If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.
We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. See our Tor tab for more information.
We also advise you to read our tips for sources before submitting. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed. Today, October 23, WikiLeaks publishes a statement made by a panel that listened to testimony and reviewed evidence from a whistleblower from the OPCW update.
Today, January 30th WikiLeaks publishes a set of documents from the Catholic Church, shedding light on the power struggle within highest offices. Today, 21 December , WikiLeaks publishes a searchable database of more than 16, procurement requests posted by United States embassies around the world. Today, 11 Oct , WikiLeaks publishes a highly confidential internal document from the cloud computing provider Amazon.
How to contact WikiLeaks? What is Tor? The Guardian and Der Spiegel have performed analyses of the metadata of the entire trove, excluding the body text. Wikileaks itself has released as of December 7, documents out of the total , The Associated Press has reported that Wikileaks is only releasing cables in coordination with the actions of the five selected news organizations.
Julian Assange made similar statements in an interview with Guardian readers on December 3, Cables are being released daily as the five news organizations publish articles related to the content. Is each of the five news organizations hosting all the documents that Wikileaks has released? Each of the five news organizations hosts a different selection of the released documents, in different forms, which may or may not overlap.
Le Monde has created an application, developed in conjunction with Linkfluence , that hosts the searchable text of several hundred cables.
The text can be searched by the sender country of origin, office or official , date range, persons of interest cited in the docs, classification status, or any combination of the above. Only the untranslated, English text of the cables can be accessed and cut-and-paste is not available.
These searches also return El Pais articles written on a given subject, often placed ahead of the cables in the search listings. The Guardian offers the cable data in several forms: It has performed an analysis of metadata of the entire ,document trove, and made it available in several forms spreadsheets hosted on Google Docs and in downloadable form as well as infographics.
The Guardian also hosts at least cables on its website, searchable by subject, originating country, and countries referenced. Who is responsible for redacting the documents? What actions did Wikileaks take to ensure that individuals were not put in danger by publication of the documents? According to the Associated Press and statements released by Wikileaks and Julian Assange , Wikileaks is currently relying on the expertise of the five news organizations to redact the cables as they are released, and it is following their redactions as it releases the documents on its website.
This cannot be verified without examining the original documents, which we have not done—nor are we linking to them here. State Department for guidance on redacting the documents prior to their release.
In a public letter , Harold Koh, legal adviser to the Department of State, declined to assist the organization and demanded the return of the documents. Are the documents hosted anywhere else on the Internet? The file, which apparently can still be found on various peer-to-peer networks, is 1. What is in the insurance file is not known.
It has been speculated that it contains the unredacted cables provided by the original source s , as well as other, previously unreleased information held by Wikileaks.
There is further speculation, which has been indirectly boosted by Julian Assange, that the key to the file will be distributed in the event of either the death of Assange or the destruction of Wikileaks as a functioning organization. However, none of these things is known. If the key were released, and if the encrypted insurance file contains unredacted and unreleased secret documents, then those decrypted files would be available to many people nearly instantaneously.
Wikileaks claimed in August that the insurance file had been downloaded more than , times. So, would it be possible for a motivated organization to disrupt its real-world infrastructure?
Yes, probably. However, at this point, it is not practical to recover the information the organization has already distributed which includes the entire trove of diplomatic cables to the press as well as whatever is in the encrypted insurance file , as well as any other undistributed information the organization might seek to release.
Powerful institutions may use whatever methods are available to them to withhold damaging information, whether by legal means, political pressure or physical violence. The risk cannot be entirely removed for instance, a government may know who had access to a document in the first place but it can be lessened. Posting CD's in the mail combined with advanced cryptographic technology can help to make communications on and off the internet effectively anonymous and untraceable.
WikiLeaks applauds the courage of those who blow the whistle on injustice, and seeks to reduce the risks they face. Our servers are distributed over multiple international jurisdictions and do not keep logs. Hence these logs cannot be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers.
Without specialized global internet traffic analysis, multiple parts of our organization and volunteers must conspire with each other to strip submitters of their anonymity. WikiLeaks can't discuss details of security matters because we want to do everything possible to help lower the risk of sources being identified.
It suffices to say that anonymity for sources is a critical part of the design criteria. Because sources who are of very substantial political or intelligence interest may have their computers bugged or their homes fitted with hidden video cameras or other surveillance technology, we suggest very high-risk leaks are done away from the home. Yes, since January We consider this a sign that we can do good work. We were slowly establishing our work and organization, but in response authoritarian elements in the Chinese government moved to censor us, exposing their contempt for basic human rights and their fear of the truth.
We have a number of ways around the block, some of which are very easy. See Internet Censorship for more information. WikiLeaks staff examine all documents and label any suspicions of inauthenticity based on a forensic analysis of the document, means, motive and opportunity, cost of forgery, what the authoring organization claims and so on.
We have become world leaders in this and have an enviable record: as far as can be determined, we have yet to make a mistake. This does not mean we will never make a mistake, but so far, our method is working and we have a reputation to protect.
Given that many of the most prestigious newspapers, including the New York Times [Judith Miller, ], have published reports based on fabricated documents, WikiLeaks believes that best way to truly determine if a story is authentic, is not just our expertise, but to provide the full source document to the broader community - and particularly the community of interest around the document.
So for example, let's say a WikiLeaks' document reveals human rights abuses and it is purportedly from a regional Chinese government. Some of the best people to analyze the document's veracity are the local dissident community, human rights groups and regional experts such as academics.
They may be particularly interested in this sort of document. But of course WikiLeaks will be open for anyone to comment. Journalists and governments are often duped by forged documents. It is hard for most reporters to outsmart the skill of intelligence agency frauds.
WikiLeaks, by bringing the collective wisdoms and experiences of thousands to politically important documents will unmask frauds like never before. WikiLeaks is an excellent source for journalists, both of original documents and of analysis and comment. WikiLeaks will make it easier for quality journalists to do their job of getting important information out to the community.
Getting the original documents out there will also be very helpful to academics, particularly historians. For online submissions, all a whistleblower needs to do is upload the document and specify the language, country and industry of origin, likely audience, reasons for leaking and approaches to verification. All documents go into queue to obscure the date and time of their acquisition, and are then assessed by our editors to see if they fit our editorial criteria.
Internally the document is distributed to backup servers immediately. WikiLeaks staff, sometimes in collaboration with the submitter. Historically, most summaries were written by Julian Assange. Analysis articles written on WikiLeaks are written by WikiLeaks staff, or, more usually, written by other publications, but based on WikiLeaks source material.
Quite the opposite actually. It is a global group of people with long standing dedication to the idea of improved transparency in institutions, especially government. We think better transparency is at the heart of less corruption and better democracies. By definition spy agencies want to hoard information. We want to get it out to the public. It began with an online dialogue between activists in different parts of the globe. The overwhelming concern of these people was that a great deal of human suffering through lack of food, healthcare, education and other essentials stems from government resources being diverted through corruption of governance.
This is particularly true in non-democratic and repressive regimes. The founding people behind WikiLeaks thought long and hard about how this problem could be fixed, and particularly about how information technologies could amplify the fix on a world wide scale.
It's interesting to note that one online commentator accused us of being naive in our high level goals. This is effectively praise to us. It takes a little bit of naivety in order to jump in and do something that otherwise looks impossible. Many great advances in science, technology and culture have a touch of naivety at their inception.
We're reminded of Phil Zimmerman, the creator of PGP, the world's first free and freely available encryption software for the masses. At the start of the s when PGP was released, encryption was really only the realm of spy agencies. Governments classified it as a weapon. There was a huge outcry when Zimmerman dared to release this "dangerous" technology for the average person to use. Fast forward a decade and a half: virtually everyone on the net uses encryption all the time, for everything from secure ordering, online banking to sending private love letters.
The somewhat naive vision of a lone computer programmer in Boulder, Colorado, was at the heart of an extremely sensible and practical global revolution in privacy technologies. WikiLeaks may be at the heart of another global revolution - in better accountability by governments and other institutions. We think this document leaking technology will effectively raise standards around the globe.
We expect it to encourage citizens aware of consequentially unethical behavior to don the hat of brave whistleblower , even if they have never done so before. How to contact WikiLeaks? What is Tor? Tips for Sources After Submitting. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.
What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Do not talk about your submission to others If you have any issues talk to WikiLeaks.
0コメント