Since the investigation of peer-to-peer (P2P) file sharing networks is now of critical interest to law enforcement and P2P networks are extensively used for sharing and distribution of contraband, the authors detail the functionality of two P2P protocols, Gnutella and BitTorrent, and describe the legal issues pertaining to investigating such networks.
The authors present an analysis of the protocols focused on the items of particular interest to investigators, such as the value of evidence given its provenance on the network. They also report their development of RoundUp, a tool for Gnutella investigations that follows the principles and techniques the authors detail for networking investigations. RoundUp has experienced rapid acceptance and deployment: it is currently used by 52 Internet Crimes Against Children (ICAC) Task Forces, who each share data from investigations in a central database. Using RoundUp, since October 2009, over 300,000 unique installations of Gnutella have been observed by law enforcement sharing known contraband in the U.S. Using leads and evidence from RoundUp, a total of 558 search warrants have been issued and executed during that time. (Publisher abstract provided)
- Specification for NIJ Ballistic Protection Levels and Associated Test Threats (NIJ Standard 0123.00)
- Proactive monitoring and operator discretion: A systematic social observation of CCTV control room operations
- “You feed and water a rose bush and eventually it blossoms”: Constructions of self-transformation among mental health court defendants.