Julian Assange Has Internet Connection Cut

Ecuador has cut Julian Assange's Internet connection at its embassy in London, preventing him from communicating with the outside world. The move is to prevent the WikiLeaks founder from interfering in other countries' affairs, Ecuador said. It comes after Mr Assange questioned accusations that Moscow was responsible for the poisoning of a Russian ex-spy and his daughter in the UK on 4 March.

Mr Assange was granted political asylum at the Ecuadorean embassy in 2012. He was initially staying in London to avoid extradition to Sweden to face questioning over allegations of sex crimes, which the 46-year-old has always denied. 

The Swedish authorities have since dropped their investigation, but Mr Assange believes he will be extradited to the US for questioning over the activities of WikiLeaks if he leaves the building.

Recently, Mr Assange used Twitter to question the decision by the UK and more than 20 other countries to retaliate against a nerve agent attack on Sergei Skripal and his daughter Yulia in the UK city of Salisbury by expelling Russian diplomats.
UK Foreign Office minister Alan Duncan responded to his comments by branding the Australian a "miserable little worm" who needs to turn himself over to authorities.

In 2016, Ecuador briefly suspended Mr Assange's Internet connection after he published hacked emails from the campaign team of Hillary Clinton, a move seen as having an impact on the US presidential election campaign.

In May 2017, Ecuadorean President Lenín Moreno asked Mr Assange to refrain from expressing his public support for the independence campaign in Spain's Catalonia region after he tweeted that Madrid was guilty of "repression". Mr Assange was granted asylum by President Moreno's predecessor, Rafael Correa.

Mr Moreno's government has said it will maintain Mr Assange's asylum. But it has also sought ways for him to leave the embassy without risking arrest for breaching his bail conditions, and possible extradition to the US over the 2010 publication of classified information by WikiLeaks.

BBC

You Might Also Read

Wikileaks Release Details Of Mass Surveillance In Russia:

Does Russia Benefit When Assange Reveals Secrets?:
 

« The US Power Grid Needs Better Security
Cambridge Analytica Used ProtonMail To Hide Email Paper Trails »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.