INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

Similar documents
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW

PEER-TO-PEER NETWORK

The Internet and Network Technologies

YOUNG PEOPLE, MUSIC & THE INTERNET

Networks and the Internet A Primer for Prosecutors and Investigators

NETWORKS AND THE INTERNET

Three short case studies

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

P2P: centralized directory (Napster s Approach)

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

Equipment Needed. Connecting to the Internet

Case 1:15-cv WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

SE4C03: Computer Networks and Computer Security Last revised: April Name: Nicholas Lake Student Number: For: S.

Music and the Internet. A guide for parents and teachers

A Study on the novel tool to retort P2P security issues

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

Advanced Peer to Peer Discovery and Interaction Framework

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Peer to Peer File Sharing and Copyright Infringement Policy

Lecture 6 Content Distribution and BitTorrent

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

From Centralization to Distribution: A Comparison of File Sharing Protocols

Music, Film, TV and the Internet. A guide for parents and teachers

Technical report: An Estimate of Infringing Use of the Internet

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

The BitTorrent Protocol

Case 1:16-cv WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Music, Film, TV and the Internet. A guide for parents and teachers

E-Safety Issues and Online Safety. Parents Evening

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Multicast vs. P2P for content distribution

Is Skype Safe for Judges?

ResNet Guide. Information & Learning Services. Here to support your study and research

Case 2:16-cv APG-GWF Document 1 Filed 04/24/16 Page 1 of 12

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee


Digital Forensics for Attorneys Overview of Digital Forensics

Middle secondary unit. Ethical use of technology.

Peer-to-Peer Networks Organization and Introduction 1st Week

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University

E-Safety Issues and Online Safety

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

E-Safety Issues and Online Safety

Peer-to-Peer Systems: "A Shared Social Network"

Acceptable Use Policy ("AUP")

The Algorithm of Sharing Incomplete Data in Decentralized P2P

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

24/7 High Tech Crime Network

Sync Security and Privacy Brief

Cablelynx Acceptable Use Policy

But Your Honor, I Didn t Possess Those Pictures; My Computer Did.

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1

Chapter 23: Uploading Your Website to the Internet

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

2012 NCSA / McAfee Online Safety Survey

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Masters of Science in Information Technology

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Commonwealth Office of Technology

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Transcription:

THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast. Enclosed you will find a printable version of the PowerPoint slides for the session. After the session, we will send you a CLE form and a link to the online evaluation. About the Session: Wednesday, May 11, 2011, 12:00 p.m. 1:15 p.m. PDT (3:00 p.m. 4:15 p.m. EDT) Faculty: Priscilla Grantham, Esq., Senior Research Counsel, The National Center for Justice & the Rule of Law About the Course: This course is the third in a six part series of webinars provided under a grant from the U.S. Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention by the National Center for Justice and the Rule of Law and The National Judicial College. Topics for this webinar include: chat rooms, instant messaging, E-groups, social networks, blogs and Wikis, video and photo sharing sites, newsgroups and bulletin/message boards, and online role-playing games. After the session, you will be able to: 1. Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; 2. Identify the basic architecture of P2P networks; 3. Differentiate between centralized P2P networks and decentralized P2P networks; 4. Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; 5. List some advantages associated with using Peer-to-Peer networks; 6. Identify potential downsides of using Peer-to-Peer networks; 7. Discuss the ways in which P2P technology has been exploited for illegal purposes; and 8. Summarize the concept behind file sharing programs such as GigaTribe.

THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE About the Faculty: Ms. Grantham has worked as senior research counsel for the National Center for Justice and the Rule of Law (NCJRL) at the University of Mississippi School of Law since 2006. Prior to joining the NCJRL, Ms. Grantham was associated with the United States Attorney for the Northern District of Mississippi as a research attorney, where she primarily handled issues regarding the Fourth Amendment and the federal sentencing guidelines. Ms. Grantham is a graduate of the University of Mississippi School of Law where she received her J.D. She was a cum laude graduate of the University of Mississippi. She has developed and presented legal training for law enforcement officers, judges and prosecutors in various subjects related to the Fourth Amendment, computer crime and computer-related criminal investigations. Ms. Grantham frequently lectures on topics such as consent searches of computers, the private search doctrine, the plain view doctrine, cyber crime statutes, child pornography, probable cause issues, the regulation and monitoring of sex offenders, youthful offenders in child pornography cases, sexting, and Internet safety. She joined the faculty of The National Judicial College in 2008.

THE NATIONAL JUDICIAL COLLEGE E DUCATION I NNOVATION A DVANCING J USTICE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER NETWORKS DIVIDER 1 Priscilla M. Grantham, Esq. OBJECTIVES: After this session, you will be able to: 1. Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; 2. Identify the basic architecture of P2P networks; 3. Differentiate between centralized P2P networks and decentralized P2P networks; 4. Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; 5. List some advantages associated with using Peer-to-Peer networks; 6. Identify potential downsides of using Peer-to-Peer networks; 7. Discuss the ways in which P2P technology has been exploited for illegal purposes; and 8. Summarize the concept behind file sharing programs such as GigaTribe. REQUIRED READING: PAGE Priscilla M. Grantham, Peer-to-Peer Technology (May 2011) [NCJRL PowerPoint]...1 WEB: INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WB/KZ MAY 11, 2011

Peer-to-Peer Technology Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law Copyright 2011 National Center for Justice and the Rule of Law ICAC Webinar series NCJRL. org Learning Objectives After this presentation, you will be able to: Describe Peer-to-Peer network systems, including the role that P2P client programs play in their operation, and describe how P2P computing differs from traditional client-server models; Identify the basic architecture of P2P networks; Differentiate between centralized P2P networks and decentralized P2P networks; Learning Objectives After this presentation, you will be able to: Explain how the BitTorrent system varies from other P2P protocols, and define various components of the BitTorrent protocol, including tracker, seed, and swarm; List some advantages associated with using Peer- to-peer networks; Identify potential downsides of using Peer-to-Peer networks; Discuss the ways in which P2P technology has been exploited for illegal purposes; and Summarize the concept behind file sharing programs such as GigaTribe. 1

P2P Technology Efficient, robust means to distribute a wide range of content including software, games, books, movies, music, etc. Wikipedia complied a CD with over 2,000 articles specifically for schools and children made it available for download on P2P network. Researchers share data and computer code. Used by NASA to distribute satellite imagery. Peer-to-Peer Networks Network consisting of thousands of computers connected to each other Main feature: No central server Main use: Acquiring files Examples: BitTorrent, Gnutella P2P: Networks v. Clients P2P Networks: Napster Gnutella edonkey Gnutella2 (G2) BitTorrent P2P Clients: Shareza BitTorrent BearShare emule Warez Frostwire 2

Traditional File Transfer Methods: Referred to as client-server file transfer Transfer handled by a protocols such as FTP (file transfer protocol) or HTTP (HyperText transfer protocol) Desired file located via web browser File is downloaded from a single source, the file server, by the destination computer, the client I open web page, click link to download file Web browser software on my computer tells a central computer that holds the Web page & file I want to transfer copy of the file to my computer. Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of traffic on server, # of computers trying to download same file. If file is large and popular, demands on server will be great and download will be slow. Server could crash. Benefits of P2P: Client machines are peers and communicate directly with one another. Users of P2P tend to be contributors and consumer; P2P approximates original conception of Internet as network of connections among individuals & organizations that give and take info. P2P networks tend to be faster and more reliable no reliance on central server to deliver content. 3

Downsides of P2P: P2P networks have been used to transmit viruses, malware, mislabeled/corrupted files. Those who inadvertently placed sensitive materials in network-shared directories have been victims of identity theft. Music and media files easily distributed in violation of copyright laws. Test Your Knowledge: The software that enables one to share files over a P2P network is called a: A. P2P client B. Swarm C. Server D. Peer There are many clients available online that can be downloaded free of charge. Some examples are BearShare, Frostwire, Shareza, Limewire (defunct) The Evolution of P2P Networks: It all started with Napster Central Server Model Started Napster software on my computer now my computer could make files available to other Napster users, My computer connected to Napster s central servers, My computer told the Server which files were available on my machine, Napster central servers had complete list of every song available on every hard disk connected to Napster at that time 4

Downloading a Song Via Napster: I typed in my query: Roxanne by the Police Napster s central servers listed all the computers storing that song I chose a version of the song from the list My computer connected to the user s computer that had the song, and downloaded Roxanne directly from that computer. Napster Ordered to Shut Down Due to Copyright Violations No central Database = No Napster Enter Gnutella: 1 st decentralized P2P network No central database that knew all files available on Gnutella network Unlike Napster, many different client programs available to access Gnutella network. 5

Downloading a File Via Gnutella P2P Network: Run Gnutella-compatible file sharing software on computer Send out request for desired file Software asks computers connected to Internet and running same software Software finds a computer with the file I want on its hard drive, download begins. BitTorrent Protocol: Enables fast downloading of large files using minimum Internet bandwidth Offloads some of the file tracking work to a centralized server (called a Tracker) Uses tit-for-tat principle: in order to receive files, you must give them BitTorrent v. Gnutella: With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously. Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 6

BitTorrent Basic Terms: Tracker a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm. Swarm All of the computers that contain all or part of the file being sought. Seed the computers in the swarm that contain the entire file being sought. Leechers commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them. BitTorrent Explained: http://video Test Your Knowledge: Which P2P network is an example of a Centralized server model? A. Gnutella B. Napster C. BitTorrent D. GigaTribe Napster featured a centralized server that kept a list of every song available on every hard disk connected to it at that time. 7

Downloading Via BitTorrent: Download (free) BitTorrent client: BitTorrent, utorrent Find a torrent file to download. Enter term.torrent using Internet search engine to find sites offering BitTorrent files The Pirate Bay isohunt TorrentSpy Mininova Jamendo Swedish website Allows users to search for and download torrents, small files containing metadata necessary to download data from other users. Torrents organized into categories: Audio, Video, Applications, Games, and Porn I ve got a torrent file of Countdown s album Break Rise Blowing from the website Jamendo. Website Torrent 8

Now I save torrent file to my hard drive, Open torrent file in my BitTorrent client program, and Start downloading. Downoading a File Via BitTorrent: 9

Test Your Knowledge: The role of the Tracker in the BitTorrent network is to maintain an index of all files available for trading. A. True B. False The Tracker communicates with the BitTorrent client (software) in order to locate the swarm (all of the computers that contain all or part of the file being sought.) And the Latest Innovation Private P2P Networks / Private Internet Network of trusted sources Share files only with those you know and trust GigaTribe 2Peer QNext The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces. 10

2Peer Features: Feature 2PeerDesktop 2PeerWeb Browse Friends' Content Keyword search for files Download files Invite Users to your Private Internet Organize users into groups Change your profile information Update your preference settings View Albums Download folders Share folders and files Share albums Chat View transfer history Create Albums 2peer.com GigaTribe - Features: All data transfers are encrypted No limitation on quantity or file size No wasting time uploading files: Select folders to share Contents of selected folders instantly accessible to friends Friends browse and download files they want Data remains under your control; not saved on another company s equipment Includes personal chat and private blog 11

Very Easy to Use 1. Set up a free account click activation link in confirmation email 2. Log into GigaTribe client 3. Click on Folders tab & add folders to share 12

4. Make sure to select subfolders so all contents of the folder can be shared. 5. Ask your friend to do the same steps until this point. 6. Now click on Add to add your friend in your list. 7. To send an invitation to your friend, simply select the option. 13

8. To accept an invitation, select user from left sidebar and Accept invitation Bob Doe 9. Select a user from my contacts, and click on it. 10. Clicking on a user shows the files available 14

11. Folders being shared by that user are displayed under Folders tab. 12. Right click on a file to download it. 13. It will be placed in my GigaTribe Downloads folder under My Documents. Shared folders 14. Under My Transfers, I can see the transfers that are taking place. Test Your Knowledge: Where are P2P files stored? A. Web hosting companies B. The P2P network servers C. Internet Service Providers D. Individuals computers E. Google 15

Each and every file shared on a P2P network is located on a regular computer. Websites that have.torrent files available for downloading can be located by using a search engine such as Google. The.torrent file that you download does not contain actual content, i.e., the movie or song that you want; it contains a link to a tracker as well as an identifier (hash) which is unique to that specific torrent. Your BitTorrent client then connects to the tracker and asks for a list of all people interested in that torrent and adds you to that list so that other people know that you are interested. Your BitTorrent client will also periodically asks the tracker for an updated list. That's all a tracker does: keeps track of the list of peers for each torrent, and gives it out to people who are interested. The tracker does not know anything else about the torrent, nor does it send you the file. It just shows you where to go to get the file. Legal Issues: Problem is not with the technology, but in the way it has been used. Napster shut down its website in order to comply w/ injunction that it prevent trading of copyrighted music on its network Now an online music store requiring paid subscription 16

RIAA filed suit on behalf of 8 major music publishers. Charged the online file-sharing program with pervasive online copyright infringement May 2010, federal judge ordered permanent shutdown of the company. Frequent defendants in copyright infringement suits The Pirate Bay Four each received I year jail time and fines totaling more than $3 million. Site still up and running. 17

BitTorrent users being sued enmasse by independent film makers. Consortium of indie filmmakers launched masslitigation campaign, sued individual BitTorrent users whose IP addresses were detected feeding and seeding films like Uncross the Stars, Gray Man and Call of the Wild 3D and in other news Mass BitTorrent lawsuits turn low-budget movies into big bucks Small film co. in LA filed fed lawsuit against 5,865 who allegedly downloaded one of their releases Could yield almost $9 million more than box office gross for Avatar Suit lists IP addresses of downloaders asks judge to order ISPs around country to provide names Individuals will be mailed letters seeking settlement lest they be named in a public lawsuit. The very features touted by GigaTribe, make it a safe haven for those trading images, videos, and information related to child sexual abuse. 18

Test Your Knowledge: Which of the following have not been used for illegal purposes? A. Gnutella B. BitTorrent C. GigaTribe D. A and B E. None of the above While there are benefits to all of these technologies, they have unfortunately all been used for illegal purposes - from distributing material in violation of copyright law to distributing images of child sexual abuse. 19