Japanese P2P leak cop fired

Tokyo drift


A Japanese policeman has been fired after he was held responsible for accidentally leaking confidential information via peer-to-peer (P2P) file sharing software installed on his work PC.

The ex-copper, who has not been named, lost his job with the Tokyo Police Department over the leak of personal details of 12,000 people obtained during the course of criminal investigations. The hapless plod apparently installed the Winny file-sharing software onto his PC, blissfully unaware that confidential data was being made available to other users via the P2P network.

About 6,600 police documents are said to have been compromised, including interrogation reports, statements from victims of crime, and classified locations of automatic licence plate readers. Among the files was a list of the names, addresses, and personal information of 400 alleged members of the notorious Yamaguchi-gumi yakuza gang.

The Tokyo Police Department have a policy against running P2P software on PCs. The officer falsely claimed not to be running Winny in an internal audit prior to the leak.

The officer's superiors are being held partially responsible for the incident, with up to 10 facing possible disciplinary proceedings.

"It's no surprise that the Japanese police force has taken a hard line against this officer for disobeying advice about not running P2P file sharing software on his PC - the authorities have been trying to enforce a ban following a number of similar embarrassing incidents in the past," notes Graham Cluley, senior technology consultant for Sophos.

The Winny file sharing network is the most popular P2P network in Japan, boasting an estimated 250,000 users. The technology has become a focus of concern for authorities after investigation records from a Kyoto Prefecture Police officer's computer and military files from Japan's Self-Defence Force as well as police files from the Tokyo Police were made available across the Winny P2P network. In May 2006, a virus was blamed for leaking power plant secrets onto Winny. ®


Other stories you might like

  • AsmREPL: Wing your way through x86-64 assembly language

    Assemblers unite

    Ruby developer and internet japester Aaron Patterson has published a REPL for 64-bit x86 assembly language, enabling interactive coding in the lowest-level language of all.

    REPL stands for "read-evaluate-print loop", and REPLs were first seen in Lisp development environments such as Lisp Machines. They allow incremental development: programmers can write code on the fly, entering expressions or blocks of code, having them evaluated – executed – immediately, and the results printed out. This was viable because of the way Lisp blurred the lines between interpreted and compiled languages; these days, they're a standard feature of most scripting languages.

    Patterson has previously offered ground-breaking developer productivity enhancements such as an analogue terminal bell and performance-enhancing firmware for the Stack Overflow keyboard. This only has Ctrl, C, and V keys for extra-easy copy-pasting, but Patterson's firmware removes the tedious need to hold control.

    Continue reading
  • Microsoft adds Buy Now, Pay Later financing option to Edge – and everyone hates it

    There's always Use Another Browser

    As the festive season approaches, Microsoft has decided to add "Buy Now, Pay Later" financing options to its Edge browser in the US.

    The feature turned up in recent weeks, first in beta and canary before it was made available "by default" to all users of Microsoft Edge version 96.

    The Buy Now Pay Later (BNPL) option pops up at the browser level (rather than on checkout at an ecommerce site) and permits users to split any purchase between $35 and $1,000 made via Edge into four instalments spread over six weeks.

    Continue reading
  • Visiting a booby-trapped webpage could give attackers code execution privileges on HP network printers

    Patches available for 150 affected products

    Tricking users into visiting a malicious webpage could allow malicious people to compromise 150 models of HP multi-function printers, according to F-Secure researchers.

    The Finland-headquartered infosec firm said it had found "exploitable" flaws in the HP printers that allowed attackers to "seize control of vulnerable devices, steal information, and further infiltrate networks in pursuit of other objectives such as stealing or changing other data" – and, inevitably, "spreading ransomware."

    "In all likelihood, a lot of companies are using these vulnerable devices," said F-Secure researchers Alexander Bolshev and Timo Hirvonen.

    Continue reading

Biting the hand that feeds IT © 1998–2021