Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Is your computer inviting voyeurs?
msnbc.com/news/686184.asp?pne=msn ^ | Jan. 14, 2002 | Bob Sullivan

Posted on 01/16/2002 11:33:50 AM PST by American Preservative

Is your computer inviting voyeurs?

Embarrassing, private text files find their way onto the Net

By Bob Sullivan
MSNBC
Jan. 14 — There it was, just sitting out there on the Internet, for all to see. “The keys to the condo are located in a lock box mounted on the wall outside the entry door. The combination is 0-8-3-6.” The recipient of the instructions, Catalina, is only weeks away from a long-awaited vacation at a ski resort, but she had no idea that her computer was telling the world where she was going, when she would be there, and how to break into her rental condo until MSNBC.com contacted her.

WHEN YOU LEAVE for vacation, you certainly don’t want the world to know when and where you are going. But that’s one of the unintended consequences of file-sharing programs with names like Gnotella and BearShare.
The programs are essentially software front-ends to a file-sharing system known as Gnutella — it’s not quite heir to the Napster throne, but a place where plenty of free, illegal music swapping still goes on.
But music isn’t the only thing being shared. Videos, audio files, even text documents and spreadsheets can be swapped — and often are, by accident.
It’s akin to taking the Microsoft Windows “My Documents” folder and placing it out on the Internet for all to see.
Monte Phillips, retired hobbyist and former Air Force radar technician, has made himself into a one-man posse who hunts down such recklessly broadcast information and warns potential victims. He passed Catalina’s condo reservation confirmation letter to MSNBC.com.

SENSITIVE INFORMATION
But Phillips has seen much worse in his surfing. He regularly spots personal letters and memos, files containing various usernames and passwords, Word documents containing bank account numbers with PIN numbers. Once he learned about intense negotiations taking place between a small Canadian firm and a major U.S. energy company.
Compromised business documents can’t compare to the government information he says he’s spotted, however. Among them, over 200 case files and private correspondence from a Texas district attorney’s office, files from a computer at an Army base in Korea, even background check files generated soon after Sept. 11 on a person of Arab descent living in the United States from what appeared to be an federal investigator’s computer.
“Everyone worries about sophisticated hackers, but people don’t realize that the threat is themselves,” Phillips said. “They haven’t got a clue about the technology they are using, and don’t stop and think what it is they are leaving about.”
Monte Phillips has found all kinds of embarassing and revealing documents using file swapping service Gnotella.
Often, Phillips will find a phone number attached to the documents he finds, so he calls up the “victim.” He’s not completely comfortable digging through the information but figures it’s the equivalent of opening a wallet to find out whom to return it to.
After the initial shock, most victims thank him for his efforts.
Why is he spending so many of his retired hours telling Internet users to cover up their naked computer files? “Oh, it’s probably a character defect,” he laughed. “I was born and raised on a farm in Nebraska — if the neighbor’s bull gets out, you just get him back inside their fence, and let the neighbor know. I haven’t got any halos.”

HOW DOES IT HAPPEN?
Catalina’s real name and other details of her trip are being withheld to protect her family; but she was shocked to find files from her computer had been accessed from a file-sharing network. “Unbelievable,” she said.
Initially, she had no idea how it happened, but after a few questions remembered that her 10-year-old son uses a music-swapping program named “BearShare.”
“I will certainly take measures to stop this,” she said.
Catalina’s situation is typical — children often sign up their home computers for services that parents don’t quite understand. Suddenly, the family’s financial spreadsheets can be found using a simple search like “accounts” in a file swapping service.
But children don’t account for files from a district attorney’s office making their way onto the Net. Also typical is when one person in the office signs up for a service, not understanding how it can expose critical company files also on that computer.
Use of the programs, which are generally considered a serious security risk by experts, seems to be somewhat common among U.S. government offices. A quick scan by MSNBC.com found hundreds of megabytes of music — including about 50 Beatles songs, 50 Jim Croce songs, and perhaps 100 John Williams compositions, among many others — shared out from a computer operated by a Naval Hospital called the Bureau of Medicine and Surgery in Beaufort, South Carolina. That irks Phillips.
“None of these programs belong on business or government computers, period,” he said. “There is no ethical justification for it.”
Attempts to reach the technicians at the Naval Hospital weren’t immediately successful.

