News
4/17/2008
02:20 AM
Terry Sweeney
Terry Sweeney
Commentary
50%
50%

When You Spring A Wikileak

When thinkers of big thoughts talk about the democratizing effect of technology, they needn't look a whole lot further than Wikileaks or LiveLeak. Incendiary anti-Muslim video, copies of documents from Guantanamo -- this stuff leaves the Huffington Post and other Web 2.0 "news" sites in the dust.

When thinkers of big thoughts talk about the democratizing effect of technology, they needn't look a whole lot further than Wikileaks or LiveLeak. Incendiary anti-Muslim video, copies of documents from Guantanamo -- this stuff leaves the Huffington Post and other Web 2.0 "news" sites in the dust.Now if they could just get in to that safe in Dick Cheney's office.

But in the wake of the snooping in the medical files of Britney Spears and Farrah Fawcett, it begs the question of where we draw the line between the private and the secret. Celebrities and regular joes have a reasonable expectation of privacy; isn't the Church of Scientology similarly entitled? Or does its tax-exempt status and those Tom Cruise Cringe-o-Rama videos single it out for scrutiny and the clear light of day?

These questions aren't academic or contemporary hypotheticals for storage professionals. In the wild and woolly world of policy networking, those in the data center implement the requested controls as to who can access what. Granted that's almost always done in concert with a department head or HR and legal. But what does IT do when special cases crop up -- like the CEO's admin, for example. Does that person automatically get the same rights to all the same files and folders because they also download the boss's e-mail (and probably prioritize it and craft responses)?

So to jump back a bit, what if former Enron accountant Sherron Watkins had had Wikileaks at her disposal? I bet it would have hastened the inevitable and foreshortened the interminable legal cases that followed. And again, Enron had a reasonable expectation (maybe even a legal requirement) of confidentiality and privacy. But when you're telling billion-dollar lies and getting away with it, that completely rearranges the ethical landscape.

This sort of stuff is only going to become more common and create some tough decisions for IT, with lots of ethical gray areas ahead. Individuals are a different case, but organizations -- public and private -- may find a lot less sympathy for any need for secrecy. They may, in fact, be provoking Web leakers into action.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.