TPM Victim of DDOS Attack

Talking Points Memo's Josh Marshall confirms that his site has been down since 5 pm owing to a distributed denial of service (DDOS) attack.

Talking Points Memo‘s Josh Marshall confirms that his site has been down since 5 pm owing to a distributed denial of service (DDOS) attack. Presumably, this is related to TPM’s publication this morning of a story titled “Anonymous Unmasked: Mugshots of the Faces the Feds Say Are Part Of The ‘Hactivist’ Group.”

Good luck to Josh in getting up and running soon. This is an outrageous, if unsurprising, attack on the free press.

FILED UNDER: Blogosphere, Quick Takes
James Joyner
About James Joyner
James Joyner is Professor and Department Head of Security Studies at Marine Corps University's Command and Staff College and a nonresident senior fellow at the Scowcroft Center for Strategy and Security at the Atlantic Council. He's a former Army officer and Desert Storm vet. Views expressed here are his own. Follow James on Twitter @DrJJoyner.

Comments

  1. Neil Hudelson says:

    Speaking of possible hacks…when I clicked on the “Egyptian Protesters Attack Israeli Embassy” link from the homepage, I was redirected to a site with the address (DO NOT CLICK) “http://facebinks.com/ads.php” (DO NOT CLICK!) and a very large advertisement for a free ipad 2. When trying to navigate away I was repeatedly stopped. Just an FYI. I have a screen shot of it if helps at all.

    I had no other sites running btw, but its not impossible that its just my computer infected.

  2. James Joyner says:

    @Neil Hudelson: Ugh. None of my ads are supposed to pop over content, but some of the networks don’t do a good job of policing. And different users get different ads, making it very hard to investigate/replicate.

  3. Neil Hudelson says:

    No worries. Stellar content makes an occasional stubborn ad worthwhile :-).

  4. Let’s not forget what we’re largely dealing with. It’s a DDoS. This is the technological equivalent of a spitball fight. A potentially devastating one, but these are not as sophisticated as people make them out to be.

  5. James Joyner says:

    @Christopher Bowen: Sure. But they can take down sites for hours, sometimes days, and cost money to fight. Additionally, sites on shared hosting are often booted altogether when they come under a DDoS because hosting companies don’t want to fool with them or risk the wrath of their other customers.

  6. Janis Gore says:

    I had that, too, Neil. So it’s not just you. It came up only once around 11 a.m.(?) this morning.

  7. Davebo says:

    Additionally, sites on shared hosting are often booted altogether when they come under a DDoS because hosting companies don’t want to fool with them or risk the wrath of their other customers.

    Then you are using the wrong host. DDoS attacks can be thwarted fairly easily by competent hosting companies. Cheap hosting brings lousy service.

  8. James Joyner says:

    @Davebo: Cheap hosting is all most sites can justify. I started OTB on an $8/month shared host (HostingMatters) and kept it there for quite some time. I’ve gradually ratcheted up but it’s very expensive when you get into dedicated servers with adequate support. And I had horrible experience even there with RackSpace, which is outrageously expensive and still couldn’t handle the traffic.

  9. @Davebo: James is right. There’s a noticeable jump between paying for shared hosting and getting a private server with support. A VPS (virtual private server) can mitigate some of those costs, but I’m not a big believer in them.