mardi 14 juillet 2009

FW: Recherche de Zik et de VidZ

Pas vraiment testé, mais peut-étre sympa:

http://music.bec0de.com



Découvrez toutes les possibilités de communication avec vos proches

lundi 13 juillet 2009

Most Wanted [Secret] Documents

Src: WikiLeaks

Draft:The Most Wanted Leaks of 2009

From Wikileaks

Jump to: navigation, search

May 15, 2009

WikiLeaks requests nominations for 2009's Most Wanted Leaks―the concealed documents or recordings most sought after by a country's journalists, activists, historians, lawyers, police, or human rights investigators. Nominations are currently OPEN. Prizes will be award to the winner for each country.

Contents

[hide]

You may securely and anonymously add your nomination by editing this page. WikiLeaks editorial staff will then prioritize the list and seek to obtain the leading candidates directly, through the legal system, or indirectly through ours network of journalists, intelligence sources, volunteers and readers. If you email us (wl-editor@sunshinepress.org) we will alert you when the record has been obtained.

Winners for each country will receive a cash prize upto 1000 EUR, depending on how many countries submit.

Be sure to ask your "offline" contacts for their nomination also; we seek nominations that reflect the whole of society.

Documents or other materials added nominated must:

  • Have political, diplomatic or historical impact.
  • Be known to exist or have existed.
  • Be plausibly obtainable to a well motivated insider or outsider. For instance the entire collection of documents held by the Chinese Ministry of Public Security (中华人民共和国公安部) is not plausibly obtainable, but a specific document or group of documents may be.
  • Be well defined, and if possible, specific. Three examples of well defined and specific:
An acceptable example, which is known to exist and well defined, but not specific:
  • The current list of websites or URLS filtered by the Chinese Public Security Bureau's "Great Firewall of China" censorship system.
  • Be described in enough detail so that a court, dissident insider or visiting outsider not already familiar with the material or its subject matter may be able to quickly locate it, and will be motivated to do so.
  • Should, where possible, list all organizations, locations and/or websites suspected of holding the material or having information about how to access it.

Nominations follow. Simply click "edit" on the country below. If your country does not yet exist in the list, please add it to the country that it alphabetically close to it, via typing "== country name ==". See how the other countries are specified for examples.

Be attentive to the content of your nomination. Do not worry about making formatting mistakes. All copies of this page are kept and reviewed.

In the rare cases were a document might be destroyed or vaulted if it appeared on this list, send your nomination privately to wl-editor@sunshinepress.org or securely via Chat.

[edit] International organizations

  1. Bilderberg Group meeting minutes, papers and annual reports of since 1954. WikiLeaks has some years already. Bilderberg is an annual off-the record conference of transatlantic political, economic and ideological agenda setters.
  2. Documents regarding the founding and operation of Alliance Base.

[edit] Austria

  1. Source-code as well as certifications for the Austrian e-Voting system used in students elections.

[edit] Australia

  1. The complete police interview of Martin Bryant. The police radio log from 26th April 1996 Hobart ops room.
  2. The report of the national broadband network expert working group.
  3. Versions of the ACMA URL blacklist newer than 19 March 2009.
  4. Full details of filtering hardware/software vendors participating in government-sponsored ISP-level censorship technology trials, including (but not limited to):
    1. Any and all communications between filter vendors and government departments prior to, during, and after the trials
    2. Any and all transactions, contracts, and other financial arrangements involving filter vendors
  5. URL blacklist(s) used during above trials. Alleged (by government) to be ACMA URL blacklist.
  6. Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them publicly available).
  7. URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009. Alleged (by Watchdog) to have been IWF list (see United Kingdom).
  8. Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response seems lacking.

[edit] China

  1. A list of URLs and keywords censored filtered by the Great Firewall of China. WikiLeaks has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http filtering.

[edit] France

  1. The Monthly Health Report of President Nicolas Sarkozy, as promised by himself during the last presidential elections.

[edit] Germany

  1. The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled by German federal criminal police BKA and distributed to internet service providers.
  2. The contents of the contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public safety" and copyright concerns (see http://blog.fefe.de/?ts=b4fa8af8).
  3. The Stasi files of Federal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public.
  4. The so called "40er Studien", presenting the most cruel medical experiments ever conducted by human kind.

[edit] Greece

  1. Documents related to the Athens affair that have yet to be released (including those from countries other than Greece.)

[edit] Italy

  1. All documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-war rat line to Argentina. Refer to http://news.bbc.co.uk/2/hi/europe/2611847.stm

[edit] Kenya

  1. The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term of the Kibaki government. A draft version of one of the reports The looting of Kenya, was previously published by WikiLeaks. The reports were given to selected members of President Kibaki's cabinet at the time and are likely still held by http://www.kroll.com.uk/, notably lead investigator Andrew Marshall.

