Wikileaks informant exposed
http://www.youtube.com/watch?v=rdGd-Ss_pZw&NR=1
RTAmerica | June 07, 2010
According to Wired.com, US Army intelligence specialist Bradley Manning has been arrested for leaking sensitive information to WikiLeaks. Wikileaks is the same organization that back in April released raw footage of a deadly assault in Iraq in 2007 that killed militants and civilians alike.
But this has not been confirmed. Below in one article l show how this story evolved.
Alex talks with John Young of Cryptome, a website that acts as a repository for information about freedom of speech, cryptography, spying, surveillance, and documents for publication that are prohibited by governments worldwide. John and Alex discuss the recent release of 92,000 classified documents on the war in Afghanistan by the renegade website WikiLeaks. The documents show how Pakistan's military spy service has for years guided the Afghan insurgency.
http://cryptome.org/
Alex give us his take on the latest 92,000 documents released by wikileaks with in the past few days.
http://www.youtube.com/watch?v=XidR4ZCzDFY
Retired ex ISI boss Lieutenant General Hamid Gul interviewed by Alex Jones 3 years ago. I note this because this is what is noted in the above url part 1 of 5
But note this same individual has been interviewed many media over the years so this is not that unusual.
If you do a search on youtube.com for Hamid Gul you will get many interviews from many places
http://www.youtube.com/watch?v=uAjD9bpnvzw
Alex Jones Interviews Hamid Gul - 1/5
Pakistani ISI General Hamid Gul '9/11 Inside Job' on Fareed Zakaria on CNN
Former Pakistani ISI General Hamid Gul questions the official story of 9/11 on CNN.
http://www.youtube.com/watch?v=mSLgC4cTKcs&feature=related
Afghanistan war logs: How the Guardian got the story
http://www.guardian.co.uk/world/2010/jul/25/afghanistan-war-logs-explained-video
Secret military files have been opened up by Wikileaks in a joint venture with the Guardian, the New York Times and Der Spiegel
David Leigh, the Guardian's investigations editor, explains the online tools we have created to help you understand the secret US military files on the war in Afghanistan
Link to this video http://www.guardian.co.uk/world/datablog/video/2010/jul/25/afghanistan-war-logs-video-tutorial
July 25, 2010
International
http://www.spiegel.de/international/world/0,1518,708632,00.html
The Afghanistan Protocol
Related articles, background features and opinions about this topic.
http://www.spiegel.de/international/world/0,1518,k-7622,00.html
http://www.guardian.co.uk/world/series/afghanistan-the-war-logs
An archive of classified military documents offers an unvarnished view of the war in Afghanistan
http://www.nytimes.com/interactive/world/war-logs.html
US officials believe that the intelligence agency of ally Pakistan has been secretly supporting the Taliban in their conflict with US-led Nato troops in Afghanistan, leaked records say.
Wikileaks, the online whistleblower organisation, published more than 90,000 secret US military documents on Sunday, revealing alleged support for the Taliban.
The unverified files say that Pakistan's Inter-Services Intelligence (ISI) agency, the country's spy service, has been holding strategy sessions with Taliban leaders to aid them.
Al Jazeera interviewed one of the men specifically mentioned in the reports - retired Lieutenant General Hamid Gul, who has been accused of being actively involved in supporting the Afghan Taliban.
He denied the allegations and said the sources of the "flawed" leaks had ulterior political motives.
[July 26, 2010]
Lt.-Gen. Hamid Gul, the Former Chief of Pakistan's Inter-Services Intelligence (ISI), Denies WikiLeaks Accusations of Involvement in Taliban Resistance, but Says: 'The Afghan National Resistance [Led by the Taliban] is Fully Justified'; Afghan Officials Claim the Documents Prove Pakistan is the Center of Resistance
July 27, 2010 Special Dispatch No.3124Urdu Pashtu Media Project
http://www.memri.org/report/en/0/0/0/0/0/0/4480.htm
The former head of Pakistan's intelligence agency - ISI - in conversation with Al Jazeera's Kamahl Santamaria..
Talk to Al Jazeera: Hamid Gul
Wikileaks, blowing the whistle
In what is being described as one of the biggest leaks in US military history, the whistleblower website Wikileaks.org has published more than 90,000 internal records of US military actions in Afghanistan over the past six. The classified data paints a devastating picture of the war in Afghanistan, revealing how coalition forces have killed hundreds of civilians in unreported incidents, soaring Taliban attacks, and allegations that Pakistan and Iran are fuelling the conflict. The leaks further complicate U.S. President Barack Obama's strategy at a time of mounting doubt over the war effort. The White House says the leaked Pentagon files and field reports were no surprise, but that they threaten national security.
http://www.youtube.com/watch?v=1Z2SpGNlztw
Julian Assange: Why the world needs WikiLeaks
The controversial website WikiLeaks collects and posts highly classified documents and videos. Founder Julian Assange, who is reportedly being sought for questioning by US authorities, talks to TED's Chris Anderson about how the site operates, what it has accomplished and what drives him.
Julian Assange: Why the world needs WikiLeaks
The controversial website WikiLeaks collects and posts highly classified documents and video. Founder Julian Assange, who's reportedly being sought for questioning by US authorities, talks to TED's Chris Anderson about how the site operates, what it has accomplished -- and what drives him. The interview includes graphic footage of a recent US airstrike in Baghdad.
http://www.ted.com/talks/julian_assange_why_the_world_needs_wikileaks.html
http://www.wired.com/threatlevel/2010/06/leak/#ixzz0uvgjHKo1
Wikileaks informant exposed
http://www.youtube.com/watch?v=rdGd-Ss_pZw&NR=1
RTAmerica | June 07, 2010
According to Wired.com, US Army intelligence specialist Bradley Manning has been arrested for leaking sensitive information to WikiLeaks. Wikileaks is the same organization that back in April released raw footage of a deadly assault in Iraq in 2007 that killed militants and civilians alike.
which came from this source also from Wired magazine
Ex-Hacker Adrian Lamo Institutionalized for Asperger’s
- By Kevin Poulsen Archive of articles http://www.wired.com/threatlevel/author/kevin_poulsen/
- May 20, 2010 |
- 5:46 pm | http://www.wired.com/threatlevel/2010/05/lamo/#ixzz0uvhhM3f1
- All images sourced from articles cited
This is the article below in which it is shown lamo above and
I Can’t Believe What I’m Confessing to You’: The Wikileaks Chats
- By Kevin Poulsen and Kim Zetter
- June 10, 2010 |
- 9:01 pm http://www.wired.com/threatlevel/2010/06/wikileaks-chat/#ixzz0uvjJJKyR
This article show why the above parties got into trouble as Lamo gave his information to the FBI and the rest is history
- On May 21, 22-year-old Army intelligence analyst Bradley Manning initiated a series of online chats with former hacker Adrian Lamo after a story on Lamo was published at Wired.com.
-
The chats continued over several days, during which Manning claimed that he was responsible for leaking classified material to the whistleblower site Wikileaks.
Lamo tipped off the FBI and the Army about Manning’s claims, and on May 26, Manning was seized by Army authorities and put into pre-trial detention in Kuwait. He remains in Kuwait while the Army Criminal Investigation Division and other agencies investigate whether he leaked classified information and determine if he should be charged with any crime.
Below are excerpts from the chat logs, which Lamo provided to Wired.com. As received by Wired, the logs contained timestamps but not dates, so the dates below are approximate. We have substituted the instant messenger screen names with real names. The excerpts represent about 25 percent of the logs. Portions of the chats that discuss deeply personal information about Manning or that reveal apparently sensitive military information are not included.
May 21
This initial, brief chat with Lamo occurred after Manning had already sent the ex-hacker an e-mail. Manning very quickly identified his job in the military and his access to classified documents.
(1:41:12 PM) Bradley Manning: hi
(1:44:04 PM) Manning: how are you?
(1:47:01 PM) Manning: im an army intelligence analyst, deployed to eastern baghdad, pending discharge for “adjustment disorder” [. . .]
(1:56:24 PM) Manning: im sure you’re pretty busy…
(1:58:31 PM) Manning: if you had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months, what would you do?
(1:58:31 PM) Adrian Lamo [AUTO-REPLY]: Tired of being tired
(2:17:29 PM) Manning: ?
(6:07:29 PM) Lamo: What’s your MOS?
(3:16:24 AM) Manning: re: “What’s your MOS?” — Intelligence Analyst (35F)May 22
Manning told Lamo that he had provided Wikileaks with 260,000 classified State Department diplomatic cables. Lamo asked him for details on what scandals the cables might expose. Manning didn’t provide a lot of detail, but he pointed to one cable (a “test”) that Wikileaks already published. He didn’t elaborate on what he meant by “test.”
(1:39:03 PM) Manning: i cant believe what im confessing to you :’(
(1:40:20 PM) Manning: ive been so isolated so long… i just wanted to be nice, and live a normal life… but events kept forcing me to figure out ways to survive… smart enough to know whats going on, but helpless to do anything… no-one took any notice of me
(1:40:43 PM) Manning: :’(
(1:43:51 PM) Lamo: back
(1:43:59 PM) Manning: im self medicating like crazy when im not toiling in the supply office (my new location, since im being discharged, im not offically intel anymore)
(1:44:11 PM) Manning: you missed a lot…
(1:45:00 PM) Lamo: what kind of scandal?
(1:45:16 PM) Manning: hundreds of them
(1:45:40 PM) Lamo: like what? I’m genuinely curious about details.
(1:46:01 PM) Manning: i dont know… theres so many… i dont have the original material anymore
(1:46:18 PM) Manning: uhmm… the Holy See and its position on the Vatican sex scandals
(1:46:26 PM) Lamo: play it by ear
(1:46:29 PM) Manning: the broiling one in Germany
(1:47:36 PM) Manning: im sorry, there’s so many… its impossible for any one human to read all quarter-million… and not feel overwhelmed… and possibly desensitized
(1:48:20 PM) Manning: the scope is so broad… and yet the depth so rich
(1:48:50 PM) Lamo: give me some bona fides … yanno? any specifics.
(1:49:40 PM) Manning: this one was a test: Classified cable from US Embassy Reykjavik on Icesave dated 13 Jan 2010
(1:50:30 PM) Manning: the result of that one was that the icelandic ambassador to the US was recalled, and fired
(1:51:02 PM) Manning: thats just one cable…
(1:51:14 PM) Lamo: Anything unreleased?
(1:51:25 PM) Manning: i’d have to ask assange
(1:51:53 PM) Manning: i zerofilled the original
(1:51:54 PM) Lamo: why do you answer to him?
(1:52:29 PM) Manning: i dont… i just want the material out there… i dont want to be a part of it
In this chat, Manning discussed his role as a source for Wikileaks and his interactions with its enigmatic founder, Julian Assange. He also talked about two videos he claimed he provided Wikileaks — one of an airstrike in Iraq in 2007, which he said he gave Wikileaks in February and which Wikileaks said it spent three months decrypting before publishing it this last April; and another video taken during an air strike in Afghanistan in 2009, which Wikileaks has acknowledged it possesses but has not yet published.(2:04:29 PM) Manning: im a source, not quite a volunteer
(2:05:38 PM) Manning: i mean, im a high profile source… and i’ve developed a relationship with assange… but i dont know much more than what he tells me, which is very little
(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange
(2:10:01 PM) Lamo: how’d you do that?
(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly
(2:14:28 PM) Lamo: did that bear out? the surveillance?
(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…
(2:15:57 PM) Manning: they also caught wind that he had a video… of the Gharani airstrike in afghanistan, which he has, but hasn’t decrypted yet… the production team was actually working on the Baghdad strike though, which was never really encrypted
(2:16:22 PM) Manning: he’s got the whole 15-6 for that incident… so it wont just be video with no context
(2:16:55 PM) Manning: but its not nearly as damning… it was an awful incident, but nothing like the baghdad one
(2:17:59 PM) Manning: the investigating officers left the material unprotected, sitting in a directory on a centcom.smil.mil
(2:18:03 PM) Manning: server
(2:18:56 PM) Manning: but they did zip up the files, aes-256, with an excellent password… so afaik it hasn’t been broken yet
(2:19:12 PM) Manning: 14+ chars…
(2:19:37 PM) Manning: i can’t believe what im telling you =LMay 23
(7:19:12 AM) Lamo: hey you
(7:19:19 AM) Lamo: resend?
(7:19:19 AM) Manning: whats up?
(7:19:29 AM) Manning: i just said hello
(7:19:46 AM) Lamo: waking up. got up about an hour ago, 0615.
(7:20:10 AM) Manning: heh, the evening is still young here
(7:20:26 AM) Lamo: how’re you feeling today?
(7:20:37 AM) Manning: im feeling a little better…
(7:20:52 AM) Manning: i had a lot on my mind, keeping to myself
(7:22:18 AM) Lamo: anything new & exciting?
(7:24:21 AM) Manning: no, was outside in the sun all day… 110 degrees F, doing various details for a visiting band and some college team’s cheerleaders…
(7:24:43 AM) Lamo: cheerleaders.
(7:24:46 AM) Manning: ran a barbecue… but no-one showed up… threw a lot of food away
(7:25:20 AM) Manning: yes, football cheerleaders… visiting on off season… apart of Morale Welfare and Recreation (MWR) projects
(7:25:39 AM) Lamo: *sigh*
(7:26:01 AM) Manning: >shrug<
(7:26:37 AM) Manning: im sunburned… and smell like charcoal, sweat, and sunscreen… thats about all thats new
(7:26:47 AM) Lamo: Is there a Baghdad 2600 meeting? ;>
(7:28:04 AM) Manning: there’s only one other person im aware of that actually knows anything about computer security… he’s a SIGINT analyst, of course
(7:28:41 AM) Lamo: Is he the other one who pokes around t he network?
(7:29:26 AM) Manning: no… afaik, he doesn’t play around with classified networks… but im sure he’s capable
(7:30:09 AM) Lamo: then it stands to reason that you have at least 3 people who have some infosec knowledge
(7:31:15 AM) Manning: im not quite sure what you’re saying
(7:31:23 AM) Manning: infosec knowledge of what?
(7:31:29 AM) Manning: the networks?
(7:32:13 AM) Manning: i know a lot of computer security people
(7:32:44 AM) Lamo: i mean, in a way that would lend itself to a meeting.
(7:33:33 AM) Lamo: i’m writing a message trying to tie meetings together globally with a sampling of only ~3000 people to work with and get to go out and evangelize, so i have it on the brain
(7:33:50 AM) Manning: not really… different types of people… know how to, but dont
(7:34:33 AM) Manning: you don’t want these people having a meeting
(7:34:48 AM) Manning: though… i guess you do
(8:01:30 AM) Lamo: Does Assange use AIM or other messaging services? I’d like to chat with him one of these days about opsec. My only credentials beyond intrusion are that the FBI never got my data or found me, before my negotiated surrender, but that’s something.
(8:01:53 AM) Lamo: And my data was never recovered.
(8:02:07 AM) Manning: no he does not use AIM
(8:02:37 AM) Lamo: How would I get ahold of him?
(8:02:59 AM) Manning: he would come to you
(8:03:26 AM) Lamo: I’ve never failed to get ahold of someone.
(8:03:29 AM) Manning: he does use OTR though… but discusses nothing OPSEC
(8:03:42 AM) Lamo: I cornered Ashcroft IRL, in the end.
(8:04:19 AM) Manning: he *might* use the ccc.de jabber server… but you didn’t hear that from me
(8:04:33 AM) Lamo: gotcha
(8:06:00 AM) Manning: im going to grab some dinner, ttyl
(8:06:18 AM) Lamo: http://www.facebook.com/photo.php?pid=31130826&id=704990
(8:06:47 AM) Lamo: i didn’t pass security, either. or rather, i did ;>
(8:06:52 AM) Lamo: enjoy dinner.
(8:06:55 AM) Lamo: twys.
(9:12:38 AM) Manning: bk
(9:22:54 AM) Manning: interesting… marine uniform… illegal, but certainly easy
(9:24:11 AM) Manning: why ashcroft?
(9:24:24 AM) Manning: oh, nevermind… DoJ
(9:24:29 AM) Manning: >yawn<
(9:26:52 AM) Manning: im really not familiar at all with FBI stuff
(9:27:04 AM) Manning: americans have so many more rights than non-americans
(9:31:42 AM) Manning: its awful
(9:46:11 AM) Lamo: Ashcroft´s DOJ tried to use the USA PATRIOT Act on me.
(10:06:24 AM) Lamo: around?
(10:12:34 AM) Manning: yeah
(10:12:57 AM) Lamo: are you baptist by any chance?
(10:13:34 AM) Manning: raised catholic… never believed a word of it
(10:13:59 AM) Manning: im godless… i guess i follow humanist values though
(10:14:15 AM) Manning: have custom dogtags that say “Humanist” [...](10:17:56 AM) Manning: i was the only non-religous person in town
(10:18:17 AM) Manning: more pews than people…
(10:18:37 AM) Manning: i understand them though
(10:18:53 AM) Manning: im not mean to them… they *really* don’t know
(10:19:39 AM) Manning: i politely disagree… but they are the ones who get uncomfortable when i make, very politely, good leading points…
(10:20:48 AM) Manning: (by leading points, i mean ask multiple questions, with obvious answers, then ask a question based on the answers from the previous questions that challenges their normal response to the same question)
(10:21:26 AM) Manning: [excellent example of this: http://www.youtube.com/watch?v=2yhN1IDLQjo]
(10:28:21 AM) Manning: new yorker is running 10k word article on wl.org on 30 may, btw
(10:33:07 AM) Lamo: one moment fone
(10:33:30 AM) Manning: (tracking device)
(10:37:28 AM) Manning: trust level increasing? [quantify]May 25
Lamo asked Manning if he was concerned that the Army’s Criminal Investigation Division might be investigating the Wikileaks investigation. Manning replied that any incriminating evidence of his activities had been erased (“zerofilled”) from his computers. He also discussed the Iraq video he gave Wikileaks and how he felt connected to Army Specialist Ethan McCord, who was pictured in the video carrying wounded children from a van. Manning added McCord as a friend on Facebook after the video came out.
(02:03:10 AM) Manning: amazing how the world works
(02:03:27 AM) Manning: takes 6 degrees of separation to a whole new level
(02:04:12 AM) Lamo: hey, vacaville
(02:04:18 AM) Lamo: er
(02:04:23 AM) Lamo: vacaville
(02:05:12 AM) Manning: its almost bookworthy in itself, how this played
(02:07:41 AM) Manning: event occurs in 2007, i watch video in 2009 with no context, do research, forward information to group of FOI activists, more research occurs, video is released in 2010, those involved come forward to discuss event, i witness those involved coming forward to discuss publicly, even add them as friends on FB… without them knowing who i am
(02:08:37 AM) Manning:they touch my life, i touch their life, they touch my life again… full circle
(02:08:58 AM) Lamo: Life’s funny.
