Ecuador Spied On Assange

Ecuador spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012, initially to support him but things changed after he hacked the mission's computers, reported the Guardian ASSAnewspaper last week.

The newspaper said Ecuador employed an international security company and undercover agents to monitor his visitors, embassy staff and even the British police at the embassy in London's luxury Knightsbridge area.

It estimated the budget spent on the operation, referred to initially as "Operation Guest" and later "Operation Hotel" at $5.0 million (4.2 million euros).The snooping was initially intended to protect Assange from the risk of being taken away by British police but later became a full-blown spying operation.

The operation had the support of then Ecuadoran president Rafael Correa, the paper reported, adding that it has since been wound down under the country's new leader Lenin Moreno who took power last year. The security team recorded Assange's daily activities and his interactions with embassy staff and visitors, including fellow hackers, activists and lawyers. 

Embassy Network Hacked
The paper also cited documents showing that Assange hacked the communications system within the embassy and had his own satellite Internet access.

"By penetrating the embassy's firewall, Assange was able to access and intercept the official and personal communications of staff," the paper said.

WikiLeaks Denied Assange Hacked the Network.
Ecuador has moved to shut off Internet access for Assange in recent months by installing a jammer to prevent him from accessing email and has restricted the number of visitors he can receive. Assange took refuge in the diplomatic mission in 2012 after a British judge ruled he should be extradited to Sweden to face allegations of sexual assault there.

Assange claims the accusations were politically motivated and could lead to him being extradited to the United States to face imprisonment over WikiLeaks' publication of secret US military documents and diplomatic cables in 2010. Sweden dropped its investigation last year, but British authorities say they still want to arrest him for breaching his bail conditions.

Ecuador in December made Assange an Ecuadoran citizen and unsuccessfully tried to register him as a diplomat with immunity as part of its efforts to have him leave the embassy without risk of being detained.

Security Week:

You Migh Also Read:

Julian Assange Has Internet Connection Cut:

WikiLeaks: The Biter Bit:
 

 

« Spies Hack Journalism
Europe Is A Cybercrime Hub »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.