Feeds

Wikileaks video shows US gunfire on Reuters staff

The pics the Pentagon didn't want you to see

Choosing a cloud hosting partner with confidence

Whistleblower website Wikileaks continued its explosion into mainstream journalism Monday with the release of a classified US military video showing forces firing repeatedly on unarmed people on a Baghdad street.

The video showed an incident from July 12, 2007, the same day that Reuters photographer Namir Noor-Eldeen and his driver were killed in hail of gunfire in the same section of Baghdad. Nine other people were also killed and two children were wounded in the incident.

A Pentagon investigation later found the crew of two Apache helicopters acted appropriately and followed rules of engagement, according to the Associated Press. The Reuters employees were probably "intermixed among the insurgents" and their photography gear was likely misidentified as weapons, it reasoned.

But the video, taken from the gunsights of one of the helicopters, suggests something slightly more complicated. It doesn't show anyone firing on US troops, although an audio track of talking between the fliers identifies some of the men as armed. After a shooter asks for permission to engage, another responds: "Light em all up."

Most of the men immediately drop to the ground, while one scrambles to flee.

"Look at those dead bastards. Nice," a shooter says.

After one of the wounded is loaded into a van and shuttled away, the vehicle is taken out.

The video, which has been confirmed as authentic by senior military officials, may or may not be proof of the Pentagon cover-up and misconduct alleged by Wikileaks. After all, war is messy business, and a grainy video shot by a single helicopter can't be expected to tell the entire story.

But with coverage from the Associated Press, The Washington Post and other mainstream news outlets, the power of Wikileaks to shape the national news agenda can no longer be denied.

Making the leak all the more impressive, Reuters sought the same video footage under the US Freedom of Information Act and was turned down. Wikileaks, which has little use for such niceties, said it acquired the encrypted footage from military sources.

Which makes you wonder if the army really did consider ways to bring down the whistleblower site. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.