one of the biggest leaks in intelligence history. An archive of almost 90,000 files has come to light thanks to Wikileaks, logging the history of the war in Afghanistan, practically blow-by-blow. This file will help you make sense of the key events.
Col A: Key
This is the unique indentifying code for each incident - if you have this, it makes it much easier to find.(you can use this is a google search)
Col G: Date and time
Obvious - and in UK format (dd/mm/yy) which is used by Nato forces, rather than the US format (mm/dd/yy). It also often includes the time each incident occurred. They run from 2004 up to the end of 2009.
Col H: Type
This section describes the type of incident. "Friendly fire" for instance, means coalition troops mistakenly firing on each other. "Friendly action" on the other hand, means "fighting started by our side" rather than an enemy attack.
Col I: Category
This can have similar information - but with slightly more detail. 'Blue-blue' for instance, means our own troops shooting at each other.
Col L: Title
This often has a brief summary of how many people were KIA – killed in action or WIA – wounded in action.
Col M: Summary
This is the really important entry. It contains a short account of what happened, - although it's often, but not always, written in pretty impenetrable military jargon. We have put together a glossary of the key terms here.
Cols T to AA: statistics
There follow some columns for statistics – friendly troops, host nation, civilians 'KIA' or 'WIA'. Unfortunately, they are highly unreliable and the authors – many of them in the field of battle - often simply failed to fill them in.
Col AH: CCIR
This is sometimes important – it may say "likely to cause negative media" or that there is a "credible allegation" civilians have been killed.
We've also put together an interactive map of every IED – improvised explosive device – attack, all 16,000, where you can see how the number has rocketed since 2004.
This is in an Excel file (Google spreadsheets can't cope with the enormous amount of text in these documents). What can you do with it?
We are a non commercial community interested only in the discussion of all things military. We do not sell or authorise the use of images hosted on our servers, if you wish to purchase or use imagery contact the uploader directly.(you will need to register). Any requests received to purchase or use imagery will be ignored. Thank you and welcome to MI.Net
XLS file Wikileaks Afghanistan files 2017-07-24
Key incidents from the Wikileaks Afghanistan war logs