26 June 2012
WikiLeaks Setting Another Trap for Journalists, NGOs
A sends:
I tasted that poison today. It was strange, the feeling of having the privilege
to information that was only made available to "a select few" was overwhelming,
I don't have the vocabulary to describe what the poison tastes like, but
I can understand how some people could become addicted to it, even if it
meant their death.
You are right, WL is setting "Terms and Conditions" to the access to stolen
property, and attempting to force Journalists into an "Agreement" to those
"Conditions, however unenforceable.
Your thoughts and counsel were welcomed, they snapped me out of that trance
that I found myself in.
The only thing to do is, publish everything that I've learned over the last
many hours about this whole affair.
2012-00414
WikiLeaks Partner for Global Intelligence Files June 26, 2012 (copy
below) via Google Search
Cryptome rejects this proprietary publishing manipulation. Again, WikiLeaks
is inducing participation in a crime covered with pseudo-journalistic
exculpation. Again excluding open public access in favor of contractual marketing
of stolen material and aiding its profitable commercialization.
It's a trap, don't do it, don't encourage others to take the bait.
Don't send anything to me you don't want published. This note will be published
.
_____
At 06:24 PM 6/26/2012, you wrote:
Please Do Not Post, still working on getting us access.
Below if the terms and conditions that WL is sending to everyone.
_Terms and Conditions for access to the Global Intelligence Files
These Terms and Conditions are an agreement between you as an individual
(not your organisation) and WikiLeaks with respect to use of the Global
Intelligence Files.
1. WikiLeaks will provide access to the data known as Project Rock Guitar
through WikiLeaks' search database. You will use the search database as per
instructions on the site and will not use robots on the system.
2. The decision what to publish in news articles and papers will remain at
your discretion. You will credit WikiLeaks in the following manner:
investigative partnership organised by WikiLeaks and refer to
the data as having been obtained by WikiLeaks.
3. You will refer clearly on your website to the document(s) provided by
WikiLeaks that were used in preparation of these news articles or papers
and link from your publication to the data on WikiLeaks' website.
4. You will treat any alleged and/or suspected WikiLeaks sources for the
Global Intelligence Files as confidential sources of your own, with all the
ethical and legal protections such sources are entitled to. You, in accordance
with journalistic and professional ethics, will not speculate as to their
identities. In relation to WikiLeaks' provision of confidential information
to you, you will treat WikiLeaks as a confidential journalistic source. Although
you will publicly describe the information has having been obtained
by WikiLeaks you will not, for the protection of WikiLeaks, you and
the WikiLeaks sources, say that the information was "given" to you by WikiLeaks.
5. When publishing any story or material based on the Global Intelligence
Files you understand that in relation to exclusivity you must inform WikiLeaks
of the identification number of the data informing your publication and will
submit this number to WikiLeaks' release platform before the story is to
first appear in any of your publishing mediums, so that WikiLeaks can publish
the original data at the same time. You will also provide a URL link to where
the story or material will appear on your site. Instructions for this release
system are on the GI Files site and must be read and followed once you have
access to the site. You understand that the release system provided by WikiLeaks
must be treated in a reputable manner: there is to be no playing of the system
to schedule large quantities of data in advance to reserve them, or using
robots on the system. Scheduling must reflect true intentions to publish
at the date and time you list on the release system.
6. You will treat each of the documents made available to you by WikiLeaks
as confidential unless and until a story based on their content is published.
You will exercise care in ensuring that the materials will not be vulnerable
to hacking or other efforts to discover their content.
7. WikiLeaks journalists, employees, consultants and infrastructure are the
subject of State and private intelligence activity and politicised financial
blockades. To protect its continued ability to publish effectively, various
WikiLeaks methods, people and locations need to be kept confidential. Unless
otherwise stated, these include, but are not limited to: identifying details
of all WikiLeaks personnel, security methods, communication systems or methods,
locations, strategic plans, information on threats against WikiLeaks, the
number of WikiLeaks personnel, the number of WikiLeaks personnel in different
areas, usernames, passwords, transportation and financial arrangements including
financial transportation methods.
8. Trading, selling, sharing or giving away your account is prohibited, as
is trading and selling invites or offering them in public.
9. You understand that any breach of these Terms and Conditions or mismanagement
of the search database or release platform will result in your access being
withdrawn, along with the access of the anyone that invited you and anyone
you invite. You are responsible for your own account and for the people you
invite.
By ticking this box you agree to abide by all of the above Terms and Conditions
Your login and password will be sent by mail.
Becoming a WikiLeaks Partner for the Global Intelligence Files
You have been invited to enter a secret world.
By joining the global WikiLeaks partnership on the
Global
Intelligence Files (the GI Files) -- you will have access to more than
five million emails from the Texas-headquartered "global intelligence" company
Stratfor. The emails date from between July 2004 and late December 2011.
They reveal the inner workings of a company that fronts as an intelligence
publisher, but provides confidential intelligence services to large
organisations, including the US Department of Homeland Security and the US
Defense Intelligence Agency. Being part of this international team will allow
you to search the emails using the sophisticated search engine designed by
WikiLeaks to enable you to research and publish articles and papers using
this data.
The purpose of this system is to maximise global impact of the GI Files by
restricting supply to those who are most likely to research and publish on
them.
We are allowing journalists, academics and human rights organisations to
search and publish the GI Files. To enter into this partnership you will
need to be given a unique code by one of our existing partners. Users who
demonstrate research and publishing ability will be considered as partners
for new WikiLeaks publications.
Once you have this code please follow the instructions below to enter the
partnership and gain access to the GI Files. These instructions are designed
to be idiot-proof. They explain every step of this process, but dont
be scared - for most people this will be quick.
1. Download Tor, a tool for encrypted anonymous web-browsing. Without this
you will not be able to access our Terms and Conditions, or the GI Files
database.
Tor Instructions:
- To get Tor please go to the following URL to download the "Tor Browser
Bundle:"
https://www.torproject.org/projects...
- Choose the correct version depending on whether you use Windows, Mac or
Linux and download it in the language you want.
- Click on the correct version to download it and then save it - we suggest
to your Desktop.
- Once you have saved it you can find the "Tor Browser Bundle" application
in the place you saved it.
- You will need to double-click on the Start Tor browser application to run
Tor.
- You will need Tor running to access the site to agree to our Terms and
Conditions, and then to later access the GI Files site.
2. Start Tor and go to the following site (it will only work using Tor).
Wait up to 30 seconds for the site to load for the first time:
http://7f4lihm464gdcwfc.onion/invit...
3. Enter your unique invite code to get access to the GI Files partner Terms
and Conditions.
4. Enter your name, organisation name, email address and phone number. The
email address you give cannot be a personal email address; it must be a work
email account.
5. Read all parts of the Terms and Conditions and make sure you understand
them. If you have any questions, please email: signup@wikileaks.org
6. Once you understand your responsibilities under the Terms and Conditions
tick the check box to confirm your agreement.
7. Within 15 minutes you will receive an email to the email address you supplied
giving you login details to the GI Files website.
8. Login to the site at the following URL:
http://7f4lihm464gdcwfc.onion/
giving your username and password as supplied in the email. This URL can
only be accessed when using Tor.
9. Once you are logged into the site you will see your user page, the search
interface and publishing interface. At the top of the page are tabs that
explain how these work. On your user page you will have five invite codes
for you to give to others so that they can also gain access to the GI Files.
10. If you wish to invite someone to the GI Files then give them a unique
invite code, along with the URL to this page of instructions - each person
you invite must be a journalist, NGO worker or academic from a different
organisation (for complete understanding of who you can invite please see
the invite rules below).
11. If you violate any of the Terms and Conditions you risk having your login
terminated, along with that of the person that invited you and the people
that you invited. If any of the contacts you invited violate the terms of
the Terms and Conditions, they risk having their login terminated, your login
terminated and the logins of the people they invited terminated.
Invite Rules:
Each invite code must be given to a person who:
A. is a real person
B. is either a journalist, Professor or Associate Professor at a University
or an employee of a human rights organisation
C. is from a different organisation to you and your other invitees
D. is using an email that is not a personal email
E. is using an email that is from a different domain to your email address
and that of the other people you invite
F. is going to use the GI Files search and release site for research, the
results of which will be communicated to the public.
For any issues or questions related to this signup process, please email:
signup@wikileaks.org
|