STE WILLIAMS

Attacks on IE drive-by bug go wild

Microsoft on Tuesday warned that attackers have begun exploiting a critical vulnerability in Internet Explorer and rolled out a temporary fix until a permanent patch is issued.

The vulnerability in IE versions 6, 7 and 8, which involves the way the browser handles cascading style sheets, allows adversaries to perform drive-by malware attacks by luring victims to booby-trapped webpages. The exploits are triggered by recursive CSS pages, in which style sheets include their own addresses.

Microsoft confirmed the security flaw in late December. On Tuesday, it updated its advisory to reflect “reports of limited attacks attempting to exploit a vulnerability in all supported versions of Internet Explorer.”

Redmond also issued a workaround that large organizations can implement to protect themselves until a patch is released. It comes in the form of a Fix it that causes IE to reject CSS pages that contain the same URL as a style sheet that’s trying to load it.

“This change causes Internet Explorer to refuse to import a CSS style sheet if it has the same URL as the CSS style sheet from which it is being loaded,” Microsoft Security Response Center’s Keven Brown explained here. “Simply put, the workaround inserts a check to see if a style sheet is about to be loaded recursively, and if it so, it aborts the load of the style sheet.”

For the workaround to be effective, all existing security updates, particularly MS10-090 released on December 14, must be installed. The temporary fix causes a minor performance decrease – adding about 150 milliseconds to the browsers’ startup time – so it should be uninstalled once a patch is put in place. Third-party apps that work with IE should be thoroughly tested before putting the workaround into effect.

The workaround came on the first Patch Tuesday of 2011. As part of the regularly scheduled update release, Microsoft also issued two updates, one in the Windows Backup Manager and the other in Microsoft Data Access Components.

While it was one of the smallest Patch Tuesdays ever, it failed to address at least known vulnerabilities that put Microsoft users at risk. One of them allows attackers to remotely execute malicious code on machines running the XP, Server 2003, Vista, and Server 2008 versions of Windows. Exploit code for it is publicly available. The other, disclosed by Google researcher Michal Zalewski, leads to what he said was a “clearly exploitable crash.” ®

Feds subpoena Twitter for info on WikiLeaks backer

US authorities have subpoenaed Twitter for information about an Icelandic parliamentarian who until recently was a vocal supporter of WikiLeaks and its embattled founder Julian Assange.

Iceland Member of Parliament Birgitta Jónsdóttir disclosed the legal demand in a series of tweets on the micro blogging site on Friday. The former anarchist was a vocal supporter of the whistle-blower website until recently, when her enthusiasm for Assange cooled following allegations he sexually molested two women during a visit in August to Sweden.

“Just got this: Twitter has received legal process requesting information regarding your Twitter account in (relation to wikileaks),” she wrote in one dispatch. “USA government wants to know about all my tweets and more since november 1st 2009. Do they realize i am a member of parliament in iceland?” she quickly added.

She went on to say she is consulting with a lawyer and intends to fight the demand, which came from officials at the Justice Department.

“They are asking for a lot more then [sic] just my tweets,” she said. “I only got 10 days to stop this via legal process or [Twitter] will hand it over.

A Twitter spokeswoman declined to confirm the account, or say whether the service intends to comply.

“To help users protect their rights, it’s our policy to notify users about law enforcement and governmental requests for their information, unless we are prevented by law from doing so,” she said.

The demand makes Twitter the latest company to get embroiled in the US government’s heated campaign against WikiLeaks. Over the past month, a variety of companies – including PayPal, MasterCard, Visa, and Bank of America – have denied services to WikiLeaks following claims by the State Department that the site was engaged in illegal activity.

Charges have yet to be brought.

Jónsdóttir was the chief sponsor of the Icelandic Modern Media Initiative, which was passed in that country’s parliament in June. The measure reformed media laws to make Iceland an international safe haven for journalists.

According to The Telegraph, Jónsdóttir also managed to get Assange into a US Embassy cocktail party at the ambassador’s residence in Reykjavik. During the event, Assange sipped with Sam Watson, the embassy’s deputy chief of mission, whose embarrassing dispatches concerning the US and UK role following the collapse of Iceland’s bank would later be published on the site.

“He certainly had fun at the party,” Jónsdóttir was quoted as saying. “I said it would be a bit of a prank to take him and see if they knew who he was. I don’t think they had any idea.”

