Ecuador Cut WikiLeaks Assange's Internet Connection

Ecuador has confirmed that it has temporarily cut off internet access in its embassy in London to Julian Assange, the founder of the whistleblowing site WikiLeaks, over fears that he was using it to interfere in the US presidential election.

The move followed the publication of leaked emails by WikiLeaks, including some from the Democratic National Committee (DNC) released just before the party’s convention in July, and more recently a cache of emails from the account of Hillary Clinton campaign adviser John Podesta.

Recently, officials released a statement saying that the government of Ecuador “respects the principle of non-intervention in the internal affairs of other states” and had cut off the internet access available to Assange because “in recent weeks, WikiLeaks has published a wealth of documents, impacting on the US election campaign”.

The statement also reaffirmed the asylum granted to Assange and reiterated its intention “to safeguard his life and physical integrity until he reaches a safe place”.

Assange’s Internet access was cut off on17th October. It was not immediately clear who was responsible, though a tweet from the site’s official account claimed it had been “intentionally severed” by a “state party”.

It is not known who perpetrated the hacks that brought the emails to WikiLeaks. Assange’s organization styles itself a whistleblowing outfit and claims not to do or encourage any hacking itself.

Yet cybersecurity experts have linked the hack of the DNC emails to hackers tied to the Russian government, leading many, including Clinton’s campaign manager, Robby Mook, to allege that Russia is using both hackers and Assange as tools to help rig the presidential election in favor of Donald Trump.

Recently, the anti-secrecy organisation released three transcripts of Clinton’s paid Goldman Sachs speeches, which her campaign team had long refused to release. The transcripts show how she bantered with the investment bank’s executives, which is likely to fuel fears among liberal Democrats that she is too cozy with Wall Street.

Guardian
 

« Pentagon Creates New 5,000 Strong Cyber Force
Artificial Intelligence Will Be A Critical Economic Driver »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.