[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:18.01,0:00:22.77,Default,,0000,0000,0000,,It's been reported that WikiLeaks has released more classified documents Dialogue: 0,0:00:22.77,0:00:27.81,Default,,0000,0000,0000,,than the rest of the world's media combined. Can that possibly be true? Dialogue: 0,0:00:27.84,0:00:31.01,Default,,0000,0000,0000,,Yeah, "can it possibly be true", it's a worry isn't it ? Dialogue: 0,0:00:31.01,0:00:34.63,Default,,0000,0000,0000,,That the rest of the world's media is doing such a bad job Dialogue: 0,0:00:34.65,0:00:38.57,Default,,0000,0000,0000,,that a little group of activists is able to release Dialogue: 0,0:00:38.57,0:00:41.91,Default,,0000,0000,0000,,more of that type of information than the rest of the world has combined. Dialogue: 0,0:00:44.33,0:00:49.15,Default,,0000,0000,0000,,[Soldiers voices during the war in Irak] Dialogue: 0,0:00:49.17,0:00:51.18,Default,,0000,0000,0000,,Come on, fire ! Dialogue: 0,0:00:52.53,0:00:54.87,Default,,0000,0000,0000,,Good evening, there's a secret file from the Irak war... Dialogue: 0,0:00:54.87,0:00:56.31,Default,,0000,0000,0000,,...the internet platform "Wikileaks"... Dialogue: 0,0:00:56.31,0:01:00.21,Default,,0000,0000,0000,,... the internet website "Wikileaks" published ... Dialogue: 0,0:01:03.46,0:01:07.26,Default,,0000,0000,0000,,WikiLeaks have made public the most extensive, Dialogue: 0,0:01:07.26,0:01:09.64,Default,,0000,0000,0000,,classified, military and diplomatic material ever. Dialogue: 0,0:01:09.66,0:01:12.31,Default,,0000,0000,0000,,What they've released is challenging and provoking governments Dialogue: 0,0:01:12.31,0:01:15.35,Default,,0000,0000,0000,,with skeletons in the cupboards all over the world. Dialogue: 0,0:01:15.35,0:01:19.85,Default,,0000,0000,0000,,We should condemn the disclosure of any classified information Dialogue: 0,0:01:19.85,0:01:22.44,Default,,0000,0000,0000,,by individuals and organizations. Dialogue: 0,0:01:22.44,0:01:25.31,Default,,0000,0000,0000,,The people who are in power will not give that power away freely, Dialogue: 0,0:01:25.31,0:01:29.22,Default,,0000,0000,0000,,that is just unfortunately a fact of nature. Dialogue: 0,0:01:29.22,0:01:33.28,Default,,0000,0000,0000,,The defense department demands that WikiLeaks return immediately Dialogue: 0,0:01:33.28,0:01:37.11,Default,,0000,0000,0000,,all versions of documents obtained directly or indirectly Dialogue: 0,0:01:37.11,0:01:40.57,Default,,0000,0000,0000,,from the department of defense databases or records. Dialogue: 0,0:01:40.57,0:01:44.65,Default,,0000,0000,0000,,It's only now that the true story behind the development of this closed organization Dialogue: 0,0:01:44.65,0:01:46.75,Default,,0000,0000,0000,,is coming to light, Dialogue: 0,0:01:46.75,0:01:49.98,Default,,0000,0000,0000,,but while the world is discussing whether Assange is a rapist or a saint, Dialogue: 0,0:01:49.98,0:01:52.76,Default,,0000,0000,0000,,WikiLeaks continue to persue their own political agenda. Dialogue: 0,0:01:52.76,0:01:59.53,Default,,0000,0000,0000,,Every release we do of material has a second message and that is: Dialogue: 0,0:01:59.53,0:02:06.69,Default,,0000,0000,0000,,« we set examples. If you engage in immoral, in unjust behavior, Dialogue: 0,0:02:06.69,0:02:11.52,Default,,0000,0000,0000,,it will be found out, it will be revealed and you will suffer the consequences. ». Dialogue: 0,0:02:11.52,0:02:15.49,Default,,0000,0000,0000,,What we have here is a new breed of rebel, I.T. guerrillas without a national base, Dialogue: 0,0:02:15.49,0:02:23.20,Default,,0000,0000,0000,,student digs, coffee bars and server rooms, these are their command and control centers spread all over the world Dialogue: 0,0:02:23.22,0:02:26.06,Default,,0000,0000,0000,,and the battle has already started. Dialogue: 0,0:02:26.06,0:02:31.84,Default,,0000,0000,0000,,The general in charge of 120 advanced intelligence agency personnel Dialogue: 0,0:02:31.84,0:02:35.50,Default,,0000,0000,0000,,targeting this institution and its products. Dialogue: 0,0:02:35.50,0:02:42.69,Default,,0000,0000,0000,,- WikiRebels - Dialogue: 0,0:02:46.40,0:02:51.33,Default,,0000,0000,0000,,WikiLeaks have become a global force to be reckoned with in record time. Dialogue: 0,0:02:51.33,0:02:55.45,Default,,0000,0000,0000,,It may not be easy to grasp at first, but the release of classified information Dialogue: 0,0:02:55.46,0:03:01.05,Default,,0000,0000,0000,,n'est qu'un petit pas dans une bataille politique et idéologique à long terme. Dialogue: 0,0:03:01.05,0:03:06.18,Default,,0000,0000,0000,,and that leaking classified information is a weapon and not a means unto itself. Dialogue: 0,0:03:07.04,0:03:10.80,Default,,0000,0000,0000,,The public has a right to know materials Dialogue: 0,0:03:10.80,0:03:19.93,Default,,0000,0000,0000,,and the historical record has a right to have materials of diplomatic, political, ethnic or historical significance. Dialogue: 0,0:03:19.93,0:03:25.73,Default,,0000,0000,0000,,If something is interfering with that process, we will undo it. Dialogue: 0,0:03:25.73,0:03:28.69,Default,,0000,0000,0000,,He's been called The Scarlet Pimpernel of the computer age. Dialogue: 0,0:03:28.69,0:03:33.15,Default,,0000,0000,0000,,If one were to judge him on his looks alone, you could call him a chameleon given the frequency Dialogue: 0,0:03:33.18,0:03:38.07,Default,,0000,0000,0000,,of his change of hair styles during the six months we've been following WikiLeaks. Dialogue: 0,0:03:38.07,0:03:42.05,Default,,0000,0000,0000,,But if you look under the surface you'll soon discover that Julian Assange Dialogue: 0,0:03:42.05,0:03:46.71,Default,,0000,0000,0000,,has been revolting against the powers that be for a long time. Dialogue: 0,0:03:46.71,0:03:51.95,Default,,0000,0000,0000,,As a teenager in Australia he called himself "Mendax" and got a name for himself as a highly skilled hacker. Dialogue: 0,0:03:51.98,0:03:57.76,Default,,0000,0000,0000,,By the age of 21 he found himself in court pleading guilty to some 20 different charges of hacking. Dialogue: 0,0:03:57.76,0:04:04.00,Default,,0000,0000,0000,,Yeah, I mean we had a back door in the US military security coordination centre. Dialogue: 0,0:04:04.00,0:04:14.58,Default,,0000,0000,0000,,This is the peak security body controlling Milnet, the US military internet. Dialogue: 0,0:04:14.58,0:04:19.25,Default,,0000,0000,0000,,We had total control of this for two years. Dialogue: 0,0:04:19.25,0:04:24.56,Default,,0000,0000,0000,,The US space agency, NASA is one of the victims of the computer hacking syndicate. Dialogue: 0,0:04:24.56,0:04:29.32,Default,,0000,0000,0000,,American investigators including the FBI contacted Australian authorities with their suspicions. Dialogue: 0,0:04:29.32,0:04:35.61,Default,,0000,0000,0000,,The court was told the man even tampered with the police investigation into hacking of the ANU. Dialogue: 0,0:04:35.61,0:04:40.13,Default,,0000,0000,0000,,The judge seeing Assange as just an inquisitive young man, Dialogue: 0,0:04:40.13,0:04:43.24,Default,,0000,0000,0000,,fined him a symbolic sum and released him, Dialogue: 0,0:04:43.24,0:04:46.22,Default,,0000,0000,0000,,however the trial added further fuel to Assange's feelings Dialogue: 0,0:04:46.22,0:04:49.48,Default,,0000,0000,0000,,about the importance of unrestricted information. Dialogue: 0,0:04:49.48,0:04:53.79,Default,,0000,0000,0000,,Together with some friends he sets up one of Australia's first internet suppliers Dialogue: 0,0:04:53.79,0:04:59.24,Default,,0000,0000,0000,,and gives people with politically sensitive viewpoints a platform from which to publish their opinions. Dialogue: 0,0:04:59.24,0:05:02.87,Default,,0000,0000,0000,,But when one of his customers publishes secret Scientology manuals, Dialogue: 0,0:05:02.87,0:05:06.47,Default,,0000,0000,0000,,this prompts aggressive efforts to censor him. Dialogue: 0,0:05:06.48,0:05:12.04,Default,,0000,0000,0000,,one of the lawyers for scientology in California sent me letters trying to attack us Dialogue: 0,0:05:12.04,0:05:19.14,Default,,0000,0000,0000,,and they ended up hiring a private investigator to try and track me down, Dialogue: 0,0:05:19.14,0:05:24.70,Default,,0000,0000,0000,,who did manage to get hold of my silent telephone line Dialogue: 0,0:05:24.70,0:05:28.59,Default,,0000,0000,0000,,and called me up and just as a sort of threatening maneuver, Dialogue: 0,0:05:28.59,0:05:32.80,Default,,0000,0000,0000,,I ended up tracking down how they did that. Dialogue: 0,0:05:32.80,0:05:36.48,Default,,0000,0000,0000,,Those efforts to censor the site strengthen his conviction that something Dialogue: 0,0:05:36.48,0:05:40.81,Default,,0000,0000,0000,,has to be done against those withholding important information from the public at large. Dialogue: 0,0:05:42.67,0:05:46.12,Default,,0000,0000,0000,,What the problem was, Dialogue: 0,0:05:46.12,0:05:49.43,Default,,0000,0000,0000,,they needed to use more actions Dialogue: 0,0:05:49.43,0:05:51.92,Default,,0000,0000,0000,,that created positive reform effect, Dialogue: 0,0:05:51.92,0:05:56.62,Default,,0000,0000,0000,,more actions that would adjust and corrective Dialogue: 0,0:05:56.62,0:05:59.47,Default,,0000,0000,0000,,to injustice. Dialogue: 0,0:05:59.47,0:06:03.31,Default,,0000,0000,0000,,Assange sees disclosures as a preventative instrument, Dialogue: 0,0:06:03.31,0:06:06.45,Default,,0000,0000,0000,,it warns those involved in morally questionable or criminal acts that Dialogue: 0,0:06:06.45,0:06:11.87,Default,,0000,0000,0000,,they'll be found out and will have to face consequences. Dialogue: 0,0:06:11.87,0:06:17.60,Default,,0000,0000,0000,,I understood the significance of disclosures for quite some time, Dialogue: 0,0:06:17.60,0:06:20.58,Default,,0000,0000,0000,,I mean I registered [wiki]leaks.org in 1999. Dialogue: 0,0:06:20.58,0:06:25.07,Default,,0000,0000,0000,,In 2006, Assange and a group of like-minded people Dialogue: 0,0:06:25.07,0:06:28.96,Default,,0000,0000,0000,,start building up a special internet service WikiLeaks.org, Dialogue: 0,0:06:28.96,0:06:33.19,Default,,0000,0000,0000,,exclusively for people wishing to blow the whistle on abuse of power. Dialogue: 0,0:06:33.48,0:06:37.76,Default,,0000,0000,0000,,His fellow conspirators comprised of hackers and mathematicians, Dialogue: 0,0:06:37.76,0:06:39.56,Default,,0000,0000,0000,,they're located around the world Dialogue: 0,0:06:39.56,0:06:41.78,Default,,0000,0000,0000,,and communicate via a restricted mailing list. Dialogue: 0,0:06:41.78,0:06:46.65,Default,,0000,0000,0000,,From this platform they start defining their thoughts of building up a worldwide movement Dialogue: 0,0:06:46.65,0:06:49.03,Default,,0000,0000,0000,,to mass publicize classified information. Dialogue: 0,0:06:49.03,0:06:52.73,Default,,0000,0000,0000,,They affirm that this is the most cost effective political weapon Dialogue: 0,0:06:52.73,0:06:56.96,Default,,0000,0000,0000,,and that they intend to place a new star on the political firmament of man. Dialogue: 0,0:06:56.96,0:07:02.95,Default,,0000,0000,0000,,Any reform that is large scale must be based upon information because, Dialogue: 0,0:07:02.95,0:07:07.91,Default,,0000,0000,0000,,what else can spread other than viruses only information can spread Dialogue: 0,0:07:07.91,0:07:11.07,Default,,0000,0000,0000,,and achieve large scale reform. Dialogue: 0,0:07:11.07,0:07:13.64,Default,,0000,0000,0000,,Inspired by Wikipedia, WIkiLeaks distribute the leaked information Dialogue: 0,0:07:13.64,0:07:17.16,Default,,0000,0000,0000,,to anonymous volunteers to check its authenticity Dialogue: 0,0:07:17.16,0:07:21.23,Default,,0000,0000,0000,,and eliminate any traces of the senders identity. Dialogue: 0,0:07:21.23,0:07:23.76,Default,,0000,0000,0000,,It turns out that the majority of the general public has neither the time, Dialogue: 0,0:07:23.76,0:07:27.11,Default,,0000,0000,0000,,interest or resources to analyze WikiLeaks' material Dialogue: 0,0:07:27.11,0:07:30.46,Default,,0000,0000,0000,,but there are professionals to turn to. Dialogue: 0,0:07:30.46,0:07:36.90,Default,,0000,0000,0000,,In 2006 we hoped that the general public would write analysis articles, Dialogue: 0,0:07:36.90,0:07:40.21,Default,,0000,0000,0000,,collaboratively, Dialogue: 0,0:07:40.21,0:07:42.67,Default,,0000,0000,0000,,and ... this was not at all true. Dialogue: 0,0:07:43.51,0:07:46.26,Default,,0000,0000,0000,,WikiLeaks had come to the conclusion that media are the only channels Dialogue: 0,0:07:46.26,0:07:50.75,Default,,0000,0000,0000,,that have the resources and motivation required to create a real impact. Dialogue: 0,0:07:51.48,0:07:56.26,Default,,0000,0000,0000,,In 2007, WikiLeaks in association with the British daily newspaper, The Guardian, Dialogue: 0,0:07:56.26,0:08:00.41,Default,,0000,0000,0000,,published evidence of former president Daniel rap Moi Dialogue: 0,0:08:00.41,0:08:04.96,Default,,0000,0000,0000,,having embezzled massive sums from Kenyan state funds. Dialogue: 0,0:08:04.96,0:08:13.57,Default,,0000,0000,0000,,Shortly after that they release a report about the Kenyan police's use of death patrols. Dialogue: 0,0:08:15.87,0:08:19.48,Default,,0000,0000,0000,,This disclosure causes a great stir, Dialogue: 0,0:08:19.48,0:08:24.00,Default,,0000,0000,0000,,but as an organization, WikiLeaks continue to remain unknown to the general public, Dialogue: 0,0:08:24.00,0:08:26.90,Default,,0000,0000,0000,,however the word spreads among activists far and wide on the net, Dialogue: 0,0:08:26.90,0:08:30.04,Default,,0000,0000,0000,,eventually reaching the german "Chaos Computer Club", Dialogue: 0,0:08:30.04,0:08:34.36,Default,,0000,0000,0000,,the biggest and oldest club for hackers in the world. Dialogue: 0,0:08:35.50,0:08:40.64,Default,,0000,0000,0000,,I heard about it in late 2007 from a couple of friends. Dialogue: 0,0:08:40.64,0:08:43.04,Default,,0000,0000,0000,,I started reading a bit more Dialogue: 0,0:08:43.04,0:08:49.03,Default,,0000,0000,0000,,but I started to understand the value of such a project to society. Dialogue: 0,0:08:49.03,0:08:54.57,Default,,0000,0000,0000,,The political engaged chaos computer club has been fighting a long-term battle for free access to information. Dialogue: 0,0:08:54.57,0:09:00.26,Default,,0000,0000,0000,,One of its members, Daniel Domscheit-Berg, is quick to recognize Dialogue: 0,0:09:00.26,0:09:03.92,Default,,0000,0000,0000,,the common ground between his view of society and that of Wikileaks. Dialogue: 0,0:09:03.92,0:09:06.32,Default,,0000,0000,0000,,He quits his job as a computer consultant Dialogue: 0,0:09:06.32,0:09:10.01,Default,,0000,0000,0000,,so as to devote all of his to the new organization. Dialogue: 0,0:09:11.73,0:09:13.61,Default,,0000,0000,0000,,The question is the attitude. Dialogue: 0,0:09:13.61,0:09:15.38,Default,,0000,0000,0000,,What attitude do you have to society ? Dialogue: 0,0:09:15.38,0:09:17.92,Default,,0000,0000,0000,,Do you, do you look at what there is Dialogue: 0,0:09:17.92,0:09:20.06,Default,,0000,0000,0000,,and you accept that as god given, Dialogue: 0,0:09:20.06,0:09:23.30,Default,,0000,0000,0000,,or do you see society as something Dialogue: 0,0:09:23.30,0:09:27.08,Default,,0000,0000,0000,,where you identify a problem and you find a creative solution for that problem. Dialogue: 0,0:09:27.08,0:09:30.09,Default,,0000,0000,0000,,So it is a matter of are you a spectator Dialogue: 0,0:09:30.09,0:09:34.36,Default,,0000,0000,0000,,or are you actively participating in ... in society. Dialogue: 0,0:09:34.36,0:09:40.04,Default,,0000,0000,0000,,The computer club has put the skills of some of the sharpest hacking talents in the world at Wikileaks disposal. Dialogue: 0,0:09:40.04,0:09:42.68,Default,,0000,0000,0000,,What's needed now is a physical haven. Dialogue: 0,0:09:42.68,0:09:46.89,Default,,0000,0000,0000,,Hackers linked to the swedish file-sharing site Pirate Bay have what they need. Dialogue: 0,0:09:46.91,0:09:51.87,Default,,0000,0000,0000,,Considerable technical skills in a place where freedom of speech is unusually free. Dialogue: 0,0:09:51.87,0:09:58.17,Default,,0000,0000,0000,,A lot of the countries of today's world do not have really strong laws for the media anymore. Dialogue: 0,0:09:58.17,0:10:05.59,Default,,0000,0000,0000,,But.. a few countries like for instance Belgium, also the United States with the 1st amendement, Dialogue: 0,0:10:05.59,0:10:10.45,Default,,0000,0000,0000,,and especially for example Sweden have very strong laws protecting