Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday November 02 2019, @08:54PM   Printer-friendly
from the Lime-Wire-Sticque dept.

[Editor's Note: This is a little different from our usual offerings, but if you have 10 minutes to spare, it is an interesting read. It explains how users of Limewire - a file sharing program popular 20 or so years ago - were unintionally leaking personal and private data which gave one person an idea that just grew and grew.]

Long, interesting story on cyber-security, in The New Yorker magazine.

Before Robert Boback got into the field of cybersecurity, he was a practicing chiropractor in the town of Sewickley, Pennsylvania, twelve miles northwest of Pittsburgh. He was also selling used cars on eBay and flipping houses purchased at police auctions. The decision to branch out into computers came in 2003, after he watched a "60 Minutes" report by Lesley Stahl about pirated movies. For years, while digital piracy was devastating the music industry, Hollywood had largely been spared; limitations on bandwidth curtailed the online trade in movies. But this was changing, Stahl noted: "The people running America's movie studios know that if they don't do something, fast, they could be in the same boat as the record companies.

The story gets more interesting. Bob visits Langley.

Inside, the head of the Directorate of Science and Technology was joined by an official representing In-Q-Tel, a corporation that the C.I.A. had set up to fund new technologies. (The "Q" refers to the technician in James Bond films.) A follow-up call from one of the participants led to more trips to D.C., and suddenly Boback and Hopkins were journeying through the shadow world of the post-9/11 national-security establishment.

And, file-sharing detection as a service.

Tiversa's prominent supporters quickly helped Boback assemble an impressive client list: Capital One, Lehman Brothers, Goldman Sachs, American Express. The companies were paying for a monthly monitoring service, in which Tiversa scanned for breached corporate information, or the personal data of top executives. By this time, EagleVision X1 could access more than a million users, and its capabilities were expanding. Because peer-to-peer networks were constantly in flux, as people turned their computers on and off,
Hopkins had designed a stable repository for the system, which became known as the Data Store. EagleVision X1, programmed with search terms that were set for clients (for instance, "Lloyd Blankfein," for Goldman Sachs), would scour the networks, then deposit what it found in the Data Store. Each file was labelled to indicate when it was downloaded and what I.P. address it came from, so that its behavior could be tracked—if it remained in the same location, or if it was being shared, or if it suddenly vanished.

What happens to this respository is one of the interesting, and unanswered, questions in the article. Suffice it to say, it does not end well, to get people to buy data security services, sometimes you have to scare them by stealing or faking a theft of their data. Interesting read.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by barbara hudson on Sunday November 03 2019, @01:12AM (1 child)

    by barbara hudson (6443) <barbara.Jane.hudson@icloud.com> on Sunday November 03 2019, @01:12AM (#915180) Journal
    We all know that a lot of tech is just smoke and mirrors, mundane stuff hyped like crazy for a payout, and the higher ups are masters of BS. Anyone thinking that the industry isn't dirty is naive. We need more stories like this.
    --
    SoylentNews is social media. Says so right in the slogan. Soylentnews is people, not tech.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 1) by khallow on Sunday November 03 2019, @10:59AM

    by khallow (3766) Subscriber Badge on Sunday November 03 2019, @10:59AM (#915283) Journal
    What's interesting here is how deeply it supposedly penetrated the private-facing side of US intelligence. I wonder if perhaps the real value add of his chicanery was to pull in politicians and get them spending on US intelligence projects.