IDG News Service - Wikileaks.org, the online clearinghouse for leaked documents, is working on a plan to make the Web leakier by enabling newspapers, human rights organizations, criminal investigators and others to embed an "upload a disclosure to me via Wikileaks" form onto their Web sites.
The upload system will give potential whistleblowers around the world the ability to leak sensitive documents to an organization or journalist they trust over a secure connection, while giving the receiver legal protection they might not otherwise enjoy.
"We will take the burden of protecting the source and the legal risks associated with publishing the document," said Julien Assange, an advisory board member at Wikileaks, in an interview at the Hack In The Box security conference in Kuala Lumpur, Malaysia.
Once Wikileaks confirms the uploaded material is real, it will be handed over to the Web site that encouraged the submission for a period of time. This embargo period gives the journalist or rights group time to write a news story or report based on the material.
The embargo period is a key part of the plan, Assange said. When Wikileaks releases material without writing its own story or finding people who will, it gains little attention.
"It's counterintuitive," he said. "You'd think the bigger and more important the document is, the more likely it will be reported on but that's absolutely not true. It's about supply and demand. Zero supply equals high demand, it has value. As soon as we release the material, the supply goes to infinity, so the perceived value goes to zero."
The final act will be for Wikileaks to publish the material on its Web site after the story has been written and the embargo period lapsed.
"We want to get as much substantive information as possible into the historical record, keep it accessible and provide incentives for people to turn it into something that will achieve political reform," said Assange.
Wikileaks is also working on ways to make browsing throuh the material it receives easier for users.
Wikileaks often runs into problems concerning how to present material and how to make it easier to sift through for vital information, said Assange.
"At the moment, for example, we are sitting on 5GB from Bank of America, one of the executive's hard drives," he said. "Now how do we present that? It's a difficult problem. We could just dump it all into one giant Zip file, but we know for a fact that has limited impact. To have impact, it needs to be easy for people to dive in and search it and get something out of it."
In three years on the Web, Wikileaks published over 1.2 million sensitive documents.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts