Ecuador Cut WikiLeaks Assange's Internet Connection

Ecuador has confirmed that it has temporarily cut off internet access in its embassy in London to Julian Assange, the founder of the whistleblowing site WikiLeaks, over fears that he was using it to interfere in the US presidential election.

The move followed the publication of leaked emails by WikiLeaks, including some from the Democratic National Committee (DNC) released just before the party’s convention in July, and more recently a cache of emails from the account of Hillary Clinton campaign adviser John Podesta.

Recently, officials released a statement saying that the government of Ecuador “respects the principle of non-intervention in the internal affairs of other states” and had cut off the internet access available to Assange because “in recent weeks, WikiLeaks has published a wealth of documents, impacting on the US election campaign”.

The statement also reaffirmed the asylum granted to Assange and reiterated its intention “to safeguard his life and physical integrity until he reaches a safe place”.

Assange’s Internet access was cut off on17th October. It was not immediately clear who was responsible, though a tweet from the site’s official account claimed it had been “intentionally severed” by a “state party”.

It is not known who perpetrated the hacks that brought the emails to WikiLeaks. Assange’s organization styles itself a whistleblowing outfit and claims not to do or encourage any hacking itself.

Yet cybersecurity experts have linked the hack of the DNC emails to hackers tied to the Russian government, leading many, including Clinton’s campaign manager, Robby Mook, to allege that Russia is using both hackers and Assange as tools to help rig the presidential election in favor of Donald Trump.

Recently, the anti-secrecy organisation released three transcripts of Clinton’s paid Goldman Sachs speeches, which her campaign team had long refused to release. The transcripts show how she bantered with the investment bank’s executives, which is likely to fuel fears among liberal Democrats that she is too cozy with Wall Street.

Guardian
 

« Pentagon Creates New 5,000 Strong Cyber Force
Artificial Intelligence Will Be A Critical Economic Driver »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.