Thursday, December 30, 2010

20 SEO Terms You Should Know

If you have a website or blog, or if you work with anything related to the Internet, you'll certainly need to know a bit about search engine optimization (SEO). A good way to get started is to familiarize yourself with the most common terms of the trade, and below you'll find 20 of them. (For those who already know SEO, consider this post as a refresher!).

1. SEM: Stands for Search Engine Marketing, and as the name implies it involves marketing services or products via search engines. SEM is divided into two main pillars: SEO and PPC. SEO stands for Search Engine Optimization, and it is the practice of optimizing websites to make their pages appear in the organic search results. PPC stands for Pay-Per-Click, and it is the practice of purchasing clicks from search engines. The clicks come from sponsored listings in the search results.
2. Backlink: Also called inlink or simply link, it is an hyperlink on another website pointing back to your own website. Backlinks are important for SEO because they affect directly the PageRank of any web page, influencing its search rankings.
3. PageRank: PageRank is an algorithm that Google uses to estimate the relative important of pages around the web. The basic idea behind the algorithm is the fact that a link from page A to page B can be seen as a vote of trust from page A to page B. The higher the number of links (weighted to their value) to a page, therefore, the higher the probability that such page is important.
4. Linkbait: A linkbait is a piece of web content published on a website or blog with the goal of attracting as many backlinks as possible (in order to improve one's search rankings). Usually it's a written piece, but it can also be a video, a picture, a quiz or anything else. A classic example of linkbait are the "Top 10″ lists that tend to become popular on social bookmarking sites.
5. Link farm. A link farm is a group of websites where every website links to every other website, with the purpose of artificially increasing the PageRank of all the sites in the farm. This practice was effective in the early days of search engines, but today they are seeing as a spamming technique (and thus can get you penalized).
6. Anchor text: The anchor text of a backlink is the text that is clickable on the web page. Having keyword rich anchor texts help with SEO because Google will associate these keywords with the content of your website. If you have a weight loss blog, for instance, it would help your search rankings if some of your backlinks had "weight loss" as their anchor texts.
7. NoFollow: The nofollow is a link attribute used by website owners to signal to Google that they don't endorse the website they are linking to. This can happen either when the link is created by the users themselves (e.g., blog comments), or when the link was paid for (e.g., sponsors and advertisers). When Google sees the nofollow attribute it will basically not count that link for the PageRank and search algorithms.
8. Link Sculpting: By using the nofollow attribute strategically webmasters were able to channel the flow of PageRank within their websites, thus increasing the search rankings of desired pages. This practice is no longer effective as Google recently change how it handles the nofollow attribute.
9. Title Tag: The title tag is literally the title of a web page, and it's one of the most important factors inside Google's search algorithm. Ideally your title tag should be unique and contain the main keywords of your page. You can see the title tag of any web page on top of the browser while navigating it.
10. Meta Tags: Like the title tag, meta tags are used to give search engines more information regarding the content of your pages. The meta tags are placed inside the HEAD section of your HTML code, and thus are not visible to human visitors.
11. Search Algorithm: Google's search algorithm is used to find the most relevant web pages for any search query. The algorithm considers over 200 factors (according to Google itself), including the PageRank value, the title tag, the meta tags, the content of the website, the age of the domain and so on.
12. SERP: Stands for Search Engine Results Page. It's basically the page you'll get when you search for a specific keyword on Google or on other search engines. The amount of search traffic your website will receive depends on the rankings it will have inside the SERPs.
13. Sandbox: Google basically has a separate index, the sandbox, where it places all newly discovered websites. When websites are on the sandbox, they won't appear in the search results for normal search queries. Once Google verifies that the website is legitimate, it will move it out of the sandbox and into the main index.
14. Keyword Density: To find the keyword density of any particular page you just need to divide the number of times that keyword is used by the total number of words in the page. Keyword density used to be an important SEO factor, as the early algorithms placed a heavy emphasis on it. This is not the case anymore.
15. Keyword Stuffing: Since keyword density was an important factor on the early search algorithms, webmasters started to game the system by artificially inflating the keyword density inside their websites. This is called keyword stuffing. These days this practice won't help you, and it can also get you penalized.
16. Cloaking. This technique involves making the same web page show different content to search engines and to human visitors. The purpose is to get the page ranked for specific keywords, and then use the incoming traffic to promote unrelated products or services. This practice is considering spamming and can get you penalized (if not banned) on most search engines.
17. Web Crawler: Also called search bot or spider, it's a computer program that browses the web on behalf of search engines, trying to discover new links and new pages. This is the first step on the indexation process.
18. Duplicate Content: Duplicate content generally refers to substantive blocks of content within or across domains that either completely match other content or are appreciably similar. You should avoid having duplicate content on your website because it can get you penalized.
19. Canonical URL: Canonicalization is a process for converting data that has more than one possible representation into a "standard" canonical representation. A canonical URL, therefore, is the standard URL for accessing a specific page within your website. For instance, the canonical version of your domain might be instead of
20. Robots.txt: This is nothing more than a file, placed in the root of the domain, that is used to inform search bots about the structure of the website. For instance, via the robots.txt file it's possible to block specific search robots and to restrict the access to specific folders of section inside the website.

Tuesday, December 28, 2010

Are social Bookmarking sites Dying?

A couple of weeks ago Technorati released the State of The Blogosphere 2010, and one part of their report that caught my attention was the traffic sources breakdown.

The report illustrated that bloggers are getting social media traffic from two websites mainly: Facebook and Twitter. All the others have been dwarfed, as you can see in the image below.

Some years ago getting in the front page of Digg, StumbleUpon or Delicious was the dream of any website owner, but it looks like that is not the case anymore. Facebook and Twitter are the only options right now.

And there is even more evidence to confirm this trend. Digg launched a new version some months ago, and it pretty much collapsed ever since. Its loyal users abandoned the ship claiming that the new version completely changed the dynamic of the site, and traffic is going down hill. I remember that a couple of years ago the top stories would get as much as 3,000 diggs, and now they get 200 or 300.

What about Delicious? It was one of the first social bookmarking sites, and it was tremendously useful, with a huge number of users who loved the service. Last week Yahoo! (the company who bought the site back in 2005) announced that they will either be closing Delicious down or selling it to someone.

I haven’t seen any news about StumbleUpon, but I don’t think it is going that well either. I used to get a lot of traffic from it on most of my websites, and that is all gone. Most of my webmaster friends are seeing the same pattern, so people seem not to be stumbling that much anymore.

All this background information to ask the following questions: Are social bookmarking sites dying? If so, why did this happen? The idea of bookmarking web pages socially seemed like a solid one, and if you ever used it you certainly saw the benefits. Despite that users are moving on to new and different things. What do you think?

Monday, December 27, 2010

7 Major Ways We're Digitizing Our World, And 3 Reasons We Still Want Hardcopies

The digitization of our world has been a forward march for years now; still, it might be surprising to step back and look at how physical copies of our stuff have changed into something else entirely. And even more surprising might be to go beyond the debate of the level of pleasantness of reading a paperback book versus an e-book on a Kindle and look at how digitizing everything might save space and shrink the environmental footprint of everything we produce, but also put the longevity of our information at risk.

7 Ways We've Digitized Our World

1. Books to e-BooksOf course this is at the top of the list. Statistics show that 1 in 10 Americans own an e-reader, and those who do own one tend to read more books than those without. And there's also the fact that schools are testing out how devices like iPads can be used in classrooms instead of textbooks and hand-outs. Our books are without a doubt headed toward a greater digital presence, though printed books don't seem to be slowing any time soon.

2. DVDs to Streamed Movies and TelevisionWe thought DVDs were such a huge technological advancement over VHSs, and yet here are DVDs being shown up by streaming movies and television shows online. While Netflix still does a hefty business shipping DVDs around the country, many people seem to have taken to streaming their movies, watching what they want instantly. In fact, movie studios and television networks are also keen to allow people to stream content, rather than waiting for physical copies to be released and shipped out.

3. CDs to MP3s This one is fairly old hat. CDs have been replaced by MP3s on a large scale. It seems most people download their music to play on their phones or MP3 players, rather than stack up a massive collection of disks, and those who still have their collection of disks are also putting them on their computers so they can access them in that way as well. Turning music into media files rather than actual records seems to be the norm.

4. Road Maps to GPSWhen was the last time you bought a Rand McNally? It's now easy to get our hands on a GPS device like Garmin or TomTom, or simply use navigation features on iPhones and smart phones. Or we can hop online to get Google directions anywhere, rather than pouring over a map to find the best way to get from point A to point B. All our maps can now be accessed through computers and phones with rapidly updated information, rather than paper maps that are quickly outdated.

5. Photos to FlickrThe latest statistic we came across is that some 2.5 billion photos are uploaded to Facebook each and every month. And Flickr is the huge sensation for photosharing on the web. Our modern cameras from DSLRs to point-n-shoots to camera phones have made it easy to keep our images in digital format, and printing has changed to something left only for art or special occasions, rather than a must-do every time a roll of film is developed and you want to show a family vacation to friends. It'd be interesting to find out what fraction of our photos today actually ever even make it to printed form.

6. Snail Mail to e-MailOh we still see the junk mail pouring in, but for the most part, snail mail has transitioned to a digital format. Most companies offer some form of online billing so customers never have to see a paper bill, and we can even access our catalogs online rather than getting them in our mailboxes. From business correspondence to letters among friends, most of our daily mail is now found on our computers.

7. Magazines, Newspapers & Journals to Online Article DatabasesHardcopies of magazines and journals are still quite popular, though digital versions are being produced at a faster pace, especially after the advent of the iPad. Newspapers are quickly dying, though, because most of us now read our news on websites, scrolling through our RSS feeds, scanning our favorite news sources, or clicking articles shared on sites from Digg to Yahoo to Google.

3 Problems Of Turning from Atoms to Bits

1. Digital information can go up in smoke
Think of when you lost your entire term paper because your hard drive crashed. Remember how that felt? Now imagine that, only instead of a term paper, it's every episode of a daily podcast aired over the last five years. Every single episode gone forever. That's part of the danger of our digitized world -- we don't know how to store things for safe keeping hundreds of years into the future. And without stable hardcopies, everything that has been "born digital" is at risk. This is pointed out in a somewhat hair-raising report called "The State of Recorded Sound Preservation in the United States: A National Legacy at Risk in the Digital Age".

From the BBC:

[The report] reiterates the long-established fact that many digital media such as recordable CDs have a lifetime significantly shorter than earlier technologies. But it also raises the point that some media are not being captured at all.

"We're finding that some of the older media like shellac discs and vinyl discs are quite stable, and if stored in reasonably good conditions will last another hundred or two hundred years," said Sam Brylawski, co-author of the report.

"'Born digital' audio - things that are disseminated on the internet through websites or podcasts - are at great risk. We need to be able to have a process to harvest them and sustain the files," he told BBC News.
Preserving our digitized versions of everything from photos to music to movies and books is of vital importance. What was once the fear of a fire breaking out at a library is now the fear of hard drives going up in smoke. Even more information than what can be stored in an entire building can be stored in a couple solid state drives. It goes to show that we're always at risk of losing recorded knowledge and art, no matter what its form.

2. Information hoarding is a time suck.

Having everything be just a mouse-click away is really helpful -- but it can also be a big drain on our bodies and our time. We have access to endless news articles, videos, books and blog entries, and it's tempting to want to absorb as much as possible during a day. You want to be hip, worldly, well-informed and that's great. But what about forgetting all the incoming data and just going outside for a walk -- without GPS telling you at which corner to turn, or the latest song from Katy Perry playing on your iPod. All this information available on one laptop has a way of slurping up whole days before you notice it's night time again and you still have 6,478 articles you want to bookmark before you close your browser. Instant info can make us a whole new breed of hoarder.

The difference between information hoarding and the regular kind is that information hoarding has the potential to be invisible. No one knows how much unlistened-to music, unread material or unwatched movies you have stored on your hard drive, unless your habit has grown so out of control that you're one of those people with a network-attached home RAID array.

What's more, nothing in the internet economy, which revolves solely around the ability of people like me to waste the time of people like you, has any stop signs or warning labels affixed to it. Who could possibly argue with being more knowledgeable, more connected, more informed?

Yep -- it's one thing to bring home books until your house can't hold anymore and you have to stop, but there's no real space limitations when it comes to e-books. And owning a Kindle doesn't mean you magically read faster. All our non-stuff can sometimes be worse than our "real" stuff.

3. It's not necessarily better for the environmentDigitization is usually hailed as a boon for the environment. No more felled trees for books!! But that's not necessarily the case. The digitized versions of our stuff still comes at a physical cost. The actual device that is used to access it and the resources it takes to manufacture, ship, and run that device. As well as the physical cost to ourselves. For example, we might not have to use any paper, ink or chemicals to print photos but uploading them to Facebook contributes to the company's over $1 million per month electricity bill and boost the need for it to build yet another data center. It still takes a lot of electronics to make and run the information we keep in digital format.

While e-books are great for replacing paper books, the most recent calculations estimate that people need to read at least 100 books a year on their e-readers to break even with books on environmental impact. And there's of course the end-of-life issue of the device -- it's a lot more difficult to recycle an e-reader than a paper book.

Another example is our ability to get our news online. It's great that we don't need to have paper versions trucked to delivery outlets and driven to our homes every morning, numbers show that the environmental impact is even if you read online for less than 30 minutes a day. After that, factors like what kind of electricity is powering your computer come into important play.

Digitization doesn't mean making the physical impact of media and information disappear. It just changes it. It definitely has the potential to lessen the environmental damage our obsession with "stuff" has on the planet -- if you own 1,000 digital songs or 10,000 digital songs, the impact isn't that different -- but right now those benefits are still hairy primarily because of electricity and e-waste.

Source |

Wednesday, December 22, 2010

Global Windows Shortcuts

Mastering the keyboard will not only increase your navigation speed but it can also help with wrist fatigue. Here are some lesser known Windows shortcuts to help you become a keyboard ninja.

Win+1, 2, 3, 4, etc. will launch each program in your taskbar. It is helpful then to keep your most used programs at the beginning of your task bar so you can open them one right after another. This also works in Windows Vista for the quick launch icons.

Win+Alt+1, 2, 3, etc. will open the jump list for each program in the taskbar. You can then use your arrows to select which jump list option you want to open.

Win+T will cycle through taskbar programs. This is similar to just hovering over the item with your mouse but you can launch the program with Space or Enter.

Win+Home minimizes all programs except current the window.

Win+B selects the system tray which isnt always useful but can come in very handy if your mouse stops working.

Win+Up/Down maximizes and restores down the current window so long as that window has the option to be maximized. It is exactly the same as clicking on the middle button on your windows.

Alt+Esc is like Alt+Tab but switches windows in the order they were opened and does not have the fancy window preview overlay.

Win+Pause/Break will open your system properties window. This can be helpful if you need to see the name of a computer or simple system statistics.

Ctrl+Esc can be used to open the start menu but will not work as a Windows key replacement for other shortcuts.

Ctrl+Shift+Esc will open the task manager without needing to hit Ctrl+Alt+Del first.

Alt+Space will open the window system menu which can be used to maximize (x), minimize (n), close (c), or move (m) the window which can be especially helpful if your window is somehow off-screen. This shortcut can also be helpful with windows that dont close with the Alt+F4 shortcut such as the command window.

Windows Explorer Shortcuts

Here are handy shortcuts built into Windows Explorer which may have similar features in other programs too.

Alt+Up will navigate up one folder level since the up arrow on the menu bar was removed in Windows Vista.

Shift+F10 opens the contextual or œright click menu for a file/folder. This can be very handy for speed especially if you know which option you want to select. Look for an underlined letter in each option to know which letter you can press for faster access.

Shift+Del deletes a file without sending it to the recycle bin because who wants to empty their recycle bin anyway?

Ctrl+Shift+N creates a new folder in your current directory.

Alt+Enter opens the file properties so you can view file size, sharing settings, and creation date.

F2 renames a file or folder.

F3 will open explorer and select the search bar. If you already have an explorer window open it will highlight the search bar. In some programs it will also open the search dialog to search within that program.

F6 cycles objects in the current window. In explorer this will cycle between the location bar, options bar, left pane, and right pane. It also works with varying success in other programs.

F10 toggles the file menu in explorer.

Monday, December 20, 2010

Cloud Computing - a new buzz

These days we are hearing about cloud computing a lot, though this phrase has been in discussion for a decade now. This is the most talked phrase being used recently, after the 'Web2.0' hype. I am trying to peep into the basic idea of this hardcore buzz and to know what it is all about. After exploring few articles I got amazed that unknowingly I have been using 'cloud computing' as some of the web services since a long.

Cloud computing is a latest buzz all around with respect to web technologies and services. As web 2.0, this phrase is also being defined differently but the basic idea is almost same. In which users are getting web services on free or priced manner from service providers located at remote places.

Cloud computing seems to be a new phrase but looking into the concept, we all have been using it since quite a long., e.g. email services of yahoo, google, sify or others, YouTube and, Google Docs etc. are embedded with the 'cloud computing'. These services are free and we have also been putting important information on our email IDs, youtube, flicker, and now few social networks (facebook etc.) where we have been sharing or shifting our personal information or data in different formats on the web. All these servers holding our information on the web can be metaphorically treated as clouds.

The ideal crux is, when we are directly or indirectly shifting our personal or organizational data on the servers which offer their services (web services, infrastructural services or application's platform) free of cost or on payment, is called 'cloud computing'. In simple terms, our data which has stored over the Internet (virtual place) and can be accessible 24x7.

Areas of Cloud Computing:
Cloud computing is again still searching for an established definition but as of now it means using web services of others to satisfy users' computing needs, like – software applications, data storage and using different platforms to build needed applications. On basis of this cloud computing can broadly be divided in following three segments:

 Software as a Service (SaaS): In this application or software is given as service to users, who can access the required programme online. For example email and few other services offered by Google, Hotmail, Yahoo, Sify, Skype etc.

Platform as a Service (PaaS): To run required service a special platform or application infrastructure is also being provided to the clients where clients can build their web based applications. Client does not require to know programming language, database management systems, etc. to run applications. Windows Azure, Google App Engine and can be few of good examples of PaaS.

 Infrastructure as a Service (IaaS): In IaaS, clients are being offered with storage, networking and processing of data. Amazon's Elastic Compute Cloud (EC2) or Simple Storage Service (S3), VMWare vCloud are some of its examples.
Inspite of using cutting edge technologies in 'cloud computing', still we are in debate of its use in our official systems. Therefore, following pros and cons have been observed which may broadly be focused upon.

  • All time accessibility of data. 
  • Technical problems related to storage and accessibility can be taken care by the providers. 
  • No need of procuring high capacity storage server.
  • User does not have to download and install any update on his/her desktop.
  • User does not have to be master of the applications used in 'cloud computing'
  • Security of data is the major concerned.
  • Need high capacity bandwidth while accessing subscribed services.
  • You can lose control on your information or data.
  • What happen when stored data get lost?
Use of cloud computing is depend on person to person and organization to organization. Storing personal data or information on other's servers may not going to effect anyone else except you but where shifting or storing organizational data on other servers may effect everyone associated with that organization. Library is a service oriented system, which need high speed IN and OUT processing of data. It is good when data from these web based clouds is accessible to users but what will happen when we see any cloud burst?

Now question arises, how do we use and where we use 'cloud computing' in libraries, we would discuss the same in our next post.

Thursday, December 16, 2010

7 Web Apps For Effective Execs

They do not need to be installed on your computer, but Web apps can help you work smarter in ways you never imagined.
They have been around for a while now, delivering a lot of value, but seldom getting the kind of recognition they deserve. They can run on almost any computer, require no installation space on your hard disk and can be accessed from just about any system, as long as you have your username and password handy. We are talking about Web applications, or Web apps as it is fashionable to call them these days — those applications that work within your browser just like others do on your desktop.
A few years ago, such applications were painfully limited and let you do little more than the most basic tasks. For instance, online storage sites would let you store information online, but sharing it with others was often a messy experience, involving either handing out your username or password or running the risk of the other person seeing all the information you had stored online rather than just the bits that you wished them to access. Bandwidth was a major issue, slowing down their performance. In fact, the most popular Web apps used to be casual games that could be played within a browser!
Things are very different now. Thanks to better bandwidth and of course, the inevitable progress of techology, Web apps have now reached a stage where a company like Google has started a whole online store dedicated to Web apps that run on its Chrome browser (the Chrome Web Store). And while games continue to be as popular as ever, there are now a formidable array of productivity-oriented Web apps that let you do your work from just about any computer that has a Web browser and internet connectivity.
And here are seven of the best for the hardworking and connected executive:

Google Docs
MS Office is by far the most-used software (after browsers and e-mail clients) in professional circles. And it is a tribute to just how good Google's online office suite, Google Docs, is that many consider it to be on a par with the Microsoft behemoth, with excellent sharing options thrown in. Google Docs lets you edit and create documents, spreadsheets, presentations and drawings from within your browser, its plain interface hiding just about every editing option most executives would need from tables to word counts to showing revisions. And it supports MS Office formats too, so you can actually open an MS Office document in it, edit it and save it. Best of all, you can not only share your documents with colleagues, but also work in them in real time, seeing the changes each of you is making, irrespective of your geographical location. Top that off with the fact that you can view the files you have saved on Google Docs on just about any smartphone and you can see why we consider this to be one of the best productivity Web apps around.
Access it from:

E-mail might have made communication a whole lot easier, but anyone who has used it to coordinate a team effort will tell you that following different threads and knowing whom to mark in and out among the recipients can be a bit of a nightmare. Basecamp, an online app dedicated to better project coordination, makes it much easier. You can leave notes to specific team members, send messages, share information, use readymade templates, assign tasks and responsibilities in a much more organised way by using this online tool. There are also a number of add-ons ranging from burndown charts to timelines to help things along. No, it is not free and comes for $49 a month, but the fact that it works smoothly on just about any system makes it invaluable for teams working on projects.
Access it from:

30 Boxes
It has been around for a while now and in spite of competition from the likes of Google Calendar, the quaintly-named 30 Boxes remains by far one of easiest and most powerful online calendar apps to use. You can mark out events, have groups of events, share them with your friends, search for specific entries, add them to your blog, place them on a map and do a whole host of other things, all through an incredibly simple and zippy interface that has you making notes and entries in boxes that represent each day. Almost as easy as scribbling on a real calendar.
Access it from:

Remember the Milk
"Never forget the milk (or anything else) again" promises this Web app and it sure delivers. Although basically a to-do list app that lets you record the tasks you need to do in the coming days, Remember the Milk throws in some very handy features and a simple interface that make it stand out. Not only can you set out tasks (you can even add them by sending an email), but you can also select how you wish to be reminded of them — by SMS, mail or even, for chat addicts, on IM. You can make as many task lists as you wish, plot them on a map and share them with contacts.
Access it from:

Hardcore designers might need heavy duty tools like PhotoShop, but if you are the type that needs an app that will let you do most basic imagetweaking with minimum fuss (read "no downloading heavy software"), and a little more besides, then Aviary's online suite of tools is an excellent option. It has a powerful online image-editing tool with colour, vectors and effects editors thrown in, and even a music editing app thrown in, making it far more versatile than Adobe's own online version of Photoshop. Just make sure you have a good internet connection as some of the apps take time to load within the browser.
Access it from:

This simple and yet very effective Web app makes Web conferencing and screen sharing an effortless task. Users do not need to download anything — all they need to do is go to a link, and enter a PIN to be able to see what is on your computer screen, be it a spreadsheet, database or presentation. You can even share keyboard and mouse control, so an attendee can actually highlight a point they need to understand better, and there is a very decent global audio conferencing system integrated into the app for those times when you need to talk as well. Again, it is not free (rates start from $8 per day to $79 for a year), but a terrific tool for those into Web conferencing.
Access it from:

280 Slides
Yes, we know that Google Docs has a very decent presentation tool in it, but if you are the type who really loves the "power" in Power-Point, then we would recommend trying out 280 slides, which has a formidable array of options up its sleeve, with a slick interface to boot. You can import existing presentations into it and edit them as well as create new ones, complete with videos and pictures, and use some very stylish online themes too. Of course, you can mail your presentation, download it in PowerPoint 2007 format (alas, the new version is not supported...yet) and even put it on your website with minimum fuss. A very easy to use and powerful presentation tool.

Access it from:

In most cases, you do not need to install anything on your computer's hard drive. This is particularly useful if you're working on a restricted computer (where app installation is barred) or one with guest user access
You can access the apps from most computers that have a Web browser and a stable internet connection
You can access the information saved on them from anywhere — no need to carry your data around on a notebook or portable storage
Many of them are free, and most cost a lot lesser than their desktop counterparts

Most Web apps need a brisk Internet connection to work at their best. So if you have anything less than a decent broadband connection, do not think of using them.
While most Web apps claim to be secure, the fact that you are working online does expose you to a certain number of security threats that you would not face in the case of installed apps. So do be careful with your usernames and passwords, as your data is not on your computer but out there on the Web.
Classically, a Web app should be able to run within just about any browser, but a number of Web apps of late tend to run better in some browsers than others and some even require you to install plug-ins to get the most out of them, thus negating the "access-fromanywhere" benefit.

Monday, December 13, 2010

National Workshop on “Prioritizing areas of Operational Research in Newborn, Maternal and Child Health"

nchrc, “Prioritizing areas of Operational Research in Maternal, Newborn & Child Health”
National Workshop jointly moderated by Indian Council of Medical Research and National Child Health Resource Centre (unit of NIHFW)

Supported by NIPI Secretariat

Operational Research:
Operational research (OR), a sub thematic area of health research is defined as “the use of systematic research techniques for program decision making to achieve a specific outcome”, or as “a process which can provide scientifically credible and valuable information to answer specific questions and significantly improve the quality and effectiveness of programs.”

It provides policymakers and managers with evidence that they can use to improve program operations. Characteristics of Operational Research that makes it different from other research approaches include addressing:

• specific problems and not general health issues,
• programmatic concerns that are under the control of managers such as service delivery, training, managerial issues, and
• use of systematic qualitative and quantitative data for generating evidence.

Close collaboration needs to exist between managers and researchers at each stage of research from identification of research problem, development of study methodology, conducting research, analysis of data to interpretation of results. Operational research is considered successful only if evidence generated is used to make program decisions.

Operational Research in the context of Norway India Partnership Initiative (NIPI):

NIPI Operations Research Committee which is chaired by the Additional Secretary & Mission Director NRHM, Government of India and Co Chaired by Indian Council of Medical Research (ICMR) has the mandate of identifying essential Research which can contribute to improved quality of Neonatal and Child health care services in India in general and in the NIPI supported States in particular. It also assesses Proposals for Studies, Evaluations, Research and Surveys, and provide standards for their implementation.

In accordance with the decisions taken at the 9th Joint Steering Committee (JSC), the Operations Research Committee (ORC) has been reconstituted and the Operations Research component has been handed over to the NIPI Secretariat. Since the 9th JSC, two meetings of the reconstituted ORC have been held in the months of July and August 2010.

In the 1st meeting of the ORC (1 July 2010), a decision was taken to have a sub-committee of the Operations Research Committee with Indian Council of Medical Research (ICMR) as the Chair. The mandate of the sub-committee is to finalize the research agenda, review research proposals under operations research before sharing these with all the ORC members for final approval.

The Operations Research Sub Committee has identified a long list of research topics in the domains of child and related maternal health. In order to finalize the research topics keeping in mind the research priorities of key stakeholders, this national consultative workshop is being organized involving representatives from the State, and District levels, relevant research organizations and Medical colleges.

Friday, December 10, 2010

WWF file format: it is like a PDF that is impossible to print

Have you ever received a PDF in your email, only to find yourself weeping moments later after accidentally printing 349 copies and murdering six or seven endangered trees in the Panamanian rain forest? It's more serious of a problem than you may realize. In order to solve spontaneous bouts of Accident Print Syndrome, the World Wide Fund For Nature has created the WWF file format. We'll let the entity itself explain:

The WWF format is a PDF that cannot be printed out. It's a simple way to avoid unnecessary printing. So here's your chance to save trees and help the environment. Decide for yourself which documents don't need printing out – then simply save them as WWF.

The WWF format is a PDF that cannot be printed out. It’s a simple way to avoid unnecessary printing. So here’s your chance to save trees and help the environment. Decide for yourself which documents don't need printing out – then simply save them as WWF.


For now, it's only readable on a Mac, which means that WWF files also cannot be printed from a PC. We're envisioning a world of college professors using these to prevent printable study guides, but so as long as hackers also exist in that same universe, those who prefer their documents on paper -- and HP's ink department -- will probably figure out their own road to nirvana. Must to the dismay of Ma Earth, of course.

Monday, December 6, 2010


WikiLeaks is an international new media non-profit organization that publishes submissions of otherwise unavailable documents from anonymous news sources and leaks. Its website, launched in 2006, is run by The Sunshine Press. Within a year of its launch, the site claimed a database that had grown to more than 1.2 million documents. The organization has described itself as having been founded by Chinese dissidents, as well as journalists, mathematicians, and start-up company technologists from the United States, Taiwan, Europe, Australia, and South Africa. The Guardian newspaper describes Julian Assange, an Australian Internet activist, as its director.

WikiLeaks has won a number of awards, including the 2008 Economist magazine New Media Award. In June 2009, WikiLeaks and Julian Assange won Amnesty International's UK Media Award (in the category "New Media") for the 2008 publication of "Kenya: The Cry of Blood – Extra Judicial Killings and Disappearances", a report by the Kenya National Commission on Human Rights about police killings in Kenya. In May 2010, the New York Daily News listed WikiLeaks first in a ranking of "websites that could totally change the news".

In April 2010, WikiLeaks posted video from a 2007 incident in which Iraqi civilians and journalists were killed by U.S. forces, on a website called Collateral Murder. In July of the same year, WikiLeaks released Afghan War Diary, a compilation of more than 76,900 documents about the War in Afghanistan not previously available for public review. In October, the group released a package of almost 400,000 documents called the Iraq War Logs in coordination with major commercial media organisations. In November 2010, Wikileaks began releasing U.S. State department diplomatic cables.WikiLeaks was launched as a user-editable wiki site and still uses MediaWiki as the content management system, but has progressively moved towards a more traditional publication model, and no longer accepts either user comments or edits. The site is available on multiple online servers and different domain names following a number of denial-of-service attacks and its severance from different Domain Name System (DNS) providers.


Julian Assange, the main spokesperson for WikiLeaks
The WikiLeaks website first appeared on the Internet in December 2006. The site claims to have been "founded by Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa". The creators of WikiLeaks have not been formally identified. It has been represented in public since January 2007 by Julian Assange and others. Assange describes himself as a member of WikiLeaks' advisory board. News reports in The Australian have called Assange the "founder of WikiLeaks". According to Wired magazine, a volunteer said that Assange described himself in a private conversation as "the heart and soul of this organization, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest". As of June 2009[update], the site had over 1,200 registered volunteers and listed an advisory board comprising Assange, Phillip Adams, Wang Dan, C. J. Hinke, Ben Laurie, Tashi Namgyal Khamsitsang, Xiao Qiang, Chico Whitaker and Wang Youcai. Despite appearing on the list, when contacted by Mother Jones magazine in 2010, Khamsitsang said that while he received an e-mail from WikiLeaks, he had never agreed to be an advisor.

WikiLeaks states that its "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behavior in their governments and corporations."

In January 2007, the website stated that it had over 1.2 million leaked documents that it was preparing to publish. An article in The New Yorker said: One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments' information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site's foundation, and Assange was able to say, "[w]e have received over one million documents from thirteen countries."
Assange responded to the suggestion that eavesdropping on Chinese hackers played a crucial part in the early days of WikiLeaks by saying "the imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts were involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us)". The group has subsequently released a number of other significant documents which have become front-page news items, ranging from documentation of equipment expenditures and holdings in the Afghanistan war to corruption in Kenya.

The organization's stated goal is to ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents, as happened to Chinese journalist Shi Tao, who was sentenced to 10 years in 2005 after publicising an email from Chinese officials about the anniversary of the Tiananmen Square massacre.

The project has drawn comparisons to Daniel Ellsberg's leaking of the Pentagon Papers in 1971. In the United States, the leaking of some documents may be legally protected. The U.S. Supreme Court has ruled that the Constitution guarantees anonymity, at least in the area of political discourse.[30] Author and journalist Whitley Strieber has spoken about the benefits of the WikiLeaks project, noting that "Leaking a government document can mean jail, but jail sentences for this can be fairly short. However, there are many places where it means long incarceration or even death, such as China and parts of Africa and the Middle East."

On 24 December 2009, WikiLeaks announced that it was experiencing a shortage of funds and suspended all access to its website except for a form to submit new material. Material that was previously published was no longer available, although some could still be accessed on unofficial mirrors. WikiLeaks stated on its website that it would resume full operation once the operational costs were covered. WikiLeaks saw this as a kind of strike "to ensure that everyone who is involved stops normal work and actually spends time raising revenue". While the organisation initially planned for funds to be secured by 6 January 2010, it was not until 3 February 2010 that WikiLeaks announced that its minimum fundraising goal had been achieved.

On 22 January 2010, PayPal suspended WikiLeaks' donation account and froze its assets. WikiLeaks said that this had happened before, and was done for "no obvious reason". The account was restored on 25 January 2010. On 18 May 2010, WikiLeaks announced that its website and archive were back up.

As of June 2010, WikiLeaks was a finalist for a grant of more than half a million dollars from the John S. and James L. Knight Foundation, but did not make the cut. WikiLeaks commented, "WikiLeaks was highest rated project in the Knight challenge, strongly recommended to the board but gets no funding. Go figure". WikiLeaks said that the Knight foundation announced the award to "'12 Grantees who will impact future of news' – but not WikiLeaks" and questioned whether Knight foundation was "really looking for impact". A spokesman of the Knight Foundation disputed parts of WikiLeaks' statement, saying "WikiLeaks was not recommended by Knight staff to the board." However, he declined to say whether WikiLeaks was the project rated highest by the Knight advisory panel, which consists of non-staffers, among them journalist Jennifer 8. Lee, who has done PR work for WikiLeaks with the press and on social networking sites.
On 17 July Jacob Appelbaum spoke on behalf of WikiLeaks at the 2010 Hackers on Planet Earth conference in New York City, replacing Assange because of the presence of federal agents at the conference. He announced that the WikiLeaks submission system was again up and running, after it had been temporarily suspended. Assange was a surprise speaker at a TED conference on 19 July 2010 in Oxford, and confirmed that WikiLeaks was now accepting submissions again.

Upon returning to the U.S. from the Netherlands, on 29 July, Appelbaum was detained for three hours at the airport by U.S. agents, according to anonymous sources. The sources told Cnet that Appelbaum's bag was searched, receipts from his bag were photocopied, his laptop was inspected, although in what manner was unclear. Appelbaum reportedly refused to answer questions without a lawyer present, and was not allowed to make a phone call. His three mobile phones were reportedly taken and not returned. On 31 July, he spoke at a Defcon conference and mentioned his phone being "seized". After speaking, he was approached by two FBI agents and questioned.


According to a January 2010 interview, the WikiLeaks team then consisted of five people working full-time and about 800 people who worked occasionally, none of whom were compensated. WikiLeaks has no official headquarters. The expenses per year are about €200,000, mainly for servers and bureaucracy, but would reach €600,000 if work currently done by volunteers were paid for. WikiLeaks does not pay for lawyers, as hundreds of thousands of dollars in legal support have been donated by media organisations such as the Associated Press, Los Angeles Times, and the National Newspaper Publishers Association. Its only revenue stream is donations, but WikiLeaks is planning to add an auction model to sell early access to documents. According to the Wau Holland Foundation, WikiLeaks receives no money for personnel costs, only for hardware, travelling and bandwidth. An article in wrote: As a charity accountable under German law, donations for WikiLeaks can be made to the foundation. Funds are held in escrow and are given to WikiLeaks after the whistleblower website files an application containing a statement with proof of payment. The foundation does not pay any sort of salary nor give any renumeration [sic] to WikiLeaks' personnel, corroborating the statement of the site's former German representative Daniel Schmitt (real name Daniel Domscheit-Berg) on national television that all personnel works voluntarily, even its speakers.

Site management issues

Within WikiLeaks, there has been public disagreement between founder and spokesperson Julian Assange and Domscheit-Berg, the site's former German representative who was suspended by Assange. Domscheit-Berg announced on 28 September 2010 that he was leaving the organization due to internal conflicts over management of the site.


WikiLeaks describes itself as "an uncensorable system for untraceable mass document leaking". WikiLeaks is hosted by PRQ, a Sweden-based company providing "highly secure, no-questions-asked hosting services." PRQ is said to have "almost no information about its clientele and maintains few if any of its own logs." The servers are spread around the world with the central server located in Sweden. Julian Assange has said that the servers are located in Sweden (and the other countries) "specifically because those nations offer legal protection to the disclosures made on the site". He talks about the Swedish constitution, which gives the information providers total legal protection. It is forbidden according to Swedish law for any administrative authority to make inquiries about the sources of any type of newspaper. These laws, and the hosting by PRQ, make it difficult to take WikiLeaks offline. Furthermore, "Wikileaks maintains its own servers at undisclosed locations, keeps no logs and uses military-grade encryption to protect sources and other confidential information." Such arrangements have been called "bulletproof hosting."

On 17 August 2010, it was announced that the Swedish Pirate Party will be hosting and managing many of WikiLeaks' new servers. The party donates servers and bandwidth to WikiLeaks without charge. Technicians of the party will make sure that the servers are maintained and working.
Some servers are hosted in an underground nuclear bunker in Stockholm.
After the site became the target of a denial-of-service attack from a hacker on its old servers, WikiLeaks moved its site to Amazon's servers. Later, however, the website was "ousted" from the Amazon servers, without a public statement from the company. WikiLeaks then decided to install itself on the servers of OVH in France.

WikiLeaks is based on several software packages, including MediaWiki, Freenet, Tor, and PGP.WikiLeaks strongly encouraged postings via Tor because of the strong privacy needs of its users.On 4 November 2010, Julian Assange told Swiss public television TSR that he is seriously considering seeking political asylum in neutral Switzerland and setting up a WikiLeaks foundation in the country to move the operation there. According to Assange, Switzerland and Iceland are the only countries where WikiLeaks would feel safe to operate.

 Name and policies

Despite using the name "WikiLeaks", the website is not wiki-based as of December 2010[update]. Also, despite some popular confusion[74] due to both having the term "wiki" in their names, WikiLeaks and Wikipedia have no affiliation with each other[75][76] i.e. "wiki" is not a brand name. The "about" page originally read:

To the user, WikiLeaks will look very much like Wikipedia. Anybody can post to it, anybody can edit it. No technical knowledge is required. Leakers can post documents anonymously and untraceably. Users can publicly discuss documents and analyze their credibility and veracity. Users can discuss interpretations and context and collaboratively formulate collective publications. Users can read and write explanatory articles on leaks along with background material and context. The political relevance of documents and their verisimilitude will be revealed by a cast of thousands.

However, WikiLeaks established an editorial policy that accepted only documents that were "of political, diplomatic, historical or ethical interest" (and excluded "material that is already publicly available").[78] This coincided with early criticism that having no editorial policy would drive out good material with spam and promote "automated or indiscriminate publication of confidential records."[79] It is no longer possible for anybody to post to it or edit it, as the original FAQ promised. Instead, submissions are regulated by an internal review process and some are published, while documents not fitting the editorial criteria are rejected by anonymous WikiLeaks reviewers. By 2008, the revised FAQ stated that "Anybody can post comments to it. [...] Users can publicly discuss documents and analyze their credibility and veracity."[80] After the 2010 relaunch, posting new comments to leaks was no longer possible.

Verification of submissions

WikiLeaks states that it has never released a misattributed document. Documents are assessed before release. In response to concerns about the possibility of misleading or fraudulent leaks, WikiLeaks has stated that misleading leaks "are already well-placed in the mainstream media. WikiLeaks is of no additional assistance."[82] The FAQ states that: "The simplest and most effective countermeasure is a worldwide community of informed users and editors who can scrutinize and discuss leaked documents."

According to statements by Assange in 2010, submitted documents are vetted by a group of five reviewers, with expertise in different fields such as language or programming, who also investigate the background of the leaker if his or her identity is known.[84] In that group, Assange has the final decision about the assessment of a document.

Legal status

The legal status of WikiLeaks is complex. Its servers are located throughout Europe and are accessible from any uncensored web connection. The files it leaks are from countries around the world in which they may have various legal statuses. WikiLeaks headquarters is in Sweden because of its strong shield laws to protect confidential journalistic sources.[85] WikiLeaks has stated it does not request classified or confidential materials.[85] However, on previous occasions WikiLeaks has requested recommendations and has published lists of "Most Wanted" documents from the public.[86] These differing stances add to the complexity of WikiLeaks' legal situation. On the one hand they may offer protection against the US Espionage Act of 1917 as news organizations may be allowed to publish confidential military and national security information if they directly not solicit it.[85] On the other, WikiLeaks compilation of most wanted lists of confidential or classified materials raises legal grey area questions.In the United States the Justice Department has indicated it is considering criminal charges against WikiLeaks.[87][88] However, the Justice Department has not specifically indicated what law these charges would stem from. Legal scholars have stated that charges under the Espionage Act could be possible, but such a move has been characterized as "difficult" by former prosecutors because of First Amendment rights in the United States.

Insurance file

On 29 July 2010 WikiLeaks added a 1.4 GB "Insurance File" to the Afghan War Diary page. The file is AES encrypted and has been speculated to serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated, upon which the passphrase could be published (compare to the concept of a dead man's switch).[89][90] Following the first few days' release of the United States diplomatic cables starting 28 November 2010, the US television broadcaster CBS predicted that "If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies."[91] CBS correspondent Declan McCullagh stated, "What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the U.S. government if it were released.".

 Investigations, censorship, and alleged harassment and surveillance

According to The Times, WikiLeaks and its members have complained about continuing harassment and surveillance by law enforcement and intelligence organizations, including extended detention, seizure of computers, veiled threats, "covert following and hidden photography."[92] Two laywers for Julian Assange in the United Kingdom told The Guardian that they believed they were being watched by the security services after the US cables leak.[93]

By governmentsPolice raid on German WikiLeaks domain holder's home

The home of Theodor Reppe, registrant of the German WikiLeaks domain name,, was raided on 24 March 2009 after WikiLeaks released the Australian Communications and Media Authority (ACMA) censorship blacklist.[94] The site was not affected.[95][96]

Wikileaks's website claims that the government of the People's Republic of China has attempted to block all traffic to web sites with "wikileaks" in the URL since 2007, but that this can be bypassed through encrypted connections or by using one of Wikileaks's many covert URLs.

Potential future Australian censorship

On 16 March 2009, the Australian Communications and Media Authority added WikiLeaks to their proposed blacklist of sites that will be blocked for all Australians if the mandatory internet filtering censorship scheme is implemented as planned.[98][99] The blacklisting was removed 30 November 2010.

Thai censorship

The Centre for the Resolution of the Emergency Situation (CRES) is currently censoring the website WikiLeaks in Thailand[101] and more than 40,000 other webpages[102] because of the emergency decree in Thailand imposed as a result of political instabilities (Emergency decree declared beginning of April 2010[103]). When trying to access the WikiLeaks website, internet users are redirected to this webpage.
United StatesAccess to WikiLeaks is currently blocked in the United States Library of Congress.[104] On 3 December 2010 the White House Office of Management and Budget sent a memo forbidding all unauthorized federal government employees and contractors from accessing classified documents publicly available on WikiLeaks and other websites.[105]

The U.S. Justice Department opened a criminal probe of Wikileaks and founder Julian Assange shortly after the leak of diplomatic cables began.[106] Attorney General Eric Holder affirmed the probe was "not saber-rattling", but was "an active, ongoing criminal investigation.".

The Washington Post reported that the department was considering charges under the Espionage Act, a move which former prosecutors characterized as "difficult".


After the release of the 2007 airstrikes video and as they prepared to release film of the Granai airstrike, Julian Assange has said that his group of volunteers came under intense surveillance. In an interview and Twitter posts he said that a restaurant in Reykjavík where his group of volunteers met came under surveillance in March; there was "covert following and hidden photography" by police and foreign intelligence services; that an apparent British intelligence agent made thinly veiled threats in a Luxembourg car park; and that one of the volunteers was detained by police for 21 hours. Another volunteer posted that computers were seized, saying "If anything happens to us, you know why ... and you know who is responsible."[92] According to the Columbia Journalism Review, "the Icelandic press took a look at Assange's charges of being surveilled in Iceland [...] and, at best, have found nothing to substantiate them."[108]

In August 2009, Kaupthing Bank, succeeded in obtaining a court order gagging Iceland's national broadcaster, RÚV, from broadcasting a risk analysis report showing the bank's substantial exposure to debt default risk. This information had been leaked by a whistleblower to WikiLeaks and remained available on the WikiLeaks site; faced with an injunction minutes before broadcast the channel ran with a screen grab of the WikiLeaks site instead of the scheduled piece on the bank. Citizens of Iceland felt outraged that RÚV was prevented from broadcasting news of relevance.[109] Therefore, WikiLeaks has been credited with inspiring the Icelandic Modern Media Initiative, a bill meant to reclaim Iceland's 2007 Reporters Without Borders (Reporters sans frontières) ranking as first in the world for free speech. It aims to enact a range of protections for sources, journalists, and publishers.

Birgitta Jónsdóttir, a former volunteer for WikiLeaks and member the Icelandic parliament, is the chief sponsor of the proposal.

 By organizations and companies

Facebook Inc.WikiLeaks claimed in April 2010 that Facebook deleted their fan page, which had 30,000 fans.[112][113][114][115] However, as of 5 December 2010 the group's Facebook fan page was available and had grown by 100.000 fans daily since December 1,[116] to more than 770,000 fans. It is also the largest growth of the week.

Moneybookers Ltd

In October 2010, it was reported that Moneybookers, which collected donations for WikiLeaks, had ended its relationship with the site. Moneybookers stated that its decision had been made "to comply with money laundering or other investigations conducted by government authorities, agencies or commissions."

Dynamic Network Services Inc.

On 2 December 2010 American owned EveryDNS dropped WikiLeaks from its entries, citing DDoS attacks that "threatened the stability of its infrastructure".[119] The site's 'info' DNS lookup remained operational at alternative addresses for direct access respectively to the Wikileaks and Cablegate websites.[120]
 Amazon Inc.
On 2 December 2010 severed its ties with WikiLeaks, to which it was providing infrastructure services, after an intervention of an aide of US Senator Joe Lieberman.[121][122][123] Amazon denied acting under political pressure citing a violation of its terms of service.[124] Lieberman, who later praised Amazon's decision and called for other companies to follow suit,[123] also proposed new legislation targeting similar cases — Securing Human Intelligence and Enforcing Lawful Dissemination Act,[122] also known as the the SHIELD Act.[125]

PayPal Inc.

On 4 December 2010 PayPal, the payment processor owned by eBay, permanently cut off the account of the Wau Holland Foundation that had been redirecting donations to WikiLeaks. PayPal alleged that the account violated its "Acceptable Use Policy", specifically that it was used for "activities that encourage, promote, facilitate or instruct others to engage in illegal activity."



Daniel Ellsberg (2006) has made numerous media interviews supporting WikiLeaks.[128][129]
In July 2010 Veterans for Peace president Mike Ferner editorialized on the group's website "neither Wikileaks nor the soldier or soldiers who divulged the documents should be prosecuted for revealing this information. We should give them a medal."

Documentary filmmaker John Pilger wrote an August 2010 editorial in the Australian publication Green Left titled "Wikileaks Must Be Defended." In it, Pilger said WikiLeaks represented the interests of "public accountability" and a new form of journalism at odds with "the dominant section ... devoted merely to taking down what cynical and malign power tells it."

Daniel Ellsberg, the man who released the Pentagon Papers in 1971, has been a frequent defender of WikiLeaks. Following the November 2010 release of U.S. diplomatic cables, Ellsberg rejected criticism that the site was endangering the lives of U.S. military personnel and intelligence assets stating "not one single soldier or informant has been in danger from any of the WikiLeaks releases. That risk has been largely overblown."[128] Ellsberg went on to note that government claims to the contrary were "a script that they roll out every time there's a leak of any sort."

On 3 December 2010 Republican Congressman of Texas, Ron Paul, spoke out publicly during a Fox Business interview in support of Wikileaks founder, Julian Assange; "In a free society we're supposed to know the truth," Paul said. "In a society where truth becomes treason, then we're in big trouble." Paul went on to state, "Why don't we prosecute The New York Times or anybody that releases this?"[132] Fellow Republican congressman Connie Mack of Florida also praised WikiLeaks, stating that Americans have a right to know the contents of the leaks, "no matter how we acquire that knowledge."On 4 December 2010 Reporters Without Borders condemned the "blocking, cyber-attacks and political pressure" being directed at WikiLeaks. The organization is also concerned by some of the extreme comments made by American authorities concerning WikiLeaks and its founder Julian Assange.[134]
In an article titled "Only WikiLeaks Can Save US Policy" published on the online foreign affairs magazine The Diplomat, former long-time CIA counter-terrorism expert Michael Scheuer said the source of interest in WikiLeaks revelations was in the inherent dishonesty of recent U.S. administrations. "In recent years, the US public has had to hear its leaders repeatedly tell Americans that black was white," Scheuer wrote. [135]
Anonymous, the online community of hackers and activists, announced its support for Wikileaks by "declaring war" against enemies of Assange, calling on supporters to attack sites and companies that do not support WikiLeaks and to spread the leaked diplomatic cables online.