(02:09:24 AM) Lamo: *random* are you concerned aboutCI/CID looking into your Wiki stuff? I was always paranoid.
(02:09:40 AM) Manning: CID has no open investigation
(02:10:28 AM) Manning: State Department will be uber-pissed… but I dont think they’re capable of tracing everything…
(02:10:44 AM) Lamo: what about CI?
(02:10:51 AM) Manning: might be a congressional investigation, and a joint effort to figure out what happened
(02:11:23 AM) Manning: CI probably took note, but it had no effect on operations
(02:11:48 AM) Manning: so, it was publicly damaging, but didn’t increase attacks or rhetoric…
(02:12:10 AM) Lamo: *nod*
(02:12:34 AM) Manning: re: joint effort will be purely political,”fact finding”… “how can we stop this from happening again”
(02:12:46 AM) Manning: regarding State Dept. cables
(02:13:12 AM) Lamo: Would the cables come from State?
(02:13:21 AM) Manning: yes
(02:13:25 AM) Manning: State Department
(02:13:29 AM) Lamo: I was always a commercial intruder.
(02:13:51 AM) Lamo: Why does your job afford you access?
(02:13:59 AM) Lamo: except for the UN.
(02:14:03 AM) Manning: because i have a workstation
(02:14:15 AM) Lamo: and World Bank.
(02:14:17 AM) Manning: *had*
(02:14:36 AM) Lamo: So you have these stored now?
(02:14:54 AM) Manning: i had two computers… one connected to SIPRNET the other to JWICS…
(02:15:07 AM) Manning: no, they’re government laptops
(02:15:18 AM) Manning: they’ve been zerofilled
(02:15:22 AM) Manning: because of the pullout
(02:15:57 AM) Manning: evidence was destroyed… by the system itself
(02:16:10 AM) Lamo: So how would you deploy the cables? If at all.
(02:16:26 AM) Manning: oh no… cables are reports
(02:16:34 AM) Lamo: ah
(02:16:38 AM) Manning: State Department Cable = a Memorandum
(02:16:48 AM) Lamo: embassy cables?
(02:16:54 AM) Manning: yes
(02:17:00 AM) Manning: 260,000 in all
(02:17:10 AM) Manning: i mentioned this previously
(02:17:14 AM) Lamo: yes
(02:17:31 AM) Lamo: stored locally, or retreiveable?
(02:17:35 AM) Manning: brb latrine =P
(02:17:43 AM) Manning: i dont have a copy anymore
(02:17:59 AM) Lamo: *nod*
(02:18:09 AM) Manning: they were stored on a centralized server…
(02:18:34 AM) Lamo: what’s your endgame plan, then?
(02:18:36 AM) Manning: it was vulnerable as fuck
(02:20:57 AM) Manning: well, it was forwarded to WL
(02:21:18 AM) Manning: and god knows what happens now
(02:22:27 AM) Manning: hopefully worldwide discussion, debates, and reforms
(02:23:06 AM) Manning: if not… than we’re doomed
(02:23:18 AM) Manning: as a species
(02:24:13 AM) Manning: i will officially give up on the society we have if nothing happens
(02:24:58 AM) Manning: the reaction to the video gave me immense hope… CNN’s iReport was overwhelmed… Twitter exploded…
(02:25:18 AM) Manning: people who saw, knew there was something wrong
(02:26:10 AM) Manning: Washington Post sat on the video… David Finkel acquired a copy while embedded out here
(02:26:36 AM) Manning: [also reason as to why there's probably no investigation]
(02:28:10 AM) Manning: i want people to see the truth… regardless of who they are… because without information, you cannot make informed decisions as a public
(02:28:10 AM) Lamo : I’m not here right now
(02:28:50 AM) Manning: if i knew then, what i knew now… kind of thing…
(02:29:31 AM) Manning: or maybe im just young, naive, and stupid…
(02:30:09 AM) Lamo: which do you think it is?
(02:30:29 AM) Manning: im hoping for the former
(02:30:53 AM) Manning: it cant be the latter
(02:31:06 AM) Manning: because if it is… were fucking screwed
(02:31:12 AM) Manning: (as a society)
(02:31:49 AM) Manning: and i dont want to believe that we’re screwed
(02:32:53 AM) Manning: food time… ttys
Manning discussed his growing disillusionment with the Army and U.S. foreign policy. He also addressed the lack of security at the base that allowed him to siphon material from classified networks without being noticed and described methods for delivering data to Wikileaks. He asserted that any incriminating evidence of his activity had already been “zeroed” out.(02:26:01 PM) Manning: i dont believe in good guys versus bad guys anymore… i only a plethora of states acting in self interest… with varying ethics and moral standards of course, but self-interest nonetheless
(02:26:18 PM) Manning: s/only/only see/
(02:26:47 PM) Lamo: the tm meant i was being facetious
(02:26:59 PM) Manning: gotchya
(02:27:47 PM) Manning: i mean, we’re better in some respects… we’re much more subtle… use a lot more words and legal techniques to legitimize everything
(02:28:00 PM) Manning: its better than disappearing in the middle of the night
(02:28:19 PM) Manning: but just because something is more subtle, doesn’t make it right
(02:29:04 PM) Manning: i guess im too idealistic
(02:31:02 PM) Manning: i think the thing that got me the most… that made me rethink the world more than anything
(02:35:46 PM) Manning: was watching 15 detainees taken by the Iraqi Federal Police… for printing “anti-Iraqi literature”… the iraqi federal police wouldn’t cooperate with US forces, so i was instructed to investigate the matter, find out who the “bad guys” were, and how significant this was for the FPs… it turned out, they had printed a scholarly critique against PM Maliki… i had an interpreter read it for me… and when i found out that it was a benign political critique titled “Where did the money go?” and following the corruption trail within the PM’s cabinet… i immediately took that information and *ran* to the officer to explain what was going on… he didn’t want to hear any of it… he told me to shut up and explain how we could assist the FPs in finding *MORE* detainees…
(02:35:46 PM) Lamo : I’m not here right now
(02:36:27 PM) Manning: everything started slipping after that… i saw things differently
(02:37:37 PM) Manning: i had always questioned the things worked, and investigated to find the truth… but that was a point where i was a *part* of something… i was actively involved in something that i was completely against…
(02:38:12 PM) Lamo: That could happen in Colombia.
(02:38:21 PM) Lamo: Different cultures, dude.
(02:38:28 PM) Lamo: Life is cheaper.
(02:38:34 PM) Manning: oh im quite aware
(02:38:45 PM) Lamo: What would you do if your role /w Wikileaks seemed in danger of being blown?
(02:38:48 PM) Manning: but i was a part of it… and completely helpless…
(02:39:01 PM) Lamo: sometimes we’re all helpless
(02:39:34 PM) Manning: try and figure out how i could get my side of the story out… before everything was twisted around to make me look like Nidal Hassan
(02:40:15 PM) Manning: i dont think its going to happen
(02:40:26 PM) Manning: i mean, i was never noticed
(02:41:10 PM) Manning: regularly ignored… except when i had something essential… then it was back to “bring me coffee, then sweep the floor”
(02:42:24 PM) Manning: i never quite understood that
(02:42:44 PM) Manning: felt like i was an abused work horse…
(02:43:33 PM) Manning: also, theres god awful accountability of IP addresses…
(02:44:47 PM) Manning: the network was upgraded, and patched up so many times… and systems would go down, logs would be lost… and when moved or upgraded… hard drives were zeroed
(02:45:12 PM) Manning: its impossible to trace much on these field networks…
(02:46:10 PM) Manning: and who would honestly expect so much information to be exfiltrated from a field network?
(02:46:25 PM) Lamo: I’d be one paranoid boy in your shoes.
(02:47:07 PM) Manning: the CM video came from a server in our domain! and not a single person noticed
(02:47:21 PM) Lamo: CM?
(02:48:17 PM) Manning: Apache Weapons Team video of 12 JUL 07 airstrike on Reuters Journos… some sketchy but fairly normal street-folk… and civilians
(02:48:52 PM) Lamo: How long between the leak and the publication?
(02:49:18 PM) Manning: some time in february
(02:49:25 PM) Manning: it was uploaded
(02:50:04 PM) Lamo: uploaded where? how would i transmit something if i had similarly damning data
(02:51:49 PM) Manning: uhm… preferably openssl the file with aes-256… then use sftp at prearranged drop ip addresses
(02:52:08 PM) Manning: keeping the key separate… and uploading via a different means
(02:52:31 PM) Lamo: so i myself would be SOL w/o a way to prearrange
(02:54:33 PM) Manning: not necessarily… the HTTPS submission should suffice legally… though i’d use tor on top of it…
(02:54:43 PM) Manning: but you’re data is going to be watched
(02:54:44 PM) Manning: *your
(02:54:49 PM) Manning: by someone, more than likely
(02:54:53 PM) Lamo: submission where?
(02:55:07 PM) Manning: wl.org submission system
(02:55:23 PM) Lamo: in the massive queue?
(02:55:54 PM) Manning: lol, yeah, it IS pretty massive…
(02:55:56 PM) Manning: buried
(02:56:04 PM) Manning: i see what you mean
(02:56:35 PM) Manning: long term sources do get preference… i can see where the “unfairness” factor comes in
(02:56:53 PM) Lamo: how does that preference work?
(02:57:47 PM) Manning: veracity… the material is easy to verify…
(02:58:27 PM) Manning: because they know a little bit more about the source than a purely anonymous one
(02:59:04 PM) Manning: and confirmation publicly from earlier material, would make them more likely to publish… i guess…
(02:59:16 PM) Manning: im not saying they do… but i can see how that might develop
(03:00:18 PM) Manning: if two of the largest public relations “coups” have come from a single source… for instance
(03:02:03 PM) Manning: you yeah… purely *submitting* material is more likely to get overlooked without contacting them by other means and saying hey, check your submissions for x…
Manning described the first time he watched the Iraq video, after finding it in a network directory where an Army JAG officer left it. He speculated that Washington Post writer and book author David Finkel already had a copy of the video when he wrote his book The Good Soldiers, published last year. (Finkel addressed this issue recently.)(03:07:26 PM) Manning: i recognized the value of some things…
(03:07:33 PM) Manning: knew what they meant… dug deeper
(03:07:53 PM) Manning: i watched that video cold, for instance
(03:10:32 PM) Manning: at first glance… it was just a bunch of guys getting shot up by a helicopter… no big deal… about two dozen more where that came from right… but something struck me as odd with the van thing… and also the fact it was being stored in a JAG officer’s directory… so i looked into it… eventually tracked down the date, and then the exact GPS co-ord… and i was like… ok, so thats what happened… cool… then i went to the regular internet… and it was still on my mind… so i typed into goog… the date, and the location… and then i see this http://www.nytimes.com/2007/07/13/world/middleeast/13iraq.html
(03:11:07 PM) Manning: i kept that in my mind for weeks… probably a month and a half… before i forwarded it to [Wikileaks]
(03:11:54 PM) Manning: then there was the Finkel book
(03:12:16 PM) Manning: im almost certain he had a copy
Manning discussed how common and easy it was for soldiers to bring removable media into their work environment, making it easy for him, or anyone else, to siphon data from classified networks without raising suspicion.(01:52:30 PM) Manning: funny thing is… we transffered so much data on unmarked CDs…
(01:52:42 PM) Manning: everyone did… videos… movies… music
(01:53:05 PM) Manning: all out in the open
(01:53:53 PM) Manning: bringing CDs too and from the networks was/is a common phenomeon
(01:54:14 PM) Lamo: is that how you got the cables out?
(01:54:28 PM) Manning: perhaps
(01:54:42 PM) Manning: i would come in with music on a CD-RW
(01:55:21 PM) Manning: labelled with something like “Lady Gaga”… erase the music… then write a compressed split file
(01:55:46 PM) Manning: no-one suspected a thing
(01:55:48 PM) Manning: =L kind of sad
(01:56:04 PM) Lamo: and odds are, they never will
(01:56:07 PM) Manning: i didnt even have to hide anything
(01:56:36 PM) Lamo: from a professional perspective, i’m curious how the server they were on was insecure
(01:57:19 PM) Manning: you had people working 14 hours a day… every single day… no weekends… no recreation…
(01:57:27 PM) Manning: people stopped caring after 3 weeks
(01:57:44 PM) Lamo: i mean, technically speaking
(01:57:51 PM) Lamo: or was it physical
(01:57:52 PM) Manning: >nod<
(01:58:16 PM) Manning: there was no physical security
(01:58:18 PM) Lamo: it was physical access, wasn’t it
(01:58:20 PM) Lamo: hah
(01:58:33 PM) Manning: it was there, but not really
(01:58:51 PM) Manning: 5 digit cipher lock… but you could knock and the door…
(01:58:55 PM) Manning: *on
(01:59:15 PM) Manning: weapons, but everyone has weapons
(02:00:12 PM) Manning: everyone just sat at their workstations… watching music videos / car chases / buildings exploding… and writing more stuff to CD/DVD… the culture fed opportunities
(02:01:44 PM) Manning: hardest part is arguably internet access… uploading any sensitive data over the open internet is a bad idea… since networks are monitored for any insurgent/terrorist/militia/criminal types
(02:01:52 PM) Lamo: tor?