the media Dialogue: 0,0:10:10.45,0:10:14.58,Default,,0000,0000,0000,,and the work of investigative or general journalists. Dialogue: 0,0:10:14.91,0:10:22.57,Default,,0000,0000,0000,,So, from our perspective this is something, if there's any Swedes here, you have to make sure that your country Dialogue: 0,0:10:22.57,0:10:27.72,Default,,0000,0000,0000,,is really one the strongholds of freedom of information. Dialogue: 0,0:10:27.72,0:10:38.48,Default,,0000,0000,0000,,Sweden has an enviable, although far from perfect record in protecting publications. Dialogue: 0,0:10:38.48,0:10:42.12,Default,,0000,0000,0000,,It has a practical record within the past few years Dialogue: 0,0:10:42.13,0:10:46.79,Default,,0000,0000,0000,,of protecting internet publications against censorship. Dialogue: 0,0:10:46.79,0:10:51.91,Default,,0000,0000,0000,,And it's precisely Sweden's unique freedom of speech laws that prompts Wikileaks Dialogue: 0,0:10:51.91,0:10:57.69,Default,,0000,0000,0000,,to locate their main site in this unpretentious basement, in one of Stockolms inner suburbs. Dialogue: 0,0:10:58.67,0:11:03.43,Default,,0000,0000,0000,,At first they wanted to tunnel traffic through us, Dialogue: 0,0:11:03.44,0:11:11.71,Default,,0000,0000,0000,,to bypass IP bans in places that don't like Wikileaks. But later they put a server here. Dialogue: 0,0:11:12.62,0:11:15.81,Default,,0000,0000,0000,,PRQ offer their customers total secrecy. Dialogue: 0,0:11:15.81,0:11:22.30,Default,,0000,0000,0000,,Their systems prevent anyone from eavesdropping either Wikileaks chat pages or finding out who send what to who. Dialogue: 0,0:11:23.33,0:11:28.06,Default,,0000,0000,0000,,We provide anonymity services, VPN tunnels. Dialogue: 0,0:11:28.06,0:11:34.09,Default,,0000,0000,0000,,A client connects to our server and downloads information. Dialogue: 0,0:11:34.09,0:11:38.50,Default,,0000,0000,0000,,If anyone at the information's source tries to trace them, Dialogue: 0,0:11:38.56,0:11:45.40,Default,,0000,0000,0000,,they can only get to us, and we don't disclose who was using that IP number. Dialogue: 0,0:11:46.30,0:11:53.37,Default,,0000,0000,0000,,PRQ have a track record of being the hardest ISP you can find in the world. Dialogue: 0,0:11:53.37,0:11:57.29,Default,,0000,0000,0000,,There's just no one else that bothers less about lawyers Dialogue: 0,0:11:57.29,0:12:00.54,Default,,0000,0000,0000,,harassing them about content they're hosting. Dialogue: 0,0:12:00.54,0:12:07.26,Default,,0000,0000,0000,,And it's just the attitute that, let's say, works very well with what Wikileaks was set out to do. Dialogue: 0,0:12:12.03,0:12:15.13,Default,,0000,0000,0000,,One reason why Wikileaks need PRQ Dialogue: 0,0:12:15.13,0:12:20.64,Default,,0000,0000,0000,,is that their operations are protected by Swedens strict freedom of expression laws. Dialogue: 0,0:12:20.64,0:12:24.04,Default,,0000,0000,0000,,Laws which PRQ exploit to the full. Dialogue: 0,0:12:24.84,0:12:30.71,Default,,0000,0000,0000,,We accept anything that is legal under Swedish law, Dialogue: 0,0:12:30.72,0:12:32.79,Default,,0000,0000,0000,,regardless of how objectionable it is. Dialogue: 0,0:12:32.79,0:12:39.01,Default,,0000,0000,0000,,We don't make moral judgements. Dialogue: 0,0:12:39.01,0:12:43.88,Default,,0000,0000,0000,,This is a ticking information bomb, instead of conventional weapons. Dialogue: 0,0:12:43.88,0:12:48.72,Default,,0000,0000,0000,,Hopefully this information can somehow Dialogue: 0,0:12:48.72,0:12:52.19,Default,,0000,0000,0000,,stop some conventional weapons. Dialogue: 0,0:12:54.51,0:12:57.26,Default,,0000,0000,0000,,And we aren't talking about any old information. Dialogue: 0,0:12:57.26,0:13:01.10,Default,,0000,0000,0000,,It's from these servers, at PRQ, that Wikileaks has, for example, made public Dialogue: 0,0:13:01.10,0:13:05.25,Default,,0000,0000,0000,,a manual from the United States Guantanamo bay detention center. Dialogue: 0,0:13:05.25,0:13:10.69,Default,,0000,0000,0000,,A military manual leaked on the Internet, is revealing details of the way terror suspects Dialogue: 0,0:13:10.69,0:13:16.12,Default,,0000,0000,0000,,are being treated at the US naval base at Guantanamo bay in Cuba. Dialogue: 0,0:13:17.22,0:13:22.45,Default,,0000,0000,0000,,It tells of the use of solitary confinement and humiliation to break down the detainees mentally. Dialogue: 0,0:13:24.69,0:13:28.49,Default,,0000,0000,0000,,Human Rights Groups have for years been asking the US administration Dialogue: 0,0:13:28.50,0:13:32.28,Default,,0000,0000,0000,,for access to this manual. Dialogue: 0,0:13:34.68,0:13:40.76,Default,,0000,0000,0000,,If you censor important material of this type, we're not just gonna criticize you. Dialogue: 0,0:13:40.76,0:13:44.38,Default,,0000,0000,0000,,We're gonna take the material you're trying to censor, Dialogue: 0,0:13:44.38,0:13:47.48,Default,,0000,0000,0000,,and we're going to spray it all over the world. Dialogue: 0,0:13:47.48,0:13:50.05,Default,,0000,0000,0000,,And we're gonna stick in our archives in a way that it's never going to disappear, Dialogue: 0,0:13:50.05,0:13:54.06,Default,,0000,0000,0000,,encourage everyone to get copies of it. Dialogue: 0,0:13:54.06,0:13:58.03,Default,,0000,0000,0000,,Wikileaks battle against censorship knows no geographical frontiers. Dialogue: 0,0:13:58.03,0:14:03.83,Default,,0000,0000,0000,,The next step is to publish an internal report commissioned by the multinational trading company Trafigura, Dialogue: 0,0:14:03.83,0:14:08.96,Default,,0000,0000,0000,,who are alleged to have dumped toxic waste in the Ivory Coast Dialogue: 0,0:14:08.97,0:14:12.55,Default,,0000,0000,0000,,that caused tens of thousands of people to seek medical care. Dialogue: 0,0:14:12.55,0:14:17.33,Default,,0000,0000,0000,,The Guardian newspaper was going to produce a big story on this. Dialogue: 0,0:14:17.35,0:14:20.54,Default,,0000,0000,0000,,And as a result, they were gagged. Dialogue: 0,0:14:20.54,0:14:29.00,Default,,0000,0000,0000,,The company obtained a secret order, in court, to gag all the press in UK Dialogue: 0,0:14:29.00,0:14:34.74,Default,,0000,0000,0000,,from reporting anything related to the content of that report and ... the fact that they had been gagged. Dialogue: 0,0:14:35.91,0:14:41.26,Default,,0000,0000,0000,,In the US, hackers discover that the republican presidential candidate "Sarah Palin" Dialogue: 0,0:14:41.26,0:14:46.82,Default,,0000,0000,0000,,is apparently bypassing US transparency laws by using a private email account Dialogue: 0,0:14:46.82,0:14:48.63,Default,,0000,0000,0000,,to conduct government business.