\\ Home Page : Articolo : Stampa
How WikiLeaks works? Why the media (and particularly Wiki leaks) is important? How WikiLeaks verifies its news stories? The people behind WikiLeaks. Anonymity for sources. Part 3 of 6.
By Admin (from 16/02/2011 @ 12:00:42, in en - Global Observatory, read 2781 times)

1.5 The people behind WikiLeaks

WikiLeaks is a project of the Sunshine Press. It's probably pretty clear by now that WikiLeaks is not a front for any intelligence agency or government despite a rumour to that effect. This rumour was started early in WikiLeaks' existence, possibly by the intelligence agencies themselves. WikiLeaks is an independent global group of people with a long standing dedication to the idea of a free press and the improved transparency in society that comes from this. The group includes accredited journalists, software programmers, network engineers, mathematicians and others.

To determine the truth of our statements on this, simply look at the evidence. By definition, intelligence agencies want to hoard information. By contrast, WikiLeaks has shown that it wants to do just the opposite. Our track record shows we go to great lengths to bring the truth to the world without fear or favour.

The great American president Thomas Jefferson once observed that the price of freedom is eternal vigilance. We believe the journalistic media plays a key role in this vigilance.

1.6 Anonymity for sources

As far as we can ascertain, WikiLeaks has never revealed any of its sources. We can not provide details about the security of our media organisation or its anonymous drop box for sources because to do so would help those who would like to compromise the security of our organisation and its sources. What we can say is that we operate a number of servers across multiple international jurisdictions and we we do not keep logs. Hence these logs can not be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers. Without specialized global internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.

However, we also provide instructions on how to submit material to us, via net cafes, wireless hot spots and even the post so that even if WikiLeaks is infiltrated by an external agency, sources can still not be traced. Because sources who are of substantial political or intelligence interest may have their computers bugged or their homes fitted with hidden video cameras, we suggest that if sources are going to send WikiLeaks something very sensitive, they do so away from the home and work.

A number of governments block access to any address with WikiLeaks in the name. There are ways around this. WikiLeaks has many cover domains, such as https://destiny.mooo.com, that don't have the organisation in the name. It is possible to write to us or ask around for other cover domain addresses. Please make sure the cryptographic certificate says wikileaks.org .

2. WikiLeaks' journalism record

2.1 Prizes and background

WikiLeaks is the winner of:

  • the 2008 Economist Index on Censorship Freedom of Expression award
  • the 2009 Amnesty International human rights reporting award (New Media)

WikiLeaks has a history breaking major stories in major media outlets and robustly protecting sources and press freedoms. We have never revealed a source. We do not censor material. Since formation in 2007, WikiLeaks has been victorious over every legal (and illegal) attack, including those from the Pentagon, the Chinese Public Security Bureau, the Former president of Kenya, the Premier of Bermuda, Scientology, the Catholic & Mormon Church, the largest Swiss private bank, and Russian companies. WikiLeaks has released more classified intelligence documents than the rest of the world press combined.

2.2 Some of the stories we have broken

  • War, killings, torture and detention
  • Government, trade and corporate transparency
  • Suppression of free speech and a free press
  • Diplomacy, spying and (counter-)intelligence
  • Ecology, climate, nature and sciences
  • Corruption, finance, taxes, trading
  • Censorship technology and internet filtering
  • Cults and other religious organizations
  • Abuse, violence, violation

War, killings, torture and detention

  • Changes in Guantanamo Bay SOP manual (2003-2004) - Guantanamo Bay's main operations manuals
  • Of Orwell, Wikipedia and Guantanamo Bay - In where we track down and expose Guantanamo Bay's propaganda team
  • Fallujah jail challenges US - Classified U.S. report into appalling prison conditions in Fallujah
  • U.S lost Fallujah's info war - Classified U.S. intelligence report on the battle of Fallujah, Iraq
  • US Military Equipment in Iraq (2007) - Entire unit by unit equipment list of the U.S army in Iraq
  • Dili investigator called to Canberra as evidence of execution mounts - the Feb 2008 killing of East Timor rebel leader Reinado
  • Como entrenar a escuadrones de la muerte y aplastar revoluciones de El Salvador a Iraq - The U.S. Special Forces manual on how to prop up unpopular government with paramilitaries

TO BE CONTINUED ...