Reviewing the WikiLeaks.org Situation

First review the source. http://WikiLeaks.org and research its credibility. (SEE SEC. 2 Below)

I contacted the United Nations so I could share the world government’s official stance on wikiLeaks. Their online response is “Contact your countries representative”. I am going to call and try to get a person on the phone tomorrow. I want a formal statement on the UN Official Stance but they may wait until all the documents have been released. They also redirect you to do research on the INTERNET PUBLIC LIBRARY (ipl.org) which is NOT RELEVANT to current events. Thank you UN for the wonderful effort of having customer service automated!!!!

The most important point of any political debate such as the one that follows is to PROTECT and UPHOLD THE CONSTITUTION OF THE UNITED STATES OF AMERICA. Base your opinions and judgment on the Constitution with respect to the Bill of Rights and you will be heard and respected back.

Summary as written by WikiLeaks:

The broader principles on which our work is based are the defense of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. We derive these principles from the Universal Declaration of Human Rights. In particular, Article 19 inspires the work of our journalists and other volunteers. It states that everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. We agree, and we seek to uphold this and the other Articles of the Declaration.

At 5pm EST Friday 22nd October 2010 WikiLeaks released the largest classified military leak in history. The 391,832 reports (‘The Iraq War Logs’), document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a ‘SIGACT’ or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.

The reports detail 109,032 deaths in Iraq, comprised of 66,081 ‘civilians’; 23,984 ‘enemy’ (those labeled as insurgents); 15,196 ‘host nation’ (Iraqi government forces) and 3,771 ‘friendly’ (coalition forces). The majority of the deaths (66,000, over 60%) of these are civilian deaths.That is 31 civilians dying every day during the six year period. For comparison, the ‘Afghan War Diaries’, previously released by WikiLeaks, covering the same period, detail the deaths of some 20,000 people. Iraq during the same period, was five times as lethal with equivalent population size.

~~~~~~~~~~~~~~~~~~~~~~~

WikiLeaks Releasing 251,287 embassy cables 11/28-March 2011

*Source wikileaks.org

Wikileaks began on Sunday November 28th publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into US Government foreign activities.

The cables, which date from 1966 up until the end of February this year, contain confidential communications between 274 embassies in countries throughout the world and the State Department in Washington DC. 15,652 of the cables are classified Secret.

The embassy cables will be released in stages over the next few months. The subject matter of these cables is of such importance, and the geographical spread so broad, that to do otherwise would not do this material justice.

The cables show the extent of US spying on its allies and the UN; turning a blind eye to corruption and human rights abuse in “client states”; backroom deals with supposedly neutral countries; lobbying for US corporations; and the measures US diplomats take to advance those who have access to them.

This document release reveals the contradictions between the US’s public persona and what it says behind closed doors – and shows that if citizens in a democracy want their governments to reflect their wishes, they should ask to see what’s going on behind the scenes.

Every American schoolchild is taught that George Washington – the country’s first President – could not tell a lie. If the administrations of his successors lived up to the same principle, today’s document flood would be a mere embarrassment. Instead, the US Government has been warning governments — even the most corrupt — around the world about the coming leaks and is bracing itself for the exposures.

The full set consists of 251,287 documents, comprising 261,276,536 words (seven times the size of “The Iraq War Logs”, the world’s previously largest classified information release).

The cables cover from 28th December 1966 to 28th February 2010 and originate from 274 embassies, consulates and diplomatic missions.

What is the big deal?

Government officials and military members mentioned in the documents being released are now forced to hold press conferences to defend their actions and explain embarrassing comments. One a very rare occasion, some may have to relocate and their families are forced to change their identities for additional safety. Just how many of these cases does it take to justify breaking the Constitution of the USA by censoring our media and restricting the free press?

Yes, the data was restricted and classified BUT wikiLeaks is reviewing and verifying each cable before releasing them. WikiLeaks also with-holds information that clearly puts a current life in jeopardy. The action is not directly life threatening but it may indirectly increase the odds someone will be in danger. Those most in danger will have to choose to return to the most secure areas like the continental states or accept the level of increased risk.

What is the majority opinion of “The Citizens” of the US?

Watching Twitter feeds for hours at a time I am seeing aprox:

65% in favor of MOST of the data

15% neutral

10% partially against

5% Fully against

Concerns you may have?

My military friends and family are making heavy complaints and having strong feelings of anger towards WikiLeaks but they all say they can not and have not looked at the material on the site. Some say their computers will be flagged and they will be punished for viewing files above their clearance. They are being told that the data released is harmful and thus they immediately are ridiculing anyone who supports the data release.

How can one be hateful without fully examining the reason and making your own conclusions?

So, I decided to compile this review to help all my friends study the facts and come to their own conclusions without being nudged by any one sided sources.

I have studied the sites, documents, cables, followed Twitter debates all week and listened to all the media interviews to the time of publication and have compiled the following.

What DATA is available?

See Section 2.2 for a detailed summary of the PRE 11/28 documents with a list of the headlines. Topics include: War, killings, torture, detention facts; Government, trade and corporate transparency; Suppression of free speech and a free press;  Diplomacy, spying and (counter-)intelligence; Ecology, climate, nature and sciences; Corruption, finance, taxes, trading; Censorship technology and internet filtering Cults and other religious organizations; Abuse, violence, violation.

11/28 Cables being reviewed total 251,287 and ONLY 592 have been made public after extensive verification as of 12/1/10. I started my search with the most current by “creation date” in order to spot urgent life threatening data for this report. I reviewed #200+ and have found nothing life threatening. With the US government being for-warned of the data release, I am certain the appropriate defense measures have already been completed.

The Iraq War and other data servers are apparently being used to redirect traffic over flow from the Embassy reports dns because they are bottlenecked while the Embassy dns seems to be transmitting data packets at an acceptable rate. Therefore, I have given up on reviewing the War Log and Diary Dig databases for this report but will follow up on them at a later time.

Interesting reports I have found so far include:

2007-11-03 05:05 (2007 possible missile parts shipped from N. Korea to Iran)

looking for doc ID (Iran neighbors urge US to attack Iran)

looking for doc ID (Sarah E. Shourd, a teacher freed in September after nearly 14 months in Tehran’s Evin prison says the group inadvertently crossed into Iran.)

10DUBAI1 (a majority of reports like this one share intelligence on non UN supported movements. Here you will read that Customs Duty Fees are being waived at RAK airport as of late 2008… I think this is in Dubai. It is allowing companies to ship armored vehicles to Afghan etc. duty free and there is also some questionable Russian activity in the area. Basically just more boring intel on small pieces of a huge puzzle that is the war game.)

10ASHGABAT111 (A cat attempted suicide by running in front of a presidential motorcade and the person in charge of clearing the safety of the route was fired. JUST AN EXAMPLE THAT SOME OF THE REPORTS ARE HARMLESS, not to mention an idiotic waste of time.

10ABUDHABI33 (The US is accused of attacking Yemen civilians.)

ADD YOUR Favorites in the comments section and I will update this section.

What is the most questionable data that is putting government forces in higher risk situations?

There are inventory lists of equipment from 2007 used in Iraq but I can not find them. You can not search by key words so you have to go through all 2007 listings until you find the right heading.

Even if you know what the release date is, the Diary Dig and War Log search sections are struggling to complete their packet transfers even though I am on a 1mb/sec hardwire connection. The reception from French servers is sending bad responses mostly due to high traffic. This is a good time to test the packet transfer with MetaLabs.org tools. I tried multiple providers and locations and get the same server errors.

Will the information jeopardize active duty military?

Countries are always looking for reasons to push US soldiers out of preoccupied territories. This is just one more reason of hundreds for them. Some of our locations are supported by the United Nations and thus have been approved to protect and serve the world’s best interest. But several may not be fully UN supported and thus, need to be vacated.

