Wikileaks

From Wikispooks
Jump to: navigation, search
Broom.png This important page is disorganised and out of date.

Internationally famous leaks site that has published millions of classified and other documents.

WL Hour Glass.png
Website.png http://www.Wikileaks.org   History Commons Sourcewatch
"We open governments."
Started: 4 October 2006
Founder: Julian Assange

Owner: Sunshine Press
In its own words:
"WikiLeaks is a multi-jurisdictional public service designed to protect whistleblowers, journalists and activists who have sensitive materials to communicate to the public. Since July 2007, we have worked across the globe to obtain, publish and defend such materials, and, also, to fight in the legal and political spheres for the broader principles on which our work is based: the integrity of our common historical record and the rights of all peoples to create new history. [1]"
Constitutes: Leak website,  Limited Hangout

Main focus: whistleblowers

Wikispooks Comment


WikiLeaks has released millions of secret documents from countries around the world. Most are easily available on the Wikileaks site, [2] and make it a gold-mine of information for journalists working on stories that are crying out for public scrutiny. It is a sad reflection on the Western commercially-controlled media - subservient as it is by its very nature to the official narrative - that to date (August 2010) their efforts can be summarised as something close to "tut-tut, this is dangerous and must be brought under control - or stopped".

That said, it should be born in mind that ANY web site seen as potentially subversive to established authority and the official narrative, will quickly attract the attention of the SIS's once its readership and apparent influence reaches a certain threshold. Such attention can take many forms but will likely start with simple monitoring, before progressing through attempts at infiltration and/or co-option and the planting of information, to other less subtle forms of the [[Espionage |spy's tradecraft]], should they become necessary in pursuit of Establishment hidden agendas.=  

Sub-Page

Use the Up/Dn symbols to sort

          Page Name          Size
Wikileaks/Vault 7680


Wikileaks is a leak website, better known but more popular than Cryptome. In October 2017 a US Senate was debated that contains a section that if passed would designate WikiLeaks and Julian Assange as a “non-state hostile intelligence service.”ref>http://www.topsecretwriters.com/2017/10/us-senate-bill-labels-wikileaks-hostile-intelligence-service/</ref>

History

Julian Assange, stated in 2006 that Wikileaks had already "received over one million documents from 13 countries". In 2010, the New Yorker and then Wired claimed that these documents were not knowingly leaked, but had been captured by Assange's running a modified Tor exit node.[3][4] Asked to clarify whether this claim was true by The Register, Assange denied it, stating that "The imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts were involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us)."[5]

September 11th, 2001

In November 2009, Wikileaks published around 500,000 pager messages - 29 hours worth, from 5 hours before the first 9-11 attacks to 24 hours after. Little significant evidence was found among them to contradict the US government's official narrative.[6] In July 2010, Assange commented about 9-11 that "I'm constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud."[7] Unwelcome Guests has cited this quotation as evidence that Wikileaks is a modified limited hangout.[8]

Articles and other information about the Wikileaks Afghan War Diaries

Broadly supportive

There is an extended series of articles by Arthur Silber on his "Once Upon a Time" blog [9] in ardent support of Wikileaks which repay careful study. They also contain copius links to further information.

Wikileaks as a 'Limited Hangout' or 'is being used by Shhh you know who'

Webster Tarpley has put forward a solid argument that Wikileaks is a limited hangout.[11]

Puffed up outrage clearly in service to the official narrative

On the face of it the organisations listed here are bona-fide Establishment critics/dissidents. The problem is that they are large NGO's which, like Wikileaks itself, wiil ALWAYS be targets of the SIS's. The longer they are established, the more likely and thorough the penetration. In the case of Reporters Without Borders there is ample evidence of their complicity in furthering covert Western agendas in third world countries - especially Cuba and Venezuela

Deep Background Information on Wikileaks

  • This is a Google search of the Cryptome site. Cryptome has the most detailed and insightful inside track on Wikileaks of pretty well any other source. John Young, its operator, was the original registrant of the Wikileaks domain name. He resigned from further involvement with Wikileaks over its fund-raising ambitions and the full story of those early days is available from the links produced by this search.

Some high-profile WikiLeaks leaks

Vault 7

Full article: Wikileaks/Vault 7

"Mysteriously teased in February,"[12] on 7 March 2017, Wikileaks posted a lot of information on the capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise smart TVs,[13] web browsers (including Firefox, Google Chrome, and Microsoft Edge), and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.

CIA project to bolster European support for the Afghan War

On 26 March 2010, Wikileaks posted a classified CIA analysis of possible PR-strategies to shore up public support in Germany and France for continued war in Afghanistan. After the Dutch government fell on the issue of dutch troops in Afghanistan in April 2010, the CIA became worried that similar events could happen in the countries that post the third and fourth largest troop contingents to the ISAF-mission. The proposed PR strategies focus on pressure points that have been identified within these countries. For France it is the sympathy of the public for Afghan refugees and women. For Germany it is the fear of the consequences of defeat (drugs, more refugees, "terrorism") as well as for Germany’s standing in NATO. The memo is a recipe for the targeted manipulation of public opinion in two NATO ally countries, written by the CIA. It is classified as Confidential / No Foreign Nationals.

The document provides detailed insights into the covert world of intelligence sponsored propaganda [14]

The 'Collateral Murder' video

On 5th April 2010 10:44 EST WikiLeaks released a classified US military video depicting three airstrikes from a US Apache helicopter on July 12, 2007 in New Baghdad, Iraq. At least eighteen people were killed in the airstrikes, including two journalists working for Reuters, Saeed Chmagh and Namir Noor-Eldeen. [15]

The video was recorded by the gunsight camera on an Apache helicopter, identified as Crazyhorse 18, and is accompanied by the radio communications of the helicopter gunmen as they communicate with their commanders and troops on the ground.

This video was amongst 1/4 million classified US Diplomatic cables leaked by 22 year old Bradley Manning.

The 'Afghan War Diary' reports

25th July 2010 5:00 PM EST WikiLeaks has released a document set called the Afghan War Diary, an extraordinary compendium of over 91,000 reports covering the war in Afghanistan from 2004 to 2010. [16]

The reports, while written by soldiers and intelligence officers, and mainly describing lethal military actions involving the United States military, also include intelligence information, reports of meetings with political figures, and related details.

The reports cover most units from the US Army with the exception of most US Special Forces' activities. The reports do not generally cover top secret operations or European and other ISAF Forces operations.

  • Detailed data-searching and reading guides together with a map pinpointing each reported incident is available on a separate page [17]
  • Diary Dig is a separate, non-Wikileaks, site with comprehensive facilities to search and browse the entire database by any of the fields (categories) in the original data files [18]:
DiaryDig.org is an independently produced website which provides an easy way to search through the Afghan War Diaries, which were made public by Wikileaks on 25th July 2010. The documents are a set of over 76,000 reports (with more coming in the future) which cover the war in Afghanistan from 2004 to 2009. [18]

You can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties. From any document page, clicking on the green underlined text will open a popup that links to other documents that contain those phrases, making it possible to see important search terms and connections that you might not otherwise notice.

Our hope is that this tool will be helpful to reporters and researchers who are interested in learning more about the US's war in Afghanistan and making sense of this important database. If you wish to support this work, we encourage you to make a donation to wikileaks or the Bradley Manning legal defense fund. [19]

  • Afghanistan and Pakistan Violent Event Analysis using ACLED and Wikileaks Data [20]. This site contains pdf's of two thorough statistical analyses of the data contained in the 'Afghan War Diaries' leaked data.

Technical criticism from Cryptome

From Cryptome remarks that:

The Wikileaks Afghan War Diary files deserve very close study. The contaminating news reports, condemnations and 'blogwash' need to be surpassed. The WikiLeaks site is heavily loaded and slow. To ease the load and for a quicker download, Cryptome offers mirrors of the now digitally-hashed compressed file packages which were downloaded 27 July 2010, at about 4:40PM. [21]

Bounty

Wikileaks has offered $20,000 for anyone providing information which leads to a conviction in the case of murder victim Seth Rich. Julian Assange appeared to suggest on Dutch television program Nieuwsuur that Seth Rich was the source for the Wikileaks-exposed DNC emails.[22]

Wikileaks resources

WikiSpooks Acknowledgement

WikiLeaks was a major source of content and inspiration when setting up WikiSpooks. It remains a recommended site when researching WikiSpooks articles, although the above caveats should be born in mind.  

Related Documents

TitleTypePublication dateAuthor(s)Description
Anonymous Surpasses Wikileaksarticle17 February 2011John Young
Casualties of Wararticle1 November 2010Ian Townsend-Gault
Ex-Intelligence Officers, Others See Plusses in WikiLeaks Disclosuresstatement7 December 2010Daniel Ellsberg
Frank Grevil
Katharine Gun
David MacMichael
Ray McGovern
Craig Murray
Coleen Rowley
Larry Wilkerson
A statement of support for Wikileaks. "The big question is not whether Americans can 'handle the truth.' We believe they can..."
How to identify CIA limited hangout operationarticle18 June 2013Webster TarpleyCiting the Pentagon Papers as an example, Tarpley suggests that both Wikileaks and the Snowden affair are limited hangout operations by the CIA.
NYT and Guardian on Wikileaksarticle4 February 2011John Young
No fair hearing for Assange at the Guardianarticle5 February 2016Jonathan CookDemonstrates the Establishment-friendly double standards of the UK's flagship 'Left-wing' newspaper - The Guardian - through analysis of its coverage of a UN decision on the political asylum of Julian Assange
Rudolf Elmer Interviewwebpage17 September 2011Mehdi Taileb
Sir Richard Dearlove at the Cambridge Unionarticle15 February 2011Richard Dearlove
Why Wikileaks must be protectedarticle19 August 2010John Pilger
WikiLeaks D NoticeD Notice26 November 2010Andrew Vallance
WikiLeaks – Whose Agenda?article18 December 2010Jeff GatesAn essay on how the release (and probable witholding) of Wikileaks leaks is being timed and manipulated to serve the global Zionist agenda.
Wikileaks - Open Letter to the US Governmentopen letter14 July 2011RevolutionTruth
Wikileaks and Plausible Liesarticle2 December 2010Joe Quin
Wikileaks and the Mighty Wurlitzerarticle7 August 2010Zahir EbrahimAn in-depth discussion of how dissident organisations are co-opted and or otherwise used, abused, controlled or discredited and destroyed by the secret information services.
 

Documents sourced from Wikileaks

TitleTypeSubject(s)Publication dateAuthor(s)Description
Guantanamo SOP Confirms Psychological TorturearticleGuantanamo Bay detention camp
Torture
17 November 2007Stephen Soldz
Julian Assange
Standard operating procedures for military personnel running the Guatanamo Bay military prison confirm that the rules governing the treatment of its inmates amounts to systematic torture
File:Kaupthing-claims.pdfclaimKaupthing Bank
Banking
23 January 201028167 claims made against Kaupthing Bank
Nyet means Nyetdiplomatic communicationUkraine
NATO
Russia
The Great Game
2014 Ukraine coup
1 February 2008William Joseph BurnsFebruary 2008 classified diplomatic cable from US ambassador to Russia William J Burns to the State Department about how Russia views NATO involvement in Ukraine
Rudolf Elmer files against Swiss banking secrecy at ECHRlegal documentBanking14 May 2008Rudolf Elmer
File:TPP-Investment-Chapter.pdfdraft chapterTrans-Pacific Partnership26 March 2015Official bureacracyThe investment chapter draft of the proposed TPP Treaty
File:WikiLeaks-Australian-suppression-order.pdflegal documentAustralia
Corruption
National security
19 June 2014High Court of AustraliaAustralian Supreme Court secret super-injunction preventing the publication of information about a corruption case involving 17 named individuals including senior Malaysian, Indonesian, Vietnamese politicians and Reserve Bank of Australia directors


References

  1. The WikiLeaks 'About' page
  2. The Wikileaks main page
  3. http://www.newyorker.com/magazine/2010/06/07/no-secrets
  4. http://www.wired.com/2010/06/wikileaks-documents/
  5. http://www.theregister.co.uk/2010/06/02/wikileaks_tor_snooping_denial/
  6. https://911.wikileaks.org/
  7. http://www.belfasttelegraph.co.uk/life/features/wanted-by-the-cia-julian-assange-wikileaks-founder-28548843.html
  8. http://www.unwelcomeguests.net/515
  9. Arthur Silber's "Once upon a Time" blog
  10. Wikileaks, Resistance, Genuine Heroes and Breaking the Goddam Rules
  11. Document:How to identify CIA limited hangout operation
  12. http://whowhatwhy.org/2017/03/14/wikileaks-agenda-compromised-stronger-ever/
  13. Cite error: Invalid <ref> tag; no text was provided for refs named NYT_7_Mar_2017_CIA_leaks
  14. CIA analysis of how to bolster European support for continued war in Afghanistan
  15. 'Collateral Murder' video page
  16. WikiLeaks 'Afghan War Diary' announcement page
  17. Wikileaks 'Afghan War diary detailed guide
  18. a b The "Diary Dig" web site
  19. The Bradley Manning Support Network
  20. Afghanistan and Pakistan Violent Event Analysis - Abstracts and links to high definition pdf's
  21. The Cryptome Afghan war diaries mirror site
  22. https://www.youtube.com/watch?v=Kp7FkLBRpKg