1. What is WikiLeaks?
According to Daniel Schmitt, a WikiLeaks spokesman, the site exists to "ensure the legally and technically protected retrieval of information from anonymous sources and to make available this information for the general public." It provides a secure online submission system for whistleblowers to upload documents, which WikiLeaks then makes available globally over the Web.
2. Who is behind it?
Understanding the structure of the group is difficult since its organizers keep it deliberately opaque to preserve it from legal or other attacks. Many of the site’s volunteers work anonymously. Nonetheless, Schmitt and Australian technologist Julian Assange often speak for WikiLeaks in interviews and public appearances, including this hour-long introduction to the project from 2009, and Assange's more recent interview on Al-Jazeera about WikiLeaks’ release of the video footage taken from an Apache helicopter, showing the killing of Iraqi civilians, including two Reuters journalists.
3. Where is WikiLeaks based?
The organization itself has no offices or central location.
Schmitt and Assange are originally from
WikiLeaks hosts its main Web servers in
Recently, WikiLeaks have been working with Icelandic
legislators to pass a series of legal reforms
that would give
4. Why the name?
Following discussions on an invited mailing list composed of human rights activists, computer experts, and authors in 2006, WikiLeaks formally launched in January 2007, and has gone through a number of different iterations since then.
Originally, the site was envisaged as a "wiki," a style of Web site that, like Wikipedia, allows anyone to enter content and anyone else to comment on or edit it. WikiLeaks says they worked carefully at the beginning to create technical measures to ensure the anonymity of the original sources and commenters.
In its current version, documents submitted to WikiLeaks are not instantly placed online and, once published, are not freely editable. Submissions are selected for publishing by Wikileaks' volunteers and later placed online, sometimes in an edited form, according to the site.
5. What kind of documents does Wikileaks release?
The site says that "WikiLeaks accepts classified, censored or otherwise restricted material of political, diplomatic or ethical significance. WikiLeaks does not accept rumour, opinion or other kinds of first hand reporting or material that is already publicly available."
Previous document releases have included the correspondence of researchers at the Climatic Research Unit at East Anglia University, half a million pager messages from September 11, 2001, Sarah Palin's hacked e-mails, and an advance copy of a report on police killings by the Kenyan National Commission.
6. Are all of these files still available?
For much of its existence, WikiLeaks offered an archive of its previously leaked documents. During a fundraising drive late last year, the site closed down access to its historical archive of leaked documents, and continues to operate a minimal site, providing only a short list of recent documents until they have the funding to provide a full service again.
Removed WikiLeaks content may be available (mirrored) elsewhere; journalists relying on content from the server should keep their own copies.
7. How is WikiLeaks funded?
The group accepts donations on its Web site, and claims a minimal required annual budget of $200,000 ($600,000 if all volunteers were paid for their time). The site has experimented with alternative methods of funding, including exclusivity arrangements with specific mass media organizations and the auctioning off of rights to particular documents.
8. What preparation does WikiLeaks do prior to publishing the documents?
WikiLeaks says that its pre-publishing process checks documents for their authenticity and compliance with their submission criteria before publishing, but not for content or legal status.
WikiLeaks does reformat documents and present them in a form
different from the original document. It attempts to remove data from material
that might identify the source, such as watermarks or metadata. The changes can
be also be stylistic (it presented its release of 570,000 pager messages from
September 11, 2001, as a real-time re-enactment, and produced
an edited version of the Iraq Apache footage), or meant to make the data
more comprehensible by the public. WikiLeaks claims that the
9. Has WikiLeaks been censored, prosecuted, or attacked in the past?
WikiLeaks has been blacklisted by national
Internet censorship systems, sometimes because it has published censorship
blacklists itself. It was added to a proposed mandatory Australian blacklist
after WikiLeaks published
In February 2008, the Swiss bank Julius Baer filed suit
A 2008 classified assessment of WikiLeaks written by an analyst at the Army Counterintelligence Center proposed that "the identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistleblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the WikiLeaks.org Web site." The document was leaked to and published by WikiLeaks in 2010.
has reported that trespassers with weapons entered his compound in
10. How well protected are sources that submits to WikiLeaks?
Both PRQ and WikiLeaks strongly assert their dedication to
Sources are at risk, however, from other organizations that
might monitor submissions to the site. In 2008,
Sources or other visitors concerned about protecting their identity should use WikiLeaks in conjunction with an anonymizing service, such as the Tor Browser Bundle, which can help hide their origins from intermediaries.
Malicious parties intending to track down submitters could also surreptitiously redirecting visitors to WikiLeaks' submission page to their own servers, where they could offer a fake WikiLeaks site, similar to how criminals pretend to be banking or financial sites.
A simple way of verifying you are visiting the real WikiLeaks secure submission site is to double-click on the small padlock icon (either at the bottom of your browser window, or near the address bar at the top). Click on the button marked "Certification Information" or "View Certificate." Among the values listed on your screen for the Wikileak's certificate, there should be two strings of numbers, marked "Fingerprints." The real WikiLeaks' fingerprints, at least for now, are:
If you see fingerprints marked "MD5" or "SHA1" that are different from these, exercise extreme caution—it shows that the encryption key used by the site you are visiting does not match the past key used by the official WikiLeaks site, and so could be an impostor.