Leaked House Ethics document spreads on the Net via P2P
Document lists dozens of lawmakers under scrutiny for conduct violations
Computerworld - A document containing the names of more than two dozen members of the U.S. House of Representatives who are being scrutinized for conduct violations is starting to get widely distributed over the Internet after being leaked on a peer-to-peer network earlier this week.
Tiversa Inc., a Cranberry Township, Penn.-based company that offers a P2P network monitoring service said that since news of the leak broke earlier this week it has seen the file at multiple locations including London, Toronto, Washington, Los Angeles, Texas and New York.
"Since this story broke we have been investigating and [have] confirmed that the file is available on P2P networks," said Scott Harrer, brand director for Tiversa.
The Washington Post on Thursday said that it had obtained a document listing the names of dozens of House members who are being scrutinized by ethics investigators for activities related to defense lobbying and influence peddling. The confidential document was prepared in July by the House Committee on Standards of Official Conduct, which is also called the Ethics Committee.
Among those on the list are several top congressional Democrats, including California Reps. Maxine Waters and Laura Richardson, and Charles Rangel of New York. Typically the names of those being scrutinized for ethics and other violations are not publicly disclosed by the Ethics Committee unless there is a formal investigation into potential rule violations.
The Post said it obtained the documents from a third party not connected with the House investigation after the document was leaked onto the Internet.
House members said the confidential document had been leaked as a result of a cyberhacking incident.
However, a statement issued yesterday by the Ethics Committee said the leak was not caused by an intrusion of the House or the committee's information systems. Rather, a preliminary investigation showed the document was leaked by a junior staffer who had installed P2P software on a personal computer on which the document was stored.
The document containing the names of those under the ethics probe was one of several that were leaked by the staffer, who has since been fired, the statement noted.
"The Standards Committee is taking all appropriate steps to deal with this issue and is working with House Information Security to ensure that the Standards Committee's information systems remain secure," the statement said.
The incident is only the latest in a series of spectacular data leaks that have occurred on P2P networks over the past several months and has caught the attention of lawmakers in a major way.
In July, for instance, members of the House Oversight and Government Reform Committee heard how Tiversa had found a document containing details on presidential motorcade routes and a U.S. Secret Service safehouse for the first family on a LimeWire file-sharing network.
In January, details about the president's Marine One helicopter were found sitting on a computer in Iran, while last month some 200 sensitive military documents were found leaked on P2P networks.
Such disclosures have prompted calls for rules banning the use of P2P in government. One bill would force P2P software makers to include controls to prevent inadvertent file-sharing.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts