Contact

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: /talk

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http://wlchatc3pjwpli5r.onion

We recommend contacting us over Tor if you can.

Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

http://ibfckmpsmylhbfovflajicjgldsqpc75k5w454irzwlh7qifgglncbad.onion

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.

German BND-NSA Inquiry Exhibits

1 December, 2016

Today, 1 December 2016, WikiLeaks releases 90 gigabytes of information relating to the German parliamentary inquiry into the surveillance activities of Germany's foreign intelligence agency Bundesnachrichtendienst (BND) and its cooperation with the United States' National Security Agency (NSA).

The 2,420 documents originate from various agencies of the German government including the BND and Federal Office for the Protection of the Constitution, Bundesamt für Verfassungsschutz (BfV) and were submitted to the inquiry last year in response to questions posed by the committee. They include administrative documents, correspondence, agreements and press reactions. They also include 125 documents from the BND, 33 from the BfVand 72 from the Federal Office for Information Security (BSI).

The collection offers a detailed insight, not just into the agencies themselves, but also into the mechanics of the inquiry. Several documents detail how the agency in question collated the information that was requested of them. For example, a BND document shows its preparations for collecting internal information on which private US companies are operating in the security sector in Germany. Such internal processes are particularly pertinent to the inquiry. The committee has been trying (unsuccessfully so far) to gain access to the full selector list that the BND holds regarding who they spy on at the behest of the US. The BND is withholding this list from the inquiry on the grounds that releasing it could imperil the BND's relationship with the NSA.

Whilst a number of facts have already come to light as a result of the inquiry including WikiLeaks’ publication of inquiry transcripts last year this substantial new collection of primary source documents provides significant new evidence. The collection contains early agreements between the BND and the NSA and internal processes at the BND, but also more recent details on the close collaboration between the two agencies. For example, one document from the BND states that a BND employee will be tasked to use and write software for XKeyscore, an NSA system for searching and analysing data collected through mass surveillance.

A number of the documents show how intelligence agencies find ways to work around their own government. Documents pertaining to an audit visit by Germany's data protection agency to the BND's offices show that BND officers withheld the notes made by the auditors during their visit. The BND would only release the notes to the auditors once they had checked the content for themselves.

The inquiry was established in 2014 in the wake of the Snowden revelations, which showed that not only was the NSA spying on the whole world, but it had also partnered with the intelligence services of particular states to spy on their citizens and those of the surrounding regions. One of these countries is Germany, which has had a close relationship with the US in military and intelligence matters since its occupation by US forces in WWII. The US has been shown to use its bases in Germany and its relationship with German intelligence to spy on German citizens as well as European Union institutions.

WikiLeaks revelations of NSA spying on Angela Merkel and top officials at German ministries, the EU and France also contributed to the political impetus of the inquiry.

The depth of this relationship had been unknown to the German public and much of its government. The outrage that was sparked by the Snowden NSA revelations led to the establishment of the inquiry, which later called for Mr Snowden to testify at it. Whereas there was initially unanimity among German political parties in 2014 for Snowden to provide expert testimony, the government deemed that guaranteeing that he would not be handed over to the US (a condition imposed by Snowden for testifying) would damage Germany's political relationship with the United States. Subsequently, the Greens and the left-wing party (Die Linke) filed an official complaint to force the German Parliament to hear Mr Snowden.

Last week, on 21 November 2016, Germany's Federal Court of Justice upheld the complaint and ruled that the committee was obliged to hear Edward Snowden in person. However, at the next inquiry hearing three days after the ruling, Chancellor Angela Merkel’s Union bloc and the Social Democrats removed Snowden's invitation from the agenda of the inquiry and are contesting the Court's decision.

Julian Assange said: "This substantial body of evidence proves that the inquiry has been using documents from Mr Snowden and yet it has been too cowardly to permit him to testify. Germany can not take a leadership role within the EU if it's own parliamentary processes are subservient to the wishes of a non EU state."