Julian Assange: Google is Hillary Clinton's 'Secret Weapon'

 

When Wikileaks founder Julian Assange told an open government conference that, "Google was now Hillary's secret weapon," he provided ample fertilizer for a year's worth of conspiracy theories in the overheating U.S. election season.

Assange was referring to The Groundwork, a stealthy startup funded by Google Chairman Eric Schmidt that's providing consulting services to former Secretary of State Hillary Clinton's campaign. According to Quartz, The Groundwork is building digital infrastructure like the Obama campaign did in 2012, laying "the groundwork' for personalized, data-driven electioneering in 2016.

While Schmidt has said that he would not work in a Clinton administration, he does support her presidential campaign. Google also has a number of close ties to the Obama administration, with a number of former employees serving in top positions, from US Chief Technology Officer Megan Smith to the head of the US Patent Office, Michelle Lee. The chief technology officer of Clinton's campaign, Stephanie Hannon, was also hired from Google.

Assange isn't the first person to raise concerns about a search algorithm stealing the presidency. Harvard Law professor Jonathan Zittrain has explored how Google or Facebook could influence an election by customizing search results or news, swinging undecided voters to one side or another.

To date, however, there's no evidence that any engineers or executives currently working for Google or Alphabet, Google's parent company, are doing anything to support Clinton's campaign.
Ein News: http://bit.ly/1iQEvPc

 

 

« Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency
Conditional Clearance For Hackers To Test Automotive & Healthcare Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.