Saturday, November 28, 2009

Forensic Investigation of the Internet and Mobile Systems -- Last Lecture in the Fall 2009 Series in Operations Research

We are delighted that Dr. Brian Levine of the UMass Amherst Computer Science Department will be delivering his lecture, Forensic Investigation of the Internet and Mobile Systems, this coming Friday at the Isenberg School of Management. With this lecture we conclude our 2009 Fall Speaker Series in Operations Research / Management Science.

We have a terrific lineup for Spring 2010 and I hope that many of you will be able to join us. The announcement will be out soon.

Below is the announcement on Professor Levine's talk that was prepared by the award-winning UMass Amherst INFORMS Student Chapter that I serve as the Faculty Advisor of.

******************************************************************************

The last INFORMS Speaker Seminar of the Fall 2009 semester is scheduled for the next Friday, December 4, 2009. We are delighted to have Professor Brian Levine, Department of Computer Science, University of Massachusetts Amherst, who will speak on "Forensic Investigation of the Internet and Mobile Systems."

Dr. Levine joined the UMass Computer Science faculty in Fall 1999 and is currently an associate professor. His research focuses on mobile networks, privacy and forensics, and the Internet, and he has published more than 60 papers on these topics. Much of his work is based experiments using a unique mobile network testbed, DieselNet, which is comprised of computer-equipped PVTA buses and a network of mesh APs in downtown Amherst. Brian's active funding
includes awards from the National Science Foundation NETS, GENI, Trustworthy Computing, and SFS programs, DARPA's Disruption Tolerant Networking program, and the National Institute of Justice's Electronic Crime program. He received a CAREER award in 2002 for work in peer-to-peer networking, one of NSF's most prestigious awards for new faculty. He was a UMass Lilly Teaching Fellow in 2003 and was awarded his college's Outstanding Teacher Award in 2007. In 2008, he received the Alumni Award for Excellence in Science & Technology from his undergraduate alma mater, the State University of New York at Albany. He has served as an associate editor of IEEE/ACM Transactions on Networking since 2005, and is the co-founder of the ACM Northeast Digital Forensics Exchange Workshop.

He received his PhD in Computer Engineering from the University of California, Santa Cruz in 1999.

TITLE: Forensic Investigation of the Internet and Mobile Systems

Abstract: The strong impact of computing has revolutionized certain types of crime. Dissemination of data to peers is efficient because of the Internet, and criminals have de facto anonymity from exploiting open wireless access points. Mobile devices are extending the reach and character of the Internet and its relevance to crime. Fortunately, the use or even possession of computers by those that commit many crimes will typically result in digital evidence, and
investigations of murder, contraband trafficking, identity and intellectual property theft, fraud, and espionage have shown.

In this talk, I review our current research projects in digital forensics that seek to address investigation of these crimes or other violations. First, I will focus on the wired Internet and our work investigating peer-to-peer file sharing networks, which support trafficking in contraband and the exploitation of children. The problem faced in these investigations is not discovering those who commit such crimes. The tools we have developed for P2P investigations are in
everyday use by MA and PA State Police and has resulted in evidence of tens of thousands of users sharing such data. The challenge for investigators is instead deciding which of these myriad leads to follow up on next. P2P networks should be viewed as a massive data set representing the dynamic exchange of resources between users. And the most productive next investigation is the user that is selected based on an analysis past network activity. For example, who is often
source of new content on the network? Who is a trove of existing data? Ideally, these network characteristics can be linked to real criminological behaviors.

Date: Friday, December 4, 2009
Time: 11:00AM - Noon
Place: Room ISOM 112

The Announcement for this talk can be found at:
http://supernet.som.umass.edu/informs/speakernew.html

INFORMS Student Chapter website:
http://student.som.umass.edu/informs/

UMASS Amherst Student Chapter of INFORMS