The following is the handle of our safe web site where you can anonymously add your paperwork to WikiLeaks editors. You are able to only access this submissions program by Tor. (See our Tor tab for more information.) We also recommend you to definitely go through our techniques for resources in advance of submitting.
Our submission process performs not easy to protect your anonymity, but we advise You furthermore mght get a few of your personal safety measures. You should assessment these fundamental tips. 1. Contact us When you've got distinct difficulties
"Tradecraft DO's and DON'Ts" contains CIA guidelines on how its malware really should be written in order to avoid fingerprints implicating the "CIA, US governing administration, or its witting companion firms" in "forensic overview".
展开全部 百度识图网页版入口为:,用户可以通过该链接在线使用百度识图功能,无需下载或安装任何软件。
When you've got an incredibly large submission, or even a submission with a posh structure, or absolutely are a large-hazard source, you should contact us. Inside our expertise it is often feasible to locate a tailor made Resolution for even by far the most seemingly tough cases.
JQJIMPROVISE toolset for configuration, post-processing, payload set up and execution vector range for survey / exfiltration equipment supporting all important working procedure
Tor is undoubtedly an encrypted anonymising community that makes it tougher to intercept Net communications, or see wherever communications are coming from or intending to.
In particular, challenging drives keep data immediately after formatting which may be noticeable to your electronic forensics team and flash media (USB sticks, memory cards and SSD drives) keep information even following a safe erasure. In case you employed flash media to store delicate info, it is important to demolish the media.
For anyone who is a higher-possibility source, stay clear of expressing anything at all or accomplishing everything after distributing which could encourage suspicion. In particular, you must try to persist with your standard routine and behaviour.
Tails can be a Dwell working system, that you can begin on Just about any Personal computer from a DVD, 爱思助手下载 USB adhere, or SD card. It aims at preserving your privateness and anonymity.
If you cannot use Tor, or your submission is extremely massive, or you have got specific needs, WikiLeaks supplies various alternative techniques. Make contact with us to discuss the way to carry on.
To assault its targets, the CIA generally necessitates that its implants talk to their Regulate packages on the internet. If CIA implants, Command & Control and Listening Write-up application had been classified, then CIA officers may very well be prosecuted or dismissed for violating policies that prohibit placing categorised data onto the Internet.
If You can not use Tor, or your submission is extremely significant, or you may have particular necessities, WikiLeaks offers various option procedures. Get in touch with us to debate how you can progress.
If you need enable making use of Tor you could Make contact with WikiLeaks for aid in environment it up applying our straightforward webchat out there at: