• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

A machine learning-based approach to analyzing and triaging encrypted data containers in law enforcement applications

Summary

Online sexual exploitation and abuse of children is a problem growing exponentially in the U.S. DHS requires improved digital forensic and investigative capabilities in cases that involve child exploitation and abuse materials. This project will provide a machine learning model for detecting, analyzing, and triaging encrypted data containers, without the need to first decrypt the content, allowing law enforcement agencies to build probable cause for a court order, facilitating investigation of child sexual abuse materials (CSAM).

 

Problem addressed

Existing technical approaches for detection of CSAM generally focus on the detection and recognition of individual objects. However, such an approach is ineffective when dealing with encrypted data. This reinforces the importance of designing systems that can be used to analyze and triage encrypted data containers. Despite recent advances in artificial intelligence research, there have only been limited attempts to explore the use of machine or deep learning in the detection of file(s) of interest contained in an encrypted container, for example, based on the encryption pattern of a particular file type. This research seeks to improve investigative capability in cases involving CSAM, by providing DHS and other law enforcement agencies with a machine learning model for detecting, analyzing, and triaging encrypted data containers, without the need to first decrypt the content, to build probable cause for a court order to unlock the device.

 

Approach

The machine learning model will utilize deep neural fuzzy classification techniques that provide a certainty rate for similarities between contents, based on their file types. Such a model will facilitate the investigation of CSAM, and is designed to complement existing systems such as Microsoft’s PhotoDNA and the Child Exploitation Tracking System.

 

Anticipated Impact for DHS

The Riley v. California case, and many other cases that may have gone unreported, reinforce the importance of designing technical solutions to detect, analyze and triage encrypted data containers to build probable cause without the need to first decrypt the content. When the probable cause has been established, enforcement agencies can then either apply for a court order to unlock the device or conduct an electronic device search. The research team will provide the law enforcement community and other relevant stakeholder groups with a deployable system that can be used immediately to supplement law enforcement and other relevant efforts.

Topics:

  • Forensic Investigations
  • Innovation and Technology

Research Areas:

  • Criminal investigative processes
  • Digital evidence
  • Digital forensics

Investigators

  • Kim-Kwang Raymond Choo, Ph.D.

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube