The Image Of Julian Assange Grows Darker

Julian Assange faces deepening isolation as his asylum at Ecuadorian Embassy in London is well into its seventh year. The new president of Ecuador is showing exasperation with Assange’s presence, and the embassy has restricted his Internet access and other privileges. 

Though Sweden has long since dropped its original arrest warrant for Assange on rape and sexual assault allegations, the British police are still keen to take him into custody for evading a warrant of their own. Assange’s supporters must face the possibility that their idol could soon find himself in jail.

The architect of WikiLeaks continues to depict himself as a heroic fighter for the cause of transparency, but that image is increasingly hard to take at face value. A series of revelations over the past two years, from US intelligence agencies, special counsel Robert S. Mueller III and the international media, have dramatically altered Assange’s place in the scheme of things.
Assange, we now know, was a key player in the Russian operation to undermine the 2016 US presidential election, by actively helping Donald Trump to become president and undercutting Americans’ trust in their democracy, the twin goals of Russian President Vladimir Putin’s interference campaign.

Assange behaved as an instrument of the Kremlin operation which, in an excruciatingly close election, may have made just enough of a difference to secure Trump’s victory. Once, Assange was celebrated as the apostle of openness. But now, it seems, history will more likely remember him as an accessory to one of the world’s most secretive and cynical autocracies.

Mueller’s investigators have recently questioned at least five witnesses about Assange’s role in the 2016 campaign. The WikiLeaks founder’s ties to Trump confidant Roger Stone appear to be a focus of that line of inquiry, as ABC News reported.
The intermediary between longtime Trump confidant Roger Stone and WikiLeaks founder Julian Assange has notified members of the Senate Intelligence Committee that he is planning to plead the Fifth Amendment so he would not self-incriminate himself by answering questions related to the committee’s probe on Russian interference in the 2016 election.
More revelations are likely to come. But we already know Assange looks less like a crusader of the online counterculture than the power-mad intriguer who once referred to Hillary Clinton as a “sadistic sociopath” and who was happy to openly accept Russian support. 

The Kremlin’s RT propaganda network gave a show to Assange for a time, and the Guardian newspaper recently reported on an apparent Russian plan to help Assange escape Britain, though it was ultimately scrapped. 

In July, the Mueller investigation indicted a dozen Russian military-intelligence operatives for stealing information from Democratic Party computers, information, the indictment said, that was then passed on to WikiLeaks.
That has prompted some observers to recall a remarkable appearance by Assange on Dutch television in August 2016. At the time, Trump’s campaign was foundering, even after Russian intelligence agencies had mounted a campaign to help him by stoking US divisions on social media, promoting fake stories and hacking into the servers of the Democratic National Committee.

Assange was asked whether WikiLeaks had material that could help Trump. He responded by detonating a conspiracy theory, despite knowing it to be untrue. “There’s a 27-year-old who works for the DNC who was shot in the back, murdered for unknown reasons,” Assange said. He was referring to Seth Rich, killed in a robbery, whose death has since been weaponized by anti-Clinton activists.

Assange was in a unique position to energize the notion of a politically-motivated assassination. “What are you suggesting?” the Dutch interviewer asked. Assange coolly replied: “I’m suggesting that our sources take risks.” 

Though declining to confirm Rich was a source, he did manage to imply that Rich had handed WikiLeaks the documents. Assange’s remarks fueled countless far-right conspiracy theories used by Trump and his defenders to divert public attention from the compromising findings of Mueller’s investigators and the U.S. intelligence community.

The GRU (Russian military intelligence) created a character it called “Guccifer 2.0,” an alleged Romanian hacker, to divert attention away from the Kremlin after the DNC and U.S. intelligence officials discovered Russian fingerprints on the cyber intrusions. 

Four days after the DNC hack, WikiLeaks became the beneficiary of Guccifer 2.0’s work. Assange told Britain’s ITN that “WikiLeaks has a very big year ahead,” acknowledging it had “emails related to Hillary Clinton which are pending publication.”
Guccifer 2.0 confirmed he was working with Assange, and Wikileaks became an important tool in the Russian operation. Oddly enough, Assange’s quest for documents never extended to the Trump campaign, which was more secretive than any in recent US political history. 

WikiLeaks didn’t appear to have much interest in Trump’s tax returns, or in any of the communications between top campaign officials and Russian figures. Nor has WikiLeaks ever provided any sensational revelations from the databases of the Kremlin.

WikiLeaks became fully engaged in helping Trump and Russia. In July 2016, just before the Democratic Convention, the launch of the final stage of the Clinton campaign, WikiLeaks released DNC emails that suggested the party had favored Clinton over Sen. Bernie Sanders. The timing roiled the convention, forced resignations among top Democratic officials, and unquestionably hurt Clinton’s efforts to gain the support of Sanders’s supporters. And, of course, in October 2016, when Trump’s campaign seemed on the verge of collapse, with near-simultaneous releases of the Access Hollywood recording (in which Trump boasts of committing sexual assault), and a US intelligence report confirming Kremlin interference, Wikileaks rushed to the rescue.

Exactly 29 minutes after Americans heard the would-be president declare that when you’re famous, you can “grab them by the p—y,” WikiLeaks posted email shacked from the computer of Clinton’s campaign chairman, John Podesta. Headline writers could hardly keep up. Trump’s troubles eased.

Soon after, at a frenzied campaign rally, Trump gushed, “I love WikiLeaks!” Trump had every reason to say that. In 2010, when Assange first assured the world he would remain “strictly impartial” in his search for the truth, many of his admirers still believed him. One wonders how many of them still do.

Washington Post:                   Washington Examiner:

You Might Also Read: 

Edward Snowden Reconsidered:

No More Asylum For Julian Assange:

Does Russia Benefit When Assange Reveals Secrets?:
 

 

« Tesco Bank Fined £16.4m For Exposing Customers
Reputational Damage & The Human Factor In Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.