How Did WikiLeaks Get Clinton's Emails?

 
Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked  secret political emails released by Wikileaks.

 

The thousands of emails related to Democratic presidential nominee Hilary Clinton, her party and close allies that were published by WikiLeaks were not obtained from the Russian government, the founder of the nonprofit organisation, Julian Assange, said recently.

Clinton’s campaign and the White House have repeatedly blamed Russia for orchestrating hacks into numerous US political sites and email accounts, but Assange, in an interview with Russia Today, strongly denied these accusations.

“The Clinton camp has been able to project a neo-McCarthyism hysteria that Russia is responsible for everything,” said Assange, who has been seeking refuge in the Ecuadorian embassy in London. “Hillary Clinton has stated multiple times, falsely, that 17 US intelligence agencies had assessed that Russia was the source of our publications. That’s false – we can say that the Russian government is not the source.”

The WikiLeaks founder also went on to refer to the former secretary of state as a person “who is eaten alive by their ambitions, tormented literally to the point where they become sick, for example faint, as a result of going on, and going with their ambitions.”

“But she represents a whole network of people, and a whole network of relationships with particular states,” Assange added in the interview recently.

The nonprofit has been behind the release of over 30,000 emails from Clinton’s private server, along with about 20,000 emails from the Democratic National Committee and over 50,000 emails from Clinton’s campaign manager John Podesta. The email dumps have resulted in a considerable loss of face for the former first lady who is in a close race for the White House with construction mogul Donald Trump.

The organisation will be releasing more of Clinton’s emails as the Election Day inches closer, causing a major hurdle in Clinton’s path to presidency. Fox News cited sources saying that a probe into the Clinton Foundation is highly likely and may even be a “very high priority.” The Federal Bureau of Investigation is also actively looking into the case and carrying out extensive interviews.

“There is an avalanche of new information coming in every day,” another source told Fox News.

IB Times:       US Intelligence Has The Evidence That Proves Russian Presidential Election Interference:
 

« No Need To Shoot Down Drones – Just Hijack Them
New IoT Chips See, Think & Act Autonomously »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

AFINE

AFINE

AFINE is a trusted advisor in the field of cybersecurity and pentesting.