This page has moved to a new address.
Could Simple Automated Tools Help Wikileaks Protect Its Afghan Sources?