Data networked privacy tool

The ever growing popularity of the Social Network Platforms have made them a prime source of information exchange. They provide an individual the liberty of sharing his/her idea to a greater mass without the fear of being policed. This also makes these platforms a key stage for terrorist organizations for the initiation of propaganda and for recruitment of vulnerable individuals. The vast use of these platforms by terrorist organizations has brought key interest of Law Enforcement Agencies (LEA) for the identification and tracking of these organizations.
Social Network Platforms have no bounds, this thus makes the job of the LEAs difficult who have to abide by the laws of their own territory when charging an individual or a group of people with a crime. Therefore, when dealing with terrorist organizations working through social network platforms, it is necessary to exchange intelligence information with other LEAs located at a different geographical location. The uncertainty of who might actually be behind a social network profile and due to the political concerns of each country, sharing intelligence information is not a preferable option with most LEAs. In order to overcome this barrier, an Data networked privacy tool (that will be named in this deliverable Inter LEA data exchange tool considering the main functionality deserved) is formulated.
This report, which is submitted as a part deliverable of WP5, D5.3 (Data networked privacy tool) explains in detail how the tool is developed in the RED-Alert project that allows different LEAs to search social network data in each other’s domain without violating user data/identity privacy. It provides LEAs located in different geographical location a way to share desired information without sharing their whole datasets. This Inter-LEA tool is made possible with the help of a public Key Encryption with Keyword Searching (PEKS) algorithm, which creates a double sided blinded process of encryption and search. The searching party does not know what exact entries are there except from getting a true or false for their own search and the data owner does not know what exactly is being searched. The report also explains in detail how it can be used with help of screenshots.