Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Government United States News Technology

P2P Network Exposes Obama's Safehouse Location 307

Lucas123 writes "The location of the safe house used in times of emergency for the First Family was leaked on a LimeWire file-sharing network recently, a fact revealed today to members of the House Oversight and Government Reform Committee. Along with the safe house location, the LimeWire networks also disclosed presidential motorcade routes, as well as sensitive but unclassified document that listed details on every nuclear facility in the country. Now lawmakers are considering a bill to ban P2P use on government, contractor networks."
This discussion has been archived. No new comments can be posted.

P2P Network Exposes Obama's Safehouse Location

Comments Filter:
  • And? (Score:5, Informative)

    by Vinegar Joe ( 998110 ) on Wednesday July 29, 2009 @04:29PM (#28872807)

    Biden has already told the press the secret location of the VP's emergency bunker.

    http://blog.newsweek.com/blogs/thegaggle/archive/2009/05/15/shining-light-on-cheney-s-hideaway.aspx [newsweek.com]

  • Re:And? (Score:3, Informative)

    by Lazlo Woodbine ( 54822 ) on Wednesday July 29, 2009 @04:49PM (#28873219)
    Years [bbc.co.uk] after BBC broadcast it to the world.
  • Re:ban the man (Score:5, Informative)

    by NotBornYesterday ( 1093817 ) * on Wednesday July 29, 2009 @04:56PM (#28873349) Journal
    You say this as a joke, but that's what members of congress are actually talking about. FTFA:

    Towns [House Oversight and Government Reform Committee chairman Rep. Edolphus Towns, (D-N.Y.)] said that the file-sharing industry's promises to self-regulate itself had clearly failed. "Specific examples of recent LimeWire leaks range from appalling to shocking," Towns said. "As far as I am concerned, the days of self-regulation should be over for the file-sharing industry."

    Saying "the days of self-regulation should be over" is congresscritterspeak for "we're about to regulate another industry", which in this case would be a) bad, b) useless, and c) undeserved. Bad because it would stymie technical development in the US, and useless because said development would then simply take place elsewhere in the world. Undeserved, because Limewire did not attempt to spread US government secrets. Their software was simply the mechanism by which some idiot (presumably a government-employed idiot, but that would be redundant) knowingly or unknowingly loosed this material into the wild.

    Other members want the issue investigated by the Federal Trade Commission, the Securities and Exchange Commission and law enforcement authorities. They said that the continued failure by companies such as LimeWire to take more proactive steps to stop inadvertent file-sharing is tantamount to enabling illegal activity resulting from the data leaks.

    And how do they propose that Limewire prevent sharers from sharing government secrets? By sending someone to each Limewire installation to make sure the luser configured it correctly? To the power-grabbing, meglomaniacal nanny state committee-rats in congress, here's an idea: clean your own house first. Clamp down on those with the poor judgment to run p2p sharing apps on systems that have sensitive data. Is there a rule against it? No? Make one. Yes? Enforce it. Hell, ban p2p on all govt systems, sensitive or not, and enforce it like the matter of national security it is.

  • Two points... (Score:3, Informative)

    by rickb928 ( 945187 ) on Wednesday July 29, 2009 @05:05PM (#28873519) Homepage Journal

    1. I was blocking Limewire (and Kazaa, etc.) traffic for clients with substantially less security exposure for years and years. Most P2P networks are just hives of viruses, malware, exploits, illict file sharing, and worse. My clients pretty much expected it. Of course, blocking Webshots gots people a little hot, but they get over it.

    2. Any bets that the actual culprit was a security wonk, figuring they were smarter than the rest of the world? Very few of the 'security' folk I've worked with actually practiced what they preached. And most either wandered from job to job, or lasted only until the first noticeable breach. One of my former clients made the news a few months ago, because someone was putting USB keys into their corporate servers. Even the PKI repository. Apparently they thought a free utility they got from a friend at a user group was really useful. Not.

  • Re:ban the man (Score:5, Informative)

    by Anonymous Coward on Wednesday July 29, 2009 @05:35PM (#28874017)

    I work for a defense contractor. We have sensitive government data on our networks because of the nature of the work we do, and the only thing we're allowed to do to the internet is make http and https connections through a heavily firewalled and restrictive proxy, so that not only we can't leak stuff out on purpose with filesharing software, but so that commercial software can't phone home and give away something it shouldn't even by accident. Not to mentioned that we sign an NDA when we hire on that explicitly says we (individual employees) will not leak stuff out or through carelessness allow stuff to be leaked out. In my opinion whoever leaked this stuff out onto limewire probably broke several federal laws already on the books and might be looking at jail time.

  • by LWATCDR ( 28044 ) on Wednesday July 29, 2009 @05:39PM (#28874061) Homepage Journal

    They are not banning P2P they are banning running it on government PCs and contractors PCs.
    Frankly any company that allowed it's employees to put Limewire on a work PC shouldn't be a government contractor.

  • Re:ban the man (Score:2, Informative)

    by davester666 ( 731373 ) on Wednesday July 29, 2009 @05:54PM (#28874289) Journal

    Um, I use Transmission on MacOS X as my bittorrent client, and from my understanding of how bittorrent works (just having used bittorrent clients, not having examined the actual protocol at all), you can't accidentally 'share' files on your computer. You have to explicitly create a torrent file for the said file/folder, send it to somebody else or post it somewhere, and then leave your bittorrent client software open and running to be able to transfer your own files to others.

    Other protocols automatically and/or fairly easily will share some/all files/folders on your local computer with everyone (or with some kind of permission structure) without needing the end-user to explicitly upload/send anything to other people.

  • by KiboMaster ( 129566 ) on Wednesday July 29, 2009 @08:45PM (#28876127) Homepage
    Someone should introduce Congress to the FISMA [wikipedia.org] act of 2002, which mandates that federal agencies control for this kind of stuff. As part of my work at the DoD I occasionally audit non military systems. In the past this has included systems for the IRS, DHS and FBI. All of them are required to comply with FISMA regulations, specifically NIST 800-53 [nist.gov]. The relevant section, Appendix F Section SA-6 page F-222 (or page 293, for those reading the PDF) states:

    The organization controls and documents the use of publicly accessible peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.

    Now, I realize that's highly generic, but it's up to the organizational unit to write some sort of policy around the guidance. If they aren't able to do that, they're not in compliance with FISMA and the GAO should rightly be sticking a rather large boot up their ass [slashdot.org].

  • Re:ban the man (Score:4, Informative)

    by davidphogan74 ( 623610 ) on Wednesday July 29, 2009 @08:52PM (#28876195) Homepage
    A blanket ban on all P2P programs is still overkill, and not at all necessary. Bittorrent programs are P2P by definition, but you're not going to accidentally share a file with them any more than you're going to accidentally install Linux because of them.
  • Re:ban the man (Score:3, Informative)

    by TheCabal ( 215908 ) on Wednesday July 29, 2009 @10:32PM (#28876859) Journal

    You sir, are wrong. You have startling amount of misinformation on sensitive document handling. You scare me.

    There is no "Classified or higher". It is either classified or it is not. "Classified" is not a classification.

    Personally Identifiable Information (PII) is unclassified but considered sensitive, and an official incident is filed when there is possibility that PII has been disclosed. There is also Unclassified Controlled Nuclear Information (UCNI), which by definition is unclassified but sensitive and subject to the Atomic Energy Act. Plus there is FOUO, SBU and CUI- all "unclassified", but considered sensitive.

    If the document was declassified, then there will be a paper trail as to who declassified it an when. Should be easy since there are few people in the document chain that can legally declassify documents.

  • by jsalbre ( 663115 ) <jsalbre&gmail,com> on Thursday July 30, 2009 @09:37AM (#28881073) Homepage Journal

    You're joking, right?

    Almost every computer that handles classified information for the DoD is connected to a network. Not the Internet of course, but SIPRNET or one of the 30 or so other classified networks, depending on classification level and other considerations. I don't recall ever needing "a key, a passcard, and supervision" to access any of them, just a user name and password, like every other computer.

    Damn near nothing is paper only anymore, and any time I needed a copy of a document I clicked the "print" button in Word or Acrobat, walked over to the printer and grabbed it. And yep, I can email them too! Only to accounts on the same network of course, and I am ultimately responsible for determining whether or not the recepient has the appropriate clearance and need to know, but it's that simple.

    Lots of things are sensitve but unclassified (also known as SBU).

    I hate calling people out like this, but you're spouting lots of FUD. You're either intentionally lying about how things work, or you've never had any contact with anything classified and are rattling off garbage that you either made up or pulled from some crappy novel.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...