Julian Assange Has Internet Connection Cut

Ecuador has cut Julian Assange's Internet connection at its embassy in London, preventing him from communicating with the outside world. The move is to prevent the WikiLeaks founder from interfering in other countries' affairs, Ecuador said. It comes after Mr Assange questioned accusations that Moscow was responsible for the poisoning of a Russian ex-spy and his daughter in the UK on 4 March.

Mr Assange was granted political asylum at the Ecuadorean embassy in 2012. He was initially staying in London to avoid extradition to Sweden to face questioning over allegations of sex crimes, which the 46-year-old has always denied. 

The Swedish authorities have since dropped their investigation, but Mr Assange believes he will be extradited to the US for questioning over the activities of WikiLeaks if he leaves the building.

Recently, Mr Assange used Twitter to question the decision by the UK and more than 20 other countries to retaliate against a nerve agent attack on Sergei Skripal and his daughter Yulia in the UK city of Salisbury by expelling Russian diplomats.
UK Foreign Office minister Alan Duncan responded to his comments by branding the Australian a "miserable little worm" who needs to turn himself over to authorities.

In 2016, Ecuador briefly suspended Mr Assange's Internet connection after he published hacked emails from the campaign team of Hillary Clinton, a move seen as having an impact on the US presidential election campaign.

In May 2017, Ecuadorean President Lenín Moreno asked Mr Assange to refrain from expressing his public support for the independence campaign in Spain's Catalonia region after he tweeted that Madrid was guilty of "repression". Mr Assange was granted asylum by President Moreno's predecessor, Rafael Correa.

Mr Moreno's government has said it will maintain Mr Assange's asylum. But it has also sought ways for him to leave the embassy without risking arrest for breaching his bail conditions, and possible extradition to the US over the 2010 publication of classified information by WikiLeaks.

BBC

You Might Also Read

Wikileaks Release Details Of Mass Surveillance In Russia:

Does Russia Benefit When Assange Reveals Secrets?:
 

« The US Power Grid Needs Better Security
Cambridge Analytica Used ProtonMail To Hide Email Paper Trails »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.