Friday, September 23, 2011

MORE WIKILEAKS. I COPIED THIS FROM WIKILEAKS

WikiLeaks
... could become as important a journalistic tool
as the Freedom of Information Act.
— Time Magazine

i copied this from wikileaks just in case the government decided to shut them down. people could find info here!

The Guantanamo Files: 779 classified prisoner dossiers revealed from the world’s most notorious prison

2011-04-25
In thousands of pages of documents dating from 2002 to early 2009 and never seen before by members of the public or the media, the cases of the majority of the prisoners held at Guantanamo — 758 out of 779 in total — are described in detail in memoranda from JTF-GTMO, the Joint Task Force at Guantanamo Bay, to US Southern Coand in Miami, Florida.
These memoranda, which contain JTF-GTMO’s recommendations about whether the prisoners in question should continue to be held, or should be released (transferred to their home governments, or to other governments) contain a wealth of important and previously undisclosed information, including health assessments, for example, and, in the cases of the majority of the 171 prisoners who are still held, photos (mostly for the first time ever).
Here you may also download whole GITMO site from torrent.

Cablegate: 250,000 US Embassy Diplomatic Cables

2011-02-10
On Sunday 28th November 2010, WikiLeaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into the US Government’s foreign activities.

Bank of America using Private Intel Firms to Attack Wikileaks

2011-02-02
In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:
- Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
- 
Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
- 
Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
- 
Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
- 
Search for leaks. Use social media to profile and identify risky behavior of employees.
PDF - 4.5 Mb
Original document converted to PDF

All released leaks archived

2010-11-28
Due to recent attacks on our infrastructure, we’ve decided to make sure everyone can reach our content. As part of this process we’re releasing archived copy of all files we ever released - that’s almost 20,000 files. The archive linked here contains a torrent generated for each file and each directory.

War Diary: Iraq War Logs

2010-10-22
The 391,832 reports (’The Iraq War Logs’), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a ’SIGACT’ or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.

War Diary: Afghanistan War Logs

2010-07-25
From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties. From any document page, clicking on the green underlined text will open a popup that links to other documents that contain those phrases, making it possible to see important search terms and connections that you might not otherwise notice.

Video: Collateral Murder

2010-04-05
WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.

Cryptome.org takedown: Microsoft Global Criminal Compliance Handbook, 24 Feb 2010

Cryptome.org is a venerable New York-based anti-secrecy site that has been publishing since 1999. On Feb 24, 2010, the site was forcibly taken down following its publication of Microsoft's "Global Criminal Compliance Handbook", a confidential 22 page booklet designed for police and intelligence services. The guide provides a "menu" of information Microsoft collects on the users of its online services. Microsoft lawyers threatened Cryptome and its "printer", internet hosting provider giant Network Solutions, under the Digital Millennium Copyright Act (DMCA). The DMCA was designed to protect the legitimate rights of publishers, not to conceal scandalous internal documents that were never intended for sale. Although the action is a clear abuse of the DMCA, Network Solutions, a company with extensive connections to U.S. intelligence contractors, gagged the site in its entirety. Such actions are, in the opinions of those supporting transparency, a serious problem in the United States, where, although in theory the First Amendment protects the freedom of the press, in practice, censorship has been privatized via abuse of the judicial system and corporate patronage networks.
Download
Torrent | Magnet 
Release date
March 15, 2010

U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008

This document is a classified (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. ``The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to WikiLeaks.org cannot be ruled out. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses ``trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whistleblowers, the report recommends ``The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistleblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the WikiLeaks.org Web site. [As two years have passed since the date of the report, with no WikiLeaks' source exposed, it appears that this plan was ineffective]. As an odd justification for the plan, the report claims that ``Several foreign countries including China, Israel, North Korea, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the WikiLeaks.org website. The report provides further justification by enumerating embarrassing stories broken by WikiLeaks---U.S. equipment expenditure in Iraq, probable U.S. violations of the Chemical Warfare Convention Treaty in Iraq, the battle over the Iraqi town of Fallujah and human rights violations at Guantanamo Bay.
Download
Torrent | Magnet 

Website Wikileaks publishes '9/11 messages'

November 26, 2009
By BBC News[1]
A website has published what it says are 573,000 intercepted pager messages sent during the 9/11 attacks in the United States.
Wikileaks says it will not reveal who gave it the messages - some of which are from federal agencies as well as ordinary citizens.
Internet analysts say they believe the messages are genuine but federal authorities have refused to comment.
The attacks on 11 September 2001 left nearly 3,000 people dead.
The messages are being published over a 24-hour period, ending at 0800GMT on Thursday. They are being released simultaneously on Wikileaks and social networking site Twitter.
'Live' broadcast The website is broadcasting each message at the time it was sent originally in 2001.
The first message was from 0300 local time (0800 GMT), five hours before the first attack in New York and the last 24 hours later.
The messages are not all about the attacks. Some are mundane questions about what people are having for lunch.
However, many are about the deadly plane attacks and range from people trying to find out if their loved ones are safe, to government messages, to computer server errors.
They include messages such as
  • This is Myrna, I will not rest until you get home, the second tower is down, I don't want to have to keep calling you after every event. Pls just go home
  • President has been rerouted won't be returning to Washington but not sure where he will go
  • Bomb detonated in World Trade Ctr. Pls get back to Mike Brady w/a quick assessment of your areas and contact us if anything is needed
New York's fire and police departments said they could not comment on whether messages purportedly sent from them were genuine while the US Secret Service refused to comment.
Pager company USA Mobility said it was troubled by the alleged interceptions, the Associated Press news agency reported.
Wikileaks allows people to anonymously post documents on the web, saying its aim is to promote transparency.
It was created in 2006 by dissidents, journalists, mathematicians and technologists from the US, Taiwan, Europe, Australia and South Africa.
Wikileaks spokesman Daniel Schmitt said the messages were submitted anonymously to the site several weeks ago.
He told Associated Press: "From the context information that the source provided we have strong reasons to believe that this is valid data."
He said the messages would help provide a fuller picture of what happened that day.
As published in BBC News. Thanks to BBC News for covering this material. Copyright remains with the aforementioned.

CIA report into shoring up Afghan war support in Western Europe, 11 Mar 2010

 date
March 26, 2010
Summary
This classified CIA analysis from March outlines possible PR strategies to shore up public support in Germany and France for a continued war in Afghanistan. After the Dutch government fell on the issue of Dutch troops in Afghanistan last month, the CIA became worried that similar events could happen in the countries that post the third and fourth largest troop contingents to the ISAF mission. The proposed PR strategies focus on pressure points that have been identified within these countries. For France it is the sympathy of the public for Afghan refugees and women. For Germany it is the fear of the consequences of defeat (drugs, more refugees, terrorism) as well as for Germany's standing in NATO. The memo is a recipe for the targeted manipulation of public opinion in two NATO ally countries, written by the CIA. It is classified as Confidential/No Foreign Nationals.
Download
Torrent | Magnet 

No comments:

Post a Comment