Gen. Wesley Clark Testifies Peer-to-Peer Networks

<p><strong>Washington, D.C. &mdash; July 31</strong><br />According to retired Gen. Wesley Clark, peer-to-peer&nbsp; (P2P) networks are the new national security risks for the United States. &nbsp;</p><p>&quot;We found more than 200 classified government documents in a few hours search over peer-to-peer networks,&quot; he said at a recent Government<br />Reform Committee hearing. &quot;We found everything from Pentagon network server secrets to other sensitive information on peer-to-peer networks hackers dream about.&quot;</p><p>Clark is now the chairman and CEO of Wesley K. Clark &amp; Associates, as well as a board member of Tiversa Inc., which conducts 350 million searches a day.</p><p>&quot;If everyone knew the scope of the risk of P2P networks, America would be outraged and demand solutions,&quot; he said.</p><p>Clark suggested regulation and mandatory defensive active monitoring programs, especially for sensitive<br />government documents. </p><p>&quot;If you wait for the lawsuit, you have waited too<br />long,&quot; he said.</p><p>Additionally, Clark said many national information security leaks were fresh, complete and often were distributed on home computers over P2P networks.<br /><br />Chairman Henry Waxman, D-Calif., investigating the P2P networks invited LimeWire and StreamCast to testify, as well as other interested experts on illegal file sharing before the Houses of Representatives Committee on Oversight and Government Reform. </p><p>Last March, the Patent and Trademark Office released a study that revealed inadvertent file sharing continued to threaten individual privacy and national security.<br /><br />&quot;This is the new threat to Homeland Security,&quot; Tiversa CEO Robert Boback said at the hearing. &quot;We found thousands of corporate cases, from banking statements, server passwords, financial data, public company data, human<br />resources, medical records and Fortune 500 company minutes on compliance.&quot;</p><p>SafeMedia Corp. Chairman Safwat Fahmy said users often are unaware they are participating in file sharing.&nbsp; </p><p>&quot;One of the defining characteristics of contaminated networks is that users rarely ever know that they are sharing the files on their computer with other users on the network,&quot; Fahmy said in his written testimony on how SafeMedia&#39;s technology was developed to address illegal sharing of copyrighted materials on contaminated P2P networks. &quot;Our technology eliminates all the identity theft and security risks of contaminated P2P networks that affect consumers, students, businesses and our national security.</p><p>&quot;P2P networks, in order to work and survive, requires that all users share files. If users are unable to share files to be downloaded, then the network would be pointless and cease to exist. So, the developers of the P2P software create a directory on the user&#39;s computer called &#39;shared&#39; to be uploaded on demand to any user on&nbsp; the entire network most often without the user knowledge, at the time of installation.&quot;<br /><br />In a study, researchers examined bank-related documents and found circulating sensitive data as bank statements, credit reporting agency records, user ID and password lists and tax returns were inadvertently &quot;shared&quot; with millions of people. </p><p>There was also evidence of sensitive government information being distributed through P2P networks over two months.<br /><br />&quot;At SafeMedia, we have developed business solutions combining P2P disaggregator technology (P2PD) and a digital Internet distribution solution (DIDS) that prevents contaminated P2P networks from indiscriminately being accessed by users&#39; computers,&quot; Fahmy said. &quot;Our solutions utilize advanced technologies such as adaptive<br />fingerprinting and DNA markers; adaptive network patterns; intelligent libraries; remote update and self-healing to effectively drop all contaminated P2P traffic with no invasion of user privacy. </p><p>&quot;P2PD is fully effective at forensically discriminating between contaminated and noncontaminated P2P traffic with no false positives whether encrypted or not &mdash; P2PD operates at network speed with little or no latency. The purpose of P2PD technology is not to shut down P2P<br />networks or inhibit P2P technology &mdash; we allow traffic from noncontaminated P2P to pass to its destination we only drop traffic to and from contaminated P2P networks.&quot;</p>

Like what you see? Share it.Google+LinkedInFacebookRedditTwitterEmail
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment: