Sie sind auf Seite 1von 9

Wikileaks veröffentlicht 391,832

geheime US--Dokumente
Die Dokumente belegen unter anderem Folterungen in irakischen Gefängnissen und die
hohe Zahl ziviler Opfer. Sie dokumentieren den blutigen Alltag des Kriegs und
illustrieren die Hilflosigkeit der US-Truppen
Truppen angesichts des zunehmenden Chaos im
Irak. Julian Assange sagte dem US-Nachrichtensender
US Nachrichtensender CNN, die Dokumente belegten
ein "Blutbad" in bisher nicht gekanntem Ausmaß.

Aus den Dokumenten geht unter anderem hervor, dass die US-Armee
US Armee von der
Folterungg von Gefangenen durch irakische Sicherheitskräfte wusste, oftmals aber nicht
einschritt. Die Unterlagen dokumentieren auch, dass an Straßensperren mit US- US
Soldaten hunderte irakische Zivilisten getötet wurden. Einer internen Aufstellung der
Armee zufolge wurden
urden zwischen der Invasion 2003 und Ende 2009 insgesamt etwa
109.000 Iraker getötet, 63 Prozent von ihnen Zivilisten.

This interface helps you browse, rate and comment

400,000 documents from the US Army in Iraq.


Iraq War Logs Explorer is a website which provides an easy way to search through the
Iraq War Logs, which were made public by Wikileaks on 22nd October 2010. The
documents are a set of over 391,000 reports which cover the war in Iraq from 2004 to


* Criminal Event (31235) * Enemy Action (104272) * Explosive Hazard (128693) * Friendfly Fire
(1328) * Friendly Action (104571 * Non-Combat Event (12210) * None Selected (4 * Other
(2547 * Suspicious Incident (1490) * Threat Report (5481)


* 0 (1077) * MND-BAGHDAD (109802) * MND-C (45193) * MND-N (134266)* MND-NE (347)*

MND-S (3460)* MND-SE (22516) * MNF-W (75153) * NONE SELECTED (17)

Attack on

* ENEMY (271171)* FRIEND (105899) * NEUTRAL (14757)* UNKNOWN (4)

Type of unit

* 0 (34305) * AIF (3)* Anti-Iraqi Forces (12305) * CF (51511)* CIV (2223)* CLC (1016)* Civilian
(9705)* Coalition (5677)* Coalition Forces (72347)* IGO (1195)* ISF (47679)* Infrastructure (41)
* Iraqi Security Forces (2) * None Selected (150004)* Other (835) * SoI (575)* UE (2408)


* ENEMY (271171)* FRIEND (105899) * NEUTRAL (14757)* UNKNOWN (4)


* BLUE (105899) * GREEN (14761) * RED (271171)


* 0 (5644) * CONFIDENTIAL (204) * Not Reported (4) * SECRET (379565) * UNCLASSIFIED


* ARTY (73) * Accident (5987) * Ambush (361) * Ambush Threat (93) * Arrest (6247) * Arson
(255) * Assassination (325) * Assassination Threat (129 )* Attack (10634) * Attack Threat (1649)
* Blue-Blue (364) * Blue-Green (141) * Blue-White (93) * Border Ops (179) * Breaching (8) *
Cache Found/Cleared (24796) * Carjacking (276) * Close Air Support (677) * Confiscation
(2934) * Convoy (13) * Cordon/Search (7957) * Counter Mortar Fire (130) * Counter Mortar
Patrol (15) * Deliberate Attack (216) * Demonstration (2220) * Detain (20314) * Direct Fire
(57813) * Direct Fire Threat (55) * Elicitation (7) * Equipment Failure (994)* Escalation of Force
(12574) * Explosive Remnants of War (ERW) Found/Cleared (307) * Explosive Remnants of
War (ERW)/Turn In (2555)* Green-Blue (225)* Green-Green (307) * Green-White (133) *
Hijacking (11)* IED Explosion (65347) * IED FOUND/CLEARED (7)* IED False (1248)* IED
Found/Cleared (44612)* IED Hoax (1963)* IED Pre-detonation (108) * IED Suspected (1037) *
IED Threat (1707)* Indirect Fire (33680) * Indirect Fire Threat (452) * Indirect fire (10)*
Intimidation (63) * Intimidation Threat (422) * Kidnapping (4212) * Kidnapping Threat (146) *
Lasing (202) * Looting (111) * Medevac (264) * Meeting (146) * Mine Found/Cleared (1210) *
Mine Strike (674) * Movement to Contact (43) * Murder (24835) * Murder Threat (130) *
Natural Disaster (8)* Other (8458)* Other Defensive (2358) * Other Offensive (446)* Patrol
(1865)* Police Actions (262)* Propaganda (106)* Raid (8682)* Recon (157)* Repetitive
Activities (36)* Rock Throwing (325)* SAFIRE (2772)* SAFIRE Threat (29)* Sabotage (81)*
Sabotage Threat (19) * Search and Attack (133)* Sermon (8)* Shooting (83)* Small Unit
Actions (4580)* Smuggling (179)* Smuggling Threat (165)* Sniper Ops (2009)* Sniper Ops
Threat (39)* Staff Estimate (53)* Supporting AIF (70)* Supporting CF (28)* Surveillance (326)*
TCP (797)* Tests of Security (89) * Theft (901)* Theft Threat (12)* Tribal Feud (294)* UAV
(164)* Unexploded Ordnance (8686)* Unknown Explosion (3450)* Vehicle Interdiction (279)*
White-Blue (26)* White-Green (10) * White-White (27)

At 5pm EST Friday 22nd October 2010 WikiLeaks released the largest classified
military leak in history. The 391,832 reports ('The Iraq War Logs'), document the war
and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the
months of May 2004 and March 2009) as told by soldiers in the United States Army.
Each is a 'SIGACT' or Significant Action in the war. They detail events as seen and
heard by the US military troops on the ground in Iraq and are the first real glimpse into
the secret history of the war that the United States government has been privy to

The reports detail 109,032 deaths in Iraq, comprised of 66,081 'civilians'; 23,984
'enemy' (those labeled as insurgents); 15,196 'host nation' (Iraqi government forces)
and 3,771 'friendly' (coalition forces). The majority of the deaths (66,000, over 60%) of
these are civilian deaths.That is 31 civilians dying every day during the six year period.
For comparison, the 'Afghan War Diaries', previously released by WikiLeaks, covering
the same period, detail the deaths of some 20,000 people. Iraq during the same period,
was five times as lethal with equivallent population size.

Weiterführende Infos >
ältere Veröffentlichung
Release date July 25, 2010

Afghan War Diary, 2004-2010

WikiLeaks released over
75,000 secret US military reports

covering the war in Afghanistan.,_2004-2010

( Criticism of Christopher Hörstel / tested ok .. from US institutions , only soft Matrial, filtered Documents

03:35 MIN Owing to 23 years of first-hand experience in Afghanistan, Christoph R. Hoerstel is regarded as an expert
on the country, as well as on Islam and terrorism. In Pakistan and Afghanistan he worked for a time as a
governmental advisor. Further assignments took him to Iraq (autumn 2003) and Iran (summer 2005). In 2006 and
2007 he coached selected members of the ISAF leadership on ‘regional studies’ concerning Afghanistan.)

The Afghan War Diary an extraordinary secret compendium of over 91,000 reports
covering the war in Afghanistan from 2004 to 2010. The reports describe the majority of
lethal military actions involving the United States military. They include the number of
persons internally stated to be killed, wounded, or detained during each action, together
with the precise geographical location of each event, and the military units involved and
major weapon systems used.

The Afghan War Diary is the most significant archive about the reality of war to have
ever been released during the course of a war. The deaths of tens of thousands is
normally only a statistic but the archive reveals the locations and the key events behind
each most of these deaths. We hope its release will lead to a comprehensive
understanding of the war in Afghanistan and provide the raw ingredients necessary to
change its course.

Most entries have been written by soldiers and intelligence officers listening to reports
radioed in from front line deployments. However the reports also contain related
information from Marines intelligence, US Embassies, and reports about corruption and
development activity across Afghanistan.

Each report consists of the time and precise geographic location of an event that the US
Army considers significant. It includes several additional standardized fields: The broad
type of the event (combat, non-combat, propaganda, etc.); the category of the event as
classified by US Forces, how many were detained, wounded, and killed from civilian,
allied, host nation, and enemy forces; the name of the reporting unit and a number of
other fields, the most significant of which is the summary - an English language
description of the events that are covered in the report.
The Diary is available on the web and can be viewed in chronological order and by by
over 100 categories assigned by the US Forces such as: "escalation of force", "friendly-
fire", "development meeting", etc. The reports can also be viewed by our "severity"
measure-the total number of people killed, injured or detained. All incidents have been
placed onto a map of Afghanistan and can be viewed on Google Earth limited to a
particular window of time or place. In this way the unfolding of the last six years of war
may be seen.

The material shows that cover-ups start on the ground. When reporting their own
activities US Units are inclined to classify civilian kills as insurgent kills, downplay the
number of people killed or otherwise make excuses for themselves. The reports, when
made about other US Military units are more likely to be truthful, but still down play
criticism. Conversely, when reporting on the actions of non-US ISAF forces the reports
tend to be frank or critical and when reporting on the Taliban or other rebel groups, bad
behavior is described in comprehensive detail. The behavior of the Afghan Army and
Afghan authorities are also frequently described.

The reports come from US Army with the exception most Special Forces activities. The
reports do not generally cover top-secret operations or European and other ISAF
Forces operations. However when a combined operation involving regular Army units
occurs, details of Army partners are often revealed. For example a number of bloody
operations carried out by Task Force 373, a secret US Special Forces assassination
unit, are exposed in the Diary -- including a raid that lead to the death of seven children.

This archive shows the vast range of small tragedies that are almost never reported by
the press but which account for the overwhelming majority of deaths and injuries.

We have delayed the release of some 15,000 reports from total archive as part of a
harm minimization process demanded by our source. After further review, these reports
will be released, with occasional redactions, and eventually, in full, as the security
situation in Afghanistan permits.

Additional information from our media partners:

• Der Spiegel:,1518,708314,00.html

• The Guardian:
• The New York Times:

Afghan War Diary - Reading guide

The Afghan War Diary (AWD for short) consists of messages from several important US
military communications systems. The messaging systems have changed over time; as
such reporting standards and message format have changed as well. This reading
guide tries to provide some helpful hints on interpretation and understanding of the
messages contained in the AWD.
Most of the messages follow a pre-set structure that is designed to make automated
processing of the contents easier. It is best to think of the messages in the terms of an
overall collective logbook of the Afghan war. The AWD contains the relevant events,
occurrences and intelligence experiences of the military, shared among many
recipients. The basic idea is that all the messages taken together should provide a full
picture of a days important events, intelligence, warnings, and other statistics. Each
unit, outpost, convoy, or other military action generates report about relevant daily
events. The range of topics is rather wide: Improvised Explosives Devices encountered,
offensive operations, taking enemy fire, engagement with possible hostile forces, talking
with village elders, numbers of wounded, dead, and detained, kidnappings, broader
intelligence information and explicit threat warnings from intercepted radio
communications, local informers or the afghan police. It also includes day to day
complaints about lack of equipment and supplies.

The description of events in the messages is often rather short and terse. To grasp the
reporting style, it is helpful to understand the conditions under which the messages are
composed and sent. Often they come from field units who have been under fire or under
other stressful conditions all day and see the report-writing as nasty paperwork, that
needs to be completed with little apparent benefit to expect. So the reporting is kept to
the necessary minimum, with as little type-work as possible. The field units also need to
expect questions from higher up or disciplinary measures for events recorded in the
messages, so they will tend to gloss over violations of rules of engagement and other
problematic behavior; the reports are often detailed when discussing actions or
interactions by enemy forces. Once it is in the AWD messages, it is officially part of the
record - it is subject to analysis and scrutiny. The truthfulness and completeness
especially of descriptions of events must always be carefully considered. Circumstances
that completely change the meaning of an reported event may have been omitted.

The reports need to answer the critical questions: Who, When, Where, What, With
whom, by what Means and Why. The AWD messages are not addressed to individuals
but to groups of recipients that are fulfilling certain functions, such as duty officers in a
certain region. The systems where the messages originate perform distribution based
on criteria like region, classification level and other information. The goal of distribution
is to provide those with access and the need to know, all of the information that relevant
to their duties. In practice, this seems to be working imperfectly. The messages contain
geo-location information in the forms of latitude-longitude, military grid coordinates and

The messages contain a large number of abbreviations that are essential to

understanding its contents. When browsing through the messages, underlined
abbreviations pop up an little explanation, when the mouse is hovering over it. The
meanings and use of some shorthands have changed over time, others are sometimes
ambiguous or have several meanings that are used depending on context, region or
reporting unit. If you discover the meaning of a so far unresolved acronym or
abbreviations, or if you have corrections, please submit them to wl-
An especially helpful reference to names of military units and task-forces and their
respective responsibilities can be found at

The site also contains a list of bases, airfields Location names are also
often shortened to three-character acronyms.

Messages may contain date and time information. Dates are mostly presented in either
US numeric form (Year-Month-Day, e.g. 2009-09-04) or various Euro-style shorthands
(Day-Month-Year, e.g. 2 Jan 04 or 02-Jan-04 or 2jan04 etc.).

Times are frequently noted with a time-zone identifier behind the time, e.g. "09:32Z".
Most common are Z (Zulu Time, aka. UTC time zone), D (Delta Time, aka. UTC + 4
hours) and B (Bravo Time, aka UTC + 2 hours). A full list off time zones can be found

Other times are noted without any time zone identifier at all. The Afghanistan time zone
is AFT (UTC + 4:30), which may complicate things further if you are looking up
messages based on local time.

Finding messages relating to known events may be complicated by date and time zone
shifting; if the event is in the night or early morning, it may cause a report to appear to
be be misfiled. It is advisable to always look through messages before and on the
proceeding day for any event.

David Leigh, the Guardian's investigations editor, explains the online tools they have
created to help you understand the secret US military files on the war in Afghanistan:

Understanding the structure of the report

• The message starts with a unique ReportKey; it may be used to find

messages and also to reference them.
• The next field is DateOccurred; this provides the date and time of the
event or message. See Time and Date formats for details on the used
• Type contains typically a broad classification of the type of event, like
Friendly Action, Enemy Action, Non-Combat Event. It can be used to filter
for messages of a certain type.
• Category further describes what kind of event the message is about.
There are a lot of categories, from propaganda, weapons cache finds to
various types of combat activities.
• TrackingNumber Is an internal tracking number.
• Title contains the title of the message.
• Summary is the actual description of the event. Usually it contains the
bulk of the message content.
• Region contains the broader region of the event.
• AttackOn contains the information who was attacked during an event.
• ComplexAttack is a flag that signifies that an attack was a larger
operation that required more planning, coordination and preparation. This
is used as a quick filter criterion to detect events that were out of the
ordinary in terms of enemy capabilities.
• ReportingUnit, UnitName, TypeOfUnit contains the information on the
military unit that authored the report.
• Wounded and death are listed as numeric values, sorted by affiliation.
WIA is the abbreviation for Wounded In Action. KIA is the abbreviation for
Killed In Action. The numbers are recorded in the fields
• Captured enemies are numbered in the field EnemyDetained.
• The location of events are recorded in the fields MGRS (Military Grid
Reference System), Latitude, Longitude.
• The next group of fields contains information on the overall military unit,
like ISAF Headquarter, that a message originated from or was updated by.
Updates frequently occur when an analysis group, like one that
investigated an incident or looked into the makeup of an Improvised
Explosive Device added its results to a message.
• OriginatorGroup, UpdatedByGroup
• CCIR Commander's Critical Information Requirements
• If an activity that is reported is deemed "significant", this is noted in the
field Sigact. Significant activities are analyzed and evaluated by a special
group in the command structure.
• Affiliation describes if the event was of friendly or enemy nature.
• DColor controls the display color of the message in the messaging
system and map views. Messages relating to enemy activity have the
color Red, those relating to friendly activity are colored Blue.
• Classification contains the classification level of the message, e.g. Secret

Afghan War Diary, 2004-2010

Release date July 25, 2010

25th July 2010 5:00 PM EST WikiLeaks has released a document set called the Afghan
War Diary, an extraordinary compendium of over 91,000 reports covering the war in
Afghanistan from 2004 to 2010.
The reports, while written by soldiers and intelligence officers, and mainly describing
lethal military actions involving the United States military, also include intelligence
information, reports of meetings with political figures, and related details.

The document collection is available on a dedicated webpage.

The reports cover most units from the US Army with the exception of most US Special
Forces' activities. The reports do not generally cover top secret operations or European
and other ISAF Forces operations.

We have delayed the release of some 15,000 reports from the total archive as part of a
harm minimization process demanded by our source. After further review, these reports
will be released, with occasional redactions, and eventually in full, as the security
situation in Afghanistan permits.

The data is provided in HTML (web), CSV (comma-separated values) and SQL
(database) formats, and was rendered into KML (Keyhole Markup Language) mapping
data that can be used with Google Earth. Please note that the checksums will change.

• Complete dump of the website, HTML format 75 MB

o (SHA1: 80adb634a0d218bd0f9a0f22734e3d2e7e67acfc)
o This is a complete dump of the website at
Extract this to your local hard disk and open it with your web browser.
Please check the project website for the most
recent version.
• All entries, CSV format 15 MB
o (SHA1: d6b82f955a7beb9589f92e9487c74669d1912a34)
o Raw data in comma-separated value format for further processing.
• All entries, SQL format 16M MB
o (SHA1: 9463f73ebbcd3f95899a138d6ba9817e1b6b800d)
o Raw data in SQL format for further processing.
• All entries, KML format 16 MB
o (SHA1: 34562c0c7722522161e40330d80ac9082014845f)
o This archive contains all events in one KML file. This file needs much
memory if opened with Google Earth.
• All NATO entries, KML format 209 kB
o (SHA1: 088ff8999a316f30e5e398021375fa3b4fc6349e)
o Contains the events that were tagged with NATO.
• Entries by month, KML format 16 MB
o (SHA1: 01a5c0639e1e1e844b10e962a44849b2a521d092)
o This archive provides the entries split by month. This makes it easier to
browse the data in Google Earth on low power machines.
• Entries with scale filter, KML format 981 kB
o (SHA1: 4669c721b87775a44472f6688e768305c686beff)
o File that will show a scale corresponding to the number of incidents in Google Earth. Each incident begins with
a 0.5 base score, and 0.1 has been added for each incident involving humans. This set of data provides only
events that have a scaling of 1.5.