INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST
|
|
- Diana Watts
- 2 years ago
- Views:
Transcription
1 THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast. Enclosed you will find a printable version of the PowerPoint slides for the session. After the session, we will send you a CLE form and a link to the online evaluation. About the Session: Wednesday, May 11, 2011, 12:00 p.m. 1:15 p.m. PDT (3:00 p.m. 4:15 p.m. EDT) Faculty: Priscilla Grantham, Esq., Senior Research Counsel, The National Center for Justice & the Rule of Law About the Course: This course is the third in a six part series of webinars provided under a grant from the U.S. Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention by the National Center for Justice and the Rule of Law and The National Judicial College. Topics for this webinar include: chat rooms, instant messaging, E-groups, social networks, blogs and Wikis, video and photo sharing sites, newsgroups and bulletin/message boards, and online role-playing games. After the session, you will be able to: 1. Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; 2. Identify the basic architecture of P2P networks; 3. Differentiate between centralized P2P networks and decentralized P2P networks; 4. Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; 5. List some advantages associated with using Peer-to-Peer networks; 6. Identify potential downsides of using Peer-to-Peer networks; 7. Discuss the ways in which P2P technology has been exploited for illegal purposes; and 8. Summarize the concept behind file sharing programs such as GigaTribe.
2 THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE About the Faculty: Ms. Grantham has worked as senior research counsel for the National Center for Justice and the Rule of Law (NCJRL) at the University of Mississippi School of Law since Prior to joining the NCJRL, Ms. Grantham was associated with the United States Attorney for the Northern District of Mississippi as a research attorney, where she primarily handled issues regarding the Fourth Amendment and the federal sentencing guidelines. Ms. Grantham is a graduate of the University of Mississippi School of Law where she received her J.D. She was a cum laude graduate of the University of Mississippi. She has developed and presented legal training for law enforcement officers, judges and prosecutors in various subjects related to the Fourth Amendment, computer crime and computer-related criminal investigations. Ms. Grantham frequently lectures on topics such as consent searches of computers, the private search doctrine, the plain view doctrine, cyber crime statutes, child pornography, probable cause issues, the regulation and monitoring of sex offenders, youthful offenders in child pornography cases, sexting, and Internet safety. She joined the faculty of The National Judicial College in 2008.
3 THE NATIONAL JUDICIAL COLLEGE E DUCATION I NNOVATION A DVANCING J USTICE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER NETWORKS DIVIDER 1 Priscilla M. Grantham, Esq. OBJECTIVES: After this session, you will be able to: 1. Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; 2. Identify the basic architecture of P2P networks; 3. Differentiate between centralized P2P networks and decentralized P2P networks; 4. Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; 5. List some advantages associated with using Peer-to-Peer networks; 6. Identify potential downsides of using Peer-to-Peer networks; 7. Discuss the ways in which P2P technology has been exploited for illegal purposes; and 8. Summarize the concept behind file sharing programs such as GigaTribe. REQUIRED READING: PAGE Priscilla M. Grantham, Peer-to-Peer Technology (May 2011) [NCJRL PowerPoint]...1 WEB: INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WB/KZ MAY 11, 2011
4 Peer-to-Peer Technology Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law Copyright 2011 National Center for Justice and the Rule of Law ICAC Webinar series NCJRL. org Learning Objectives After this presentation, you will be able to: Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; Identify the basic architecture of P2P networks; Differentiate between centralized P2P networks and decentralized P2P networks; Learning Objectives After this presentation, you will be able to: Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; List some advantages associated with using Peer- to-peer networks; Identify potential downsides of using Peer-to-Peer networks; Discuss the ways in which P2P technology has been exploited for illegal purposes; and Summarize the concept behind file sharing programs such as GigaTribe. 1
5 P2P Technology Efficient, robust means to distribute a wide range of content including software, games, books, movies, music, etc. Wikipedia complied a CD with over 2,000 articles specifically for schools and children made it available for download on P2P network. Researchers share data and computer code. Used by NASA to distribute satellite imagery. Peer-to-Peer Networks Network consisting of thousands of computers connected to each other Main feature: No central server Main use: Acquiring files Examples: BitTorrent, Gnutella P2P: Networks v. Clients P2P Networks: Napster Gnutella edonkey Gnutella2 (G2) BitTorrent P2P Clients: Shareza BitTorrent BearShare emule Warez Frostwire 2
6 Traditional File Transfer Methods: Referred to as client-server file transfer Transfer handled by a protocols such as FTP (file transfer protocol) or HTTP (HyperText transfer protocol) Desired file located via web browser File is downloaded from a single source, the file server, by the destination computer, the client I open web page, click link to download file Web browser software on my computer tells a central computer that holds the Web page & file I want to transfer copy of the file to my computer. Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of traffic on server, # of computers trying to download same file. If file is large and popular, demands on server will be great and download will be slow. Server could crash. Benefits of P2P: Client machines are peers and communicate directly with one another. Users of P2P tend to be contributors and consumer; P2P approximates original conception of Internet as network of connections among individuals & organizations that give and take info. P2P networks tend to be faster and more reliable no reliance on central server to deliver content. 3
7 Downsides of P2P: P2P networks have been used to transmit viruses, malware, mislabeled/corrupted files. Those who inadvertently placed sensitive materials in network-shared directories have been victims of identity theft. Music and media files easily distributed in violation of copyright laws. Test Your Knowledge: The software that enables one to share files over a P2P network is called a: A. P2P client B. Swarm C. Server D. Peer There are many clients available online that can be downloaded free of charge. Some examples are BearShare, Frostwire, Shareza, Limewire (defunct) The Evolution of P2P Networks: It all started with Napster Central Server Model Started Napster software on my computer now my computer could make files available to other Napster users, My computer connected to Napster s central servers, My computer told the Server which files were available on my machine, Napster central servers had complete list of every song available on every hard disk connected to Napster at that time 4
8 Downloading a Song Via Napster: I typed in my query: Roxanne by the Police Napster s central servers listed all the computers storing that song I chose a version of the song from the list My computer connected to the user s computer that had the song, and downloaded Roxanne directly from that computer. Napster Ordered to Shut Down Due to Copyright Violations No central Database = No Napster Enter Gnutella: 1 st decentralized P2P network No central database that knew all files available on Gnutella network Unlike Napster, many different client programs available to access Gnutella network. 5
9 Downloading a File Via Gnutella P2P Network: Run Gnutella-compatible file sharing software on computer Send out request for desired file Software asks computers connected to Internet and running same software Software finds a computer with the file I want on its hard drive, download begins. BitTorrent Protocol: Enables fast downloading of large files using minimum Internet bandwidth Offloads some of the file tracking work to a centralized server (called a Tracker) Uses tit-for-tat principle: in order to receive files, you must give them BitTorrent v. Gnutella: With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously. Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 6
10 BitTorrent Basic Terms: Tracker a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm. Swarm All of the computers that contain all or part of the file being sought. Seed the computers in the swarm that contain the entire file being sought. Leechers commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them. BitTorrent Explained: Test Your Knowledge: Which P2P network is an example of a Centralized server model? A. Gnutella B. Napster C. BitTorrent D. GigaTribe Napster featured a centralized server that kept a list of every song available on every hard disk connected to it at that time. 7
11 Downloading Via BitTorrent: Download (free) BitTorrent client: BitTorrent, utorrent Find a torrent file to download. Enter term.torrent using Internet search engine to find sites offering BitTorrent files The Pirate Bay isohunt TorrentSpy Mininova Jamendo Swedish website Allows users to search for and download torrents, small files containing metadata necessary to download data from other users. Torrents organized into categories: Audio, Video, Applications, Games, and Porn I ve got a torrent file of Countdown s album Break Rise Blowing from the website Jamendo. Website Torrent 8
12 Now I save torrent file to my hard drive, Open torrent file in my BitTorrent client program, and Start downloading. Downoading a File Via BitTorrent: 9
13 Test Your Knowledge: The role of the Tracker in the BitTorrent network is to maintain an index of all files available for trading. A. True B. False The Tracker communicates with the BitTorrent client (software) in order to locate the swarm (all of the computers that contain all or part of the file being sought.) And the Latest Innovation Private P2P Networks / Private Internet Network of trusted sources Share files only with those you know and trust GigaTribe 2Peer QNext The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces. 10
14 2Peer Features: Feature 2PeerDesktop 2PeerWeb Browse Friends' Content Keyword search for files Download files Invite Users to your Private Internet Organize users into groups Change your profile information Update your preference settings View Albums Download folders Share folders and files Share albums Chat View transfer history Create Albums 2peer.com GigaTribe - Features: All data transfers are encrypted No limitation on quantity or file size No wasting time uploading files: Select folders to share Contents of selected folders instantly accessible to friends Friends browse and download files they want Data remains under your control; not saved on another company s equipment Includes personal chat and private blog 11
15 Very Easy to Use 1. Set up a free account click activation link in confirmation 2. Log into GigaTribe client 3. Click on Folders tab & add folders to share 12
16 4. Make sure to select subfolders so all contents of the folder can be shared. 5. Ask your friend to do the same steps until this point. 6. Now click on Add to add your friend in your list. 7. To send an invitation to your friend, simply select the option. 13
17 8. To accept an invitation, select user from left sidebar and Accept invitation Bob Doe 9. Select a user from my contacts, and click on it. 10. Clicking on a user shows the files available 14
18 11. Folders being shared by that user are displayed under Folders tab. 12. Right click on a file to download it. 13. It will be placed in my GigaTribe Downloads folder under My Documents. Shared folders 14. Under My Transfers, I can see the transfers that are taking place. Test Your Knowledge: Where are P2P files stored? A. Web hosting companies B. The P2P network servers C. Internet Service Providers D. Individuals computers E. Google 15
19 Each and every file shared on a P2P network is located on a regular computer. Websites that have.torrent files available for downloading can be located by using a search engine such as Google. The.torrent file that you download does not contain actual content, i.e., the movie or song that you want; it contains a link to a tracker as well as an identifier (hash) which is unique to that specific torrent. Your BitTorrent client then connects to the tracker and asks for a list of all people interested in that torrent and adds you to that list so that other people know that you are interested. Your BitTorrent client will also periodically asks the tracker for an updated list. That's all a tracker does: keeps track of the list of peers for each torrent, and gives it out to people who are interested. The tracker does not know anything else about the torrent, nor does it send you the file. It just shows you where to go to get the file. Legal Issues: Problem is not with the technology, but in the way it has been used. Napster shut down its website in order to comply w/ injunction that it prevent trading of copyrighted music on its network Now an online music store requiring paid subscription 16
20 RIAA filed suit on behalf of 8 major music publishers. Charged the online file-sharing program with pervasive online copyright infringement May 2010, federal judge ordered permanent shutdown of the company. Frequent defendants in copyright infringement suits The Pirate Bay Four each received I year jail time and fines totaling more than $3 million. Site still up and running. 17
21 BitTorrent users being sued enmasse by independent film makers. Consortium of indie filmmakers launched masslitigation campaign, sued individual BitTorrent users whose IP addresses were detected feeding and seeding films like Uncross the Stars, Gray Man and Call of the Wild 3D and in other news Mass BitTorrent lawsuits turn low-budget movies into big bucks Small film co. in LA filed fed lawsuit against 5,865 who allegedly downloaded one of their releases Could yield almost $9 million more than box office gross for Avatar Suit lists IP addresses of downloaders asks judge to order ISPs around country to provide names Individuals will be mailed letters seeking settlement lest they be named in a public lawsuit. The very features touted by GigaTribe, make it a safe haven for those trading images, videos, and information related to child sexual abuse. 18
22 Test Your Knowledge: Which of the following have not been used for illegal purposes? A. Gnutella B. BitTorrent C. GigaTribe D. A and B E. None of the above While there are benefits to all of these technologies, they have unfortunately all been used for illegal purposes - from distributing material in violation of copyright law to distributing images of child sexual abuse. 19
WEBINAR. Peer-to-Peer Technology 3/27/2012 WEBINAR TIPS: Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law
Peer-to-Peer Technology Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law NCJRL. org Copyright 2012 National Center for Justice and the Rule of Law ICAC Webinar
