Donate for the Cryptome archive of files from June 1996 to the present


28 October 2014

SEC WikiLeaks Citations


[Several of these firms have the same WikiLeaks reference in multiple filings. Latest are shown.]

http://www.sec.gov/Archives/edgar/data/1065088/000106508814000156/ebay10-qq32014.htm

10-Q for EBAY INC

10/16/2014

For example, in December 2010, PayPal was subject to a series of distributed “denial of service” attacks following PayPal’s decision to indefinitely restrict the account used by WikiLeaks due to an alleged violation of PayPal’s Acceptable Use Policy.


http://www.sec.gov/Archives/edgar/data/1579346/000119312514257706/d721187ds1a.htm

S-1/A for WINKLEVOSS BITCOIN TRUST

07/01/2014

Goods and Services

As of June 2014, it is estimated that as many as 70,000 merchants or businesses accept, or have the technological infrastructure to choose to accept (e.g., Shopify merchants), bitcoins as payment. Additionally, non-profit organizations such as Wikileaks have gained notoriety for accepting donations in bitcoins.


http://www.sec.gov/Archives/edgar/data/933425/000093342512000012/f20120930.htm

ACCREDITED BUSINESS CONSOLIDATORS CORP. 10-Q QUARTERLY REPORT

09/30/2012

Reports on Form 8-K

The Pionen Data Center in Sweden is one of the most reputable and secure data centers in the world, successfully hosting Wikileaks without interruption.


http://www.sec.gov/Archives/edgar/data/1015922/000119312512155119/d229899d20f.htm

FORM 20-F Check Point Software Technologies

04/09/2012

The exposure of security vendor HB Gary, Inc. CEO’s email by the group “Anonymous” in solidarity with Wikileaks data publication is one of many 2011 examples of such an attack, with other attacks looking at exposing sensitive data and others aiming at disrupting normal operations of the targeted organization or entity.


http://www.sec.gov/Archives/edgar/data/1364962/000119312511303228/d189646d424b1.htm

424B1 for IMPERVA INC

11/09/2011

At the same time, the greater use and availability of this high-value business data has driven an increase in the monetary incentives for its theft and abuse. In addition, recent events, such as the data leaks publicized by WikiLeaks, demonstrate that the value of business data goes well beyond its financial value and includes political and military value.


http://www.sec.gov/Archives/edgar/data/890540/000095012311089150/w83670nvcsr.htm

N-CSR for Advisors Inner Circle Fund II

10/07/2011

Energy

Having just read Peter Maass’s book, Crude World, we were intrigued by his interviews and anecdotes early in the book which strongly suggest that Saudi Arabia will not have ample spare capacity to meet the increased demand for oil expected within a few years. Since that book was published in 2009; confidential cables from the U.S. embassy in Riyadh, that were released by WikiLeaks, urged Washington D.C. to take seriously a senior Saudi oil official’s warning that the Kingdom’s reserves may be overstated by as much as 40%.


http://www.sec.gov/Archives/edgar/data/1514226/000119312511203858/dex991.htm

EX-99.1 of 8-K for Delta Tucker Holdings Inc

08/01/2011

Big Drivers in US Defense and Foreign Policy

A 2010 cable from US diplomats made public by WikiLeaks reveals Guatemala has only a single helicopter and five pickup trucks to patrol its entire border with Mexico.


http://www.sec.gov/Archives/edgar/data/1518154/000095012311068027/c63891a4sv1za.htm

S-1/A for Trustwave Holdings Inc

07/26/2011

Concurrent with the proliferation of digital data, security threats continue to become more sophisticated, numerous and severe. Threats emanate from many internal and external sources, including organized cyber-criminals, hostile governments, disgruntled employees and unintended internal errors. Although many are not reported or well publicized, some security breaches have made headlines, such as the publishing of government and business documents by WikiLeaks.


http://www.sec.gov/Archives/edgar/data/798528/000119312511160711/dex992.htm

EX-99.2 of 8-K for ODYSSEY MARINE EXPLORATION INC

06/08/2011

Potential positive “Black Swan” ruling

WikiLeaks documentation of U.S. Government’s attempted interference in the case


http://www.sec.gov/Archives/edgar/data/1468516/000119312511124905/dex21.htm

EX-2.1 of 10-Q for AOL Inc

05/04/2011

Neither the Company nor its Subsidiary has published, reproduced or otherwise disseminated, or permitted any of their employees or independent contractors or contributors to publish, reproduce or otherwise disseminate, any secret, top secret or other similarly classified information of any Governmental Authority (including, for the avoidance of doubt, materials distributed by Wikileaks) on the Websites of the Company or its Subsidiary, in each case in a manner that causes the Company to be in violation of Law.


http://www.sec.gov/Archives/edgar/data/1094366/000117891311001200/exhibit_10-1.htm

EX-10.1 of 6-K for RADWARE LTD

04/28/2011

Radware Talks Wikileaks’ Operation Payback at 2011 RSA Conference


http://www.sec.gov/Archives/edgar/data/1112920/000119312511081631/d10k.htm

10-K for GLOBALSCAPE INC

03/30/2011

Additional government business opportunities also may arise as a result of the WikiLeaks disclosures during 2010. The resulting bans on removable media within the government raise the profile of solutions like ours for securely moving large files, or large numbers of file.


http://www.sec.gov/Archives/edgar/data/840678/000120928611000234/e78686.htm

N-CSR for FIFTH THIRD FUNDS

03/25/2011

In short, 2010 was quite an eventful year. In the third and fourth quarters alone, the listing of notable events is long: We witnessed a mid-term election and political shift that reverberated throughout the country; U.S. companies continued to register extraordinary improvements in earnings and balance sheets; WikiLeaks news stories dominated the headlines globally; and economic signs indicated that better times may be ahead.