tag:blogger.com,1999:blog-5383512304639632735.post6477386083066573260..comments2024-01-23T07:34:52.253-08:00Comments on Copyrights & Campaigns: House Ethics Committee staffer used peer-to-peer software; 'shared' confidential documentBen Sheffnerhttp://www.blogger.com/profile/06477793715765992689noreply@blogger.comBlogger15125tag:blogger.com,1999:blog-5383512304639632735.post-46541934059300198042009-11-05T05:36:07.253-08:002009-11-05T05:36:07.253-08:00Ben, I realize that the Darwinians will probably f...Ben, I realize that the Darwinians will probably feel that the gene pool is replenished by dimissively pinning responsibility for the Ethics Committee document "sharing" on someone "junior" or on someone who is "stupid". That's kind of like saying all of Madoff's investors should have known better, so why prosecute Madoff because his investors were too stupid to catch him.<br /><br />Analogies aside, the Ethics Committee failure is not with the junior person, the failure is with the senior people. If the Tenenbaum case provides any insight into the intellectual training provided by colleges regarding the wisdom of file sharing, I think we can all feel grateful that no one has had to explain to "juniors" why nuclear missle launch codes is information that does not really want to be free.<br /><br />As one computer security guy told me once, the best online security is to be offline. If the network is going to be online, then it is the responsibility of the senior staff to enforce network rules about what personal software can be installed on government computers. I know that is certainly what I think I pay them for, at a minimum.<br /><br />One would think that anti-espionage rules would prevent the opportunity for these leaks. I'd like to know exactly which House rule was violated when the p2p software was installed--if any. And if there wasn't one, there should have been. I suspect there wasn't such a rule. And that would not be the fault of the junior person.<br /><br />As usual--different spanks for different ranks.Chris Castlehttps://www.blogger.com/profile/09652154277551773055noreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-49246861556402298922009-10-31T12:26:10.946-07:002009-10-31T12:26:10.946-07:00You're all missing the point.
The fact that ...You're all missing the point. <br /><br />The fact that P2P software was involved in this breach is completely irrelevant, and is only being brought up to spark interest in yet another stupid incident involving an intern, which would otherwise not be interesting at all. Its a consipracy by interns to become more important. You should protest by not ever mentioning this incident again. Also, you could just walk up to an intern at your office, and punch him in the face.Bob Mcphersonhttp://www.thetopic.netnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-68472444519381020362009-10-31T12:19:45.591-07:002009-10-31T12:19:45.591-07:00I thought overton was being cynical.I thought overton was being cynical.BubbaTnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-72950763265862113672009-10-31T12:13:09.899-07:002009-10-31T12:13:09.899-07:00Trouble starts with T, and that rhymes with P, and...Trouble starts with T, and that rhymes with P, and that stands for P2P, right? That we allow articles like this to be framed as a debate on the evils of IP theft is as unsurprising as it is offensive. Some kid was sloppy and breached security; that's it. He could as easily have left his jump drive at a McDonald's.<br /><br />American and Brit culture both exalt feigned super-morality and hyperbolic lobbying as "the way the world works." If something isn't profitable, it's okay to claim it's dangerous, or at least useless. Articles like this are perfect opportunities to take back rational debate from those who seek to control IP for profit. "Taking the high road" is nice, but sometimes we need to use their tools to get their attention. I promise you won't go to hell for the judicious use of condescension and derision. =)<br /><br />But since we're on the topic, I like that the world offers checks on evil profit overlords. P2P:RIAA as bankruptcy:creditors, baby!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-34516151314721841852009-10-31T11:28:58.183-07:002009-10-31T11:28:58.183-07:00Sometimes it's just easier to share the "...Sometimes it's just easier to share the "C drive". You know how it is. -eyes rolled skyward-Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-3162176811604650892009-10-31T05:21:50.052-07:002009-10-31T05:21:50.052-07:00"Some of these P2P systems share the whole ma..."Some of these P2P systems share the whole machine by default"<br />No overton, no P2P application shares the root folder by default. I have some basic knowledge of Shareaza, LimeWire, Ares Galaxy, eMule, FrostWire and gtk-gnutella, and none of these applications does this. In fact many implement additional security features which prevent users from inadvertently sharing sensitive folders or file types. Feel free to prove me wrong by giving a simple P2P servent example that shares the root folder by default.<br /><br />As for Sydnor (the behavior of this guy was already discussed here before), the URL you provided is crystal clear. He modified default permissions of a previous version of LimeWire, uninstalled it, then installed version 5 which is very restrictive about the files one can share by default, and since that version kept relying on the config file of the previous version (which is the normal thing to do) he pretended that LW was dangerous. Some may call this a lie from a paid attack dog, others tend to call it "legitimate, ethical" lobbying.