66 Wild West 2.0
There is no central authority that monitors or controls connec-
tions; as a matter of technology, connecting to the Internet is en-
tirely a private affair. A few governments—in places like China and
North Korea—have attempted to outlaw or monitor private con-
nections, with rather limited success. The practical result is that
home users can simply call up a local Internet Service Provider
(“ISP”)—often their cable TV provider or a phone company—and
connect to the Internet. Nobody other than the ISP will know the
identity of the new subscriber. The government won’t know the
identity of any users unless it invokes its law enforcement power to
subpoena the ISP; websites won’t know unless the subscriber re-
veals her own identity; and other users won’t know unless they can
convince the user to reveal herself or hire lawyers and obtain a civil
subpoena.
Once connected, the new user can communicate with any of the
millions of computers on the Internet. This is possible because of a
communication system known as “IP,” or “Internet Protocol.” All data
that are transferred over the Internet use Internet Protocol, and it is
“Internet Protocol” that gave the Internet its name.
A very short explanation of IP will show why Internet anonymity
is so powerful. Internet Protocol is nothing more than a communi-
cations language shared among all computers connected to the In-
ternet (see Figure 5-1). Data of any kind (e-mails, pictures, songs,
web pages, or videos) can be sent over the Internet by breaking it into
small “packets.” These packets contain the data that are to be sent, as
well as some addressing information known as the “header.” Once
sent, a packet is automatically forwarded from one computer to an-
other until it reaches its destination. There is no predictable route
that any particular packet will follow; the Internet is intentionally de-
signed so that packets are automatically passed toward their desti-
nation along whatever route seems fastest at the time. For example,
one packet sent from a home user in New York to a website in San
Francisco might be passed along a chain of computers from New
York to Chicago to San Francisco. The next packet between the same