But, attacks using these sites are somewhat limited. These sites
attempt to eliminate anonymous attacks by forcing users to register
with their real names. Enforcement of the real-name requirement is
imperfect, but the majority of users are identifiable. And each of the
sites is designed to be somewhat privacy protective: MySpace re-
quires users to register and log in before they can view most photos,
and Facebook shows very little information to unregistered users.
Offensive comments may be seen by friends and peers, but often only
temporarily. And most comments made within Facebook or My-
Space are not currently indexed by Google, limiting the reach of the
attack (at least for now).
In order to avoid the privacy-protective features of social net-
working sites, many attackers launch their attack from other websites
used by the friends and peers of the victim. These websites often
have fewer privacy protections than the social networking sites, and
some are even designed to empower anonymous online smears.
These sites are usually targeted at a particular community of which
the victim is a member—perhaps a discussion site for the victim’s
college classmates, an unofficial gossip board for the employees of a
particular large company, or an unfiltered message board targeted at
aspiring doctors or lawyers. These discussion sites often allow an
anonymous attack to reach a wide swath of the victim’s peers and col-
leagues.
For example, the now-defunct site JuicyCampus.com marketed
itself as a gossip hub for college students, complete with subsites for
almost every U.S. college. The site’s homepage bragged that the site
was “totally anonymous—no registration, login, or e-mail verification
required.” Students were encouraged to anonymously submit short
tidbits of gossip, which were then displayed to other students. Pre-
dictably enough, the site became home to vast amounts of scandal
and innuendo. One typical JuicyCampus post claimed that “[name]
is the biggest fag/dick in [dorm]. agree?” Another typical post listed
eight women “guaranteed to [have sex] on the first night,” described
by full name and residence. Another series of posts attempted to
Types of Internet Attacks 13 5