the context of new technologies, especially in the absence of a legal definition and far-reaching effects on innocent parties.

6. The rule of law has a duty to act

In view of the complex, legally controversial and fundamental rights-threatening surveillance measure of IP catching, the state is urgently required to bring about comprehensive changes. IP catching operates in a legal gray area without an explicit legal basis and relies on an expansive interpretation of existing norms. This enables highly invasive use without democratic legitimization. The temporary collection of content data remains technically and legally problematic.

The inherent “third-party involvement” turns IP catching into mass surveillance that captures uninvolved persons and has a “chilling effect” on fundamental rights. The serious lack of transparency regarding the frequency and modalities of use also prevents effective parliamentary and public control.

The state is required to bring about the following changes:

  1. Creation of an explicit legal basis: a specific, detailed legal basis for IP catching must be created immediately, clearly defining the areas of application, prerequisites, procedures and protection mechanisms.
  2. Strengthening judicial supervision: Judicial orders require sound technical knowledge and a substantial proportionality test, if necessary through specialized bodies or training.
  3. Mandatory transparency and statistical recording: A legal obligation for comprehensive statistical recording and transparent reporting on use must be introduced in order to enable democratic control.
  4. Independent technical audits: Regular, independent audits of technical processes, especially temporary content data collection, are essential.
  5. Prioritization of less intrusive alternatives: IP catching may only be used as a last resort if milder means have been exhausted and an overriding public interest makes this imperative.
  6. Promoting public discourse: An open and informed debate on digital surveillance methods is crucial for a democratic society.

Only transparency, clear rules and strong controls can ensure that investigative powers are in line with a liberal legal system.

Leave a Reply

Your email address will not be published. Required fields are marked *