Good Example of “The Dangers of Peer-to-Peer File Sharing Programs”

This to me is unbelievable… We have been living (and practically brainwashed) in this era of so called “Homeland Security”, yet it has been discovered that as a result of a peer-to-peer file sharing program being installed on a defense contractor’s computer, The President’s helicopter (Marine One) has been exposed as a result of a security breach.

I encourage you to read the clips below from an article that was posted by MSNBC. In summary, engineering and communications information about Marine One was found at an IP address in Tehran, Iran and was tracked back to the defense contractor’s site; and, back to the computer workstation where the breach occurred.

Marine One

“Peer-to Peer File Sharing” programs are notorious vehicles for introducing malicious content to your computer. In this case, the user (or employee) had not a clue that they were sharing more than they  bargained for. It is my guess that this employee had a high security clearance, yet they managed to install and use a program on a network system that should have been heavily guarded and monitored.  One has to wonder, what else are we giving away?

clipped from

Report: Obama helicopter security breached

Pa. company says blueprints for Marine One found at Iran IP address

A company that monitors peer-to-peer file-sharing networks has discovered a potentially serious security breach involving President Barack Obama’s helicopter, NBC affiliate WPXI in Pittsburgh reported Saturday.

“What appears to be a defense contractor in Bethesda, Md., had a file-sharing program on one of their systems that also contained highly sensitive blueprints for Marine One,” Boback said.

Someone from the company most likely downloaded a file-sharing program, typically used to exchange music, not realizing the potential problems, Boback said.

“When downloading one of these file-sharing programs, you are effectively allowing others around the world to access your hard drive,” Boback said.

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks


Bookmark and Share


4 thoughts on “Good Example of “The Dangers of Peer-to-Peer File Sharing Programs”

Add yours

  1. How could this happen? Someone really needs to give the American Government a helping hand with computer security, not like the UK has any better security, they actually loose CD’s full of sensitive data, ok thats my rant.
    Interesting Article, good find


    1. GarethTech,

      You are so right… How could this happen? I am not looking at this not from the workstation (user) level, but from the management level of the network where this occurred. Who knows what else was breached in this instance.

      Thanks for your supporting comments.



  2. This is interesting, yet grave.

    It is funny how unprotected most government agencies computer systems are. But I’d imaging the president’s flight schedule should be kept top secret.


  3. The P2P (Torrent) “file sharing” apps — such as LimeWire, eDonkey, uTorrent, BitTorrent, to name a few — have become ubiquitous. I have seen them on practically every client’s machine.. even “Grandma’s”.

    In speaking with some Admins and InfoSec types, I have found that their savvy employees “just go around” any P2P policies/firewall rules/etc., and so, it has become too much trouble to properly police.

    Do people install LimeWire (use whatever name) without having the savvy to ensure they’re not exposing (aka “sharing”) the entire C:\ drive?
    Oh, I’d say, hmmm.. let me think.. YES!

    The fact that these apps are used for pretty much nothing but illegal file exchanges (avoiding fees, purchase price) is what truly boggles — as it is completely embraced by the public. Theft!

    There are devices, and software, that let Admins know EXACTLY what’s going on on their network.. It’s simply a question of cost and priorities.
    Maybe.. this can be a wake up call?


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by

Up ↑

%d bloggers like this: