We have uploaded all the WikiLeaks data to Intelligence X and created a new category. You do not need an account or license to search through the WikiLeaks data using our site.
Try it out here! https://intelx.io/?s=cnn.com&b=leaks.public.wikileaks
Most of the raw data is available via https://file.wikileaks.org/file/ as well as torrents. There are a couple of organizational and technical challenges that come with the data:
The Intelligence X statistics list more files than the input, because the compressed files (ZIP and other) contain many files that are extracted and stored separately.
The above statistics mean that we have 368,818 different search terms (selectors, like domain name, email address, etc.) that search in 5,664,971 results.
Out of the 368k unique selectors, most are – not surprisingly – email addresses with 46%. Next is Credit Cards with 19% followed by URLs 15%.
Update 8/9/2019: We uploaded the Cryptome data into the WikiLeaks bucket.
September 2019: Latest Updates We have two new major features to share: the Tree View and the History tabs. 📂 Tree View The Tree View tab shows related items to a search result. It simplifies the process of discovery and adds context to the search results. As for website results, it will show all other
We just released a major update – virtual folders. For some results, there is a new “Tree View” tab. It shows items that are related either because they are part of one container file, or because the original file was too big and was automatically split into multiple files. To put it simple, the Tree
One of the file formats that does not get much attention are “.DS_Store” files, even though they might be of interest in forensic cases when analyzing hard disks or other folders (including ZIP files) from Mac machines. “.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which