[edit] Madagascar

Both sides of the political conflict in Madagascar are crying fouls about the deals made by their counterparts with foreign entities. The release of the official documents with respect to contract negotiations about:

  1. Oil exploitation in the region of Bemolanga ( South of Madagascar) by Total & others
  2. an obvious one but the proposed final contract before rejection of the land deal with Daewoo Logistics.
  3. The recent agreement with Saudi investment group on staple products and proposed $2 billion USD investment.
  4. The revised mining exploitation agreement with Sheritt in Ambatovy and Rio Tinto in Fort-Dauphin.
  5. Least but not last, the complete list of current political prisoners and the charges against them.

[edit] Puerto Rico

  1. The FBI has not yet finished declassifying all the secret files related to surveillance of Puerto Rican individuals and organizations from the 1930-70's http://www.pr-secretfiles.net/index.html (not to mention, large sections of the files are blacked out by the FBI). In addition, there are thousands of secret files produced by Puerto Rican police that were only briefly made available to individuals themselves, and have now been closed off to the public. These documents provide evidence of quite a significant spying and intimidation operation by the United States and local police against leftists and independence movement leaders.

[edit] Russia

  1. Complete technical documentation of the "Perimetr" system (a.k.a. "Dead Hand"), along history of deployment and removal from deployment (if done). Political documents relating to the deployment of "Perimetr".
  2. Maps, floor plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain, and any other facilities similar to the conjectured facilities there, including names and locations.
  3. Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they believed their fear to be.
  4. Soviet psychological profiles and political analyses of American politicians.
  5. Soviet/Russian analyses of American intentions and capabilities.
  6. Documents indicating who the Soviet Union believed was behind the assassination of JFK, RFK, and MLK, along with why they believed that. (Probably different organizations.)
  7. A list and description of the various agents prepared by the various Soviet and Russian bioweapons programs. Indications of whether they developed recombinant DNA based agents, and what those are specifically. Weaponization of agents, including re-entry vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for affected personnel.
  8. Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava.
  9. Documents relating to nuclear warplans of the Soviet Union and Russia.
  10. Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still deploy them) such as orbital HANE devices.

[edit] Switzerland

  1. The full Cornu Report. See http://en.wikipedia.org/wiki/Projekt-26#The_Cornu_Report

[edit] Uganda

The government of Uganda has recently signed a number of profit-sharing agreements with several oil companies that are conducting explorations in southwestern Uganda. My friend was in Kampala in January and spoke with a number of journalists who believe that releasing these documents would be a major step in increased transparency with respect to the country's emerging oil industry.

  1. Ugandan profit-sharing agreements with oil companies in south-western Uganda

[edit] United Kingdom

1. Censorship list for the United Kingdom's "voluntary" filter system. Known to be held by The Internet Watch Foundation.

Companies and their subsidiaries which are currently being supplied with the IWF list and have agreed for their names to be made public are as follows:
  • 3
  • Adaptive Mobile Security
  • Affiniti
  • AOL (UK)
  • Ask Jeeves
  • Aspire Internet
  • Bloxx
  • Blue Coat Systems Inc
  • BT
  • Censornet
  • Commtouch
  • Dataconnectivity
  • Detica
  • East of England Broadband Network (E2BN)
  • Easynet
  • Eclipse
  • Esafe Education
  • Exa Networks
  • F2S
  • Fortinet Inc
  • Google UK
  • Greenbee
  • IntY
  • Karoo
  • Lightspeed Systems
  • Madasafish
  • Marshal8e6
  • McAfee
  • MSN
  • Namesco
  • NDO
  • Netclean
  • Netintelligence
  • Netsweeper Inc
  • Nildram
  • O2
  • Optenet
  • Orange Home
  • Orange Mobile
  • Pipex
  • PlusNet
  • Redstone Managed Solutions
  • Research Machines
  • Royal Mail
  • Rulespace
  • Sentry Parental Controls
  • Scansafe
  • Simply.com
  • Sky
  • SmoothWall
  • Sophos
  • Talk Talk
  • Tesco
  • Thus
  • Tiscali
  • T-Mobile UK
  • Toucan
  • UK Broadband
  • UK Online
  • Virgin Media
  • Vodafone
  • Waitrose
  • Websense Inc
  • Wyre Forest Computer Solutions
  • Yahoo! UK and Ireland
  • Yorkshire and Humber Grid for Learning Foundation

2. Unredacted copies of receipts and documentation relating to MP's expenses as currently being released by the Daily Telegraph; in addition, any private communications regarding the leak of these expenses, especially if said communications are politically significant.

3. UK Government documentation into the investigation of Roger Hollis, head of MI5 between 1956 and 1965, including the report by Lord Trend, into the serious but apparently unproven allegations of being a Russian Spy.

[edit] United States

  1. The missing five million white house emails--possibly no-longer in existence.
  2. CIA detainee interrogation videos. While the CIA claims to have destroyed 92 of the videos, others are known to remain.
  3. Detainee abuse photos withheld by the Obama administration.
  4. The complete CIA Open Source Center analytical database. The database is extensive, unclassified, non-public, but relatively accessible to certain outsiders after jumping through hoops https://www.opensource.gov/
  5. The complete PACER database. The PACER database contains extensive US federal court records. They are public documents, currently behind a paywall. See http://arstechnica.com/tech-policy/news/2009/04/case-against-pacer.ars
  6. Unredacted Inquiry into the Treatment of Detainees in US Custody, 20 Nov 2008.
  7. Camp Delta (Guantanamo) Standard Operating Procedure 2005-2009.
  8. Iraq US Army Rules of Engagement 2007-2009 (SECRET).
  9. Unredacted copy of Dept of Justice's Office of Inspector General's "A Review of the FBI' s Actions Connection With Allegations Raised By Contract Linguist Sibel Edmonds" July 1, 2004 (redacted version here http://www.wbez.org/FILES/sibel.pdf )
  10. Correspondence between the National Security Agency and American telecom companies such as AT&T, Verizon, and Qwest, regarding the warrantless wiretapping program. Correspondence involving telecoms who cooperated with the NSA (e.g. AT&T) may give different information than telecoms who refused (e.g. Qwest), but both types would better shed light on the NSA's program. The existence of this correspondence is well documented in the media, for example that Qwest's lawyers refused to cooperate because the FISA Court had not signed off on it.
  11. Documents about Rep. Harman, AIPAC, and the NSA recordings.
  12. Chenney and Rumsfeld Archives
  13. Reports about Colombian 'falsos positives'
  14. The Editorial Guidelines for Fox News
  15. Important Documents...
    1. The SIOP.
      1. All versions from inception to the present, preferably in annotated form.
      2. OPLAN/CONPLAN 8022, 2003 revision.
      3. OPLAN/CONPLAN 8044, 2007 revision.
    2. The "Black Budget", from inception to present, with line items, hopefully annotated and explained.
    3. All secret annexes for, attachments to, unredacted versions of, and documents implicitly or explicitly referenced in the following documents, which may be partially available in unclassified form:
      1. National Security Presidential Directive 51, "National Continuity Policy", May 9, 2007, also known as Homeland Security Presidential Directive 20
      2. Federal Preparedness Circular 65, "Federal Executive Branch Continuity of Operations (COOP)", July 26, 1999
      3. Federal Response Plan [FEMA 9230.1-PL], April 1999
      4. Presidential Decision Directive 67, "Enduring Constitutional Government and Continuity of Government Operations", October 21, 1998
      5. Presidential Decision Directive 63, "Critical Infrastructure Protection (CIP)", May 22, 1998
      6. Presidential Decision Directive 62, "Protection Against Unconventional Threats to the Homeland and Americans Overseas", May 22, 1998
      7. FPC 65 Federal Response Planning Guidance 01-94, "Continuity of Operations (COOP)", December 4, 1994
      8. PDD 67 National Security Directive 69, "Enduring Constitutional Government", June 2, 1992
      9. FPC 65 Federal Preparedness Circular 61, "Emergency Succession to Key Positions of the Federal Departments and Agencies", August 2, 1991
      10. Federal Preparedness Circular 62, "Delegation of Authorities for Emergency Situations", August 1, 1991
      11. Federal Preparedness Circular 60, "Continuity of the Executive Branch of the Federal Government at the Headquarters Level During National Security Emergencies", November 20,1990
      12. National Security Directive 37, "Enduring Constitutional Government", April 18, 1990
      13. Executive Order 12656, "Assignment of Emergency Preparedness Responsibilities", November 18, 1988
      14. Executive Order 12472, "Assignment of National Security and Emergency Preparedness Telecommunications Functions", April 3, 1984
      15. NSD 69 NSDD 55, "Enduring National Leadership" September 14, 1982
      16. Executive Order 12148, "Federal Emergency Management", July 20, 1979
    4. A list of the actual facilities in the Federal Relocation Arc, as of the present time, along with their locations.
      1. Blueprints, maps, and floor plans of MWEOC.
      2. Blueprints, maps, and floor plans of Site R (Raven Rock).
      3. Blueprints and floor plans of all unmentioned facilities in the Federal Relocation Arc, including historical ones.
    5. A mirror of the Common Core database as of 11/1/2008.
    6. A mirror of the complete Intellipedia site as of 11/1/2008, including article history.
    7. CIA/DIA/NGA/NSA analyses of the VRYAN crisis of 1983.
    8. Technical specifications of the KH-11 and follow-on satellites with similar capabilities.
    9. Non-public documents related to HAARP. No, it isn't a mind control device like the tinfoil hat crowd thinks, but it's a technically interesting piece of kit, that, and yes, there is probably something going on that isn't publicly talked about. For instance, HAARP may be primarily civilian, but it may have certain military applications that are useful. Speculative areas where the capabilities of HAARP may be useful in are the field of remote non-destructive examination of buried and underwater objects, other nondestructive examination applications, communications applications, energy extraction, transfer, or dispersal applications, or even warfighting applications. It would be interesting to find them out. A good place to start would be whoever's funding it (DARPA/ONR?) and then see how deep the rabbit hole goes.
    10. The contents of the Football, and how they changed over the years during the different Administrations.
    11. Whatever Pollard stole and gave to the Mossad, the full text.
    12. US psychological profiles and political analyses of Soviet leaders.
    13. Documents relating to orbital weapons systems, and whether the US ever deployed them (or still deploy them) such as orbital HANE devices

***********************************************************************************************************
Src: http://news.bbc.co.uk/2/hi/europe/2611847.stm


Sunday, 29 December, 2002, 05:57 GMT
Vatican to release Nazi files
Jews in a Nazi concentration camp
The Church's role in the Holocaust has long been questioned
The Vatican is to open up its archives documenting relations with Nazi Germany, potentially lifting the lid on a controversial and secretive era in the Church's history.

Announcing plans to declassify the archives, officials said they hoped the move would end speculation that the Roman Catholic Church failed to speak out against the Holocaust.

Pope Pius XII
Pope Pius XII's role in the Holocaust has proved controversial
The archive contains documents relating to the years leading up to World War II. During that period, the Vatican's ambassador to Berlin was the man who later went on to be pope during the war.

Pope Pius XII, who led the Church from 1939 to 1958, has long been accused by Jewish groups of turning a blind eye as many Jews were marched off to concentration camps.

Missing material

The archive will be open from 15 February next year but only to scholars by special appointment.

The Vatican has admitted, however, that files dating from 1931 to 1934 were "nearly completely destroyed or dispersed" during the bombing of Berlin and by a fire, Reuters news agency reported.

Pope John Paul II
Pope John Paul apologised - but not directly for the Holocaust
Documents relating to Pope Pius' tenure have still not been given a release date, despite calls from scholars and Jewish organisations for the Church to clarify its role in the Holocaust.

In 2001, Catholic and Jewish scholars investigating the Vatican's relations with Nazi Germany suspended their research in protest at the huge amount of material kept secret.

Jewish groups at the time also called on the Vatican to delay the beatification of Pius XII.

'Works of charity'

The Vatican has long countered criticism by saying Pope Pius XII did not speak out for fear of worsening the situation for Catholics as well as Jews in occupied territories during the war.

It says the documents to be released will prove "the great works of charity and assistance" undertaken by Pius XII on behalf of prisoners and others persecuted by the Nazis.

The Catholic Church has been criticised for not revealing the extent of its possible involvement or complicity in the Holocaust, in which six million Jews and hundreds of thousands of other ethnic minorities, gypsies and homosexuals were killed.

In March 2000, the current Pope, John Paul II, asked for forgiveness for wrongs inflicted by the Catholic Church on Jews, minorities and women, but angered Jewish groups for stopping short of mentioning specifically the Holocaust or the possible role of Pope Pius XII.




TelechargementZ

Pour récupérer de tout: Softs, Films:

http://www.telechargementz.org


[Perl]Dark Dork Searcher




#!/usr/bin/perl

#############################################################
# ________________________                                  #
#/ `---__gunslinger_ ™___|]  ========gunslinger_=======)    #
#/_==o;;;;;;;;___DC___.:/                                   #
#),---.(_(__) /                                             #
#// () ),-----"                                             #
#//___//                                                    #
#/===//                                                     #
#===//                                                      #
#############################################################
################################################################################################################
#  C0ded by gunslinger_                                                                                         #
#  Dork finder v.1.1                                                                                            #
#  Special thanks : wisdom, kiddies, flyff666, g0nzhack, 7460, peti_mati,spykit,b3nt0 all devilzc0de crew !     #
#  Special thanx for d3hydr8                                                                                    #
#  all jasakom member....                                                                                       #
#  special i made for devilzc0de crew and jasakom member                                                        #
#  enjoy... =D                                                                                                  #
#################################################################################################################
#################################################
#               go ! devilzcrew !               #
#                     2009                      #
#      http://www.devilzc0de.forumotion.com     #
#################################################
################################################################
#       .___             __          _______       .___        #
#     __| _/____ _______|  | __ ____ \   _  \    __| _/____    #
#    / __ |\__  \\_  __ \  |/ // ___\/  /_\  \  / __ |/ __ \   #
#   / /_/ | / __ \|  | \/    <\  \___\  \_/   \/ /_/ \  ___/   #
#   \____ |(______/__|  |__|_ \\_____>\_____  /\_____|\____\   #
#        \/                  \/             \/                 #
#                   ___________   ______  _  __                #
#                 _/ ___\_  __ \_/ __ \ \/ \/ /                #
#                 \  \___|  | \/\  ___/\     /                 #
#                  \___  >__|    \___  >\/\_/                  #
#      est.2007        \/            \/   forum.darkc0de.com   #
################################################################

system('clear','cls');
    system('title Dork Scanner.....');
                             
print "\n";
print "\t=============================================================\n";
print "\t= ________________________                                  =\n";
print "\t=/ `---__gunslinger_ ™___|]  ========gunslinger_=======)    =\n";
print "\t=/_==o;;;;;;;;___DC___.:/                                   =\n";
print "\t=),---.(_(__) /                                             =\n";
print "\t=// () ),-----                                              =\n";
print "\t=//___//                                                    =\n";
print "\t=/===//                                                     =\n";
print "\t====//                                                      =\n";
print "\t=============================================================\n";
print "\n";;



print"\n";
print "\t=======================================\n";
print "\t=         Coded by gunslinger_         =\n";
print "\t=           Devilzc0de crew            =\n";
print "\t=              ( DS )                  =\n";
print "\t=           Dork Scanner !             =\n";
print "\t=======================================\n";
print "\n";;



use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;

#devilzc0de crew

print q{

};
print "please input your dork : ";
chomp ($kiddies=<STDIN>);
print "\n";
print "Name file of DS result : ";
chomp ($peti=<STDIN>);
print "\n\n";

if ($kiddies=~ /(.*)/){

    print "=================================\n";
    print "= Searching, please wait...     =\n";
    print "= Ctrl + C to abort operation   =\n";
    print "=================================\n\n";

my $flyff666=$1;

# Starting The Search Engine
my @mlist=&ugds($flyff666);

sub ugds(){

my @lst;
for($spykit=1;$spykit<=500;$spykit+=1){

#------------------------------------------

my $wisdom=LWP::UserAgent->new;
$wisdom->agent("");

#------------------------------------------
my $google=("http://search.live.com/results.aspx?q=".$flyff666."&first=".$spykit."&FORM=PERE");
my $g0nzhack=$wisdom->get("$google");
$g0nzhack->as_string;
my $Res=$g0nzhack->content;
while($Res =~ m/<a href=\"?http:\/\/([^>\"]*)/g){
if($1 !~ /msn|live|microsoft|WindowsLiveTranslator|youtube|google|cache|74.125.153.132|inurl:|q=|404|403|Time|out|Network|Failed/){

    my $gunslinger=$1;
    $gunslinger=~s/&(.*)/\ /g;
    print "http://$gunslinger\n";
    open(FILE,">>$peti");
    print FILE "http://$gunslinger\n";
    close(FILE);

}}}
}}



print "\n====================================================";
print "\n             Press Enter to continue...            =";
print "\n             Press Ctrl + C to exit...             =";
print "\n====================================================\n\n";

<STDIN>;

<STDIN>;

system("$0")

dimanche 16 novembre 2008

DDLSearch

Comme dit sur la page d'accueil:

"DDLSearch est un moteur de recherche pour le contenu hébergé sur les sites de partage de fichiers comme Rapidshare, Megaupload, Filefactory, etc. Grace DDLsearch vous pouvez trouver toute sorte de liens vers des fichiers en telechargement direct comme des mp3, avi, mpg, divx, rar, etc."

DDLSearch

ZooZle

Pour rechercher un fichier sur eMule/Torrent/Usenet et d'autres...
ZooZle

Daleya

Meta Moteur de Recherche sur les sites de téléchargement (RapidShare/MegaUpload/MediaFire...)
Permet une recherche par extension (.doc/.xls/.ppt...)
Daleya