{"id":26022,"date":"2014-09-17T07:43:51","date_gmt":"2014-09-17T11:43:51","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26022"},"modified":"2014-09-17T07:43:51","modified_gmt":"2014-09-17T11:43:51","slug":"wikileaks-posts-weaponized-malware-for-all-to-download","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-posts-weaponized-malware-for-all-to-download.php","title":{"rendered":"WikiLeaks posts &#8216;weaponized malware&#8217; for all to download"},"content":{"rendered":"<p><p>  Summary: The long and sordid story of WikiLeaks  takes an astonishingly irresponsible and very dangerous turn.<\/p>\n<p>    Sometimes when we seek to understand the impact of a digital    scenario, we recast it in meatspace and describe an analogous    situation. In seeking to understand the most recent (and    probably most epically irresponsible) WikiLeaks posting, the    meatspace analogy will come in handy.  <\/p>\n<p>    Imagine, if you will, that a company located in Germany was    doing biological warfare research, possibly under the guidance    and using the funding of various allied governments.  <\/p>\n<p>    As part of their research, the company has produced a strain of    virus that's Ebola-dangerous and Ebola-virulent, that might be    used by the varied governments to fulfill certain unspecified    and undisclosed objectives.  <\/p>\n<p>      But this time, WikiLeaks didn't just release documents. They      posted the actual software.    <\/p>\n<p>    Now imagine that a group of concerned scientists discovers this    research and illegally gets their hands on vials containing the    biowarfare agent. Their justification in this theft is the    desire to develop a defense against it, in case it is loosed    upon an unsuspecting public.  <\/p>\n<p>    At this point, you might side with the scientists. After all,    biological warfare is nasty stuff, and protecting the public    from exposure and harm is a laudable goal.  <\/p>\n<p>    What if the thieves aren't biological scientists? They're    violent activists. Similarly disturbed about the activities    going on in the biowarfare lab, they also manage to get a    sample of the deadly biological agent.  <\/p>\n<p>    However, instead of securely and safely transporting the deadly    biohazard back to a lab for safe and secure analysis leading to    an antidote agent, the thieves inexplicably set up a kiosk at a    local mall. And instead of securely managing the biohazard,    they give out sample vials of the biohazard to anyone who wants    one.  <\/p>\n<p>    Anyone with a brain would immediately call the authorities and    insist that this incredibly dangerous behavior be stopped, and    that all the loose vials of biological warfare agent be rounded    up and secured or destroyed.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/astonishingly-irresponsible-wikileaks-posts-weaponized-malware-for-all-to-download-7000033716\" title=\"WikiLeaks posts 'weaponized malware' for all to download\">WikiLeaks posts 'weaponized malware' for all to download<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Summary: The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn. Sometimes when we seek to understand the impact of a digital scenario, we recast it in meatspace and describe an analogous situation. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-26022","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26022"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26022"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26022\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}