Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Your Data And The P2P Peril: Page 4 of 7

If you do find business data on a P2P network, identify the source of the leak to shut it off and to gauge how and why the P2P application was being used.

Test Your P2P Exposure
A step-by-step approach to using LimeWire to search for your company's data in the wild
1

Build a list of keywords from the names of important files. Be specific; unique industry or company jargon makes for ideal searches.

2

Keep search phrases short -- LimeWire has a limit of 30 characters -- and search only for documents so you won't get inundated with media files.

3

Go to Tools > Options > Sharing to be sure you're not sharing confidential materials. Safer yet, run LimeWire in a VM with no data on it.

4

Once you find a file that looks like it belongs to your company, select it and choose Browse Host to examine other files that user is sharing. Note its IP address, so you can track down the user later.

5

After a search, select all listings under the Servers tab and click the Remove button. This will drop those connections and add different servers. Then right click on your search tab and choose Select More > Get More Results to extend your search. Repeat this many times, to search as broadly as possible.

What more can be done? Tiversa, a 5-year-old company in the Pittsburgh area, has developed proprietary algorithms that monitor P2P networks in real time. The company establishes its own nodes on popular P2P networks, including Gnutella, eDonkey, FastTrack, and WinMX, giving it visibility into the files being shared across them. The vendor uses that information to provide P2P monitoring and risk assessment to business customers, including investment banks, credit card issuers, banks, and insurers.

Government agencies were early adopters of Tiversa's services. CEO Robert Boback says the feds took notice when, in the spring of 2004, the company demonstrated that people outside the United States were searching P2P networks for information on explosives, detonators, ricin, anthrax, and more. By the end of that year, Tiversa was working with the CIA, FBI, Homeland Security, and the U.S. Secret Service. During the '04 presidential campaign, the company detected searches related to Jenna Bush, Air Force One, and White House security and was able to determine that the same user also had files on sniper tactics. Within days, the Secret Service was knocking on that person's door; he lived within an hour's drive of President Bush's Crawford, Texas, ranch.

Tiversa's advantage is its ability to trace keyword searches across entire P2P networks, giving it a more comprehensive view of file-sharing activity than IT departments can get on their own. The company puts the number of file-sharing searches at 1.5 billion per day--several times the number of keyword searches handled by Google. It maps probe terms, which describe the types of files people are looking for, and search-match terms, which are the ones they find.

A sampling of the corporate data Tiversa has come across includes salary histories, termination records, nondisclosure agreements, board meeting minutes, and merger and acquisition plans. There are gobs of IT-related documentation available, too: encryption keys, network diagrams, user IDs and passwords, and disaster recovery plans.