Wikileaks gitmo manual


















Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. If you have any issues talk to WikiLeaks.

We are the global experts in source protection — it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations. If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion. If a legal action is brought against you as a result of your submission, there are organisations that may help you.

The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors.

You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed. The attacks, exposed by government transparency group Wikileaks , include deleting detainees' ID numbers from Wikipedia, the systematic posting of unattributed "self praise" comments on news organization web sites in response to negative press, boosting pro-Guantanamo stories on the internet news site Digg and even modifying Fidel Castro's encyclopedia article to describe the Cuban president as "an admitted transexual" [sic].

Among the un- or mis-attributed responses to news stories were statements such as "[Guantanamo is] a very professional place full of true American patriots. Guantanamo command spokesman Lt. Edward Bush, at first denied the charges to the New York Daily News , but then dramatically fell over himself in attempting to attack Wikileaks for fingering members of the Guantanamo Public Affairs Office as among the culprits:.

Wikileaks subsequently asked noted computer security expert Bruce Schneier to independently review the evidence:. Barring obscure loopholes, the admitted acts of the Guantanamo Bay Public Affairs Office are unlawful:. The third, depending on how the Public Affairs Office funding was structured during time the activities took place may also be illegal. Since , the following prohibition on the use of appropriated funds for propaganda purposes has been enacted annually: "No part of any appropriation contained in this or any other Act shall be used for publicity or propaganda purposes within the United States not heretofore authorized by Congress.

Message up to characters. Check out this story on Newser. Report an Error. Send to Editors. We see that you're using an ad-blocker. Turn off your ad-blocker for Newser only. One last step. We use cookies. By Clicking "OK" or any content on this site, you agree to allow cookies to be placed. It is unclassified, but designated "For Official Use Only. The disclosure highlights the internet's usefulness to whistle-blowers in anonymously propagating documents the government and others would rather conceal.

Anonymous open-government activists created Wikileaks in January, hoping to turn it into a clearinghouse for such disclosures. The site uses a Wikipedia-like system to enlist the public in authenticating and analyzing the documents it publishes. The Camp Delta document. Dakwar sees hints of Abu Ghraib in a section instructing guards to use dogs to intimidate prisoners.



0コメント

  • 1000 / 1000