Managed Attribution and the War On Child Porn

How Agencies Execute Successful Sting Operations by Creating and Maintaining a Technical Footprint Consistent with their Cover Stories.

The borderless, anonymous nature of the internet has allowed purveyors of child pornography to thrive not only in the United States but across the globe. Finding the individuals who provide access to sexually explicit material about children and those who consume it has become increasingly difficult. Predators and providers have more knowledge and tools at their disposal today, making it harder to track down and identify them for prosecution.

The Challenge: Investigating and Trapping Child Pornographers

Investigating child porn online requires complete obfuscation of the investigator’s identity and location. Any hint that inquiries or web browsing originates with law enforcement will tip off perpetrators that they are being watched, compromising the investigation.

Not only do investigators need to cloak their true identity and location, but they also need to create a technical footprint consistent with their cover story. An investigator seated in Virginia cannot set up a successful sting operation in Detroit if it is obvious from his digital footprint that he is working from afar.

Traditionally, this type of persona management has been done using proxy servers, either through third parties or agencies that set up and manage their own proxies. However, these solutions have their drawbacks. They can be expensive to maintain, slow to set up and move, and unless properly configured they can be spotted by the targets who relocate their operations if they sense they are being watched.

The Solution: Fast, Flexible Same Day Sacrificial Nodes

Telos Ghost’s managed attribution solution offers a unique way for investigators to quickly create and maintain a technical footprint consistent with their cover scenario.

Advantages of Telos Ghost Managed Attribution:

  1. Fast. Same-day setup of sacrificial nodes allows investigators to get on top of a hot situation quickly.
  2. Flexible. Need to be in multiple cities quickly? Cast a broad net with our worldwide distributed network. Appear to be who and where you say you are.
  3. Untraceable. We provide complete isolation from agency or organizational networks.

Investigators do not have time to waste setting up and managing proxy servers that can tip off perpetrators before they are caught. Telos Ghost provides the speed, flexibility, and anonymity agencies and organizations dedicated to fighting online criminals like purveyors and consumers of child pornography need. View additional Telos Ghost case studies for more ways our solutions can be used to fight cybercrime.

Want to know who uses Telos Ghost’s Managed Attribution and how it has helped their investigations? We do not share our customers identities in the public domain but if your organization meets certain requirements we can share information about this use case and others. To learn more, please contact us about a demo or trial at 800-708-3567.