Professional Documents
Culture Documents
GFR/C pyRouter
R t
Proces
ss flow
fl
2
Who will take part in upcom ming commercial and law
enforceme ent trials
•Altnet / BDE
3
How does it all work
w together?
4
Law enforcem
ment overview
The CopyRouter detects and replaces from search results refere ences
to files that are known to the police. This has a flow on effect:
1- If user downloads the file, the file they get is one from the police.
2- The original
g files won't be available for download. Even if the
t user
does NOT download this file, the information about the original file has been
removed for this search, which means...
3- Information about these files won't be propagated through h the client
host that is receiving this search result. But the files from po
olice would.
4- Also, Browsing a host directly is treated in the same manne er,severely limiting
di
direct fil exchange
user-to-user file h i
using hi method.
this h d
The Internet
GFR Copyroutter
5
Step 1 : Local ISP user ruuns a search (query) on
P2P network, i.e., for Pretteens sweet hot 15.wmv?
6
Step 2a.: P2P clients on the net start replying back with search results (query hits), of
any files they may know containing ‘Preteens sweet
s hot 15.wmv
'.Each query hit contains information about thhe file (filehash, filename, etc) and where
to get the file from ( IP address and port nummber).
7
Law enforcement overview – cont
cont'd
d
Cleaned up search results Original
g search results
Preteens sweet hot 15.wmv Preteens sweet hot 15.wmv
Hash : {Hash-of-this-police-generated-video} Hash : aaaaaaaaaaaaaaaa
Get it from IP-of-police-P2P Servers Get it from IP 1.2.3.4
8
Law enforceme
ent application
• Images (jpg,
(jpg png,
png bmp,
bmp tiff)
t
• Videos (avi, wmv, mov, xdiv)
x
• Audio (
(mp3,
p , wma,, acc,, ogg)
• Documents (doc, pdf, ppt t)
• etc.
9
Possible messaging when these
t files are downloaded
When a user downloads a file that was replaced by the Law Enforcement agency and they
ny other file, putting the message from the
open the file, their computer will handle it as an
agency right in front of their eyes.
10
Messaging and diffferent file types...
11
Applications : Commercial in parallel to Law enforcement
The CopyRouter in its current implementation will handle the requirement off Law enforcement agencies – we just need entries for the look-up table
(LUT) which would be provided by Law enforcement agencies.
The biggest differences are in the reporting needs : different destinations
destinations, diffferent information (enforcement agencies may require IP info)
info). We therefore
need to determine which 'vendor' provided which information in the LUT, and this is done by adding a new field to the LUT.
SERVER_IP {Initial_agen
ncy_Server_IP} {NumberOfServers}
SERVER_PORT {Initial_ag
gency_Server_Port} {NumberOfPorts}
Any hits here will generate a 'red' report, FILE_EXT .jpg
which will be routed to the ADD
police collector server ONLY
ONLY. # Infringing
g g Hash
2J35NKWJE6BXOFBVAXSLIOY
Replacement
p Hash
YJFCQK64UO UFIRGOBOJNMPGY6SCBHO6P3D4D7QVFB7
File size
853097
Vendor
2
These reports contain full IP information. 2OIOPN45W3G6KWN6CXKJX2C
CC6CGO3JGD UFIRGOBOJNMPGY6SCBHO6P3D4D7QVFB7 853097 2
5D2AB3T64BD55NHCJ5BGBGN
NDWPWVOHMK UFIRGOBOJNMPGY6SCBHO6P3D4D7QVFB7 853097 2
TLNW6OX44TQOPDI6XBQ2CHX
XZH7CANE3J UFIRGOBOJNMPGY6SCBHO6P3D4D7QVFB7 853097 2
12
Example of inform
mation generated
xxxx
xxxxxxxx xxxxxxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx
Reports from
SCE
14
Special handling
g of P2P protocol
Compression:
•
Encryption
E
• ti
–Some of the sessions are
a normally encrypted
–We change the traffic th
hat holds the encryption
negotiation
g so the sessiion will be in p
plain text.
15
Global File
e Registry
•Interdicts p
proven illicit data on an automated basis.
•Substitutes that illicit data with an
a appropriate warning/notice
•It does this without impact on cu ustomer experience or technical
performance without effecting privacy or customer integrity
•World's best technology gy for disru
upting
p g & defeating
g illicit data
trafficking
•Protects yyour communityy regardg dless of where the cyber
y
criminals operate from
16
Thank
k you!
y