From the September/October 2014 issue

Efficient Tagging of Remote Peers during Child Pornography Investigations

By Marc Liberatore, Brian Neil Levine, Clay Shields, and Brian Lynn

Featured article thumbnail imageMeasurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children. First, we present a one-year measurement performed in the law enforcement context. Our proposed tagging method offers remote machines application- or system-level data that is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime. We then describe the tagging mechanisms that have we implemented using the eMule file sharing client.

download PDF View the PDF of this article      csdl View this issue in the digital library


Editorials and Announcements

Announcements

Call for Papers

Editorials

Guest Editorials

Reviewers List

Annual Index


Access recently published TDSC articles

RSS Subscribe to the RSS feed of latest TDSC content added to the digital library.

Mail Sign up for the Transactions Connection newsletter.


Swimming with Sharks: Security Roundtable

 

A word from former Editor-in-Chief, Ravi Sandhu


OnlinePlus

TDSC is published using the OnlinePlus publishing model

 

IEEE Transactions on Dependable and Secure Computing (TDSC) is a bimonthly journal that publishes archival research results focusing on foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance.
Read the full scope of TDSC