• Publication
  • PrePrints
  • Abstract - Efficient Tagging of Remote Peers During Child Pornography Investigations
 This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Efficient Tagging of Remote Peers During Child Pornography Investigations
PrePrint
ISSN: 1545-5971
Marc Liberatore, University of Massachusetts Amherst, Amherst
Brian Neil Levine, University of Massachusetts Amherst, Amherst
Clay Shields, Georgetown University, Washington
Brian Lynn, University of Massachusetts Amherst, Amherst
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children. First, we present a one-year measurement performed in the law enforcement context. Our proposed tagging method offers remote machines application- or system-level data that is valid, but which covertly has meaning to investigators. These tags, when recovered, allow investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime. We then describe the tagging mechanisms that have we implemented using the eMule file sharing client.
Index Terms:
IP networks,Cities and towns,Tagging,Law enforcement,Forensics,empirical observation,forensics,internet,child pornography,criminal investigations
Citation:
Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn, "Efficient Tagging of Remote Peers During Child Pornography Investigations," IEEE Transactions on Dependable and Secure Computing, 17 March 2014. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/TDSC.2013.46>
Usage of this product signifies your acceptance of the Terms of Use.