I am waiting for a list from the UN and will update here soon. If the US is going against the world council, then the US has to be considered a traitor to world peace. Any militant performing hostile acts in an unapproved territory needs to be neutralized and that is the majority of who is jeopardized by WikiLeaks not those who are in UN approved locations protected by the world council. Over 60% (66,000+) of the Iraq casualties of war are civilians! If the war came to your state and 60% of your innocent school children, public servants and friends were trapped in a hostile zone and murdered, wouldn’t you want the rest of the world to read the details?

“WikiLeaks been developing and improving a harm minimization procedure. We do not censor our news, but from time to time we may remove or significantly delay the publication of some identifying details from original documents to protect life and limb of innocent people.” – wikileaks.org/media/about.html (Sec. 1.2 paragraph 2)

Should anyone republishing this information be considered a traitor to the USA?

There is so much information; you have to know what you are looking for to stumble across a potentially treasonous document. I have been reading for days and have yet to find data that is directly putting an active duty person in higher risk in my opinion.

What do you think about the source who trusted WikiLeaks to research and publish the most accurate and least life threatening communication documents? National hero, truth patriot, traitor?

Please consider that he/she made the ultimate sacrifice to defend the Constitution in their best judgment. They show that the human conscience of what is right and true for the better good and greater cause of world peace was more important then their own life and the censoring power of officials down the chain of command. Remember, the USA is based on the government working FOR THE PEOPLE. When all has failed, we have the power of the VOTE. If your politician votes in favor of media censorship and you do not go tie yourself to their door in protest, WE HAVE FAILED.

What are the dates regarding the Embassy documents released?

Cables Range from 1966-Feb. 2010.

When are Secrets of the leaders of the People OK to be kept secret FROM THE PEOPLE?

It would be OK when;

– a secret would outrage the people in masses and cause them to riot against the leadership resulting in chaos. (911; Iraq, Afghan, Bin Ladden, Hussein)

– a pandemic or airborne plaque has to be quarantined

– innocent civilians are trapped in a war zone and have not been extracted

When are Secrets NOT OK?

How about when;

– military soldiers who have volunteered to enter a war zone have been manipulated by the leadership with out time to evacuate/retreat to a stable zone.

What are the best responses to WikiLeaks from Politicians?

Clinton – Secretary of State Hillary Rodham Clinton said that the leaks undermined the international community but that they wouldn’t damage America’s ties.

Who is WikiLeaks and who is it affiliated with?

http://wikileaks.org/media/about.html

NOT related to WikiPedia. “WIKI” is a server SOFTWARE that allows interlinking web pages with continuous page creation. WikiLeaks is a world media organization and collaboration of independent journalists not a profiting corporation. There is no SINGLE founder (but there is one person being credited with the early organization) or one master headquarters.

For more info see WikiLeaks ABOUT section. Here are the highlights:

1.4 How WikiLeaks verifies its news stories

We assess all news stories and test their veracity. We send a submitted document through a very detailed examination a procedure. Is it real? What elements prove it is real? Who would have the motive to fake such a document and why? We use traditional investigative journalism techniques as well as more modern rtechnology-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organisation, and answer a set of other detailed questions about the document. We may also seek external verification of the document For example, for our release of the Collateral Murder video, we sent a team of journalists to Iraq to interview the victims and observers of the helicopter attack. The team obtained copies of hospital records, death certificates, eye witness statements and other corroborating evidence supporting the truth of the story. Our verification process does not mean we will never make a mistake, but so far our method has meant that WikiLeaks has correctly identified the veracity of every document it has published.

2. WikiLeaks’ journalism record

2.1 Prizes and background

WikiLeaks is the winner of:

  • the 2008 Economist Index on Censorship Freedom of Expression award
  • the 2009 Amnesty International human rights reporting award (New Media)

WikiLeaks has a history breaking major stories in major media outlets and robustly protecting sources and press freedoms. We have never revealed a source. We do not censor material. Since formation in 2007, WikiLeaks has been victorious over every legal (and illegal) attack, including those from the Pentagon, the Chinese Public Security Bureau, the Former president of Kenya, the Premier of Bermuda, Scientology, the Catholic & Mormon Church, the largest Swiss private bank, and Russian companies. WikiLeaks has released more classified intelligence documents than the rest of the world press combined.

