The Image Of Julian Assange Grows Darker

Julian Assange faces deepening isolation as his asylum at Ecuadorian Embassy in London is well into its seventh year. The new president of Ecuador is showing exasperation with Assange’s presence, and the embassy has restricted his Internet access and other privileges. 

Though Sweden has long since dropped its original arrest warrant for Assange on rape and sexual assault allegations, the British police are still keen to take him into custody for evading a warrant of their own. Assange’s supporters must face the possibility that their idol could soon find himself in jail.

The architect of WikiLeaks continues to depict himself as a heroic fighter for the cause of transparency, but that image is increasingly hard to take at face value. A series of revelations over the past two years, from US intelligence agencies, special counsel Robert S. Mueller III and the international media, have dramatically altered Assange’s place in the scheme of things.
Assange, we now know, was a key player in the Russian operation to undermine the 2016 US presidential election, by actively helping Donald Trump to become president and undercutting Americans’ trust in their democracy, the twin goals of Russian President Vladimir Putin’s interference campaign.

Assange behaved as an instrument of the Kremlin operation which, in an excruciatingly close election, may have made just enough of a difference to secure Trump’s victory. Once, Assange was celebrated as the apostle of openness. But now, it seems, history will more likely remember him as an accessory to one of the world’s most secretive and cynical autocracies.

Mueller’s investigators have recently questioned at least five witnesses about Assange’s role in the 2016 campaign. The WikiLeaks founder’s ties to Trump confidant Roger Stone appear to be a focus of that line of inquiry, as ABC News reported.
The intermediary between longtime Trump confidant Roger Stone and WikiLeaks founder Julian Assange has notified members of the Senate Intelligence Committee that he is planning to plead the Fifth Amendment so he would not self-incriminate himself by answering questions related to the committee’s probe on Russian interference in the 2016 election.
More revelations are likely to come. But we already know Assange looks less like a crusader of the online counterculture than the power-mad intriguer who once referred to Hillary Clinton as a “sadistic sociopath” and who was happy to openly accept Russian support. 

The Kremlin’s RT propaganda network gave a show to Assange for a time, and the Guardian newspaper recently reported on an apparent Russian plan to help Assange escape Britain, though it was ultimately scrapped. 

In July, the Mueller investigation indicted a dozen Russian military-intelligence operatives for stealing information from Democratic Party computers, information, the indictment said, that was then passed on to WikiLeaks.
That has prompted some observers to recall a remarkable appearance by Assange on Dutch television in August 2016. At the time, Trump’s campaign was foundering, even after Russian intelligence agencies had mounted a campaign to help him by stoking US divisions on social media, promoting fake stories and hacking into the servers of the Democratic National Committee.

Assange was asked whether WikiLeaks had material that could help Trump. He responded by detonating a conspiracy theory, despite knowing it to be untrue. “There’s a 27-year-old who works for the DNC who was shot in the back, murdered for unknown reasons,” Assange said. He was referring to Seth Rich, killed in a robbery, whose death has since been weaponized by anti-Clinton activists.

Assange was in a unique position to energize the notion of a politically-motivated assassination. “What are you suggesting?” the Dutch interviewer asked. Assange coolly replied: “I’m suggesting that our sources take risks.” 

Though declining to confirm Rich was a source, he did manage to imply that Rich had handed WikiLeaks the documents. Assange’s remarks fueled countless far-right conspiracy theories used by Trump and his defenders to divert public attention from the compromising findings of Mueller’s investigators and the U.S. intelligence community.

The GRU (Russian military intelligence) created a character it called “Guccifer 2.0,” an alleged Romanian hacker, to divert attention away from the Kremlin after the DNC and U.S. intelligence officials discovered Russian fingerprints on the cyber intrusions. 

Four days after the DNC hack, WikiLeaks became the beneficiary of Guccifer 2.0’s work. Assange told Britain’s ITN that “WikiLeaks has a very big year ahead,” acknowledging it had “emails related to Hillary Clinton which are pending publication.”
Guccifer 2.0 confirmed he was working with Assange, and Wikileaks became an important tool in the Russian operation. Oddly enough, Assange’s quest for documents never extended to the Trump campaign, which was more secretive than any in recent US political history. 

WikiLeaks didn’t appear to have much interest in Trump’s tax returns, or in any of the communications between top campaign officials and Russian figures. Nor has WikiLeaks ever provided any sensational revelations from the databases of the Kremlin.

WikiLeaks became fully engaged in helping Trump and Russia. In July 2016, just before the Democratic Convention, the launch of the final stage of the Clinton campaign, WikiLeaks released DNC emails that suggested the party had favored Clinton over Sen. Bernie Sanders. The timing roiled the convention, forced resignations among top Democratic officials, and unquestionably hurt Clinton’s efforts to gain the support of Sanders’s supporters. And, of course, in October 2016, when Trump’s campaign seemed on the verge of collapse, with near-simultaneous releases of the Access Hollywood recording (in which Trump boasts of committing sexual assault), and a US intelligence report confirming Kremlin interference, Wikileaks rushed to the rescue.

Exactly 29 minutes after Americans heard the would-be president declare that when you’re famous, you can “grab them by the p—y,” WikiLeaks posted email shacked from the computer of Clinton’s campaign chairman, John Podesta. Headline writers could hardly keep up. Trump’s troubles eased.

Soon after, at a frenzied campaign rally, Trump gushed, “I love WikiLeaks!” Trump had every reason to say that. In 2010, when Assange first assured the world he would remain “strictly impartial” in his search for the truth, many of his admirers still believed him. One wonders how many of them still do.

Washington Post:                   Washington Examiner:

You Might Also Read: 

Edward Snowden Reconsidered:

No More Asylum For Julian Assange:

Does Russia Benefit When Assange Reveals Secrets?:
 

 

« Tesco Bank Fined £16.4m For Exposing Customers
Reputational Damage & The Human Factor In Social Media »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

NTIC Cyber Center - USA

NTIC Cyber Center - USA

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.