What was released on wikileaks
The entertainment company suffered a cyber-attack weeks before releasing The Interview, a film that poked fun at North Korea. The emails revealed that actresses Jennifer Lawrence and Amy Adams received a lower fee than their male co-stars in American Hustle.
There were also messages from producers and executives insulting celebrities such as Angelina Jolie. Leonardo DiCaprio was called "despicable" for turning down a role in a Sony Pictures film. Mr Assange said the emails were in the public interest because they showed the inner working of a multinational company and were "at the centre of a geo-political conflict". Who is Julian Assange? The helicopter attack. Image source, Wikileaks. US Army Intelligence. Image source, AFP.
Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. Submit documents to WikiLeaks. Shop Donate Submit. Leaks News About Partners. Vault 7: Projects. Protego 7 September, Protego consists of separate micro-controller units that exchange data and signals over encrypted and authenticated channels: » On-board TWA are the 'Master Processor' MP and the 'Deployment Box'.
Leaked Documents Protego Release Protego Release Angelfire 31 August, Leaked Documents Angelfire 2. Wolfcreek Docs -- Angelfire User Guide. Wolfcreek Docs -- Angelfire Test Matrix. Wolfcreek Docs -- Notes. ExpressLane 24 August, Leaked Documents ExpressLane v3. ExpressLane v3. CouchPotato 10 August, Leaked Documents CouchPotato v1. Dumbo 3 August, Leaked Documents Dumbo v3. Dumbo v3. Dumbo v2. Dumbo v1.
Imperial 27 July, Leaked Documents Achilles -- User Guide. SeaPea -- User Guide. Aeris -- Users Guide. Highrise 13 July, Leaked Documents HighRise 2. BothanSpy 6 July, Leaked Documents BothanSpy 1.
Gyrfalcon 2. Gyrfalcon 1. OutlawCountry 30 June, Leaked Documents OutlawCountry v1. Elsa 28 June, Brutal Kangaroo 22 June, EzCheese v6. EZCheese v6. Cherry Blossom 15 June, CherryBlossom -- Quick Start Guide. WiFi Devices. CherryBlossom -- Installation Guide. Pandemic 1 June, Leaked Documents Pandemic 1. Pandemic 1. Athena 19 May, Leaked Documents Athena v1. Athena Technology Overview. Athena Design. Athena Demo. AfterMidnight 12 May, Leaked Documents AfterMidnight v1. AlphaGremlin v0.
AfterMidnight Diagrams. Assassin v1. Archimedes 5 May, Leaked Documents Archimedes 1. If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. If you have any issues talk to WikiLeaks. We are the global experts in source protection — it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.
If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.
If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure. US Election Patrick Cockburn The Assange extradition case is an exceptional attack on press freedom. Patrick Lawrence Why have we turned our backs on sacred outcast Julian Assange?
Assange to hear judge's verdict on US extradition on Jan 4. US election. Fox presenters to face depositions over Seth Rich murder conspiracies. Assange extradition hearing paused over fears lawyer exposed to Covid. Assange warned he will be removed from court if outbursts continue.
0コメント