2.2 Some of the stories we have broken

  • War, killings, torture and detention
  • Government, trade and corporate transparency
  • Suppression of free speech and a free press
  • Diplomacy, spying and (counter-)intelligence
  • Ecology, climate, nature and sciences
  • Corruption, finance, taxes, trading
  • Censorship technology and internet filtering
  • Cults and other religious organizations
  • Abuse, violence, violation

War, killings, torture and detention

  • Changes in Guantanamo Bay SOP manual (2003-2004) – Guantanamo Bay’s main operations manuals
  • Of Orwell, Wikipedia and Guantanamo Bay – In where we track down and expose Guantanamo Bay’s propaganda team
  • Fallujah jail challenges US – Classified U.S. report into appalling prison conditions in Fallujah
  • U.S lost Fallujah’s info war – Classified U.S. intelligence report on the battle of Fallujah, Iraq
  • US Military Equipment in Iraq (2007) – Entire unit by unit equipment list of the U.S army in Iraq
  • Dili investigator called to Canberra as evidence of execution mounts – the Feb 2008 killing of East Timor rebel leader Reinado
  • Como entrenar a escuadrones de la muerte y aplastar revoluciones de El Salvador a Iraq – The U.S. Special Forces manual on how to prop up unpopular government with paramilitaries

Government, trade and corporate transparency

  • Change you can download: a billion in secret Congressional reports – Publication of more than 6500 Congressional Research Reports, worth more than a billion dollars of US tax-funded research, long sought after by NGOs, academics and researchers
  • ACTA trade agreement negotiation lacks transparency – The secret ACTA trade agreement draft, followed by dozens of other publications, presenting the initial leak for the whole ACTA debate happening today
  • Toll Collect Vertraege, 2002 – Publication of around 10.000 pages of a secret contract between the German federal government and the Toll Collect consortium, a private operator group for heavy vehicle tolling system
  • Leaked documents suggest European CAP reform just a whitewash – European farm reform exposed
  • Stasi still in charge of Stasi files – Suppressed 2007 investigation into infiltration of former Stasi into the Stasi files commission
  • IGES Schlussbericht Private Krankenversicherung, 25 Jan 2010 – Hidden report on the economics of the German private health insurance system and its rentability

Suppression of free speech and a free press

  • The Independent: Toxic Shame: Thousands injured in African city, 17 Sep 2009 – Publication of an article originally published in UK newspaper The Independent, but censored from the Independent’s website. WikiLeaks has saved dozens of articles, radio and tv recordings from disappearing after having been censored from BBC, Guardian, and other major news organisations archives.
  • Secret gag on UK Times preventing publication of Minton report into toxic waste dumping, 16 Sep 2009 – Publication of variations of a so-called super-injunction, one of many gag-orders published by WikiLeaks to expose successful attempts to suppress the free press via repressive legal attacks
  • Media suppression order over Turks and Caicos Islands Commission of Inquiry corruption report, 20 Jul 2009 – Exposure of a press gagging order from the Turks and Caicos Islands, related to WikiLeaks exposure of the Commission of Inquiry corruption report
  • Bermuda’s Premier Brown and the BCC bankdraft – Brown went to the Privy council London to censor the press in Bermuda
  • How German intelligence infiltrated Focus magazine – Illegal spying on German journalists

Diplomacy, spying and (counter-)intelligence

  • U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008 – Classified (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. Has been in the worldwide news.
  • CIA report into shoring up Afghan war support in Western Europe, 11 Mar 2010 – This classified CIA analysis from March, outlines possible PR-strategies to shore up public support in Germany and France for a continued war in Afghanistan. Received international news coverage in print, radio and TV.
  • U.S. Embassy profiles on Icelandic PM, Foreign Minister, Ambassador – Publication of personal profiles for briefing documents for U.S. officials visiting Iceland. While lowly classified are interesting for subtle tone and internal facts.
  • Cross-border clashes from Iraq O.K. – Classified documents reveal destabalizing U.S. military rules
  • Tehran Warns US Forces against Chasing Suspects into Iran – Iran warns the United States over classified document on WikiLeaks
  • Inside Somalia and the Union of Islamic Courts – Vital strategy documents in the Somali war and a play for Chinese support

Ecology, climate, nature and sciences

  • Draft Copenhagen climate change agreement, 8 Dec 2009 – Confidential draft “circle of commitment” (rich-country) Copenhagen climate change agreement
  • Draft Copenhagen Accord Dec 18, 2009 – Three page draft Copehagen “accord”, from around Friday 7pm, Dec 18, 2009; includes pen-markings
  • Climatic Research Unit emails, data, models, 1996-2009 – Over 60MB of emails, documents, code and models from the Climatic Research Unit at the University of East Anglia, written between 1996 and 2009 that lead to a worldwide debate
  • The Monju nuclear reactor leak – Three suppressed videos from Japan’s fast breeder reactor Monju revealing the true extent of the 1995 sodium coolant disaster

Corruption, finance, taxes, trading

  • The looting of Kenya under President Moi – $3,000,000,000 presidential corruption exposed; swung the Dec 2007 Kenyan election, long document, be patient
  • Gusmao’s $15m rice deal alarms UN – Rice deal corruption in East Timor
  • How election violence was financed – the embargoed Kenyan Human Rights Commission report into the Jan 2008 killings of over 1,300 Kenyans
  • Financial collapse: Confidential exposure analysis of 205 companies each owing above EUR45M to Icelandic bank Kaupthing, 26 Sep 2008 – Publication of a confidential report that has lead to hundreds of newspaper articles worldwide
  • Barclays Bank gags Guardian over leaked memos detailing offshore tax scam, 16 Mar 2009 – Publication of censored documents revealing a number of elaborate international tax avoidance schemes by the SCM (Structured Capital Markets) division of Barclays
  • Bank Julius Baer: Grand Larceny via Grand Cayman – How the largest private Swiss bank avoids paying tax to the Swiss government
  • Der Fall Moonstone Trust – Cayman Islands Swiss bank trust exposed
  • Over 40 billion euro in 28167 claims made against the Kaupthing Bank, 23 Jan 2010 – List of Kaupthing claimants after Icelandic banking crash
  • Northern Rock vs. WikiLeaks – Northern Rock Bank UK failed legal injunctions over the ¡Ì24,000,000,000 collapse
  • Whistleblower exposes insider trading program at JP Morgan – Legal insider trading in three easy steps, brought to you by JP Morgan and the SEC

Censorship technology and internet filtering

  • Eutelsat suppresses independent Chinese-language TV station NTDTV to satisfy Beijing – French sat provider Eutelsat covertly removed an anti-communist TV channel to satisfy Beijing
  • Internet Censorship in Thailand – The secret internet censorship lists of Thailand’s military junta

Cults and other religious organizations

  • Church of Scientology’s ‘Operating Thetan’ documents leaked online – Scientology’s secret, and highly litigated bibles
  • Censored Legion de Cristo and Regnum Cristi document collection – Censored internal documents from the Catholic sect Legion de Cristo (Legion of Christ)
  • US Department of Labor investigation into Landmark Education, 2006 – 2006 investigative report by the U.S. Department of Labor on Landmark Education

Abuse, violence, violation

  • Report on Shriners raises question of wrongdoing – corruption exposed at 22 U.S. and Canadian children’s hospitals.
  • Claims of molestation resurface for US judo official
  • Texas Catholic hospitals did not follow Catholic ethics, report claims – Catholic hospitals violated catholic ethics

3.2 The importance of principled leaking to journalism, good government and a healthy society

Principled leaking has changed the course of history for the better. It can alter the course of history in the present, and it can lead us to a better future.

Consider Daniel Ellsberg, working within the US government during the Vietnam War. He comes into contact with the Pentagon Papers, a meticulously kept record of military and strategic planning throughout the war. Those papers reveal the depths to which the US government has sunk in deceiving the American people about the war. Yet the public and the media know nothing of this urgent and shocking information. Indeed, secrecy laws are being used to keep the public ignorant of gross dishonesty practised by their own government. In spite of those secrecy laws and at great personal risk, Ellsberg manages to disseminate the Pentagon papers to journalists and to the world. Despite criminal charges against Ellsberg, eventually dropped, the release of the Pentagon Papers shocks the world, exposes the government lying and helps to shorten the war and save thousands of both American and Vietnamese lives.

The power of principled leaking to call governments, corporations and institutions to account is amply demonstrated through recent history. The public scrutiny of otherwise unaccountable and secretive institutions forces them to consider the ethical implications of their actions. Which official will chance a secret, corrupt transaction when the public is likely to find out? What repressive plan will be carried out when it is revealed to the citizenry, not just of its own country, but the world? When the risks of embarrassment and discovery increase, the tables are turned against conspiracy, corruption, exploitation and oppression. Open government answers injustice rather than causing it. Open government exposes and undoes corruption. Open governance is the most effective method of promoting good governance.

Today, with authoritarian governments in power in much of the world, increasing authoritarian tendencies in democratic governments, and increasing amounts of power vested in unaccountable corporations, the need for openness and transparency is greater than ever. WikiLeaks interest is the revelation of the truth. Unlike the covert activities of state intelligence agencies, as a media publisher WikiLeaks relies upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments and corporations to justice.

With its anonymous drop box, WikiLeaks provides an avenue for every government official, every bureaucrat, and every corporate worker, who becomes privy to damning information that their institution wants to hide but the public needs to know. What conscience cannot contain, and institutional secrecy unjustly conceals, WikiLeaks can broadcast to the world. It is telling that a number of government agencies in different countries (and indeed some entire countries) have tried to ban access to WikiLeaks. This is of course a silly response, akin to the ostrich burying its head in the sand. A far better response would be to behave in more ethical ways.

Authoritarian governments, oppressive institutions and corrupt corporations should be subject to the pressure, not merely of international diplomacy, freedom of information laws or even periodic elections, but of something far stronger – the consciences of the people within them.

3.3 Should the press really be free?

In its landmark ruling on the Pentagon Papers, the US Supreme Court ruled that “only a free and unrestrained press can effectively expose deception in government.” We agree.

The ruling stated that “paramount among the responsibilities of a free press is the duty to prevent any part of the government from deceiving the people and sending them off to distant lands to die of foreign fevers and foreign shot and shell.”

It is easy to perceive the connection between publication and the complaints people make about publication. But this generates a perception bias, because it overlooks the vastness of the invisible. It overlooks the unintended consequences of failing to publish and it overlooks all those who are emancipated by a climate of free speech. Such a climate is a motivating force for governments and corporations to act justly. If acting in a just manner is easier than acting in an unjust manner, most actions will be just.

Sufficient principled leaking in tandem with fearless reporting will bring down administrations that rely on concealing reality from their own citizens.

It is increasingly obvious that corporate fraud must be effectively addressed. In the US, employees account for most revelations of fraud, followed by industry regulators, media, auditors and, finally, the SEC. Whistleblowers account for around half of all exposures of fraud.

Corporate corruption comes in many forms. The number of employees and turnover of some corporations exceeds the population and GDP of some nation states. When comparing countries, after observations of population size and GDP, it is usual to compare the system of government, the major power groupings and the civic freedoms available to their populations. Such comparisons can also be illuminating in the case of corporations.

Considering the largest corporations as analogous to a nation state reveals the following properties:

  1. The right to vote does not exist except for share holders (analogous to land owners) and even there voting power is in proportion to ownership.
  2. All power issues from a central committee.
  3. There is no balancing division of power. There is no fourth estate. There are no juries and innocence is not presumed.
  4. Failure to submit to any order may result in instant exile.
  5. There is no freedom of speech.
  6. There is no right of association. Even romance between men and women is often forbidden without approval.
  7. The economy is centrally planned.
  8. There is pervasive surveillance of movement and electronic communication.
  9. The society is heavily regulated, to the degree many employees are told when, where and how many times a day they can go to the toilet.
