Julian Assange: Google is Hillary Clinton's 'Secret Weapon'

 

When Wikileaks founder Julian Assange told an open government conference that, "Google was now Hillary's secret weapon," he provided ample fertilizer for a year's worth of conspiracy theories in the overheating U.S. election season.

Assange was referring to The Groundwork, a stealthy startup funded by Google Chairman Eric Schmidt that's providing consulting services to former Secretary of State Hillary Clinton's campaign. According to Quartz, The Groundwork is building digital infrastructure like the Obama campaign did in 2012, laying "the groundwork' for personalized, data-driven electioneering in 2016.

While Schmidt has said that he would not work in a Clinton administration, he does support her presidential campaign. Google also has a number of close ties to the Obama administration, with a number of former employees serving in top positions, from US Chief Technology Officer Megan Smith to the head of the US Patent Office, Michelle Lee. The chief technology officer of Clinton's campaign, Stephanie Hannon, was also hired from Google.

Assange isn't the first person to raise concerns about a search algorithm stealing the presidency. Harvard Law professor Jonathan Zittrain has explored how Google or Facebook could influence an election by customizing search results or news, swinging undecided voters to one side or another.

To date, however, there's no evidence that any engineers or executives currently working for Google or Alphabet, Google's parent company, are doing anything to support Clinton's campaign.
Ein News: http://bit.ly/1iQEvPc

 

 

« Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency
Conditional Clearance For Hackers To Test Automotive & Healthcare Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.