Strengthening forensic investigations of child pornography on P2P networks

M. Liberatore, B. Levine, C. Shields
{"title":"Strengthening forensic investigations of child pornography on P2P networks","authors":"M. Liberatore, B. Levine, C. Shields","doi":"10.1145/1921168.1921193","DOIUrl":null,"url":null,"abstract":"Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children (child pornography). First, we present a five-month measurement performed in the law enforcement context. We then show how the identifiers in these measurements can be unreliable, and propose the tagging of remote machines. Our proposed tagging method marks remote machines by providing them with application- or system-level data which is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime.","PeriodicalId":20688,"journal":{"name":"Proceedings of The 6th International Conference on Innovation in Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of The 6th International Conference on Innovation in Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1921168.1921193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children (child pornography). First, we present a five-month measurement performed in the law enforcement context. We then show how the identifiers in these measurements can be unreliable, and propose the tagging of remote machines. Our proposed tagging method marks remote machines by providing them with application- or system-level data which is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
加强对P2P网络儿童色情内容的司法调查
用于执法目的的互联网测量必须在法律上有效。我们研究了在法医测量的背景下使用各种网络和应用级标识符所固有的问题,例如对儿童性剥削图像(儿童色情)的点对点文件共享网络的监管。首先,我们提出了在执法背景下进行的为期五个月的测量。然后,我们将展示这些测量中的标识符如何不可靠,并提出对远程机器进行标记的建议。我们提出的标记方法通过向远程机器提供应用程序或系统级数据来标记它们,这些数据是有效的,但这些数据对调查人员具有隐蔽的意义。这种标记允许调查人员以合法的、法医强有力的和有效的方式将网络观察与物理证据联系起来。我们展示了我们方法的详细模型和分析,展示了标签如何在几个特定的应用中使用,讨论了我们方法的一般适用性,并详细说明了为什么标签是犯罪意图和参与犯罪的有力证据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Effect of Plasmodium Infections on CD4 Cells, Neutrophil and Lymphocytes Analysis and Countermeasures of Computer Network Security in the Age of Artificial Intelligence Research on Reliable Deployment Algorithm for Service Function Chain Based on Deep Reinforcement Learning A Review on Waste to Electricity Potential in Nigeria Geochemistry and Petrology: Collaborative Roles in Resource Exploration and Environmental Research
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1