Ecuador Cut WikiLeaks Assange's Internet Connection

Ecuador has confirmed that it has temporarily cut off internet access in its embassy in London to Julian Assange, the founder of the whistleblowing site WikiLeaks, over fears that he was using it to interfere in the US presidential election.

The move followed the publication of leaked emails by WikiLeaks, including some from the Democratic National Committee (DNC) released just before the party’s convention in July, and more recently a cache of emails from the account of Hillary Clinton campaign adviser John Podesta.

Recently, officials released a statement saying that the government of Ecuador “respects the principle of non-intervention in the internal affairs of other states” and had cut off the internet access available to Assange because “in recent weeks, WikiLeaks has published a wealth of documents, impacting on the US election campaign”.

The statement also reaffirmed the asylum granted to Assange and reiterated its intention “to safeguard his life and physical integrity until he reaches a safe place”.

Assange’s Internet access was cut off on17th October. It was not immediately clear who was responsible, though a tweet from the site’s official account claimed it had been “intentionally severed” by a “state party”.

It is not known who perpetrated the hacks that brought the emails to WikiLeaks. Assange’s organization styles itself a whistleblowing outfit and claims not to do or encourage any hacking itself.

Yet cybersecurity experts have linked the hack of the DNC emails to hackers tied to the Russian government, leading many, including Clinton’s campaign manager, Robby Mook, to allege that Russia is using both hackers and Assange as tools to help rig the presidential election in favor of Donald Trump.

Recently, the anti-secrecy organisation released three transcripts of Clinton’s paid Goldman Sachs speeches, which her campaign team had long refused to release. The transcripts show how she bantered with the investment bank’s executives, which is likely to fuel fears among liberal Democrats that she is too cozy with Wall Street.

Guardian
 

« Pentagon Creates New 5,000 Strong Cyber Force
Artificial Intelligence Will Be A Critical Economic Driver »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.