4-Chan 'Anonymous' web-site hackers arrested.

If they are found guilty, what crime will they be charged with?

Good question.

Given that the Computer Misuse Act amendment of 2004 didn't pass into law, there isn't any specific law against DDoS attacks.

Will be interesting to see what the CPS comes up with...
 
I'm sure it can be traced back... all the hardware devices in the chain know who sent them the packet...

ASSUME it can be traced...

To send a packet a computer has to speak to a network device your device puts an electrical signal onto a wire the next device could work out all sorts of stuff form that electrical signal, considering (im guessing) there cannot be more than a few 100 peopel on each wire the signal charastics could probably be used to work out who (which device) sent the signal even if you spoof everyhting...

I am guessing you don't know anything about networks :p
 
You may be able to hide your ip as an individual, but it can't be done on mass scale and not through a single piece of software.

Of course it isn't a simple as hiding your IP but steps can be taken to make tracking you more difficult but given enough resources anybody could eventually be tracked back.

It is making that not worth the effort that counts. :)

or you go out in a car with a laptop loads of people still have unsecure wifi

Exactly if you happen think about it rather than just downloading LOIC and "sticking it to the man"

I feel these people charged are simply being used as examples and all because it is related to Wikileaks.
 
... You're probably right on the "completely unsecured" front but there's plenty with protection weak enough to just absolve them and their isp from responsibility but easily gotten though.
Quite a few years ago, a Network Manager for a major high street retailer with whom I worked tried to evaluate how true this was. As I recall, he used a laptop, NetStumbler (for sniffing out WiFi APs) & Ethereal (for packet analysis). He said that it was possible but not trivial.

I suspect that there are better tools available nowadays but on the other hand, fewer ISPs are offering 'wires-only' contracts for home users and the Modem/Routers tend to come pre-configured to be reasonably secure.

Very little Googling will suggest that you hide your SSID & set up a MAC filter list. The former doesn't make much difference but to bypass the latter, you need to identify the MAC of an approved device using traffic analysis and spoof it - easy but not for your typical casual user.
 
I am guessing you don't know anything about networks :p

you initiate an electrical signal that may get converted via different devices along the way to photos or microwaves, if the correct software / logging is in place (even if not usually enabled) how can that not be traced back.?

im not suggesting the software / loggin is in place but its not exactly way out there to think its possible, personally I would always assume something getting to a destincation on a network can be traced back, would you bet years of your life on being anon of take a few extra precautions?
 
They do this to Microsoft. No one cares.

They do this to Facebook. No one cares.

They do this to someone in the name of Wikileaks, arrests are made.

Just saying.

nah they do this to a bank and other commercial entities costing lots of money and inconvenience in an easily traceable and provable way.

Would be annoyed if the weren't arrests tbh.
 
I suspect that there are better tools available nowadays but on the other hand, fewer ISPs are offering 'wires-only' contracts for home users and the Modem/Routers tend to come pre-configured to be reasonably secure.

most just have wep/wap.

Which my house mate found pretty easy to get into so we could have the internet till ours was hooked up :p
 
Quite a few years ago, a Network Manager for a major high street retailer with whom I worked tried to evaluate how true this was. As I recall, he used a laptop, NetStumbler (for sniffing out WiFi APs) & Ethereal (for packet analysis). He said that it was possible but not trivial.

I suspect that there are better tools available nowadays but on the other hand, fewer ISPs are offering 'wires-only' contracts for home users and the Modem/Routers tend to come pre-configured to be reasonably secure.

Very little Googling will suggest that you hide your SSID & set up a MAC filter list. The former doesn't make much difference but to bypass the latter, you need to identify the MAC of an approved device using traffic analysis and spoof it - easy but not for your typical casual user.

its easy but takes a few days its not like you have to sit there and watch it though , most citys have a few free wifi spots aswell
 
Telling the internet you're requests at coming from a different place is only a problem when you care about the response. For the purpsoes of a DOS, you don't really need a valid return path.
 
I'm sure it can be traced back... all the hardware devices in the chain know who sent them the packet...

ASSUME it can be traced...

To send a packet a computer has to speak to a network device your device puts an electrical signal onto a wire the next device could work out all sorts of stuff form that electrical signal, considering (im guessing) there cannot be more than a few 100 people on each wire the signal characteristics could probably be used to work out who (which device) sent the signal even if you spoof everything...

I highly doubt any switch like this would keep logs on its arp table but firewalls do when linked to purpose built logger hardware at the high end (this is pretty rare and it only stores source/dest typically - still no ability to trace it to someone). Spoofing is tough enough that I doubt it is successfully traced commonly - much easier to attack stupid people who just spam from a single IP. TBH they should have stayed behind a commercial NAT on a large network, that would have done the trick ;)
 
If they really meant business they'd have just hired a botnet from the Russian mafia. As good as untraceable. Expensive, mind you.
 
Isn't the whole point of that program to be distributed on random computes, library/schools/whatever and not your own personal computer? :p

Silly sobs.
 
Back
Top Bottom