RSS

Sensitive data WikiLeaks gets from P2P networks

25 Jan

Not all confidential documents published by WikiLeaks last few years have been received from anonymous informants, said the firm Tiversa. There is evidence that at least some of the documents were obtained by searching the WikiLeaks peer networks produced by them.
Tiversa statements were immediately rejected by Mark Stevens, a lawyer WikiLeaks, who told Bloomberg News, that they are “absolutely false in every respect.”
Tiversa, whose clients are the FBI, helps organizations monitor P2P networks for the search data leak.
Over the past few years, the company opened a few sensational examples of placement of confidential information in the network share.

For example, in 2009, Tiversa announced to Congress that found the data, U.S. Secret Service on the safe house of the President of Families USA, along with routes motorcade of the president, Network Lime-Wire. Earlier in the year Tiversa announced that they had found classified information about President’s helicopter Marine One viewing files in the P2P network.
Director Scott Tiversa Herrer said that the company security unearthed countless confidential documents in the networks of P2P, which were later published by WikiLeaks. Site discredit claims that all these documents were anonymously “merged”.
For example, in 2009 WikiLeaks published a document which discloses confidential information about the upgrading of infrastructure in the Pacific Missile Range Facility in Hawaii, the Pentagon. WikiLeaks claim to have received a document from the source, although it was available in the P2P network for at least 2 months prior to placing them, according to reports Bloomberg.
Bloomberg also cited the placement of WikiLeaks what was called “leaked” settlement document, which contained detailed information about potential targets of terrorists in Fresno, California. Report says that the data was inadvertently posted online file sharing Californian government officials in August 2008.
In an interview granted Herrer 2 more examples for Computerworld.
He said that publishing tools Computer Online Forensics Evidence Extractor (COFEE), Microsoft and the included documentation in November 2009 on WikiLeaks has happened a few weeks after the information became available in the networks of P2P. Statement by WikiLeaks about the document, Microsoft said that the document was obtained from a source, though it seems related to its initial availability in peer networks.
Herrer added that Tiversa last watched a few targeted searches in P2P networks, confidential information, committed with the PCs with Swedish IP addresses. In virtually all cases, computers are looking for information, and later published on WikiLeaks, added Herrer.
“For us it is obvious that many publications WikiLeaks taken from P2P networks,” – he said. “We, in fact, knew it since they began work in 2006.”
According to Tiversa and other companies to ensure security, P2P networks have become a treasure of information for thieves and data collectors. In most cases all you need to collect information – it is the introduction of a few key words in the search string. Often such a hunt for information is not illegal, because the information is already publicly available to everyone on the network, said Herrer.

The main question – is not a way to WikiLeaks to get this information, and what they can do with it, “said Eric Johnson, professor of management at Tuck School of Business at Dartmouth College.
“I can fully believe that the information from P2P appears ultimately to WikiLeaks – said Johnson, who testified in the case before Congress. He also added that the most important thing – that WikiLeaks, offers an entirely new channel for such leaks. ”
“For the director of investment one of the 500 largest U.S. companies, no matter how WikiLeaks to acquire the information”, – said Johnson. “In fact, a matter that WikiLeaks can increase the spread of this information thousands of times.”

 
Leave a comment

Posted by on January 25, 2011 in Historical

 

Tags: , ,

Leave a Reply

Your email address will not be published. Required fields are marked *