December 13, 2010

wiki leaks

"Could become as important a journalistic tool as the Freedom of Information Act." - Time Magazine
213.251.145.96

WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for the revealing of suppressed and censored injustices.

WikiLeaks relies on its supporters in order to stay strong. Please keep us at the forefront of anti-censorship and
support us today. You can also read more about WikiLeaks, our mission and objectives.

2010-11-28
On Sunday 28th Novembre 2010, Wikileaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into the US Government's foreign activities.

2010-11-28
Due to recent attacks on our infrastructure, we've decided to make sure everyone can reach our content. As part of this process we're releasing archived copy of all files we ever released - that's almost 20,000 files. The archive linked here contains a torrent generated for each file and each directory.

2010-10-22
The 391,832 reports ('The Iraq War Logs'), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a 'SIGACT' or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.
2010-07-25
From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties. From any document page, clicking on the green underlined text will open a popup that links to other documents that contain those phrases, making it possible to see important search terms and connections that you might not otherwise notice.
2010-04-05
WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad -- including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.


About Wikileaks
WikiLeaks is a not-for-profit media organisation. Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box). One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth. We are a young organisation that has grown very quickly, relying on a network of dedicated volunteers around the globe. Since 2007, when the organisation was officially launched, WikiLeaks has worked to report on and publish important information. We also develop and adapt technologies to support these activities.
WikiLeaks has sustained and triumphed against legal and political attacks designed to silence our publishing organisation, our journalists and our anonymous sources. The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. We derive these principles from the Universal Declaration of Human Rights. In particular, Article 19 inspires the work of our journalists and other volunteers. It states that everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. We agree, and we seek to uphold this and the other Articles of the Declaration.

1.2 How WikiLeaks works
WikiLeaks has combined high-end security technologies with journalism and ethical principles. Like other media outlets conducting investigative journalism, we accept (but do not solicit) anonymous sources of information. Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies. This provides maximum protection to our sources. We are fearless in our efforts to get the unvarnished truth out to the public. When information comes in, our journalists analyse the material, verify it and write a news piece about it describing its significance to society. We then publish both the news story and the original material in order to enable readers to analyse the story in the context of the original source material themselves. Our news stories are in the comfortable presentation style of Wikipedia, although the two organisations are not otherwise related. Unlike Wikipedia, random readers can not edit our source documents.
As the media organisation has grown and developed, WikiLeaks been developing and improving a harm minimisation procedure. We do not censor our news, but from time to time we may remove or significantly delay the publication of some identifying details from original documents to protect life and limb of innocent people.
We accept leaked material in person and via postal drops as alternative methods, although we recommend the anonymous electronic drop box as the preferred method of submitting any material. We do not ask for material, but we make sure that if material is going to be submitted it is done securely and that the source is well protected. Because we receive so much information, and we have limited resources, it may take time to review a source's submission.
We also have a network of talented lawyers around the globe who are personally committed to the principles that WikiLeaks is based on, and who defend our media organisation.

1.3 Why the media (and particularly Wiki leaks) is important
Publishing improves transparency, and this transparency creates a better society for all people. Better scrutiny leads to reduced corruption and stronger democracies in all society's institutions, including government, corporations and other organisations. A healthy, vibrant and inquisitive journalistic media plays a vital role in achieving these goals. We are part of that media.
Scrutiny requires information. Historically, information has been costly in terms of human life, human rights and economics. As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered. In its landmark ruling on the Pentagon Papers, the US Supreme Court ruled that "only a free and unrestrained press can effectively expose deception in government." We agree.
We believe that it is not only the people of one country that keep their own government honest, but also the people of other countries who are watching that government through the media.
In the years leading up to the founding of WikiLeaks, we observed the world's publishing media becoming less independent and far less willing to ask the hard questions of government, corporations and other institutions. We believed this needed to change.
WikiLeaks has provided a new model of journalism. Because we are not motivated by making a profit, we work cooperatively with other publishing and media organisations around the globe, instead of following the traditional model of competing with other media. We don't hoard our information; we make the original documents available with our news stories. Readers can verify the truth of what we have reported themselves. Like a wire service, WikiLeaks reports stories that are often picked up by other media outlets. We encourage this. We believe the world's media should work together as much as possible to bring stories to a broad international readership.

1.4 How WikiLeaks verifies its news stories
We assess all news stories and test their veracity. We send a submitted document through a very detailed examination a procedure. Is it real? What elements prove it is real? Who would have the motive to fake such a document and why? We use traditional investigative journalism techniques as well as more modern rtechnology-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organisation, and answer a set of other detailed questions about the document. We may also seek external verification of the document For example, for our release of the Collateral Murder video, we sent a team of journalists to Iraq to interview the victims and observers of the helicopter attack. The team obtained copies of hospital records, death certificates, eye witness statements and other corroborating evidence supporting the truth of the story. Our verification process does not mean we will never make a mistake, but so far our method has meant that WikiLeaks has correctly identified the veracity of every document it has published.
Publishing the original source material behind each of our stories is the way in which we show the public that our story is authentic. Readers don't have to take our word for it; they can see for themselves. In this way, we also support the work of other journalism organisations, for they can view and use the original documents freely as well. Other journalists may well see an angle or detail in the document that we were not aware of in the first instance. By making the documents freely available, we hope to expand analysis and comment by all the media. Most of all, we want readers know the truth so they can make up their own minds.

1.5 The people behind WikiLeaks
WikiLeaks is a project of the Sunshine Press. It's probably pretty clear by now that WikiLeaks is not a front for any intelligence agency or government despite a rumour to that effect. This rumour was started early in WikiLeaks' existence, possibly by the intelligence agencies themselves. WikiLeaks is an independent global group of people with a long standing dedication to the idea of a free press and the improved transparency in society that comes from this. The group includes accredited journalists, software programmers, network engineers, mathematicians and others.
To determine the truth of our statements on this, simply look at the evidence. By definition, intelligence agencies want to hoard information. By contrast, WikiLeaks has shown that it wants to do just the opposite. Our track record shows we go to great lengths to bring the truth to the world without fear or favour.
The great American president Thomas Jefferson once observed that the price of freedom is eternal vigilance. We believe the journalistic media plays a key role in this vigilance.

1.6 Anonymity for sources
As far as we can ascertain, WikiLeaks has never revealed any of its sources. We can not provide details about the security of our media organisation or its anonymous drop box for sources because to do so would help those who would like to compromise the security of our organisation and its sources. What we can say is that we operate a number of servers across multiple international jurisdictions and we we do not keep logs. Hence these logs can not be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers. Without specialized global internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.
However, we also provide instructions on how to submit material to us, via net cafes, wireless hot spots and even the post so that even if WikiLeaks is infiltrated by an external agency, sources can still not be traced. Because sources who are of substantial political or intelligence interest may have their computers bugged or their homes fitted with hidden video cameras, we suggest that if sources are going to send WikiLeaks something very sensitive, they do so away from the home and work.
A number of governments block access to any address with WikiLeaks in the name. There are ways around this. WikiLeaks has many cover domains, such as https://destiny.mooo.com, that don't have the organisation in the name. It is possible to write to us or ask around for other cover domain addresses. Please make sure the cryptographic certificate says wikileaks.org .

2. WikiLeaks' journalism record
2.1 Prizes and background
WikiLeaks is the winner of:
§  the 2008 Economist Index on Censorship Freedom of Expression award
§  the 2009 Amnesty International human rights reporting award (New Media)
WikiLeaks has a history breaking major stories in major media outlets and robustly protecting sources and press freedoms. We have never revealed a source. We do not censor material. Since formation in 2007, WikiLeaks has been victorious over every legal (and illegal) attack, including those from the Pentagon, the Chinese Public Security Bureau, the Former president of Kenya, the Premier of Bermuda, Scientology, the Catholic & Mormon Church, the largest Swiss private bank, and Russian companies. WikiLeaks has released more classified intelligence documents than the rest of the world press combined.
2.2 Some of the stories we have broken
§  War, killings, torture and detention
§  Government, trade and corporate transparency
§  Suppression of free speech and a free press
§  Diplomacy, spying and (counter-)intelligence
§  Ecology, climate, nature and sciences
§  Corruption, finance, taxes, trading
§  Censorship technology and internet filtering
§  Cults and other religious organizations
§  Abuse, violence, violation

War, killings, torture and detention
§  Changes in Guantanamo Bay SOP manual (2003-2004) - Guantanamo Bay's main operations manuals
§  Of Orwell, Wikipedia and Guantanamo Bay - In where we track down and expose Guantanamo Bay's propaganda team
§  Fallujah jail challenges US - Classified U.S. report into appalling prison conditions in Fallujah
§  U.S lost Fallujah's info war - Classified U.S. intelligence report on the battle of Fallujah, Iraq
§  US Military Equipment in Iraq (2007) - Entire unit by unit equipment list of the U.S army in Iraq
§  Dili investigator called to Canberra as evidence of execution mounts - the Feb 2008 killing of East Timor rebel leader Reinado
§  Como entrenar a escuadrones de la muerte y aplastar revoluciones de El Salvador a Iraq - The U.S. Special Forces manual on how to prop up unpopular government with paramilitaries

Government, trade and corporate transparency
§  Change you can download: a billion in secret Congressional reports - Publication of more than 6500 Congressional Research Reports, worth more than a billion dollars of US tax-funded research, long sought after by NGOs, academics and researchers
§  ACTA trade agreement negotiation lacks transparency - The secret ACTA trade agreement draft, followed by dozens of other publications, presenting the initial leak for the whole ACTA debate happening today
§  Toll Collect Vertraege, 2002 - Publication of around 10.000 pages of a secret contract between the German federal government and the Toll Collect consortium, a private operator group for heavy vehicle tolling system
§  Leaked documents suggest European CAP reform just a whitewash - European farm reform exposed
§  Stasi still in charge of Stasi files - Suppressed 2007 investigation into infiltration of former Stasi into the Stasi files commission
§  IGES Schlussbericht Private Krankenversicherung, 25 Jan 2010 - Hidden report on the economics of the German private health insurance system and its rentability

Suppression of free speech and a free press
§  The Independent: Toxic Shame: Thousands injured in African city, 17 Sep 2009 - Publication of an article originally published in UK newspaper The Independent, but censored from the Independent's website. WikiLeaks has saved dozens of articles, radio and tv recordings from disappearing after having been censored from BBC, Guardian, and other major news organisations archives.
§  Secret gag on UK Times preventing publication of Minton report into toxic waste dumping, 16 Sep 2009 - Publication of variations of a so-called super-injunction, one of many gag-orders published by WikiLeaks to expose successful attempts to suppress the free press via repressive legal attacks
§  Media suppression order over Turks and Caicos Islands Commission of Inquiry corruption report, 20 Jul 2009 - Exposure of a press gagging order from the Turks and Caicos Islands, related to WikiLeaks exposure of the Commission of Inquiry corruption report
§  Bermuda's Premier Brown and the BCC bankdraft - Brown went to the Privy council London to censor the press in Bermuda
§  How German intelligence infiltrated Focus magazine - Illegal spying on German journalists

Diplomacy, spying and (counter-)intelligence
§  U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008 - Classified (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. Has been in the worldwide news.
§  CIA report into shoring up Afghan war support in Western Europe, 11 Mar 2010 - This classified CIA analysis from March, outlines possible PR-strategies to shore up public support in Germany and France for a continued war in Afghanistan. Received international news coverage in print, radio and TV.
§  U.S. Embassy profiles on Icelandic PM, Foreign Minister, Ambassador - Publication of personal profiles for briefing documents for U.S. officials visiting Iceland. While lowly classified are interesting for subtle tone and internal facts.
§  Cross-border clashes from Iraq O.K. - Classified documents reveal destabalizing U.S. military rules
§  Tehran Warns US Forces against Chasing Suspects into Iran - Iran warns the United States over classified document on WikiLeaks
§  Inside Somalia and the Union of Islamic Courts - Vital strategy documents in the Somali war and a play for Chinese support
Ecology, climate, nature and sciences
§  Draft Copenhagen climate change agreement, 8 Dec 2009 - Confidential draft "circle of commitment" (rich-country) Copenhagen climate change agreement
§  Draft Copenhagen Accord Dec 18, 2009 - Three page draft Copehagen "accord", from around Friday 7pm, Dec 18, 2009; includes pen-markings
§  Climatic Research Unit emails, data, models, 1996-2009 - Over 60MB of emails, documents, code and models from the Climatic Research Unit at the University of East Anglia, written between 1996 and 2009 that lead to a worldwide debate
§  The Monju nuclear reactor leak - Three suppressed videos from Japan's fast breeder reactor Monju revealing the true extent of the 1995 sodium coolant disaster

Corruption, finance, taxes, trading
§  The looting of Kenya under President Moi - $3,000,000,000 presidential corruption exposed; swung the Dec 2007 Kenyan election, long document, be patient
§  Gusmao's $15m rice deal alarms UN - Rice deal corruption in East Timor
§  How election violence was financed - the embargoed Kenyan Human Rights Commission report into the Jan 2008 killings of over 1,300 Kenyans
§  Financial collapse: Confidential exposure analysis of 205 companies each owing above EUR45M to Icelandic bank Kaupthing, 26 Sep 2008 - Publication of a confidential report that has lead to hundreds of newspaper articles worldwide
§  Barclays Bank gags Guardian over leaked memos detailing offshore tax scam, 16 Mar 2009 - Publication of censored documents revealing a number of elaborate international tax avoidance schemes by the SCM (Structured Capital Markets) division of Barclays
§  Bank Julius Baer: Grand Larceny via Grand Cayman - How the largest private Swiss bank avoids paying tax to the Swiss government
§  Der Fall Moonstone Trust - Cayman Islands Swiss bank trust exposed
§  Over 40 billion euro in 28167 claims made against the Kaupthing Bank, 23 Jan 2010 - List of Kaupthing claimants after Icelandic banking crash
§  Northern Rock vs. WikiLeaks - Northern Rock Bank UK failed legal injunctions over the ¡ÃŒ24,000,000,000 collapse
§  Whistleblower exposes insider trading program at JP Morgan - Legal insider trading in three easy steps, brought to you by JP Morgan and the SEC

Censorship technology and internet filtering
§  Eutelsat suppresses independent Chinese-language TV station NTDTV to satisfy Beijing - French sat provider Eutelsat covertly removed an anti-communist TV channel to satisfy Beijing
§  Internet Censorship in Thailand - The secret internet censorship lists of Thailand's military junta

Cults and other religious organizations
§  Church of Scientology's 'Operating Thetan' documents leaked online - Scientology's secret, and highly litigated bibles
§  Censored Legion de Cristo and Regnum Cristi document collection - Censored internal documents from the Catholic sect Legion de Cristo (Legion of Christ)
§  US Department of Labor investigation into Landmark Education, 2006 - 2006 investigative report by the U.S. Department of Labor on Landmark Education

Abuse, violence, violation
§  Report on Shriners raises question of wrongdoing - corruption exposed at 22 U.S. and Canadian children's hospitals.
§  Claims of molestation resurface for US judo official
§  Texas Catholic hospitals did not follow Catholic ethics, report claims - Catholic hospitals violated catholic ethics

3. Short essays on how a more inquiring media can make a difference in the world
3.1 The Malaria Case Study: the antidote is good governance born from a strong media
Malaria is a case study in why good governance not just good science is the solution to so much human suffering. This year, the mosquito borne disease will kill over one million people. More than 80% of these will be children. Great Britain used to have malaria. In North America, malaria was epidemic and there are still a handful of infections each year. In Africa malaria kills over 100 people per hour. In Russia, amidst the corruption of the 1990s, malaria re-established itself. What is the difference between these cases?
Why does Malaria kill so many people in one place but barely take hold in another? Why has malaria been allowed to gain a foothold in places like Russia where it was previously eradicated? We know how to prevent malaria epidemics. The science is universal. The difference is good governance.
Put another way, unresponsive or corrupt government, through malaria alone, causes a children's "9/11" every day. [1]
It is only when the people know the true plans and behaviour of their governments that they can meaningfully choose to support or reject them. Historically, the most resilient forms of open government are those where publication and revelation are protected. Where that protection does not exist, it is our mission to provide it through an energetic and watchful media.
In Kenya, malaria was estimated to cause 20% of all deaths in children under five. Before the Dec 2007 national elections, WikiLeaks exposed $3 billion of Kenyan corruption, which swung the vote by 10%. This led to changes in the constitution and the establishment of a more open government. It is too soon to know if it will contribute to a change in the human cost of malaria in Kenya but in the long term we believe it may. It is one of many reforms catalyzed by WikiLeaks unvarnished reporting.
3.2 The importance of principled leaking to journalism, good government and a healthy society
Principled leaking has changed the course of history for the better. It can alter the course of history in the present, and it can lead us to a better future.
Consider Daniel Ellsberg, working within the US government during the Vietnam War. He comes into contact with the Pentagon Papers, a meticulously kept record of military and strategic planning throughout the war. Those papers reveal the depths to which the US government has sunk in deceiving the American people about the war. Yet the public and the media know nothing of this urgent and shocking information. Indeed, secrecy laws are being used to keep the public ignorant of gross dishonesty practised by their own government. In spite of those secrecy laws and at great personal risk, Ellsberg manages to disseminate the Pentagon papers to journalists and to the world. Despite criminal charges against Ellsberg, eventually dropped, the release of the Pentagon Papers shocks the world, exposes the government lying and helps to shorten the war and save thousands of both American and Vietnamese lives.
The power of principled leaking to call governments, corporations and institutions to account is amply demonstrated through recent history. The public scrutiny of otherwise unaccountable and secretive institutions forces them to consider the ethical implications of their actions. Which official will chance a secret, corrupt transaction when the public is likely to find out? What repressive plan will be carried out when it is revealed to the citizenry, not just of its own country, but the world? When the risks of embarrassment and discovery increase, the tables are turned against conspiracy, corruption, exploitation and oppression. Open government answers injustice rather than causing it. Open government exposes and undoes corruption. Open governance is the most effective method of promoting good governance.
Today, with authoritarian governments in power in much of the world, increasing authoritarian tendencies in democratic governments, and increasing amounts of power vested in unaccountable corporations, the need for openness and transparency is greater than ever. WikiLeaks interest is the revelation of the truth. Unlike the covert activities of state intelligence agencies, as a media publisher WikiLeaks relies upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments and corporations to justice.
With its anonymous drop box, WikiLeaks provides an avenue for every government official, every bureaucrat, and every corporate worker, who becomes privy to damning information that their institution wants to hide but the public needs to know. What conscience cannot contain, and institutional secrecy unjustly conceals, WikiLeaks can broadcast to the world. It is telling that a number of government agencies in different countries (and indeed some entire countries) have tried to ban access to WikiLeaks. This is of course a silly response, akin to the ostrich burying its head in the sand. A far better response would be to behave in more ethical ways.
Authoritarian governments, oppressive institutions and corrupt corporations should be subject to the pressure, not merely of international diplomacy, freedom of information laws or even periodic elections, but of something far stronger - the consciences of the people within them.
3.3 Should the press really be free?
In its landmark ruling on the Pentagon Papers, the US Supreme Court ruled that "only a free and unrestrained press can effectively expose deception in government." We agree.
The ruling stated that "paramount among the responsibilities of a free press is the duty to prevent any part of the government from deceiving the people and sending them off to distant lands to die of foreign fevers and foreign shot and shell."
It is easy to perceive the connection between publication and the complaints people make about publication. But this generates a perception bias, because it overlooks the vastness of the invisible. It overlooks the unintended consequences of failing to publish and it overlooks all those who are emancipated by a climate of free speech. Such a climate is a motivating force for governments and corporations to act justly. If acting in a just manner is easier than acting in an unjust manner, most actions will be just.
Sufficient principled leaking in tandem with fearless reporting will bring down administrations that rely on concealing reality from their own citizens.
It is increasingly obvious that corporate fraud must be effectively addressed. In the US, employees account for most revelations of fraud, followed by industry regulators, media, auditors and, finally, the SEC. Whistleblowers account for around half of all exposures of fraud.
Corporate corruption comes in many forms. The number of employees and turnover of some corporations exceeds the population and GDP of some nation states. When comparing countries, after observations of population size and GDP, it is usual to compare the system of government, the major power groupings and the civic freedoms available to their populations. Such comparisons can also be illuminating in the case of corporations.
Considering the largest corporations as analogous to a nation state reveals the following properties:
§  The right to vote does not exist except for share holders (analogous to land owners) and even there voting power is in proportion to ownership.
§  All power issues from a central committee.
§  There is no balancing division of power. There is no fourth estate. There are no juries and innocence is not presumed.
§  Failure to submit to any order may result in instant exile.
§  There is no freedom of speech.
§  There is no right of association. Even romance between men and women is often forbidden without approval.
§  The economy is centrally planned.
§  There is pervasive surveillance of movement and electronic communication.
§  The society is heavily regulated, to the degree many employees are told when, where and how many times a day they can go to the toilet.
§  There is little transparency and something like the Freedom of Information Act is unimaginable.
§  Internal opposition groups, such as unions, are blackbanned, surveilled and/or marginalized whenever and wherever possible.
While having a GDP and population comparable to Belgium, Denmark or New Zealand, many of these multi-national corporations have nothing like their quality of civic freedoms and protections. This is even more striking when the regional civic laws the company operates under are weak (such as in West Papua, many African states or even South Korea); there, the character of these corporate tyrannies is unregulated by their civilizing surroundings.
Through governmental corruption, political influence, or manipulation of the judicial system, abusive corporations are able to gain control over the defining element of government the sole right to deploy coercive force.
Just like a country, a corrupt or unethical corporation is a menace to all inside and outside it. Corporations will behave more ethically if the world is watching closely. WikiLeaks has exposed unethical plans and behaviour in corporations and this as resulted in recompense or other forms of justice forms of justice for victims.
3.4 Could oppressive regimes potentially come to face legal consequences as a result of evidence posted on WikiLeaks?
The laws and immunities that are applied in national and international courts, committees and other legal institutions vary, and we can't comment on them in particular. The probative value of documents posted on WikiLeaks in a court of law is a question for courts to decide.
While a secure chain of custody cannot be established for anonymous leaks, these leaks can lead to successful court cases. In many cases, it is easier for journalists or investigators to confirm the existence of a known document through official channels (such as an FOI law or legal discovery) than it is to find this information when starting from nothing. Having the title, author or relevant page numbers of an important document can accelerate an investigation, even if the content itself has not been confirmed. In this way, even unverified information is an enabling jump-off point for media, civil society or official investigations. Principled leaking has been shown to contribute to bringing justice to victims via the court system.

Submissions
NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.
1. Material we accept
Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere. This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It's not news if it has been publicly available elsewhere first, and we are a news organisation. However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.
If you are sending us something, we encourage you to include a brief description of why the documents is important and what the most significants parts are within the document. It will help our journalists to write up and released the story much faster.
2 Our anonymous electronic drop box
Wikileaks has an anonymous electronic drop box if you wish to provide original material to our journalists. Wikileaks accepts a range of material, but we do not solicit it. If you are going to send in material it should be done as securely as possible. That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
2.1 Its easy to submit
Our drop box is easy to use and provides military-grade encryption protection.
Submitting documents to our journalists is protected by law in better democracies. For other countries, the electronic drop box is there to offer help and protection. It is particularly designed to keep your identity hidden from everyone, including WikiLeaks. We never keep logs of who uses the drop box or where they are coming from.
There are several ways to send in material, but the most secure and anonymous is at the following link.
(currently closed for re-engineering security and useability improvements)
To add another layer of protection,you might also want to use the secure TOR network (http://suw74isz7qqzpmgu.onion/) Tor is a secure anonymous distributed network that provides maximum security.
2.2 Help with any questions about submitting
You can also chat to us online and we will answer any questions or solve any problems you might have with submitting (https://chat.wikileaks.org) (Currently temporarily closed with the electronic drop box for re-engineering.) Our chat is designed to be secure and anonymous. Visitors are protected by many layers of security. They can not see each other. There is a mechanism in place to stop logging and the server forbids potentially dangerous commands that could reveal other user's identity. Communication is secured with SSL encryption.
2.3 Protection for you
Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.
2.4 How it works
When WikiLeaks receives a document, our accredited journalists assess the submission. If it meets the criteria, our journalists then write or produce a news piece based on the document. This typically includes a description of the document, an analysis of why it is important, and an explanation of what it signifies to broader society. The news piece might also highlight the parts of the document that are most newsworthy. Our news stories are deliberately analytical regarding the wider significance of the document. We then link from the news piece to the original submission.
Submissions establish a journalist-source relationship. Online submissions are routed via countries which have strong shield laws to provide additional protection to sources and journalists.
Some documents submitted contain highly sensitive information. WikiLeaks has developed a harm minimisation proceedure to clean documents which might endanger innocent lives. In other instances, WikiLeaks may delay publishing some news stories and their supporting documents until the publication will not cause danger to such people. However in all cases, WikiLeaks will only redact the details that are absolutely necessary to this end. Everything else will be published to support the news story exactly as it appeared in the original document.
WikiLeaks has a overriding objective to publish and bring information into the public arena to encourage an informed society. It will stay doggedly true to this goal.
3. Directions for how to submit material
If you want to send us a message of your own, as opposed to a document, please see Contact.
3.1 Submissions via secure upload
Fast, easy and automatically encrypted with the best banking-grade encryption. We keep no records as to where you uploaded from, your time zone, browser or even as to when your submission was made (if you choose a non-zero publishing delay, we set the file time record to be the release date + a random time within that day).
If you are anonymously submitting a Microsoft word file (".doc") that you have edited at some stage, please try to send a PDF document (".pdf") instead, as Word documents may include your name or the name of your computer, see Word file redaction for further information. If you have no means to produce a PDF file your document will be converted by WikiLeaks staff.
The process your document will undergo is outlined for understanding submissions.
NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.
You can also use secure TOR network (secure, anonymous, distributed network for maximum security)
3.2 Submissions via our discreet postal network
Submissions to our postal network offer a strong form of anonymity and are good for bulk truth-telling.
Steps:
1.      First place your leak onto a floppy disk, CD, DVD or a USB Flash Drive. If you are using a floppy disks, please create two as they are often unreliable. If you only have paper documents, we will scan them if they are of significant political or media interest (if you are unsure whether this may be the case, please contact us first). This will delay the process however.
2.      Post your information to one of our trusted truth facilitators listed below. You may post to whatever country in the list that you feel most suitable given the nature of the material and your postal service. If your country's mail system is unreliable, you may wish to send multiple copies, use DHL, FedEX or another postal courier service.
WikiLeaks truth facilitators will then upload your submission using their fast internet connection. If you use a floppy disk, be sure to send two for increased reliability.
You can use whatever return address you like, but make doubly sure you have written the destination correctly as postal workers will not be able to return the envelope to you.
After receiving your postal submission our facilitators upload the data to WikiLeaks and then destroy the mailed package.
3.3 High risk postal submissions
If your leak is extremely high risk, you may wish to post away from your local post office at a location that has no witnesses or video monitoring.
Many CD and DVD writers will include the serial number of the DVD or CD writer onto the CD/DVDs they write. If the post is intercepted this information can in theory be used to track down the manufacturer and with their co-operation, the distributor, the sales agent and so on. Consider whether there are financial records connecting you to the CD/DVD writer sale if your adversary is capable of intercepting your letter to us and has the will to do this type of expensive investigation. Pay cash if you can for the CD/DVD writer.
Similarly, CD and DVD media themselves include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Pay cash when buying the CD or DVD. Try to choose a store without video cameras at the register.
Although we are aware of no instances where the above has been successfully used to trace an individual, anti-piracy operations have used the information to trace piracy outfits who sell tens or hundreds of thousands of counterfeit CDs or DVDs.
If you post it to us, a good option is to encrypt the USB file/CD file and then contact us at a later date via live online chat with the encryptin passphrase. That way if the post is intercepted, the data can not be copied.
If you suspect you are under physical surveillance, discreetly give the letter to a trusted friend or relative to post. On some rare occasions, targets of substantial political surveillance have been followed to the post office and have had their posted mail seized covertly. In this rare case if you are not intending to encrypt the data and if the police or intelligence services in your country are equipped to perform DNA and/or fingerprint analysis you may wish to take the appropriate handling precautions.
3.4 Postal addresses of our trusted truth facilitators
You may post to any country in our network.
Pick one that best suits your circumstances. If the country you are residing in has a postal system that is unreliable or frequently censored, you may wish to send your material to multiple addresses concurrently. For unlisted postal addresses, please contact us.
In Australia:
To: "WL" or any name likely to evade postal censorship in your country.
BOX 4080
Australia Post Office - University of Melbourne Branch
Victoria 3052
Australia

Wikileaks Mirrors
Wikileaks is currently under heavy attack.
In order to make it impossible to ever fully remove Wikileaks from the Internet, you will find below a list of mirrors of Wikileaks website and CableGate pages.
If you want to add your mirror to the list, see our Mass Mirroring Wikileaks page
Mirror List
Wikileaks is currently mirrored on 748 sites (updated 2010-12-07 08:33 GMT)