国产视频

In Short

Practice Hacktivism at Your Own Risk

Hacker Hospital
MaksiMages / Shutterstock.com

People launch cyberattacks for all sorts of different reasons鈥攖o steal money, to steal secrets, to show off their skills, to wreak havoc, but also for (what they consider to be) altruistic reasons. Martin Gottesfeld did it to , a Connecticut teenager who was admitted to Boston Children鈥檚 Hospital in 2013 and kept in a psychiatric ward there, against her parents鈥 wishes, for more than a year. Pelletier was ultimately returned to her family, but before that, Gottesfeld launched distributed denial-of-service attacks on two Massachusetts medical facilities involved in Pelletier鈥檚 care. On Jan. 10, he, was to serve 121 months in prison and pay a $443,000 fine. Gottesfeld鈥檚 relatively severe sentence is an important marker of how seriously courts are taking denial-of-service attacks and how little it matters, at least from a legal standpoint, whether the people behind those attacks were motivated by a 鈥渉acktivist鈥 agenda.

Gottesfeld鈥檚 case is technically fairly straightforward but ethically complicated. He targeted Boston Children鈥檚 Hospital as well as the Wayside Youth and Family Support Network, a residential treatment facility where Pelletier was also a patient. Unlike ransomware attacks on hospitals, Gottesfeld鈥檚 denial-of-service attacks deliberately did not target or compromise any patient records, but they did plenty of damage. The weeklong attacks directed at Boston Children鈥檚 Hospital in April 2014, for instance, 鈥渄isrupted the Hospital鈥檚 day-to-day operations as well as the research being done at the Hospital鈥 and forced Children鈥檚 to shut down portions of its network, making it more difficult for doctors outside the hospital to access medical records and hampering patients鈥 ability to communicate with their doctors there, . Tunick said that during the attack, 鈥減atient care was not affected,鈥 but the hospital had to 鈥渞e-allocate its resources in a significant way,鈥 costing some $300,000 in damage, as well as an additional estimated $300,000 in lost fundraising. (The attack was planned to coincide with a fundraising drive.)

Compared with the damage done by the WannaCry ransomware program, which in the U.K. in 2017, Gottesfeld鈥檚 denial-of-service attacks seem relatively tame. Unlike ransomware, which encrypts the contents of a computer network so that no one can access any of the information stored on it or use the computers until a cryptocurrency ransom has been paid, Gottesfeld bombarded a server with so much online traffic that it crashed and could not respond to legitimate user requests. That鈥檚 how he managed to take down the Children鈥檚 Hospital fundraising website without affecting patient records.

But just because Gottesfeld didn鈥檛 target patient records doesn鈥檛 mean that denial-of-service attacks, especially those directed at hospitals and other critical infrastructure, aren鈥檛 incredibly dangerous and damaging. Denial-of-service attacks, bolstered by the influx of Internet of Things devices that can be harnessed into ever larger botnets to launch attacks, have . Even some hackers who are comfortable pushing the boundaries of the law in the name of activism draw the line at targeting hospitals. In fact, though Gottesfeld is a self-proclaimed member of the hacking group Anonymous, the Anonymous Twitter account YourAnonNews : 鈥淭o all the 鈥楢nons鈥 attacking the CHILDREN鈥橲 HOSPITAL in the name of Anonymous via Op #JustinaPelletier 鈥 IT IS A HOSPITAL: STOP IT.鈥

Gottesfeld himself didn鈥檛 take great pains to hide his tracks鈥攈e threatening Children鈥檚 and included a link to the hospital鈥檚 server information in order to enable others to join his attack. He exchanged Twitter direct messages explaining his plans and also created a new Twitter handle, @AnonMercurial2, to call on others to join his attacks on the Wayside treatment center. (The FBI traced this activity back to Gottesfeld using his internet provider RCN to establish his IP address at the time. In an interesting Fourth Amendment twist, Gottesfeld鈥檚 lawyers tried to argue that he had a 鈥渞easonable expectation to privacy鈥 of his IP address because he used encryption, but the .)

After he and his wife , Gottesfeld even released a to the HuffPost taking credit for the attacks. 鈥淚 coded around the clock for two weeks to perfect the attack,鈥 Gottesfeld wrote. 鈥淪mall test runs were made. [Children鈥檚] bragged to the media that they were withstanding the onslaught and hadn鈥檛 been taken down. They had no idea what was to come.鈥

In Gottesfeld鈥檚 view, he did nothing wrong鈥攁nd he isn鈥檛 alone in that opinion. A sympathetic , published in June 2017, dubbed Gottesfeld 鈥淭he Hacker Who Cared Too Much鈥 and invoked the controversial case of Aaron Swartz, the Reddit co-founder who downloaded academic articles from JStor using MIT鈥檚 network and then in January 2013 while awaiting trial. But while both Swartz and Gottesfeld were charged under the Computer Fraud and Abuse Act for accessing protected computers without authorization, their actual technical actions bear little resemblance. Swartz downloaded millions of academic articles using a university network. Gottesfeld launched a denial-of-service attack against a hospital and a medical treatment facility, forcing them to shut down portions of their networks and hampering patient communications and access to medical records.

At a moment when hospitals seem especially vulnerable to online attacks, and denial-of-service attacks are growing bigger and more damaging than ever before, it鈥檚 not surprising that a court would view Gottesfeld鈥檚 actions as deserving of a 10-year prison sentence. It鈥檚 significantly more time than have received in the past, and much longer than the 30-month sentence that 30-year-old British hacker Daniel Kaye that temporarily took Liberia鈥攜es, the entire country鈥攐ffline. It鈥檚 hard to say whether that鈥檚 because Gottesfeld went after a hospital, or because courts are taking denial-of-service attacks more seriously than they used to, or because so few perpetrators of online attacks are ever actually tried that the court wanted to make an example of Gottesfeld as a warning to other would-be attackers. Probably all of those motivations played some role in the sentencing. If nothing else, it sends a clear signal that the penalties for hacking in the name of a political agenda are every bit as stiff as those for hacking in pursuit of money, fraud, and state secrets.

This article in , a collaboration among , , and .

More 国产视频 the Authors

Practice Hacktivism at Your Own Risk