back to article P2P searches touted as tool against child abuse

A Democrat Senator has proposed monitoring peer-to-peer networks for illegal files. Senator Joe Biden proposed the plan at a Senate Judiciary sub-committee hearing about child exploitation on the net. Sen Biden tabled a bill to increase resources for regional computer forensic labs and boost tools available to fight online …

COMMENTS

This topic is closed for new posts.
  1. heystoopid
    Alien

    Oh well

    Oh well , "Idiocracy Rocks " and the man is obviously senile !

    Why do I have the feeling an MRI scan will find mostly vacant air space in his head ?

  2. Anonymous Coward
    Anonymous Coward

    heh

    they obviously havn't seen most pronz files on peer to peer networks

    it goes

    Luscious red head sucks two guys (teen preteen xxx beastiality squirt fetsih bdsm ptsm lolita old lady adult anal hot orgy lesbian gay horse porn hardcore twins feet blond brunette flatchest mellons breasts titjob) so on and so forth.

    This is why p2p file sharing networks are junk for pronz.

  3. Anonymous Coward
    Alert

    @AC

    It'd be impressive if that file lived up to its billing.

  4. Charles King
    Paris Hilton

    Anonymous P2P is harder than you think

    1) P2P encryption neither hides your identity nor hides the file content from the person downloading it (would be pretty useless if it did). Repeat after me: ALL P2P encryption does is attempt to hide the packet protocol from ISPs that are trying to throttle bittorrent. Even then it doesn't do that good a job, and many throttling solutions in use today can easily defeat it.

    So let's stop talking about P2P encryption (as currently practised) like it's some sort of magic wand to stick it to The Man.

    2) Tor and other 'darknet' solutions are intrinsically poor at large file transfers (eg video) for obvious reasons. Fully-anonymised P2P transfer is a tedious process. Partial anonymity is possible (and much faster) in which your IP address is hidden from the tracker, but not from the person with whom you're sharing data. This would not defeat diligent investigations in which the incriminating material is downloaded and verified as opposed to the lazy method of simply firing off a bunch of writs to every IP returned by the tracker. But then I would like to think that police investigating child abuse take more care about these things than MediaSentry does.

    3) Yes, pr0n on open P2P trackers is predictably garbage. I would hope that any investigators working in this field focus their efforts more on penetrating the underworld of private trackers that are probably used by these scum.

    Paris, because even she knows that P2P encryption won't save you from the lawyers.

  5. Steve Kay
    Thumb Down

    Enraged Baboon fudging a nipple factory

    http://www.bash.org/?572066

    Great plan.

  6. myxiplx

    Anonymous p2p

    Surely it's not that hard to make p2p almost completely anonymous. Encrypted traffic is a given, but you also need to make it hard to rogue clients to track usage.

    So, simply ensure all p2p traffic is proxied via a random other machine on the p2p network. If you want to download a file, your computer picks a p2p member at random and proxies the request anonymously through them. If you are offering files for upload, your files are also anonymously proxied via random other members.

    Even better, when the client receives a proxy request, also have a random chance for it to proxy that out to a further machine.

    A rogue client can now see that information is being requested by someone on the network, but it has no way to see exactly which particular client is uploading or downloading that file. Proxied information should also be encrypted so the proxies don't see the full story either. There should be no difference between a proxied packet, and one originating from the client.

    Essentially all information transmitted is one way, the destination is known, but the source is not since you don't know how many proxies it has passed through.

  7. Anonymous Coward
    Thumb Up

    @Steve Kay

    Definitely a classic. In other news, "Enraged Baboon" would be a great band name. And, of course, their first album would be...

  8. Andy

    1 beeeelion dollahs!

    $ 1000000000 / 250 = $ 4000000 per agent

    This means the plonker who convinces the Senator that his plan is a Good Idea that won't be defeated by people renaming files will earn $500,000 per year or $ 1369 per day.

    I'm surprised all you technical types are questioning if this is a Good Idea when you could be taking candy from a baby (erm, in this context maybe babies shouldn't be mentioned).

    This also means that the American government will be spending $ 1369 to pay somebody to download porn all day. Of course some of it will make your eyes bleed but that's just an occupational hazard.

    It might also be hard to explain at dinner parties exactly what it is you do for a living... "I download child porn" is not likely to open up dinner conversation.

    Still at least their government is trying. Our government sits on its collective arse and does nothing. It's getting so bad that our transport union had to refuse to carry weaponry across our country to mad Bob Mugabe... our government sat around and scratched itself where it smells. It's a pity South Africa doesn't have much oil - we might otherwise persuade America to bomb us and change our government for us.

  9. Steve

    Operation Ore: check your facts

    "Operation Orr - the largest investigation of child abuse networks to date - involved investigating suspects whose credit cards were used to access a child porn portal."

    Incorrect and possibly libellous. They investigated people whose credit card had been used at two portals that handled payments for over 5500 different sites. Of those, about 12 might have contained child porn. This resulted in thousands of innocent people being subject to dawn raids (an obvious publicity stunt) and investigations and then having to try and rebuild their lives when the police finally admitted that they had done nothing wrong. Apart from the 39 that committed suicide.

    "That's a more robust approach and even that has become the target of complaints that victims of credit card abuse have unfairly become targets of child abuse investigations."

    Only if your dictionary contains the phrase "total clusterfuck" within its definition of "robust".

  10. Anonymous Coward
    Anonymous Coward

    @Anonymous P2P is harder than you think

    re anonymous p2p

    http://en.wikipedia.org/wiki/Perfect_Dark_%28P2P%29

    Perfect Dark - Learn to love it.

    But yes you're right besides a few exceptions p2p is in no way anonymous

  11. frymaster

    @Charles King

    Thank you, I was just about to write a rant along the same lines :)

    @myxiplx: Congratulations, you've just reduced the efficiency of the bittorrent network by 6-8 times. More effort along those lines and there won't be a need for people to want to monitor it anyway.

    On the subject of filenames... you can't go on content, or else you'd be arresting people who thought they were downloading disney animated classics and instead got the rickroll's older and nastier brother. But I would hope they'd ALSO download the file completely (or enough to check it anyway) to confirm the dubious contents.

  12. Graham Marsden
    Thumb Down

    "Robust approach"?

    "That's a more robust approach and even that has become the target of complaints that victims of credit card abuse have unfairly become targets of child abuse investigations."

    Well, yes, if you were one of those many people who were effectively told "Accept a Caution and admit to a crime you didn't commit or we'll drag you through the Courts and wreck your career and destroy your family" when you were the victim of blatant card theft, I think you would tend to complain that it was unfair...!

    That's not a definition of "robust" that I am personally aware of...

  13. Anonymous Coward
    Anonymous Coward

    The problem with Perfect Dark

    and indeed any other anonymous P2P system is that it can be, and is, used by paedo rings to transmit their stuff. All of these Perfect Dark style system use variations on the same technique: Every client has an encrypted cache of other people's stuff which is sent to anyone who requests a particular file. You therefore have no way of knowing if that cache contains loli pics or not; but if it does, and a cop requests the image, your IP address comes up in the list of sources for it - even if you never had anything to do with it.

    So anyone who uses these systems is exposing themselves to the danger of being an unwitting host for kiddy porn. It is a sad fact of life that any system we create to preserve our freedom from Big Brother's spying eyes will intrinsically be used by real criminals to further their activities. If an anonymising system can be compromised by any means to find paedophiles, it can equally be compromised to find copyrighted files or "thought-criminals" as well.

    Just accept that your kids will grow up in a world that has no justice, human rights or freedoms. That's why I didn't have any.

  14. Andrew Bolton

    Hold on - 600000 PCs in Wyoming trading kiddie porn?

    Wouldn't that mean every single person in Wyoming owning 2 PCs, all of them downloading nasty stuff?

This topic is closed for new posts.