Submit a Leak to Wikileaks

Wikileaks.org is a site aimed at uncovering government, corporate, and other relevant information that the public has a right to know about but has been kept under wraps. A multi-jurisdictional public service aimed at protecting whistleblowers, journalists, and activists who have sensitive materials to make public, Wikileaks publishes and defends such information worldwide.

Wikileaks seeks to set the record right[citation needed], by ensuring the integrity of our common historical record and the rights of all peoples to create new history. The site protects every person who submits confidential information and uses Swedish and Belgian laws to protect confidentiality. So far Wikileaks has over 100,000 documents and every source has been protected, no documents have been censored, and all legal attacks against Wikileaks have been defeated.[citation needed]

If you have information to leak to Wikileaks, here is how to do so.

Steps

  1. Assess the leak-worthiness of your information before going any further. Wikileaks will only accept information that is:
    • Classified, censored, or otherwise restricted material of political, diplomatic, historical or ethical significance.
    • WikiLeaks does not accept rumour, opinion, or other kinds of first hand reporting or material that is already publicly available.
    • Areas of documents leaked thus far have covered government, trade, corporate, war, killings, torture, detention, suppression of free speech and free press, diplomacy, spying, counter-intelligence, ecology, climate, nature, sciences, Avoid Investing in Illegal Spanish Property, finances, taxes, trading, Access Wikipedia in China and internet filtering, cults, religious organizations, abuse, violence, violations.
  2. Get advice. If you're not sure as to the accuracy of your information or how to proceed with it, Wikileaks has an anonymous and secure chat at https://chat.wikileaks.org/ that you can join to discuss things, have your questions answered, and problems concerning the potential information responded to.
    • This chat has anti-logging features in place to prevent any accidental disclosure of your name, IP, or identity. All communications are secured with SSL encryption.
    • Alternatively, you can contact Wikileaks via http://wikileaks.org/wiki/Contact_us, following the prompts.
  3. Prepare your documents in advance. Wikileaks advises that you try to convert Microsoft Word documents into PDFs, so as to avoid leaving your name trail on the document. If you cannot do this, the Wikileaks staff will do it for you (but you might wish to request this be done as a reminder).
  4. Go to Wikileaks. It is found at http://wikileaks.org/.
  5. Click on the link "Submit Documents". This button is found at the center, top box of the page (see image).
  6. Choose your method of submission. There is a range of methods, each aimed at providing you with a way that is safest for you in your particular circumstances and context. You can choose to use either an online or postal submission method. Note that Wikileaks claims that postal submission has the highest security levels, provided you follow the steps outlined below.

The online submission process

  1. Submit your leak information online. A secure submission can be made online. The upload of a file is undertaken via a bank grade encrypted submission. No logs are kept and the information is protected under Swedish and Belgian press secrecy laws. Choose either the direct submission method, or the TOR network, as follows.
  2. Make a direct submission. Click on the activated line that reads "Click here to securely submit a file online." Check that it has a padlock at the end of it. This link will take you to another page.
    • Choose the file for uploading using the "browse" button. Double check that you have chosen the right document. Press "Upload" to submit.
  3. Make a submission via the secure TOR network. This is secure and anonymous. As a distributed network, Wikileaks states that this network provides maximum security for an online submission.
  4. Go to the chat room if unsure of anything (see above).

The postal submission process

  1. Post the submission. If you cannot use the online process, or you need the greatest anonymity possible, or you find it is simply unwieldy and difficult given the type or bulk of documentation that you have, Wikileaks enables you to post the documents and related information.
  2. Assemble your information. The information can be provided in any format that you're able to access and use effectively.
    • You can send CDs, DVDs, USB flash drives (memory sticks), microfiche, handwritten evidence, photos, etc.
    • Make two copies of anything transferred on a floppy disk, as floppies can be unreliable.[1]
    • Wikileaks will scan paper documents if they are of significant political or media interest – you can contact Wikileaks at http://wikileaks.org/wiki/Contact_us first if you're unsure of the significance of your documents.
  3. Address the envelope. If writing "Wikileaks" on the address label is going to cause suspicion and problems, then don't. Instead, use any name or acronym (e.g., "WL") you'd like, provided that you use the correct postal address. Contact Wikileaks direct at http://wikileaks.org/wiki/Contact_us for relevant unlisted postal addresses.
  4. Place the information in the post.
    • You can post to any country in the Wikileaks network. Post to whichever country you feel is most suitable. Go by the nature of the material and your postal service's reliability/ability.
    • Where your country has an unreliable postal system, make multiple copies and use Successfully Deal With UPS, Fedex and DHL Issues, or another postal courier service.
    • Another method is to send the materials to multiple addresses, to make sure the materials reach at least one of them.
    • Provision of a return address is up to you. If you do use one, make it clear so that the envelope can be returned to you.
  5. Expect the Wikileaks truth facilitators to upload your posted material to the Wikileaks website, using their fast internet connection. Wikileaks will destroy the mailed package.

High Risk Postal Submissions

  1. Wikileaks advises taking additional care where posting comes with high risk. Follow these steps to keep yourself as safe as possible.
  2. Post away from your usual, local post office. If you need to travel some distance, consider doing so where feasible.
  3. Check that there are no video cameras monitoring or people who might be watching at the post office you are going to.
  4. If you are being watched (surveillance), give the postal item to someone else whom you can trust and you know will not be followed or intercepted, such as a relative or friend. Ask them to post it from a safe place.
    • Sometimes mail is seized covertly when a person is under surveillance. Wikileaks advises that where this is a possibility, that you handle the documents with great care if you have concerns about possible interception and tracing back to you. Wear gloves to prevent leaving fingerprints. Dust off all hairs and other biological matter. Do not seal the envelope with your saliva.

Tips

  • Postage to Australia:
  • Wikileaks will never cooperate with anyone seeking to identify you.
  • "WL" (or any name likely to evade postal censorship in your country)

  • University of Melbourne

  • BOX 4080

  • Australia

  • Victoria 3052
  • Submitting confidential material to WikiLeaks is safe, easy and protected by law if you live in a country that recognizes these laws. Citizens of China, Cuba, North Korea, Iran, Venezuela and the United States should take caution in leaking documents.

Warnings

  • CD and DVD writers usually include the serial number of the DVD or CD writer onto the CD/DVDs they write. Theoretically, if intercepted, the entire supply chain could be tracked down to trace the purchase of the CD/DVD writer to you. If you think there are financial records traceable to you, and your adversary has the will/capacity to be this thorough, avoid this method if interception is a high likelihood. Such interception and tracing is very expensive, so keep that in mind when weighing your chances.
  • CD and DVD media also include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Anti-piracy activities have used this approach to track down counterfeit offenders.
  • Some documents, especially pertaining to government and military are classified for a reason. Unlawful transfer of these documents can result in serious charges such as espionage, punishable by death in times of war.[2] Even if you are successful at getting something on that site, you may get caught.[3]

Things You'll Need

  • Online methods: Computer with Internet access
  • Postal mail:
    • Hardcopy document(s) or magnetic or optical media
    • Appropriate packaging with sufficient postage

Related Articles

Sources and Citations