This key's fingerprint is A04C 5E09 ED02 B328 03EB 6116 93ED 732E 9231 8DBA

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=/E/j
-----END PGP PUBLIC KEY BLOCK-----
			

Contact

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https://wikileaks.org/talk

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http://wlchatc3pjwpli5r.onion

We recommend contacting us over Tor if you can.

Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

wlupld3ptjvsgwqw.onion
Copy this address into your Tor browser. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.


Latest Releases

CIA Director John Brennan emails

2015-10-21

Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan’s non-government email accounts. Brennan used the account occasionally for several intelligence related projects.

Updated TPP Treaty: Intellectual Property Rights Chapter

2015-10-09

Today, 9 October, 2015 WikiLeaks releases the final negotiated text for the TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP encompasses 12 nations representing more than 40 per cent of global GDP. Despite a final agreement, the text is still being withheld from the public, notably until after the Canadian election on October 19.

Target Tokyo

2015-07-31

Today, Friday 31 July 2015, 9am CEST, WikiLeaks publishes "Target Tokyo", 35 Top Secret NSA targets in Japan including the Japanese cabinet and Japanese companies such as Mitsubishi, together with intercepts relating to US-Japan relations, trade negotiations and sensitive climate change strategy.

TPP: SOE Issues for Ministerial Guidance

2015-07-29

Today, 29 July 2015, WikiLeaks releases a secret letter from the Trans-Pacific Partnership Agreement (TPP or TPPA) Ministerial Meeting in December 2013, along with a comprehensive expert analysis of the document.

Hacking Team

2015-07-09

Today WikiLeaks releases more than 1 million emails from the Italian surveillance malware vendor Hacking Team, which first came under international scrutiny after WikiLeaks publication of the SpyFiles. These internal emails show the inner workings of the controversial global surveillance industry.

All The Chancellor’s Men

2015-07-08

Today, Wednesday 8 July at 1800 CEST, WikiLeaks publishes three NSA intercepts of German Chancellor Angela Merkel, together with a list of 56 National Security Agency (NSA) target selectors for the Chancellor and the Chancellery. It lists not only confidential numbers for the Chancellor, but also for her top officials, her aides, her chief of staff, her political office and even her fax machine.

Bugging Brazil

2015-07-04

WikiLeaks publishes today, 4 July at 08:00 BRT, a top secret US National Security Agency target list of 29 key Brazilian government phone numbers that were selected for intensive interception. The publication proves that not only President Dilma Rousseff was targeted but also her assistant, her secretary, her chief of staff, her Palace office and even the phone in her Presidential jet.

The Euro Intercepts

2015-07-01

The United States National Security Agency has been massively targeting phone numbers of top German ministers and public officials responsible for commerce, finances, economics and agriculture – including even Angela Merkel’s personal assistant.

July TiSA Release

2015-07-01

Today, 1500 CEST Wednesday, 1 July 2015, WikiLeaks releases a modern journalistic holy grail: the secret Core Text for the largest ’trade deal’ in history, the TiSA (Trade In Services Agreement), whose 52 nations together comprise two-thirds of global GDP. The negotiating parties are the United States, the 28 members of the European Union and 23 other countries, including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan and Israel.

Espionnage Élysée

2015-06-23

Today, 23 June 2015, WikiLeaks began publishing "Espionnage Élysée", a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

The Saudi Cables

2015-06-19

Today, Friday 19th June at 1pm GMT, WikiLeaks began publishing The Saudi Cables: more than half a million cables and other documents from the Saudi Foreign Ministry that contain secret communications from various Saudi Embassies around the world. The publication includes "Top Secret" reports from other Saudi State institutions, including the Ministry of Interior and the Kingdom’s General Intelligence Services.

TPP Transparency for Healthcare Annex

2015-06-10

Today, Wednesday 10 June 2015, WikiLeaks publishes the Healthcare Annex to the secret draft "Transparency" Chapter of the Trans-Pacific Partnership Agreement (TPP), along with each country’s negotiating position. The Healthcare Annex seeks to regulate state schemes for medicines and medical devices. It forces healthcare authorities to give big pharmaceutical companies more information about national decisions on public access to medicine, and grants corporations greater powers to challenge decisions they perceive as harmful to their interests.

Trade in Services Agreement

2015-06-03

WikiLeaks releases today 17 secret documents from the ongoing TISA (Trade In Services Agreement) negotiations which cover the United States, the European Union and 23 other countries including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan & Israel — which together comprise two-thirds of global GDP. "Services" now account for nearly 80 per cent of the US and EU economies and even in developing countries like Pakistan account for 53 per cent of the economy. While the proposed Trans-Pacific Partnership (TPP) has become well known in recent months in the United States, the TISA is the larger component of the strategic TPP-TISA-TTIP ’T-treaty trinity’. All parts of the trinity notably exclude the ’BRICS’ countries of Brazil, Russia, India, China and South Africa.

EU plan for military intervention against "refugee boats" in Libya and the Mediterranean

2015-05-25

Today, WikiLeaks is releasing two classified EU documents, outlining the planned military intervention against boats travelling from Libya to Italy. The more significant of the two documents was written by the combined military defence chiefs of the EU member states. The plan was formally approved by representatives from all 28 countries on 18 May 2015.

Trident whistleblower: nuclear ’disaster waiting to happen’

2015-05-17
"Please make sure this information is released. I don’t want to be in prison without anyone knowing the truth. "

These are the words of UK Royal Navy "Trident" nuclear weapons submariner William McNeilly, aged 25.

Bundestag Inquiry into BND and NSA / NSA Untersuchungsausschuss

2015-05-12

Today, Tuesday 12 May, WikiLeaks releases ten months of transcripts from the ongoing German Parliamentary inquiry into NSA activities in Germany. Despite many sessions being technically public, in practice public understanding has been compromised as transcripts have been withheld, recording devices banned and reporters intrusively watched by police.

The Sony Archives

2015-04-16

Today, 16 April 2015, WikiLeaks publishes an analysis and search system for The Sony Archives: 30,287 documents from Sony Pictures Entertainment (SPE) and 173,132 emails, to and from more than 2,200 SPE email addresses.

TPP Investment Chapter

2015-03-25

WikiLeaks releases today the "Investment Chapter" from the secret negotiations of the TPP (Trans-Pacific Partnership) agreement. The document adds to the previous WikiLeaks publications of the chapters for Intellectual Property Rights (November 2013) and the Environment (January 2014).

CIA Travel Advice to Operatives

2014-12-21

Today, 21 December 2014, WikiLeaks releases two classified documents by a previously undisclosed CIA office detailing how to maintain cover while travelling through airports using false ID – including during operations to infiltrate the European Union and the Schengen passport control system. This is the second release within WikiLeaks’ CIA Series, which will continue in the new year.

CIA Review of High-Value Target Assassination Programs

2014-12-18

WikiLeaks today, Thursday 18th December, publishes a review by the Central Intelligence Agency (CIA) of its "High Value Target" (HVT) assassination programme. The report weighs the pros and cons of killing "insurgent" leaders in assassination plots. After the report was prepared, US drone strike killings rose to an all- time high.

The report discusses assassination operations (by various states) against the Taliban, al-Qa’ida, the FARC, Hizbullah, the PLO, HAMAS, Peru’s Shining Path, the Tamil’s LTTE, the IRA and Algeria’s FLN. Case studies are drawn from Chechnya, Libya, Pakistan and Thailand.

Updated TPP Intellectual Property Chapter

2014-10-16

Today, Thursday 16 October 2014, WikiLeaks released a second updated version of the Trans-Pacific Partnership (TPP) Intellectual Property Rights Chapter. The TPP is the world’s largest economic trade agreement that will, if it comes into force, encompass more than 40 per cent of the world’s GDP. The IP Chapter covers topics from pharmaceuticals, patent registrations and copyright issues to digital rights. Experts say it will affect freedom of information, civil liberties and access to medicines globally. The WikiLeaks release comes ahead of a Chief Negotiators’ meeting in Canberra on 19 October 2014, which is followed by what is meant to be a decisive Ministerial meeting in Sydney on 25–27 October.

The Spyfiles 4

2014-09-15

Today, 15 September 2014, WikiLeaks releases previously unseen copies of weaponised German surveillance malware used by intelligence agencies around the world to spy on journalists, political dissidents and others.

FinFisher (formerly part of the UK based Gamma Group International until late 2013) is a German company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices. FinFisher first came to public attention in December 2011 when WikiLeaks published documents detailing their products and business in the first SpyFiles release.

Australia-wide censorship order for corruption case involving Malaysia, Indonesia and Vietnam

2014-07-29

Today, WikiLeaks releases an unprecedented Australian censorship order concerning a multi-million dollar corruption case explicitly naming the current and past heads of state of Indonesia, Malaysia and Vietnam, their relatives and other senior officials. The super-injunction invokes “national security” grounds to prevent reporting about the case, by anyone, in order to “prevent damage to Australia’s international relations”. The court-issued gag order follows the secret 19 June 2014 indictment of seven senior executives from subsidiaries of Australia’s central bank, the Reserve Bank of Australia (RBA).

Trade in Services Agreement - Financial Services Annex

2014-06-19

Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force.

EU External Freedom of Expression Policy

2014-04-15

Today WikiLeaks released the second Draft of EU Human Rights Guidelines on Freedom of Opinion and Expression Online and Offline, an instrument which sets how the EU is to treat these subjects and their priorities in the foreign policy of the European Union, for example, the EU response to censorship of TV stations in the Ukraine and certain aspects of US mass surveillance.

NETmundial Executive Stakeholder Committee (EMC) Outcome Document

2014-04-08

Today WikiLeaks released the penultimate draft agreement ("Outcome Document") going into NETmundial 2014 - the Global Multistakeholder Meeting on the Future of Internet Governance. NETmundial is an international conference of twelve nations and other internet stakeholders, to be hosted in São Paulo, Brazil, April 23-24, convened to lay down a roadmap for internet governance.

Trans-Pacific Partnership Agreement - Environment Chapter

2014-01-15

Today, 15 January 2014, WikiLeaks released the secret draft text for the entire TPP (Trans-Pacific Partnership) Environment Chapter and the corresponding Chairs’ Report. The TPP transnational legal regime would cover 12 countries initially and encompass 40 per cent of global GDP and one-third of world trade. The Environment Chapter has long been sought by journalists and environmental groups. The released text dates from the Chief Negotiators’ summit in Salt Lake City, Utah, on 19-24 November 2013.

Trans-Pacific Partnership Agreement - IP Chapter

2013-11-13

Today, 13 November 2013, WikiLeaks released the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013

The Spyfiles #3

2013-09-04

Today, Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released ’Spy Files #3’ – 249 documents from 92 global intelligence contractors. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations

Prosecution and prison documents for Pirate-Bay founder Gottfrid Svartholm Warg (alias Anakata)

2013-05-19

Gottfrid Svartholm Warg’s trial begins on Monday 20 May 2013 in Stockholm. This material includes inter alia the interrogations with GSW and his co-accused, internal correspondence from the Swedish Foreign Minister and the Swedish embassy in Cambodia, damage assessment reports by the companies and the authorities concerned, and correspondence between GSW and Kristina Svartholm and the Swedish prison authorities.

Public Library of US Diplomacy: Kissinger Cables

2013-04-08

The Kissinger Cables are part of today’s launch of the WikiLeaks Public Library of US Diplomacy (PlusD), which holds the world’s largest searchable collection of United States confidential, or formerly confidential, diplomatic communications. As of its launch on April 8, 2013 it holds 2 million records comprising approximately 1 billion words.

Detainee Policies

2012-10-24

WikiLeaks has begun releasing the ’Detainee Policies’: more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. Over the next month, WikiLeaks will release in chronological order the United States’ military detention policies followed for more than a decade. The documents include the Standard Operating Procedures (SOPs) of detention camps in Iraq and Cuba, interrogation manuals and Fragmentary Orders (FRAGOs) of changes to detainee policies and procedures. A number of the ’Detainee Policies’ relate to Camp Bucca in Iraq, but there are also Department of Defense-wide policies and documents relating to Abu Ghraib, Guantanamo Bay and European U.S. Army Prison facilities.

Wikileaks: Syria Files

2012-07-05

Thursday 5 July 2012, WikiLeaks began publishing the Syria Files – more than two million emails from Syrian political figures, ministries and associated companies, dating from August 2006 to March 2012. This extraordinary data set derives from 680 Syria-related entities or domain names, including those of the Ministries of Presidential Affairs, Foreign Affairs, Finance, Information, Transport and Culture. At this time Syria is undergoing a violent internal conflict that has killed between 6,000 and 15,000 people in the last 18 months. The Syria Files shine a light on the inner workings of the Syrian government and economy, but they also reveal how the West and Western companies say one thing and do another.

Wikileaks: The GIFiles

2012-02-27

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.

Read more at the-gifiles.html

Search the GI Files

You can also download torrent archive of the gifiles site at wlstorage.net/torrent/gifiles/ - please pick the newest one available.

Wikileaks: The Spy Files

2011-12-01

Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries

It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality.

Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year.

You can download torrent archive containing all released files from here.

The Guantanamo Files: 779 classified prisoner dossiers revealed from the world’s most notorious prison

2011-04-25

In thousands of pages of documents dating from 2002 to early 2009 and never seen before by members of the public or the media, the cases of the majority of the prisoners held at Guantanamo — 758 out of 779 in total — are described in detail in memoranda from JTF-GTMO, the Joint Task Force at Guantanamo Bay, to US Southern Coand in Miami, Florida.

These memoranda, which contain JTF-GTMO’s recommendations about whether the prisoners in question should continue to be held, or should be released (transferred to their home governments, or to other governments) contain a wealth of important and previously undisclosed information, including health assessments, for example, and, in the cases of the majority of the 171 prisoners who are still held, photos (mostly for the first time ever).

Here you may also download whole GITMO site from torrent.

Bank of America using Private Intel Firms to Attack Wikileaks

2011-02-02

In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:

- Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
- Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
- Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
- Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
- Search for leaks. Use social media to profile and identify risky behavior of employees.

PDF - 4.5 Mb
Original document converted to PDF

Cablegate: 250,000 US Embassy Diplomatic Cables

2010-11-28

On Sunday 28th November 2010, WikiLeaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into the US Government’s foreign activities.

All released leaks archived

2010-11-28

Due to recent attacks on our infrastructure, we’ve decided to make sure everyone can reach our content. As part of this process we’re releasing archived copy of all files we ever released - that’s almost 20,000 files. The archive linked here contains a torrent generated for each file and each directory.

War Diary: Iraq War Logs

2010-10-22

The 391,832 reports (’The Iraq War Logs’), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a ’SIGACT’ or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.

Search the War Diaries here

You may also download the whole archive here

War Diary: Afghanistan War Logs

2010-07-25

From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties.

Search the War Diaries here

You may also download the whole archive here

Video: Collateral Murder

2010-04-05

WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.

WikiLeaks Archives

U.K. (2009) Publication of the UK Royal Mail’s PostZon postcode database

WikiLeaks released the UK government database of all 1,841,177 UK post codes together with latitude and longitude, grid references, county, district, ward, NHS codes and regions, Ordinance Survey reference, and date of introduction. The database was last updated on July 8, 2009 and is over 100,000 pages in size.

U.K. (2009) Barclays Bank

On Monday 16th March 2009, The Guardian newspaper in the United Kingdom published a series of leaked memos from the banking giant Barclays. The next day, these documents were removed from The Guardian web archive, as a result of a court injunction obtained in the middle of the night

Wikileaks obtained the documents from an anonymous source and published them the next day. The documents are copies of alleged internal memos from within Barclays Bank. They were sent by an anonymous whistleblower to Vince Cable, Liberal-Democrat shadow chancellor. The documents reveal a number of elaborate international tax avoidance schemes by the SCM (Structured Capital Markets) division of Barclays. According to these documents, Barclays has been systematically assisting clients to avoid huge amounts of tax they should be liable for across multiple jurisdictions.

Ivory Coast (2009) Minton report: Trafigura toxic dumping along the Ivory Coast broke EU regulations, 14 Sep 2006

Wikileaks released the so-called Minton Report into Trafigura’s dumping of toxic waste along the Ivory Coast, resulting illness for tens of thousands. The "Minton report" was a document which exposed a toxic waste dumping incident, which affected upto 108,000 people, according to a September 2009 United Nations report. The report was commissioned through Waterson & Hicks, a UK law firm, possibly to claim client-attorney privilege should it leak. The company concerned, Trafigura, is a giant multi-national oil and commodity trader. The Minton report assesses an incident involving Trafigura and the Ivory Coast town of Abidjan—possibly most culpable mass contamination incident since Bhopal.

U.S. (2010) 9/11 tragedy pager intercepts

WikilLeaks released over half a million US national text pager intercepts. The intercepts covered a 24 hour period surrounding the September 11, 2001 attacks in New York and Washington.

Denmark (2008) 3863 sites on censorship list

Wikileaks released the secret Internet censorship list for Denmark. The list contains 3863 sites blocked by Danish ISPs participating in Denmark’s censorship scheme as of February 2008. Danish ISPs "volunteer" to censor their users rather than face legislation and the top three ISPs are particpants. The system can be used to censor anything, but is meant to be for child pornography sites found by the Danish police and the Danish "Save the Children" group. The list is generated without judicial or public oversight and is kept secret by the ISPs using it.

Bahrein (2009) One billion for extended national security plan

WikiLeaks released to the public Bahrain plans to spend $1 billion on a security plan to "protect the country and vital facilities against unconventional threats". According to the document, Bahrain was recommended to contact Lockheed Martin, Thales, Finmeccanica and EADS by the Saudi Ministry of Defence and Aviation (MoDA).

India (2009) Confidential plans for 1.2 billion ID cards: Creating a Unique ID for every resident

Wikileaks released a confidential working paper (49 pp) presents the current plan for India’s Unique ID Databse Project, it will be the world’s biggest citizen identification scheme.

Global (2009) World Institute of Scientology Enterprises International Business Directory, 2006

WikiLeaks released the World Institute of Scientology Enterprises International Business Directory (2006) is a 308 page index of Scientology-related business and business people.

U.K (2009) UK Ministry of Defense Anti Leaking Guide

Wikileaks released the UK Ministry of Defence’s JSP 440, the Defence Manual of Security, Volumes 1, 2 and 3. The document includes instructions on dealing with leaks, investigative journalists, Parliamentarians, foreign agents, terrorists & criminals, sexual entrapments in Russia and China, diplomatic pouches, allies, classified documents & codewords, compromising radio and audio emissions, computer hackers—and many other related issues.

China (2009) Green Dam censorship system internal brief to Chinese government

The ’Green Dam’ censorship/spyware system was mandated to be installed on all Chinese personal computers come July 1, 2009. WikiLeaks made available an internal document from early 2008 containing negotiations between Jin Hui, the maker of the software, and the Chinese government, together with a detailed description of the Green Dam system.

Colombia (2009) Exposing extra judicial killings and false positives

Wikileaks released documents proving extra-judicial killings and murder of suspected guerrillas, a reactive attempt by the Colombian government to execute the death penalty on the street and eradicate opposing forces such as the FARC-EP in isolated rural areas within Colombia. The documents mention that a good majority of the time these suspected guerrillas haven’t even been found guilty of a crime and are executed on the street before having a fair trial.

The material cites that all to often the opposing force are innocent human casualties as opposed to FARC-EP guerrilla fighters. It is also implied that police officers and Colombian commandos have engaged in murderous acts against innocent citizens and in order to cover their crimes have labeled these victims as combatant guerrilla fighters. The victims include mothers, children, fathers, students, and rural farmers.

The documents also mention the disappearance of individuals investigating such abuses and corruption. The information underscores a surprisingly low amount of criminal convictions issued by the courts against police officers and soldiers who have engaged in ’street justice’ by executing suspected guerrillas who in fact were innocent casualties of war.

Global (2008) Peace Corps Control of Volunteer Free Speech

WikiLeaks made available a note sent from Peace Corps Director to Peace Corps Country Directors to control volunteer speech that is negative about the agency, along with copy of mandatory agency policy.

Germany (2008) Bundestag on German CIA black sites and detainee transfers on German soil

The 21 Mar 2008 report, by Dr. Joachim Jacob, is classified as "VS-NfD" (Verschlusssache - Nur fuer den Dienstgebrauch / Classified document - for official use only) and presents an excerpt of 26 pages from the 132-paged final report. It was issued in context of the 1st Investigation Committee of the 16th Electoral period. The report gives detailed information about an official investigation into US military transports of detainees via Germany and also incarceration as well as mistreated of US detainees on German soil.

DRC (2009) UN finds 217 sex abuse claims against blue helmets

WikiLeaks made available a United Nations Office of Internal Oversight Services (UN OIOS) 30 Jan 2007 report titled "Allegations of sexual exploitation and abuse in the Ituri region, Bunia [ID Case No. 0618-05]" relating to the United Nations Organization Mission in the Democratic Republic of the Congo.

The document collected 217 allegations of abuse of girls and women by peacekeepers in eastern Congo, from sex with teenagers in the back room of a liquor store to threats of "hacking" victims for cooperating with investigators. The 2006 investigation found many allegations credible and said evidence suggests "frequent and ongoing" sexual exploitation in the region.

Colombia (2008) Assassinated FARC spokesman Raul Reyes Yahoo mailbox

Wikileaks released Assassinated FARC-EP spokesman Raul Reyes Yahoo mailbox from December 19, 2007 to May 29, 2008. It contained 708 messages that were not deleted by the latter date. Elbarcino is a known alias of Reyes and the address (elbarcinocolombia@yahoo.com) appears as a FARC contact for UN resolution 1612 on child soldiers, as well as two FARC-EP related websites. Commander Reyes was assassinated by a combined United States and Colombian government cross-border night air attack inside Ecuador in early 2008. 20-30 other FARC members were also killed.

(2008) United Nations Confidential Reports

Wikileaks released 70 United Nations investigative reportsclassified "Strictly Confidential". The reports expose matters from allegations of hundreds of European peace-keepers sexually abusing refugee girls to generals in Peru using Swiss bank accounts to engage in multi-million dollar frauds against the UN.

Cuba (2008) Cuba to work around US embargo via undersea cable to Venezuela

Documents released by Wikileaks revealed that Cuba and Venezuela signed a confidential contract in 2006 to lay an undersea fibre-optic cable that bypasses the United States. The contract between the two countries, which has been independently verified, adds weight to Cuban statements that the United States economic embargo of the island has forced it to rely on slow and expensive satellite links for Internet connectivity. Cuba is situated a mere 120 kilometres off the coast of Florida. The proposed 1,500 kilometer cable will connect Cuba, Jamaica, Haiti and Trinidad to the rest of the world via La Guaira, Venezuela. Carrying out the work are CVG Telecom (Corporación Venezolana de Guyana) and ETC (Empresa de Telecomunicaciones de Cuba). The leaked documents have technical details and pictures of the cable, maps, and systems to be used, parties signing the agreement, terms and conditions, costs, and a schedule of charges and compromises. The connection allows for the transmission of data, video and voice (VoIP).

US (2009) US Special Forces counterinsurgency manual analysis

WikiLeaks released theForeign Internal Defense Tactics Techniques and Procedures for Special Forces (1994, 2004) document, the official US Special Forces doctrine for Foreign Internal Defense or FID. FID operations are designed to prop up "friendly" governments facing popular revolution or guerilla insurgency. FID interventions are often covert or quasi-covert due to the unpopular nature of the governments being supported.

The manual directly advocates training paramilitaries, pervasive surveillance, censorship, press control and restrictions on labor unions & political parties. It directly advocates warrantless searches, detainment without charge and (under varying circumstances) the suspension of habeas corpus. It directly advocates employing terrorists or prosecuting individuals for terrorism who are not terrorists, running false flag operations and concealing human rights abuses from journalists. And it repeatedly advocates the use of subterfuge and "psychological operations" (propaganda) to make these and other "population & resource control" measures more palatable.

U.K. (2008) Military protocol for counter-intelligence operations

On 2008 WikiLeaks released the UK military protocol for all security and counter-intelligence operations. The document includes instructions on dealing with leaks, investigative journalists, Parliamentarians, foreign agents, terrorists & criminals, sexual entrapments in Russia and China, diplomatic pouches, allies, classified documents & codewords, compromising radio and audio emissions, computer hackers—and many other related issues.

Afghanistan (2009) Wikileaks releases NATO report on civilian deaths

Wikileaks released a confidential NATO report from January 2009, revealed that civilian deaths from the war in Afghanistan had increased by 46% over the past year. The report showed a dramatic escalation of the war and civil disorder. Coalition deaths increased by 35%, assassinations and kidnappings by 50% and attacks on the Kabul based Government of Hamid Karzai also more than doubled, rising a massive 119%.