Reliability of Lime...
 
Notifications
Clear all

Reliability of Limewire as a forensic software

16 Posts
8 Users
0 Reactions
2,021 Views
(@rche001)
Active Member
Joined: 14 years ago
Posts: 7
Topic starter  

Hi guys.

I was wondering if someone expert in this field would be able to answer two questions regarding Limewire data acquisition.

There is a suspect that someone might have downloaded illicit videos or images through limewire. Unfortunatly none of this material was found when the computer was seized. Apparently the material was stored on an external drive but it was never found.

So my questions are

a) Is limewire a valid forensic tool do determine that the user actually downloaded and viewed the illicit material (based on the sha1 values left by limewire traces) ?

b) Are the sha1 values created by limewire regarded as solid evidence, or can these values be modified or created without actually downloading any files?

Waiting for your reply…


   
Quote
keydet89
(@keydet89)
Famed Member
Joined: 21 years ago
Posts: 3568
 

a) Is limewire a valid forensic tool do determine that the user actually downloaded and viewed the illicit material (based on the sha1 values left by limewire traces) ?

If you're interested in whether the user viewed the material, why not check things like viewer MRU lists, RecentDocs key entries, etc? If the user double-clicked the file to view it, you can expect to find a shortcut/.lnk file. If the OS you're examining is Windows 7, you may even find a Jump List entry.

b) Are the sha1 values created by limewire regarded as solid evidence, or can these values be modified or created without actually downloading any files?

Any "evidence" in isolation is suspect, in part because its without any context. Always look for supporting, corroborating data.


   
ReplyQuote
(@atheriot)
Active Member
Joined: 15 years ago
Posts: 6
 

In addition to what keydet89 said, according to the paper listed below, a presence of a file in the "Incomplete" folder with the with a prefix of "Preview-T-" is an indicator that the user previewed the file.

See http//www.dfrws.org/2008/proceedings/p96-lewthwaite.pdf


   
ReplyQuote
(@rche001)
Active Member
Joined: 14 years ago
Posts: 7
Topic starter  

Unfortunatly, even the incomplete folder was not found. It must be on the external drive. But atheriot, your point is very noteworthy.

In addition to what keydet89 said, according to the paper listed below, a presence of a file in the "Incomplete" folder with the with a prefix of "Preview-T-" is an indicator that the user previewed the file.

See http//www.dfrws.org/2008/proceedings/p96-lewthwaite.pdf


   
ReplyQuote
(@forensicakb)
Reputable Member
Joined: 16 years ago
Posts: 316
 

I'd be really careful saying that preview-t is an indicator that the user previewed the file. I would reword that saying it's a possible indicator.

In addition to what keydet89 said, according to the paper listed below, a presence of a file in the "Incomplete" folder with the with a prefix of "Preview-T-" is an indicator that the user previewed the file.

See http//www.dfrws.org/2008/proceedings/p96-lewthwaite.pdf


   
ReplyQuote
(@atheriot)
Active Member
Joined: 15 years ago
Posts: 6
 

I'd be really careful saying that preview-t is an indicator that the user previewed the file. I would reword that saying it's a possible indicator.

In addition to what keydet89 said, according to the paper listed below, a presence of a file in the "Incomplete" folder with the with a prefix of "Preview-T-" is an indicator that the user previewed the file.

See http//www.dfrws.org/2008/proceedings/p96-lewthwaite.pdf

I was quoting the paper referenced. If I reword it, I would not be quoting the paper correctly. See paragraph 2.2 in the paper referenced.


   
ReplyQuote
(@rche001)
Active Member
Joined: 14 years ago
Posts: 7
Topic starter  

Thanks guys for your interest.

To summerize, there are a number of shortcuts (.lnk)

and

sha1 values, loacations, dates and keywords used from the examination of the limewire application files.

Doubt we can proceed with possession of illicit material since the incomplete and saved folders were not found.

Maybe we can try to proof that the user accessed the illicit material using the sha1 values found (but I cannot verify if these are real sha1 or not)

comments welcome…


   
ReplyQuote
(@dan0841)
Trusted Member
Joined: 17 years ago
Posts: 91
 

Thanks guys for your interest.

To summerize, we have a number of shortcuts (.lnk)

and

sha1 values, loacations, dates and keywords used from the examination of the limewire application files.

Doubt we can proceed with possession of illicit material since the incomplete and saved folders were not found.

Maybe we can try to proof that the user accessed the illicit material using the sha1 values found (but I cannot verify if these are real sha1 or not)

comments welcome…

What sort of "illicit material" are we talking about? Sus Indecent Images? Sus Extreme Pornography? Or is it other material? What offences are you looking at?

If it is the IIOC then you cannot charge for 'possession' under UK legislation if you have not found images in an 'accessible' location.


   
ReplyQuote
(@rche001)
Active Member
Joined: 14 years ago
Posts: 7
Topic starter  

Thanks guys for your interest.

To summerize, we have a number of shortcuts (.lnk)

and

sha1 values, loacations, dates and keywords used from the examination of the limewire application files.

Doubt we can proceed with possession of illicit material since the incomplete and saved folders were not found.

Maybe we can try to proof that the user accessed the illicit material using the sha1 values found (but I cannot verify if these are real sha1 or not)

comments welcome…

What sort of "illicit material" are we talking about? Sus Indecent Images? Sus Extreme Pornography? Or is it other material? What offences are you looking at?

If it is the IIOC then you cannot charge for 'possession' under UK legislation if you have not found images in an 'accessible' location.

Filenames suggest illegal pornography of persons under the age of 18.


   
ReplyQuote
(@dan0841)
Trusted Member
Joined: 17 years ago
Posts: 91
 

OK. You're prob aware of most of this but here goes…

1) The filenames in Limewire are usually very misleading and can't be relied upon at all to reflect the content. Many of the filenames will suggest IIOC (Indecent Images of Children), pornography etc, but the file's content will be very different (Many are malware).

In relation to some of your original questions….

"Doubt we can proceed with possession of illicit material since the incomplete and saved folders were not found. "

2) If there are no images, there can be no possession.

“a) Is limewire a valid forensic tool do determine that the user actually downloaded and viewed the illicit material (based on the sha1 values left by limewire traces) ?”

3) Limewire evidence could support a ‘Possession’ charge IF you had found images in an area accessible to a user. Even if the IIOC were in unallocated or thumbcache they would not be suitable for a ‘Possession’ charge. For example, a Limewire user could have done a mass download of files whilst looking for legal adult pornography. The user could have then viewed the material and deleted all of the images after being horrified. From an evidential point of view – There may be LNK files, Limewire evidence and IIOC in unallocated. However, the user was not in ‘Possession’ of the images because they had deleted them immediately.

Additionally a ‘Making’ charge would not be likely unless you have found specific evidence that IIOC had been searched for, requested etc.
See this guidance for law / case law relating to IIOC in the UK.
http//www.cps.gov.uk/legal/h_to_k/indecent_photographs_of_children/

“Maybe we can try to proof that the user accessed the illicit material using the sha1 values found (but I cannot verify if these are real sha1 or not)”

To do this you would need to match the SHA1 to a Known IIOC. Again – the user may have accessed an image and the poor user may have been distraught after seeing shocking child abuse for the first time. I.e This evidence by itself is NOT proof of an offence.

Hope this helps a little.


   
ReplyQuote
Page 1 / 2
Share: