Afghanistan: The War Logs
Wikileaks Afghanistan Files: Download the Key Incidents as a Spreadsheet
Key incidents from the Wikileaks Afghanistan war logs selected by Guardian writers. As a spreadsheet, with co-ordinates
• Get this data
• INTERACTIVE: These key incidents mapped
• Glossary of military terms
• How our datajournalism project worked
It must be one of the biggest leaks in intelligence history. An archive of almost 90,000 files has come to light thanks to Wikileaks, logging the history of the war in Afghanistan, practically blow-by-blow. We’ve trawled through these incidents to help you make sense of the key events.
We have reproduced full military logs behind more than 200 of the key events from the database – you can navigate around them. But if you want to download this data to play with it yourself, this is the place to come.
These detailed reports show coalition forces’ attacks on civilians, friendly fire incidents and Afghan forces attacking each other – so-called green on green.
Before you can read the original reports, however, these logs need a bit of explanation. Here’s how they’re organised:
Each entry is divided into lots of columns. Some contain map references and the like – which we’ve used to map some of the incidents for instance.
Here is what the columns mean:
Col A: Key
This is the unique indentifying code for each incident – if you have this, it makes it much easier to find.
Col G: Date and time
Obvious – and in UK format (dd/mm/yy) which is used by Nato forces, rather than the US format (mm/dd/yy). It also often includes the time each incident occurred. They run from 2004 up to the end of 2009.
Col H: Type
This section describes the type of incident. “Friendly fire” for instance, means coalition troops mistakenly firing on each other. “Friendly action” on the other hand, means “fighting started by our side” rather than an enemy attack.
Col I: Category
This can have similar information – but with slightly more detail. ‘Blue-blue’ for instance, means our own troops shooting at each other.
Col L: Title
This often has a brief summary of how many people were KIA – killed in action or WIA – wounded in action.
Col M: Summary
This is the really important entry. It contains a short account of what happened, – although it’s often, but not always, written in pretty impenetrable military jargon. We have put together a glossary of the key terms here.
Cols T to AA: statistics
There follow some columns for statistics – friendly troops, host nation, civilians ‘KIA’ or ‘WIA’. Unfortunately, they are highly unreliable and the authors – many of them in the field of battle – often simply failed to fill them in.
Col AH: CCIR
This is sometimes important – it may say “likely to cause negative media” or that there is a “credible allegation” civilians have been killed.
We’ve also put together an interactive map of every IED – improvised explosive device – attack, all 16,000, where you can see how the number has rocketed since 2004.
The data we have selected is below – as an Excel file (Google spreadsheets can’t cope with the enormous amount of text in these documents). What can you do with it?
Download the data
Can you do something with this data?
World government data
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
- Slaughter Central
- Denis Halliday: A Voice of Reason in an Insane World
- The Kafkaesque Nightmare of Attorney Steven Donziger, a Literal Prisoner of the Chevron Corporation
- Six Days in Fallujah: Another Video Game That Refuses to Question US Militarism?
- Quad Summit Consolidates US-Led Military Bloc to Prepare for War against China
- Our Four Nations Are Committed to a Free, Open, Secure and Prosperous Indo-Pacific Region
- Nepal: Inaugural Issue of “Social Inquiry” Published
- Afghan Children: Work of Necessity, Work of Choice
- Afghanistan: Graveyard of Empires