The Image Of Julian Assange Grows Darker

Julian Assange faces deepening isolation as his asylum at Ecuadorian Embassy in London is well into its seventh year. The new president of Ecuador is showing exasperation with Assange’s presence, and the embassy has restricted his Internet access and other privileges. 

Though Sweden has long since dropped its original arrest warrant for Assange on rape and sexual assault allegations, the British police are still keen to take him into custody for evading a warrant of their own. Assange’s supporters must face the possibility that their idol could soon find himself in jail.

The architect of WikiLeaks continues to depict himself as a heroic fighter for the cause of transparency, but that image is increasingly hard to take at face value. A series of revelations over the past two years, from US intelligence agencies, special counsel Robert S. Mueller III and the international media, have dramatically altered Assange’s place in the scheme of things.
Assange, we now know, was a key player in the Russian operation to undermine the 2016 US presidential election, by actively helping Donald Trump to become president and undercutting Americans’ trust in their democracy, the twin goals of Russian President Vladimir Putin’s interference campaign.

Assange behaved as an instrument of the Kremlin operation which, in an excruciatingly close election, may have made just enough of a difference to secure Trump’s victory. Once, Assange was celebrated as the apostle of openness. But now, it seems, history will more likely remember him as an accessory to one of the world’s most secretive and cynical autocracies.

Mueller’s investigators have recently questioned at least five witnesses about Assange’s role in the 2016 campaign. The WikiLeaks founder’s ties to Trump confidant Roger Stone appear to be a focus of that line of inquiry, as ABC News reported.
The intermediary between longtime Trump confidant Roger Stone and WikiLeaks founder Julian Assange has notified members of the Senate Intelligence Committee that he is planning to plead the Fifth Amendment so he would not self-incriminate himself by answering questions related to the committee’s probe on Russian interference in the 2016 election.
More revelations are likely to come. But we already know Assange looks less like a crusader of the online counterculture than the power-mad intriguer who once referred to Hillary Clinton as a “sadistic sociopath” and who was happy to openly accept Russian support. 

The Kremlin’s RT propaganda network gave a show to Assange for a time, and the Guardian newspaper recently reported on an apparent Russian plan to help Assange escape Britain, though it was ultimately scrapped. 

In July, the Mueller investigation indicted a dozen Russian military-intelligence operatives for stealing information from Democratic Party computers, information, the indictment said, that was then passed on to WikiLeaks.
That has prompted some observers to recall a remarkable appearance by Assange on Dutch television in August 2016. At the time, Trump’s campaign was foundering, even after Russian intelligence agencies had mounted a campaign to help him by stoking US divisions on social media, promoting fake stories and hacking into the servers of the Democratic National Committee.

Assange was asked whether WikiLeaks had material that could help Trump. He responded by detonating a conspiracy theory, despite knowing it to be untrue. “There’s a 27-year-old who works for the DNC who was shot in the back, murdered for unknown reasons,” Assange said. He was referring to Seth Rich, killed in a robbery, whose death has since been weaponized by anti-Clinton activists.

Assange was in a unique position to energize the notion of a politically-motivated assassination. “What are you suggesting?” the Dutch interviewer asked. Assange coolly replied: “I’m suggesting that our sources take risks.” 

Though declining to confirm Rich was a source, he did manage to imply that Rich had handed WikiLeaks the documents. Assange’s remarks fueled countless far-right conspiracy theories used by Trump and his defenders to divert public attention from the compromising findings of Mueller’s investigators and the U.S. intelligence community.

The GRU (Russian military intelligence) created a character it called “Guccifer 2.0,” an alleged Romanian hacker, to divert attention away from the Kremlin after the DNC and U.S. intelligence officials discovered Russian fingerprints on the cyber intrusions. 

Four days after the DNC hack, WikiLeaks became the beneficiary of Guccifer 2.0’s work. Assange told Britain’s ITN that “WikiLeaks has a very big year ahead,” acknowledging it had “emails related to Hillary Clinton which are pending publication.”
Guccifer 2.0 confirmed he was working with Assange, and Wikileaks became an important tool in the Russian operation. Oddly enough, Assange’s quest for documents never extended to the Trump campaign, which was more secretive than any in recent US political history. 

WikiLeaks didn’t appear to have much interest in Trump’s tax returns, or in any of the communications between top campaign officials and Russian figures. Nor has WikiLeaks ever provided any sensational revelations from the databases of the Kremlin.

WikiLeaks became fully engaged in helping Trump and Russia. In July 2016, just before the Democratic Convention, the launch of the final stage of the Clinton campaign, WikiLeaks released DNC emails that suggested the party had favored Clinton over Sen. Bernie Sanders. The timing roiled the convention, forced resignations among top Democratic officials, and unquestionably hurt Clinton’s efforts to gain the support of Sanders’s supporters. And, of course, in October 2016, when Trump’s campaign seemed on the verge of collapse, with near-simultaneous releases of the Access Hollywood recording (in which Trump boasts of committing sexual assault), and a US intelligence report confirming Kremlin interference, Wikileaks rushed to the rescue.

Exactly 29 minutes after Americans heard the would-be president declare that when you’re famous, you can “grab them by the p—y,” WikiLeaks posted email shacked from the computer of Clinton’s campaign chairman, John Podesta. Headline writers could hardly keep up. Trump’s troubles eased.

Soon after, at a frenzied campaign rally, Trump gushed, “I love WikiLeaks!” Trump had every reason to say that. In 2010, when Assange first assured the world he would remain “strictly impartial” in his search for the truth, many of his admirers still believed him. One wonders how many of them still do.

Washington Post:                   Washington Examiner:

You Might Also Read: 

Edward Snowden Reconsidered:

No More Asylum For Julian Assange:

Does Russia Benefit When Assange Reveals Secrets?:
 

 

« Tesco Bank Fined £16.4m For Exposing Customers
Reputational Damage & The Human Factor In Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).