• DocumentCode
    58059
  • Title

    Efficient Tagging of Remote Peers during Child Pornography Investigations

  • Author

    Liberatore, Marc ; Levine, Brian Neil ; Shields, Clay ; Lynn, Brian

  • Author_Institution
    Sch. of Comput. Sci., Univ. of Massachusetts Amherst, Amherst, MA, USA
  • Volume
    11
  • Issue
    5
  • fYear
    2014
  • fDate
    Sept.-Oct. 2014
  • Firstpage
    425
  • Lastpage
    439
  • Abstract
    Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children. First, we present a one-year measurement performed in the law enforcement context. Our proposed tagging method offers remote machines application- or system-level data that is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime. We then describe the tagging mechanisms that have we implemented using the eMule file sharing client.
  • Keywords
    Internet; digital forensics; law; peer-to-peer computing; Internet; application-level identifiers; child pornography investigations; crime; criminal intent; eMule file sharing client; forensic measurement; law enforcement purposes; network observations; network-level identifiers; peer-to-peer file sharing networks; physical evidence; remote machines application-level data; remote machines system-level data; remote peers tagging; sexually exploitative imagery; tagging method; Cities and towns; Forensics; IP networks; Law enforcement; Tagging; Digital forensics; child pornography; computer crime; peer-to-peer networking;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2013.46
  • Filename
    6636297