The Image Of Julian Assange Grows Darker

Julian Assange faces deepening isolation as his asylum at Ecuadorian Embassy in London is well into its seventh year. The new president of Ecuador is showing exasperation with Assange’s presence, and the embassy has restricted his Internet access and other privileges. 

Though Sweden has long since dropped its original arrest warrant for Assange on rape and sexual assault allegations, the British police are still keen to take him into custody for evading a warrant of their own. Assange’s supporters must face the possibility that their idol could soon find himself in jail.

The architect of WikiLeaks continues to depict himself as a heroic fighter for the cause of transparency, but that image is increasingly hard to take at face value. A series of revelations over the past two years, from US intelligence agencies, special counsel Robert S. Mueller III and the international media, have dramatically altered Assange’s place in the scheme of things.
Assange, we now know, was a key player in the Russian operation to undermine the 2016 US presidential election, by actively helping Donald Trump to become president and undercutting Americans’ trust in their democracy, the twin goals of Russian President Vladimir Putin’s interference campaign.

Assange behaved as an instrument of the Kremlin operation which, in an excruciatingly close election, may have made just enough of a difference to secure Trump’s victory. Once, Assange was celebrated as the apostle of openness. But now, it seems, history will more likely remember him as an accessory to one of the world’s most secretive and cynical autocracies.

Mueller’s investigators have recently questioned at least five witnesses about Assange’s role in the 2016 campaign. The WikiLeaks founder’s ties to Trump confidant Roger Stone appear to be a focus of that line of inquiry, as ABC News reported.
The intermediary between longtime Trump confidant Roger Stone and WikiLeaks founder Julian Assange has notified members of the Senate Intelligence Committee that he is planning to plead the Fifth Amendment so he would not self-incriminate himself by answering questions related to the committee’s probe on Russian interference in the 2016 election.
More revelations are likely to come. But we already know Assange looks less like a crusader of the online counterculture than the power-mad intriguer who once referred to Hillary Clinton as a “sadistic sociopath” and who was happy to openly accept Russian support. 

The Kremlin’s RT propaganda network gave a show to Assange for a time, and the Guardian newspaper recently reported on an apparent Russian plan to help Assange escape Britain, though it was ultimately scrapped. 

In July, the Mueller investigation indicted a dozen Russian military-intelligence operatives for stealing information from Democratic Party computers, information, the indictment said, that was then passed on to WikiLeaks.
That has prompted some observers to recall a remarkable appearance by Assange on Dutch television in August 2016. At the time, Trump’s campaign was foundering, even after Russian intelligence agencies had mounted a campaign to help him by stoking US divisions on social media, promoting fake stories and hacking into the servers of the Democratic National Committee.

Assange was asked whether WikiLeaks had material that could help Trump. He responded by detonating a conspiracy theory, despite knowing it to be untrue. “There’s a 27-year-old who works for the DNC who was shot in the back, murdered for unknown reasons,” Assange said. He was referring to Seth Rich, killed in a robbery, whose death has since been weaponized by anti-Clinton activists.

Assange was in a unique position to energize the notion of a politically-motivated assassination. “What are you suggesting?” the Dutch interviewer asked. Assange coolly replied: “I’m suggesting that our sources take risks.” 

Though declining to confirm Rich was a source, he did manage to imply that Rich had handed WikiLeaks the documents. Assange’s remarks fueled countless far-right conspiracy theories used by Trump and his defenders to divert public attention from the compromising findings of Mueller’s investigators and the U.S. intelligence community.

The GRU (Russian military intelligence) created a character it called “Guccifer 2.0,” an alleged Romanian hacker, to divert attention away from the Kremlin after the DNC and U.S. intelligence officials discovered Russian fingerprints on the cyber intrusions. 

Four days after the DNC hack, WikiLeaks became the beneficiary of Guccifer 2.0’s work. Assange told Britain’s ITN that “WikiLeaks has a very big year ahead,” acknowledging it had “emails related to Hillary Clinton which are pending publication.”
Guccifer 2.0 confirmed he was working with Assange, and Wikileaks became an important tool in the Russian operation. Oddly enough, Assange’s quest for documents never extended to the Trump campaign, which was more secretive than any in recent US political history. 

WikiLeaks didn’t appear to have much interest in Trump’s tax returns, or in any of the communications between top campaign officials and Russian figures. Nor has WikiLeaks ever provided any sensational revelations from the databases of the Kremlin.

WikiLeaks became fully engaged in helping Trump and Russia. In July 2016, just before the Democratic Convention, the launch of the final stage of the Clinton campaign, WikiLeaks released DNC emails that suggested the party had favored Clinton over Sen. Bernie Sanders. The timing roiled the convention, forced resignations among top Democratic officials, and unquestionably hurt Clinton’s efforts to gain the support of Sanders’s supporters. And, of course, in October 2016, when Trump’s campaign seemed on the verge of collapse, with near-simultaneous releases of the Access Hollywood recording (in which Trump boasts of committing sexual assault), and a US intelligence report confirming Kremlin interference, Wikileaks rushed to the rescue.

Exactly 29 minutes after Americans heard the would-be president declare that when you’re famous, you can “grab them by the p—y,” WikiLeaks posted email shacked from the computer of Clinton’s campaign chairman, John Podesta. Headline writers could hardly keep up. Trump’s troubles eased.

Soon after, at a frenzied campaign rally, Trump gushed, “I love WikiLeaks!” Trump had every reason to say that. In 2010, when Assange first assured the world he would remain “strictly impartial” in his search for the truth, many of his admirers still believed him. One wonders how many of them still do.

Washington Post:                   Washington Examiner:

You Might Also Read: 

Edward Snowden Reconsidered:

No More Asylum For Julian Assange:

Does Russia Benefit When Assange Reveals Secrets?:
 

 

« Tesco Bank Fined £16.4m For Exposing Customers
Reputational Damage & The Human Factor In Social Media »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.