USERS TO BLAME
Shaun Sidwall, the software developer who created Gnotella, said he sympathized with users who accidentally place personal items before the public. But ultimately, the user — and not his software — is to blame.
“You know (accidents) happen... It is surprising to see every once in while what people share,” he said. But he argues that outside the occasional embarrassing realization, he doesn’t think many users have actually been victimized accidentally shared files.
“Most users of the network aren’t searching for that kind of stuff. So chances are very few people have actually been maliciously affected by this,” he said.
Sidwell designed the software to generally only share out files placed in a specific, safe folder on a user’s computer. But inexperienced users are apparently making much wider swaths of their personal files available to the network — in some cases, sharing their entire hard drives, for example. Because there might be a legitimate reason to do that, Sidwell resisted the notion of limiting Gnotella so it couldn’t make all files on a computer available.
Those using file-sharing programs — or allowing their kids to do so — should be very careful about exactly what files and directories are open to the world. If there’s any confusion, the safest way to protect yourself is to use a separate hard drive. Or deploy an even more aggressive tactic, like Phillips.
“My personal solution is to have a separate machine entirely for this,” he said. “And if there’s any files on your computer you don’t want the world to, store them on a zip disk or floppy, and take them out of the computer.”


TOPICS: Miscellaneous
KEYWORDS: computersecurityin; privacylist; techindex
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 01/16/2002 11:33:50 AM PST by American Preservative
[ Post Reply | Private Reply | View Replies]

To: *Privacy_list; *tech_index; *Computer Security In
Ping.
2 posted on 01/16/2002 11:38:12 AM PST by American Preservative
[ Post Reply | Private Reply | To 1 | View Replies]

To: American Preservative
Just so I understand this, can someone find a file that is not placed in the folder that you have designated for this file sharing program to use?
3 posted on 01/16/2002 11:52:39 AM PST by Darth Reagan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Darth Reagan
I would suggest that, unless you are really sharp, how do you know exactly *what* those file sharing programs can *really* see?

I don't run them.

4 posted on 01/16/2002 11:57:22 AM PST by FreedomPoster
[ Post Reply | Private Reply | To 3 | View Replies]

To: Darth Reagan; boston_liberty; afraidfortherepublic; Dominic Harr; Texaggie79; Ernest_at_theBeach
Good question. I, too, didn't think the article was totally clear in explaining how the info is passed. Maybe a FR techie will weigh in.
5 posted on 01/16/2002 11:59:47 AM PST by American Preservative
[ Post Reply | Private Reply | To 3 | View Replies]

To: Darth Reagan
Just so I understand this, can someone find a file that is not placed in the folder that you have designated for this file sharing program to use

No, that's not possible. However, you have to be careful about which folders you do choose to share using those programs
6 posted on 01/16/2002 12:02:55 PM PST by WindMinstrel
[ Post Reply | Private Reply | To 3 | View Replies]

To: American Preservative
But ultimately, the user — and not his software — is to blame.

He's right you know. I mean, anytime you use a service that allows access to directories on your computer.. you obviously shouldn't store sensitive information there.

7 posted on 01/16/2002 12:04:56 PM PST by Jhoffa_
[ Post Reply | Private Reply | To 1 | View Replies]

To: Darth Reagan
The problem seems to be with people who mark an entire drive or volume as shared. Only one folder should be shared. (Note that any sub-folders in that shared folder are also shared!)
8 posted on 01/16/2002 12:05:57 PM PST by Redcloak
[ Post Reply | Private Reply | To 3 | View Replies]

To: Redcloak
I've serviced computers where I've seen people who store all their crap on their root directory (C:\).

They would say stuff like "I thought that was my 'hard drive' and you were supposed to put everything there".

9 posted on 01/16/2002 12:14:40 PM PST by AAABEST
[ Post Reply | Private Reply | To 8 | View Replies]

To: FreedomPoster
These programs only share folders/files that the user designates. But, many users will put "C:\" or "windows" in the folder sharing box. By default, then, everything from the shared folders on down is exposed. Sometimes a whole hard drive.
ofv
10 posted on 01/16/2002 12:18:02 PM PST by oldfashionedvalues
[ Post Reply | Private Reply | To 4 | View Replies]

To: American Preservative
If you go into Gnutella or another similar file sharing program, you can tell it 1) what directories you are sharing and 2) what files you are sharing. I set mine up so that it only shares mp3 files from two small directories. No txt files can be accessed, so no sensitive info will be subject to unwanted exposure.
11 posted on 01/16/2002 12:18:27 PM PST by Henrietta
[ Post Reply | Private Reply | To 5 | View Replies]

To: Darth Reagan
Just so I understand this, can someone find a file that is not placed in the folder that you have designated for this file sharing program to use?

I've read the "no, that's not possible" replies, but I would worry anyway, particularly if you're on line continuously.

12 posted on 01/16/2002 12:26:40 PM PST by js1138
[ Post Reply | Private Reply | To 3 | View Replies]

To: Henrietta; oldfashionedvalues; Cool Guy
Thank you. : )
______________________
ofv, #10 - wow.
______________________
CG, thread ping.
13 posted on 01/16/2002 12:34:04 PM PST by American Preservative
[ Post Reply | Private Reply | To 11 | View Replies]

To: Darth Reagan
If you open up your computer to other users in the net by using one of these music-swapping programs, then at the very least they can see files in the folder you indicate. But once you get that kind of access to someone's computer, it would not be hard to insert a worm or virus that would open up the rest of it.

Some users don't even realize what they are installing. My kids have visited music sites and ended up with advertising spyware and all sorts of stuff installed on the computer that they didn't even know was there.

For instance, Gator is a little app that kindly fills out forms for you. It also reports back to its makers on everything you are doing and everywhere you visit. It can even crash your computer when it tries to send data while you are doing something else.

The most likely places to catch this kind of hidden trouble, as you might are, is porno sites, music-swapping sites, and other sites that offer you something for nothing. The whole appeal of Gnutella or Gnotella is that you get music without paying for it. But they need to make you pay one way or another--often by inserting spyware into your computer.

14 posted on 01/16/2002 1:12:22 PM PST by Cicero
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cicero
So, how does one find out if spyware is on the computer? Does antivirus or firewall protect you? Of course, you have to tell the firewall that your file-swapping software is OK.
15 posted on 01/16/2002 2:32:49 PM PST by Darth Reagan
[ Post Reply | Private Reply | To 14 | View Replies]

To: Darth Reagan
Try this free program, it's recommended by TechTV. It searches your for spyware and gives you the option to delete. It called Adaware and can be found here: http://www.zdnet.com/downloads/stories/info/0,10615,63806,00.html
16 posted on 01/16/2002 2:41:52 PM PST by XDemocrat
[ Post Reply | Private Reply | To 15 | View Replies]

To: Henrietta
It's also possible to tell your firewall software, e.g., Zone Alarm, that your PC will not be allowed to act as a server when connected to file sharing sites.
17 posted on 01/16/2002 3:12:30 PM PST by Orbiter
[ Post Reply | Private Reply | To 11 | View Replies]

To: Dixie
Ping
18 posted on 01/16/2002 6:52:26 PM PST by dixie sass
[ Post Reply | Private Reply | To 10 | View Replies]

To: Bush2000; Common Tator; unix; xm177e2; go star go
Bump.
19 posted on 01/16/2002 9:50:35 PM PST by American Preservative
[ Post Reply | Private Reply | To 1 | View Replies]

To: American Preservative
I log all outgoing traffic at my firewall. If the beasties are already inside, I'll find 'em.
20 posted on 01/16/2002 9:53:16 PM PST by Bush2000
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson