With the Federal Bureau of Investigations (FBI) treating successful cyber attacks by "Operation Payback" as criminal offenses, a new level of ambiguity is being introduced into the enforcement of cyber crime laws.

 

The FBI was treating efforts by "Anonymous" and "4chan" as an "unauthorized and knowing transmission of code or commands resulting in intentional damage to a protected computer system," according to a search warrant affidavit published online Thursday.

Not all distributed denial of service (DDoS) efforts are a crime. This is especially true when systems within the networks staging the attack are placed there voluntarily by their users, with thousands of willing individuals simply flooding a server by asking it to do what it's designed for: loading pages.

Botnets of this nature have been compared to cyber "sit-ins": a computer-age echo of civil rights-era protests.

However, a newly discovered software exploit in peer-to-peer file sharing networks could allow a single individual, instead of many, the ability to bring down massive Internet operations by marshaling hundreds of thousands of other systems through "BitTorrent" trickery.


On "BitTorrent" networks, swarms of users all share portions of a single file, trading tiny pieces between their computers until each individual client has the complete download.

Millions of people engage in these networks every day, sharing everything from the perfectly legal to the legally ambiguous. Massive quantities of copyrighted material trade hands between users of "BitTorrent" networks regularly, but not much can be done to shut them down since many torrent files do not require a centralized tracker or host.

It is within these tracker-less torrent files that a major attack can be staged, according to a recent chat held by the Chaos Communications Congress, an annual conference of hackers now in its 27th year.

With a tracker-less torrent and a single "malicious node," "anyone with a moderate bandwidth connection can induce DDoS attacks with the BitTorrent cloud," the lecture page summarized.

A Chaos Congress presenter under the name "Astro" demonstrated how that entire network's bandwidth can quickly become marshaled to attack a single domain.

"For example, one could tell tens of thousands of users that an HD version of Inception is available at an address that really is the web server of a corporation," technology publication Gigaom noted. "All of these users would immediately try to download the file under that address, bombarding the server with requests and possibly taking it down in the process."


And it's not just a single deceptive torrent file that can lead such an attack: according to TorrentFreak, this new method can utilize existing torrents already sharing information by hundreds of thousands of people.

Views: 72

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone favorited cheeki kea's photo
yesterday
Doc Vega's 9 blog posts were featured
yesterday
Less Prone commented on Doc Vega's blog post Modern Day Cannibalism?
"You may be consuming human tissue unknowingly in vaccines, food or drink. One of the cruellest…"
yesterday
Less Prone favorited Doc Vega's blog post Modern Day Cannibalism?
yesterday
Less Prone favorited Doc Vega's blog post Death Threats for Assisting ICE?
yesterday
Less Prone commented on Doc Vega's blog post Death Threats for Assisting ICE?
"Democrats pretend to be icons of democracy, but what kind of rule do they have in mind? When they…"
yesterday
Less Prone commented on Doc Vega's blog post GROK Acknowledges the Co-existence of Humans and Dinosaurs
yesterday
omegamann posted photos
yesterday
Less Prone favorited Doc Vega's blog post GROK Acknowledges the Co-existence of Humans and Dinosaurs
yesterday
Less Prone commented on Doc Vega's blog post GROK Acknowledges the Co-existence of Humans and Dinosaurs
"I got some "proof" for you. An early prehistoric cave painting documented on a runestone."
yesterday
Less Prone favorited Doc Vega's blog post In the Political Realm They've Gone One Step Too Far!
yesterday
Less Prone commented on Burbia's video
Thumbnail

All In The Family | Mike Meets Archie For The First Time | The Norman Lear Effect

"Television programs have come down a lot in quality since those days. "
yesterday
Doc Vega posted a blog post

In the Political Realm They've Gone One Step Too Far!

I'm Your Host here on a completely new program. We call it One Step Too Far! Join us now for some…See More
Tuesday
Doc Vega posted photos
Tuesday
Doc Vega commented on Burbia's video
Thumbnail

All In The Family | Mike Meets Archie For The First Time | The Norman Lear Effect

"Wow almost as brainless as entitled as the college dolts who argued with Charlie Kirk before his…"
Tuesday
Less Prone commented on Burbia's video
Tuesday
Less Prone favorited Burbia's video
Tuesday
Less Prone posted a video

America Copied Germany’s Jerry Can — But Missed The One Genius Detail that Made All the Difference

America Copied Germany’s WWII Jerry Can — But Missed The One Genuis Detail that Made All the DifferenceIn World War II, Allied armies were losing up to half ...
Tuesday
Less Prone favorited Burbia's photo
Monday
Burbia posted a photo
Sunday

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted