<<

1/8/2013

PeerPeer--toto--PeerPeer Offenses: BitTorrent Investigations

Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law

Copyright © 2012 Priscilla Grantham & National Center for Justice and the Rule of Law NCJRL. org 1

Learning Objectives After this presentation, you will be able to: • Describe the basic architecture of P2P networks; • Describe how P2P enables file over P2P networks; • Summarize how P2P computing differs from traditional - models; • Differentiate between centralized and decentralized P2P networks; • Explain how the BitTorrent system varies from other P2P protocols; • Identify benefits and risks associated with using Peer-to-Peer networks; • Discuss the ways in which P2P technology has been exploited for illegal purposes; • Summarize the characteristics of private peer-to-peer networks; and • Differentiate file-hosting services or “cyberlockers” from torrent sites

2

PeerPeer--toto--PeerPeer Networks

Network consisting of thousands of connected to each other

• Main feature: No central server • Main use: Acquiring files • Examples: BitTorrent,

3

1 1/8/2013

P2P

• Means to distribute wide range of content including software, games, books, movies, music, etc. • Researchers and code. • Used by NASA to distribute satellite imagery.

4

Benefits of P2P:

• Client machines are peers and communicate directly with one another. • P2P networks tend to be faster and more reliable –no reliance on central server to deliver content.

5

Downsides of P2P: • P2P networks have been used to transmit viruses, , mislabeled/corrupted files • Those who inadvertently placed sensitive materials in network‐shared directories have been victims of identity theft • Music and media files easily distributed in violation of laws • Frequently used as a means to distribute and acquire CP 6

2 1/8/2013

P2P: Networks vv.. Clients

P2P networks : P2P clients:

 Shareza  BitTorrent  Gnutella  BearShare  eDonkey  eMule  (G2)  Warez  BitTorrent  Frostwire

7

Traditional File Transfer Methods:

• Referred to as Client‐Server file transfer • Transfer handled by a protocols such as FTP () or HTTP (HyperText transfer protocol) • Desired file located via web browser • File is downloaded from a single source, the file serverserver,, by the destination computer, the client

8

I open web page, click link to file Web browser software on my computer tells a central computer that holds the Web page & file I want to transfer copy of the file to my computer.

Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of traffic on server, # of computers trying to download same file.

If file is large and popular, demands on server will be great and download will be slow. Server could crash. 9

3 1/8/2013

Test your knowledge: The software that enables one to share files over a P2P network is called a:

A. P2P client B. Swarm . Server D. Peer

10

The Evolution of P2P Networks: It all started with Napster… “Central Server Model”

• Started Napster software on my computer ––nownow my computer could make files available to other Napster users, • My computer connected to Napster’s central servers, • My computer told the Server which files were available on my machine, • Napster central servers had complete list of every song available on every hard disk connected to Napster at that time 11

Downloading a song via Napster:

• I typed in my query: “Roxanne” by the Police • Napster’s central servers listed all the computers storing that song • I chose a version of the song from the list • My computer connected to the user’s computer that had the song, and downloaded “Roxanne” directly from that computer.

12

4 1/8/2013

Napster ordered to shut down due to copyright violations… No central Database = No Napster

13

Enter Gnutella:

• 1st decentralized P2P network

• No central database that knew all files available on Gnutella network

• Unlike Napster, many different client programs available to access Gnutella network.

14

Downloading a file via Gnutella P2P network:

• Run Gnutella‐compatible file sharing software on computer • Send out request for desired file • Software asks computers connected to and running same software • Software finds a computer with the file I want on its hard drive, download begins.

15

5 1/8/2013

BitTorrent protocol:

• Enables fast downloading of large files using minimum Internet

• Offloads some of the file tracking work to a centralized server (called a Tracker) • Uses “tit‐for‐tat” principle: in order to receive files, you must give them

16

BitTorrent v. Gnutella:

• With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously.

• Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 17

BitTorrent –Basic – Basic terms: • Tracker –a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm. • Swarm –All of the computers that contain all or part of the file bbieing sought. • Seed –the computers in the swarm that contain the entire file being sought. • Leechers – commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them.

18

6 1/8/2013

BitTorrent explained:

http://video 19

Test your knowledge: Which P2P network is an example of a Centralized server model? A. Gnutella B. Napster C. BitTorrent D. GigaTribe

20

Downloading via BitTorrent: • Download (free) BitTorrent client: BitTorrent, uTorrent… • Find a to download. Enter term “.torrent” using Internet search engine to find sites offering torrents small files containing metadata necessary to download data from other users • • isoHunt • TorrentSpy •

• Jamendo 21

7 1/8/2013

Downoading a file via BitTorrent:

22

• Go to www.utorrent.com • Click download • Save the software in your computer • Open the utorrent.exe file • Click to run • It will install into your computer 23

• Then open your browser and type torrent or www..eu • Type the name of the movie you want to download and click search button.

24

8 1/8/2013

Then you have watch list of movie file. But do not go sponsored links. Choose a one link with more peers.

25

It will direct you to a new page with a list of providers which provides torrent file. Choose

one of those. 26

On the next page you will see " Download via torrent " click on that. 27

9 1/8/2013

Once you have opened the torrent file from the download bar, uTorrent will open automatically and ask you where you’d want to save the file. 28

After clicking OK, you will be able to see this screen. You will be able to know how many seeds and peers in the network. The downloading status will also tell you how many percent has been downloaded. When it’s done, it will be 100% and you can start opening the file you have downloaded. 29

I’ve got a torrent file of Countdown’s album “Break Rise Blowing” from the Jamendo.

website

torrent

30

10 1/8/2013

• Now I save torrent file to my hard drive, • Open torrent file in my BitTorrent client program, and • Start downloading.

31

32

Test your knowledge:

The role of the Tracker in the BitTorrent network is to maintain an index of all files available for trading. A. True B. False

33

11 1/8/2013

Private P2P Networks / Private Internet

• Network of trusted sources

• Share files only with those you know and trust – GigaTribe – 2Peer – QNext

34

“The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces.”

35

2Peer – Features: Feature 2PeerDesktop 2PeerWeb

Browse Friends' Content ✔ ✔ Keyword search for files ✔ ✔ Download files ✔ ✔ Invite Users to your Private Internet ✔ ✔ Organize users into groups ✔ ✔ Change your profile information ✔ ✔ Update your preference settings ✔ ✔ View Albums ✔ ✔ Download folders ✔  Share folders and files ✔  Share albums ✔  Chat ✔  View transfer history ✔  Create Albums ✔  36

12 1/8/2013

2peer.com37

GigaTribe ‐ features:

• All data transfers are encrypted • No limitation on quantity or file size • No wasting time uploading files:

 Select folders to share

 Contents of selected folders instantly accessible to friends

 Friends browse and download files they want • Data remains under your control; not saved on another company’s equipment • Includes personal chat and private blog 38

Test your knowledge: Where are P2P files stored?

A. Web hosting companies B. The P2P network servers C. Internet Service Providers D. Individuals’ computers E. Google

39

13 1/8/2013

P2P systems & legal issues

Problem is not with the technology, but in the way it has been used…

40

Napster shut down its website in order to comply w/ injunction that it prevent trading of copyrighted music on its network

Now an online music store requiring paid subscription

41

42

14 1/8/2013

• RIAA filed suit on behalf of 8 major music publishers. • Charged the online file‐sharing program with pervasive online • May 2010, federal judge ordered permanent shutdown of the company.

43

• Frequent defendants in copyright infringement suits • The “Pirate Bay Four” each received I year jail time and fines totaling more than $3 million. • Site still up and running.

44

BitTorrent users being sued enmasse by independent makers. Consortium of indie filmmakers launched mass‐litigation campaign, sued individual BitTorrent users whose IP addresses were detected feeding and seeding like Uncross the Stars, Gray Man and Call of the Wild 3D 45

15 1/8/2013

…and in other news

• Mass BitTorrent lawsuits turn low‐budget movies into big bucks • Small film co. in LA filed fed lawsuit against 5,865 who allegedly downloaded one of their releases • Could yield almost $9 million – more than box office gross for Avatar • Suit lists IP addresses of downloaders – asks judge to order ISPs around country to provide names • Individuals will be mailed letters seeking settlement lest they be named in a public lawsuit.

46

The very features touted by GigaTribe, make it a safe haven for those trading images, videos, and information related to child sexual abuse.

47

Test your knowledge: Which of the following have not been used for illegal purposes? A. Gnutella B. BitTorrent C. GigaTribe D. A and B E. None of the above

48

16 1/8/2013

Cyberlockers

• Cloud based storage sites • Legitimate sites – – provide services – Facilit at e sh ari ng of fil es t oo l arge f or email • Users files to their account, then receive a link allowing access to the files, which they can share

49

Legal issues:

• “Rogue” services – havens for storage a distribution (via streaming or downloading) of copyrighted material

• DMCA safe harbor defense

50

MegaUpload • Major global cyberlocker • Based in Hong Kong • Over 1000 servers in U.S., 630 in Netherlands • Over $175 million in 5 years from membership fees via PayPal • Purportedly accounted for 4% of total traffic on Internet • 30% to 40% of all file sharing traffic 51

17 1/8/2013

MegaUpload

• Shut down by FBI Jan. 2012

• Charged w/ criminal copyright ifiinfringement , conspi racy t o commit copyright infringement, money laundering

52

Kim Dotcom’s new venture:

53

Thank You

Priscilla Grantham [email protected] (662) 915-6929

54

18