According to Wired.com, the subpoena was served on December 14 in US District Court in Alexandria, Virginia, the same venue of a federal grand jury deciding whether to bring charges against Assange for leaking classified State Department cables.

“I think I am being given a message, almost like someone breathing in a phone,” Jónsdóttir wrote. “If Twitter hands over my information – then no ones information is save [sic] with Twitter.” ®

PlayStation 3 code signing cracked

Hardware hackers claim to have uncovered the private key used by Sony to authorise code to run on PlayStation 3 systems.

The hackers uncovered the hack in order to run Linux or PS3 consoles, irrespective of the version of firmware the games console was running. By knowing the private key used by Sony the hackers are able to sign code so that a console can boot directly into Linux. Previous approaches to running the open source OS on a games console were firmware specific and involved messing around with USB sticks.

The same code signing technique might also be used to run pirated or counterfeit games on a console. That isn’t the intention of the hackers even though it might turn out to be the main practical effect of the hack.

The group, fail0verflow, who also run the Wii’s Homebrew Channel, gave more information about the crack and a demo during the annual Chaos Communication Conference hacker congress in Berlin. Sony’s weak implementation of cryptography was exploited by fail0verflow to pull off the hack, as explained in a video on enthusiast site PSGroove here.

More discussion on the console jailbreaking hack can be found on a PlayStation forum here

WikiLeaks’ Julian Assange Now Making $86k/year

WikiLeaks’ main financial arm, the Germany-based Wau Holland Foundation says it has collected about 1 million Euro ($1.3 million) in donations in 2010, the year in which WikiLeaks exploded into public prominence thanks to its release of thousands of classified U.S. documents, according to a new report from the Wall Street Journal.

Wau Holland is the primary but not sole financial provider for WikiLeaks, the Journal reports.

From those donations, Wau Holland has established a Greenpeace-like system of salary payments, as WikiLeaks attempts to legitimize its organization by moving away from purely volunteer-based work, the Journal reports. The move to make salaried employees allegedly comes after a year-long intense internal debate about whether to do so.

The main beneficiary has been founder Julian Assange, who has drawn 66,000 Euros (about $86,000) in salary thus far this year, the Journal reports. Wau Holland has paid a total of 100,000 Euros in salaries to the entire WikiLeaks staff, which means Assange is getting the lion’s share.

WikiLeaks will pay key personnel based on a salary structure developed by the environmental activist organization Greenpeace, the Journal reports. Under the structure, Greenpeace department heads are paid about 5,500 Euros in monthly salary, a Wau Holland spokesman said.

Among the many revelations from the Journal report are several indications that donations to WikiLeaks have dropped off significantly in the second half of the year.

By August, WikiLeaks had raised about 765,000 Euro, which means it has only raised about 235,000 Euro since then, the Journal reports.

Last summer, WikiLeaks said it operated on about 150,000 Euro a year. Now, however, the foundation says it has paid about 380,000 Euro in WikiLeaks expenses, with some invoices for the year still unprocessed. Some of that total is for hardware, Internet access and travel, a Wau Holland spokesman said. But a big factor in the leap is a recent decision to begin paying salaries to staff.

WikiLeaks had also allegedly promised to contribute half of the estimated $100,000 it will cost for the legal defense of Bradley Manning. Recently, however, a WikiLeaks spokesman said it would only donate around $20,000.

As of the writing of this report, it had still not contributed the funds. The Wau Holland Foundation is awaiting advice from its lawyers on whether the donation would be legal under German law, a spokesman told the Journal.

School caretaker harassed after Islamists hack EDL

A school received hatemail targeting its caretaker after he was wrongly identified as a fascist by opponents of the English Defence League, based on data stolen by an Islamist hacking group.

The headmaster of the comprehensive school in Dorset, which The Register has agreed not to name, summoned the caretaker to his office early last week.

He was shown anonymous emails which accused his wife of being a member of the English Defence League (EDL) and urging that he be sacked. The couple live together with their children inside the school grounds.

The emails cited data recently exposed by an attack on the EDL’s website. The hacker posted his haul – lists of hundreds of members and financial supporters of the far-right group – on several sites frequented by anti-fascist activists.

“At first I was very confused and more than a little worried as the tone of one of the emails was threatening,” the caretaker told The Register.

“I was sure I wasn’t married to a fascist or a football hooligan as the email implied.”

He investigated online and quickly found the hacked database, which indeed named his wife as an EDL donor and gave their family address at the school. He then trawled through their bank statements and found that he had inadvertently donated £1 to the group via a PayPal account in his wife’s name.

The caretaker then recalled reading an article several months ago about “poppy burning or about the disruption of a military funeral”. The page had a button labelled “support the troops”, and he donated one pound. It gave no indication the money was destined for the far-right EDL, he claimed, but the caretaker admitted he had been “stupid”.

“It would have been to show my support for our armed forces and the fallen, the same thing I do every year when I buy a poppy for one pound,” he said.

“I never for one moment thought my money was being sent of to a bunch of football hooligans.”

“The school and my employer have been supportive, once I explained, and have even offered to call in the police if they should be needed. However given the nature of my employment with children allegations like this could have cost me my job and my family their home.”

Instead, he has spent the past week and a half issuing appeals for anti-fascists to remove his family’s address from their posting of the hacked database.

“Some have been very understanding and have done just that or even simply removed my details. Where this hasn’t happened or there has been no contact available I have had the list removed,” he said.

“My own simple polite requests are mostly listened to. However its all been very time consuming, very disruptive and it’s been a huge worry for my wife and I’ve had no small worry for my family’s safety.”

A hacker calling himself “TriCk”, aka “Saywhat?”, has claimed responsibility for raiding the EDL’s server. In notes appended to the member and donor lists, he said he acted on behalf of TeaMp0isoN, known for defacing websites with anti-Israel and anti-India propaganda, and on behalf of “Mujahideen Hacking Unit”.

“Yes I know I have broken the Data Protection Act and the Computer Misuse Act, I’m a hacker it’s what we do, deal with it,” he wrote.

The EDL is understood to have reported the hack to police. ®

Anonymous Wikileaks supporters mull change in tactics

‘Coldblood’, a member of the group Anonymous, tells Jane Wakefield why he views its attacks on Visa and Mastercard as defence of Wikileaks.

Web attacks carried out in support of Wikileaks are being wound down as activists consider changing tactics.

Attacks against Amazon were called off late on 9 December and re-directed towards net payments firm Paypal.

Analysis suggests the earlier attacks were made more effective by the involvement of hi-tech criminals.

At the same time one wing of the activist group suggested ditching the attacks and doing more to publicise what is in the leaked cables.

Site saving

The attacks have been carried out using a tool, called LOIC, that allows people to bombard a site of their choosing with data or let the target be chosen by those running the Anonymous campaign.

Luis Corrons, technical director of Panda Labs, said during its investigation of Anonymous’ attacks its analysts got talking to some of the activists via Internet Relay Chat (IRC).

One of those activists said he had a botnet of 30,000 machines under his control that he was planning to use on behalf of Wikileaks.

“The guy said he had this botnet which was nothing special and was not specifically designed to do these attacks but could be used to do them,” said Mr Corrons.

A botnet is a network of hijacked home computers that have been compromised by their owners visiting a booby-trapped webpage that installs code to hand over control to a hi-tech criminal.

Mr Corrons said a botnet with 30,000 machines in it was “about average size”. Most of the spam sent around the net is funnelled through machines that are in botnets.

It was becoming clear, he said, that some attacks were aided by the 30,000 machines under the cyber criminals control.

“We know for sure the botnet was used in at least one attack on Paypal,” he said.

Panda itself has come under attack with its blog knocked offline for hours by an attack very similar to those Anonymous has been carrying out. Mr Corrons said that, so far, it did not why it was being attacked or who was attacking it.

Fresh leaks

There are also suggestions that the Anonymous group might be about to drop the web attacks in favour of another tactic.

A message posted on the 4chan image board, out of which Anonymous has grown, suggests dropping LOIC in favour of publicising information in the diplomatic cables that Wikileaks is releasing.

Searching for the less-well publicised cables and spreading the information they contain around the web could be more effective than simply knocking out sites deemed to be enemies of Wikileaks, it said.

The message also suggests using misleading tags on posts and YouTube videos to trick people into reading or viewing the information.

“They don’t fear the LOIC, they fear exposure,” read the message.

It is not yet clear if the call to change tactics has been taken up by the Anonymous group at large.

In related news, Wikileaks looks set to have a rival as former staffers of the whistle-blowing website prepare to launch. Set up by Daniel Domscheit-Berg, Open Leaks is expected to launch in mid_December and will host and post information leaked to it.

Is taking part in these attacks illegal?

The short answer is yes, according to Struan Robertson, legal director at law firm Pinsent Masons.

He told the BBC that in the UK, taking part in the attacks would be a breach of the Computer Misuse Act.

He said that anyone found guilty of taking part could face “up to ten years imprisonment”.

“Even downloading the [software] tools to assist in committing these attacks… are themselves guilty of an offence,” he said.

He said this could carry a sentence of up to two years in the UK.

Different countries will have different laws and penalties.

However, security expert Peter Wood said that in practice it would be very difficult to track down the people involved because the attacks used “anonymising software” to hid their tracks online.

The tool launches what is known as a distributed denial of service (DDoS) attack which tries to knock a website offline by bombarding it with so much data that it cannot respond.

The LOIC tool has been downloaded more than 46,000 times but, said Anonymous activists in a tweet, this did not translate into enough people using it to knock the retail giant off the web.

Instead, the attack was re-directed towards Paypal and its computer systems which, according to a status page, has intermittently suffered “performance issues” ever since.

Early on 10 December Moneybookers was chosen as the next target and its site was occasionally unreachable from about 1100 GMT.

The chances of success could be boosted by a new version of LOIC written in web programming language Javascript that allows anyone with a browser, including on a mobile phone, to launch attacks.

However, defences against the attacks were being drawn up as security firms scrutinise the code behind LOIC to work out how attacks happen. Some suggest that well-written firewall rules would be able to filter out most of the harmful traffic.

Criminal chain

Information is also starting to emerge about the other resources that supporters of Anonymous have been able to bring to bear. Research by security firm Panda suggests that some of the earlier attacks on payment firms were aided by hi-tech criminals.

Who are Anonymous?

‘Anonymous’ is commonly used to describe a leaderless collective of people who come together online, commonly to stage a protest.

The groups vary in size and make-up depending on the cause. Members often identify themselves in web videos by wearing the Guy Fawkes masks popularised by the book and film V for Vendetta.

Its protests often take the form of disrupting websites and services.

Its use of the term Anonymous comes from a series of websites frequented by members, such as the anarchic image board 4Chan.

These allow users to post without having to register or provide a name. As a result, their comments are tagged “Anonymous”.

In the past, groups have staged high-profile protests against plans by the Australian government to filter the internet and the Church of Scientology.

The latter spilled over into the real world with protests by masked members outside churches. An offshoot of Anonymous called Project Chanology focuses purely on this cause.

Many Anonymous protests tackle issues of free speech and preserving the openness of the net.

Call of Duty DDoS attack police arrest teen

A 17-year-old from Manchester has been arrested by the Metropolitan Police’s e-crime unit (PCeU) on suspicion of being behind a denial of service attack against the online game Call of Duty.

The teenager was arrested in the Beswick area of Manchester early on Thursday morning.

He is suspected of involvement in denial of service attacks which severely disrupted the online version of the game, and the playtime of many other players, in September. Distributed denial of service attacks are currently being used against the websites of Sarah Palin, Mastercard and other perceived “enemies of Wikileaks and Julian Assange”.

The game’s publisher, Activision, contacted police after the attacks.

The investigation by PCeU found the DDoS attack was made using a malicious program called “Phenom Booter”.

Police found the malware being offered for sale on a web forum for Call of Duty players to allow them to attack other players of the game and thereby improve their own scores.

Police tracked the server to the UK and finally via its IP number to Greater Manchester.

The 17-year-old is still in custody and has been arrested on suspicion of offences against the Computer Misuse Act.

DI Paul Hoare of the PCeU said online gaming was a major retail sector so software aimed at disrupting such games could have commercial implications for the companies concerned, and for their reputations.

He also said: “This type of crime can often be the precursor to further offending in more traditional areas of online crime.” ®

US Army: Judge Dredd smartgun in every squad from 2014

The US Army has confirmed plans to equip every infantry squad and special-forces team by 2014 with an XM-25 Judge Dredd style computer smartgun able to hit enemies hiding around corners or behind rocks etc.

A soldier aims an XM-25 smartgun. Credit: PEO SoldierA trench won’t do it nowadays.

The XM-25 has been widely covered in the media recently, despite the fact that the last piece of actual news regarding the futuristic weapon – that it would at long last be put in the hands of US combat troops, in Afghanistan – came back in October, as we here on the Reg crazy-guns desk reported at the time (getting the tip from the Soldier Systems blog). However we also mentioned it about six weeks later in our widely-read Thanksgiving crazy-guns-o-the-future feature – and shortly thereafter the XM-25’s Afghan deployment decision was in all the mainstream outlets as “news”.

Anyway, pleasingly the media attention has prompted the people at the US Army’s Program Executive Office – Soldier, in charge of the XM-25, to issue a clarification in which they enlarge somewhat on plans for the future.

According to PEO Soldier:

• Prototypes arrived in theater in Afghanistan in November.• The prototype weapons are being carried actively on patrols, and in various combat outposts. Soldier feedback at this stage will allow the Army to make engineering refinements to the system…

• The next phase for the XM25 program is to build a large quantity of production representative weapons and ammunition in 2011 to deploy into Afghanistan for further combat assessments.

• Finally, with testing complete and Army approvals in place, 12,500 systems will be produced and issued beginning in early 2014 – enough to support one per infantry squad and Special Forces Team.

Presumably the XM-25 will lose its “X” (experimental) designator at some point to become the M-25 in line service.

As regular readers will be well aware, the XM-25 shoots special, fat 25mm projectiles rather like a cross between ordinary rifle bullets and 40mm launched grenades. But the XM-25 rounds have an added special sauce: an extremely accurate time fuse which is set electronically by the gun’s systems at the moment of firing, permitting them to explode in midair at a precise distance from the muzzle.

The XM-25’s computing sight features an accurate rangefinding laser and corrects automatically for such variables as air temperature and pressure. This means that a user can ping a target feature – for instance a boulder behind which an enemy lurks – with the laser, then select an additional metre or two of range using a thumb control and raise his point of aim slightly.

The 25mm smartshell will thus fly over the boulder and explode just above the hidden enemy’s head, spraying him with deadly shrapnel. The same capability can be used to make rounds travel through shrubbery, windows, bunker entrances etc before exploding just where the user wants. And the XM-25 has a good bit more range than the M-4 carbines commonly carried by US troops, too, which should make it useful in the longer-distance gunfights often seen nowadays in Afghanistan.

Apart from the basic airburst shrapnel round, there are plans to produce various other specialist 25mm cartridges. PEO Soldier documents have mentioned an armour piercing variant – presumably intended for impact rather than airburst, and using a shaped-charge warhead – and non-lethal both airbursting and blunt. The airburst non-lethal would be a smaller version of the “flash bang” stun grenades popular with special-ops and police SWAT teams in hostage situations, and the blunt version a more ordinary plastic or rubber bullet.

Previously PEO Soldier had suggested that there might be some kind of shot or flechette round also, either scattering a cloud of small projectiles straight out of the end of the barrel like an everyday shotgun or CAWS – or airbursting downrange to deliver a pattern onto a selected area like a miniature artillery “beehive” shell. However, this is no longer mentioned in the latest version of the XM-25 factsheet.

Regular readers will also know that the imminent appearance of the amazing airburst computer-rifle has been predicted ever since the early 1990s, when it made its debut as part of the Objective Infantry Combat Weapon multishooter. But it is now, at last, in combat for real: so PEO Soldier’s vision of a US Army with an XM-25 smartgunner in every squad or A-team* may in fact come true beginning in 2014 as planned.

One does note, though, that just last year the date of initial mass issue was supposed to be 2012. ®

Bootnote

*The basic unit of the US Army Special Forces, aka Green Berets, nominally consisting of 12 men who sometimes split into two units of six. Presumably an A-team might have two XM-25s rather than one – or any other weapons it fancied, within reason.

Join in the Wikileaks DDoS war from your iPhone or iPad

The online “infowar” precipitated by the media circus surrounding Wikileaks and Julian Assange continues, with DDoS attacks occurring against a bewildering variety of websites assessed as having either aided or failed to aid the leak-publisher – or often merely for commenting on the brouhaha.

Meanwhile, interest has focused on the methods used to mount the DDoS attacks. It appears that in general most of the muscle is coming from botnets of the usual sort: ones made up of zombie machines infected with malware using the same methods as ordinary online criminals and spammers (and just as illegal).

However, some of the battling communities – for instance the loosely organised hacktivist collective Anonymous, aligned in support of Assange and Wikileaks – also use collaborative tools where supporters can voluntarily attach their machines to a botnet in order to assist with a DDoS attack. The preferred tools are usually some version of the Low Orbit Ion Cannon (LOIC) software. Machines running LOIC can then be controlled via IRC or some other channel (again the campaigners are aping criminals by using Twitter of late).

Downloading and installing LOIC (the code is freely available at such places as Sourceforge) is simple enough, but evidently off-putting enough that not many people are doing it. The LOIC hivemind net run by Anonymous has generally had only a few hundred machines in it, far too few to mount a serious DDoS, and most of the grunt has been delivered by larger malware-based botnets controlled by individual Anonymous members (just one reportedly containing more than 30 times as many machines as the anonops.net hivemind).

But in the last day or two, a new wrinkle has begun to gain prominence. It is now possible to visit a webpage which will convert your browser into a pocket LOIC instance, delivering DDoS packets from whatever device you are using to browse – not necessarily even a computer.

As Panda Labs analyst Sean-Paul Correll notes:

Only a browser is needed, so you can even launch the attack from your fone, I just tested it with my iPhone … Of course I tested that it was real and worked, but I didn’t send any attack out.

Such a webpage will typically give you the option of adjusting how many requests per second to send to the target website (handy in the case of a phone or perhaps a fondle-slablet device with a limited data package and/or bandwidth) and allow you to attach an insulting message of your own devising.

This would appear to be rather less sophisticated than a proper IRC or Twitter-controlled LOIC install, but has the merit of being simpler. Whether this tremendously simple way of joining in botnets will finally mobilise large numbers of pro- or anti-Wikileaks vigilantes remains to be seen. For now, it appears that the effective DDoS attacks – and other more sophisticated meddling going on – are emanating from relatively small numbers of people.

It would seem that in general most people are aware how relatively unimportant and easily replaceable a part Julian Assange and Wikileaks have played in the release of the classified US files, which continue to mildly interest the outside world. ®

Bootnote
1) Reader be warned: Participating willingly in a DDoS attack is a crime in many countries. Even if this doesn’t bother you, you download software and visit webpages of this sort at your own significant risk: campaigners on both sides have shown little in the way of scruples, and ordinary criminal scammers are now exploiting the situation too.

Daniel Schmitt Interview by Der Spiegel

Daniel Schmitt Interview by Der Spiegel

Der Spiegel, 26 September 2010. Translation by Babelfish, massaged by Cryptome.
Original pages, in German, excerpted from purchased Der Spiegel issue.
“For me only withdrawal is left”

The German WikiLeaks spokesperson Daniel Schmitt, 32, on his disgreement with with Julian Assange, the founder of the leaks platform, his exit from the organization – and his correct name

DER SPIEGEL: Mr. Schmitt, WikiLeaks and you for several weeks could not be reached by email. What is the matter?

Schmitt: There are technical problems and nobody worries about them. WikiLeaks is in a phase of significant change. We have been insane in the last months due to rapid growth and we need to urgently to see that all matters become more transparent. This development is blocked internally. Even to me it is no longer clear how we make decisions, provide answers to questions and other matters. Because of high pressure since the publication of the American military documents, we are trying to convert the organization to respond to new conditions. That means that not everythng is working and resolved correctly. All this is making excessive demands on the project.

DER SPIEGEL: Is that only your view or does everyone involved see it that way?

Schmitt: That is one of the internal points at issue, but there are others. WikiLeaks was for example always discrimination-free in what we published. We have received minor submissions, only important locally, which were always treated exactly the same as major documents whether they were nationally or are even internationally important.

DER SPIEGEL: Why don’t you publish both?

Schmitt: We would gladly have done that, but unfortunately we are in a dead end. I tried several times to open up the dead end, but Julian Assange has reacted to each criticism with the accusation that I was refusing to obey and disloyal to the project. Four weeks ago he suspended me — a single person as prosecutor, judge and executioner. Since then for example I have had no access to my WikiLeaks mail. Thus much work remains undone, and other tools needed for the work are blocked. I know that nobody from our core team agreed with this. But the core team seems to play no role. WikiLeaks has a structural problem. For me without an answer to that problem I must leave the project.

DER SPIEGEL: Why has your controversy with Assange escalated?

Schmitt: We all had insane stress in the last months. Errors happen and can be corrected so long as one learns from them. But they must be admitted to be corrected. Above all it seems that confidence has been lost and we are at a stand still.

DER SPIEGEL: Assange says you questioned the power and guidance from WikiLeaks to do what you wanted.

Schmitt: From my point of view it was not struggle for power, it was not about personal interests, but about our organization and its development. Why he sees that differently, only he knows.

DER SPIEGEL: Nevertheless you have also suggested and advised, because of the rape accusations which have been made against him in Sweden, for him to withdraw from the public.

Schmitt: The investigations against Julian in Sweden are from my point of view a personal attack on him and it has nothing directly to do with WikiLeaks. All this costs to time and energy, and it adds to our burden. From my point of view it would have been best if these matters were handled privately in the background, to clarify and resolve them peacefully. It would have been nothing against him if resolved in the background and our work continued normally. That was my internal proposal but obviously he saw it as an attack on his role.

DER SPIEGEL: How does it continue now?

Schmitt: I worked on WikiLeaks because I believed the idea correct and important. We tried several times with Julian to talk over and address all questions without success. I have given more than hundred interviews with world media, handled finances in Germany coordinated and cooperated on publications. Now I pull back from the project and hand my tasks over – to whomever remains.

DER SPIEGEL: Who do you mean by them of “we talk?”

Schmitt: A handful of the people from the core team, which see the situation similar to me, but do not want to go public with action. A majority of the work by people, that made anonymously, will likely continue. Because of disagreements I need to step out.

DER SPIEGEL: They leaves the project in a critical phase. Do you fear that many Internet activists will accuse you of betrayal?

Schmitt: I am aware of that, and you can assume I deeply considered this step for a long time. Nevertheless I have put in the past years very much time, money and energy into WikiLeaks. But because of that I must be able to be publicly accountable. Therefore this remains for me momentarily only a temporary withdrawal.

DER SPIEGEL: Which exactly do you no longer want to represent?

Schmitt: We promise for example everything from our sources will be published. We have concentrated lately however only on the big topics and practically all our resources are used for that, for example on the Afghanistan documents of the US army at the end of July. The video of the air strike in Bagdad from the year 2007, “Collateral Murder,” was an extreme demonstration of our growth. At the same time we have dozens of other documents we can publish. And due to our increased publicity in the last half year very much new material has been received that needs to be urgently worked on and published.

DER SPIEGEL: By the publication of the secret Afghanistan reports, also by DER SPIEGEL, you have come into conflict with the world power of the USA. Washington threatens you with prosecution because of espionage, WikiLeaks supporters have been contacted by the FBI. Bradley Manning, one of your alleged informants, sits in the prison. Are you afraid of great public pressure?

Schmitt: No, public pressure is part of the endeavor. But this direct confrontation with the USA is not what we intended. We were always against corruption and abuse, to uncover the exercise of power wherever that takes place, whether in a small location generally speaking or the whole world.

DER SPIEGEL: Which does it mean for the organization if after Assange the its most well-known public face is discharged? Is the future of WikiLeaks endangered?

Schmitt: That I do not believe. For WikiLeaks is very important idea. There is a large number of new people in Sweden and Great Britain, and I hope that they all will work together at something meaningful. I believe in the concept with which we began and I am confident that it will survive.

DER SPIEGEL: Must persons who submit material fear for its protection if now a part of the WikiLeaks crew leaves?

Schmitt: From my point of view material and all donated funds should remain with WikiLeaks, because both are explicitly protected in how the project worked. There are alos internally different opinions, in particular with ours technicians. We can however depend on everyone to guarantee that a clean publicaton takes place.

DER SPIEGEL: They have their job with WikiLeaks to continue. And how does it go further for you?

Schmitt: I will contribute to the effort that the idea of a decentralized leak platform not go down. On that I will now work. It in all other respects our earlier common convictions remain: In the end there must be a thousand WikiLeaks.

DER SPIEGEL: You have always spoken for WikiLeaks as “Daniel Schmitt.” What is your real name?

Schmitt: It probably time to stop hiding my name and attach my real name to my opinions. My real name is Daniel Domscheit-Berg.

INTERVIEW: MARCEL ROSENBACH, HOLGER STARK

Daniel Berg on Linkedin:

http://de.linkedin.com/pub/daniel-berg/3/610/663 (more at the link)

[Image]

A sends:

Anke Domscheit and Daniel Berg are married in July 2010.

Anke Domscheit-Berg is Director Government Relations at Microsoft Germany in Berlin.

Daniel and Anke supporting the Icelandic Modern Media Initiative:

# 194. daniel berg, germany
# 196. Anke Domscheit-Berg, Germany