Retsudvalget 2015-16
REU Alm.del Bilag 82
Offentligt
1576161_0001.png
Synopsis:
Model on how to remove criminal material from the internet
and avoid major society threatening hacker attacks.
* Childporn, bomb manuals, hacker attack etc
Criteria of success:
Low cost.
Efficiency
Method of implementation: Organic
Easy to maintain and control
Society threats from BOT’s and hackers can fast be
stopped
Jørgen Larsen
Nattergalvej 13 st th
8900 Randers
Denmark
Mobile:
+45 29 82 43 97
E-mail:
[email protected]
REU, Alm.del - 2015-16 - Bilag 82: Henvendelse af 23/10 og 15/11-15 fra Jørgen Larsen vedr. fjernelse af ulovligt materiale på nettet.
Foreword:
The fight against childporn, copyrights infringement and other illigal material can soon be lost if no
action are taken soon in order to gain control over the internet.
The nature of the internet is changing from STAR to MESH and POINT TO POINT.
Source:
http://en.wikipedia.org/wiki/Network_topology
Above makes it more or less impossible to control the flow on the internet. As central control /
surveillance is futile.
Threats:
The task of surveillance is further made harder caused be encryption:
T.ex. Uses SKYPE AES encoding.
Source:
http://en.wikipedia.org/wiki/Skype_security
TOR
Source:
http://en.wikipedia.org/wiki/Tor_(anonymity_network)
Change of identity:
Vidalia (Changing identity to a TOR exit node)
Source:
http://en.wikipedia.org/wiki/Vidalia_project
REU, Alm.del - 2015-16 - Bilag 82: Henvendelse af 23/10 og 15/11-15 fra Jørgen Larsen vedr. fjernelse af ulovligt materiale på nettet.
What to do ?
Controlling illigal material ”on the fly” is impossible caused by encryption. Further it is not possible
to gain control caused by network topology.
The ONLY weak spot is on the local PC. When material are decrypted.
All files does have a fingerprint.
Source:
http://en.wikipedia.org/wiki/Public_key_fingerprint
Illigal KNOWN material can be distinguished by a small amount of data. Fingerprints.
All fingprints of illiagal material shall be collected in an EU database controlled by Europol.
SO....
Now we can use conventional EXISTING technology...
The antivirus programmes which ALL computer are using. One version or another. Common for
ALL virus programms are they are using fingerprints as described above.
My idea is based on:
1. EU legislation specifying that Europol are keeping and maintaining a database for
fingerprints.
2. Al virusprogrammes SHALL – by EU law - use the database of fingerprints specified
by Europol.
3. Caused by the vast number of fingerprints to be checked statitical methods shall
be developed for proper coverage.
4. Action to be taken upon found illigal material shall be stated by EU legislation.
5. Defining severity of the – electronic - criminal act(s) to be defined by EU.
Benefit from above:
1.
2.
3.
4.
5.
6.
Effenciency
Distributed load of the task doing the actual check(s)
Easy to maintain and develop.
Organic growth
Cost are spread organically to end users.
Only cost are Europols central database.
REU, Alm.del - 2015-16 - Bilag 82: Henvendelse af 23/10 og 15/11-15 fra Jørgen Larsen vedr. fjernelse af ulovligt materiale på nettet.
1576161_0004.png