Skip to content
Search
  • HOME
  • about
  • Services
  • Blog
  • HOME
  • about
  • Services
  • Blog
CONTACT US

Subpoenas, Pen Registers, and IP Address Lookups

A digital illustration in blue tones depicting the intersection of technology and law. A laptop on the left displays lines of network data and IP addresses. Behind it, an abstract eye icon represents surveillance, and faint IP addresses are scattered across the background. On the right side, legal symbols including a gavel, courthouse, and official document icon appear subtly. The main title reads “SUBPOENAS, PEN REGISTERS, AND IP ADDRESS LOOKUPS.”

Series Introduction

I am a digital forensics expert, not an attorney. Nothing in this series should be taken as legal advice. My goal is to explain the technical side of investigations and highlight how courts have handled these issues so far.

This three-part series examines the intersection of digital forensics and legal process, focusing on how IP addresses, subpoenas, and peer-to-peer investigations work in practice. As a forensic examiner, I've seen how these tools are used in investigations and how they're challenged in court. This series aims to clarify the technical realities behind these processes for legal professionals and criminal defense investigators.


The Technical Reality of IP Address Investigations

When law enforcement encounters an IP address in a digital investigation, they face a fundamental question: Who was using this IP address at this specific time? From a technical perspective, this question involves understanding how Internet Service Providers (ISPs) manage and log subscriber information.

An IP address is essentially a digital identifier assigned to a device or network. ISPs maintain detailed logs that can link specific IP addresses to subscriber accounts at particular times. This connection between IP address and subscriber is what makes digital investigations possible, but it also raises important questions about privacy and legal process.

At Lucid Truth Technologies (LTT), we have specialized experience in network forensics, including IP address investigations, BitTorrent analysis, and peer-to-peer network forensics. Our expertise extends to tools like Torrential Downpour, which we'll explore in detail in Part II of this series.

Subpoenas vs. Search Warrants vs. Pen Registers: The Technical Distinctions

Understanding the differences between these legal tools is crucial for both criminal defense investigators and defense attorneys. From a forensic perspective, each serves a different technical purpose:

Subpoenas for Subscriber Information

What it does technically: A subpoena requests that an ISP provide subscriber information associated with a specific IP address at a particular time. This is retrospective - looking back at historical data.

Technical process:

  • Law enforcement provides an IP address and timestamp
  • ISP searches their logs to identify which subscriber account was assigned that IP
  • ISP provides subscriber name, address, and account information
  • No real-time monitoring or content collection occurs

Why courts treat this differently: Subscriber information is considered less intrusive than content because it doesn't reveal what the user was doing online, only who was connected to a specific IP address.

Pen Registers and Trap-and-Trace Devices

What it does technically: These tools collect prospective information about communications - who is calling whom, or in digital terms, what IP addresses are being contacted.

Technical definitions:

  • Pen Register: Records outgoing communication information (who is being called, what IP addresses are being contacted)
  • Trap-and-Trace Device: Records incoming communication information (who is calling, what IP addresses are contacting the target)

Technical process:

  • Real-time monitoring of communication metadata
  • Records outgoing and incoming connections
  • Captures IP addresses, ports, and connection times
  • Does not capture content of communications
  • Typically requires court order under 18 U.S.C. § 3123

Key distinction: Unlike subpoenas that look backward, pen registers and trap-and-trace devices monitor ongoing activity in real time.

Search Warrants

What it does technically: Search warrants authorize the collection of content and stored communications, not just metadata.

Technical process:

  • Can authorize seizure of devices
  • May allow access to stored communications and content
  • Requires probable cause and judicial approval
  • Most intrusive of the three options

The Carpenter Case: A Signpost for Future Evolution

The 2018 Supreme Court decision in Carpenter v. United States fundamentally changed how courts view location data. While the case specifically addressed cell-site location information (CSLI), its implications extend to other forms of digital metadata, including IP addresses.

Technical context of Carpenter:

  • Cell-site data revealed location information over time
  • Court found this created a "detailed chronicle" of a person's movements
  • Required a warrant rather than a subpoena due to privacy implications

Relevance to IP addresses: As IP addresses become more revealing - potentially showing location, browsing patterns, and behavioral data - courts may begin to apply similar privacy protections.

Practical Considerations for Legal Professionals

From my experience as a forensic examiner, here are key technical points that often arise in legal proceedings:

For Criminal Defense Investigators

Technical limitations to understand:

  • IP addresses can be shared among multiple users
  • Dynamic IP assignments mean addresses change over time
  • VPNs and proxy services can obscure true IP addresses
  • Mobile devices may use different IP addresses for different activities
  • ISP logs may contain errors or gaps in coverage

Investigation strategies:

  • Verify that ISP logs actually show the client's account
  • Look for evidence of shared IP addresses or dynamic assignments
  • Examine timing discrepancies in IP address assignments
  • Consider alternative explanations for IP address usage

For Defense Attorneys

Technical challenges to consider:

  • Shared IP addresses: Many households and businesses share single IP addresses
  • Dynamic assignments: IP addresses change frequently, requiring precise timing
  • Technical accuracy: Verify that ISP logs actually show the client's account
  • Alternative explanations: Consider legitimate uses of the IP address

Discovery requests to consider:

  • Complete ISP logs for the relevant time period
  • Documentation of IP address assignment methodology
  • Information about other subscribers using the same IP
  • Technical specifications of the ISP's logging systems
  • Evidence of any technical errors or system failures

The Technical Foundation for Future Challenges

The technical reality is that IP addresses are becoming increasingly revealing. Modern systems can track not just who was connected to an IP, but also:

  • Geographic location with increasing precision
  • Browsing patterns and behavioral data
  • Device fingerprinting and identification
  • Cross-platform activity correlation

This evolution means that what was once considered "mere subscriber information" may now constitute a detailed digital profile of a person's activities and movements.

