18
1/8/2013 1 Peer Peer-to to-Peer Offenses: Peer Offenses: BitTorrent BitTorrent Investigations Investigations NCJRL. NCJRL. org org Copyright © 2012 Priscilla Grantham & National Center for Justice and the Rule of Law Priscilla Grantham, Esq. Priscilla Grantham, Esq. Sr. Research Counsel Sr. Research Counsel National Center for Justice and the Rule of Law National Center for Justice and the Rule of Law 1 Learning Objectives Learning Objectives After this presentation, you will be able to: Describe the basic architecture of P2P networks; Describe how P2P software enables file sharing over P2P networks; Summarize how P2P computing differs from traditional client-server models; Differentiate between centralized and decentralized P2P networks; Explain how the BitTorrent system varies from other P2P protocols; Identify benefits and risks associated with using Peer-to-Peer networks; Discuss the ways in which P2P technology has been exploited for illegal purposes; Summarize the characteristics of private peer-to-peer networks; and Differentiate file-hosting services or “cyberlockers” from torrent sites 2 Peer Peer-to to-Peer Networks Peer Networks Network consisting of thousands of computers connected to each other Main feature: No central server Main use: Acquiring files Examples: BitTorrent, Gnutella 3

PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

1

PeerPeer--toto--Peer Offenses:Peer Offenses:BitTorrentBitTorrent InvestigationsInvestigations

NCJRL. NCJRL. orgorgCopyright © 2012 Priscilla Grantham & National Center for Justice and the Rule of Law

Priscilla Grantham, Esq.Priscilla Grantham, Esq.Sr. Research CounselSr. Research Counsel

National Center for Justice and the Rule of LawNational Center for Justice and the Rule of Law

1

Learning ObjectivesLearning ObjectivesAfter this presentation, you will be able to:• Describe the basic architecture of P2P networks;

• Describe how P2P software enables file sharing over P2P networks;

• Summarize how P2P computing differs from traditional client-server models;

• Differentiate between centralized and decentralized P2P networks;;

• Explain how the BitTorrent system varies from other P2P protocols;

• Identify benefits and risks associated with using Peer-to-Peer networks;

• Discuss the ways in which P2P technology has been exploited for illegal purposes;

• Summarize the characteristics of private peer-to-peer networks; and

• Differentiate file-hosting services or “cyberlockers” from torrent sites2

PeerPeer--toto--Peer NetworksPeer Networks

Network consisting of thousands of computers connected to each other

• Main feature: No central server

• Main use: Acquiring files

• Examples: BitTorrent, Gnutella

3

Page 2: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

2

P2P file sharingP2P file sharing

• Means to distribute wide range of content including software, games, books, movies, music, etc. 

• Researchers share data and computer code.

• Used by NASA to distribute satellite imagery.

4

Benefits of P2PBenefits of P2P::

• Client machines are peers and communicate directly with one another.

• P2P networks tend to be faster andP2P networks tend to be faster and more reliable – no reliance on central server to deliver content.

5

Downsides of P2PDownsides of P2P::

• P2P networks have been used to transmit viruses, malware, mislabeled/corrupted files

• Those who inadvertently placed sensitive materials in network shared directoriesmaterials in network‐shared directories have been victims of identity theft

• Music and media files easily distributed in violation of copyright laws

• Frequently used as a means to distribute and acquire CP

6

Page 3: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

3

P2P: Networks P2P: Networks vv. Clients. Clients

P2P networks :

Napster

Gnutella

eDonkey

P2P clients: Shareza BitTorrent BearShare

eDonkey

Gnutella2 (G2)

BitTorrent

eMule Warez Frostwire

7

Traditional File Transfer MethodsTraditional File Transfer Methods::

• Referred to as ClientClient‐‐Server file transferServer file transfer

• Transfer handled by a protocols such as FTP (file transfer protocol) or HTTP ( )(HyperText transfer protocol) 

• Desired file located via web browser

• File is downloaded from a single source, the file serverfile server, , by the destination computer, the clientthe client

8

I open web page, click link to download file Web browser software on my computertells a central computer that holds theWeb page & file I want to transfer copyof the file to my computer. 

Transfer speed depends on factors such as:Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of trafficon server, # of computers trying to downloadsame file.  

If file is large and popular, demands on server will be great and download will be slow. Server could crash.

9

Page 4: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

4

Test your knowledgeTest your knowledge::

The software that enables one to share files

over a P2P network is called a:

A. P2P client

B. SwarmB. Swarm

C. Server

D. Peer

10

The Evolution of P2P NetworksThe Evolution of P2P Networks::

It all started with Napster…

“Central Server Model”

•• Started Napster software on my computer Started Napster software on my computer –– now my now my computer could make files available to other Napster computer could make files available to other Napster users,users,

•• My computer connected to Napster’s central servers,My computer connected to Napster’s central servers,•• My computer told the Server which files were My computer told the Server which files were available on my machine,available on my machine,

•• Napster central servers had complete list of every song Napster central servers had complete list of every song available on every hard disk connected to Napster at available on every hard disk connected to Napster at that timethat time

11

Downloading a song via Napster:Downloading a song via Napster:

• I typed in my query: “Roxanne” by the Police

• Napster’s central servers listed all the computers storing that songp g g

• I chose a version of the song from the list

• My computer connected to the user’s computer that had the song, and downloaded “Roxanne” directly from that computer.

12

Page 5: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

5

Napster ordered to shut down due to Napster ordered to shut down due to copyright violations…copyright violations…No central Database = No NapsterNo central Database = No Napster

13

Enter Gnutella: Enter Gnutella: 

• 1st decentralized P2P network

• No central database that kne all files• No central database that knew all files available on Gnutella network

• Unlike Napster, many different client programs available to access Gnutella network.

14

Downloading a file via Gnutella P2P network:Downloading a file via Gnutella P2P network:

• Run Gnutella‐compatible file sharing software on computer

• Send out request for desired file

• Software asks computers connected to Internet and running same software

• Software finds a computer with the file I want on its hard drive, download begins.

15

Page 6: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

6

BitTorrentBitTorrent protocol:protocol:

• Enables fast downloading of large files using minimum Internet bandwidth

• Offloads some of the file tracking work• Offloads some of the file tracking work to a centralized server (called a Tracker)

• Uses “tit‐for‐tat” principle: in order to receive files, you must give them

16

BitTorrentBitTorrent v. Gnutellav. Gnutella::

• With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously.

• Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 17

BitTorrentBitTorrent –– Basic termsBasic terms::

•• Tracker Tracker – a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm.

•• SwarmSwarm – All of the computers that contain all or t f th fil b i htpart of the file being sought.

•• SeedSeed – the computers in the swarm that contain the entire file being sought.

•• LeechersLeechers – commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them.

18

Page 7: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

7

BitTorrentBitTorrent explained:explained:

http://video 19

Test your knowledgeTest your knowledge::

Which P2P network is an example of a Centralized server model?

A. GnutellaB. NapsterC. BitTorrentD. GigaTribe

20

Downloading via Downloading via BitTorrentBitTorrent::

• Download (free) BitTorrent client: BitTorrent, uTorrent…

• Find a torrent file to download. Enter term “.torrent” using Internet search engine to find sites offering torrents small filesfind sites offering torrents small files containing metadata necessary to download data from other users

• The Pirate Bay• isoHunt• TorrentSpy• Mininova• Jamendo 21

Page 8: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

8

DownoadingDownoading a file via a file via BitTorrentBitTorrent::

22

23

• Go to www.utorrent.com• Click download• Save the software in your computer• Open the utorrent.exe file• Click to run• It will install into your computer

24

• Then open your browser and type torrent or www.torrentz.eu• Type the name of the movie you want to download and click search

button.

Page 9: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

9

25

Then you have watch list of movie file. But do not go sponsored links. Choose a one link with more peers.

26

It will direct you to a new page with a list of providers which provides torrent file. Choose one of those.

27

On the next page you will see " Download via torrent " click on that.

Page 10: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

10

28

Once you have opened the torrent file from the download bar, uTorrent will open automatically and ask you where you’d want to save the file. 

29

After clicking OK, you will be able to see this screen. You will be able to know how many seeds and peers in the network. The downloading status will also tell you how many percent has been downloaded. When it’s done, it will be 100% and you can start opening the file you have downloaded.

I’ve got a torrent file of Countdown’s album “Break Rise Blowing” from the website Jamendo.

websitewebsite

torrenttorrent

30

Page 11: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

11

• Now I save torrent file to my hard drive,

• Open torrent file in my BitTorrent client program, and

• Start downloading.

31

32

Test your knowledge:Test your knowledge:

The role of the Tracker in the BitTorrent network  is to maintain an index of all files available for trading.

A. True

B. False

33

Page 12: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

12

Private P2P Networks / Private InternetPrivate P2P Networks / Private Internet

• Network of trusted sources

• Share files only with those you knowShare files only with those you know and trust

– GigaTribe

– 2Peer

– QNext

34

“The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure The Private Internetprivate and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces.”

35

2Peer 2Peer –– FeaturesFeatures::Feature 2PeerDesktop      2PeerWeb

Browse Friends' ContentKeyword search for filesDownload filesInvite Users to your Private InternetOrganize users into groups

✔✔✔✔✔

✔✔✔✔✔

Change your profile informationUpdate your preference settingsView AlbumsDownload foldersShare folders and filesShare albumsChatView transfer historyCreate Albums

✔✔✔✔✔✔✔✔✔

✔✔✔ 36

Page 13: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

13

2peer.com37

GigaTribeGigaTribe ‐‐ featuresfeatures::

• All data transfers are encrypted

• No limitation on quantity or file size

• No wasting time uploading files:Select folders to share Select folders to share

Contents of selected folders instantly accessible to friends

Friends browse and download files they want

• Data remains under your control; not saved on another company’s equipment

• Includes personal chat and private blog38

Test your knowledgeTest your knowledge::

Where are P2P files stored?

A. Web hosting companies

B The P2P network serversB. The P2P network servers

C. Internet Service Providers

D. Individuals’ computers

E. Google

39

Page 14: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

14

P2P systems & legal issuesP2P systems & legal issues

Problem is not with the technology, but in the way it has been used…

40

Napster shut down its website in order to comply w/ injunction that it prevent trading of copyrighted music on its networkcopyrighted music on its network

Now an online music store requiring paid subscription

41

42

Page 15: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

15

• RIAA filed suit on behalf of 8 major music publishers. 

• Charged the online file‐sharing program with pervasive online copyright infringement

• May 2010, federal judge ordered permanent shutdown of the company.

43

• Frequent defendants in copyrightFrequent defendants in copyright infringement suits

• The “Pirate Bay Four” each received I year jail time and fines totaling more than $3 million.

• Site still up and running.

44

BitTorrent users being sued enmasse by independent  film makers.

Consortium of indie filmmakers launched mass‐litigation campaign, sued individual BitTorrent users whose IP addresses were detected feeding and seeding films like Uncross the Stars, Gray Man and Call of the Wild 3D

45

Page 16: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

16

…and in other news…and in other news

• Mass BitTorrent lawsuits turn low‐budget movies into big bucks

• Small film co. in LA filed fed lawsuit against 5,865 who allegedly downloaded one of their releases

• Could yield almost $9 million more than box office• Could yield almost $9 million – more than box office gross for Avatar

• Suit lists IP addresses of downloaders – asks judge to order ISPs around country to provide names

• Individuals will be mailed letters seeking settlement lest they be named in a public lawsuit.

46

The very features touted by GigaTribe, make it a safe haven for those trading images, videos, and information related to child sexual abuse.

47

Test your knowledgeTest your knowledge::

Which of the following have not been used for illegal purposes?

A. Gnutella

B. BitTorrent

C. GigaTribe

D. A and B

E. None of the above

48

Page 17: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

17

CyberlockersCyberlockers

• Cloud based storage sites

• Legitimate sites –– provide backup services

F ilit t h i f fil t l f– Facilitate sharing of files too large for email

• Users upload files to their account, then receive a link allowing access to the files, which they can share

49

Legal issues:Legal issues:

• “Rogue” services – havens for storage a distribution (via streaming or downloading) of copyrighted material

• DMCA safe harbor defense

50

MegaUploadMegaUpload• Major global cyberlocker

• Based in Hong Kong

• Over 1000 servers in U.S., 630 in NetherlandsNetherlands

• Over $175 million in 5 years from membership fees via PayPal

• Purportedly accounted for 4% of total traffic on Internet

• 30% to 40% of all file sharing traffic51

Page 18: PeerPeer--toto--Peer Offenses:Peer Offenses WEBINARS/Peer-to-Peer... · PeerPeer--toto--Peer NetworksPeer Networks Network consisting of thousands of computers connected to each other

1/8/2013

18

MegaUploadMegaUpload

• Shut down by FBI Jan. 2012

• Charged w/ criminal copyright i f i t i t itinfringement, conspiracy to commit copyright infringement, money laundering

52

Kim Dotcom’s new venture:Kim Dotcom’s new venture:

53

Thank YouThank You

Priscilla Grantham

[email protected]

(662) 915-6929

54