  10. There is little transparency and something like the Freedom of Information Act is unimaginable.
  11. Internal opposition groups, such as unions, are blackbanned, surveilled and/or marginalized whenever and wherever possible.

While having a GDP and population comparable to Belgium, Denmark or New Zealand, many of these multi-national corporations have nothing like their quality of civic freedoms and protections. This is even more striking when the regional civic laws the company operates under are weak (such as in West Papua, many African states or even South Korea); there, the character of these corporate tyrannies is unregulated by their civilizing surroundings.

Through governmental corruption, political influence, or manipulation of the judicial system, abusive corporations are able to gain control over the defining element of government the sole right to deploy coercive force.

Just like a country, a corrupt or unethical corporation is a menace to all inside and outside it. Corporations will behave more ethically if the world is watching closely. WikiLeaks has exposed unethical plans and behaviour in corporations and this as resulted in recompense or other forms of justice forms of justice for victims.

3.4 Could oppressive regimes potentially come to face legal consequences as a result of evidence posted on WikiLeaks?

The laws and immunities that are applied in national and international courts, committees and other legal institutions vary, and we can’t comment on them in particular. The probative value of documents posted on WikiLeaks in a court of law is a question for courts to decide.

While a secure chain of custody cannot be established for anonymous leaks, these leaks can lead to successful court cases. In many cases, it is easier for journalists or investigators to confirm the existence of a known document through official channels (such as an FOI law or legal discovery) than it is to find this information when starting from nothing. Having the title, author or relevant page numbers of an important document can accelerate an investigation, even if the content itself has not been confirmed. In this way, even unverified information is an enabling jump-off point for media, civil society or official investigations. Principled leaking has been shown to contribute to bringing justice to victims via the court system.

Conclusion:

My opinion is that hardly any of these cables would even matter if our troops were brought home like they should be. The only US personnel that should be stationed in countries not sharing a border with mainland US are peace embassy’s recognized by the United Nations and their direct security staff. I’m sure there are a few other reasons I would agree with but not thinking of at the moment.

We should not have any military bases beyond our nation’s waters and all countries having disputes across the oceans from us should be left alone to settle their own disputes. Safety and terrorist prevention in areas like Afghan, Iran, Iraq and other Taliban centers are not as important as our military and public is trained to believe.

It is the 21st century and with the nuclear weapons the US controls, no country is going to attack us. We have achieved complete national security and it is time to bring our forces home to improve the problems on our own soil. Don’t site 911 in dispute either. An attack like that was almost 10 years ago and even then it could not have happened without traitors in our own ranks. It was all about the oil and homeland security expansion and you know it!

<!–[if !mso]> <! st1\:*{behavior:url(#ieooui) } –>

 

See Section 2.2 for a detailed summary of the PRE 11/28 documents with a list of the headlines. Topics include: War, killings, torture, detention facts; Government, trade and corporate transparency; Suppression of free speech and a free press;  Diplomacy, spying and (counter-)intelligence; Ecology, climate, nature and sciences; Corruption, finance, taxes, trading; Censorship technology and internet filtering Cults and other religious organizations; Abuse, violence, violation.

11/28 Cables being reviewed total 251,287 and ONLY 592 have been made public after extensive verification as of 12/1/10. I started my search with the most current by “creation date” in order to spot urgent life threatening data for this report. I reviewed #200+ and have found nothing life threatening. With the US government being for-warned of the data release, I am certain the appropriate defense measures have already been completed.

The Iraq War and other data servers are apparently being used to redirect traffic over flow from the Embassy reports dns because they are bottlenecked while the Embassy dns seems to be transmitting data packets at an acceptable rate. Therefore, I have given up on reviewing the War Log and Diary Dig databases for this report but will follow up on them at a later time.

Advertisements
Comments
  1. Middle Man says:

    I don’t understand all the fuss. The leaks merely serve as a justification of foreign US foreign policy. i am farely sure that the outraged knew full well how they were thought of in the privacy of the White House and embassies:

    http://caughtinthemiddleman.wordpress.com/2010/12/01/conspiracy/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s