If you used flash media to store sensitive data, it is important to destroy the media.
In order to use the Wiki Leaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.
If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation.
This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.
It then goes on to describe how to use more advanced features such as validation, data templates, list binding, and change notification.