Investigative Uses of Technology: Devices, Tools, and Techniques

Total Page:16

File Type:pdf, Size:1020Kb

Investigative Uses of Technology: Devices, Tools, and Techniques U.S. Department of Justice Office of Justice Programs OCT. 07 OCT. National Institute of Justice Special REPORT Investigative Uses of Technology: Devices, Tools, and Techniques www.ojp.usdoj.gov/nij U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 Peter D. Keisler Acting Attorney General Cybele K. Daley Acting Assistant Attorney General David W. Hagy Acting Principal Deputy Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice www.ojp.usdoj.gov/nij Office of Justice Programs Innovation • Partnerships • Safer Neighborhoods www.ojp.usdoj.gov 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page i OCT. 07 Investigative Uses of Technology: Devices,Tools, and Techniques NCJ 213030 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page ii David W. Hagy Acting Principal Deputy Director, National Institute of Justice This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable by law by any party in any matter civil or criminal. Photos used in this document are taken from public Web sites; they are in no way an endorse­ ment of the product illustrated. Opinions or points of view expressed in this document represent a consensus of the authors and do not necessarily reflect the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsements by the U.S. Department of Justice. This material should not be relied upon as legal advice. Those considering legal issues related to the use of high-tech materials should consult with their legal counsel. This document was prepared under Interagency Agreement #2003–IJ–R–029 between the National Institute of Justice and the National Institute of Standards and Technology, Office of Law Enforcement Standards. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance; the Bureau of Justice Statistics; the Community Capacity Development Office; the Office for Victims of Crime; the Office of Juvenile Justice and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART). 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page iii Technology Working Group for Investigative Uses of High Technology* Planning panel Phillip Osborn Senior Special Agent James R. Doyle National Program Manager First Group Associates Cyber Crimes Center (C3) New York, New York Bureau of Immigration and Customs Enforcement (ICE) Joseph Duke U.S. Department of Homeland Security Drive-Spies, LLC Fairfax, Virginia Clarkston, Michigan John Otero Barry Grundy Lieutenant Computer Crime Investigator/ Computer Crimes Squad Special Agent New York Police Department NASA Office of the Inspector General New York, New York Office of Investigations Computer Crimes Division David Poole Goddard Space Flight Center Chief Greenbelt, Maryland Information Operations and Investigations Air Force Office of Special Investigations Keith Hodges Andrews Air Force Base, Maryland Senior Instructor, Legal Division Federal Law Enforcement Training Center Michael Weil Glynco, Georgia Huron Consulting Group Chicago, Illinois Dan Mares President Mares and Company Technology working group Lawrenceville, Georgia members Mark J. Menz Todd Abbott M. J. Menz and Associates Vice President Folsom, California Corporate Information Security Bank of America Robert Morgester Charlotte, North Carolina Deputy Attorney General State of California Department of Justice Abigail Abraham Office of the Attorney General Assistant Attorney General Criminal Law Division Illinois Attorney General’s Office Sacramento, California Chicago, Illinois David Arnett Detective Arizona Department of Public Safety Phoenix, Arizona iii 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page iv Dave Ausdenmoore Don Flynn Detective Attorney Advisor Regional Electronics and Computer Department of Defense Investigation Section Cyber Crime Center Hamilton County Sheriff’s Office/ Linthicum, Maryland Cincinnati Police Department Cincinnati, Ohio G.D. Griffin Assistant Inspector in Charge Rick Ayers Digital Evidence Unit National Institute of Standards and U.S. Postal Inspection Service Technology Dulles, Virginia Gaithersburg, Maryland Amber Haqqani Ken Basore Director, Digital Evidence Director of Professional Services American Academy of Applied Forensics Guidance Software (EnCase) Central Piedmont Community College Reston, Virginia Charlotte, North Carolina David Benton Dave Heslep Chief Systems Engineer Sergeant Home Depot Technical Assistance Section Supervisor Atlanta, Georgia Maryland State Police Technical Investigation Division Walter E. Bruehs Columbia, Maryland Forensics Examiner Forensic Audio, Video and Imaging Chip Johnson Analysis Unit Lieutenant Federal Bureau of Investigation South Carolina Computer Crime Center Quantico, Virginia Columbia, South Carolina Carleton Bryant Nigel Jones Staff Attorney NSLEC Centre for National High Tech Knox County Sheriff’s Office Crime Training Knoxville, Tennessee Wyboston Lakes Business and Leisure Centre Scott Christensen Bedfordshire, England Sergeant Computer Crimes/ICDC Unit Keith Kelly Nebraska State Patrol Telecommunication Specialist Omaha, Nebraska Washington, D.C. Bill Crane Tom Kolpacki Assistant Director Detective National White Collar Crime Center Ann Arbor Police Fairmont, West Virginia Livonia, Michigan iv 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page v Al Lewis Henry (Dick) Reeve Special Agent General Counsel Investigator/DE Examiner Deputy District Attorney USSS Electronic Crimes Task Force Denver District Attorney’s Office Chicago, Illinois Denver, Colorado Glenn Lewis Jim Riccardi, Jr. Computer Training Specialist Electronic Crime Specialist Training Services CyberScience Lab SEARCH Group, Inc National Law Enforcement and Sacramento California Corrections Technology Center–Northeast Rome, New York Thomas Musheno Forensic Examiner Richard Salgado Forensic Audio, Video and Image Analysis Senior Counsel Federal Bureau of Investigation Computer Crime and Intellectual Engineering Research Facility Property Section Quantico, Virginia U.S. Department of Justice Washington, D.C. Larissa O’Brien Chief, Research and Development Chris Stippich Information Operations and Investigations President Air Force Office of Special Investigations Digital Intelligence, Inc. Andrews Air Force Base, Maryland Waukesha, Wisconsin Timothy O’Shea Assistant U.S. Attorney Facilitators Western District of Wisconsin Susan Ballou Senior Litigation Counsel Program Manager for Forensic Sciences Computer Crime and Office of Law Enforcement Standards Telecommunications Coordinator National Institute of Standards and Madison, Wisconsin Technology Gaithersburg, Maryland Thom Quinn Program Manager Anjali R. Swienton California Department of Justice President & CEO Advanced Training Center SciLawForensics, Ltd. Rancho Cordova, California Germantown, Maryland *This information reflects each panel member’s professional affiliation during the time that the majority of the technology working group’s work was performed. v 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page vii Contents Technology Working Group for Investigative Uses of High Technology. iii Introduction. 1 Chapter 1. Techniques . 3 Introduction . 3 Investigative assistance . 3 Information gathering . 3 Digital evidence. 6 Electronic communications . 8 Telecommunications . 11 Video surveillance . 12 Consensual monitoring . 13 Tracking . 13 Practical example. 14 Chapter 2. Tools and Devices . 21 Introduction . 21 Power concerns with battery-operated devices . 21 Access-control devices . 22 Answering machines and voice mail systems (digital and analog) . 24 Audio: Digital tools used to conduct examinations of audio formats . 26 Caller ID devices . 28 Cell phones . 30 Computers (desktops and laptops) . 34 Credit card fraud devices . 36 vii 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page viii SPECIAL REPORT / OCT. 07 Customer or user cards and devices. 38 Data preservation (duplicating, imaging, copying). 40 Detection and interception (wireless) . 44 Digital cameras and Web cameras . 46 Digital security cameras . 48 Encryption tools and passphrase protection . 50 Facsimile (fax) . 53 Global positioning system devices . 55 Home entertainment. 57 Internet tools. 59 Internet tools to identify users and Internet connections (investigative) . 61 Keystroke monitoring . 68 Mass media copiers and duplicators. 73 Pagers . 74 Pens and traps. 76 Personal digital assistants . 77 Removable storage media and players . 80 Sniffers . 84 Steganography . 86 Vehicle black boxes and navigation systems. 87 Video and digital image analysis tools. 89 Voice recorder (digital). 91 viii 01-Chap 1 InvestigTech 10/10/07 12:41 PM Page ix INVESTIGATIVE USES OF TECHNOLOGY: DEVICES, TOOLS, AND TECHNIQUES Chapter 3. Legal Issues for the Use of High Technology. 93 Introduction . 93 Constitutional issues . 93 Searches and seizures pursuant to warrants. 94 Warrantless searches . 96 Statutes that affect the seizure and search of electronic evidence. 98 Appendix A. Glossary . 107 Appendix B. Technical Resources List . 117 Appendix C. Hacked Devices . 131 Appendix D. Disclosure Rules of ECPA . 135 Appendix E. Sample Forms . 137 Appendix
Recommended publications
  • Case 2:18-Mj-00152-EFB Document 6 Filed 08/15/18 Page 1 of 32
    Case 2:18-mj-00152-EFB Document 6 Filed 08/15/18 Page 1 of 32 1 MCGREGOR W. SCOTT United States Attorney 2 AUDREY B. HEMESATH HEIKO P. COPPOLA 3 Assistant United States Attorneys 501 I Street, Suite 10-100 4 Sacramento, CA 95814 Telephone: (916) 554-2700 5 CHRISTOPHER J. SMITH 6 Acting Associate Director 7 JOHN D. RIESENBERG Trial Attorney 8 Office of International Affairs Criminal Division 9 U.S. Department of Justice 1301 New York Avenue NW 10 Washington, D.C. 20530 11 Telephone: (202) 514-0000 12 Attorneys for Plaintiff 13 United States of America 14 IN THE UNITED STATES DISTRICT COURT 15 EASTERN DISTRICT OF CALIFORNIA 16 17 IN THE MATTER OF 18 THE EXTRADITION OF OMAR AMEEN CASE NO. 2:18-MJ-0152 EFB 19 20 21 22 MEMORANDUM OF EXTRADITION LAW AND REQUEST 23 FOR DETENTION PENDING EXTRADITION PROCEEDINGS 24 25 26 27 28 Case 2:18-mj-00152-EFB Document 6 Filed 08/15/18 Page 2 of 32 1 TABLE OF CONTENTS Page 2 I. FACTUAL BACKGROUND ..........................................................................................................1 3 II. LEGAL FRAMEWORK OF EXTRADITION PROCEEDINGS ...................................................2 4 A. The limited role of the Court in extradition proceedings. ....................................................2 5 B. The Requirements for Certification .....................................................................................3 6 1. Authority Over the Proceedings ...........................................................................3 7 2. Jurisdiction Over the Fugitive ..............................................................................4
    [Show full text]
  • Instant Messaging: Keeping Your Child Safe and Secure
    Online Instant Messaging: Keeping Your Child Safe and Secure Presented by: Meredith Stannard, Nauset Regional High School [email protected] Barbara Dominic, Nauset Regional Middle School [email protected] Kathy Schrock, Nauset Public Schools [email protected] Spring 2003 1 Instant messages are lasting ©2001. USA Today. http://www.usatoday.com/tech/news/2001-06-21-teens-im-lasting.htm By Karen Thomas, USA TODAY Breaking up. Making up. Making plans. Asking out. Saying "hey." From the mundane to the emotionally charged, there are no limits to the ways today's kids connect and bond over instant messages (IMs) — those pop-up text windows used for carrying on real-time conversations online. "It's not just empty chatter. They're using (IMs) to have difficult conversations — someone's talking behind your back and you want to confront them," says Amanda Lenhart of the Pew Internet & American Life project. Its survey, out Thursday, finds that nearly three-fourths of online kids ages 12 to 17 rely on IMs to keep in touch with friends. Caroline Barker, 16, is among 35% of teens who use IMs daily; she chats with about 10 close friends and 50 acquaintances in the Bethesda, Md., area. "It's especially good for making plans, or if you're just bored," she says. "It's a given that everybody has it," adds her friend Valerie Hutchins, 15. These Maryland friends IM while doing homework, talking on the phone and watching TV. And they offer insight to the complex social rules that come with a form of communication that still has many adults bewildered.
    [Show full text]
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • Cybersecurity, IT-Aided Education, and Teles: Nexus, Vistas & Realities
    CYBERSECURITY, IT-AIDED EDUCATION, AND TELES: NEXUS, VISTAS & REALITIES Emmanuel C. Ogu* Department of Computer Science, [email protected] School of Computing and Engineer- ing Sciences, Babcock University, Ilishan-Remo, Ogun State, Nigeria. Chiemela Ogu EMINDA Konsults, Yaba, Lagos, [email protected] Nigeria. * Corresponding author ABSTRACT Background The current decade has witnessed rising spates of threats and attacks that have threatened the safety and security of cyberspace, thereby giving rise to contem- porary discourses pertaining the realities that these ominous trends portend for technology innovation and digitalisation, in the emerging global digital society. In the process, the technological capabilities that have been used to effectively harness the efficiency that this virtual space provides for contemporary educa- tion and learning have been defamed. Aim/Purpose This exploratory research interrogates the possible relationships between the contemporary concerns of global cyber security, and the realities and prospects of IAE and TeLEs, while elucidating the crucial factors that impose on such relationship(s). Methodology This research adopts the qualitative research methodology with an exploratory approach to interrogate the various contemporary concerns of global cyberse- curity as contained in existing literature, especially as it affects the proliferation and adoption of IT-aided education and Technology-enhanced Learning Envi- ronments (TeLEs); based on a systematic correlational analysis of key interpos- ing concepts. Contribution The research presents an overview of the current status and prospects of de- velopment of IAE and TeLEs, as well as the nature of the realities associated with contemporary concerns of global cybersecurity; then also discussing how these cybersecurity concerns impact on the wider adoption and implementation of IAE and TeLEs.
    [Show full text]
  • Roy Huggins Papers, 1948-2002
    http://oac.cdlib.org/findaid/ark:/13030/c8g15z7t No online items Roy Huggins Papers, 1948-2002 Finding aid prepared by Performing Arts Special Collections Staff; additions processed by Peggy Alexander; machine readable finding aid created by Caroline Cubé. UCLA Library Special Collections Room A1713, Charles E. Young Research Library Box 951575 Los Angeles, CA, 90095-1575 (310) 825-4988 [email protected] © 2012 The Regents of the University of California. All rights reserved. Roy Huggins Papers, 1948-2002 PASC 353 1 Title: Roy Huggins papers Collection number: PASC 353 Contributing Institution: UCLA Library Special Collections Language of Material: English Physical location: Stored off-site at SRLF. Advance notice is required for access to the collection. Please contact UCLA Library Special Collections for paging information. Physical Description: 20 linear ft.(58 boxes) Date: 1948-2002 Abstract: Papers belonging to the novelist, blacklisted film and television writer, producer and production manager, Roy Huggins. The collection is in the midst of being processed. The finding aid will be updated periodically. Creator: Huggins, Roy 1914-2002 Restrictions on Access Open for research. STORED OFF-SITE AT SRLF. Advance notice is required for access to the collection. Please contact UCLA Library Special Collections for paging information. Restrictions on Use and Reproduction Property rights to the physical object belong to the UC Regents. Literary rights, including copyright, are retained by the creators and their heirs. It is the responsibility of the researcher to determine who holds the copyright and pursue the copyright owner or his or her heir for permission to publish where The UC Regents do not hold the copyright.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Warrantless Workplace Searches of Government
    WARRANTLESS WORKPLACE within which the principles outlined in SEARCHES OF GOVERNMENT O’Connor for “workplace” searches by EMPLOYEES government supervisors can be understood and applied. In sum, when a government supervisor is considering the search of a Bryan R. Lemons government employee’s workspace, a two- Branch Chief part analysis can be utilized to simplify the process. First, determine whether the There are a variety of reasons why employee has a reasonable expectation of a government supervisor might wish to privacy in the area to be searched. If a search a government employee’s reasonable expectation of privacy does workplace. For example, a supervisor exist, then consider how that expectation might wish to conduct a search to locate a can be defeated.2 Before turning to those needed file or document; the supervisor issues, however, it is necessary to first might wish to search an employee’s define exactly what is meant by the term workplace to discover whether the “workplace.” employee is misusing government property, such as a government-owned DEFINING THE “WORKPLACE” computer; or, a supervisor might seek to search an employee’s workplace because “Workplace,” as used in this he has information that the employee is article, “includes those areas and items committing a crime, such as using the that are related to work and are generally Internet to download child pornography. within the employer’s control.”3 This would include such areas as offices, desks, In situations where a public filing cabinets, and computers. However, employer
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Steganography & Steganalysis
    June 6, 2003 Steganography & Steganalysis SpyHunter www.spy-hunter.com [email protected] 1 AgendaAgenda X Steganography – What is Steganography? – History – Steganography today – Steganography tools X Steganalysis – What is Steganalysis? – Identification of Steganographic files – Cracking Steganographic files – What’s in the future? 2 Steganography 3 SteganographySteganography -- DefinitionDefinition X Steganography – from the Greek word steganos meaning “covered” – and the Greek word graphie meaning “writing” X Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination X Anyone else viewing the message will fail to know it contains hidden/encrypted data 4 SteganographySteganography -- HistoryHistory X Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank. X Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. 5 SteganographySteganography X Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated. X Invisible Ink is also a form of steganography 6 SteganographySteganography X The U.S. government is concerned about the use of Steganography. X Common uses in include the disguising of corporate espionage. X It’s possible that terrorist cells may use it to secretly communicate information X It’s also a very good Anti-forensics mechanism to mitigate the effectiveness of a forensics investigation 7 SteganographySteganography Terror groups hide behind Web encryption By Jack Kelley, USA TODAY AP WASHINGTON — Hidden in the X-rated pictures on several pornographic Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies.
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]