Deep Politics Forum

Full Version: Wikispooks - Whistleblowing and Anonymous Uploads
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Anonymous uploads here

Regular non-anonymous uploads here

Main Page here

The WikiSpooks Anonymous upload facility is provided to allow Whistle-Blowers to put sensitive information into the public domain with considerably reduced risk of their identity being revealed to either the Authorities or the public.
Note: It is not intended as the primary means of having documents published on WikiSpooks.
Unless anonymity is of fundamental importance, then the best way of publishing a document file is through the 'Regular file upload' option on the left-land menu. This is available to all registered users including those choosing to use the 'soft anonymity' of a pseudonymous user name. Files uploaded using this option are immediately available to both view and edit on the WikiSpooks site.
Secure anonymous upload form

Anonymous uploads are handled outside the MediaWiki platform that runs this site. This is because a feature of MediaWiki is that it logs EVERY normal edit and upload, assigning it to either a user ID (in the case of registered users) or the originating IP address (in the case of anonymous users - when edits and uploads are allowed). The WikiSpooks secure anonymous upload form is not part of the MediaWiki software platform that runs the main WikiSpooks site and your file will only be imported into the software by an Administrator after vetting and anonymising etc.
What WikiSpooks does with an anonymous submission

1. The received file name is entered in a simple, publicly accessible list on the 'Anonymous Uploads Received' page, topmost entry latest. This is a manual process and may take up to two days from actual receipt of the upload. The purpose of the page is simply to give uploaders additional confidence that the file upload was successful. There is no receipt date/time entered since this could become a major input for anyone trying to trace the source of the information. Note: The actual upload file name is listed, NOT the file(s) contained inside any zip file at this stage.
2. Subject it to preliminary vetting for WikiSpooks suitability.
3. If judged suitable
  • reformat the submission to remove any possibility of it being traceable back to the originator.
  • forward it to at least three other sites that actively solicit "whistlebower" information.
  • publish the document to WikiSpooks with a skeleton explanatory page. This page can be viewed by anybody and edited by registered users
4. If judged unsuitable on preliminary vetting
  • seek the consensus view of WikiSpooks administrators.
    • If majority administrator view is "suitable" proceed with steps outlined at 3.
    • If majority administrator view is "unsuitable", remove the submission from WikiSpooks servers.

email submissions

Where the submission is by email (with or without an attachment), WikiSpooks may engage in brief email correspondence regarding submission provenance etc. At the discretion of WikiSpooks administrators, such correspondence may qualify for WikiSpooks publication. It is strongly advised that email exchanges be PGP encrypted.
Final judgements on what is and is not suitable for publication on this site rests with WikiSpooks administrators.
More on the anonymous submission vetting process

WikiSpooks focus is on the deceptions of authority epitomised by 'The Official Narrative' of almost all events of significance affecting public policy and the exercise of power, together with the arbitrary and/or abusive exercise of power. That focus effectively defines the criteria for the suitability of anonymously received information for publication. Anyone who is privy to such information and, with those criteria in mind, feels aggrieved, outraged or just plain public-spirited enough to wish to make it widely known, is likely to see it published on WikiSpooks and elsewhere following an anonymous upload.
A non-exclusive list of candidates for non-publication are: axe-grinding, agenda-promoting, disinformation, advertising, obvious spam and probably a few others - all with the caveat that disinformation (recognised or not) may make it to a WikiSpooks page anyway. Obvious examples of disinformation may be published for a bit of fun. ALL published anonymous uploads have a 'Registered User editable' and 'publicly readable' talk/discussion page attached.
Tips on maintaining anonymity

There is no way to guarantee that any form of internet-based communication will remain anonymous. The internet surveillance activities of SIS's, their Agencies and contractors, together with their technical forensic capabilities, are simply too comprehensive to allow anyone using a single ISP and home computer to remain anonymous for long if their internet activities are of the remotest possible interest to Authority. The age of Orwell's 'Big Brother' really is upon us in other words. However, there are a number of simple steps you can take to increase the likelihood of a successful anonymous document submission to WikiSpooks:

  1. Use an anonymous proxy service such as Tor for your submission.
  2. Use PGP encryption for your emails .
  3. If you have more than one document file, bundle them into a single compressed Zip file .
  4. Upload your file to a single recipient only - then wait a week or two to see what happens.
If you upload multiple files or to multiple recipients, the prospects of successfull interception/diversion/copying by Authorities during transmission are correspondingly multiplied. If you upload to WikiSpooks, our first action after reformatting it to remove information that could tie it to a particular machine operating system and/or user, is to forward it to at least 3 other sites dedicated to shining light in dark places, so that multiple submissions should be unnecessary.
Remember that evidence of your having stored the document and sent it to WikiSpooks may remain on your computer and be accessible using forensic examination tools. An effective way of frustrating such forensics is to use a LiveCD operating system to boot your computer before sending the document and to store the document using a system such as Truecrypt which facilitates a "hidden encrypted volume" whose existence is plausibly deniable because it cannot be forensically proven to exist at all.
WikiSpooks PGP public encryption key

Click here for the WikiSpooks PGP public encryption key and brief information about how to use it to encrypt your email exchanges with WikiSpooks.