WikiLeaks
Today, 21 December , WikiLeaks publishes a searchable database of more than 16, procurement requests posted by United States embassies around the world. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Pizzagate
Legal threat to WikiLeaks from UK NATS over BA flight crash recordings, 8 Dec Guantanamo censored articles and Supreme Court filing for Al-Ghizzawi case, Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.
WikiLeaks
Help Expand The Public Library of US Diplomacy Your role is important: WikiLeaks maintains its robust independence through your contributions. Please see to learn about all ways to donate. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.
Guantánamo Files
WL Research Community - user contributed research based on documents published by WikiLeaks Vault 7: Hive navigation search. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Cable
OEC Sales OEC Sales File missing Retrieved from ":Scientology" Category: Cults and religious organizations. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Category
Was first publicly revealed by WikiLeaks working with our source. Was classified, confidential, censored or otherwise withheld from the public before release. Is of political, diplomatic, ethical or historical significance. Any questions about this document's veracity are noted. The summary is approved by the editorial board. .
WikiLeaks
On March 16, WikiLeaks launched a searchable archive for over 30 thousand emails & email attachments sent to and from Hillary Clinton's private email server while she was Secretary of State. .
Vault 7
Hillary Clinton was sent an email from her lawyer, Cheryl Mills, discussing the Washington Post's article on DynCorp's child trafficking incident in in the Kunduz region of Afghanistan. The particular email found on WikiLeaks describes the creation of a new story which left out significant details and emphasized, "No sex took place." [3]. .