28 October 2014 SEC WikiLeaks Citations Tweet [Several of these firms have the same WikiLeaks reference in multiple filings. Latest are shown.] http://www.sec.gov/Archives/edgar/data/1065088/000106508814000156/ebay10-qq32014.htm 10-Q for EBAY INC 10/16/2014 For example, in December 2010, PayPal was subject to a series of distributed denial of service attacks following PayPals decision to indefinitely restrict the account used by WikiLeaks due to an alleged violation of PayPals Acceptable Use Policy. http://www.sec.gov/Archives/edgar/data/1579346/000119312514257706/d721187ds1a.htm S-1/A for WINKLEVOSS BITCOIN TRUST 07/01/2014 Goods and Services As of June 2014, it is estimated that as many as 70,000 merchants or businesses accept, or have the technological infrastructure to choose to accept (e.g., Shopify merchants), bitcoins as payment. Additionally, non-profit organizations such as Wikileaks have gained notoriety for accepting donations in bitcoins. http://www.sec.gov/Archives/edgar/data/933425/000093342512000012/f20120930.htm ACCREDITED BUSINESS CONSOLIDATORS CORP. 10-Q QUARTERLY REPORT 09/30/2012 Reports on Form 8-K The Pionen Data Center in Sweden is one of the most reputable and secure data centers in the world, successfully hosting Wikileaks without interruption. http://www.sec.gov/Archives/edgar/data/1015922/000119312512155119/d229899d20f.htm FORM 20-F Check Point Software Technologies 04/09/2012 The exposure of security vendor HB Gary, Inc. CEOs email by the group Anonymous in solidarity with Wikileaks data publication is one of many 2011 examples of such an attack, with other attacks looking at exposing sensitive data and others aiming at disrupting normal operations of the targeted organization or entity. http://www.sec.gov/Archives/edgar/data/1364962/000119312511303228/d189646d424b1.htm 424B1 for IMPERVA INC 11/09/2011 At the same time, the greater use and availability of this high-value business data has driven an increase in the monetary incentives for its theft and abuse. In addition, recent events, such as the data leaks publicized by WikiLeaks, demonstrate that the value of business data goes well beyond its financial value and includes political and military value. http://www.sec.gov/Archives/edgar/data/890540/000095012311089150/w83670nvcsr.htm N-CSR for Advisors Inner Circle Fund II 10/07/2011 Energy Having just read Peter Maasss book, Crude World, we were intrigued by his interviews and anecdotes early in the book which strongly suggest that Saudi Arabia will not have ample spare capacity to meet the increased demand for oil expected within a few years. Since that book was published in 2009; confidential cables from the U.S. embassy in Riyadh, that were released by WikiLeaks, urged Washington D.C. to take seriously a senior Saudi oil officials warning that the Kingdoms reserves may be overstated by as much as 40%. http://www.sec.gov/Archives/edgar/data/1514226/000119312511203858/dex991.htm EX-99.1 of 8-K for Delta Tucker Holdings Inc 08/01/2011 Big Drivers in US Defense and Foreign Policy A 2010 cable from US diplomats made public by WikiLeaks reveals Guatemala has only a single helicopter and five pickup trucks to patrol its entire border with Mexico. http://www.sec.gov/Archives/edgar/data/1518154/000095012311068027/c63891a4sv1za.htm S-1/A for Trustwave Holdings Inc 07/26/2011 Concurrent with the proliferation of digital data, security threats continue to become more sophisticated, numerous and severe. Threats emanate from many internal and external sources, including organized cyber-criminals, hostile governments, disgruntled employees and unintended internal errors. Although many are not reported or well publicized, some security breaches have made headlines, such as the publishing of government and business documents by WikiLeaks. http://www.sec.gov/Archives/edgar/data/798528/000119312511160711/dex992.htm EX-99.2 of 8-K for ODYSSEY MARINE EXPLORATION INC 06/08/2011 Potential positive Black Swan ruling WikiLeaks documentation of U.S. Governments attempted interference in the case http://www.sec.gov/Archives/edgar/data/1468516/000119312511124905/dex21.htm EX-2.1 of 10-Q for AOL Inc 05/04/2011 Neither the Company nor its Subsidiary has published, reproduced or otherwise disseminated, or permitted any of their employees or independent contractors or contributors to publish, reproduce or otherwise disseminate, any secret, top secret or other similarly classified information of any Governmental Authority (including, for the avoidance of doubt, materials distributed by Wikileaks) on the Websites of the Company or its Subsidiary, in each case in a manner that causes the Company to be in violation of Law. http://www.sec.gov/Archives/edgar/data/1094366/000117891311001200/exhibit_10-1.htm EX-10.1 of 6-K for RADWARE LTD 04/28/2011 Radware Talks Wikileaks Operation Payback at 2011 RSA Conference http://www.sec.gov/Archives/edgar/data/1112920/000119312511081631/d10k.htm 10-K for GLOBALSCAPE INC 03/30/2011 Additional government business opportunities also may arise as a result of the WikiLeaks disclosures during 2010. The resulting bans on removable media within the government raise the profile of solutions like ours for securely moving large files, or large numbers of file. http://www.sec.gov/Archives/edgar/data/840678/000120928611000234/e78686.htm N-CSR for FIFTH THIRD FUNDS 03/25/2011 In short, 2010 was quite an eventful year. In the third and fourth quarters alone, the listing of notable events is long: We witnessed a mid-term election and political shift that reverberated throughout the country; U.S. companies continued to register extraordinary improvements in earnings and balance sheets; WikiLeaks news stories dominated the headlines globally; and economic signs indicated that better times may be ahead.