In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. If you have any issues talk to WikiLeaks. We are the global experts in source protection — it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations. If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
In particular, you should try to stick to your normal routine and behaviour. If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media. If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.
If a legal action is brought against you as a result of your submission, there are organisations that may help you.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.
We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods.
Contact us to discuss how to proceed. This will permit you and others to search for it. Your role is important: WikiLeaks maintains its robust independence through your contributions.
Click to send permalink to address bar, or right-click to copy permalink. While efforts to secure CBRN material across the globe have been largely successful, the illicit trafficking of these materials persists, including instances involving highly enriched uranium in and These examples suggest that caches of dangerous material may exist on the black market and that we must complement our efforts to consolidate CBRN materials and secure facilities with broader efforts to detect, investigate, and secure CBRN materials that have fallen outside of regulatory control.
We must remain vigilant if we hope to prevent terrorist groups from obtaining the means and methods for obtaining CBRN weapons. A number of international partnerships have either the explicit or the implicit purpose to combat the CBRN threat from terrorists. Organizations and initiatives concerned with chemical and biological weapons use international conventions and regulations to reduce stockpiles of material, regulate the acquisition of dual-use technology, and regulate trade of specific goods.
Nuclear and radiological initiatives and programs focus on promoting peaceful uses of nuclear material and energy, safeguarding against diversion, and countering the smuggling of radioactive and nuclear material. The United States also provides technical and financial assistance to ensure that partner nations have the ability to adequately protect and secure CBRN-applicable expertise, technologies, and material.
The Proliferation Security Initiative PSI : Launched in , the PSI has increased international capability to address the challenges associated with stopping the trafficking of weapons of mass destruction WMD , their related components, and their means of delivery. The PSI remains an important tool in the global effort to combat CBRN material transfers to both state and non-state actors of proliferation concern.
As of December 31, , states have endorsed the PSI Statement of Interdiction Principles, by which states commit to take specific actions in support of efforts to halt the trafficking of WMD and related materials.
In , PSI participants engaged in the following activities:. In July the U. In the same framework, Armenia is participating in the U. Armenia provides troops for peacekeeping operations elsewhere and has an Acquisition and Cross-Servicing Agreement and an Agreement on Cooperation of Defense and Economy with the U. Military Wiki Explore. Popular pages.
Grant Richard Winters Harry Welsh. Project maintenance. Explore Wikis Community Central. Register Don't have an account? Kansas — Armenia National Guard Partnership. Edit source History Talk 0. European Command. Archived from the original on 19 March Retrieved 11 February The National Guard. Retrieved 19 October State Partnership Program.
0コメント