This page has moved to a new address.

Could Simple Automated Tools Help Wikileaks Protect Its Afghan Sources?