(02:02:13 PM) Manning: tor + ssl + sftp
(02:02:33 PM) Lamo: *nod*
(02:03:05 PM) Lamo: not quite how i might do it, but good
(02:03:22 PM) Manning: i even asked the NSA guy if he could find any suspicious activity coming out of local networks… he shrugged and said… “its not a priority”
(02:03:53 PM) Manning: went back to watching “Eagle’s Eye”
(02:12:23 PM) Manning: so… it was a massive data spillage… facilitated by numerous factors… both physically, technically, and culturally
(02:13:02 PM) Manning:: perfect example of how not to do INFOSEC
(02:14:21 PM) Manning: listened and lip-synced to Lady Gaga’s Telephone while exfiltratrating possibly the largest data spillage in american history
(02:15:03 PM) Manning: pretty simple, and unglamorous
(02:16:37 PM) Manning: *exfiltrating
(02:17:56 PM) Manning: weak servers, weak logging, weak physical security, weak counter-intelligence, inattentive signal analysis… a perfect storm
(02:19:03 PM) Manning: >sigh<
(02:19:19 PM) Manning: sounds pretty bad huh?
(02:20:06 PM) Lamo: kinda
(02:20:25 PM) Manning: :L
(02:20:52 PM) Lamo: i mean, for the .mil
(02:21:08 PM) Manning: well, it SHOULD be better
(02:21:32 PM) Manning: its sad
(02:22:47 PM) Manning: i mean what if i were someone more malicious
(02:23:25 PM) Manning: i could’ve sold to russia or china, and made bank?
(02:23:36 PM) Lamo: why didn’t you?
(02:23:58 PM) Manning: because it’s public data
(02:24:15 PM) Lamo: i mean, the cables
(02:24:46 PM) Manning: it belongs in the public domain
(02:25:15 PM) Manning: information should be free
(02:25:39 PM) Manning: it belongs in the public domain
(02:26:18 PM) Manning: because another state would just take advantage of the information… try and get some edge
(02:26:55 PM) Manning: if its out in the open… it should be a public good
(02:27:04 PM) Manning: *do the
(02:27:23 PM) Manning: rather than some slimy intel collector
(02:29:18 PM) Manning: im crazy like that
(03:38:07 PM) Manning: its not much of a pic, but here’s harry ponting http://farm4.static.flickr.com/3161/2814062024_c39d25f27d.jpg the man who’s mission it is to sell the benefits of NCD throughout the State Department, Military, and IC
(03:38:18 PM) Manning: i feel terribly, terribly sorry for the guy
(03:39:17 PM) Manning: im not a bad person, i keep track of everything
(03:39:30 PM) Manning: i watch the whole thing unfold… from a distance
(03:40:07 PM) Manning: i read what everyone says… look at pictures… keep tabs… and feel for them
(03:40:18 PM) Manning: since im basically playing a vital role in their life
(03:40:29 PM) Manning: without ever meeting them
(03:40:53 PM) Manning: i was like that as an intelligence analyst as well
(03:41:09 PM) Lamo: i know the feeling, in a way.
(03:41:44 PM) Manning: most didnt care… but i knew, i was playing a role in the lives of hundreds of people, without them knowing them… but i cared, and kept track of some of the details, make sure everybody was okay
(03:42:07 PM) Manning: them knowing me
(03:43:27 PM) Manning: i dont think of myself as playing “god” or anything, because im not… im just playing my role for the moment… i dont control the way they react
(03:44:15 PM) Manning: there are far more people who do what i do, in state interest, on daily basis, and dont give a fuck
(03:45:01 PM) Manning: thats how i try to separate myself
(03:45:13 PM) Manning: from my (former) colleagues
Lamo asked what additional material Manning gave to Julian Assange at Wikileaks.(04:32:05 PM) Manning: oh, the JTF GTMO papers… Assange has those too
(04:32:16 PM) Lamo: Read it.
(04:33:21 PM) Lamo: Anything else interesting on his table, as a former collector of interesting .com info?
(04:33:44 PM) Manning: idk… i only know what i provide him xD
(04:34:14 PM) Lamo: what do you consider the highlights?
(04:35:31 PM) Manning: The Gharani airstrike videos and full report, Iraq war event log, the “Gitmo Papers”, and State Department cable database
(04:35:50 PM) Lamo: Not too shabby.
(04:36:03 PM) Manning: thats just me….
(04:36:26 PM) Manning: idk about the rest… he *hopefully* has more
(04:42:16 PM) Manning: im not sure whether i’d be considered a type of “hacker”, “cracker”, “hacktivist”, “leaker” or what…
(04:42:26 PM) Manning: im just me… really
(04:44:21 PM) Manning: starts off like every physics / astro class intro… ever
(04:44:21 PM) Lamo : I’m not here right now
(04:44:45 PM) Manning: albeit without the algebraic proofs
(04:45:20 PM) Lamo: or a spy
(04:45:48 PM) Manning: i couldn’t be a spy…
(04:45:59 PM) Manning: spies dont post things up for the world to see
(04:46:14 PM) Lamo: Why? Wikileaks would be the perfect cover
(04:46:23 PM) Lamo: They post what’s not useful
(04:46:29 PM) Lamo: And keep the rest(Image: Facebook.com)
Read More http://www.wired.com/threatlevel/2010/06/wikileaks-chat/#ixzz0uvkXM7ui
July 25, 2010
Browse by Type
Browse by Category
Browse by Region
Browse by Affiliation
Browse by Date
Browse by Severity
Community resources
July 25, 2010
Mirror of this website
Summary
25th July 2010 5:00 PM EST WikiLeaks has released a document set called the Afghan War Diary, an extraordinary compendium of over 91,000 reports covering the war in Afghanistan from 2004 to 2010.
The reports, while written by soldiers and intelligence officers, and mainly describing lethal military actions involving the United States military, also include intelligence information, reports of meetings with political figures, and related details.
The document collection is available on a dedicated webpage. http://wardiary.wikileaks.org/
The reports cover most units from the US Army with the exception of most US Special Forces' activities. The reports do not generally cover top secret operations or European and other ISAF Forces operations.
We have delayed the release of some 15,000 reports from the total archive as part of a harm minimization process demanded by our source. After further review, these reports will be released, with occasional redactions, and eventually in full, as the security situation in Afghanistan permits.
The data is provided in HTML (web), CSV (comma-separated values) and SQL (database) formats, and was rendered into KML (Keyhole Markup Language) mapping data that can be used with Google Earth. Please note that the checksums will change.
- Complete dump of the website, HTML format 75 MB
- (SHA1: 80adb634a0d218bd0f9a0f22734e3d2e7e67acfc)
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary.html.7z
- This is a complete dump of the website at http://wardiary.wikileaks.org. Extract this to your local hard disk and open it with your web browser. Please check the project website http://wardiary.wikileaks.org for the most recent version.
- All entries, CSV format 15 MB
- (SHA1: d6b82f955a7beb9589f92e9487c74669d1912a34)
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary.csv.7z
- Raw data in comma-separated value format for further processing.
- All entries, SQL format 16M MB
- (SHA1: 9463f73ebbcd3f95899a138d6ba9817e1b6b800d)
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary.sql.7z
- Raw data in SQL format for further processing.
- All entries, KML format 16 MB
- (SHA1: 34562c0c7722522161e40330d80ac9082014845f)
- This archive contains all events in one KML file. This file needs much memory if opened with Google Earth.
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary.7z
- All NATO entries, KML format 209 kB
- (SHA1: 088ff8999a316f30e5e398021375fa3b4fc6349e)
- Contains the events that were tagged with NATO.
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary-nato.7z
- Entries by month, KML format 16 MB
- (SHA1: 01a5c0639e1e1e844b10e962a44849b2a521d092)
- This archive provides the entries split by month. This makes it easier to browse the data in Google Earth on low power machines.
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary_by-month.7z
- Entries with scale filter, KML format 981 kB
- (SHA1: 4669c721b87775a44472f6688e768305c686beff)
- http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/afg-war-diary_scale1dot5.7z
- File that will show a scale corresponding to the number of incidents in Google Earth. Each incident begins with a 0.5 base score, and 0.1 has been added for each incident involving humans. This set of data provides only events that have a scaling of 1.5.
To decompress the files you will need the program 7zip. A free client for Windows can be downloaded here. http://www.wikileaks.org/wiki/Special:Jump/aHR0cDovL3d3dy43LXppcC5vcmcv
Please use your favorite search engine to find clients for other operating systems; these include p7zip http://www.wikileaks.org/wiki/Special:Jump/aHR0cDovL3NvdXJjZWZvcmdlLm5ldC9wcm9qZWN0cy9wN3ppcC8=
for Unix/Linux and EZ7z for Mac. http://www.wikileaks.org/wiki/Special:Jump/aHR0cDovL3d3dy5tYWN1cGRhdGUuY29tL2luZm8ucGhwL2lkLzE5MTM5L2V6N3o=
Further information
Sunday, July 26 5pm EST.
WikiLeaks today released over 75,000 secret US military reports covering the war in Afghanistan.
The Afghan War Diary an extraordinary secret compendium of over 91,000 reports covering the war in Afghanistan from 2004 to 2010. The reports describe the majority of lethal military actions involving the United States military. They include the number of persons internally stated to be killed, wounded, or detained during each action, together with the precise geographical location of each event, and the military units involved and major weapon systems used.
The Afghan War Diary is the most significant archive about the reality of war to have ever been released during the course of a war. The deaths of tens of thousands is normally only a statistic but the archive reveals the locations and the key events behind each most of these deaths. We hope its release will lead to a comprehensive understanding of the war in Afghanistan and provide the raw ingredients necessary to change its course.
Most entries have been written by soldiers and intelligence officers listening to reports radioed in from front line deployments. However the reports also contain related information from Marines intelligence, US Embassies, and reports about corruption and development activity across Afghanistan.
Each report consists of the time and precise geographic location of an event that the US Army considers significant. It includes several additional standardized fields: The broad type of the event (combat, non-combat, propaganda, etc.); the category of the event as classified by US Forces, how many were detained, wounded, and killed from civilian, allied, host nation, and enemy forces; the name of the reporting unit and a number of other fields, the most significant of which is the summary - an English language description of the events that are covered in the report.
The Diary is available on the web and can be viewed in chronological order and by by over 100 categories assigned by the US Forces such as: "escalation of force", "friendly-fire", "development meeting", etc. The reports can also be viewed by our "severity" measure-the total number of people killed, injured or detained. All incidents have been placed onto a map of Afghanistan and can be viewed on Google Earth limited to a particular window of time or place. In this way the unfolding of the last six years of war may be seen.
The material shows that cover-ups start on the ground. When reporting their own activities US Units are inclined to classify civilian kills as insurgent kills, downplay the number of people killed or otherwise make excuses for themselves. The reports, when made about other US Military units are more likely to be truthful, but still down play criticism. Conversely, when reporting on the actions of non-US ISAF forces the reports tend to be frank or critical and when reporting on the Taliban or other rebel groups, bad behavior is described in comprehensive detail. The behavior of the Afghan Army and Afghan authorities are also frequently described.
The reports come from US Army with the exception most Special Forces activities. The reports do not generally cover top-secret operations or European and other ISAF Forces operations. However when a combined operation involving regular Army units occurs, details of Army partners are often revealed. For example a number of bloody operations carried out by Task Force 373, a secret US Special Forces assassination unit, are exposed in the Diary -- including a raid that lead to the death of seven children.
This archive shows the vast range of small tragedies that are almost never reported by the press but which account for the overwhelming majority of deaths and injuries.
We have delayed the release of some 15,000 reports from total archive as part of a harm minimization process demanded by our source. After further review, these reports will be released, with occasional redactions, and eventually, in full, as the security situation in Afghanistan permits.
Additional information from our media partners:
- Der Spiegel: http://www.spiegel.de/international/world/0,1518,708314,00.html
- The Guardian: http://www.guardian.co.uk/world/series/afghanistan-the-war-logs
- The New York Times: http://www.nytimes.com/interactive/world/war-logs.html
Afghan War Diary - Reading guide
The Afghan War Diary (AWD for short) consists of messages from several important US military communications systems. The messaging systems have changed over time; as such reporting standards and message format have changed as well. This reading guide tries to provide some helpful hints on interpretation and understanding of the messages contained in the AWD.
Most of the messages follow a pre-set structure that is designed to make automated processing of the contents easier. It is best to think of the messages in the terms of an overall collective logbook of the Afghan war. The AWD contains the relevant events, occurrences and intelligence experiences of the military, shared among many recipients. The basic idea is that all the messages taken together should provide a full picture of a days important events, intelligence, warnings, and other statistics. Each unit, outpost, convoy, or other military action generates report about relevant daily events. The range of topics is rather wide: Improvised Explosives Devices encountered, offensive operations, taking enemy fire, engagement with possible hostile forces, talking with village elders, numbers of wounded, dead, and detained, kidnappings, broader intelligence information and explicit threat warnings from intercepted radio communications, local informers or the afghan police. It also includes day to day complaints about lack of equipment and supplies.
The description of events in the messages is often rather short and terse. To grasp the reporting style, it is helpful to understand the conditions under which the messages are composed and sent. Often they come from field units who have been under fire or under other stressful conditions all day and see the report-writing as nasty paperwork, that needs to be completed with little apparent benefit to expect. So the reporting is kept to the necessary minimum, with as little type-work as possible. The field units also need to expect questions from higher up or disciplinary measures for events recorded in the messages, so they will tend to gloss over violations of rules of engagement and other problematic behavior; the reports are often detailed when discussing actions or interactions by enemy forces. Once it is in the AWD messages, it is officially part of the record - it is subject to analysis and scrutiny. The truthfulness and completeness especially of descriptions of events must always be carefully considered. Circumstances that completely change the meaning of an reported event may have been omitted.
The reports need to answer the critical questions: Who, When, Where, What, With whom, by what Means and Why. The AWD messages are not addressed to individuals but to groups of recipients that are fulfilling certain functions, such as duty officers in a certain region. The systems where the messages originate perform distribution based on criteria like region, classification level and other information. The goal of distribution is to provide those with access and the need to know, all of the information that relevant to their duties. In practice, this seems to be working imperfectly. The messages contain geo-location information in the forms of latitude-longitude, military grid coordinates and region.
The messages contain a large number of abbreviations that are essential to understanding its contents. When browsing through the messages, underlined abbreviations pop up an little explanation, when the mouse is hovering over it. The meanings and use of some shorthands have changed over time, others are sometimes ambiguous or have several meanings that are used depending on context, region or reporting unit. If you discover the meaning of a so far unresolved acronym or abbreviations, or if you have corrections, please submit them to wl-office@sunshinepress.org.
An especially helpful reference to names of military units and task-forces and their respective responsibilities can be found at http://www.globalsecurity.org/military/ops/enduring-freedom.htm
The site also contains a list of bases, airfields http://www.globalsecurity.org/military/facility/afghanistan.htm Location names are also often shortened to three-character acronyms.
Messages may contain date and time information. Dates are mostly presented in either US numeric form (Year-Month-Day, e.g. 2009-09-04) or various Euro-style shorthands (Day-Month-Year, e.g. 2 Jan 04 or 02-Jan-04 or 2jan04 etc.).
Times are frequently noted with a time-zone identifier behind the time, e.g. "09:32Z". Most common are Z (Zulu Time, aka. UTC time zone), D (Delta Time, aka. UTC + 4 hours) and B (Bravo Time, aka UTC + 2 hours). A full list off time zones can be found here: http://www.timeanddate.com/library/abbreviations/timezones/military/
Other times are noted without any time zone identifier at all. The Afghanistan time zone is AFT (UTC + 4:30), which may complicate things further if you are looking up messages based on local time.
Finding messages relating to known events may be complicated by date and time zone shifting; if the event is in the night or early morning, it may cause a report to appear to be be misfiled. It is advisable to always look through messages before and on the proceeding day for any event.
David Leigh, the Guardian's investigations editor, explains the online tools they have created to help you understand the secret US military files on the war in Afghanistan: http://www.guardian.co.uk/world/datablog/video/2010/jul/25/afghanistan-war-logs-video-tutorial
Understanding the structure of the report- The message starts with a unique ReportKey; it may be used to find messages and also to reference them.
- The next field is DateOccurred; this provides the date and time of the event or message. See Time and Date formats for details on the used formats.
- Type contains typically a broad classification of the type of event, like Friendly Action, Enemy Action, Non-Combat Event. It can be used to filter for messages of a certain type.
- Category further describes what kind of event the message is about. There are a lot of categories, from propaganda, weapons cache finds to various types of combat activities.
- TrackingNumber Is an internal tracking number.
- Title contains the title of the message.
- Summary is the actual description of the event. Usually it contains the bulk of the message content.
- Region contains the broader region of the event.
- AttackOn contains the information who was attacked during an event.
- ComplexAttack is a flag that signifies that an attack was a larger operation that required more planning, coordination and preparation. This is used as a quick filter criterion to detect events that were out of the ordinary in terms of enemy capabilities.
- ReportingUnit, UnitName, TypeOfUnit contains the information on the military unit that authored the report.
- Wounded and death are listed as numeric values, sorted by affiliation. WIA is the abbreviation for Wounded In Action. KIA is the abbreviation for Killed In Action. The numbers are recorded in the fields FriendlyWIA,FriendlyKIA,HostNationWIA,HostNationKIA,CivilianWIA,CivilianKIA,EnemyWIA,EnemyKIA
- Captured enemies are numbered in the field EnemyDetained.
- The location of events are recorded in the fields MGRS (Military Grid Reference System), Latitude, Longitude.
- The next group of fields contains information on the overall military unit, like ISAF Headquarter, that a message originated from or was updated by. Updates frequently occur when an analysis group, like one that investigated an incident or looked into the makeup of an Improvised Explosive Device added its results to a message.
- OriginatorGroup, UpdatedByGroup
- CCIR Commander's Critical Information Requirements
- If an activity that is reported is deemed "significant", this is noted in the field Sigact. Significant activities are analyzed and evaluated by a special group in the command structure.
- Affiliation describes if the event was of friendly or enemy nature.
- DColor controls the display color of the message in the messaging system and map views. Messages relating to enemy activity have the color Red, those relating to friendly activity are colored Blue.
- Classification contains the classification level of the message, e.g. Secret
Help us extend and defend this work