ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡


ÇØÄ¿Áî´º½º Á¦°ø ¸®´ª½º + ½º¸¶Æ®ÆùÀÇ ¸ðµç°Í
 
 
No, 5931
±¸ºÐ: ÇØÅ·
»çÀÌÆ®: ÇØÄ¿Áî´º½º
Á¾·ù: ÇØÄ¿
Á¶È¸: 477
¹Ì ÇàÁ¤ºÎ´Â ¿Ö À§Å°¸®Å©½º¸¦ µÎ·Á¿öÇϳª.. 6´ë ´ëÇü Æø·Î º¸´Ï  
6 of WikiLeaks¡¯ biggest ever document dumps





À§Å°¸®Å©½º ÆÄÀÏ [·ÎÀÌÅÍ=¿¬ÇÕ´º½º]



µµ³Îµå Æ®·³ÇÁ ´ëÅë·ÉÀÌ 2016³â ´ë¼±¿¡¼­ ½Â¸®ÇÑ µ¥´Â ´ç½Ã À§Å°¸®Å©½º°¡ Ŭ¸°ÅÏ À̸ÞÀÏÀ» Æø·ÎÇÑ È¿°úµµ ÀÖ¾ú´Ù. ±×·¯³ª Æ®·³ÇÁ´Â ´ëÅë·ÉÀÌ µÈ Áö±Ý ÁÙ¸®¾È ¾î»êÁö ¼ÛȯÀ» Ã˱¸ÇÏ°í ÀÖ´Ù.

¿Ö ±×´Â '´ë¼± °ø½Å'ÀÎ ¾î»êÁö¸¦ ³Ñ°Ü¹ÞÀ¸·Á ÇÒ±î.

Àü¹®°¡µéÀº À§Å°¸®Å©½º¿Í ÁÙ¸®¾È ¾î»êÁö°¡ ƯÁ¤ Á¤ÆÄ¿¡ Ä¡¿ìÄ¡±â º¸´Ù ´Ã Áø½ÇÀ» ±×´ë·Î °ø°³Çϱ⠶§¹®À̶ó°í Áø´ÜÇÑ´Ù.

¾î»êÁö°¡ Á¸ÀçÇÏ´Â ÇÑ Æ®·³ÇÁ ÇàÁ¤ºÎ°¡ ºñ¹Ð¸®¿¡ ÃßÁøÇÏ´Â °ÍµéÀÌ ¾ðÁ¦ ÅÍÁ®³ª¿ÃÁö ¸ð¸£±â ¶§¹®ÀÌ´Ù.

ÁÖ·ù ¾ð·Ð°ú Á¤ºÎ °ü·áµéÀÇ È¸ÀÇÀûÀÎ ½Ã°¢¿¡ ºÎµúÈ÷°í ÀÖÀ½¿¡µµ Æø·Î »çÀÌÆ® <À§Å°¸®Å©½º>´Â 12³âÀÌ ³Ñ°Ô 100ÆÛ¼¾Æ®ÀÇ Á¤È®¼ºÀ» À¯ÁöÇÏ°í ÀÖ´Â °ÍÀ¸·Î Æò°¡µÇ°í ÀÖ´Ù. °Ô´Ù°¡ ¾ÆÁ÷µµ ¼Ò¼Û¿¡¼­ ÆмÒÇÑ ÀûÀÌ ¾ø´Ù.
Æ®·³ÇÁ¿Í ¹Ð¿ù°ü°è¸¦ À¯ÁöÇÏ·Á´Â ¹Ì±¹ÀÇ ¸¹Àº ¾ð·ÐµéÀÌ ÁÙ¸®¾È ¾î»êÁöÀÇ ¼³°ÅÁö ½Ã°£ µî ±×ÀÇ »ç¼ÒÇÑ °Í±îÁö °¡½Ê¼ºÀ¸·Î ´Ù·ç°í ÀÖ´Ù.

ÇÏÁö¸¸ ¾î»êÁöÀÇ ½Åº´À» µÑ·¯½Ñ ³í¶õÀÌ ÇÑâÀÎ Áö±Ý À§Å°¸®Å©½º°¡ ±×µ¿¾È ¾î¶² ¿ªÇÒÀ» Çß´ÂÁö µÇ¤¾îº¼ ÇÊ¿ä°¡ ÀÖ´Ù.

À§Å°¸®Å©½ºÀÇ ´ëÇ¥ÀûÀÎ ¿ª´ë±Þ Æø·ÎµéÀº ´ÙÀ½°ú °°´Ù.



¾ÆÇÁ°£ ÀüÀï [¿¬ÇÕ´º½º]



1. À̶óÅ©/¾ÆÇÁ°£ ÀüÀï ±â·Ï (2010³â)

<À§Å°¸®Å©½º>°¡ °ø°³ÇÑ ¹Ì±ºÀÇ ¾ÆÆÄÄ¡ Çï±â°¡ µÎ ¸íÀÇ ·ÎÀÌÅÍ ÃëÀçÁøÀ» Æ÷ÇÔ 12¸íÀ» Á×ÀÎ ºñµð¿À Àå¸éÀº Áö±Ý±îÁö ¿ª´ë±ÞÀÌ°í °¡Àå ³í¶õÀÌ ¸¹ÀÌ µÇ°í ÀÖ´Â Æø·Î·Î ¼Õ²ÅÈù´Ù.

ÀÌ ¿µ»ó°ú ÇÔ²² ¼ö½Ê¸¸ °ÇÀÇ À̶óÅ©/¾ÆÇÁ°£ÀüÀÇ ÀÚ·áµéÀÌ °ø°³µÆ´Âµ¥, ÀÌ´Â ¹Ì±º ¿ª»ç»ó °¡Àå Å« Æø·Î Áß Çϳª·Î Àü ¹Ì±º Á¤º¸ºÐ¼®°¡ ÿ½Ã ¸Å´×ÀÌ ¾î»êÁö¿¡°Ô ÀÌ ºñ¹Ð ±º»ç ÀÚ·áµéÀ» ÀüÇØÁØ °ÍÀ¸·Î ¾Ë·ÁÁ® ÀÖ´Ù. ¸Å´×Àº ÀÌ ÀÏ·Î 35³â ÇüÀ» ¼±°í¹Þ°í º¹¿ªÇÏ´ø Áß¿¡ ¿À¹Ù¸¶ ÇàÁ¤ºÎ¿¡ ÀÇÇØ °¨Çü¹Þ°í 2017³â¿¡ 7³â¸¸¿¡ ¼®¹æµÆ´Ù.

¾î»êÁö´Â ÇöÀç ¸Å´×ÀÌ ´ç½Ã Æ柰ï ÄÄÇ»Å͸¦ ÇØÅ·ÇÒ ¶§ °øÁ¶Çß´Ù´Â ÇøÀÇ·Î ±â¼ÒµÆ´Ù. ÇÑÆí ¸Å´×Àº ¾î»êÁö¿Í <À§Å°¸®Å©½º>¿Í °ü·ÃµÈ »ç°ÇÀÇ ¹ýÁ¤ Áõ¾ðÀ» °ÅºÎÇؼ­ ¶Ç ´Ù½Ã ±¸¼Ó ¼ö°¨µÅ ÀÖ´Â ÁßÀÌ´Ù.

2. ¹Ì ±¹¹«ºÎ ¿Ü±³ Àü¹® (2010-2011³â)

<À§Å°¸®Å©½º>´Â ¶Ç ´Ù¸¥ Á¤ºÎ ¹®¼­ °ø°³·Î ¹Ì±¹ Á¤ºÎ¿¡ Å« ´çȤ°¨À» Áá´Ù. 2010³â, Àü ¼¼°è¿¡ ÀÖ´Â ¹Ì±¹ ¿Ü±³°ø°ü°ú ±¹¹«ºÎÀÇ Åë½Å ¹®°Ç 25¸¸°Ç ÀÌ»óÀÌ °ø°³µÆ´Ù. ÀÌ ¹®°ÇµéÀ» ÅëÇØ ¹Ì±¹ÀÌ ´ç½Ã À¯¿£ »ç¹«ÃÑÀå ¹Ý±â¹®°ú À¯¿£ ¾ÈÀüº¸Àå ÀÌ»çȸ ´ëÇ¥µéÀ» °¨½ÃÇØ¿Â °ÍÀÌ µå·¯³µ´Ù.