Looking Ahead

In the next post, we'll examine how these technical principles apply to peer-to-peer investigations, specifically focusing on BitTorrent cases and tools like Torrential Downpour. We'll explore how courts have handled challenges to this evidence and what technical considerations are most important for legal professionals.

The intersection of technology and privacy law continues to evolve rapidly. Understanding the technical foundations helps legal professionals navigate these complex issues while ensuring that digital evidence is properly collected, analyzed, and presented in court.


At Lucid Truth Technologies (LTT), we specialize in digital forensics and can assist attorneys and investigators in understanding the technical aspects of digital evidence. Contact us for professional forensic support.

MORE POSTS

Digital illustration for blog post “Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations.” The image shows a white cloud with the BitTorrent logo raining digital raindrops onto a laptop displaying a forensic badge icon, set against a blue background with network node patterns. Represents Torrential Downpour BitTorrent evidence, P2P forensics, and digital investigation concepts for Lucid Truth Technologies.
Network Forensics

Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations

Read More »
November 10, 2025
A digital illustration in blue tones depicting the intersection of technology and law. A laptop on the left displays lines of network data and IP addresses. Behind it, an abstract eye icon represents surveillance, and faint IP addresses are scattered across the background. On the right side, legal symbols including a gavel, courthouse, and official document icon appear subtly. The main title reads “SUBPOENAS, PEN REGISTERS, AND IP ADDRESS LOOKUPS.”
Network Forensics

Subpoenas, Pen Registers, and IP Address Lookups

Read More »
October 20, 2025
A split-panel illustration shows the contrast between a defense attorney and a forensic expert. On the left, the defense attorney in a navy suit speaks confidently at a courtroom podium, symbolizing advocacy and due process. On the right, the forensic expert in a white lab coat examines a smartphone and works at a computer displaying a digital fingerprint, symbolizing impartial technical analysis. Between them, Lady Justice appears blindfolded and holding balanced scales, representing fairness. The background subtly blends courtroom and laboratory settings, with neutral tones of navy, gray, and white.
Legal Strategy

Defending Criminals: Are Defense Attorneys, Investigators, and Experts Working for the Dark Side?

Read More »
September 29, 2025
Load More ...
Digital illustration for blog post “Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations.” The image shows a white cloud with the BitTorrent logo raining digital raindrops onto a laptop displaying a forensic badge icon, set against a blue background with network node patterns. Represents Torrential Downpour BitTorrent evidence, P2P forensics, and digital investigation concepts for Lucid Truth Technologies.
Network Forensics

Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations

Read More »
November 10, 2025
A digital illustration in blue tones depicting the intersection of technology and law. A laptop on the left displays lines of network data and IP addresses. Behind it, an abstract eye icon represents surveillance, and faint IP addresses are scattered across the background. On the right side, legal symbols including a gavel, courthouse, and official document icon appear subtly. The main title reads “SUBPOENAS, PEN REGISTERS, AND IP ADDRESS LOOKUPS.”
Network Forensics

Subpoenas, Pen Registers, and IP Address Lookups

Read More »
October 20, 2025
Load More ...
Digital illustration for blog post “Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations.” The image shows a white cloud with the BitTorrent logo raining digital raindrops onto a laptop displaying a forensic badge icon, set against a blue background with network node patterns. Represents Torrential Downpour BitTorrent evidence, P2P forensics, and digital investigation concepts for Lucid Truth Technologies.
Network Forensics

Torrential Downpour and BitTorrent Evidence – A Forensic Perspective on P2P Investigations

Read More »
November 10, 2025
A digital illustration in blue tones depicting the intersection of technology and law. A laptop on the left displays lines of network data and IP addresses. Behind it, an abstract eye icon represents surveillance, and faint IP addresses are scattered across the background. On the right side, legal symbols including a gavel, courthouse, and official document icon appear subtly. The main title reads “SUBPOENAS, PEN REGISTERS, AND IP ADDRESS LOOKUPS.”
Network Forensics

Subpoenas, Pen Registers, and IP Address Lookups

Read More »
October 20, 2025
Load More ...

our services

Background Checks and Open-Source Intelligence Gathering

Mobile Forensics

Cloud Forensics

Computer Forensics

Lucid Truth Technologies is a registered trademark of Kenneth G. Hartman Consulting, LLC
©2025. Lucid Truth Technologies.
Privacy Policy
Scroll to Top

Subscribe