<br /><br />So talking about ethics, I think the choice is easy to make between the guy who shared files and some lobbyists. Besides I upload over one or two gigabytes per day (and I limit my upload bandwidth, otherwise it could well be much more than that), and only legal stuff, so indeed, P2P has purely legal uses. Finally, illegal doesn't necessarily mean unethical, but hey, this comment is already too long...Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-79101004886646539522009-10-30T23:25:48.906-07:002009-10-30T23:25:48.906-07:00"In fact the technology has many legitimate u..."In fact the technology has many legitimate uses. "<br /><br />The inconceivable amount of copyright infringement aside, what exactly would those uses be? Skype, WoW patches, and linux isos? I'd venture a guess that a miniscule percentage of P2P traffic qualifies as legitimate.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-73593124909478543202009-10-30T23:12:02.529-07:002009-10-30T23:12:02.529-07:00The Washington Post's reporting makes clear th...The Washington Post's reporting makes clear that the staffer was indeed responsible:<br /><br />http://www.washingtonpost.com/wp-dyn/content/article/2009/10/30/AR2009103003749.html?hpid=topnews<br /><br />"The staff member was fired this week. She told committee leaders she had saved a copy of the investigation summary to her personal computer without realizing it, a congressional source said, speaking on the condition of anonymity because of the sensitivity of the matter. The file was stored in a part of her computer files where peer-to-peer file-sharing software could operate, but she told the leaders that she did not realize that it was actively running."Ben Sheffnerhttps://www.blogger.com/profile/06477793715765992689noreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-70141708746437163092009-10-30T23:08:03.817-07:002009-10-30T23:08:03.817-07:00Do we even know yet if the computer is a shared co...Do we even know yet if the computer is a shared computer or controlled strictly by the staffer?<br /><br />Without such knowledge, it seems premature to make the broad assumptions articulated in Ben's post.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-39839531928862264402009-10-30T22:23:10.650-07:002009-10-30T22:23:10.650-07:00Thank goodness this was a pretty harmless leak unl...Thank goodness this was a pretty harmless leak unlike the leaks by US Antartica Program employees which resulting in the <a href="http://news.softpedia.com/news/No-P2P-File-Sharing-in-Antarctica-119594.shtml" rel="nofollow">US banning those employees from using P2P</a>. The USAP employees shared "data of the Obama presidential safe houses, the first family's motorcade routes and several leaked documents that contained detailed locations of all the US nuclear facilities." <br /><br />@Anonymous<br />Do you really think this staffer was using the P2P for solely legal sharing? The strong odds are that the staffer was using it to download copyrighted media. Until most people use P2P for solely legal means, I think it's completely "justified" to assume it was for nefarious purposes. <br /><br /><a href="http://nextgencopyright.blogspot.com/" rel="nofollow">Copyright in the Internet Age</a>Kevinhttps://www.blogger.com/profile/06901954211843682684noreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-61157675082397285802009-10-30T19:13:09.277-07:002009-10-30T19:13:09.277-07:00Ben I think your implied attack on the use of peer...Ben I think your implied attack on the use of peer to peer technology being potentially unethical is completely unjustified. In fact the technology has many legitimate uses. Just look at Skype for example, a fine example of P2P.<br /><br />Do you support technological freedom to innovate using P2P or not?<br /><br />The actions of the staffer cannot be excused however, it is merely a case of a security breach which is all too commonplace in both government and the private sector.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-29355065274190190512009-10-30T15:36:06.637-07:002009-10-30T15:36:06.637-07:00Wow...that's a doozy.Wow...that's a doozy.Chrystalhttp://www.cashprior.comnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-22462833919196828442009-10-30T08:47:11.596-07:002009-10-30T08:47:11.596-07:00Another P2P canard.
Really, Ben, if someone is st...Another P2P canard.<br /><br />Really, Ben, if someone is stupid enough to leave their house or car unlocked, should we outlaw houses and cars?<br /><br />You may as well outlaw stupidity itself. That would surely solve the a lot of problems in this world, right? ;-)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-38019716931117230492009-10-30T08:14:02.716-07:002009-10-30T08:14:02.716-07:00Ditto overton. All kinds of private information a...Ditto overton. All kinds of private information and media files are shared over p2p unknowingly.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5383512304639632735.post-71194883892938552612009-10-30T04:20:34.027-07:002009-10-30T04:20:34.027-07:00Some of these P2P systems share the whole machine ...Some of these P2P systems share the whole machine by default.<br />http://www.theregister.co.uk/2009/07/30/house_committee_oversight_government_reform_p2p_security_hearing/overtonhttp://professor-moriarty.comnoreply@blogger.com