Slideshow
-
Cute Kajal Agarwal
Telugu Movie WP -
The hottest lips are seeing red
Actress WP -
17 Cheating Pictures Collection
Adults Only -
10 Unique Houses From Around the World
Scenery Wallpapers -
Small Birds have big Love
Birds WallPapers -
Cute Kiss
Love Wallpapers -
Black Taj Mahal
Truth About Blak Taj Mahaal -
India Festival Art painting
Oil Pinting Wp -
beautiful sceneries wallpapers
Scenery WP -
Cat And Bird Cute Friendship
Birds WP -
ed ed 6 Most Popular Ways Of Couple Hugging
Adults WP -
Indian Village Paintings
Oil Pinting Wp -
Awsome moments on well & girls
Oil Painting Wp -
hansika visits simbu birthday party
Actress WP
Osama bin Mohammed bin Awad bin Laden is still alive in nuristan, afghanisthan.
President Barack Obama has decided not to release any photos of the deceased Osama bin Laden, and reports of his death are baseless, Karachi-based GEO Television reported, citing a statement from the group.
US President Barrack Obama plays politics. If he was really died, please release all Laden dead body photos.
The data revealed names of Indian entities including two apparently linked firms — Annapurna Convertible and Anna Investments — and two individuals Asad Ali Khan and Zahida Ali Khan.
The story was reported by the television channel, Headlines Today, which said that it was not in a position to verify the details. Elmer is a former employee of Swiss bank Julius Baer and the bank has said he had leaked the accounts motivated by unfulfilled career expectations.
Although information is sketchy, it might lead to more leads.
Annapurna Convertibles reportedly has $85 million and Anna Investments $9.7 million in Julius Baer bank. These are among the 2,000 names in two discs Rudolf Elmer gave WikiLeaks.
These are believed to be account details of prominent people and WikiLeaks founder Julian Assange has promised to provide details.
The data is not yet available on the WikiLeaks website. It was held on two discs handed over by Elmer at a press conference in London. Assange promised full disclosure once information had been vetted.
Elmer is scheduled to go on trial in Switzerland on Wednesday for breaking bank secrecy laws.
The banker, who has given data to WikiLeaks before, was fired from Julius Baer in 2002.

At a London news conference on Monday, Elmer, former chief of the office of the Julius Baer Bank in the Cayman Islands, handed to Assange what he said were two discs containing information on about 2,000 offshore banking clients.
|
|
Assange indicated WikiLeaks and possibly media organizations would review Elmer's material before making it public. He said this would take at least "a couple of weeks."
Two sources familiar with the material said it was dense and not self-explanatory. One of the sources said the material contained a handful of names that might be recognizable.
Even in cases where names seemed familiar, the source said, there is no way to be sure from the material supplied to WikiLeaks of the identities of account holders and further investigation would have to be done to confirm the account holders' identity.
Jack Blum, a former Congressional investigator and Washington lawyer who has been advising Elmer, said Elmer would not be releasing any names or corporate names from the data cache because the account data outlined financial "structures" which are "difficult to figure out what is going on."
Blum also cautioned that even if account holders' identities can be confirmed, this does not constitute evidence that such people are engaged in offshore tax evasion.
Blum said government investigators would be in the best position to confirm the identities of people involved in transactions documented by Elmer's material.
Sources close to Elmer said some, if not most, of the material in his cache had been made available to government investigators in countries whose identities remain unknown.
Assange said WikiLeaks might hand over some of the material to Britain's Serious Fraud Office.
Elmer, who was fired by Julius Baer in 2002, is due to go on trial in Switzerland on Wednesday for breaching bank secrecy. The bank has accused Elmer of pursuing a vendetta against the company.
Elmer and his lawyer maintain the Swiss prosecution is unfair because the material he allegedly leaked -- including some material on alleged offshore tax evasion abuses published by WikiLeaks -- originated in the Cayman Islands, where Swiss authorities arguably lack jurisdiction.
A television channel today claimedthat some Indian-sounding names figure in the Swiss Banksecret accounts data which were handed over to Wikileaksfounder Julian Assange by a former Swiss banker.
The channel, Headlines Today, showed a listpurportedly containing names of the secret account holders inJulius Baer Bank and Trust Ltd, a Swiss Bank. The list washanded over by one of its former employees Rudolf Elmer toAssange.
The channel showed the list purportedly containingIndian- sounding names but made it clear that it could notindependently verify the genuineness of the identity of theaccount holders or whether they are Indians or not.
Two entities had purportedly parked about USD 95million (about Rs 432 crore).
Elmer told the channel, "I think that owner of JuliusBaer is very much in the business of India. They actuallyhired investment managers sitting in India for getting moneyout of India." PTI KKS CS VSC
Overview
Update: On July 6, 2010, Private Bradley Manning, a 22 year old intelligence analyst with the United States Army in Baghdad, was charged with disclosing this video (after allegedly speaking to an unfaithful journalist). The whistleblower behind the Pentagon Papers, Daniel Ellsberg, has called Mr. Manning a 'hero'. He is currently imprisoned in Kuwait. The Apache crew and those behind the cover up depicted in the video have yet to be charged. To assist Private Manning, please see bradleymanning.org.5th April 2010 10:44 EST WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad -- including two Reuters news staff.
Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.
The military did not reveal how the Reuters staff were killed, and stated that they did not know how the children were injured.
After demands by Reuters, the incident was investigated and the U.S. military concluded that the actions of the soldiers were in accordance with the law of armed conflict and its own "Rules of Engagement".
Consequently, WikiLeaks has released the classified Rules of Engagement for 2006, 2007 and 2008, revealing these rules before, during, and after the killings.
WikiLeaks has released both the original 38 minutes video and a shorter version with an initial analysis. Subtitles have been added to both versions from the radio transmissions.
WikiLeaks obtained this video as well as supporting documents from a number of military whistleblowers. WikiLeaks goes to great lengths to verify the authenticity of the information it receives. We have analyzed the information about this incident from a variety of source material. We have spoken to witnesses and journalists directly involved in the incident.
WikiLeaks wants to ensure that all the leaked information it receives gets the attention it deserves. In this particular case, some of the people killed were journalists that were simply doing their jobs: putting their lives at risk in order to report on war. Iraq is a very dangerous place for journalists: from 2003- 2009, 139 journalists were killed while doing their work.
According to reports, Suri's close aide Bhanu allegedly shot him two bullets. One on his chest and other on stomach. Cops have suspected that the differences over political and land deals could be the reasons behind the murder. The incident has shocked Andhra Pradesh and Ananthpur district is on high alert.

There were six prisoners in the barrack, including Seenu and Om Prakash, the latter having been shifted there only 10 days ago. There was no clear explanation from the jail authorities on how the dumb-bell found its way into the barrack housing remand prisoners with hardcore criminal background.
Seenu’s wife alleged in her native village in Guntur that he was killed by Maddalacheruvu Suryanarayana Reddy alias Suri, his one-time mentor with whom he had fallen apart. Suri is lodged in the Godavari block of Anantapur jail while Seenu was in the Yamuna block.
Superintendent of Police M.K. Singh, who interrogated Om Prakash, said the attack could have occurred around 4.30 a.m. The prisoner complained that Seenu had been harassing him ever since he was shifted to this barrack and they had several rounds of arguments over switching off lights early and over watching television. The latest was on Saturday night when Seenu switched off the lights when Om Prakash was writing ‘Rama Koti’.
Om Prakash had admitted to attacking Seenu with the dumb-bell repeatedly as he was vexed with the latter’s ‘domination and harassment’, the SP explained.
Meanwhile, DIG of Prisons (Rayalaseema) Sunil Kumar suspended two warders B.L. Mallikarjuna and Vasantha Kumar for negligence in duties while police registered a case of murder against Om Prakash under Section 302 of IPC.
Mahabubnagar Correspondent adds:
Chief Minister Y.S. Rajasekhara Reddy announced that the State government was prepared to order any kind of inquiry as per the wishes of Leader of the Opposition N. Chandrababu Naidu into the murder of Seenu.
He told mediapersons that there was no need for his government to eliminate Seenu and accused Mr. Naidu of being an expert in levelling such ‘sub-standard’ allegations. To a query, he said that he did not know whether there were any lethal weapons in the barrack in which Seenu was lodged.

Rahul Gandhi, the "crown prince" of Indian politics, told the US ambassador at a lunch last year that Hindu extremist groups could pose a greater threat to his country than Muslim militants.
In controversial comments likely to cause a storm in India, Gandhi – considered a likely prime ministerial candidate and a scion of the country's leading political family – warned Timothy Roemer that although "there was evidence of some support for [Islamic terrorist group Laskar-e-Taiba] among certain elements in India's indigenous Muslim community, the bigger threat may be the growth of radicalised Hindu groups, which create religious tensions and political confrontations with the Muslim community".
The 40-year-old politician, the son of the Congress party president, Sonia Gandhi, told the ambassador that "the risk of a "homegrown" extremist front, reacting to terror attacks coming from
The
"To do so he will have to demonstrate determination, depth, savvy and stamina. He will need to get his hands dirty in the untidy and ruthless business that is Indian politics," one said in a cable entitled The son also rises: Rahul Gandhi takes another step towards top job.
Other cables talk of Gandhi's political inexperience and repeated gaffes. They also repeat cutting criticism from political analysts and journalists.
However as Gandhi warmed to the
"[Gandhi] came off as a practiced politician who knew how to get his message across, was precise and articulate and demonstrated a mastery that belied the image some have of [him] as a dilettante," the official said.
In November last year, after a meeting with the
A cable from February this year describes him as "increasingly sure-footed".
For Roemer, writing after the lunch during which Gandhi had commented on extremism, "the rising profile of young leaders like Rahul Gandhi provides [the
US embassy cables: Ambassador warned that radical Hindu groups may pose bigger threat than LeT in India
Summary
- In a review of the career and potential of Rahul Gandhi, 40-year old heir apparent to the leadership of India's ruling Congress party, the US ambassador reports conversations with the young politician, speaking appreciatively of recent statements and potential for the future. Key passages highlighted in yellow.
2. (C) During the Secretary's July 20 meetings in
Rural Strategy
----
3. (C) Gandhi stressed that his focus in the upcoming months would be on state assembly elections in
Honeymoon is Over
----
4. (C) Noting that the Congress Party victory in this past spring's parliamentary elections had put the United Progressive Alliance (UPA) government in a comfortable position, Gandhi still expressed concerns about the numerous challenges regarding the UPA's ability to implement its programs in Parliament. He said that the honeymoon period had been short and he now expected the BJP and Left Parties would be unrelenting critics of the government's program. Speaking while the budget session of Parliament was ongoing, Gandhi touched on the difficulties in keeping the UPA coalition on the right track. (Note: This conversation took place before the full scope of opposition to the July 16 Indo-Pakistani joint statement in Sharm el Sheikh had become apparent. End Note.)
Creeping Radicalization?
----
5. (C) Responding to the Ambassador's query about Lashkar-e-Taiba's activities in the region and immediate threat to
Comment
----
6. (C) Gandhi was forthright in describing the challenges faced by the Congress Party and the UPA government in the months ahead. Over the past four years, he was an elusive contact, but he could be interested in reaching out to the
young members of the new generation of parliamentarians. Gandhi mentioned that in the recent election 60 members of the new Parliament were 45 or younger. In a system long viewed as relatively static, the influx of new faces and the rising profile of young leaders like Rahul Gandhi provides us an opening to expand the constituency in support of the strategic partnership with a long term horizon.
What is Wikileaks ?

WikiLeaks has sustained and triumphed against legal and political attacks designed to silence our publishing organisation, our journalists and our anonymous sources. The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. We derive these principles from the Universal Declaration of Human Rights. In particular, Article 19 inspires the work of our journalists and other volunteers. It states that everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. We agree, and we seek to uphold this and the other Articles of the Declaration.
1.2 How WikiLeaks works
WikiLeaks has combined high-end security technologies with journalism and ethical principles. Like other media outlets conducting investigative journalism, we accept (but do not solicit) anonymous sources of information. Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies. This provides maximum protection to our sources. We are fearless in our efforts to get the unvarnished truth out to the public. When information comes in, our journalists analyse the material, verify it and write a news piece about it describing its significance to society. We then publish both the news story and the original material in order to enable readers to analyse the story in the context of the original source material themselves. Our news stories are in the comfortable presentation style of Wikipedia, although the two organisations are not otherwise related. Unlike Wikipedia, random readers can not edit our source documents.As the media organisation has grown and developed, WikiLeaks been developing and improving a harm minimisation procedure. We do not censor our news, but from time to time we may remove or significantly delay the publication of some identifying details from original documents to protect life and limb of innocent people.
We accept leaked material in person and via postal drops as alternative methods, although we recommend the anonymous electronic drop box as the preferred method of submitting any material. We do not ask for material, but we make sure that if material is going to be submitted it is done securely and that the source is well protected. Because we receive so much information, and we have limited resources, it may take time to review a source’s submission.
We also have a network of talented lawyers around the globe who are personally committed to the principles that WikiLeaks is based on, and who defend our media organisation.
1.3 Why the media (and particularly Wiki leaks) is important
Publishing improves transparency, and this transparency creates a better society for all people. Better scrutiny leads to reduced corruption and stronger democracies in all society’s institutions, including government, corporations and other organisations. A healthy, vibrant and inquisitive journalistic media plays a vital role in achieving these goals. We are part of that media.Scrutiny requires information. Historically, information has been costly in terms of human life, human rights and economics. As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered. In its landmark ruling on the Pentagon Papers, the US Supreme Court ruled that "only a free and unrestrained press can effectively expose deception in government." We agree.
We believe that it is not only the people of one country that keep their own government honest, but also the people of other countries who are watching that government through the media.
In the years leading up to the founding of WikiLeaks, we observed the world’s publishing media becoming less independent and far less willing to ask the hard questions of government, corporations and other institutions. We believed this needed to change.
WikiLeaks has provided a new model of journalism. Because we are not motivated by making a profit, we work cooperatively with other publishing and media organisations around the globe, instead of following the traditional model of competing with other media. We don’t hoard our information; we make the original documents available with our news stories. Readers can verify the truth of what we have reported themselves. Like a wire service, WikiLeaks reports stories that are often picked up by other media outlets. We encourage this. We believe the world’s media should work together as much as possible to bring stories to a broad international readership.
1.4 How WikiLeaks verifies its news stories
We assess all news stories and test their veracity. We send a submitted document through a very detailed examination a procedure. Is it real? What elements prove it is real? Who would have the motive to fake such a document and why? We use traditional investigative journalism techniques as well as more modern rtechnology-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organisation, and answer a set of other detailed questions about the document. We may also seek external verification of the document For example, for our release of the Collateral Murder video, we sent a team of journalists to Iraq to interview the victims and observers of the helicopter attack. The team obtained copies of hospital records, death certificates, eye witness statements and other corroborating evidence supporting the truth of the story. Our verification process does not mean we will never make a mistake, but so far our method has meant that WikiLeaks has correctly identified the veracity of every document it has published.Publishing the original source material behind each of our stories is the way in which we show the public that our story is authentic. Readers don’t have to take our word for it; they can see for themselves. In this way, we also support the work of other journalism organisations, for they can view and use the original documents freely as well. Other journalists may well see an angle or detail in the document that we were not aware of in the first instance. By making the documents freely available, we hope to expand analysis and comment by all the media. Most of all, we want readers know the truth so they can make up their own minds.
1.5 The people behind WikiLeaks
WikiLeaks is a project of the Sunshine Press. It’s probably pretty clear by now that WikiLeaks is not a front for any intelligence agency or government despite a rumour to that effect. This rumour was started early in WikiLeaks’ existence, possibly by the intelligence agencies themselves. WikiLeaks is an independent global group of people with a long standing dedication to the idea of a free press and the improved transparency in society that comes from this. The group includes accredited journalists, software programmers, network engineers, mathematicians and others.To determine the truth of our statements on this, simply look at the evidence. By definition, intelligence agencies want to hoard information. By contrast, WikiLeaks has shown that it wants to do just the opposite. Our track record shows we go to great lengths to bring the truth to the world without fear or favour.
The great American president Thomas Jefferson once observed that the price of freedom is eternal vigilance. We believe the journalistic media plays a key role in this vigilance.
1.6 Anonymity for sources
As far as we can ascertain, WikiLeaks has never revealed any of its sources. We can not provide details about the security of our media organisation or its anonymous drop box for sources because to do so would help those who would like to compromise the security of our organisation and its sources. What we can say is that we operate a number of servers across multiple international jurisdictions and we we do not keep logs. Hence these logs can not be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers. Without specialized global internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.However, we also provide instructions on how to submit material to us, via net cafes, wireless hot spots and even the post so that even if WikiLeaks is infiltrated by an external agency, sources can still not be traced. Because sources who are of substantial political or intelligence interest may have their computers bugged or their homes fitted with hidden video cameras, we suggest that if sources are going to send WikiLeaks something very sensitive, they do so away from the home and work.
A number of governments block access to any address with WikiLeaks in the name. There are ways around this. WikiLeaks has many cover domains, such as https://destiny.mooo.com, that don’t have the organisation in the name. It is possible to write to us or ask around for other cover domain addresses. Please make sure the cryptographic certificate says wikileaks.org .
2. WikiLeaks’ journalism record
2.1 Prizes and background
WikiLeaks is the winner of:- the 2008 Economist Index on Censorship Freedom of Expression award
- the 2009 Amnesty International human rights reporting award (New Media)
2.2 Some of the stories we have broken
- War, killings, torture and detention
- Government, trade and corporate transparency
- Suppression of free speech and a free press
- Diplomacy, spying and (counter-)intelligence
- Ecology, climate, nature and sciences
- Corruption, finance, taxes, trading
- Censorship technology and internet filtering
- Cults and other religious organizations
- Abuse, violence, violation
- Changes in Guantanamo Bay SOP manual (2003-2004) - Guantanamo Bay’s main operations manuals
- Of Orwell, Wikipedia and Guantanamo Bay - In where we track down and expose Guantanamo Bay’s propaganda team
- Fallujah jail challenges US - Classified U.S. report into appalling prison conditions in Fallujah
- U.S lost Fallujah’s info war - Classified U.S. intelligence report on the battle of Fallujah, Iraq
- US Military Equipment in Iraq (2007) - Entire unit by unit equipment list of the U.S army in Iraq
- Dili investigator called to Canberra as evidence of execution mounts - the Feb 2008 killing of East Timor rebel leader Reinado
- Como entrenar a escuadrones de la muerte y aplastar revoluciones de El Salvador a Iraq - The U.S. Special Forces manual on how to prop up unpopular government with paramilitaries
- Change you can download: a billion in secret Congressional reports - Publication of more than 6500 Congressional Research Reports, worth more than a billion dollars of US tax-funded research, long sought after by NGOs, academics and researchers
- ACTA trade agreement negotiation lacks transparency - The secret ACTA trade agreement draft, followed by dozens of other publications, presenting the initial leak for the whole ACTA debate happening today
- Toll Collect Vertraege, 2002 - Publication of around 10.000 pages of a secret contract between the German federal government and the Toll Collect consortium, a private operator group for heavy vehicle tolling system
- Leaked documents suggest European CAP reform just a whitewash - European farm reform exposed
- Stasi still in charge of Stasi files - Suppressed 2007 investigation into infiltration of former Stasi into the Stasi files commission
- IGES Schlussbericht Private Krankenversicherung, 25 Jan 2010 - Hidden report on the economics of the German private health insurance system and its rentability
- The Independent: Toxic Shame: Thousands injured in African city, 17 Sep 2009 - Publication of an article originally published in UK newspaper The Independent, but censored from the Independent’s website. WikiLeaks has saved dozens of articles, radio and tv recordings from disappearing after having been censored from BBC, Guardian, and other major news organisations archives.
- Secret gag on UK Times preventing publication of Minton report into toxic waste dumping, 16 Sep 2009 - Publication of variations of a so-called super-injunction, one of many gag-orders published by WikiLeaks to expose successful attempts to suppress the free press via repressive legal attacks
- Media suppression order over Turks and Caicos Islands Commission of Inquiry corruption report, 20 Jul 2009 - Exposure of a press gagging order from the Turks and Caicos Islands, related to WikiLeaks exposure of the Commission of Inquiry corruption report
- Bermuda’s Premier Brown and the BCC bankdraft - Brown went to the Privy council London to censor the press in Bermuda
- How German intelligence infiltrated Focus magazine - Illegal spying on German journalists
- U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008 - Classified (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. Has been in the worldwide news.
- CIA report into shoring up Afghan war support in Western Europe, 11 Mar 2010 - This classified CIA analysis from March, outlines possible PR-strategies to shore up public support in Germany and France for a continued war in Afghanistan. Received international news coverage in print, radio and TV.
- U.S. Embassy profiles on Icelandic PM, Foreign Minister, Ambassador - Publication of personal profiles for briefing documents for U.S. officials visiting Iceland. While lowly classified are interesting for subtle tone and internal facts.
- Cross-border clashes from Iraq O.K. - Classified documents reveal destabalizing U.S. military rules
- Tehran Warns US Forces against Chasing Suspects into Iran - Iran warns the United States over classified document on WikiLeaks
- Inside Somalia and the Union of Islamic Courts - Vital strategy documents in the Somali war and a play for Chinese support
- Draft Copenhagen climate change agreement, 8 Dec 2009 - Confidential draft "circle of commitment" (rich-country) Copenhagen climate change agreement
- Draft Copenhagen Accord Dec 18, 2009 - Three page draft Copehagen "accord", from around Friday 7pm, Dec 18, 2009; includes pen-markings
- Climatic Research Unit emails, data, models, 1996-2009 - Over 60MB of emails, documents, code and models from the Climatic Research Unit at the University of East Anglia, written between 1996 and 2009 that lead to a worldwide debate
- The Monju nuclear reactor leak - Three suppressed videos from Japan’s fast breeder reactor Monju revealing the true extent of the 1995 sodium coolant disaster
- The looting of Kenya under President Moi - $3,000,000,000 presidential corruption exposed; swung the Dec 2007 Kenyan election, long document, be patient
- Gusmao’s $15m rice deal alarms UN - Rice deal corruption in East Timor
- How election violence was financed - the embargoed Kenyan Human Rights Commission report into the Jan 2008 killings of over 1,300 Kenyans
- Financial collapse: Confidential exposure analysis of 205 companies each owing above EUR45M to Icelandic bank Kaupthing, 26 Sep 2008 - Publication of a confidential report that has lead to hundreds of newspaper articles worldwide
- Barclays Bank gags Guardian over leaked memos detailing offshore tax scam, 16 Mar 2009 - Publication of censored documents revealing a number of elaborate international tax avoidance schemes by the SCM (Structured Capital Markets) division of Barclays
- Bank Julius Baer: Grand Larceny via Grand Cayman - How the largest private Swiss bank avoids paying tax to the Swiss government
- Der Fall Moonstone Trust - Cayman Islands Swiss bank trust exposed
- Over 40 billion euro in 28167 claims made against the Kaupthing Bank, 23 Jan 2010 - List of Kaupthing claimants after Icelandic banking crash
- Northern Rock vs. WikiLeaks - Northern Rock Bank UK failed legal injunctions over the ¡Ì24,000,000,000 collapse
- Whistleblower exposes insider trading program at JP Morgan - Legal insider trading in three easy steps, brought to you by JP Morgan and the SEC
- Eutelsat suppresses independent Chinese-language TV station NTDTV to satisfy Beijing - French sat provider Eutelsat covertly removed an anti-communist TV channel to satisfy Beijing
- Internet Censorship in Thailand - The secret internet censorship lists of Thailand’s military junta
- Church of Scientology’s ’Operating Thetan’ documents leaked online - Scientology’s secret, and highly litigated bibles
- Censored Legion de Cristo and Regnum Cristi document collection - Censored internal documents from the Catholic sect Legion de Cristo (Legion of Christ)
- US Department of Labor investigation into Landmark Education, 2006 - 2006 investigative report by the U.S. Department of Labor on Landmark Education
- Report on Shriners raises question of wrongdoing - corruption exposed at 22 U.S. and Canadian children’s hospitals.
- Claims of molestation resurface for US judo official
- Texas Catholic hospitals did not follow Catholic ethics, report claims - Catholic hospitals violated catholic ethics
3. Short essays on how a more inquiring media can make a difference in the world
3.1 The Malaria Case Study: the antidote is good governance born from a strong media
Malaria is a case study in why good governance not just good science is the solution to so much human suffering. This year, the mosquito borne disease will kill over one million people. More than 80% of these will be children. Great Britain used to have malaria. In North America, malaria was epidemic and there are still a handful of infections each year. In Africa malaria kills over 100 people per hour. In Russia, amidst the corruption of the 1990s, malaria re-established itself. What is the difference between these cases?Why does Malaria kill so many people in one place but barely take hold in another? Why has malaria been allowed to gain a foothold in places like Russia where it was previously eradicated? We know how to prevent malaria epidemics. The science is universal. The difference is good governance.
Put another way, unresponsive or corrupt government, through malaria alone, causes a children’s "9/11" every day. [1]
It is only when the people know the true plans and behaviour of their governments that they can meaningfully choose to support or reject them. Historically, the most resilient forms of open government are those where publication and revelation are protected. Where that protection does not exist, it is our mission to provide it through an energetic and watchful media.
In Kenya, malaria was estimated to cause 20% of all deaths in children under five. Before the Dec 2007 national elections, WikiLeaks exposed $3 billion of Kenyan corruption, which swung the vote by 10%. This led to changes in the constitution and the establishment of a more open government. It is too soon to know if it will contribute to a change in the human cost of malaria in Kenya but in the long term we believe it may. It is one of many reforms catalyzed by WikiLeaks unvarnished reporting.
3.2 The importance of principled leaking to journalism, good government and a healthy society
Principled leaking has changed the course of history for the better. It can alter the course of history in the present, and it can lead us to a better future.Consider Daniel Ellsberg, working within the US government during the Vietnam War. He comes into contact with the Pentagon Papers, a meticulously kept record of military and strategic planning throughout the war. Those papers reveal the depths to which the US government has sunk in deceiving the American people about the war. Yet the public and the media know nothing of this urgent and shocking information. Indeed, secrecy laws are being used to keep the public ignorant of gross dishonesty practised by their own government. In spite of those secrecy laws and at great personal risk, Ellsberg manages to disseminate the Pentagon papers to journalists and to the world. Despite criminal charges against Ellsberg, eventually dropped, the release of the Pentagon Papers shocks the world, exposes the government lying and helps to shorten the war and save thousands of both American and Vietnamese lives.
The power of principled leaking to call governments, corporations and institutions to account is amply demonstrated through recent history. The public scrutiny of otherwise unaccountable and secretive institutions forces them to consider the ethical implications of their actions. Which official will chance a secret, corrupt transaction when the public is likely to find out? What repressive plan will be carried out when it is revealed to the citizenry, not just of its own country, but the world? When the risks of embarrassment and discovery increase, the tables are turned against conspiracy, corruption, exploitation and oppression. Open government answers injustice rather than causing it. Open government exposes and undoes corruption. Open governance is the most effective method of promoting good governance.
Today, with authoritarian governments in power in much of the world, increasing authoritarian tendencies in democratic governments, and increasing amounts of power vested in unaccountable corporations, the need for openness and transparency is greater than ever. WikiLeaks interest is the revelation of the truth. Unlike the covert activities of state intelligence agencies, as a media publisher WikiLeaks relies upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments and corporations to justice.
With its anonymous drop box, WikiLeaks provides an avenue for every government official, every bureaucrat, and every corporate worker, who becomes privy to damning information that their institution wants to hide but the public needs to know. What conscience cannot contain, and institutional secrecy unjustly conceals, WikiLeaks can broadcast to the world. It is telling that a number of government agencies in different countries (and indeed some entire countries) have tried to ban access to WikiLeaks. This is of course a silly response, akin to the ostrich burying its head in the sand. A far better response would be to behave in more ethical ways.
Authoritarian governments, oppressive institutions and corrupt corporations should be subject to the pressure, not merely of international diplomacy, freedom of information laws or even periodic elections, but of something far stronger - the consciences of the people within them.
3.3 Should the press really be free?
In its landmark ruling on the Pentagon Papers, the US Supreme Court ruled that "only a free and unrestrained press can effectively expose deception in government." We agree.The ruling stated that "paramount among the responsibilities of a free press is the duty to prevent any part of the government from deceiving the people and sending them off to distant lands to die of foreign fevers and foreign shot and shell."
It is easy to perceive the connection between publication and the complaints people make about publication. But this generates a perception bias, because it overlooks the vastness of the invisible. It overlooks the unintended consequences of failing to publish and it overlooks all those who are emancipated by a climate of free speech. Such a climate is a motivating force for governments and corporations to act justly. If acting in a just manner is easier than acting in an unjust manner, most actions will be just.
Sufficient principled leaking in tandem with fearless reporting will bring down administrations that rely on concealing reality from their own citizens.
It is increasingly obvious that corporate fraud must be effectively addressed. In the US, employees account for most revelations of fraud, followed by industry regulators, media, auditors and, finally, the SEC. Whistleblowers account for around half of all exposures of fraud.
Corporate corruption comes in many forms. The number of employees and turnover of some corporations exceeds the population and GDP of some nation states. When comparing countries, after observations of population size and GDP, it is usual to compare the system of government, the major power groupings and the civic freedoms available to their populations. Such comparisons can also be illuminating in the case of corporations.
Considering the largest corporations as analogous to a nation state reveals the following properties:
- The right to vote does not exist except for share holders (analogous to land owners) and even there voting power is in proportion to ownership.
- All power issues from a central committee.
- There is no balancing division of power. There is no fourth estate. There are no juries and innocence is not presumed.
- Failure to submit to any order may result in instant exile.
- There is no freedom of speech.
- There is no right of association. Even romance between men and women is often forbidden without approval.
- The economy is centrally planned.
- There is pervasive surveillance of movement and electronic communication.
- The society is heavily regulated, to the degree many employees are told when, where and how many times a day they can go to the toilet.
- There is little transparency and something like the Freedom of Information Act is unimaginable.
- Internal opposition groups, such as unions, are blackbanned, surveilled and/or marginalized whenever and wherever possible.
Through governmental corruption, political influence, or manipulation of the judicial system, abusive corporations are able to gain control over the defining element of government the sole right to deploy coercive force.
Just like a country, a corrupt or unethical corporation is a menace to all inside and outside it. Corporations will behave more ethically if the world is watching closely. WikiLeaks has exposed unethical plans and behaviour in corporations and this as resulted in recompense or other forms of justice forms of justice for victims.
3.4 Could oppressive regimes potentially come to face legal consequences as a result of evidence posted on WikiLeaks?
The laws and immunities that are applied in national and international courts, committees and other legal institutions vary, and we can’t comment on them in particular. The probative value of documents posted on WikiLeaks in a court of law is a question for courts to decide.While a secure chain of custody cannot be established for anonymous leaks, these leaks can lead to successful court cases. In many cases, it is easier for journalists or investigators to confirm the existence of a known document through official channels (such as an FOI law or legal discovery) than it is to find this information when starting from nothing. Having the title, author or relevant page numbers of an important document can accelerate an investigation, even if the content itself has not been confirmed. In this way, even unverified information is an enabling jump-off point for media, civil society or official investigations. Principled leaking has been shown to contribute to bringing justice to victims via the court system.
National Investigation Agency (NIA)
Central Bureau of Investigation (CBI)
Criminal Investigation Department (CID)
Central Industrial Security Force (CISF)
Indo-Tibetan Border Police (ITBP)
Central Reserve Police Force (CRPF)
Border Security Force (BSF)
Bureau of Police Research & Development (BPR&D)
Constitution
Fundamental Rights & Duties
Administrative Divisions
Lok Sabha
Rajya Sabha
President
Vice President
Prime Minister
Deputy Prime Minister
Cabinet Ministers
Government Agencies
Supreme Court • Chief Justice
High Courts
District Courts
Foreign policy
Energy policy
Research and Analysis Wing (R&AW)
Intelligence Bureau (IB)
Joint Intelligence Committee (JIC)
This is a list of Governors of Andhra Pradesh since in 1953. The official residence is of the Governor is Raj Bhavan, situated in
# | Name | Took Office | Left Office |
1 | Chandulal M. Trivedi | ||
2 | Bhim Sen Sachar | ||
3 | Satyawant Mallannah Shrinagesh | ||
4 | Pattom A. Thanu Pillai | ||
5 | Khandubhai Kasanji Desai | 11 April. 1968 | |
6 | S. Obul Reddy | ||
7 | Mohanlal Sukhadia | ||
8 | R.D. Bhandare | ||
9 | Justice B.J. Diwan | ||
10 | Sharda Mukherjee | ||
11 | K.C. Abraham | ||
12 | Thakur Ram Lal | ||
13 | Shankar Dayal Sharma | ||
14 | Kumudben Manishankar Joshi | ||
15 | Krishan Kant | ||
16 | G. Ramanujam | ||
17 | C. Rangarajan | ||
18 | Surjit Singh Barnala | ||
19 | Sushil Kumar Shinde | ||
20 | Rameshwar Thakur | ||
21 | Narayan Dutt Tiwari | ||
22 | E. S. L. Narasimhan | Incumbent |
Total Pageviews
Clock
Popular Posts
-
I love Google, Bing and Yahoo just as much as the next Internet user, but sometimes you really want to dig down into a particular subject....
-
Battleship (2012) - 1Cd - SCamRip - {Telugu} Dubbed Battleship (2012) - 1Cd - SCamRip - {Telugu} Dubbed - X264 - AAC.mkv@Aditya (Size: ...
-
Magadheerudu (2012) Telugu Dubbed 1CD R5 DVDRip x264 MP3.mkv 698.47 MB Magadheerudu Telugu Dubbed Movie Download: HERE Descri...
-
Men In Black 3 Telugu Dubbed (Size: 587.31 MB ) seeders: 92 leechers: 189 Men In Black 3 Telugu Dubbed Movie Download : HER...
-
Neekosame Na Anweshana (Male & Female) 320kbps Click here to download Nee Kosam Naa Anweshana[Female] mp3 (320kbps-0.54MB) Click here...
-
Osama bin Mohammed bin Awad bin Laden is still alive in nuristan, afghanisthan. President Barack Obama has decided not to release any photos...
-
.:: Song Name : Kevvu Keka ::. Cast : Pawan Kalyan, Shruti Hassan Music : Devi Sri Prasad Singers : Mamta Sharma, Kushi Murali Lyri...
-
Boy was following a Girl. GIRL-why r u folowin me? BOY -you r very pretty n I think I'm in Love wid u! GIRL-but u havnt met my ...
-
NAGAVALLI Telugu Full Movie 2010 HQ Cam DVD Rip Movie: Nagavalli (2010) Cast: Venkatesh, Anushka Shetty, Richa Gnagopadyay, Kamalini Mukarj...
-
This is a list of Governors of Andhra Pradesh since in 1953. The official residence is of the Governor is Raj Bhavan, situated in Hydera...