Skip to main content

http://wikileaks.org/


The Guantanamo Files: 779 classified prisoner dossiers revealed from the world’s most notorious prison

2011-04-25
In thousands of pages of documents dating from 2002 to early 2009 and never seen before by members of the public or the media, the cases of the majority of the prisoners held at Guantanamo — 758 out of 779 in total — are described in detail in memoranda from JTF-GTMO, the Joint Task Force at Guantanamo Bay, to US Southern Coand in Miami, Florida.
These memoranda, which contain JTF-GTMO’s recommendations about whether the prisoners in question should continue to be held, or should be released (transferred to their home governments, or to other governments) contain a wealth of important and previously undisclosed information, including health assessments, for example, and, in the cases of the majority of the 171 prisoners who are still held, photos (mostly for the first time ever).
Here you may also download whole GITMO site from torrent.

Cablegate: 250,000 US Embassy Diplomatic Cables

2011-02-10
On Sunday 28th November 2010, WikiLeaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into the US Government’s foreign activities.

Bank of America using Private Intel Firms to Attack Wikileaks

2011-02-02
In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according toan article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:
- Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
- Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
- Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
- Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
- Search for leaks. Use social media to profile and identify risky behavior of employees.
PDF - 4.5 Mb
Original document converted to PDF

All released leaks archived

2010-11-28
Due to recent attacks on our infrastructure, we’ve decided to make sure everyone can reach our content. As part of this process we’re releasing archived copy of all files we ever released - that’s almost 20,000 files. The archive linked here contains a torrent generated for each file and each directory.

War Diary: Iraq War Logs

2010-10-22
The 391,832 reports (’The Iraq War Logs’), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a ’SIGACT’ or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.

War Diary: Afghanistan War Logs

2010-07-25
From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties. From any document page, clicking on the green underlined text will open a popup that links to other documents that contain those phrases, making it possible to see important search terms and connections that you might not otherwise notice.

Video: Collateral Murder

2010-04-05
WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

know ur ip

http://whatismyipaddress.com/ by this u can know ur ip in ur mobile also try so do u want to hide ur ip then make use of proxy server ( a mask to ur ip) for pc's ----- use Tor browsers best in my view     try this  http://www.softpedia.com/get/Security/Security-Related/Tor-Browser.shtml for mobiles ----- use proxy i think some wat risky
Best APM Tools In 2021 Here are the complete details of the most popular Website and Application Performance Monitoring APM Tools. #1) Traceview Earlier it was known as Tracelytics which was acquired by AppNeta and now it is a part of SolarWinds. Traceview SolarWinds was found in 1999 with its headquarter in Texas, USA. More than 150 employees are working here and it has revenue of $429 million. It is an Application Performance Monitoring tool for web applications. It provides a deep insight into the application, better end-user experience, and is a very cost-effective performance monitoring tool. Key Features: Traceview supports Java, .NET, PHP, Ruby, Python, etc. It monitors, web applications and SaaS applications. Traceview supports a detailed level of code-level performance monitoring. It fixes the problem with a real user monitoring system. It supports online as well as email and phone support. => Download Free #2) eG Innovations eG Innovations Logo eG Innovations is an i