Interesting People mailing list archives

Re: P2P Leak Compromises White House Security


From: David Farber <dave () farber net>
Date: Thu, 30 Jul 2009 07:30:18 -0400



Begin forwarded message:

From: "David P. Reed" <dpreed () reed com>
Date: July 30, 2009 7:12:42 AM EDT
To: dave () farber net
Cc: ip <ip () v2 listbox com>
Subject: Re: [IP] P2P Leak Compromises White House Security

Whoever is orchestrating this technological deception clearly has an agenda - we just don't know who or what it is.

As someone who knows a lot about technology and security, along with many others on this list, I would suggest that if such material leaked over Limewire, the fault is not with Limewire.

To leap to the conclusion that "P2P" is the *cause* or even the *solution* is absurd. The problem is almost certainly the use of machines with consumer operating systems to hold critical data. John Deutsch's case illustrated this many years ago - here's a senior executive in the most sensitive branch of gov't using an Apple computer of his own to hold top secret information in his home.

I'm reasonably certain that the source of this stuff came from a consumer machine being trusted with files and emails, while running Microsoft or Apple operating systems - which encourage the use of applications that have full access to ALL of the user's files - whether that application is Twitter, LimeWire, or Internet Explorer.

On 07/30/2009 06:42 AM, David Farber wrote:



Begin forwarded message:

From: Labmanager <labmanager () gmail com>
Date: July 30, 2009 12:31:54 AM EDT
To: dave () farber net
Subject: P2P Leak Compromises White House Security

http://www.computerworld.com/s/article/9136053/Details_on_presidential_motorcades_safe_house_for_First_Family_leak_via_P2P?taxonomyId=1

Details on presidential motorcades, safe house for First Family, leak via P2P


Details about a U.S. Secret Service safe house for the First Family -- to be used in a national emergency -- were found to have leaked out on a LimeWire file-sharing network recently, members of the House Oversight and Government Reform Committee were told this morning. Also unearthed on LimeWire networks in recent days were presidential motorcade routes and a sensitive but unclassified document listing details on every nuclear facility in the country, Robert Boback, CEO of Tiversa Inc. told committee members.

The disclosures prompted the chairman of the committee, Rep. Edolphus Towns, (D-N.Y.), to call for a ban on the use of peer-to- peer (P2P) software on all government and contractor computers and networks. "For our sensitive government information, the risk is simply too great to ignore," said Towns who plans to introduce a bill to enforce just such a P2P ban...

<snip>


Archives        




-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
RSS Feed: https://www.listbox.com/member/archive/rss/247/
Powered by Listbox: http://www.listbox.com

Current thread: