Keep us a strong and independent voice for global justice: contribute today!
Draft:The Most Wanted Leaks of 2009
May 15, 2009
WikiLeaks requests nominations for 2009's Most Wanted Leaks—the concealed documents or recordings most sought after by a country's journalists, activists, historians, lawyers, police, or human rights investigators.
You may securely and anonymously add your nomination by editing this page. WikiLeaks will then prioritize the list and seek to obtain the leading candidates directly, through the legal system, or indirectly through its network of journalists, intelligence sources, volunteers and readers.
Be sure to ask your "offline" contacts for their nomination also; we seek nominations that reflect the whole of society.
Documents or other materials added nominated must:
- Have political, diplomatic or historical impact.
- Be known to exist or have existed.
- Be plausibly obtainable to a well motivated insider or outsider. For instance the entire collection of documents held by the Chinese Ministry of Public Security (中华人民共和国公安部) is not plausibly obtainable, but a specific document or group of documents may be.
- Be well defined, and if possible, specific. Three examples of well defined and specific:
An accepted example of known to exist and well defined, but not specific:
- The current list of websites or URLS filtered by the Chinese Public Security Bureau's "Great Firewall of China" censorship system.
- Be described in enough detail so that a court, dissident insider or visiting outsider not already familiar with the material or its subject matter may be able to quickly locate it, and will be motivated to do so.
- Should, where possible, list all organizations, locations and/or websites suspected of holding the material or having information about how to access it.
Nominations follow. Simply click "edit" on the country below. If your country does not yet exist in the list, please add it to the country that it alphabetically close to it, via typing "== country name ==". See how the other countries are specified for examples.
Be attentive to the content of your nomination. Do not worry about making formatting mistakes. All copies of this page are kept and reviewed.
 International organizations
- Bilderberg Group meeting minutes, papers and annual reports of since 1954. WikiLeaks has some years already. Bilderberg is an annual off-the record conference of transatlantic political, economic and ideological agenda setters.
- Source-code as well as certifications for the Austrian e-Voting system used in students elections.
- The report of the national broadband network expert working group.
- Versions of the ACMA URL blacklist newer than 19 March 2009.
- URL blacklist as used by Watchdog NZ during censorship technology trial by ISP Exetel in May 2009. Alleged (by Watchdog) to have been IWF list (see United Kingdom).
- Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response seems lacking.
- A list of URLs and keywords censored filtered by the Great Firewall of China. WikiLeaks has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http filtering.
- The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled by German federal criminal police BKA and distributed to internet service providers.
- The contents of the contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public safety" and copyright concerns (see http://blog.fefe.de/?ts=b4fa8af8).
- The Stasi files of Federal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exists, but withheld from public.
- All documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-war rat line to Argentina. Refer to http://news.bbc.co.uk/2/hi/europe/2611847.stm
- The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term of the Kibaki government. A draft version of one of the reports The looting of Kenya, was previously published by WikiLeaks. The reports were given to selected members of President Kibaki's cabinet at the time and are likely still held by http://www.kroll.com.uk/, notably lead investigator Andrew Marshall.
- The full Cornu Report. See http://en.wikipedia.org/wiki/Projekt-26#The_Cornu_Report
 United Kingdom
- Censorship list for the United Kingdom's "voluntary" filter system. Known to be held by The Internet Watch Foundation.
- Companies and their subsidiaries which are currently being supplied with the IWF list and have agreed for their names to be made public are as follows:
- Adaptive Mobile Security
- AOL (UK)
- Ask Jeeves
- Aspire Internet
- Blue Coat Systems Inc
- East of England Broadband Network (E2BN)
- Esafe Education
- Exa Networks
- Fortinet Inc
- Google UK
- Lightspeed Systems
- Netsweeper Inc
- Orange Home
- Orange Mobile
- Redstone Managed Solutions
- Research Machines
- Royal Mail
- Sentry Parental Controls
- Talk Talk
- T-Mobile UK
- UK Broadband
- UK Online
- Virgin Media
- Websense Inc
- Wyre Forest Computer Solutions
- Yahoo! UK and Ireland
- Yorkshire and Humber Grid for Learning Foundation
- Unredacted copies of receipts and documentation relating to MP's expenses as currently being released by the Daily Telegraph.
 United States
- The missing five million white house emails--possibly no-longer in existence.
- CIA detainee interrogation videos. While the CIA claims to have destroyed 92 of the videos, others are known to remain.
- Detainee abuse photos withheld by the Obama administration.
- The complete CIA Open Source Center analytical database. The database is extensive, unclassified, non-public, but relatively accessible to certain outsiders after jumping through hoops https://www.opensource.gov/
- The complete PACER database. The PACER database contains extensive US federal court records. They are public documents, currently behind a paywall. See http://arstechnica.com/tech-policy/news/2009/04/case-against-pacer.ars
- Unredacted Inquiry into the Treatment of Detainees in US Custody, 20 Nov 2008.
- Camp Delta (Guantanamo) Standard Operating Procedure 2005-2009.
- Iraq US Army Rules of Engagement 2007-2009 (SECRET).
- Unredacted copy of Dept of Justice's Office of Inspector General's "A Review of the FBI' s Actions Connection With Allegations Raised By Contract Linguist Sibel Edmonds" July 1, 2004 (redacted version here http://www.wbez.org/FILES/sibel.pdf )
- Correspondence between the National Security Agency and American telecom companies such as AT&T, Verizon, and Qwest, regarding the warrantless wiretapping program. Correspondence involving telecoms who cooperated with the NSA (e.g. AT&T) may give different information than telecoms who refused (e.g. Qwest), but both types would better shed light on the NSA's program. The existence of this correspondence is well documented in the media, for example that Qwest's lawyers refused to cooperate because the FISA Court had not signed off on it.