Awards received

In 2008 Index on Censorship presented WikiLeaks with their inaugural Economist New Media Award.
In 2009 Amnesty International awarded WikiLeaks their Media Award for exposing "extra judicial killings and disappearances" in Kenya.

Praise by governments

 Ecuador In late November 2010 a representative of the government of Ecuador made what was, apparently, an unsolicited public offer to Julian Assange to establish residency in Ecuador. Deputy Foreign Minister Kinto Lucas stated "we are going to invite him to come to Ecuador so he can freely present the information he possesses and all the documentation, not just on the Internet, but in various public forums."[139] Lucas went on to state his praise for WikiLeaks and Assange calling them "[people] who are constantly investigating and trying to get light out of the dark corners of [state] information."[140] The following day, however, president Rafael Correa distanced his administration from the offer stating that Lucas had been speaking for himself and not on the government's behalf. Correa then criticized Assange for "breaking the laws of the United States and leaking this type of information."[141]
Hugo Chávez, president of Venezuela, stated his support for WikiLeaks following the release of U.S. diplomatic cables in November 2010 that showed the United States had tried to rally support from regional governments to isolate Venezuela. "I have to congratulate the people of WikiLeaks for their bravery and courage," Chávez commented in televised remarks.


WikiLeaks has attracted criticism from a variety of sources.

In 2007 John Young, operator of cryptome, left his position on the WikiLeaks Board of Directors accusing the group of being a "CIA conduit." Young subsequently retreated from his assertion but has continued to be critical of the site.[144] In a 2010 interview with Young accused the group of a lack of transparency regarding their fundraising and financial management. He went on to state his belief that WikiLeaks could not guarantee whistleblowers the anonymity or confidentiality they claimed and that he "would not trust them with information if it had any value, or if it put me at risk or anyone that I cared about at risk."[145]

Citing the leaking of the sorority rituals of Alpha Sigma Tau, Steven Aftergood has opined that WikiLeaks "does not respect the rule of law nor does it honor the rights of individuals." Aftergood went on to state that WikiLeaks engages in unrestrained disclosure of non-governmental secrets without compelling public policy reasons and that many anti-corruption activists were opposed to the site's activities.[146]In 2010, Amnesty International joined several other human rights groups criticizing WikiLeaks for not adequately redacting the names of Afghan civilians working as U.S. military informants from files they had released. Julian Assange responded by offering Amnesty International staff the opportunity to assist in the document vetting process. When Amnesty International appeared to express reservations in accepting the offer, Assange dismissed the group as "people who prefer to do nothing but cover their asses." Other groups that joined Amnesty International in criticizing WikiLeaks subsequently noted that, despite their displeasure over the issue of civilian name redaction, they generally appreciated WikiLeaks work.[147]

In an August 2010 open letter, the non-governmental organization Reporters Without Borders praised WikiLeaks' past usefulness in exposing "serious violations of human rights and civil liberties" but criticized the group over a perceived absence of editorial control, stating "indiscriminately publishing 92,000 classified reports reflects a real problem of methodology and, therefore, of credibility. Journalistic work involves the selection of information. The argument with which you defend yourself, namely that WikiLeaks is not made up of journalists, is not convincing."[148] The group subsequently clarified their statement as a criticism of WikiLeaks release procedure and not the organization itself, stating "we reaffirm our support for Wikileaks, its work and its founding principles."[149]

On 30 November 2010, former Canadian government adviser Tom Flanagan, while appearing on the CBC television program "Power & Politics", called for Julian Assange to be killed. "I think Assange should be assassinated," Flanagan stated, before noting to host Evan Solomon, "I'm feeling pretty manly today." Flanagan subsequently retracted his call for the death of Assange while reiterating his opposition to WikiLeaks.[150]
Dimitri Soudas, spokesman to Prime Minister Stephen Harper, decried Flanagan's comments and said the former Tory strategist "should be charged with incitement to commit murder." Ralph Goodale, Deputy Leader of the Liberal Party in the House of Commons, called Flanagan's remarks "clearly contrary to the Canadian Charter of Rights and Freedoms." [151]

 Criticism by governments
Most of the governments and organizations whose files have been leaked by WikiLeaks have been critical of the organization.

  •  France The French Industry Minister Éric Besson said in a letter to the CGIET technology agency, WikiLeaks "violates the secret of diplomatic relations and puts people protected by diplomatic secret in danger." Therefore it would be 'unacceptable' that the site was hosted on servers based in France. The minister asked for measures to bar WikiLeaks from France.[154]
  •  Iran The President of Iran, Mahmoud Ahmadinejad, joined in criticism of WikiLeaks following the November 2010 release of United States diplomatic cables. Ahmadinejad claimed that the release of cables purporting to show concern with Iran by Arab states was a planned leak by the United States to discredit his government, though he did not indicate whether he believed WikiLeaks was in collusion with the United States or was simply an unwitting facilitator.[155]
  •  United States Following the November 2010 release of United States diplomatic cables, U.S. Secretary of State
    Hillary Clinton denounced the group saying, "this disclosure is not just an attack on America's foreign policy interests, it is an attack on the international community."[156]
    Peter King, chairman of the Homeland Security Committee of the United States House of Representatives has stated his support for listing Wikileaks as a "foreign terrorist organization" explaining that "WikiLeaks presents a clear and present danger to the national security of the United States."[157] In a contrary statement, secretary of Defense Robert Gates has said that concerns about the disclosures were "over-wrought" in terms of their likely adverse impact on ordinary diplomatic activities.[158]

  • Philip J. Crowley, United States Assistant Secretary of State for Public Affairs, has stated in December 2010 that the US State Department does not regard WikiLeaks as a legitimate media organization.[159]


Apparent Somali assassination order

WikiLeaks posted its first document in December 2006, a decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys.[25]
The New Yorker has reported that
[Julian] Assange and the others were uncertain of its authenticity, but they thought that readers, using Wikipedia-like features of the site, would help analyze it. They published the decision with a lengthy commentary, which asked, "Is it a bold manifesto by a flamboyant Islamic militant with links to Bin Laden? Or is it a clever smear by US intelligence, designed to discredit the Union, fracture Somali alliances and manipulate China?" ... The document's authenticity was never determined, and news about WikiLeaks quickly superseded the leak itself.[25]

Daniel arap Moi family corruption

On 31 August 2007, The Guardian (Britain) featured on its front page a story about corruption by the family of the former Kenyan leader Daniel arap Moi. The newspaper stated that the source of the information was WikiLeaks.[160]

Bank Julius Baer lawsuit

Main article: Bank Julius Baer vs. Wikileaks lawsuit
In February 2008, the domain name was taken offline after the Swiss Bank Julius Baer sued WikiLeaks and the domain registrar, Dynadot, in a court in California, United States, and obtained a permanent injunction ordering the shutdown.[161][162] WikiLeaks had hosted allegations of illegal activities at the bank's Cayman Islands branch.[161] WikiLeaks' U.S. Registrar, Dynadot, complied with the order by removing its DNS entries. However, the website remained accessible via its numeric IP address, and online activists immediately mirrored WikiLeaks at dozens of alternative websites worldwide.[163]
The American Civil Liberties Union and the Electronic Frontier Foundation filed a motion protesting the censorship of WikiLeaks. The Reporters Committee for Freedom of the Press assembled a coalition of media and press that filed an amicus curiae brief on WikiLeaks' behalf. The coalition included major U.S. newspaper publishers and press organisations, such as the American Society of News Editors, the Associated Press, the Citizen Media Law Project, the E. W. Scripps Company, the Gannett Company, the Hearst Corporation, the Los Angeles Times, the National Newspaper Publishers Association, the Newspaper Association of America and the Society of Professional Journalists. The coalition requested to be heard as a friend of the court to call attention to relevant points of law that it believed the court had overlooked (on the grounds that WikiLeaks had not appeared in court to defend itself, and that no First Amendment issues had yet been raised before the court). Amongst other things, the coalition argued that:[163]
"WikiLeaks provides a forum for dissidents and whistleblowers across the globe to post documents, but the Dynadot injunction imposes a prior restraint that drastically curtails access to Wikileaks from the Internet based on a limited number of postings challenged by Plaintiffs. The Dynadot injunction therefore violates the bedrock principle that an injunction cannot enjoin all communication by a publisher or other speaker."[163]
The same judge, Judge Jeffrey White, who issued the injunction vacated it on 29 February 2008, citing First Amendment concerns and questions about legal jurisdiction.[164] WikiLeaks was thus able to bring its site online again. The bank dropped the case on 5 March 2008.[165] The judge also denied the bank's request for an order prohibiting the website's publication.[163]

The Executive Director of the Reporters Committee for Freedom of the Press, Lucy Dalglish, commented:
"It's not very often a federal judge does a 180 degree turn in a case and dissolves an order. But we're very pleased the judge recognized the constitutional implications in this prior restraint."[163]

Guantanamo Bay procedures

A copy of Standard Operating Procedures for Camp Delta–the protocol of the U.S. Army at the Guantanamo Bay detention camp–dated March 2003 was released on the WikiLeaks website on 7 November 2007.[166] The document, named "gitmo-sop.pdf", is also mirrored at The Guardian.International Committee of the Red Cross, something that the U.S. military had in the past repeatedly denied.[168]

[167] Its release revealed some of the restrictions placed over detainees at the camp, including the designation of some prisoners as off-limits to the
On 3 December 2007, WikiLeaks released a copy of the 2004 edition of the manual,[169] together with a detailed analysis of the changes.[170]

ScientologyOn 7 April 2008, WikiLeaks reported receiving a letter (dated 27 March) from the Religious Technology Center claiming ownership of several recently leaked documents pertaining to OT Levels within the Church of Scientology. These same documents were at the center of a 1994 scandal. The email stated:
"The Advanced Technology materials are unpublished, copyrighted works. Please be advised that your customer's action in this regard violates United States copyright law. Accordingly, we ask for your help in removing these works immediately from your service.
Moxon & Kobrin[171]
The letter continued on to request the release of the logs of the uploader, which would remove their anonymity. WikiLeaks responded with a statement released on Wikinews stating: "in response to the attempted suppression, WikiLeaks will release several thousand additional pages of Scientology material next week",[172] and did so.

 Sarah Palin's Yahoo email account contents

Main article: Sarah Palin email hackIn September 2008, during the 2008 United States presidential election campaigns, the contents of a Yahoo account belonging to Sarah Palin (the running mate of Republican presidential nominee John McCain) were posted on WikiLeaks after being hacked into by members of Anonymous.[173] It has been alleged by Wired that contents of the mailbox indicate that she used the private Yahoo account to send work-related messages, in violation of public record laws.[174] The hacking of the account was widely reported in mainstream news outlets.[175][176][177] Although WikiLeaks was able to conceal the hacker's identity, the source of the Palin emails was eventually publicly identified as David Kernell, a 20-year-old economics student at the University of Tennessee and the son of Democratic Tennessee State Representative Mike Kernell from Memphis,[178] whose email address (as listed on various social networking sites) was linked to the hacker's identity on Anonymous.[179] Kernell attempted to conceal his identity by using the anonymous proxy service, but, because of the illegal nature of the access, ctunnel website administrator Gabriel Ramuglia assisted the FBI in tracking down the source of the hack.[180]

BNP membership list

After briefly appearing on a blog, the membership list of the far-right British National Party was posted to WikiLeaks on 18 November 2008. The name, address, age and occupation of many of the 13,500 members were given, including several police officers, two solicitors, four ministers of religion, at least one doctor, and a number of primary and secondary school teachers. In Britain, police officers are banned from joining or promoting the BNP, and at least one officer was dismissed for being a member.[181] The BNP was known for going to considerable lengths to conceal the identities of members. On 19 November, BNP leader Nick Griffin stated that he knew the identity of the person who initially leaked the list on 17 November, describing him as a "hardliner" senior employee who left the party in 2007.[182][183][184] On 20 October 2009, a list of BNP members from April 2009 was leaked. This list contained 11,811 members.[185]

In January 2009, over 600 internal United Nations reports (60 of them marked "strictly confidential") were leaked.[186]

On 7 February 2009, WikiLeaks released 6,780 Congressional Research Service reports.[187]
In March 2009, WikiLeaks published a list of contributors to the Norm Coleman senatorial campaign[188] and a set of documents belonging to Barclays Bank that had been ordered removed from the website of The Guardian.[189]

Climategate emails
Main article: Climatic Research Unit email controversy

In November 2009, controversial documents, including e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) from the University of East Anglia's (UEA) Climatic Research Unit (CRU).[190] According to the university, the emails and documents were obtained through a server hacking; one prominent host of the full 120 MB archive was WikiLeaks.[191][192]Internet censorship lists

WikiLeaks has published the lists of forbidden or illegal web addresses for several countries.
On 19 March 2009, WikiLeaks published what was alleged to be the Australian Communications and Media Authority's blacklist of sites to be banned under Australia's proposed laws on Internet censorship.[193] Reactions to the publication of the list by the Australian media and politicians were varied. Particular note was made by journalistic outlets of the type of websites on the list; while the Internet censorship scheme submitted by the Australian Labor Party in 2008 was proposed with the stated intention of preventing access to child pornography and sites related to terrorism,[194] the list leaked on WikiLeaks contains a number of sites unrelated to sex crimes involving minors.[195][196] When questioned about the leak, Stephen Conroy, the Minister for Broadband, Communications and the Digital Economy in Australia's Rudd Labor Government, responded by claiming that the list was not the actual list, yet threatening to prosecute anyone involved in distributing it.[197] On 20 March 2009, WikiLeaks published an updated list, dated 18 March 2009; it more closely matches the claimed size of the ACMA blacklist, and contains two pages which have been independently confirmed to be blacklisted by ACMA.
WikiLeaks also contains details of Internet censorship in Thailand, including lists of censored sites dating back to May 2006.[198]

Bilderberg Group meeting reports

Since May 2009, WikiLeaks has made available reports of several meetings of the Bilderberg Group.[199] It includes the group's history[200] and meeting reports from the years 1955, 1956, 1957, 1958, 1960, 1962, 1963 and 1980.2008 Peru oil scandal

On 28 January 2009, WikiLeaks released 86 telephone intercept recordings of Peruvian politicians and businessmen involved in the "Petrogate" oil scandal. The release of the tapes led the front pages of five Peruvian newspapers.[201]

Nuclear accident in IranOn 16 July 2009, Iranian news agencies reported that the head of Iran's atomic energy organization Gholam Reza Aghazadeh had abruptly resigned for unknown reasons after twelve years in office.[202] Shortly afterwards WikiLeaks released a report disclosing a "serious nuclear accident" at the Iranian Natanz nuclear facility in 2009.[203] The Federation of American Scientists (FAS) released statistics according to which the number of enriched centrifuges operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the time the nuclear incident WikiLeaks mentioned would have occurred.[204][205]
According to media reports the accident may have been the direct result of a cyberattack at Iran's nuclear program, carried out with the Stuxnet computer worm.[206][207]

Toxic dumping in Africa: The Minton report

In September 2006, commodities giant Trafigura commissioned an internal report about a toxic dumping incident in the Ivory Coast,[208] which (according to the United Nations) affected 108,000 people. The document, called the Minton Report, names various harmful chemicals "likely to be present" in the waste and notes that some of them "may cause harm at some distance". The report states that potential health effects include "burns to the skin, eyes and lungs, vomiting, diarrhea, loss of consciousness and death", and suggests that the high number of reported casualties is "consistent with there having been a significant release of hydrogen sulphide gas"
.On 11 September 2009, Trafigura's lawyers, Carter-Ruck, obtained a secret "super-injunction"[209] against The Guardian, banning that newspaper from publishing the contents of the document. Trafigura also threatened a number of other media organizations with legal action if they published the report's contents, including the Norwegian Broadcasting Corporation[208] and The Chemical Engineer magazine.[210] On 14 September 2009, WikiLeaks posted the report.[211]

On 12 October, Carter-Ruck warned The Guardian against mentioning the content of a parliamentary question that was due to be asked about the report. Instead, the paper published an article stating that they were unable to report on an unspecified question and claiming that the situation appeared to "call into question privileges guaranteeing free speech established under the 1689 Bill of Rights".[212] The suppressed details rapidly circulated via the internet and Twitter[213][214][215] and, amid uproar, Carter-Ruck agreed the next day to the modification of the injunction before it was challenged in court, permitting The Guardian to reveal the existence of the question and the injunction.[216] The injunction was lifted on 16 October.[217]

Kaupthing Bank

WikiLeaks has made available an internal document[218] from Kaupthing Bank from just prior to the collapse of Iceland's banking sector, which led to the 2008–2010 Icelandic financial crisis. The document shows that suspiciously large sums of money were loaned to various owners of the bank, and large debts written off. Kaupthing's lawyers have threatened WikiLeaks with legal action, citing banking privacy laws. The leak has caused an uproar in Iceland.[219] Criminal charges relating to the multibillion euro loans to Exista and other major shareholders are being investigated. The bank is seeking to recover loans taken out by former bank employees before its collapse.[220]

Joint Services Protocol 440Joint Services Protocol 440 ("JSP 440") is the name of a British 2001 Ministry of Defense 2,400-page restricted document for security containing instructions for avoiding leaks in the information flow caused by hackers, journalists, and foreign spies.[221][222] The protocol was posted on WikiLeaks on 3 October 2009.

9/11 pager messages

On 25 November 2009, WikiLeaks released 570,000 intercepts of pager messages sent on the day of the September 11 attacks.[223][224][225] Bradley Manning (see below) commented that those were obvious NSA intercepts.[226] Among the released messages are communications between Pentagon officials and New York City Police Department.[227]


U.S. Intelligence report on WikiLeaks

On 15 March 2010, WikiLeaks released a secret 32-page U.S. Department of Defense Counterintelligence Analysis Report from March 2008. The document described some prominent reports leaked on the website which related to U.S. security interests and described potential methods of marginalizing the organization. WikiLeaks editor Julian Assange said that some details in the Army report were inaccurate and its recommendations flawed,[228] and also that the concerns of the U.S. Army raised by the report were hypothetical.[229] The report discussed deterring potential whistleblowers via termination of employment and criminal prosecution of any existing or former insiders, leakers or whistleblowers. Reasons for the report include notable leaks such as U.S. equipment expenditure, human rights violations in Guantanamo Bay and the battle over the Iraqi town of Fallujah.[230]

Baghdad airstrike videoMain article: July 12, 2007 Baghdad airstrike
On 5 April 2010, WikiLeaks released classified U.S. military footage from a series of attacks on 12 July 2007 in Baghdad by a U.S. helicopter that killed 12, including two Reuters news staff, Saeed Chmagh and Namir Noor-Eldeen, on a website called "Collateral Murder". The footage consisted of a 39-minute unedited version and an 18-minute version which had been edited and annotated. Analysis of the video indicates that the pilots thought the men were carrying weapons (which were actually camera equipment). When asked if they were sure that the men were carrying weapons, they answered in the affirmative.[231] The military conducted an "informal" investigation into the incident, but has yet to release the investigative materials (such as the sworn statements of the soldiers involved or the battle damage assessment) that were used, causing the report to be criticized as "sloppy."[232]

In the week following the release, "Wikileaks" was the search term with the most significant growth worldwide in the last seven days as measured by Google Insights.[233]

Arrest of Bradley Manning

Main article: Bradley Manning

A 22-year-old US Army intelligence analyst, PFC (formerly SPC) Bradley Manning, was arrested after alleged chat logs were turned in to the authorities by former hacker Adrian Lamo, in whom he had confided. Manning reportedly told Lamo he had leaked the "Collateral Murder" video, in addition to a video of the Granai airstrike and around 260,000 diplomatic cables, to WikiLeaks.[234][235] WikiLeaks said "allegations in Wired that we have been sent 260,000 classified US embassy cables are, as far as we can tell, incorrect."[236] WikiLeaks have said that they are unable as yet to confirm whether or not Manning was actually the source of the video, stating "we never collect personal information on our sources", but that they have nonetheless "taken steps to arrange for his protection and legal defence."[235][237] On 21 June Julian Assange told The Guardian that WikiLeaks had hired three US criminal lawyers to defend Manning but that they had not been given access to him.[238]

Manning reportedly wrote, "Everywhere there's a U.S. post, there's a diplomatic scandal that will be revealed."[239] According to The Washington Post, he also described the cables as "explaining how the first world exploits the third, in detail, from an internal perspective."[240]

Afghan War Diary

Main article: Afghan War documents leak

On 25 July 2010,[241] WikiLeaks released to The Guardian, The New York Times, and Der Spiegel over 92,000 documents related to the war in Afghanistan between 2004 and the end of 2009. The documents detail individual incidents including friendly fire and civilian casualties.[242] The scale of leak was described by Julian Assange as comparable to that of the Pentagon Papers in the 1970s. The documents were released to the public on 25 July 2010. On 29 July 2010 WikiLeaks added a 1.4 GB "insurance file" to the Afghan War Diary page, whose decryption details would be released if WikiLeaks or Assange were harmed.[89][90][91]
About 15,000 of the 92,000 documents have not yet been released on WikiLeaks, as the group is currently reviewing the documents to remove some of the sources of the information. Speaking to a group in London in August 2010, Assange said that the group will "absolutely" release the remaining documents. He stated that WikiLeaks has requested help from the Pentagon and human-rights groups to help redact the names, but has not received any assistance. He also stated that WikiLeaks is "not obligated to protect other people's sources...unless it is from unjust retribution."[243]

According to a report on the Daily Beast website, the Obama administration has asked Britain, Germany and Australia among others to consider bringing criminal charges against Assange for the Afghan war leaks and to help limit Assange's travels across international borders.[244] In the United States, a joint investigation by the Army and the Federal Bureau of Investigation may try to prosecute "Mr. Assange and others involved on grounds they encouraged the theft of government property".[245]
 The Australia Defence Association (ADA) stated that WikiLeaks' Julian Assange "could have committed a serious criminal offence in helping an enemy of the Australian Defence Force (ADF)."[246] Neil James, the executive director of ADA, states: "Put bluntly, Wikileaks is not authorised in international or Australian law, nor equipped morally or operationally, to judge whether open publication of such material risks the safety, security, morale and legitimate objectives of Australian and allied troops fighting in a UN-endorsed military operation."[246]

WikiLeaks' recent leaking of classified U.S. intelligence has been described by commentator of The Wall Street Journal as having "endangered the lives of Afghan informants" and "the dozens of Afghan civilians named in the document dump as U.S. military informants. Their lives, as well as those of their entire families, are now at terrible risk of Taliban reprisal."[247] When interviewed, Assange stated that WikiLeaks has withheld some 15,000 documents that identify informants to avoid putting their lives at risk. Specifically, Voice of America reported in August 2010 that Assange, responding to such criticisms, stated that the 15,000 still held documents are being reviewed "line by line," and that the names of "innocent parties who are under reasonable threat" will be removed.[248]
Greg Gutfeld of Fox News described the leaking as "WikiLeaks' Crusade Against the U.S. Military."[249]
John Pilger has reported that prior to the release of the Afghan War Diaries in July, WikiLeaks contacted the White House in writing, asking that it identify names that might draw reprisals, but received no response.[250][251]
According to the New York Times, Amnesty International and Reporters Without Borders criticized WikiLeaks for what they saw as risking people's lives by identifying Afghans acting as informers.[252] A Taliban spokesman said that the Taliban had formed a nine-member "commission" to review the documents "to find about people who are spying."[252] He said the Taliban had a "wanted" list of 1,800 Afghans and was comparing that with names WikiLeaks provided, stating "after the process is completed, our Taliban court will decide about such people."[252]

Love Parade documents

Following the Love Parade stampede in Duisburg, Germany on 24 July 2010, the local news blog Xtranews published internal documents of the city administration regarding Love Parade planning and actions by the authorities. The city government reacted by acquiring a court order on 16 August forcing Xtranews to remove the documents from its blog.[253] Two days later, however, after the documents had surfaced on other websites as well, the government stated that it would not conduct any further legal actions against the publication of the documents.[254] On 20 August WikiLeaks released a publication titled Loveparade 2010 Duisburg planning documents, 2007–2010, which comprised 43 internal documents regarding the Love Parade 2010.[255][256]

Iraq War Logs

Main article: Iraq War documents leak
In October 2010, it was reported that WikiLeaks was planning to release up to 400,000 documents relating to the Iraq War.[257] Julian Assange initially denied the reports, stating: "WikiLeaks does not speak about upcoming releases dates, indeed, with very rare exceptions we do not communicate any specific information about upcoming releases, since that simply provides fodder for abusive organizations to get their spin machines ready."[258]

The Guardian reported on 21 October 2010 that it had received almost 400,000 Iraq war documents from WikiLeaks.[259] On 22 October 2010, Al Jazeera was the first to release analyses of the leak, dubbed The War Logs. WikiLeaks posted a tweet that "Al Jazeera have broken our embargo by 30 minutes. We release everyone from their Iraq War Logs embargoes." This prompted other news organizations to release their articles based on the source material. The release of the documents coincided with a return of the main website, which had been offering no content since 30 September 2010.
The BBC quoted The Pentagon referring to the Iraq War Logs as "the largest leak of classified documents in its history." Media coverage of the leaked documents focused on claims that the U.S. government had ignored reports of torture by the Iraqi authorities during the period after the 2003 war.[260]

Diplomatic cables releaseMain article: United States diplomatic cables leak
On 22 November 2010 an announcement was made by the WikiLeaks twitter feed that the next release would be "7x the size of the Iraq War Logs."[261][262] U.S. authorities and the media have speculated that they may contain diplomatic cables.[263] Prior to the expected leak, the government of the United Kingdom (UK) sent a DA-Notice to UK newspapers, which requests advance notice from the newspapers regarding the expected publication.[264] According to Index on Censorship, "there is no obligation on media to comply". "Newspaper editors would speak to [the] Defence, Press and Broadcasting Advisory Committee prior to publication."[264] The Pakistani newspaper Dawn stated that the U.S. newspapers The New York Times and The Washington Post were expected to publish parts of the diplomatic cables on Sunday 28 November, including 94 Pakistan-related documents.[265]

On 26 November, via his lawyer Jennifer Robinson, Assange sent a letter to the US Department of State, asking for information regarding people who could be placed at "significant risk of harm" by the diplomatic cables release.[266][267]

Harold Koh, Legal Adviser of the Department of State, refused the proposal, stating, "We will not engage in a negotiation regarding the further release or dissemination of illegally obtained U.S. Government classified materials."[267]
On 28 November, WikiLeaks announced it was undergoing a massive Distributed Denial-of-service attack,[268] but vowed to still leak the cables and documents via prominent media outlets including El País, Le Monde, Der Spiegel, The Guardian, and The New York Times.[269] The announcement was shortly thereafter followed by the online publication, by The Guardian, of some of the purported diplomatic cables including one in which United States Secretary of State Hillary Clinton apparently orders diplomats to obtain credit card and frequent flier numbers of the French, British, Russian and Chinese delegations to the United Nations Security Council.[270] Other revelations reportedly include that several Arab nations urged the U.S. to launch a first strike on Iran, that the Chinese government was directly involved in computer hacking, and that the U.S. is pressuring Pakistan to turn over nuclear material to prevent it from falling into the wrong hands. The cables also include unflattering appraisals of world leaders.[271] Despite the steps taken by United States Government forbidding all unauthorized federal government employees and contractors from accessing classified documents publicly available on WikiLeaks, in the week following the release (28 November – 5 December 2010), "Wikileaks" remained the top search term in United States as measured by Google Insights.[272]

U.S. Secretary of State Hillary Clinton responded to the leaks saying, "This disclosure is not just an attack on America's foreign policy; it is an attack on the international community, the alliances and partnerships, the conventions and negotiations that safeguard global security and advance economic prosperity." Julian Assange is quoted as saying, "Of course, abusive, Titanic organizations, when exposed, grasp at all sorts of ridiculous straws to try and distract the public from the true nature of the abuse."[273]
John Perry Barlow, co-founder of the Electronic Frontier Foundation, wrote a tweet saying: "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops."

Announcements on upcoming leaks

In May 2010, WikiLeaks said they had video footage of a massacre of civilians in Afghanistan by the U.S. military which they were preparing to release.[92][275]In an interview with Chris Anderson on 19 July 2010, Assange showed a document WikiLeaks had on an Albanian oil well blowout, and said they also had material from inside BP,[276] and that they were "getting enormous quantity of whistle-blower disclosures of a very high caliber"[277] but added that they have not been able to verify and release the material because they do not have enough volunteer journalists.[278]
In October 2010, Assange told a leading Moscow newspaper that "The Kremlin had better brace itself for a coming wave of WikiLeaks disclosures about Russia."[279][280] Assange later clarified: "we have material on many businesses and governments, including in Russia. It's not right to say there's going to be a particular focus on Russia".[281]

In a 2009 Computer World interview, Assange claimed to be in possession of "5GB from Bank of America", and in 2010 told Forbes magazine that WikiLeaks was planning another "megaleak" for early in 2011, which this time would be from inside the private sector and involve "a big U.S. bank". Bank of America's stock price fell as a result of this announcement by three percent.[282][283] Assange commented on the possible impact of the release that "it could take down a bank or two."[284]

In December 2010, Assange's lawyer, Mark Stephens, told The Andrew Marr Show on the BBC, that WikiLeaks had information that it considers to be a "thermo-nuclear device" which it would release if the organisation needs to defend itself.[285]

  •  Australia On 2 December 2010 Prime Minister Julia Gillard made a statement that she 'absolutely condemns' Wikileaks' actions and that the release of information on the site was 'grossly irresponsible' and 'illegal.'[152] (Wikileaks founder Julian Assange is Australian and he responded two days later by accusing his prime minister of betraying him as an Australian citizen.)[153]

Recommend this

Related Posts Plugin for WordPress, Blogger...