¶ÇÇÑ ¿Ü±³ Àü¹®µé¿¡´Â µ¶ÀÏ ¾Ó°Ö¶ó ¸Þ¸£ÄÌ ¼ö»ó¿¡ ´ëÇØ Ã¢ÀÇ·ÂÀÌ ºÎÁ·ÇÏ´Ù°í ÇÏ°í, ´ç½Ã ÇÁ¶û½º ´ëÅë·É ´ÏÄÝ¶ó½º »ç¸£ÄÚÁö¿¡ ´ëÇؼ­´Â ¿¹¹ÎÇÏ°í ±ÇÀ§ÁÖÀÇÀûÀ̶ó°í Ç¥ÇöÇÑ ³»¿ëµéÀÌ ÀÖ¾ú´Ù. ¹ö¶ô ¿À¹Ù¸¶ ´ëÅë·ÉÀÌ ¾Æ÷À» ÀÌ¿ëÇØ ¾ÆÇÁ°¡´Ï½ºÅº ÀüÀïÀÇ »ç¸£ÄÚÁöÀÇ Áö¿øÀ» È®º¸ÇÒ ¼ö ÀÖ´Ù´Â Á¶¾ðÀ» ¹ÞÀº °Íµµ µå·¯³µ´Ù.

¶ÇÇÑ Ä³³ª´ÙÀε鿡 ´ëÇؼ­´Â Ç×»ó ¹Ì±¹ ¹èÆ®¸ÇÀÇ ·Îºó ¿ªÇÒÀ» ÇÏ´Â ¿­µî°¨¿¡¼­ ¿À´Â '¿í'ÇÏ´Â ¼ºÇâÀ» °®°í ÀÖ´Ù°í ÇÑ ³»¿ëµµ ÀÖ¾ú´Ù.

¿µ±¹ÀÇ º¸¼ö´ç ¶ÇÇÑ À̵éÀÌ ±Ç·ÂÀ» Àâ°í ÀÖÀ¸¸é Ä£¹Ì üÁ¦¸¦ À¯ÁöÇÏ°í ¹Ì±¹À¸·ÎºÎÅÍ ´õ ¸¹Àº ¹«±â¸¦ »ì °ÍÀ» ¾à¼ÓÇÏ´Â °ÍÀ¸·Î º¸¿©Áö°Ô µÅ¼­ ´çȤ½º·¯¿î »óȲ¿¡ óÇØÁ³´Ù.



À§Å°¸®Å©½º Ŭ¸°ÅÏ À̸ÞÀÏ °ø°³´Â Ŭ¸°ÅÏ¿¡ Ä¡¸íŸ°¡ µÆ´Ù. [¿¬ÇÕ´º½º]



3. ¹ÎÁÖ´ç Àü±¹À§¿øȸ¿Í Èú·¯¸® Ŭ¸°ÅÏÀÇ À̸ÞÀÏ (2016³â)

2016³â Èú·¯¸® Ŭ¸°ÅÏÀÌ ¹Ì ´ë¼± ¹ÎÁÖ´ç È帰¡ µÇ±â ÀÏÁÖÀÏ Àü, <À§Å°¸®Å©½º>´Â ¼öõ°ÇÀÇ À̸ÞÀÏÀ» °ø°³Çß´Ù. ÀÌ À̸ÞÀϵéÀ» ÅëÇØ ´ç ÃÖ°íÀ§±Þ ÀλçµéÀÌ »ó¿øÀÇ¿ø ¹ö´Ï »÷´õ½º°¡ È帰¡ µÇÁö ¸øÇϵµ·Ï °ø¸ðÇÑ °ÍÀÌ µå·¯³µ´Ù.

ÀÌ·Î ÀÎÇØ ¹ÎÁÖ´ç Àü±¹À§¿øȸÀÇ ´ëÇ¥ µ¥ºñ ¿Í¼­¸Ç-½¶Ã÷°¡ »çÀÓÇϱ⿡ À̸£·¶´Ù. ¹ÎÁÖ´ç Àü±¹À§¿øȸ°¡ »÷´õ½ºÀÇ À¯´ë±³ ½Å¾ÓÀ» ÀÌ¿ëÇØ ±×¸¦ ¾î¶»°Ô ¹«·ÂÈ­½Ãų ¼ö ÀÖ´ÂÁö ³íÇÑ °ÍÀÌ À̸ÞÀϵéÀ» ÅëÇØ µå·¯³­ °ÍÀÌ´Ù. Ŭ¸°ÅÏ ¼±°Å¿îµ¿º»ºÎ´Â ÀÌ Æø·Î·ÎºÎÅÍ À̸ñÀ» ºÐ»ê½ÃÅ°±â À§ÇØ <À§Å°¸®Å©½º>¿Í ·¯½Ã¾Æ°¡ Ŭ¸°ÅÏÀ» ¹«³Ê¶ß¸®±â À§ÇØ °ø¸ðÇß´Ù´Â À½¸ð·ÐÀ» ÆîÃÆ´Ù.

´ë¼± ¸î ÁÖ Àü, <À§Å°¸®Å©½º>´Â Ŭ¸°ÅÏ¿¡°Ô Á÷°ÝźÀÌ µÉ ¼ö ÀÖ´Â À̸ÞÀϵéÀ» ´õ °ø°³Çß´Ù. ÀÌ À̸ÞÀϵéÀ» ÅëÇØ µå·¯³­ °Í Áß Çϳª´Â ÀÇ µµ³ª ºê·¡ÁúÀÌ Å¬¸°ÅÏ¿¡°Ô ´ë¼± Èĺ¸ Åä·Ð ¹æ¼Û¿¡¼­ ÁÖ¾îÁú Áú¹®µéÀ» ¹Ì¸® °Ç³Ù »ç½ÇÀ̾ú´Ù. ¶ÇÇÑ Å¬¸°ÅÏ ¼±°Å¿îµ¿º»ºÎ°¡ °¡Å縯±³µµµé¿¡ ´ëÇØ ¡®°¡³­ÇÑ ¶óƾÀε顯À̶ó°í ÀνŰø°Ý¼º ¹ß¾ðÀ» ÇÑ °Íµµ µå·¯³µ´Ù.







4. CIA ÇØÅ· ÇÁ·Î±×·¥ Æø·Î ¡®º¼Æ® 7¡¯ (2017³â)

<À§Å°¸®Å©½º>´Â ¡®º¼Æ® 7¡¯À̶ó´Â À̸§À¸·Î CIAÀÇ ºñ¹Ð ±Û·Î¹ú ÇØÅ· ÇÁ·Î±×·¥¿¡ °üÇÑ ÀÚ·áµéÀ» °ø°³Çß´Ù. ÀÌ Æø·Î·Î CIAÀÇ ½º¸¶Æ®Æù, ½º¸¶Æ®TV, ¼Ò¼È¹Ìµð¾î¾Û ÇØÅ· ±Ô¸ð°¡ µå·¯³µ´Ù.

¡®º¼Æ® 7¡¯Àº ÈÞ´ëÆù Ä«¸Þ¶ó¿Í ¸¶ÀÌÅ©°¡ ÀÚÀ¯ÀÚÀç·Î ¿ø°Ý ÀÛµ¿ÀÌ µÉ ¼ö ÀÖ´Ù´Â °Í°ú CIA°¡ ¿µ±¹ Á¤º¸±â°üµé°ú ÀÌ·¯ÇÑ ÇÁ·ÎÁ§Æ®¸¦ ÇÔ²² °øÁ¶Çß´Ù´Â °ÍÀ» º¸¿©Áá´Ù.

¶ÇÇÑ <À§Å°¸®Å©½º>ÀÇ ¡®º¼Æ® 7¡¯ Æø·Î·Î CIAÀÇ ÇØÅ·ÀÌ ´Ù¸¥ ¿Ü±¹ÀÇ ¼ÒÇàÀ¸·Î º¸¿©Áöµµ·Ï ¸¸µå´Â À̸¥ ¹Ù ¡®±×¸²ÀÚ ÇÁ·Î±×·¥¡¯µµ µå·¯³µ´Ù.

5. IMF¿Í ¼¼°èÀºÇàÀ» ¹«±â·Î ÀÌ¿ëÇÏ´Â ¹Ì±¹ÀÇ °æÁ¦ ÀüÀï (2008³â)

<À§Å°¸®Å©½º>´Â Àû´ëÀûÀÎ ´ë»óµéÀ» »ó´ë·Î ÇÑ ¹Ì±¹ Á¤ºÎÀÇ ºñÁ¤±ÔÀü ¹æ¹ýÀ» »ó¼¼È÷ ´Ù·é À̸¥ ¹Ù ¹Ì±¹ÀÇ ¡®Äíµ¥Å¸ ¸Å´º¾ó¡¯¿¡ ´ëÇØ Æø·ÎÇß´Ù. ÇØ´ç ÀÚ·áµéÀº <À§Å°¸®Å©½º>¿¡ ÀÇÇØ 2008³â¿¡ °ø°³µÆÁö¸¸, ÃÖ±Ù °íÁ¶µÈ º£³×¼ö¿¤¶ó¿¡ ´ëÇÑ ¹Ì±¹ÀÇ °æÁ¦Àû ¾Ð¹ÚÀÌ ÀÌ¿¡ °ü·ÃµÅ ÀÖÀ½ÀÌ »õ·ÎÀÌ µå·¯³µ´Ù.

