Ecuador Spied On Assange

Ecuador spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012, initially to support him but things changed after he hacked the mission's computers, reported the Guardian ASSAnewspaper last week.

The newspaper said Ecuador employed an international security company and undercover agents to monitor his visitors, embassy staff and even the British police at the embassy in London's luxury Knightsbridge area.

It estimated the budget spent on the operation, referred to initially as "Operation Guest" and later "Operation Hotel" at $5.0 million (4.2 million euros).The snooping was initially intended to protect Assange from the risk of being taken away by British police but later became a full-blown spying operation.

The operation had the support of then Ecuadoran president Rafael Correa, the paper reported, adding that it has since been wound down under the country's new leader Lenin Moreno who took power last year. The security team recorded Assange's daily activities and his interactions with embassy staff and visitors, including fellow hackers, activists and lawyers. 

Embassy Network Hacked
The paper also cited documents showing that Assange hacked the communications system within the embassy and had his own satellite Internet access.

"By penetrating the embassy's firewall, Assange was able to access and intercept the official and personal communications of staff," the paper said.

WikiLeaks Denied Assange Hacked the Network.
Ecuador has moved to shut off Internet access for Assange in recent months by installing a jammer to prevent him from accessing email and has restricted the number of visitors he can receive. Assange took refuge in the diplomatic mission in 2012 after a British judge ruled he should be extradited to Sweden to face allegations of sexual assault there.

Assange claims the accusations were politically motivated and could lead to him being extradited to the United States to face imprisonment over WikiLeaks' publication of secret US military documents and diplomatic cables in 2010. Sweden dropped its investigation last year, but British authorities say they still want to arrest him for breaching his bail conditions.

Ecuador in December made Assange an Ecuadoran citizen and unsuccessfully tried to register him as a diplomat with immunity as part of its efforts to have him leave the embassy without risk of being detained.

Security Week:

You Migh Also Read:

Julian Assange Has Internet Connection Cut:

WikiLeaks: The Biter Bit:
 

 

« Spies Hack Journalism
Europe Is A Cybercrime Hub »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Etalon Cyber

Etalon Cyber

Etalon Cyber provides a range of advanced features to ensure the highest level of security for your website.