Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Wikileaks and clones. Other ways and places to leak documents, films etc
#17
http://www.unileaks.org/
UniLeaks is a news organisation.
1. Material we accept
Unileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance which is in some way connected to higher education, an agency or government body working in partnership with an institution, e.g., a University.
We absolutely do not accept rumor, opinion, other kinds of first-hand accounts or material that is publicly available elsewhere.
We restrict our accepted material because our journalists write news based on the material, and then provide a link to the supporting documentation to prove our stories are true.
It's not news if it has been publicly available elsewhere first, and we are a news organisation.
However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.
If you are sending us something, we encourage you to include a brief description of why the document is important and what the most significant parts are within the document. It will help our journalists to write up and release a story much faster.
1.2 FORUMS - UNIVERSITY LISTINGS
The forums are not for general public discussion, they are merely a repository for administrators to post material relating to that specific university. We are currently working on a general discussion forum which will be opened shortly for general use and which will be secure.
If your university is not listed and you want a section created please contact info@unileaks.org with the following information.
Name of the university - website address - Host location.
2. Our anonymous electronic drop box
Unileaks has an electronic drop box if you wish to provide original material to our journalists.
Unileaks accepts a range of material, but we do not solicit it. If you are going to send in material it should be done as securely as possible.
Please review TOR which helps assist in improving online security: http://www.torproject.org/about/overview.html.en.
2.1 Its easy to submit
Our drop box is easy to use but as yet provides no encryption so if you're not using a secure network we can't be assured it's not going to be intercepted. We advise you to use the TOR Network
Details are below
Submitting documents to our journalists is protected by law in better democracies.
We never keep logs of who uses the drop box or where they are coming from.
You might also want to use the secure TOR network (http://www.torproject.org/about/overview.html.en) Tor is a secure anonymous distributed network that provides maximum security.
2.2 Help with any questions about submitting
You can also email us and we will answer any questions or solve any problems you might have with submitting by contacting info@unileaks.org
2.3 Protection for you
Unileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs.
We can not comply with requests for information on sources because we simply do not have the information to begin with.
Unileaks is working on its security and will offer updates as technical advice comes to hand.
Best bet if you don't feel comfortable using our drop-box send the documents you want published to the following address :
UL - PO Box 150, Brunswick East, VIC, 3057, AUSTRALIA
2.4 How it works
When UniLeaks receives a document, our accredited journalists assess the submission. If it meets the criteria, our journalists then write or produce a news piece based on the document. This typically includes a description of the document, an analysis of why it is important, and an explanation of what it signifies to broader society.
The news piece might also highlight the parts of the document that are most newsworthy. Our news stories are deliberately analytical regarding the wider significance of the document. We then link from the news piece to the original submission.
Submissions establish a journalist-source relationship. Online submissions are routed via countries which have strong shield laws to provide additional protection to sources and journalists.
Some documents submitted contain highly sensitive information. UniLeaks has developed a harm minimisation procedure to clean documents which might endanger innocent people from being involved. If the document is a meeting minutes for example we may block participants who are not relevant to the discussion to avoid their names being inadvertently tainted. In other instances, UniLeaks may delay publishing some news stories and their supporting documents until the publication will not cause danger to such people. However in all cases, UniLeaks will only redact the details that are absolutely necessary to this end. Everything else will be published to support the news story exactly as it appeared in the original document.
UniLeaks, like simlar sites - has a overriding objective to publish and bring information into the public arena to encourage an informed society. It remain absolutely committed, totally resolute and doggedly true to this goal.
3. Directions for how to submit material
3.1 Submissions via upload
We use our drop box. It's not %100 secure be safe. See TOR! http://www.torproject.org/about/overview.html.en
3.2 Submissions via our discreet postal network
Submissions to our postal network offer a strong form of anonymity.
Steps:
  • First place your leak onto a floppy disk, CD, DVD or a USB Flash Drive. If you are using a floppy disks, please create two as they are often unreliable. If you only have paper documents, we will scan them if they are of significant political or media interest (if you are unsure whether this may be the case, please contact us first). This will delay the process however.
  • Post your information to one of our trusted truth facilitators listed below. You may post to whatever country in the list that you feel most suitable given the nature of the material and your postal service. If your country's mail system is unreliable, you may wish to send multiple copies, use DHL, FedEX or another postal courier service.
UNiLeaks truth facilitator network will then upload your submission using their fast internet connection. If you use a floppy disk, be sure to send two for increased reliability.
You can use whatever return address you like, but make doubly sure you have written the destination correctly as postal workers will not be able to return the envelope to you.
After receiving your postal submission our facilitators upload the data to UNiLeaks and then destroy the mailed package.
3.3 High risk postal submissions (information obtained from wikileaks)
If your leak is extremely high risk, you may wish to post away from your local post office at a location that has no witnesses or video monitoring.
Many CD and DVD writers will include the serial number of the DVD or CD writer onto the CD/DVDs they write. If the post is intercepted this information can in theory be used to track down the manufacturer and with their co-operation, the distributor, the sales agent and so on. Consider whether there are financial records connecting you to the CD/DVD writer sale if your adversary is capable of intercepting your letter to us and has the will to do this type of expensive investigation. Pay cash if you can for the CD/DVD writer.
Similarly, CD and DVD media themselves include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Pay cash when buying the CD or DVD. Try to choose a store without video cameras at the register.
Although we are aware of no instances where the above has been successfully used to trace an individual, anti-piracy operations have used the information to trace piracy outfits who sell tens or hundreds of thousands of counterfeit CDs or DVDs.
If you post it to us, a good option is to encrypt the USB file/CD file and then contact us at a later date via live online chat with the encryptin passphrase. That way if the post is intercepted, the data can not be copied.
If you suspect you are under physical surveillance, discreetly give the letter to a trusted friend or relative to post. On some rare occasions, targets of substantial political surveillance have been followed to the post office and have had their posted mail seized covertly. In this rare case if you are not intending to encrypt the data and if the police or intelligence services in your country are equipped to perform DNA and/or fingerprint analysis you may wish to take the appropriate handling precautions.
3.4 Postal addresses
You may post only to our post office box in Australia. We are working on networking alternatives around the world and are currently in contact with a similar organisation to make use of their network.
In Australia: PO Box 150, Brunswick East, VIC, 3057, AUSTRALIA.
To: "UL" or any name likely to evade postal censorship in your country.

###################################################
Head of R.M.I.T -- I.T security caught posting comments on campaign video.

UniLeaks has a YouTube channel to which three satirical videos have thus far been uploaded. The videos have drawn some interest (approximately 800 views), but one in particular, "RMIT sells out young people in Victoria", has been subject to sustained criticism from a user known as "chickenliddle1″. Among other things, chickenliddle1 has accused one respondent a former RMIT student who states that they recently left the Youth Work course after its funding was cut, and who questions the University's commitment to assisting youth in need of being "drug addled".
[Image: greg.png]
The video, created by one of the contributors to UniLeaks, draws attention to the fact that on any given night over 30,000 young Australians sleep rough. These youth are in dire need of help, assistance which is often provided to them by youth workers. The video highlights the fact that, despite this and despite the existence of a crisis in child protection in the state of Victoria the Youth Work course at RMIT has been downgraded, and its funding cut by $300,000. This has been done as a result of the University's commitment to running the course at a profit. At the same time, the University is able to provide its Vice Chancellor Margaret Gardner a chauffeur-driven ride each day to and from her office. The video concludes with an exhortation: "Get your priorities in order RMIT… start taking students seriously… Invest in youth work education! Oh and [Margaret]… get a bike!"
Upon subsequent investigation, we have determined that the source of this criticism is Greg Bristow, (second link pdf version) Senior Manager, IT Security at RMIT University (second link pdf version), who claims to have 25 years I.T security experience. Unileaks was able to verify that the comments were made by Mr Bristow within three minutes using basic investigative techniques (and relying on public information to guide us).

Precisely why Greg has decided to intervene in the discussion is unknown: PR is more usually conducted on RMIT's behalf by its Media Unit; Greg's commentary does not address the cost-cutting, but rather compares, favorably, his boss's salary and conditions to that of other Australian CEOs. Irrespective of the validity of his arguments, we find it curious that a person in charge of IT Security at RMIT should be so agitated by a video criticising his employer, and can only conclude that we are right to believe that Universities are highly vulnerable to public criticism.

It seems that RMIT in particular is highly sensitive to criticism: last week, a Facebook group created by and for RMIT Youth Work students was closed down after a complaint was filed with the site regarding the fact that the same video was posted to the group.
UniLeaks wishes to take this opportunity to reiterate the fact that we support attempts by students to organise in order to resist the downgrading of courses, and to voice criticism of those responsible for implementing such measures. Indeed, as our 'Open Letter to Australian VCs' states, this is precisely why we have established this site.
Please note we are happy to provide evidence to any media organisation wishing to validate our claims. We have decided to withhold some information in order to protect the identity of person/s not directly related to these matters.
[EMAIL="info@unileaks.org"]info@unileaks.org
[/EMAIL]
[EMAIL="info@unileaks.org"]http://www.unileaks.org/index.php?option=com_content&view=article&id=7:head-of-rmit-security-caught-posting&catid=8:oplss&Itemid=38
[/EMAIL]
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Messages In This Thread
Wikileaks and clones. Other ways and places to leak documents, films etc - by Magda Hassan - 28-02-2011, 02:09 PM

Possibly Related Threads…
Thread Author Replies Views Last Post
  My Kind of Search Engine! Finds Declassified Documents Peter Lemkin 4 17,988 05-01-2014, 07:20 AM
Last Post: Peter Lemkin
  Syrian Files Wikileaks Magda Hassan 0 4,307 05-07-2012, 11:21 AM
Last Post: Magda Hassan
  JFK Assassination Documents;; Collections from the Investigations Bernice Moore 0 3,980 08-03-2012, 03:08 PM
Last Post: Bernice Moore
  Berlin Crisis CIA Newly Declassified Documents and Free CIA Multimedia DVD-ROM Available Bernice Moore 0 3,829 08-11-2011, 05:31 AM
Last Post: Bernice Moore
  Procedure for getting documents declassified from US State Dept. Magda Hassan 0 4,350 09-10-2011, 05:23 AM
Last Post: Magda Hassan
  Office of Historical Documents Bernice Moore 0 4,501 16-07-2011, 02:55 PM
Last Post: Bernice Moore
  57 documents at cryptome Ed Jewett 2 5,007 04-06-2011, 04:13 AM
Last Post: Ed Jewett
  Wikileaks historical data base and uploads available again Magda Hassan 0 3,885 11-02-2011, 12:27 AM
Last Post: Magda Hassan
  Douglas Valentine Vietnam Phoenix Program research documents available Magda Hassan 0 5,170 02-12-2010, 11:26 PM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)