Search It Yourself: Panama Papers Database Goes Public

The body behind the Panama Papers revelations is to make an enormous database of financial data public.

The International Consortium of Investigative Journalists (ICIJ) is launching a new database on May 9 – allowing members of the public to look at some of the leaked data themselves.

It will contain some 200,000 entries on offshore bodies, taken from the enormous leak which sparked political turmoil across the globe.

The journalists involved in the leak have so far closely guarded their source data, but now plan to let ordinary people see parts of it.

The ICIJ claims the details represent the largest ever release of secret offshore companies and the people behind them.
The original details were leaked ultimately from Panamanian law firm Mossack Fonseca, the fourth biggest offshore law firm, and passed to German newspaper Suddeutsche Zeitung.

They contain information about companies, trusts, foundations and funds incorporated in 21 tax havens, from Hong Kong to Nevada. It links to people in more than 200 countries and territories.

When the new data is released next month, users will have access to Mossack Fonseca’s internal records of a company’s true owners. The interactive database will also include information about more than 100,000 additional companies that were part of a previous ICIJ offshore leaks investigation carried out in 2013.

The ICIJ said the new data will be “a careful release of basic corporate information” in the public interest. It will not include bank accounts details or financial transaction records. Emails, correspondence, passports and telephone numbers will also be withheld.

The Panama Papers investigation disclosed the offshore dealings of celebrities, politicians and criminal networks and shone a light on tax evasion and avoidance. The highest profile casualty was Iceland’s prime minister, Sigmundur Davio Gunnlaugsson, who stepped aside after the papers showed his family sheltered money offshore. Others connected to the leak include film star Jackie Chan and Argentine soccer player Lionel Messi.

The database is  published at offshoreleaks.icij.org      HeatStreet

 

 

« Future Intelligence Sharing In the Syrian War
Zuckerberg Thinks AI Will Know Everything About You. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.