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
THE NATIONAL JUDICIAL COLLEGE
E DUCATION I NNOVATION A DVANCING J USTICE THE NATIONAL JUDICIAL COLLEGE OUTSIDE THE BOX: INTERNET & NETWORK TECHNOLOGY DIVIDER 7 Professor Donald R. Mason OBJECTIVES: After this session, you will be able
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
YOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
Three short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
PEER-TO-PEER FILE SHARING POLICY
1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,
Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
Mississippi Valley State Universtiy Information Technology. Peer-To-Peer File Sharing Policy
Mississippi Valley State Universtiy Information Technology Peer-To-Peer File Sharing Policy Purpose The primary purpose of this policy is to inform, educate and set expectations for the members of the
Equipment Needed. Connecting to the Internet
All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded
Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. CLEAR SKIES NEVADA, LLC, a Nevada Limited
VIUS Reports 9.1. Description of LionShare Architecture
Prototype Peer-to-Peer Service: LionShare VIUS Reports 9.1 Description of LionShare Architecture The popularity of file sharing and instant messaging applications on the Internet has lead to the latest
SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a
Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,
TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
WHAT IS PEER - TO - PEER (P2P)?
WHAT IS PEER - TO - PEER (P2P)? INDICE 1 What is P2P? 2 P2P THREATS 3 DATA LEAKAGE... 3 COPYRIGHT INFRINGEMENT...3 RESOURCE CONSUMPTION...3 ACCESS CONTROL ENFORCEMENT...3 DATA RETENTION...3 MALWARE...3
A Study on the novel tool to retort P2P security issues
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 2 호, 2008년 4월 A Study on the novel tool to retort P2P security issues Martin Drahansky 1) Abstract The term File Sharing is the sharing of computer data
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones
m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones Nitesh Kumar Rohit V. Gugale Jatin J. Kakani Rahul G. Dalal Abstract: Since the advent of internet, data sharing has got
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
Lecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
Copyright Compliance and Peer-to-Peer File Sharing Policy
University of Scranton Division of Information Resources Copyright Compliance and Peer-to-Peer File Sharing Policy Executive Sponsor: Sr Vice President for Finance and Administration Responsible Office:
Office of Information Technology. Roger Williams University Appropriate Use Policy. Purpose:
Office of Information Technology Roger Williams University Appropriate Use Policy Purpose: This is intended to regulate the use of Roger Williams University s electronic communications systems. Users of
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. FATHERS & DAUGHTERS NEVADA, LLC, a Nevada Limited
Peer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA
Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Technical report: An Estimate of Infringing Use of the Internet
Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com
Ringling College of Art and Design
Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL Dr. Allan Charles Watt, PhD, CFCE, CFE Macquarie University, Sydney, Australia Session ID: CLE W02 Session Classification:
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER
11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for
Appendix to the LIM College Peer-to-Peer File Sharing Policy
Appendix to the LIM College Peer-to-Peer File Sharing Policy Version 1 Last Updated: 3/15/10 Department: Information Technology Approved by: Board of Directors LIM College does not allow the reproduction
Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks
Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
N6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
A Week in the Life of the Most Popular BitTorrent Swarms
A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations
Beijing Model United Nations 2015 XXII Forum: Issue: General Assembly Third Committee Combatting the threat of cyber and P2P sharing to the economic stability of post-industrial nations Student Officer:
Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12
Case :-cv-00-apg-gwf Document Filed 0// Page of CHARLES C. RAINEY, ESQ. Nevada Bar No. chaz@raineylegal.com RAINEY LEGAL GROUP, PLLC 0 W. Martin Avenue, Second Floor Las Vegas, Nevada +.0..0 (ph +... (fax
The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service
The Role of Internet Service Providers in Stopping Internet Copyright Infringement Jennie Ness Regional IP Attaché U.S. Commercial Service New Means of Distribution Webcasting or Streaming Uploading and
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Searching for Malware in BitTorrent
Searching for Malware in BitTorrent Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of
ResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.
MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred
Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5
WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
TECHNOLOGY Understanding the laws surrounding cell phones and computers
TECHNOLOGY Understanding the laws surrounding cell phones and computers Most young people have been exposed to technology such as cell phones and the Internet for most of their lives. Read on to learn
Peer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla University, Thailand Darran Nathan, APBioNet
Automatic Synchronization and Distribution of Biological Databases and Software over Low-Bandwidth Networks among Developing Countries P2P Node Setup Guide Authored by: Unitsa Sungket, Prince of Songkla
Decentralized Networking
Decentralized Networking 1 Indi Samarajiva www.indi.ca Abstract: In practice there are two models of computer networks, centralized and decentralized. In this proposal I will present each model and propose
If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University Immaculata University ( IU ) takes a strong stand against unlawful distribution of copyrighted music,
Copyright Compliance and Peer to Peer File Sharing Policy
University of Scranton Copyright Compliance and P2P File Sharing Policy 9/1/2010 Division of Planning & Information Resources Copyright Compliance and Peer to Peer File Sharing Policy Executive Sponsor:
Is Skype Safe for Judges?
Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Judges Technology Advisory Committee, Canadian Judicial Council, 1 Version 2.0 July 6, 2010 In this article I will try to help judges understand
BitTorrent. Forensic Studies in
Forensic Studies in BitTorrent Optimising file downloads is a dream for some; for others it raises challenging piracy issues. BY JAMIE ACORN AND JOHN AUSTIN Produced by the Information Security Group at
Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools
Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Students should use technology and the Internet in an appropriate manner. Technology is an integral part of a student s educational
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Masters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?
UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result
Acceptable Use Policy. Version 2. August 15 th,
Acceptable Use Policy Version 2. August 15 th, As a provider of web site hosting and other internet- related services, SulliHosting, Inc., Inc. offers its customers (also known as "Subscribers" or Clients
4/8/2013. Search. Micro Blogging. Video sharing. Audio
Common 4 th Amendment Applicability Issues in Child Pornography Cases Priscilla Grantham Sr. Research Counsel Nat l Ctr. For Justice and the Rule of Law 1 Inside the box: and Outside 2 Search Micro Blogging
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Peer-to-Peer Networks Status 2008 13th Week
Peer-to-Peer Networks Status 2008 13th Week Department of Computer Science 1 Peer to Peer Networks Situation 2008 2 2 Internet Traffic 1993-2004 3 3 Main Protocols 2004 Main protocols edonkey BitTorrent
But Your Honor, I Didn t Possess Those Pictures; My Computer Did.
But Your Honor, I Didn t Possess Those Pictures; My Computer Did. Temporary Internet Files, Web Browser Cache Files, and Child Pornography By Priscilla M. Grantham Gone are the days when a computer was
Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1
Winny Case A P2P Software Copyright Case in Japan Impact on the Information Society and Legal Analysis Takato NATSUI Professor at Meiji University Law Faculty, Tokyo Japan Lawyer at Asuka-Kyowa Law Firm,
Part 1: The Plan to Effectively Combat Copyright Infringement
Part 1: The Plan to Effectively Combat Copyright Infringement As both a producer and a consumer of intellectual property, The Ohio State University respects the rights of copyright holders. OSU and its
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Chapter 23: Uploading Your Website to the Internet
1 Chapter 23: Uploading Your Website to the Internet After you complete your website, you must upload (save) your site to the internet. Before you upload, Web Studio provides you with options to view your
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Updated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: April 2010 Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 8 2. Installing the
RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Acceptable Use. All capitalized terms used in this AUP that are not defined here have the meanings given to them in the Subscriber Agreement.
Acceptable Use Brantley Telephone Company ( Brantley ) has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Brantley s Broadband Internet service ( Broadband Service ). This
Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
COMPUTER POLICIES AND SUPPORT
COMPUTER POLICIES AND SUPPORT EMPLOYEE AGREEMENT ON USE OF EMAIL AND THE INTERNET I have read, understand, and agree to comply with the policies, rules, and conditions governing the use of Lindenwood University
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection