Thursday



In Wikileaks Archives

Peru (2009) Peruvian politicians’ and officials’ involvement in the Petrogate scandal

WikiLeaks released audio recordings of Perupetro Vice President Alberto Quimper and Romulo León Alegría, a prominent member of Garcia’s ruling Aprista party, discussing under-the-table payments conditioned on Discover Petroleum obtaining oil exploration concessions. According to the recordings, Quimper, Leon and Ernesto Arias-Schreiber, the legal representative of Discover in Peru, were to receive $10,000 monthly in exchange for steering lucrative oil contracts to the Norwegian oil exploration firm.
The scandal, dubbed “petrogate,” led the government to suspend five joint exploration and development contracts recently awarded to Discover Petroleum and state-owned oil company Petroperu. The minister of Energy and Mines, Juan Valdivia, immediately handed in his resignation and only days later, the whole cabinet and cabinet chief Jorge del Castillo resigned.

India (2009) Confidential plans for 1.2 billion ID cards: Creating a Unique ID for every resident

Wikileaks released a confidential working paper (49 pp) presents the current plan for India’s Unique ID Databse Project, it will be the world’s biggest citizen identification scheme.

U.K. (2009) Publication of the UK Royal Mail’s PostZon postcode database

WikiLeaks released the UK government database of all 1,841,177 UK post codes together with latitude and longitude, grid references, county, district, ward, NHS codes and regions, Ordinance Survey reference, and date of introduction. The database was last updated on July 8, 2009 and is over 100,000 pages in size.

U.K. (2008) Military protocol for counter-intelligence operations

On 2008 WikiLeaks released the UK military protocol for all security and counter-intelligence operations. The document includes instructions on dealing with leaks, investigative journalists, Parliamentarians, foreign agents, terrorists & criminals, sexual entrapments in Russia and China, diplomatic pouches, allies, classified documents & codewords, compromising radio and audio emissions, computer hackers—and many other related issues.

Bahrein (2009) One billion for extended national security plan

WikiLeaks released to the public Bahrain plans to spend $1 billion on a security plan to "protect the country and vital facilities against unconventional threats". According to the document, Bahrain was recommended to contact Lockheed Martin, Thales, Finmeccanica and EADS by the Saudi Ministry of Defence and Aviation (MoDA).

(2008) United Nations Confidential Reports

Wikileaks released 70 United Nations investigative reportsclassified "Strictly Confidential". The reports expose matters from allegations of hundreds of European peace-keepers sexually abusing refugee girls to generals in Peru using Swiss bank accounts to engage in multi-million dollar frauds against the UN.

DRC (2009) UN finds 217 sex abuse claims against blue helmets

WikiLeaks made available a United Nations Office of Internal Oversight Services (UN OIOS) 30 Jan 2007 report titled "Allegations of sexual exploitation and abuse in the Ituri region, Bunia [ID Case No. 0618-05]" relating to the United Nations Organization Mission in the Democratic Republic of the Congo.
The document collected 217 allegations of abuse of girls and women by peacekeepers in eastern Congo, from sex with teenagers in the back room of a liquor store to threats of "hacking" victims for cooperating with investigators. The 2006 investigation found many allegations credible and said evidence suggests "frequent and ongoing" sexual exploitation in the region.

Afghanistan (2008) Release of report NATO in Afghanistan: Master Narrative

The released document detailed the key facts and themes NATO representatives are to give and to avoid giving to the world press. Among the revelations, which we encourage the public to review in detail, is Jordan’s presence as secret member of the US lead occupation force.

Wikileaks: The GIFiles

2012-02-27
On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.
You can also download torrent archive of the gifiles site at wlstorage.net/torrent/gifiles/ - please pick the newest one available.

Wikileaks: The Spy Files

2011-12-01
Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries
It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality.
Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year.
You can download torrent archive containing all released files from here.

The Guantanamo Files: 779 classified prisoner dossiers revealed from the world’s most notorious prison

2011-04-25
In thousands of pages of documents dating from 2002 to early 2009 and never seen before by members of the public or the media, the cases of the majority of the prisoners held at Guantanamo — 758 out of 779 in total — are described in detail in memoranda from JTF-GTMO, the Joint Task Force at Guantanamo Bay, to US Southern Coand in Miami, Florida.
These memoranda, which contain JTF-GTMO’s recommendations about whether the prisoners in question should continue to be held, or should be released (transferred to their home governments, or to other governments) contain a wealth of important and previously undisclosed information, including health assessments, for example, and, in the cases of the majority of the 171 prisoners who are still held, photos (mostly for the first time ever).
Here you may also download whole GITMO site from torrent.

Cablegate: 250,000 US Embassy Diplomatic Cables

2011-02-10
On Sunday 28th November 2010, WikiLeaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into the US Government’s foreign activities.

Bank of America using Private Intel Firms to Attack Wikileaks

2011-02-02
In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:
- Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
- Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
- Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
- Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
- Search for leaks. Use social media to profile and identify risky behavior of employees.
PDF - 4.5 Mb
Original document converted to PDF

All released leaks archived

2010-11-28
Due to recent attacks on our infrastructure, we’ve decided to make sure everyone can reach our content. As part of this process we’re releasing archived copy of all files we ever released - that’s almost 20,000 files. The archive linked here contains a torrent generated for each file and each directory.

War Diary: Iraq War Logs

2010-10-22
The 391,832 reports (’The Iraq War Logs’), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a ’SIGACT’ or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.
You may also download the whole archive here

War Diary: Afghanistan War Logs

2010-07-25
From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties.
You may also download the whole archive here

Video: Collateral Murder

2010-04-05
WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad — including two Reuters news staff. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.



Category:Bangladesh


Popular Bangladesh related articles


Selected Disclosure Analysis


Latest Disclosures and Censorship

Subcategories

This category has only the following subcategory.

W




wikileaks.org

Sunday

If an object is equal to the pressure around, or the attraction or repulsion is, then within Its own orbit around the object that, if within the circular object; My question is, how the earth's orbit around the sun around.own orbit around the earth.I think only his own orbit around the earth. And not 24 hours. 365 days in the transit times. The reason we can not influence kinetic world. If you see him in our 24 hour service is a problem that was networking .

I think the size of the Earth. Examples of evidence and the questions I have.
I think the size of the Earth. Examples of evidence and the questions I have.

Friday







  • acha
    03:41:43am
    14-05-2012

  • papa mere pas sogaye tha o apni sali ji se bat karaha tha
    03:47:07am
    14-05-2012
  • to me yesa karta ki tumko you pakadati thi or choditi nahi thi
    03:51:57am
    14-05-2012

  • nahi
    03:54:31am
    14-05-2012

  • acha to tum ye batao tum unke sat rahate ho kya o anti or ankal ka sath
    03:57:59am
    14-05-2012

  • 4 baj chuke he or apko kam parbhi jana padega chlo abhi tum sojao my bebi
    04:07:58am
    14-05-2012

  • acha to fir bolo
    04:10:46am
    14-05-2012

  • acha
    04:13:02am
    14-05-2012

  • nahi soya
    04:25:45am
    14-05-2012

  • tumko dekhratha
    04:26:49am
    14-05-2012

  • tum mere ho
    04:30:54am
    14-05-2012

  • ha lana
    04:33:27am
    14-05-2012

  • kya bola ankal
    04:22:01am
    14-05-2012

  • magar me sirf sunungi bat nahi nahi karsakati ok
    04:36:02am
    14-05-2012

  • magar mere papa man he
    04:42:17am
    14-05-2012

  • ok
    04:43:10am
    14-05-2012

  • tum jo kahe vahi karungi
    04:46:30am
    14-05-2012


  • http:
    ha to suno 7 baje ti piyo 8 baje nashta karo or ii baje khana khao or sojao