Saturday, May 4, 2024
Home Hacking News Wikileaks Owner charged for the involvement in conspiracy

Wikileaks Owner charged for the involvement in conspiracy

With Report of Different media, The United States Government has filed a superseding indictment against the WikiLeaks founder Julian Assange which accuses him of helping them with computer hackers that include those affiliated with the infamous LulzSec and “Anonymous” Hacking group.

The new Superseding incident does not contain any additional charges beyond the prior 18-count indictment filed against Assange in May 2019 but it does “Broaden the scope of the conspiracy surrounding alleged computer intrusions with the Assange was previously charged”, the DoJ said.

 

Around May 2019, Assange was charged with 18 counts which is under the old U.S Espionage Act for the unlawful publishing of the classified and diplomat document on his popular Wikileaks website in 2010 and which obtained firm former Army intelligence analyst Chelsea Manning.

The Assange which has been alleged to have obtained classified documents by conspiring with Manning to crack a password hash to a classified U.S Department of Defense computer.

The New Superseding indictment unsealed Wednesday  [PDF], Assange, and other WikiLeaks also recruited hackers at conferences in Europe and Asia which conspired with them to commit computer intrusions to benefit Wikileaks.

 

The early days of the Wikileaks which Assange has spoken in conferences about his own last activities as a “famous teenage hacker in Australia” which encouraged others to hack and obtain information for WikiLeaks.

 

In around 2009, for the instance which Assange and told the hacking at the random conference that Wikileaks  which obtained nonpublic documents from the Congressional Research Service by exploiting “a Small Vulnerability” inside the document distribution system of the United States Congress and then after assessed that “This is what anyone of you would find if you were actually looking”

 

The Indictment also accused Assange of gaining unauthorized access to a government computer system of a NATO country (30 Member states from North America and Europe) in 2010.

Even Assange communicated directly with the leader of the hacking group LulzSec (This group also cooperating with the FBI) and they asked for the list of targets to hack.

“With due respect to one target, the Assange asked the Lulzsec leader to look for the databases, documents, pdfs, and mail which the Wikileaks provide. Finding another communication the Assange also mentions the LulzSec chief that the it that mostly released and exposed materials would be from CIA, NSA or the new york times” as the DoJ mention in the quote.

According to the threat actor, Assange has been indirectly pushed and asked him to spam the victim company again. The Assange has abstained and published the emails from data breach which are committed against the U.S intelligence Consulting company by the hackers which are mentioned with “Anonymous” and LulzSec which is published on Wikileaks.

 

Assange was arrested in April 2019 in London after Ecuador withdrew his asylum and was later sentenced for the 50 weeks in U.K prison for breaching the bail condition in 2012.

Even the 48-Year-old is still awaiting possible extraction to the United States who is currently in prison in the U.K.

Now he will be convicted for all counts, The Assange could face a total maximum sentence of 175 years in the U.S prison for the alleged role in compromising the classified information in the history of the united state.”

Found this article informative? Follow Vednam on Facebook, Twitter, Mix, Tumbler, and Linkedin to know more exclusive content we post.

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments