The National Trial Lawyers - Top 100 trial lawyers
Avvo Ratting
Super Lawyers Badge

Law Enforcement – “There’s an App for That.” Criminal Investigations Over the Internet Peer-to-peer (P2P) Networks

The Frey Law Firm, LLC Team

Our reliance upon technology is nothing new, but in recent years our use of technology seems to be escalating in all aspects of life. For many, simply driving without GPS or going a day without accessing the internet is unbearable. Ideally, the use of technology improves our quality of life in some fashion. Oftentimes, it allows us to operate in a more efficient and effective manner. It should come as no surprise then that the government has increasingly turned to technology to assist with investigations, especially those conducted on the Internet. In some cases, investigations previously conducted by law enforcement officers have been automated. In these instances, the software itself conducts the investigation and simply reports its findings to the officer.

<h3>Investigations of Peer-to-Peer (P2P) Networks</h3>
A prime example of law enforcement’s increased reliance upon technology is the utilization of software that purportedly investigates computers that access peer-to-peer (P2P) networks. The F.B.I. website explains the operation of P2P networks as follows:

Peer-to-Peer networks allow users connected to the Internet to link their computers with other computers around the world. These networks are established for the purpose of sharing files. Typically, users of Peer-to-Peer networks install free software on their computers which allows them (1) to find and download files located on another Peer-to-Peer user’s hard drive, and (2) to share with those other users files located on their own computer. Unfortunately, sometimes these information-sharing systems have been used to engage in illegal activity. – Risks of Peer-to-Peer Systems – accessed, February 9, 2011.

The F.B.I. websitenotes that the most common crimes associated with P2P networks include:

  • Copyright Infringement
  • Child Exploitation
  • Obscenity
  • Computer Hacking

Id. With regard to investigations on P2P networks, law enforcement officers traditionally manually accessed the P2P networks, by way of publicly available software, and searched the shared folders of other users on the P2P network for items that constitute contraband. In other words, law enforcement would search out contraband that was purportedly in “plain-view” and being offered for download by a user of the P2P network. Once the officer located contraband, it could then be downloaded and preserved as evidence. Further, the investigator could identify the Internet Protocol (IP) address of the computer offering the contraband. Finally, the investigator would identify the digital signature of the file itself. This digital signature is commonly referred to as the file’s SHA-1 value. SHA-1 or Secure Hash Algorithm Version 1, is often described within law enforcement affidavits as a file encryption method that can be used to produce a unique digital signature for an individual file, regardless of the name a user may choose for a file. In essence, it enables the P2P software to identify files in order to facilitate the transfer of files over the network.

Law enforcement relies upon the SHA-1 values in order to identify files that have been previously confirmed to constitute contraband. For instance, a digital image that depicts child sexual exploitation could theoretically be identified by its SHA-1 value, regardless of the file name a user might assign to the digital image and regardless of whether the officer actually downloaded or viewed the image. A comparison between the SHA-1 value of known contraband to the SHA-1 value of the file being offered by a network user can lead an investigator to conclude that contraband is being offered by the particular user.

Once the investigator identifies the suspected contraband, either by downloading and viewing it, or by comparing the SHA-1 value of the digital file to known contraband values, the officer can then observe the IP address of the computer that offered the contraband for download. Thereafter, the internet service provider (ISP) associated with that particular IP address is issued a Subpoena for the identification and address of the subscriber for that particular IP address. With these results, the investigator can apply for a search warrant to enter and search the residence associated with the IP address that was offering contraband.

<h3>Peer Spectre Software</h3>
In 2008, a software application known as “Peer Spectre” was released and has been utilized by law enforcement agencies throughout the United States and the world. According to government affidavits, Peer Spectre is an automated system that reads the publicly available advertisements from computers that are identifying contraband available for distribution in a consistent and reliable manner. Further, law enforcement claims that the software reports the time, date, SHA-1 value and file name in the same way every time. In essence, it is claimed that Peer Spectre automates the search process, but conducts and reports the investigation in the same manner that had previously been done by individual investigators. Finally, law enforcement claims that the software does not search beyond the file folders that are exposed to the other network users and limits its search to the files that are located in plain-view.

Legal Considerations

When the government utilizes software to conduct searches over the internet, without a warrant, it is important to consider whether those searches are, in fact, limited to files that are in plain-view. The government bears the burden of proving an exception to the search warrant requirement. State v. Mays, 161 Ohio App,3d 175 (8th Dist. 2005). Where there is no search warrant, the burden falls on the State to show that a search comes within one of the judicially recognized exceptions, including but not limited to, the plain-view doctrine. State v. Akron Airport Post No. 8975, 19 Ohio St.3d 49 (Ohio 1985).

Under the plain-view exception, three (3) requirements must be satisfied: the officer’s intrusion into the location where the evidence is located must be lawful, the discovery of the evidence must be inadvertent, and the incriminating nature of the evidence must be immediately apparent. Texas v. Brown, 460 U.S. 730, 739 (1983). When the government relies upon software to conduct warrantless investigations on the internet, but does not have access to the source code and is thereby unable to authenticate the function of the software application, it is difficult to imagine how the government could meet its burden of proving that the software limited its search to files that are in plain-view. Further, there are no independent studies available, nor have any defense experts been granted access to the software for testing of the source code for analysis. Finally, the reliability of the software cannot be readily determined without the source code and without testing.

Defense Strategies and Considerations

When confronted with a new software application that is utilized in an investigation, it may be useful to explore the following questions:

Who developed the software and what are the developer’s qualifications?
Who owns the software?
Does the government have access to the source code?
Can a defense expert conduct an independent analysis of the software?
What training have the investigators received with regard to the software?
Are there any independent or peer review studies on the software?
Is the software reliable? If so, how was that conclusion reached?
Who can authenticate the functionality and reliability of the software?
Are there any guides or manuals for the software and can they be obtained?
What does the software really do and how do we know?
Technology is advancing at an ever-increasing pace. There is no reason to expect that the government will not continue to adopt new technology and software for use by law enforcement. Those who take up the defense of citizens charged with crimes must remain vigilant in exploring all aspects the government’s investigation, including a thorough review of the technology and software employed.

To learn more about your legal options, contact our firm today!

Client Reviews

Ron was reliably reachable and knowledgeable about the intricacies of the legal ramifications in my case. This was a criminal defense case for possession of child...

Posted by John

Mr. Frey started work on my son’s suspension case immediately after contacting him. He quickly made me aware of the various documents I needed to gather in support of the...

Posted by Michael

I can’t imagine a better experience working with Ron. He is informed, persistent, and incredibly responsive. I required his assistance in getting two convictions...

Posted by Criminal Defense Client

I hired Ron to represent my son who was charged with a serious federal crime. Due to the nature and seriousness of the charge, I needed absolute confidence in my son’s...

Posted by Federal Crime Client

Mr. Frey is an excellent attorney! Not only is he extremely knowledgable, Mr. Frey was very responsive and attentive to all of my questions and explained everything so...

Posted on

Ron Frey is not just an attorney, but he became an integral extension of our family this past year. As we prayerfully searched for an attorney, on a Sunday afternoon, he...

Posted on

I hired Ron back in April of 2016 as I had two felony charges hanging over my head. I called him around 5 pm and he called me back around 5:30 pm and we met in person the...

Posted by a client

My case was unique, and difficult. It was from 36 years ago, when I was 22 years of age. I had just moved to Cleveland, Ohio and I unfortunately found myself in the wrong...

Posted on

I did not know what to look for in a defense attorney, but based on the first two meetings, Mr. Frey was honest in his communication, and very direct about the process...

Posted by Criminal Defense Client

Mr. Frey promptly started work on my case after my initial contact on the phone (August 2009). He was thoroughly prepared and professional throughout my entire case at...

Posted by a client

Attorney Ron Frey is great, very informative and he certainly knows his stuff. I called to ask for advice and he made me realize that I needed a lawyer for sure. He...

Posted on

I hired Ron a year ago and he immediately worked so hard on my case. He showed compassion and understood that my “offense” was nothing but misunderstanding gone horribly...

Posted by previous client

Ron helped my son a couple times and I am extremely happy at how Ron moved forward with the cases and kept us informed all the way throughout the process. If my son or...

Posted by Ralph

Ronald Frey is an excellent lawyer and I would highly recommend him to someone in need of his skills. In his specialty area, Ron knows the law completely, and has the...

Posted on

Mr. Frey did an amazing job! I couldn’t have asked for a better attorney. At one of the lowest points in my life, Ron was there for me. He did such a terrific job. I...

Posted by a client

Mr. Frey’s intelligence and expertise proved to provide me with the best legal representation. Without his guidance and defense, I would not have an successful outcome…

Posted on

Get in Touch

  1. 1 Free Consultation
  2. 2 Available 24/7
  3. 3 We Fight for You!
Fill out the contact form or call us at (844) 766-3739 to schedule your free consultation.

Leave Us a Message