Private photographs, confidential financial documents and even military secrets have joined the list of files that computer users can download as they scour the Internet.
Millions of new users are looking for media files with peer-to-peer (P2P) programs such as Kazaa, which allow users to share all types of files -- usually illegally -- from designated folders on their hard drives across the Internet.
This has led to more and more people looking for confidential and private files either for simple amusement, or, increasingly, for much more sinister purposes, say the authors of Web sites which post some of these documents and pictures.
"One way files are being offered is by people bringing work home from the office and putting it on their home computers where they have a P2P application installed," said Rick Wallace, who last month launched the SeeWhatYouShare.com Web site.
"At the office, their computer is behind a firewall that protects the network, but many do not have that protection at home and it can lead to great security lapses," he said.
Security of files and networks has become a hot issue. As more inexperienced users look for MP3 music clips, movies, television shows, pornography and computer programs, they often leave the digital door to their computers wide open.
BigChampagne, which tracks file sharing, estimates that 8.3 million people used P2P networks in June, off the April peak of 9.3 million.
One does not need the skills of a hacker to grab private files from the thousands of users of programs such as LimeWire or BearShare. Even most home firewalls, which keep out malicious outsiders, don't prevent designated files from being shared.
All that is required is patience and skills sharpened on Google or other Internet search engines.
VARIETY OF SECRETS
Wallace wants his Web site to showcase a variety of private files to warn the users who unwillingly share them.
The files he has posted include passwords for various Internet services, personal bank information, confidential police reports, court documents and tax returns. All the information one might need to open up a bank account or virtually assume another person's identity.
Wallace has blacked out the private details from all the documents, but seeing what's out there is scary enough.
He originally posted a screen shot of what appeared to be military documents ready for downloading using one of the P2P programs. The site also included various photos of US soldiers with civilians and burning military vehicles and aircraft apparently taken with digital cameras in Iraq.
"I felt it was important that the [US] Department of Defense see what is going on first hand, without it being filtered through the bureaucracy. Since I launched my site, military officials have contacted me to see how I received this information and what they need to do to fix the problem," Wallace said.
He has now removed the files.
One Internet user who asked not to be identified said that in recent months using the popular LimeWire program he found secret military and government documents and unpublished photographs of abuse at Iraq's Abu Ghraib prison.
HARD DISK WIDE OPEN
Developers of P2P programs encourage users to share their media files by designating which folders other users may have access to, building up a large online library of files.
But some programs, unless instructed otherwise, leave their users especially vulnerable to prying eyes.
They search the entire hard drive not only for media files, but also programs and documents created by Microsoft Word and Excel as well as Quicken, which keeps track of financial transactions and account details.
"The LimeWire installation is a little dangerous for people who don't pay attention and we'll have to address this issue in future releases," said Greg Bilden, chief operating officer and chief technology officer at LimeWire LLC.
Bilden said the company must balance the need to make the program simple to use while protecting novice users. There are 3 million active LimeWire users worldwide.
For now, Bilden and other experts advise users to be very careful when they install any P2P software and designate which folders to share with the outside world. They also should periodically monitor files uploaded from their computer and keep in mind that some programs continue to run in the background even when they appear to be closed.
With the growing popularity of digital cameras, photographs make up the largest percentage of files shared unintentionally as a growing number of people load home pictures onto their hard drives.
"There are hundreds of thousands if not millions of photos out there," said Rich Vogel, who posts many of the images he finds on his "Found Photos" Web site (http://www.10eastern.com/foundphotos.html).
The site includes various everyday shots ranging from the mundane to embarrassing to just plain bizarre.
"I mainly look for pictures that will make you smile or display interesting photography," Vogel said. "But there is a voyeuristic aspect to this."
George Santayana wrote: “Those who cannot remember the past are condemned to repeat it.” This article will help readers avoid repeating mistakes by examining four examples from the civil war between the Chinese Communist Party (CCP) forces and the Republic of China (ROC) forces that involved two city sieges and two island invasions. The city sieges compared are Changchun (May to October 1948) and Beiping (November 1948 to January 1949, renamed Beijing after its capture), and attempts to invade Kinmen (October 1949) and Hainan (April 1950). Comparing and contrasting these examples, we can learn how Taiwan may prevent a war with
A recent trio of opinion articles in this newspaper reflects the growing anxiety surrounding Washington’s reported request for Taiwan to shift up to 50 percent of its semiconductor production abroad — a process likely to take 10 years, even under the most serious and coordinated effort. Simon H. Tang (湯先鈍) issued a sharp warning (“US trade threatens silicon shield,” Oct. 4, page 8), calling the move a threat to Taiwan’s “silicon shield,” which he argues deters aggression by making Taiwan indispensable. On the same day, Hsiao Hsi-huei (蕭錫惠) (“Responding to US semiconductor policy shift,” Oct. 4, page 8) focused on
Taiwan is rapidly accelerating toward becoming a “super-aged society” — moving at one of the fastest rates globally — with the proportion of elderly people in the population sharply rising. While the demographic shift of “fewer births than deaths” is no longer an anomaly, the nation’s legal framework and social customs appear stuck in the last century. Without adjustments, incidents like last month’s viral kicking incident on the Taipei MRT involving a 73-year-old woman would continue to proliferate, sowing seeds of generational distrust and conflict. The Senior Citizens Welfare Act (老人福利法), originally enacted in 1980 and revised multiple times, positions older
Nvidia Corp’s plan to build its new headquarters at the Beitou Shilin Science Park’s T17 and T18 plots has stalled over a land rights dispute, prompting the Taipei City Government to propose the T12 plot as an alternative. The city government has also increased pressure on Shin Kong Life Insurance Co, which holds the development rights for the T17 and T18 plots. The proposal is the latest by the city government over the past few months — and part of an ongoing negotiation strategy between the two sides. Whether Shin Kong Life Insurance backs down might be the key factor