Strengthening forensic investigations of child pornography on P2P networks

  • Authors:
  • Marc Liberatore;Brian Neil Levine;Clay Shields

  • Affiliations:
  • Univ. of Massachusetts Amherst;Univ. of Massachusetts Amherst;Georgetown Univ.

  • Venue:
  • Proceedings of the 6th International COnference
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of peer-to-peer file sharing networks for sexually exploitative imagery of children (child pornography). First, we present a five-month measurement performed in the law enforcement context. We then show how the identifiers in these measurements can be unreliable, and propose the tagging of remote machines. Our proposed tagging method marks remote machines by providing them with application- or system-level data which is valid, but which covertly has meaning to investigators. This tagging allows investigators to link network observations with physical evidence in a legal, forensically strong, and valid manner. We present a detailed model and analysis of our method, show how tagging can be used in several specific applications, discuss the general applicability of our method, and detail why the tags are strong evidence of criminal intent and participation in a crime.