The Nightmare Espionage Act That is Killing Julian Assange and the …

Carey Shenkman, attorney, author, and litigator specializing in civil and human rights, joins Robert Scheer for this weeks Scheer Intelligence, where Shenkman offers a sobering analysis on one of the most chilling attacks on press freedom exhibited in the Julian Assange case. Using his recently published book, A Century of Repression: The Espionage Act and Freedom of the Press, Shenkmen details the history of the Espionage Act and how civil liberties have continued to be eroded as a result of the existence of this law and the lack of revision.

Shenkman talks about the bipartisan disdain towards the Espionage Act in legal circles yet its continued use by bipartisan presidents brings the conversation to its flaws and disreputability: Over the decades, you have folks that are coming out with law review articles saying that it's vague, verbose, that it makes no sense, and that ambiguity in the law is being exploited now to go after Julian Assange, to go after government whistleblowers. So there have actually been serious calls for its reform and repeal in recent years. Assange faces 175 years in a U.S. maximum security prison after being indicted with 17 charges relating to the Espionage Act.

Going back to its inception during World War I, Shenkman explains what its true purpose was and how within the law, you get a sense that this language of promoting disloyalty, of promoting opposition to the war, was actually used to go after conscientious objectors and folks that opposed entry into World War I.

As for Julian Assange, the urgency behind bringing attention to the case is justified. According to Shenkman, We tried to dig through the history to see if a publisher has ever been charged for anything like Julian Assange has been accused of. And the answer is no. This is the first case in U.S. history of its kind. And it would set a precedent that would open the floodgates for prosecuting the press.

Shenkman says if Assange is extradited, it will make his case a law school case for all the wrong reasons. Despite all the concern surrounding the overreaching power of the United States, this case could also open the door to countries around the world to extradite citizens from foreign countries for exposing their wrongdoings. As Shenkman mentions, Assange is not a U.S. government employee. He's not even a U.S. citizen. And somehow the U.S. government says it has jurisdiction.

More:
The Nightmare Espionage Act That is Killing Julian Assange and the ...

Why is Assange in Jail and Not Seymour Hersh?

On February 7, Seymour Hersh arguably the most credible investigative journalist of our era published a bombshell expos revealing that the United States was guilty of blowing up the Nord Stream II undersea pipeline that was supposed to deliver natural gas from Russia to the Federal Republic of Germany.

Hershs revelations were based entirely on classified information leaked to him by a member of the government with first-hand knowledge of the planning and implementation of the attack on the pipeline a member of the government who clearly broke the law by violating his fiduciary duty not to reveal classified information to an unauthorized source.

Like Chelsea Manning, who had revealed classified information to Julian Assange, for which she was convicted and sentenced to 35 years in prison, Hershs source, if identified, would surely also be convicted and sentenced to similar long-term imprisonment.

But Hershs source has not been identified. However Hersh himself has. According to the same logic under which Assange was indicted for publishing classified information, and now faces up to 175 years in prison, Hersh, too, should be indicted and face comparable long-term imprisonment.

So why is Sy Hersh still free?

Hersh broke the same laws that the U.S. government accuses Julian Assange of breaking. But unlike Assange, a foreigner whom the U.S. has unsuccessfully been trying to extradite from England for years, Hersh is an American citizen living right here in the United States easy to find, cuff, indict, convict and throw in prison for the rest of his life.

So why is Sy Hersh still free?

Surely the classified information that Hersh has revealed is even more dangerous to the safety of the U.S. than what Assange revealed. Hersh showed that the U.S. had committed an unprovoked act of war against Russia. This gives Russia an absolute legal right to retaliate under Chapter VII, Article 51, of the United Nations Charter, which cites self-defense as an exception to the prohibition against the use of force.

Since Russia happens to be a nuclear power, its potential retaliation could trigger World War III and wipe out not just the U.S. but the entire human race. Therefore, in any comparison of who has placed the U.S. in greater danger Julian Assange is a piker compared to Sy Hersh.

So why is Sy Hersh still free?

The answer is this. Although President Joe Biden, Secretary of State Anthony Blinken and Under Secretary of State for Political Affairs Victoria Nuland would love to throw Sy Hersh into a maximum security prison for the rest of his life, as punishment for revealing their complicity in blowing up the Nord Stream II pipelines they dont dare to. If they did, it would be tantamount to admitting that what Hersh published is true.

Which would be embarrassing, to say the least, because Biden and Company have spent every day since February 7 denying that Hershs revelations are true. In other words, they claim he made it all up which means, according to them, that he did not publish classified information. Therefore he cannot be guilty of any crime.

Thats the frustrating double bind in which Biden now finds himself. It must drive him crazy. Because the day he sends federal agents to put the cuffs on Sy Hersh, that is the day he and Blinken and Nuland will have to admit that they lied, that Hershs expos is true, and that they did indeed order the destruction of the Nord stream pipelines.

So of course that day will never come, and Sy Hersh will remain a free man. Which is why, at least this one time, I am glad that our leaders are liars.

Read more:
Why is Assange in Jail and Not Seymour Hersh?

With Just ~20 Lines of Python Code, You can Do Retrieval Augmented GPT Based QA Using This Open Source Repository Called PrimeQA – MarkTechPost

With Just ~20 Lines of Python Code, You can Do Retrieval Augmented GPT Based QA Using This Open Source Repository Called PrimeQA  MarkTechPost

The rest is here:

With Just ~20 Lines of Python Code, You can Do Retrieval Augmented GPT Based QA Using This Open Source Repository Called PrimeQA - MarkTechPost

What Is Open Source Software and How Does It Work? | Synopsys

Factors

Open source

Closed source

Price

Available for nominal or zero licensing and usage charges.

Cost varies based upon the scale of the software.

Freedom to customize

Completely customizable but it depends on the open source license. Requires in-house expertise.

Change requests must be made to the company selling the software. This includes bug fixes, features, and enhancements.

User-friendliness

Typically less user-friendly, but it can depend on the goals of the project and those maintaining it.

Typically more user-friendly. As a for-profit product, adoptability and user experience are often key considerations.

After-sales support

Some very popular pieces of open source software (e.g., OSS distributed by Red Hat or SUSE) have plenty of support. Otherwise, users can find help through user forums and mailing lists.

Dedicated support teams are in place. The level of service available depends on the service-level agreement (SLA).

Security

Source code is open for review by anyone and everyone. There is a widespread theory that more eyes on the code makes it harder for bugs to survive. However, security bugs and flaws may still exist and pose significant risk.

The company distributing the software (i.e., software owner) guarantees a certain level of support, depending on the terms of the SLA. Because the source code is closed for review, there can be security issues. If issues are found, the software distributor is responsible for fixing them.

Vendor lock-in

No vendor lock-in due to the associated cost. Integration into systems may create technical dependency.

In most cases, large investments are made in proprietary software. Switching to a different vendor or to an open source solution can be costly.

Stability

This will depend on the current user base, the parties maintaining the software, and the number of years in the market.

Older, market-based solutions are more stable. New products have similar challenges as open source products. If a distributor discontinues an application, the customer may be out of luck.

Popularity

Some open source solutions are very popular and are even market leaders (e.g., Linux, Apache).

In some industries, proprietary software is more popular, especially if it has been in the market for many years.

Total cost of ownership (TCO)

TCO is lower and upfront due to minimal or no usage cost, and depends on the level of maintenance required.

TCO is much higher and depends on the size of the user base.

Community participation

The community participating in development, review, critique, and enhancement of the software is the essence of open source.

Closed community.

Interoperability with other open source software

This will depend on the level of maintenance and goals of the group, but it is typically better than closed source software.

This will depend on the development standards.

Tax calculation

Difficult due to undefined monetary value.

Definite.

Enhancements or new features

Can be developed by the user if needed.

Request must be made to the software owner.

Suitability for production environment

OSS might not be technically well-designed or tested in a large-scale production environment.

Most proprietary software goes through multiple rounds of testing. However, things can still go wrong when deployed in a production environment.

Financial institution considerations

The financial industry tends to avoid open source solutions. If used, a vetting process must take place.

Financial institutions prefer proprietary software.

Warranty

No warranty available.

Best for companies with security policies requiring a warranty and liability indemnity.

See the original post here:
What Is Open Source Software and How Does It Work? | Synopsys

15 Best Open Source Software You Must Try in 2023 – Turing

Open-source software (OSS) is released with its source code, allowing it to be used, modified, and distributed under its original license terms. Most computer users never view source code, which is the code that computer programmers edit to control how a program or application operates. Programmers with access to the source code can change a program by adding to it, altering it, or fixing errors. OSS is frequently accompanied by a license that allows programmers to tailor the software to their own requirements and decide how it is disseminated. Best open source software are the ones that are supported by a huge community of developers.

The fact that open source software is both free and secure should be enough to persuade you, but if you're still not convinced, consider the following:

The developers work exclusively for the project's passion, not for profit. As a result, a better product emerges, focusing only on usefulness rather than bloat to attract more clients.

There are fewer issues since hundreds of volunteer engineers manage the code. More eyes enhance the likelihood of catching bugs more quickly.

They have a simpler interface (in most cases) because developers prefer to focus on getting the work done rather than adding unnecessary features to entice clients.

Hundreds of developers (depending on project popularity) can introduce and manage features in extremely sophisticated programs.

Hundreds of plugins are available in many open-source apps' plugin repositories to further expand the app's capabilities. The plugins are also created by volunteers.

Popular open-source programs have their own forums and communities where users can get support and learn more about them.

Best open source applications are also incredibly versatile for businesses since if they want a new feature, their own developers may contribute to its development.

Here are the 15 open-source applications that you should definitely try this year.

Notepad++ is a text editor that replaces the Windows notepad software. It is a lot chevalier and one of the best open-source software. You can also use Notepad++ to keep track of your notes and content ideas because it immediately saves all changes and has numbered lines.

Most coders use it to write code, and use it for its capabilities, such as auto-complete depending on the current context, aid in coding.

An all-in-one picture editor that is suitable for both novice and experienced users. GIMP includes everything you need, whether you want to conduct simple editing like resizing, annotating, and effects, or utilize complex painting tools. GIMP also supports almost every photo format, and plugins may be used to extend its capabilities. Is it really the best open-source software? It is one of the best for sure.

7-zip is unquestionably one of the most effective programs for managing archives and compressing data. It can be packed and unpacked in a variety of formats, and data can even be encrypted using AES-256 encryption. It also has a strong compression engine with several compression techniques. Some of the applications here may not be the best open source software for everyone but professionals can make the best use of these.

Audacity is still one of the most commonly used and best open-source software two decades after its first release. It is a free audio editor that runs on Windows, Mac OS X, and Linux.

After installing this handy little software, you'll discover everything you need to record, edit, and improve sound files. Furthermore, you may use Audacity's library of third-party extensions to add any functionality that isn't available by default, owing to the program's large development community. You'll be able to do everything from adding sound effects to auto-tuning your tracks with them.

Thunderbird is one of the best open-source software solutions if you want to use one email client to handle all of your email accounts. It doesn't require any setup; simply enter your email address and password, and it will take care of the rest.

Attachment reminders, handling many emails at once, advanced search, sending large files, and add-on support are just a few of the highlights.

Brave is a web browser based on Google's open-source Chromium project aimed to keep your browsing behavior private by deactivating website trackers and preventing annoying adverts. It contains a built-in Tor capability for even more secure browsing.

The main benefit of using Brave is that it allows you to use many of the Google Chrome store's thousands of extensions while also providing a speedier surfing experience than a regular Chrome browser making it one of the best open-source software. Brave uses fewer resources than Google's standard Chrome package, allowing it to load pages faster.

There are several excellent password managers available, but KeePass Password Safe stands out due to its ease of use and extensive feature set. It is one of the best open-source software as it uses industry-standard (and virtually unbreakable) AES encryption and two-factor authentication to safeguard your account information.

Because of its mobility, KeePass deserves to be included in our list of the finest open source platforms. You may store your database and the application on a USB stick for safekeeping, even though this open-source tool can be installed on Windows, Mac, Linux, and mobile devices.

FileZilla is a free FTP client that allows you to administer server file systems from a remote location. If you operate a website, you already know how unpleasant it can be to execute FTP operations using a web client. FileZilla delivers a more consistent and pleasant FTP experience than most web hosts' default FTP software and is the best open-source software for that specific purpose.

This free FTP client has a number of sophisticated features, including huge file transfer capability, synchronized directory browsing, and filename filtering. A network configuration wizard is also included if you have any difficulties connecting to your website's server.

Obviously, this list would be incomplete without discussing Linux, the most well-known open-source operating system. Since its inception in 1991, Linux has evolved into a vast family of operating systems, including desktop variations like Chrome OS and Ubuntu and server stack solutions like LAMP.

Due to the complexity of installation and the amount of tinkering with Linux computers required to function, it was previously only used by a few developers and they still think it is the best open-source software to date. However, Linux distro developers have made a concerted effort to make them more user-friendly packages in recent years. Running a virtual Linux workstation or re-partitioning your hard disc to add Linux as an additional OS is now easier than ever.

VLC Media Player is a notable example of open source software that you may use for free. It is one of the best open-source software when we talk about media playback. This multimedia player plays discs, cameras, streams, devices, and video, media, and music files. The majority of users also use it to listen to podcasts.

It allows you to optimize your audio and video files for a certain hardware setup and build unique designs using a variety of extensions and skins. It also operates on a variety of platforms, including Android, Mac OS X, Linux, Windows, iOS, and others.

The GNU Compiler Collection is a set of tools for developing software in C, C++, Ada, Fortran, and other programming languages.

It consistently produces high-quality releases and works with both native and cross-platform targets. The sources it provides are accessible for free via weekly snapshots and SVN.

OCS Inventory NG, or Open Computer and Software Inventory Next Generation, is a lightweight online application that can assist network and system administrators in keeping track of 1) all devices connected to the network and 2) machine settings and software loaded on them.

The project's website offers a fully working demo if you wish to try it out before installing it. Furthermore, OCS Inventory NG is a strong software that uses well-known technologies such as Apache and MySQL/MariaDB.

LibreOffice is effectively a free version of Microsoft 365, the world's most popular office productivity suite, with support for documents, spreadsheets, databases, presentations, diagrams, and mathematical formulas.

Some could argue that LibreOffice is the more feature-rich of the two, given to its active developer community, always introducing new tools and techniques. LibreOffice, for example, just launched a QR code-generating feature to make it easier to produce mobile-friendly connections. LibreOffice has risen to the top due to its excellent ability to preserve Microsoft file types.

You may use Ampache to create your home media center or online audio and video streaming application, which you can use from any computer with an Internet connection.

Although Ampache is intended to be a personal application, it does allow for public registration if an administrator decides to permit it.

oPOS uniCenta can be the best open-source software if you operate a small or medium business as you will almost certainly require a POS system. As a result, uniCenta oPOS could save your life. It stores data in a MySQL / MariaDB database, enabling the usage of a single database with numerous active terminals simultaneously. A search panel, a price-checker application, and a tool for creating printed reports are all included in uniCenta oPOS.

Open-source software are getting more and more attention. Despite the fact that the open-source community has been actively promoting the benefits of open source for years, there have never been more open-source projects in use than there are now. This article provides you with a summary of the top and most important open-source software, so you can get benefited from them.

Read the rest here:
15 Best Open Source Software You Must Try in 2023 - Turing

Entertainment News Roundup: Sean Penn film ‘Superpower’ catches Zelenskiy at moment of Russian invasion; And the winner is… London rolls out red…

Entertainment News Roundup: Sean Penn film 'Superpower' catches Zelenskiy at moment of Russian invasion; And the winner is... London rolls out red carpet for BAFTA Film Awards and more  Devdiscourse

Read the original post:
Entertainment News Roundup: Sean Penn film 'Superpower' catches Zelenskiy at moment of Russian invasion; And the winner is... London rolls out red...

WikiLeaks’ Website Is Slowly Falling Apart

WikiLeaks website appears to be coming apart at the seams, with more and more of the organizations content unavailable without explanation.

WikiLeaks technical issues, which have been ongoing for months, have gotten worse in recent weeks as increasingly larger portions of its website no longer function. Even attempting to visit wikileaks.org is a gamble in itself, often producing a 502 message that indicates an error was detected on the websites server.

When the website does become available, problems still abound. The main banner on WikiLeaks, which includes the organizations logo as well as links to subdomains such as the About page, has been entirely missing since earlier this month. A similar banner at the bottom of the page, which once showed links to sites for Bitcoin and the Tor Project, is now gone as well.

A search bar that once scoured the site for information also appears to no longer work and instead redirects users to the homepage.

But the biggest issue relates to WikiLeaks entire purpose: Leaks.

Many of the groups leaks have either vanished or become inaccessible to the public. Of the seven leaks highlighted on the homepage, three produce no content. Two of those redirect to error pages while the third merely sends users back to the homepage.

Some of the organizations most prominent leaks have also been affected. A cache of more than 1 million emails from Hacking Team released in 2015, the now-defunct Italian surveillance vendor, are gone. An archive of tens of thousands of emails from former Secretary of State Hillary Clintons private email are inaccessible. The Democratic National Committee emails, provided to WikiLeaks ahead of the 2016 election by Russian state entities posing as rogue hackers, are similarly missing.

Although WikiLeaks long boasted that it released more than 10 million documents in 10 years, at current, less than 3,000 documents remain accessible, according to an analysis by the Daily Dot of the websites leaks archive. The issues have become so apparent that supporters of the group are now voicing concerns across social media.

In a post on the WikiLeaks subreddit over the weekend, one user complained that every search request made on the website produced an error message.

The site is completely down for me, another responded. All I get is a 502 bad gateway error.

And despite similar complaints on Twitter, many of which tag WikiLeaks account, the organization has failed to publicly address any of the issues. WikiLeaks did not respond to a request for comment from the Daily Dot over Twitter DM.

Even organizations tied to WikiLeaks appear to be struggling. The website for Defend WikiLeaks, a group that raised funds for the legal defense of WikiLeaks imprisoned founder Julian Assange, has now been taken over by a Vietnamese sports blog.

The website for the Courage Foundation, which similarly raised funds for whistleblowers and journalists including Assange, Chelsea Manning, and Edward Snowden, was also taken over in the past week and transformed into a Japanese blog selling knockoff designer merchandise. The domain now shows nothing more than a blank page. The Daily Dot reached out to the Courage Foundation over Twitter DM to inquire about the issue but did not receive a reply.

The latest technical issues are not the first for WikiLeaks. The Daily Dot noted in February that despite openly asking for leaks on Twitter, none of WikiLeaks submission tools were actually working. In July, the Daily Dot reported on WikiLeaks release of a new submission portal for whistleblowers that still didnt work.

The organization has largely moved away from releasing leaks in an apparent effort to rally behind Assange, who is currently being held in a U.K. prison while fighting extradition to the U.S. on charges related to his work with WikiLeaks.

While the organization is raising money for Assanges defense, it appears none of those funds go to website maintenance.

Update 3:02pm CT: Following the Daily Dots reporting, the websites for both the Courage Foundation and Defend WikiLeaks were taken offline. The Twitter account for the Courage Foundation also appears to have removed a link to its website from its bio in recent days.

We crawl the web so you dont have to.

Sign up for the Daily Dot newsletter to get the best and worst of the internet in your inbox every day.

*First Published: Nov 22, 2022, 8:30 am CST

Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.

Visit link:
WikiLeaks' Website Is Slowly Falling Apart

12 Years Of Disruption: A WikiLeaks Timeline – NPR.org

WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017. Justin Tallis/AFP/Getty Images hide caption

WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017.

WikiLeaks was already established as an online outlet for posting secret documents from anonymous leakers well before its massive disclosure of U.S. government and military information in 2010. That was the year WikiLeaks' Australian founder, Julian Assange, faced allegations that led to his seeking asylum in Ecuador's London embassy.

Here is a timeline of WikiLeaks' key disclosures and related developments.

November: WikiLeaks posts a U.S. Army manual of standard operating procedures for soldiers overseeing al-Qaida suspects held captive at Camp Delta in Guantanamo Bay, Cuba.

September: Two months before the U.S. presidential election, WikiLeaks posts leaked emails from the Yahoo account of Republican vice presidential contender Sarah Palin.

November: WikiLeaks posts more than half-a-million pager messages it claims were sent on Sept. 11, 2001.

April: WikiLeaks posts a classified U.S. military video of a U.S. Apache helicopter gunship firing on what the military says were believed to be armed fighters in New Baghdad, Iraq. Among the 18 killed were two Reuters journalists.

May: Pfc. Bradley (later known as Chelsea) Manning is arrested by the U.S. military and then court-martialed in June, charged with leaking the combat video posted on WikiLeaks as well as classified State Department documents by downloading those documents to a personal computer.

July: WikiLeaks posts what it calls "The Afghan War Logs," more than 75,000 classified documents that record previously undisclosed civilian casualties inflicted by the U.S. and coalition forces, details of the pursuit of Osama bin Laden and accounts of stepped-up fighting by the Taliban.

August: WikiLeaks founder Julian Assange faces an arrest warrant over allegations of rape and molestation during a visit to Sweden; police question him in Stockholm, where he denies the allegations.

October: WikiLeaks posts nearly 400,000 classified military documents it calls "The Iraq War Logs"; they detail the involvement of Iraqi security forces in the torture of prisoners of war, document higher civilian death tolls and describe Iran's support for Iraqi insurgents.

November: WikiLeaks posts the first 250,000 of more than 3 million leaked U.S. diplomatic cables from nearly 300 American consulates and embassies worldwide that span the years from 1966 to 2010.

December: Assange is arrested in London to face extradition for the Swedish allegations; he is released and put under house arrest after posting bail.

February: WikiLeaks posts seven cables from the U.S. Embassy in Cairo, amid violent clashes between Egyptian security forces and pro-democracy demonstrators; the documents discuss Egypt's human rights and civil liberties violations.

April: WikiLeaks posts "The Guantanamo Files," some 800 classified military documents detailing the official allegations of terrorist actions by the men held captive in Guantanamo Bay, Cuba.

October: After being removed from Amazon's servers and being allegedly cut off from major credit card companies as well as PayPal and Western Union, WikiLeaks suspends publication of leaked documents to "aggressively fundraise."

February: WikiLeaks starts posting a trove of what it claims are 5 million leaked emails from Stratfor, a private company that describes itself as a "global intelligence company."

June: Assange takes refuge in Ecuador's London embassy, where he seeks political asylum.

July: WikiLeaks begins posting more than 2 million leaked emails, dating back to 2006, from 680 Syrian government officials and firms.

August: Assange is granted political asylum at Ecuador's London embassy; a military judge condemns Manning to a 35-year prison sentence; Manning announces gender transition and asks to be known as Chelsea.

Throughout the year: WikiLeaks posts leaked documents detailing the private negotiations for major trade deals, including the Trans-Pacific Partnership and the Transatlantic Trade and Investment Partnership.

June: WikiLeaks posts leaked documents from the Saudi foreign ministry.

July: WikiLeaks begins posting leaked National Security Agency documents revealing American surveillance of German Chancellor Angela Merkel, French President Franois Hollande, U.N. Secretary-General Ban Ki-moon, as well as two prime ministers, Israel's Benjamin Netanyahu and Italy's Silvio Berlusconi.

July: WikiLeaks posts nearly 20,000 emails and 8,000 attachments from leaders of the Democratic National Committee; Assange later denies allegations that Russian intelligence services were the source of the leak.

October: WikiLeaks posts more than 2,000 hacked emails from the account of John Podesta, who at the time was campaign chairman for Democratic presidential nominee Hillary Clinton.

January: Outgoing President Barack Obama commutes Manning's prison sentence, allowing her to be freed in May.

March: WikiLeaks starts posting what it calls "Vault 7," which it claims to be a collection of thousands of internal Central Intelligence Agency documents that detail a covert hacking program carried out by the agency as well as malware and software it uses to spy on smart TVs, the operating systems of most smartphones and Web browsers.

September: WikiLeaks starts posting the first of what it says are 650,000 leaked critical documents from surveillance contractors working in a Russia ruled by President Vladimir Putin.

October: CIA Director Mike Pompeo says the U.S. is "working to take down" WikiLeaks, which he calls "an enormous threat."

December: Assange is granted Ecuadorian citizenship.

April: The Democratic National Committee files a lawsuit against WikiLeaks for its role in publishing the DNC's hacked emails.

May: Manning's conviction under the Espionage Act is upheld by a U.S. Army Court of Criminal Appeals.

November: A document written by a U.S. attorney inadvertently discloses that Assange has been charged under seal by the U.S.

March: Manning is jailed after refusing to testify to a grand jury about what she leaked to WikiLeaks.

April: Ecuadorian President Lenn Moreno accuses WikiLeaks of intercepting his private phone calls and hacking photos of his bedroom, his meals and his wife and daughters dancing; Moreno provided no evidence, and WikiLeaks calls the charges "bogus."

Assange is arrested at Ecuador's London embassy by British police, accused of skipping bail.

The U.S. Justice Department unseals an indictment of Assange dated March 6, 2018, that charges him with "conspiracy to commit computer intrusion."

See more here:
12 Years Of Disruption: A WikiLeaks Timeline - NPR.org