This paper describes a novel tool for remotely "fingerprinting" computers used in criminal activity. The tool employs network scanning and machine identification techniques to acquire a fingerprint of a computer over the Internet. The fingerprint includes identifying information about the operating system, banners, enumerations and services. Once the computer is seized, it is connected to a closed network and scanned again to produce a second fingerprint to check against the original. Two scenarios - one related to investigating pedophiles and the other involving an illegal website - are examined. Legal issues pertaining to the use of computer fingerprinting in criminal investigations are also discussed. © 2004 by International Federation for Information Processing.
CITATION STYLE
Novotny, J., Schulte, D., Manes, G., & Shenoi, S. (2004). Remote computer fingerprinting for cyber crime investigations. In IFIP Advances in Information and Communication Technology (Vol. 142, pp. 3–15). Springer New York LLC. https://doi.org/10.1007/1-4020-8070-0_1
Mendeley helps you to discover research relevant for your work.