LimeWire chairman: P2P concerns overblown
Music industry behind FUD, says Mark Gorton
Computerworld - Lime Group Chairman Mark Gorton found himself in the hot seat last week during a hearing on the problem of inadvertent data leaks on peer-to-peer (P2P) networks including his company's, LimeWire. The hearing was held by the House Oversight and Government Reform Committee.
Furious lawmakers blasted Gorton over what they claimed was his company's continued failure to ensure that users of LimeWire software did not share files inadvertently. The scathing criticism came in the wake of testimony by two witnesses at the hearing. Robert Boback, CEO of Tiversa Inc., a P2P networking monitoring service, disclosed how he had discovered highly sensitive government data, ncluding presidential motorcade routes, on LimeWire networks.
The other witness was Progress and Freedom Foundation's Thomas Sydnor, who said his experiments with LimeWire's P2P software had revealed it to be extremely susceptible to inadvertent file sharing. The disclosures led to committee chairman Edolphus Towns (D-NY) saying he would soon introduce a bill seeking to ban the use of P2P software on government networks.
In a conversation with Computerworld, Gorton flatly rejected some of the testimony. He claimed that concerns about data leaks on P2P networks are being fueled and orchestrated by music labels concerned more about copyright infringement on P2P networks than anything else.
Were you surprised at the criticism directed at you and LimeWire during the hearing? I'm not sure I had that much in the way of expectations going into it so I am not sure if I was surprised. I mean this hearing was more or less orchestrated by the RIAA (Recording Industry Association of America). I am personally of the opinion that you cannot view these hearings outside of the context of the litigation which the recording industry has going on with LimeWire.
Why do you say that? If you look at the testimony by Tom Sydnor, his firm is supported by the major record labels. If you look at his report it is completely biased. It seems superficially kind of shocking. But when you start parsing it, it really is very tricky and deceptive.
Is there an example of this that you can show? Sure. Sydnor says he went and installed LimeWire on a computer and that it immediately started sharing (all of the files) on the computer and that it was a security disaster. What he failed to mention is that in order to achieve that result he had to have taken that computer and installed a previous version of LimeWire on it. He then, really, deliberately had to go and remove all of the security settings on it, ignore countless warnings and consciously share file by file all of the files he was talking about. He then had to uninstall LimeWire from that computer and then reinstall the newer version which just picked up the settings he previously had put on it. He gives the impression that any time you install Limewire it goes and shares all these files and that is just absolutely untrue. He manages to parse the facts cleverly enough to give a highly misleading picture of reality.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Legal White Papers | Webcasts