¸Å´º¾ó »ó¿¡¼­ ¹Ì±¹ Á¤ºÎ´Â ÀڽŵéÀÇ ¶æ¿¡ µû¸£Áö ¾Ê´Â Ÿ±¹ Á¤ºÎµé¿¡ ´ëÇØ °æÁ¦ ÀüÀïÀ» ÀÏÀ¸Å°°í, ÀÚ±ÝÀ» ¹«±â·Î ÀÌ¿ëÇØ¿Â À̵éÀÇ ¿À·£ ¿ª»ç¸¦ ½º½º·Î ÀÎÁ¤ÇÏ°í ÀÖ´Ù´Â Çؼ®ÀÌ ³ª¿À°í ÀÖ´Ù. ¹Ì±¹Àº IMF¿Í ¼¼°èÀºÇà °°Àº ±¹Á¦ ±ÝÀ¶±â±¸¿¡ÀÇ Âü¿©·Î ¿Ü±³-±ÝÀ¶ÀÇ Àå¿¡ µé¾î°¡ ¸ñÀûÀ» ´Þ¼ºÇÒ ¼ö ÀÖ´Â °ÍÀÌ´Ù.



°üŸ³ª¸ð ¼ö¿ë¼Ò [¿¬ÇÕ´º½º]



6. °üŸ³ª¸ð ¼ö¿ë¼Ò ¸Å´º¾ó (2007³â)

238ÆäÀÌÁö¿¡ ´ÞÇÏ´Â ¹Ì±º ¸Å´º¾óÀÌ 2007³â <À§Å°¸®Å©½º>¿¡ °ø°³µÆ´Ù. À̸¦ ÅëÇØ °üŸ³ª¸ð ¸¸¿¡ ÀÖ´Â ¹Ì±º ¼ö¿ë¼ÒÀÇ ¡®¿î¿ë ±ÔÁ¤¡¯ÀÌ µå·¯³µ´Âµ¥, ÀÌ°÷¿¡¼­ ¼ö°¨ÀÚµéÀº Àû¹ýÇÑ ±â¼Ò ÀýÂ÷ ¾øÀÌ ¼ö°¨µÇ¾î °í¹®À» ´çÇϱ⵵ ÇÑ´Ù´Â °ÍÀÌ ¹àÇôÁ³´Ù.

µå·¯³­ ÀÚ·á¿¡ µû¸£¸é ÀÌ ¼ö¿ë¼Ò¿¡ 15¼¼ ÀÌÇÏ ¼Ò³âµéÀÌ ÀÖ¾ú°í, °³µéÀ» ÀÌ¿ëÇØ ¼ö°¨ÀÚµéÀ» À§ÇùÇϱ⵵ ÇßÀ¸¸ç, Àû½ÊÀÚ »ç¶÷µéÀÇ ¹æ¹® ½Ã ¸¸³¯ ¼ö ¾øµµ·Ï ÀºÆóµÈ ¼ö°¨Àڵ鵵 ÀÖ¾ú´Ù°í ÇÑ´Ù. ¶ÇÇÑ Ã³À½ ÀÔ¼ÒÇÏ´Â ¼ö°¨ÀÚµéÀº 2ÁÖ µ¿¾È °í¸³µÇ¾î ÀÖ¾î¾ß Çߴµ¥, ±³µµ°üµé°ú ½É¹®°üµé¿¡ ´ëÇÑ ÀÇÁ¸¼ºÀ» Å°¿ì°í, À̵éÀÇ °¨°¢ »ó½ÇÀ» ´õ °­È­½ÃÅ°°í ÀÌ¿ëÇϱâ À§ÇÑ °ÍÀ̶ó°í ÇÑ´Ù.

