Risk
1/27/2011
06:36 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

OpenLeaks Site Leaked Before Launch

The latest whistle-blowing Web site aims to avoid the most controversial aspects of Wikileaks.

Shortly before OpenLeaks opened for business on Thursday, the site design was leaked on Cryptome, an online repository for leaked documents that has been operating since 1996.

OpenLeaks doesn't yet have any significant documents to leak yet -- maybe once the beta phase begins during the second half of 2011. Right now, the goal is to rally support, build community, and refine the infrastructure necessary to enable secure, online whistle-blowing.

OpenLeaks was founded by disaffected Wikileaks participants Daniel Domscheit-Berg, a German journalist, and Herbert Snorrason, an Icelandic historian. Though each has reportedly parted ways with Wikileaks as a a result of conflicts with Wikileaks founder Julian Assange, they aren't bad-mouthing their former associate.

"While we fully support the stated goals of WikiLeaks, and wish them success, OpenLeaks is an independent project," the organization's Web site states.

Wikileaks founder Julian Assange remains in the U.K. where he awaits the resolution of legal proceedings initiated by prosecutors in Sweden. U.S. authorities, angered by Wikileaks' release of military reports and diplomatic cables, have been struggling to build a case against Assange.

OpenLeaks aims to establish a more scalable whistle-blowing platform, one that separates the submission process and the distribution process. "We do not seek to publish information ourselves, but rather to enable third parties to do so," the group says on its Web site. "The public already trusts them, with their existing capabilities and experience to analyze and work on submitted material. We, in effect, simply enable them to receive information that they otherwise might not get access to in their local jurisdictional environment."

OpenLeaks does not directly edit or publish the information it receives. Its goal is to serve as much as possible as a conduit connecting whistle-blowers with trusted organizations. The site will provide participating groups with the capability to offer ostensibly secure online drop-boxes for whistle-blowers. And these sources will determine which organizations gain access to the leaked information. That's the plan at any rate. But the future of whistle-blowing looks rather cloudy.

Whistle-blowing, a controversial activity prior to the advent of Wikileaks, has become fraught with emotion, so much so that public defenders of American values have suggested execution is a suitable response to Assange's acts of publishing. The winds now blow against whistle-blowing: A longstanding attempt to provide legitimate whistle-blowers with greater legal protection, the Whistleblower Protection Enhancement Act (Bill S.372) was halted at the last minute last month by an anonymous hold placed by an unknown senator, despite apparent unanimous bipartisan support.

Assange and OpenLeaks might do well to recall the words of Clash front-man Joe Strummer: "You have the right to free speech, as long as you're not dumb enough to actually try it."

This very strain of resignation can be read in a letter posted to Cryptome by site co-founder John Young.

In response to OpenLeaks' quixotic quest, Young wrote, "Let me know how best to support your absolutely hopeless endeavor as it travels from enthusiasm to embarrassment to disaster to calamity to catastrophe to harm maximization to recrimination to crocodile tears of apology to taking a well-paid job with what used to be the enemy."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.