With the Federal Bureau of Investigations (FBI) treating successful cyber attacks by "Operation Payback" as criminal offenses, a new level of ambiguity is being introduced into the enforcement of cyber crime laws.

 

The FBI was treating efforts by "Anonymous" and "4chan" as an "unauthorized and knowing transmission of code or commands resulting in intentional damage to a protected computer system," according to a search warrant affidavit published online Thursday.

Not all distributed denial of service (DDoS) efforts are a crime. This is especially true when systems within the networks staging the attack are placed there voluntarily by their users, with thousands of willing individuals simply flooding a server by asking it to do what it's designed for: loading pages.

Botnets of this nature have been compared to cyber "sit-ins": a computer-age echo of civil rights-era protests.

However, a newly discovered software exploit in peer-to-peer file sharing networks could allow a single individual, instead of many, the ability to bring down massive Internet operations by marshaling hundreds of thousands of other systems through "BitTorrent" trickery.


On "BitTorrent" networks, swarms of users all share portions of a single file, trading tiny pieces between their computers until each individual client has the complete download.

Millions of people engage in these networks every day, sharing everything from the perfectly legal to the legally ambiguous. Massive quantities of copyrighted material trade hands between users of "BitTorrent" networks regularly, but not much can be done to shut them down since many torrent files do not require a centralized tracker or host.

It is within these tracker-less torrent files that a major attack can be staged, according to a recent chat held by the Chaos Communications Congress, an annual conference of hackers now in its 27th year.

With a tracker-less torrent and a single "malicious node," "anyone with a moderate bandwidth connection can induce DDoS attacks with the BitTorrent cloud," the lecture page summarized.

A Chaos Congress presenter under the name "Astro" demonstrated how that entire network's bandwidth can quickly become marshaled to attack a single domain.

"For example, one could tell tens of thousands of users that an HD version of Inception is available at an address that really is the web server of a corporation," technology publication Gigaom noted. "All of these users would immediately try to download the file under that address, bombarding the server with requests and possibly taking it down in the process."


And it's not just a single deceptive torrent file that can lead such an attack: according to TorrentFreak, this new method can utilize existing torrents already sharing information by hundreds of thousands of people.

Views: 72

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Burbia commented on TommyD's group The Chuckle Hut
8 hours ago
Doc Vega posted a blog post

More Political insanity for the Thinking Person

Vladimir Putin brought an entourage of specialists with him to Anchorage, Alaska to meet with…See More
8 hours ago
Doc Vega posted blog posts
yesterday
Doc Vega posted photos
Saturday
Doc Vega posted a blog post

Ashrams and Moonies Perfect Case for Mind Control

 In the late 60’s and into the 70’s we saw a strange phenomenon emerge! That was the rise of cults…See More
Friday
Doc Vega posted a blog post

Modern Progress

 From some things you just can’t come backNot everyone has your backIt might just be a nuclear…See More
Thursday
Bob of the Family Renner favorited tjdavis's photo
Thursday
Less Prone favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Thursday
Doc Vega commented on tjdavis's photo
Thumbnail

Now Playing

"They sure as hell are! "
Wednesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, yes they have already produced a Wooly Mammoth by crossing DNA from frozen remains in…"
Wednesday
Less Prone favorited tjdavis's photo
Wednesday
Less Prone favorited Bob of the Family Renner's photo
Wednesday
Less Prone favorited tjdavis's photo
Wednesday
Less Prone left a comment for Misteri
"Welcome back!"
Wednesday
tjdavis posted blog posts
Aug 19
tjdavis posted photos
Aug 19
tjdavis posted a video

The Inversion: The 'Sentient World Simulation' (SWS)

Kingsley L. Dennis discussing subjects from his new book - 'The Inversion: How We Have Been Tricked into Perceiving a False Reality' (published September 26,...
Aug 19
Doc Vega posted a blog post

Major Technical Developments in 1960 and a Major CIA Disclosure

 In 1960, there were some very significant changes in science, flight research, and oceanography…See More
Aug 18
Doc Vega's 5 blog posts were featured
Aug 18
Less Prone favorited Doc Vega's blog post The Saga of Joe Adams May Have Solved What's Behind the Numerous Disappearances Going on in our National Forests
Aug 18

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted