SlideShare uma empresa Scribd logo
1 de 38
LimeWire Made
Me Do It
Frederick S. Lane
FSLane3@gmail.com
www.ComputerForensicsDigest.com
Federal Public Defender of Middle Tennessee and
Federal Defender Services of Eastern Tennessee, Inc.
30 July 2010
www.FrederickLane.com
And Other Digital Follies
www.ComputerForensicsDigest.com
Seminar Overview – Part I
• Introduction
• Basics of P2P Software
• Evidence of Intent
• Law Enforcement Initiatives
• P2P in the Courts
www.FrederickLane.com www.ComputerForensicsDigest.com
Seminar Overview – Part II
• Basics of File Storage and
Web Browser Caches
• “Every Breath You Take …”
• Cookie Crumbs
• Caches in the Courts
www.FrederickLane.com www.ComputerForensicsDigest.com
Seminar Logistics
• Ask ‘em If You’ve Got ‘em
• Download a PDF of slides:
bit.ly/a9wgM6
Survey/Feedback:
bit.ly/cfDZCY
• Email Me: FSLane3@gmail.com
www.FrederickLane.com www.ComputerForensicsDigest.com
Personal Background
• Computer
Forensics Expert
www.FrederickLane.com www.ComputerForensicsDigest.com
Personal Background
• Computer
Forensics Expert
• Author of 5 Books
www.FrederickLane.com www.ComputerForensicsDigest.com
Personal Background
• Computer
Forensics Expert
• Author of 5 Books
• Chair, Burlington
(VT) School Board
www.FrederickLane.com www.ComputerForensicsDigest.com
Personal Background
• Computer
Forensics Expert
• Author of 5 Books
• Chair, Burlington
(VT) School Board
• Attorney &
Lecturer
www.FrederickLane.com www.ComputerForensicsDigest.com
Personal Background
• Computer
Forensics Expert
• Author of 5 Books
• Chair, Burlington
(VT) School Board
• Attorney &
Lecturer
• Privacy Expert
www.FrederickLane.com www.ComputerForensicsDigest.com
Computer Forensics Experience
• A Decade of Computer Forensics
Experience -- United States v. Dean (1999)
• Civil and Criminal Cases
• Emphasis on Obscenity and Child
Pornography
• Training in X-Ways Forensics
• ComputerForensicsDigest.com
& Digital Dirt Blawg
www.FrederickLane.com www.ComputerForensicsDigest.com
• Sneakernets
www.FrederickLane.com www.ComputerForensicsDigest.com
“And File Sharing Begat P2P…”
• Sneakernets
• 1999 – Napster
www.FrederickLane.com www.ComputerForensicsDigest.com
“And File Sharing Begat P2P…”
• Sneakernets
• 1999 – Napster
• DMCA =
#epicfail
www.FrederickLane.com www.ComputerForensicsDigest.com
“And File Sharing Begat P2P…”
• Sneakernets
• 1999 – Napster
• DMCA =
#epicfail
• 2000 - Gnutella
www.FrederickLane.com www.ComputerForensicsDigest.com
“And File Sharing Begat P2P…”
• Sneakernets
• 1999 – Napster
• DMCA =
#epicfail
• 2000 – Gnutella
• 2009 – P2P the
largest source of
network traffic
www.FrederickLane.com www.ComputerForensicsDigest.com
“And File Sharing Begat P2P…”
Popular Peer-to-Peer Networks
• Gnutella, Gnutella2
• BitTorrent
• FastTrack
• KaZaA
• eDonkey
• Mininova
• Skype
www.FrederickLane.com www.ComputerForensicsDigest.com
Popular Peer-to-Peer Clients
• LimeWire
• FrostWire
• BitComet
• Vuze
• µTorrent
• MP3 Rocket
• BitTorrent
• Morpheus
• LimeWire Pro
• Ares Galaxy
www.FrederickLane.com www.ComputerForensicsDigest.com
Typical Operation of P2P Software
• Users Download Client Software and
Register for an Account
• Users Search for Specific Types of Content
• Users Click on a Search Result to Initiate
Download
• P2P Software Typically Downloads to a
“Shared” Directory
• Content Can Be Made Instantly Available to
Other Users of P2P Software
www.FrederickLane.com www.ComputerForensicsDigest.com
Core Issue: Extent of User Control
• Nature and Name of Downloaded
Contents
• Evidence Downloaded Files Were
“Previewed” During Download Process
• Search Terms Used
• Are Client Settings Default or
Specialized? Directories, Sharing, etc.
• Evidence of Degree of Sophistication
www.FrederickLane.com www.ComputerForensicsDigest.com
Example: LimeWire Setup
www.FrederickLane.com www.ComputerForensicsDigest.com
Federal Anti-CP Programs
• FBI Cyber Crimes Program
• Innocent Images National Initiative
• Internet Crimes Against Children (ICAC)
• National Center for Missing and Exploited
Children
• Myriad Task Forces
• Operation Fairplay (Wyoming/TLO)
www.FrederickLane.com www.ComputerForensicsDigest.com
Typical P2P Investigation
• Law Enforcement Officer Uses P2P Client to
Search for Contraband – Keywords &
Hashes
• Download of Possible Contraband Initiated
• P2P Client Shows IP Address of Source
• List of Files at That Source Can Be Viewed
• IP Address Is Traced to Physical Address
• Warrant Obtained for Search and Seizure of
Computer Equipment at That Address
www.FrederickLane.com www.ComputerForensicsDigest.com
P2P In the Courts
• An area of increasing interest for courts:
roughly 300 federal decisions involving P2P
software – only 25 or so state decisions
• Does law enforcement use of P2P client
constitute “search” of suspect’s computer?
• Questions of control and distribution by
suspect
• Enhancements under sentencing guidelines
www.FrederickLane.com www.ComputerForensicsDigest.com
Recent P2P Decisions
• Comcast v. F.C.C., 08-1291 (D.C. Cir. April 6,
2010) – rejecting F.C.C.’s ability to regulate
network traffic
• U.S. v. Dodd, 09-1946 (8th Cir. 2010) – P2P
supports sentencing enhancement
• U.S. v. Dyer, 589 F.3d 520 (1st Cir. 2009) – P2P
can enhance sentence for distribution
• U.S. v. Borowy, 595 F.3d 1045 (9th Cir. 2010) --
No 4th Amend. violation in LimeWire
investigation
www.FrederickLane.com www.ComputerForensicsDigest.com
What’s That Doing on My
Hard Drive?
• Web Browser Overview
• Web Browser Caches & Cookies
• “Every Breath You Take …”
• File Storage, Deletion, and
Recovery
• Caches in the Courts
www.FrederickLane.com www.ComputerForensicsDigest.com
Multiple Browsers,
Multiple Caches
• First There Was Netscape …
• Internet Explorer, Mozilla,
Opera, Google Chrome
• Safari and Mac variants
• Extract cache files or analyze
disk
www.FrederickLane.com www.ComputerForensicsDigest.com
Cache Value
• Small Hard Drives & Dial-Up
• Hidden Files
• Organized by User
• Thumbnails
• Is “Private Mode” Really
Private?
www.FrederickLane.com www.ComputerForensicsDigest.com
Other Types of Web History
• Cookies
• Directory Listings
• Email
• Network Logs
• Internet Service Providers
www.FrederickLane.com www.ComputerForensicsDigest.com
Distressingly Durable Data
• A Quick Overview of Computer
Forensics
• The Hardware of Data Storage
– Drives, Disks, RAM, ROM,
Flash, etc.
• Directories & Files
• I Never Metadata …
www.FrederickLane.com www.ComputerForensicsDigest.com
The Great Delete Myth
www.FrederickLane.com
• Of DOS and Disks
The Great Delete Myth
www.FrederickLane.com
• Of DOS and Disks
• Sneakernets
The Great Delete Myth
www.FrederickLane.com
• Of DOS and Disks
• Sneakernets
• “Information
Wants to Be Free”
The Great Delete Myth
www.FrederickLane.com
• Of DOS and Disks
• Sneakernets
• “Information
Wants to Be Free”
• “Intriguing but
vague”
The Great Delete Myth
www.FrederickLane.com
• Of DOS and Disks
• Sneakernets
• “Information
Wants to Be Free”
• “Intriguing but
vague”
• Whole Earth
Duplication
Some Common File Questions …
• File Timestamps – Created, Last
Modified, Last Accessed?
• Is It Possible to Determine Length of
Time an Image or Video Was Viewed?
• Files Lost in Space: Allocated,
Unallocated, Slack, Other Partitions
• All Thumbs.db
www.FrederickLane.com www.ComputerForensicsDigest.com
Cache in the Courts
• U.S. v. Vosburgh, 08-4702 (3d Cir. April 20, 2010)
[pro-Gov.] – Thumbs.db
• U.S. v. Kain, 589 F.3d 945 (8th Cir. 2009) [pro-Gov.]
• U.S. v. Miller, 527 F.3d 54 (3rd Cir. 2008) [even]
• U.S. v. Kuchinski, 469 F.3d 853 (9th Cir. 2006); U.S.
v. Romm, 455 F.3d 990 (9th Cir. 2006) [pro-
defendant]
• U.S. v. Tucker, 305 F.3d 1193 (10th Cir. 2002) [pro-
Gov.]
www.FrederickLane.com www.ComputerForensicsDigest.com
Survey/Feedback
http://bit.ly/cfDZCY
(survey open until
August 6, 2010 at 5:00 p.m.)
www.FrederickLane.com www.ComputerForensicsDigest.com
LimeWire Made
Me Do It
Frederick S. Lane
FSLane3@gmail.com
www.ComputerForensicsDigest.com
Federal Public Defender of Middle Tennessee and
Federal Defender Services of Eastern Tennessee, Inc.
30 July 2010
www.FrederickLane.com
And Other Digital Follies
www.ComputerForensicsDigest.com

Mais conteúdo relacionado

Mais procurados

What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
Phil Cryer
 
Activism
ActivismActivism
Activism
sunnyuf
 
Podcasting intro for Rhodes
Podcasting intro for RhodesPodcasting intro for Rhodes
Podcasting intro for Rhodes
Bryan Alexander
 
Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overview
Bryan Alexander
 

Mais procurados (7)

Marek Navratil Thesis
Marek Navratil ThesisMarek Navratil Thesis
Marek Navratil Thesis
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
Google.is.not.enough
Google.is.not.enoughGoogle.is.not.enough
Google.is.not.enough
 
Activism
ActivismActivism
Activism
 
Podcasting intro for Rhodes
Podcasting intro for RhodesPodcasting intro for Rhodes
Podcasting intro for Rhodes
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overview
 

Semelhante a 2010-07-30 LimeWire Made Me Do It

E-commerceG1-C1 P2P
E-commerceG1-C1 P2PE-commerceG1-C1 P2P
E-commerceG1-C1 P2P
newnwan
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
Lorin Olsen
 

Semelhante a 2010-07-30 LimeWire Made Me Do It (20)

P2P Forensics
P2P ForensicsP2P Forensics
P2P Forensics
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
E-commerceG1-C1 P2P
E-commerceG1-C1 P2PE-commerceG1-C1 P2P
E-commerceG1-C1 P2P
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Data Management Crash Course
Data Management Crash CourseData Management Crash Course
Data Management Crash Course
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guide
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Dracos forensic flavor
Dracos forensic flavorDracos forensic flavor
Dracos forensic flavor
 
DracOs Forensic Flavor
DracOs Forensic FlavorDracOs Forensic Flavor
DracOs Forensic Flavor
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
 
Digital Culture Industry: Writing a Digital History with Digital Documents (P...
Digital Culture Industry: Writing a Digital History with Digital Documents (P...Digital Culture Industry: Writing a Digital History with Digital Documents (P...
Digital Culture Industry: Writing a Digital History with Digital Documents (P...
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 9 : INTERNET
Chapter 9 : INTERNETChapter 9 : INTERNET
Chapter 9 : INTERNET
 

Mais de Frederick Lane

Mais de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 

Último (20)

Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 

2010-07-30 LimeWire Made Me Do It

  • 1. LimeWire Made Me Do It Frederick S. Lane FSLane3@gmail.com www.ComputerForensicsDigest.com Federal Public Defender of Middle Tennessee and Federal Defender Services of Eastern Tennessee, Inc. 30 July 2010 www.FrederickLane.com And Other Digital Follies www.ComputerForensicsDigest.com
  • 2. Seminar Overview – Part I • Introduction • Basics of P2P Software • Evidence of Intent • Law Enforcement Initiatives • P2P in the Courts www.FrederickLane.com www.ComputerForensicsDigest.com
  • 3. Seminar Overview – Part II • Basics of File Storage and Web Browser Caches • “Every Breath You Take …” • Cookie Crumbs • Caches in the Courts www.FrederickLane.com www.ComputerForensicsDigest.com
  • 4. Seminar Logistics • Ask ‘em If You’ve Got ‘em • Download a PDF of slides: bit.ly/a9wgM6 Survey/Feedback: bit.ly/cfDZCY • Email Me: FSLane3@gmail.com www.FrederickLane.com www.ComputerForensicsDigest.com
  • 5. Personal Background • Computer Forensics Expert www.FrederickLane.com www.ComputerForensicsDigest.com
  • 6. Personal Background • Computer Forensics Expert • Author of 5 Books www.FrederickLane.com www.ComputerForensicsDigest.com
  • 7. Personal Background • Computer Forensics Expert • Author of 5 Books • Chair, Burlington (VT) School Board www.FrederickLane.com www.ComputerForensicsDigest.com
  • 8. Personal Background • Computer Forensics Expert • Author of 5 Books • Chair, Burlington (VT) School Board • Attorney & Lecturer www.FrederickLane.com www.ComputerForensicsDigest.com
  • 9. Personal Background • Computer Forensics Expert • Author of 5 Books • Chair, Burlington (VT) School Board • Attorney & Lecturer • Privacy Expert www.FrederickLane.com www.ComputerForensicsDigest.com
  • 10. Computer Forensics Experience • A Decade of Computer Forensics Experience -- United States v. Dean (1999) • Civil and Criminal Cases • Emphasis on Obscenity and Child Pornography • Training in X-Ways Forensics • ComputerForensicsDigest.com & Digital Dirt Blawg www.FrederickLane.com www.ComputerForensicsDigest.com
  • 12. • Sneakernets • 1999 – Napster www.FrederickLane.com www.ComputerForensicsDigest.com “And File Sharing Begat P2P…”
  • 13. • Sneakernets • 1999 – Napster • DMCA = #epicfail www.FrederickLane.com www.ComputerForensicsDigest.com “And File Sharing Begat P2P…”
  • 14. • Sneakernets • 1999 – Napster • DMCA = #epicfail • 2000 - Gnutella www.FrederickLane.com www.ComputerForensicsDigest.com “And File Sharing Begat P2P…”
  • 15. • Sneakernets • 1999 – Napster • DMCA = #epicfail • 2000 – Gnutella • 2009 – P2P the largest source of network traffic www.FrederickLane.com www.ComputerForensicsDigest.com “And File Sharing Begat P2P…”
  • 16. Popular Peer-to-Peer Networks • Gnutella, Gnutella2 • BitTorrent • FastTrack • KaZaA • eDonkey • Mininova • Skype www.FrederickLane.com www.ComputerForensicsDigest.com
  • 17. Popular Peer-to-Peer Clients • LimeWire • FrostWire • BitComet • Vuze • µTorrent • MP3 Rocket • BitTorrent • Morpheus • LimeWire Pro • Ares Galaxy www.FrederickLane.com www.ComputerForensicsDigest.com
  • 18. Typical Operation of P2P Software • Users Download Client Software and Register for an Account • Users Search for Specific Types of Content • Users Click on a Search Result to Initiate Download • P2P Software Typically Downloads to a “Shared” Directory • Content Can Be Made Instantly Available to Other Users of P2P Software www.FrederickLane.com www.ComputerForensicsDigest.com
  • 19. Core Issue: Extent of User Control • Nature and Name of Downloaded Contents • Evidence Downloaded Files Were “Previewed” During Download Process • Search Terms Used • Are Client Settings Default or Specialized? Directories, Sharing, etc. • Evidence of Degree of Sophistication www.FrederickLane.com www.ComputerForensicsDigest.com
  • 20. Example: LimeWire Setup www.FrederickLane.com www.ComputerForensicsDigest.com
  • 21. Federal Anti-CP Programs • FBI Cyber Crimes Program • Innocent Images National Initiative • Internet Crimes Against Children (ICAC) • National Center for Missing and Exploited Children • Myriad Task Forces • Operation Fairplay (Wyoming/TLO) www.FrederickLane.com www.ComputerForensicsDigest.com
  • 22. Typical P2P Investigation • Law Enforcement Officer Uses P2P Client to Search for Contraband – Keywords & Hashes • Download of Possible Contraband Initiated • P2P Client Shows IP Address of Source • List of Files at That Source Can Be Viewed • IP Address Is Traced to Physical Address • Warrant Obtained for Search and Seizure of Computer Equipment at That Address www.FrederickLane.com www.ComputerForensicsDigest.com
  • 23. P2P In the Courts • An area of increasing interest for courts: roughly 300 federal decisions involving P2P software – only 25 or so state decisions • Does law enforcement use of P2P client constitute “search” of suspect’s computer? • Questions of control and distribution by suspect • Enhancements under sentencing guidelines www.FrederickLane.com www.ComputerForensicsDigest.com
  • 24. Recent P2P Decisions • Comcast v. F.C.C., 08-1291 (D.C. Cir. April 6, 2010) – rejecting F.C.C.’s ability to regulate network traffic • U.S. v. Dodd, 09-1946 (8th Cir. 2010) – P2P supports sentencing enhancement • U.S. v. Dyer, 589 F.3d 520 (1st Cir. 2009) – P2P can enhance sentence for distribution • U.S. v. Borowy, 595 F.3d 1045 (9th Cir. 2010) -- No 4th Amend. violation in LimeWire investigation www.FrederickLane.com www.ComputerForensicsDigest.com
  • 25. What’s That Doing on My Hard Drive? • Web Browser Overview • Web Browser Caches & Cookies • “Every Breath You Take …” • File Storage, Deletion, and Recovery • Caches in the Courts www.FrederickLane.com www.ComputerForensicsDigest.com
  • 26. Multiple Browsers, Multiple Caches • First There Was Netscape … • Internet Explorer, Mozilla, Opera, Google Chrome • Safari and Mac variants • Extract cache files or analyze disk www.FrederickLane.com www.ComputerForensicsDigest.com
  • 27. Cache Value • Small Hard Drives & Dial-Up • Hidden Files • Organized by User • Thumbnails • Is “Private Mode” Really Private? www.FrederickLane.com www.ComputerForensicsDigest.com
  • 28. Other Types of Web History • Cookies • Directory Listings • Email • Network Logs • Internet Service Providers www.FrederickLane.com www.ComputerForensicsDigest.com
  • 29. Distressingly Durable Data • A Quick Overview of Computer Forensics • The Hardware of Data Storage – Drives, Disks, RAM, ROM, Flash, etc. • Directories & Files • I Never Metadata … www.FrederickLane.com www.ComputerForensicsDigest.com
  • 30. The Great Delete Myth www.FrederickLane.com • Of DOS and Disks
  • 31. The Great Delete Myth www.FrederickLane.com • Of DOS and Disks • Sneakernets
  • 32. The Great Delete Myth www.FrederickLane.com • Of DOS and Disks • Sneakernets • “Information Wants to Be Free”
  • 33. The Great Delete Myth www.FrederickLane.com • Of DOS and Disks • Sneakernets • “Information Wants to Be Free” • “Intriguing but vague”
  • 34. The Great Delete Myth www.FrederickLane.com • Of DOS and Disks • Sneakernets • “Information Wants to Be Free” • “Intriguing but vague” • Whole Earth Duplication
  • 35. Some Common File Questions … • File Timestamps – Created, Last Modified, Last Accessed? • Is It Possible to Determine Length of Time an Image or Video Was Viewed? • Files Lost in Space: Allocated, Unallocated, Slack, Other Partitions • All Thumbs.db www.FrederickLane.com www.ComputerForensicsDigest.com
  • 36. Cache in the Courts • U.S. v. Vosburgh, 08-4702 (3d Cir. April 20, 2010) [pro-Gov.] – Thumbs.db • U.S. v. Kain, 589 F.3d 945 (8th Cir. 2009) [pro-Gov.] • U.S. v. Miller, 527 F.3d 54 (3rd Cir. 2008) [even] • U.S. v. Kuchinski, 469 F.3d 853 (9th Cir. 2006); U.S. v. Romm, 455 F.3d 990 (9th Cir. 2006) [pro- defendant] • U.S. v. Tucker, 305 F.3d 1193 (10th Cir. 2002) [pro- Gov.] www.FrederickLane.com www.ComputerForensicsDigest.com
  • 37. Survey/Feedback http://bit.ly/cfDZCY (survey open until August 6, 2010 at 5:00 p.m.) www.FrederickLane.com www.ComputerForensicsDigest.com
  • 38. LimeWire Made Me Do It Frederick S. Lane FSLane3@gmail.com www.ComputerForensicsDigest.com Federal Public Defender of Middle Tennessee and Federal Defender Services of Eastern Tennessee, Inc. 30 July 2010 www.FrederickLane.com And Other Digital Follies www.ComputerForensicsDigest.com