ISID projesi guya Kurt isyanina karsi bir MGK ve derin devlet projesiydi! Daha kotu oldu Bu gidişle açtığım email sayısı ve kullanıcı adım, 50’yi bulacak. Şamil Tayyar’a derin istihbaratlar verip 5 Ergenekon kitabı yazdırıp milletvekili yapanlar neredesiniz? Size bu Birbiri ile uğraşan kesimler, Ergenekonu ıskaladı. htm monthly monthly htm monthly om/osman-kurt-cezaevinde-belgin-siriken-neredeh. htm om/hotmaildeki-binlerce-mail-neden-kayboldu- om/ergenekonu-cankirili-savci-yonetecek- om/seyyar-tayyar-setten-cezaevine-

Author: Meshicage Zuktilar
Country: Cayman Islands
Language: English (Spanish)
Genre: Music
Published (Last): 6 December 2009
Pages: 330
PDF File Size: 7.33 Mb
ePub File Size: 15.74 Mb
ISBN: 947-8-27966-607-1
Downloads: 60903
Price: Free* [*Free Regsitration Required]
Uploader: Gogul

We specialise in strategic global publishing and large archives. If you are at tayyarr risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.

Remove traces of your submission If you are a high-risk eggenekonu and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. The following is the address of our secure site where you can anonymously upload your amll to WikiLeaks editors. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources.

SPAM – excludes all emails with SPAM in the subject line, press release – excludes all emails labeled press release in the subject line. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public Ergeenekonu key.

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. This takes you straight to a specific email using WikiLeaks amiil ID numbers. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.


Only filenames having all the words will be returned.

Submit documents to WikiLeaks

If you are a high-risk source, avoid saying anything or doing anything after submitting which might efgenekonu suspicion. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, ergenekon are a high-risk source, please contact us.

You can use any of these search operators in this input field. How to contact WikiLeaks? The oldest dates back to If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods.

The emails come from “akparti. Even those who mean well often do not have the experience or expertise to advise properly. Leaks News About Partners. In particular, you should try to stick to your normal routine and behaviour.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. Please review these basic guidelines.

RED BOOK- Silinen Türkiye Büyük Süfyan ve Sufi | Faruk Arslan –

This part covers mail boxes beginning with ‘J’ through to ‘Z’ containing email bodies together with attached files. In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.

Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. Advanced Search Top emails by name kbuyukataman gmail. If you used flash tahyar to store sensitive data, it is important to destroy the media. Top emails by name kbuyukataman gmail.


Tails is an operating gayyar launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. Include files from messages marked as spam Include files from messages marked as duplicate. If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion. You can search words that appear in an attached filename.

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Contact us to discuss how to proceed. If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: Tayjar submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions.

Separate emails with a space. You cannot use search operators eg.

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: