Skip to Content
Uncategorized

DIY Censorship

DD0S attacks have been getting easier, and the Wikileaks situation shows what that can mean.
December 10, 2010

The battles over Wikileaks continue, with distributed denial of service (DDoS) attacks being launched in all directions. These types of attacks take websites offline by overwhelming them with traffic. They work best when the traffic pours in from sources distributed all over the world, which makes it more difficult to block the attack traffic and focus on helping legitimate users.

Since Wikileaks began publishing diplomatic cables, DDoS attacks have been aimed at the site itself and the service providers who helped it stay online. Unaffiliated supporters—particularly the Internet pranksters Anonymous—have since launched attacks on those seen to be obstructing Wikileaks, including payment companies Visa and Mastercard, which stopped processing donations to the beleaguered site.

But what’s perhaps most striking about the DDoS attacks is how easily and frequently they come. The first associated arrest happened yesterday, when Dutch police detained a 16-year-old who admitted to being part of the attacks on Visa and Mastercard. But the public has developed an image of brilliant young hackers engaged in sophisticated criminal activity, and that’s far from what happened here.

These days, DDoS attacks don’t require much technical sophistication. Early last year, I wrote a story on how these sorts of attacks are on the rise, and are getting easier. My story was based on the work of Jose Nazario, a senior security researcher for Arbor Networks. I wrote:

Nazario says that the bar for launching a DDoS attack has come down significantly in the past few years. Attacks aimed at Estonian sites in 2007 (during a time of political tension between this country and Russia) used botnets and scripts that weren’t easy for nontechnical people to employ. Now attackers can purchase tools such as Black Energy or NetBot Attacker (made by Russian and Chinese hackers, respectively) for less than $100 apiece. These kits give an attacker ready-made code and an easy-to-use interface to control a botnet. Attackers have even developed Web interfaces so that volunteers can more easily participate in an attack. Attacks are often coordinated in forums, Nazario says, and easy-to-use interfaces help boost participation.

That’s exactly the sort of thing we’ve been seeing in the case of Wikileaks. And it could be the beginning of a new era on the Internet—one in which, sadly, the principle is that if you don’t like what someone is saying, shut them down.

Keep Reading

Most Popular

conceptual illustration of a heart with an arrow going in on one side and a cursor coming out on the other
conceptual illustration of a heart with an arrow going in on one side and a cursor coming out on the other

Forget dating apps: Here’s how the net’s newest matchmakers help you find love

Fed up with apps, people looking for romance are finding inspiration on Twitter, TikTok—and even email newsletters.

computation concept
computation concept

How AI is reinventing what computers are

Three key ways artificial intelligence is changing what it means to compute.

still from Embodied Intelligence video
still from Embodied Intelligence video

These weird virtual creatures evolve their bodies to solve problems

They show how intelligence and body plans are closely linked—and could unlock AI for robots.

We reviewed three at-home covid tests. The results were mixed.

Over-the-counter coronavirus tests are finally available in the US. Some are more accurate and easier to use than others.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.