1/8/2013
PeerPeer--toto--PeerPeer Offenses: BitTorrent Investigations
Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law
Copyright © 2012 Priscilla Grantham & National Center for Justice and the Rule of Law NCJRL. org 1
Learning Objectives After this presentation, you will be able to: • Describe the basic architecture of P2P networks; • Describe how P2P software enables file sharing over P2P networks; • Summarize how P2P computing differs from traditional client-server models; • Differentiate between centralized and decentralized P2P networks; • Explain how the BitTorrent system varies from other P2P protocols; • Identify benefits and risks associated with using Peer-to-Peer networks; • Discuss the ways in which P2P technology has been exploited for illegal purposes; • Summarize the characteristics of private peer-to-peer networks; and • Differentiate file-hosting services or “cyberlockers” from torrent sites
2
PeerPeer--toto--PeerPeer Networks
Network consisting of thousands of computers connected to each other
• Main feature: No central server • Main use: Acquiring files • Examples: BitTorrent, Gnutella
3
1 1/8/2013
P2P file sharing
• Means to distribute wide range of content including software, games, books, movies, music, etc. • Researchers share data and computer code. • Used by NASA to distribute satellite imagery.
4
Benefits of P2P:
• Client machines are peers and communicate directly with one another. • P2P networks tend to be faster and more reliable –no reliance on central server to deliver content.
5
Downsides of P2P: • P2P networks have been used to transmit viruses, malware, mislabeled/corrupted files • Those who inadvertently placed sensitive materials in network‐shared directories have been victims of identity theft • Music and media files easily distributed in violation of copyright laws • Frequently used as a means to distribute and acquire CP 6
2 1/8/2013
P2P: Networks vv.. Clients
P2P networks : P2P clients:
Napster Shareza BitTorrent Gnutella BearShare eDonkey eMule Gnutella2 (G2) Warez BitTorrent Frostwire
7
Traditional File Transfer Methods:
• Referred to as Client‐Server file transfer • Transfer handled by a protocols such as FTP (file transfer protocol) or HTTP (HyperText transfer protocol) • Desired file located via web browser • File is downloaded from a single source, the file serverserver,, by the destination computer, the client
8
I open web page, click link to download file Web browser software on my computer tells a central computer that holds the Web page & file I want to transfer copy of the file to my computer.
Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of traffic on server, # of computers trying to download same file.
If file is large and popular, demands on server will be great and download will be slow. Server could crash. 9
3 1/8/2013
Test your knowledge: The software that enables one to share files over a P2P network is called a:
A. P2P client B. Swarm C. Server D. Peer
10
The Evolution of P2P Networks: It all started with Napster… “Central Server Model”
• Started Napster software on my computer ––nownow my computer could make files available to other Napster users, • My computer connected to Napster’s central servers, • My computer told the Server which files were available on my machine, • Napster central servers had complete list of every song available on every hard disk connected to Napster at that time 11
Downloading a song via Napster:
• I typed in my query: “Roxanne” by the Police • Napster’s central servers listed all the computers storing that song • I chose a version of the song from the list • My computer connected to the user’s computer that had the song, and downloaded “Roxanne” directly from that computer.
12
4 1/8/2013
Napster ordered to shut down due to copyright violations… No central Database = No Napster
13
Enter Gnutella:
• 1st decentralized P2P network
• No central database that knew all files available on Gnutella network
• Unlike Napster, many different client programs available to access Gnutella network.
14
Downloading a file via Gnutella P2P network:
• Run Gnutella‐compatible file sharing software on computer • Send out request for desired file • Software asks computers connected to Internet and running same software • Software finds a computer with the file I want on its hard drive, download begins.
15
5 1/8/2013
BitTorrent protocol:
• Enables fast downloading of large files using minimum Internet bandwidth
• Offloads some of the file tracking work to a centralized server (called a Tracker) • Uses “tit‐for‐tat” principle: in order to receive files, you must give them
16
BitTorrent v. Gnutella:
• With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously.
• Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 17
BitTorrent –Basic – Basic terms: • Tracker –a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm. • Swarm –All of the computers that contain all or part of the file bbieing sought. • Seed –the computers in the swarm that contain the entire file being sought. • Leechers – commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them.
18
6 1/8/2013
BitTorrent explained:
http://video 19
Test your knowledge: Which P2P network is an example of a Centralized server model? A. Gnutella B. Napster C. BitTorrent D. GigaTribe
20
Downloading via BitTorrent: • Download (free) BitTorrent client: BitTorrent, uTorrent… • Find a torrent file to download. Enter term “.torrent” using Internet search engine to find sites offering torrents small files containing metadata necessary to download data from other users • The Pirate Bay • isoHunt • TorrentSpy • Mininova
• Jamendo 21
7 1/8/2013
Downoading a file via BitTorrent:
22
• Go to www.utorrent.com • Click download • Save the software in your computer • Open the utorrent.exe file • Click to run • It will install into your computer 23
• Then open your browser and type torrent or www.torrentz.eu • Type the name of the movie you want to download and click search button.
24
8 1/8/2013
Then you have watch list of movie file. But do not go sponsored links. Choose a one link with more peers.
25
It will direct you to a new page with a list of providers which provides torrent file. Choose
one of those. 26
On the next page you will see " Download via torrent " click on that. 27
9 1/8/2013
Once you have opened the torrent file from the download bar, uTorrent will open automatically and ask you where you’d want to save the file. 28
After clicking OK, you will be able to see this screen. You will be able to know how many seeds and peers in the network. The downloading status will also tell you how many percent has been downloaded. When it’s done, it will be 100% and you can start opening the file you have downloaded. 29
I’ve got a torrent file of Countdown’s album “Break Rise Blowing” from the website Jamendo.
website
torrent
30
10 1/8/2013
• Now I save torrent file to my hard drive, • Open torrent file in my BitTorrent client program, and • Start downloading.
31
32
Test your knowledge:
The role of the Tracker in the BitTorrent network is to maintain an index of all files available for trading. A. True B. False
33
11 1/8/2013
Private P2P Networks / Private Internet
• Network of trusted sources
• Share files only with those you know and trust – GigaTribe – 2Peer – QNext
34
“The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces.”
35
2Peer – Features: Feature 2PeerDesktop 2PeerWeb
Browse Friends' Content ✔ ✔ Keyword search for files ✔ ✔ Download files ✔ ✔ Invite Users to your Private Internet ✔ ✔ Organize users into groups ✔ ✔ Change your profile information ✔ ✔ Update your preference settings ✔ ✔ View Albums ✔ ✔ Download folders ✔ Share folders and files ✔ Share albums ✔ Chat ✔ View transfer history ✔ Create Albums ✔ 36
12 1/8/2013
2peer.com37
GigaTribe ‐ features:
• All data transfers are encrypted • No limitation on quantity or file size • No wasting time uploading files:
Select folders to share
Contents of selected folders instantly accessible to friends
Friends browse and download files they want • Data remains under your control; not saved on another company’s equipment • Includes personal chat and private blog 38
Test your knowledge: Where are P2P files stored?
A. Web hosting companies B. The P2P network servers C. Internet Service Providers D. Individuals’ computers E. Google
39
13 1/8/2013
P2P systems & legal issues
Problem is not with the technology, but in the way it has been used…
40
Napster shut down its website in order to comply w/ injunction that it prevent trading of copyrighted music on its network
Now an online music store requiring paid subscription
41
42
14 1/8/2013
• RIAA filed suit on behalf of 8 major music publishers. • Charged the online file‐sharing program with pervasive online copyright infringement • May 2010, federal judge ordered permanent shutdown of the company.
43
• Frequent defendants in copyright infringement suits • The “Pirate Bay Four” each received I year jail time and fines totaling more than $3 million. • Site still up and running.
44
BitTorrent users being sued enmasse by independent film makers. Consortium of indie filmmakers launched mass‐litigation campaign, sued individual BitTorrent users whose IP addresses were detected feeding and seeding films like Uncross the Stars, Gray Man and Call of the Wild 3D 45
15 1/8/2013
…and in other news
• Mass BitTorrent lawsuits turn low‐budget movies into big bucks • Small film co. in LA filed fed lawsuit against 5,865 who allegedly downloaded one of their releases • Could yield almost $9 million – more than box office gross for Avatar • Suit lists IP addresses of downloaders – asks judge to order ISPs around country to provide names • Individuals will be mailed letters seeking settlement lest they be named in a public lawsuit.
46
The very features touted by GigaTribe, make it a safe haven for those trading images, videos, and information related to child sexual abuse.
47
Test your knowledge: Which of the following have not been used for illegal purposes? A. Gnutella B. BitTorrent C. GigaTribe D. A and B E. None of the above
48
16 1/8/2013
Cyberlockers
• Cloud based storage sites • Legitimate sites – – provide backup services – Facilit at e sh ari ng of fil es t oo l arge f or email • Users upload files to their account, then receive a link allowing access to the files, which they can share
49
Legal issues:
• “Rogue” services – havens for storage a distribution (via streaming or downloading) of copyrighted material
• DMCA safe harbor defense
50
MegaUpload • Major global cyberlocker • Based in Hong Kong • Over 1000 servers in U.S., 630 in Netherlands • Over $175 million in 5 years from membership fees via PayPal • Purportedly accounted for 4% of total traffic on Internet • 30% to 40% of all file sharing traffic 51
17 1/8/2013
MegaUpload
• Shut down by FBI Jan. 2012
• Charged w/ criminal copyright ifiinfringement , conspi racy t o commit copyright infringement, money laundering
52
Kim Dotcom’s new venture:
53
Thank You
Priscilla Grantham [email protected] (662) 915-6929
54
18