Risk
1/27/2011
06:36 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

OpenLeaks Site Leaked Before Launch

The latest whistle-blowing Web site aims to avoid the most controversial aspects of Wikileaks.

Shortly before OpenLeaks opened for business on Thursday, the site design was leaked on Cryptome, an online repository for leaked documents that has been operating since 1996.

OpenLeaks doesn't yet have any significant documents to leak yet -- maybe once the beta phase begins during the second half of 2011. Right now, the goal is to rally support, build community, and refine the infrastructure necessary to enable secure, online whistle-blowing.

OpenLeaks was founded by disaffected Wikileaks participants Daniel Domscheit-Berg, a German journalist, and Herbert Snorrason, an Icelandic historian. Though each has reportedly parted ways with Wikileaks as a a result of conflicts with Wikileaks founder Julian Assange, they aren't bad-mouthing their former associate.

"While we fully support the stated goals of WikiLeaks, and wish them success, OpenLeaks is an independent project," the organization's Web site states.

Wikileaks founder Julian Assange remains in the U.K. where he awaits the resolution of legal proceedings initiated by prosecutors in Sweden. U.S. authorities, angered by Wikileaks' release of military reports and diplomatic cables, have been struggling to build a case against Assange.

OpenLeaks aims to establish a more scalable whistle-blowing platform, one that separates the submission process and the distribution process. "We do not seek to publish information ourselves, but rather to enable third parties to do so," the group says on its Web site. "The public already trusts them, with their existing capabilities and experience to analyze and work on submitted material. We, in effect, simply enable them to receive information that they otherwise might not get access to in their local jurisdictional environment."

OpenLeaks does not directly edit or publish the information it receives. Its goal is to serve as much as possible as a conduit connecting whistle-blowers with trusted organizations. The site will provide participating groups with the capability to offer ostensibly secure online drop-boxes for whistle-blowers. And these sources will determine which organizations gain access to the leaked information. That's the plan at any rate. But the future of whistle-blowing looks rather cloudy.

Whistle-blowing, a controversial activity prior to the advent of Wikileaks, has become fraught with emotion, so much so that public defenders of American values have suggested execution is a suitable response to Assange's acts of publishing. The winds now blow against whistle-blowing: A longstanding attempt to provide legitimate whistle-blowers with greater legal protection, the Whistleblower Protection Enhancement Act (Bill S.372) was halted at the last minute last month by an anonymous hold placed by an unknown senator, despite apparent unanimous bipartisan support.

Assange and OpenLeaks might do well to recall the words of Clash front-man Joe Strummer: "You have the right to free speech, as long as you're not dumb enough to actually try it."

This very strain of resignation can be read in a letter posted to Cryptome by site co-founder John Young.

In response to OpenLeaks' quixotic quest, Young wrote, "Let me know how best to support your absolutely hopeless endeavor as it travels from enthusiasm to embarrassment to disaster to calamity to catastrophe to harm maximization to recrimination to crocodile tears of apology to taking a well-paid job with what used to be the enemy."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.