I have read as much as I can about this project, there is nothing spoken that you mention about a shady organization using this development tool to break and use against us. They intern are determined to make sure that this code of SHA-1 is really as secure as it is supposed to be. I have read the latest article dated October 24, 2007 which states the two different universities participating in this effort. Not once is any misnomers mentioned stating these are people are attempting to take advantage of the rest of the world with breaking this code. I do not know where your insight about shady organization came from but from my readings this afternoon, nothing is near your disbelief. I would rather find the hash here on line then to have someone do it themselves and use it against us later without our knowledge.
http://www.isgtw.org/?pid=1000711
Once the SHA-1 Hash is found; (maybe found), the rest of the world will alter there secure habits effectively and quickly. You will not be put at risk.