Áö³­ ÁÖ ÁÙ¸®¾È ¾î»êÁö°¡ üÆ÷µÇ°í, ¸¹Àº À̵éÀÌ ¼ÒÀ§ ¡®º¸Çè ÆÄÀÏ¡¯À̶ó°í ÇÏ´Â °Íµé¿¡ ´ëÇÑ ÃßÃøÀ» ³»³õ°í ÀÖ´Ù. ÀϺδ ¾î»êÁöÀÇ ¾ï·ù³ª Á×À½¿¡ ´ëºñÇØ Áï½Ã ÅͶ߷ÁÁú ¼ö ÀÖ´Ù´Â ¿¹Ãøµµ ÀÖÁö¸¸, ¾ÆÁ÷±îÁö´Â Á¶¿ëÇÑ »óȲÀÌ´Ù.

[À§Å°¸®Å©½ºÇѱ¹=ÃÖÁ¤¹Ì ±âÀÚ]



º£¸¦¸° ÁÖÀç ¿µ±¹ ´ë»ç°ü ¾Õ¿¡¼­ ÇÇÄÏÀ» µç ¼ö½Ê¸íÀÇ »ç¶÷µéÀÌ ¿µ±¹ °æÂû¿¡ üÆ÷µÈ ÁÙ¸®¾ð ¾î»êÁöÀÇ ¼®¹æÀ» ¿ä±¸ÇÏ´Â ½ÃÀ§¸¦ ¹úÀÌ°í ÀÖ´Ù. [¿¬ÇÕ´º½º]



6 of WikiLeaks¡¯ biggest ever document dumps

Despite facing constant skepticism from mainstream media and government officials, whistleblower website WikiLeaks has managed to maintain a record of 100 percent accuracy over its 12-year history — and has never lost a lawsuit.
With much of the media now focusing on trivialities, like whether its recently arrested founder Julian Assange spent enough time washing dishes during his nearly seven-year exile at the Ecuadorian Embassy in London, here¡¯s a look back at some of WikiLeaks¡¯ most famous document dumps.

1. ¡®Collateral Murder¡¯ — Iraq/Afghanistan war logs (2010)
To this day, WikiLeaks¡¯ publishing of the Iraq War footage showing a US Apache helicopter shooting dead 12 people, including two Reuters staff, is one of its most significant and talked-about exposures.

Released as part of the biggest leak in US military history, containing hundreds of thousands of Iraq and Afghanistan war documents, the footage was provided to Assange by former US Army Soldier Chelsea Manning. Manning served seven years of a 35-year sentence for providing WikiLeaks with the classified information, before having her sentence commuted by Barack Obama in 2017.

Assange is now facing charges of engaging in a ¡°conspiracy¡± to help Manning hack government computers in 2010 — specifically, ¡°conspiracy to commit computer intrusion for agreeing to break a password to a classified U.S. government computer¡± — while Manning is back in prison for refusing to testify in a case related to WikiLeaks.

2. Embarrassing US State Department Cables (2010-11)
WikiLeaks caused serious embarrassment to the US government with another of its most-remembered document dumps in 2010, dropping more than 250,000 US State Department cables from embassies around the world.

Among other things, the cables revealed that the US was spying on then-UN Secretary General Ban Ki-moon and other top UN Security Council representatives.

Diplomatic cables described German Chancellor Angela Merkel as ¡°rarely creative,¡± while then-French President Nicolas Sarkozy was described as ¡°susceptible and authoritarian.¡± President Barack Obama was advised that Sarkozy¡¯s support for the war in Afghanistan could be secured using ¡°flattery.¡± Canadians were said to have a ¡°chip on their shoulder¡± because they are ¡°condemned to always play Robin to the US Batman.¡±

The UK Conservative Party was also embarrassed by the cable leaks, in which they were seen promising to run a ¡°pro-American regime¡± and buy more weapons from the US if they were in power.

3. DNC Clinton emails (2016)
Just one week before Hillary Clinton became the Democratic Party¡¯s nominee for president in 2016, WikiLeaks released thousands of emails proving top party figures had collaborated to ensure that Senator Bernie Sanders did not win the nomination. The leaks forced DNC chair Debbie Wasserman-Schultz to resign.

Emails showed DNC staffers discussing how Sanders could be undermined, even by using his Jewish faith. The Clinton camp tried to distract from the leaks, concocting a conspiracy about a WikiLeaks-Russia collaboration to destroy her campaign.

Weeks before the election, WikiLeaks dropped more emails damaging to Clinton. One showed CNN contributor Donna Brazile (who replaced Wasserman-Schultz as DNC acting chair) had supplied Clinton with questions CNN planned to ask her during debates. The Clinton camp was also seen insulting Catholics and ¡°needy Latinos.¡±

4. ¡®Vault 7¡¯ CIA hacking documents (2017)
The CIA¡¯s ¡°global covert hacking program¡±was revealed in the 2017 ¡®Vault 7¡¯ leaks, which show the extent of the US spy agency¡¯s ability to hack smartphones, smart TVs, and social media messaging apps like WhatsApp.

The documents showed that phone cameras and microphones can be remotely activated at will — and that the CIA collaborated with British intelligence agencies on these projects. WikiLeaks revealed the ¡®Weeping Angel¡¯ surveillance technique, which put smart TVs into ¡°fake off¡± mode while actually using them as microphones to monitor targets.

The ¡®Vault 7¡¯ leaks also exposed the ¡®Umbrage¡¯ program with which the CIA can conduct a hacking operation but make it appear to be the act of a foreign nation.

5. US uses IMF and World Bank as ¡®weapons¡¯ (2008)
With the recent US coup attempt in Venezuela, WikiLeaks highlighted what it called the US ¡°coup manual¡± detailing Washington¡¯s methods of ¡°unconventional warfare¡± against adversaries. The document had been released by WikiLeaks in 2008 but found new relevance as US economic pressure on Venezuela mounted in recent months.

In the manual, the US government admits to ¡°a long history of conducting economic warfare¡± and using ¡°financial weapons¡± against governments that do not bend to its will. The ¡°participation¡± of international financial organizations like the World Bank and International Monetary Fund (IMF) offers the US ¡°diplomatic-financial venues to accomplish¡± these goals.

6. Guantanamo prison operating ¡®manual¡¯ (2007)
A 238-page US Army manual released by WikiLeaks in 2007 revealed the ¡°standard operating procedures¡± for the Guantanamo Bay prison camp, where the US holds and tortures detainees, often without charge, for years on end.



(adsbygoogle = window.adsbygoogle || []).push({});



The document revealed there were boys 15 years old and younger at the camp, that dogs were used to intimidate prisoners, and that some inmates were classified as being off-limits to Red Cross visitors. It also revealed that incoming prisoners were held in isolation for two weeks in order to foster dependence on guards and interrogators and to ¡°enhance and exploit¡± the disorientation they felt.

With the arrest of WikiLeaks founder Julian Assange last week, many have speculated on so-called ¡°insurance¡± files, which some expected to be leaked immediately in the event of Assange¡¯s detainment or death. So far, however, there have been no major new leaks.


                    ¼öÁ¤/»èÁ¦     ÀÌÀü±Û ´ÙÀ½±Û    
¹øÈ£Á¦ ¸ñÁ¾·ùÀÛ¼ºÀÏ
5933   ±¸±Û 'ºñ¿æµåÄÚÇÁ', ¸®´ª½º 'Àεð'¡¤¡¤¡¤ ¿Â¶óÀÎ ... ¸®´ª½º  04-19
5932   Æ®·³ÇÁÀÇ º¯½É ¡°À§Å°¸®Å©½º¿¡ ´ëÇØ ¾Æ´Â °Í ¾ø´Ù... ÇØÄ¿  04-18
5931   ¹Ì ÇàÁ¤ºÎ´Â ¿Ö À§Å°¸®Å©½º¸¦ µÎ·Á¿öÇϳª.. 6´ë ´ë... ÇØÄ¿  04-17
5930   ¸®´ª½º ½Ç½À ¸®´ª½º  04-16
5929   "SW °øÂ¥·Î ¾²¼¼¿ä"¡¦±¹³»¿¡µµ '¿ÀǼҽº' ¿­Ç³ ¸®´ª½º  04-15
5928   MS, ¸®´ª½º¿ë ¿§Áö ºê¶ó¿ìÀú °³¹ßÇϳª ¸®´ª½º  04-14
5927   ¸®´ª½º DB ¼³Ä¡¿Í was ¼­¹ö ¼³Ä¡ ¸®´ª½º  04-13
5926   ¾ÆÆÄÄ¡ ¼³Ä¡¹× ¼³Á¤ ¸®´ª½º  04-12
5925   The Linux Command Line ¸®´ª½º  04-11
5924   °ø°³SW·Î â¾÷ÇÏ·Á¸é Çѱ¹¼± ¿Ü±¹ ³ª°¡¾ß ¸®´ª½º  04-10
 
 

 
óÀ½ ÀÌÀü ´ÙÀ½       ¸ñ·Ï Ȩ