Interesting People mailing list archives
Re: P2P Leak Compromises White House Security
From: David Farber <dave () farber net>
Date: Thu, 30 Jul 2009 07:30:18 -0400
Begin forwarded message: From: "David P. Reed" <dpreed () reed com> Date: July 30, 2009 7:12:42 AM EDT To: dave () farber net Cc: ip <ip () v2 listbox com> Subject: Re: [IP] P2P Leak Compromises White House SecurityWhoever is orchestrating this technological deception clearly has an agenda - we just don't know who or what it is.
As someone who knows a lot about technology and security, along with many others on this list, I would suggest that if such material leaked over Limewire, the fault is not with Limewire.
To leap to the conclusion that "P2P" is the *cause* or even the *solution* is absurd. The problem is almost certainly the use of machines with consumer operating systems to hold critical data. John Deutsch's case illustrated this many years ago - here's a senior executive in the most sensitive branch of gov't using an Apple computer of his own to hold top secret information in his home.
I'm reasonably certain that the source of this stuff came from a consumer machine being trusted with files and emails, while running Microsoft or Apple operating systems - which encourage the use of applications that have full access to ALL of the user's files - whether that application is Twitter, LimeWire, or Internet Explorer.
On 07/30/2009 06:42 AM, David Farber wrote:
Begin forwarded message: From: Labmanager <labmanager () gmail com> Date: July 30, 2009 12:31:54 AM EDT To: dave () farber net Subject: P2P Leak Compromises White House Security http://www.computerworld.com/s/article/9136053/Details_on_presidential_motorcades_safe_house_for_First_Family_leak_via_P2P?taxonomyId=1Details on presidential motorcades, safe house for First Family, leak via P2PDetails about a U.S. Secret Service safe house for the First Family -- to be used in a national emergency -- were found to have leaked out on a LimeWire file-sharing network recently, members of the House Oversight and Government Reform Committee were told this morning. Also unearthed on LimeWire networks in recent days were presidential motorcade routes and a sensitive but unclassified document listing details on every nuclear facility in the country, Robert Boback, CEO of Tiversa Inc. told committee members.The disclosures prompted the chairman of the committee, Rep. Edolphus Towns, (D-N.Y.), to call for a ban on the use of peer-to- peer (P2P) software on all government and contractor computers and networks. "For our sensitive government information, the risk is simply too great to ignore," said Towns who plans to introduce a bill to enforce just such a P2P ban...<snip> Archives
------------------------------------------- Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.com/member/archive/rss/247/ Powered by Listbox: http://www.listbox.com
Current thread:
- P2P Leak Compromises White House Security David Farber (Jul 30)
- <Possible follow-ups>
- Re: P2P Leak Compromises White House Security David Farber (Jul 30)