Wikileaks … Good or Bad? Trump says bad …VERY BAD!!! – WWL First News

And welcome back don't forget coming up this afternoon LSU in the college World Series. There continued to play that he won it's Saturday against Florida State University. So they're playing organ state the beavers today and that is. Going to be a big match up 5:30 pregame 6 o'clock first pitch because both teams are on. Winning streak cell issue is he says seventeen game winning streak and Oregon State. He 22. Game winning streak on the lost four games all season as a coach pulmonary said the Los four's so. They can be beat. We have a chance. And he was joking about it so you're telling us there's a chip. Is basically what he said all right let's go back to John industrial age on I think we got two phone there on. Yeah I them yeah I can hear you now okay go ahead which which. Erica. I don't have a floor. And you're telling people are and classified information. And you don't have a source. Art. I disagree about putting. He brings out your sources are unclassified in. So cal which are source because they're making. Me more big deal. If so. If the president was under and investigation. What does it matter at this point if you let that people knowing who your sources. I mean it's not it's it'd it'd. I want to sources that I mean it's cot side. That's a different situation. Though love easily construct that jets or confusion. And just fight against each other further political. And I don't like being manipulated. Politicians actually ordered me. And I don't I don't wanna be manipulated and I actually throughout the at a time you've given me information that incorrect. I think up fine and there. Because union to start checking your sources and that is going I mean you're about to be responsible. Boy. Teller a note going on in our country and you're not doing so I think firing. Her. Are you talk about you personally the media that that puts them a cut all if you're syndicated. On our. I try to get I try to get as many facts as I can and sometimes I can't find them and sometimes a little bit and I've got something wrong John. But what I'm saying it. You don't want earned. They're cute that you give that information okay. And then you need it we need to have some recourse to stop this stuff. That that is a part of all part of freedom of the prestige. That they don't I dinosaurs. Are. While then we just as you can have it both ways as wooden thing. Where you have you have the media controlled by a Vigo or you reports. Actually care about flies because our investigators say I'm agent named sources and then and then out there on who you're source says. And I can go. Well they don't they can ask but. But they don't have to deal of those sources because we've seen people go to jail for not giving up their sources. And don't put it it's on. I yeah. Aren't in yet. Her daughter or rather. I'm just beat and the final battle as a good. But the thing there. To hold you responsible. When you do irresponsible. Or. And and it. That's like crying fire in the year and so he. Some have vault have lost their jobs by putting out false stories are related proven false and notice hired him anymore is it for is being reporters that mean that has happened. That's a very that's an excellent take care of the problem. And I think that's fine if you contain you know he'd wait aren't well I mean our remote straps absolutely. I don't want freedom law. And are allocated difference between freedom of law and freedom of speech. And I don't believe for mobile and I think ally ticket keeps telling that same line. Leo freedom of lying also be freedoms the and I mean there are you don't. Our. Dog if I tell you you know if you like your kids allergies up league east. Whether he's right or not he's got the Freedom Party to decide it. Catch you if you're but I posting went. I understand were saying if you're if you're supposed to be trusted news source in your doing it then we got to. OK. And I I think were on the same page on which is. Having fun playing doubles with our. Current and important right John excellent golf. Our thanks for you know will take a break and be right baca Chris. Sin LC hang on a good view as well as the person calling it a lot of techs also final four to 60170. Or you could tech city 78 Seve will be right back starting for Garland on WW well. And welcome back to WWL. 504260187. He's a number calling detects an 87870. Tonne and for garlic got a text that says. Trump decided to attack American democracy in American democracy decided to attack trump right back surprise surprise we were warned. That trump was not qualified to be president. Well the played devil's advocate for that according to the US constitution article two section one. These are the qualifications for president which. Prom mat so I don't know which are considered to be qualified that's up to used to what they are qualified but basically to be president of the United States. It just says no person except a natural born citizen or a citizen of the United States at the time of the adoption of this constitution. Shall be eligible to the office of president neither shall any person be eligible to that office who shall not have attained the age of 35 years between these older net. And been fourteen years a resident within the United States which he had. The only amendment to that has been in the term limit amendment no person shall be elected to the office of the president that is the US constitution amendment. It's. 22 section one. Or ratified February 271951. Overs and chubby elected the office of the president more than twice. And no person who has held the office of president or acted as president for more than two years of return. To which some other person was elected president Shelby elected to the office of the president more than once so those are basically altercations. Yet be over 35. Born in this country. I've lived here for fourteen years as a natural born citizen. Been a resident for at least fourteen years so that's it. There's no qualifications about going to law school was no qualifications about. Offices held previously or being in government before. So. Again he met the qualifications. If you wanna say to be president whether. He met the qualifications of what we've previously seed is to be a president. Then maybe you've got an an argument there let's see let's go to Chris and oral take Chris thanks for call to be Nabil. Thanks for and yeah I do think leaks can be a good thing. For example if they polar. And unknowing public during an election. A large portion. The media it is colluding with the political. Party. Exact example from the point 160 election when WikiLeaks released John pedestrian emails and it was on news essentially. Puppeteer. A large majority of the mainstream media he did his agenda across to lie to make it seem like there are. And I also against him against Ernie and Bernie Sanders correct. Well most of them is again Sanders to read it cheaper and yet that her that. The cheaper and standard and beat the owners who donated to the DNC. Because well. Speak for Bernie Sanders. And the attendant made it look like or support the cultural every time they had a article adult child patients and mole wearing. Oh big redneck GO how infuriating that would. But it and Chris Chris here's the point it didn't work because trump got elected. And nothing done to stop our owners are now in doubt you but even if they even if they held them responsible right now it's still wouldn't change the outcome of the election is what Johnson. Well it would help and to alleviate some disgusting rhetoric that's being poured on on trial because mainstream media is still in debt that it DNC. And you think your partner. I don't I don't know I am to be it continues to have court and court packs because. It. And Chris. Chris yeah yeah because Chris Chris let me let me let you know now Chris might ultimately club to explain. They have them on because they represent that side and that we have the heritage group on the represents the other side. John Podesta was not held accountable for his nets doing. And and saddened I need to know that to me to hold them accountable that's up to if if this investigation is. Harry Rosenberg said it can go into that way and they can hold him accountable if they want to. But he did see you too on alert the public that he now works in Washington Post which is sort or. A lot of and and I think that's. Then that's been said before and that's why send it to you believe the leaks. So again. That information is out there. So do you believe them or not. Do you think they're good thing or not only one event a figure party or not. We'll take a break be right back in wrap it all up starting for Garland Wanda did a deal.

More here:
Wikileaks ... Good or Bad? Trump says bad ...VERY BAD!!! - WWL First News

Latest WikiLeaks Show The CIA Has Been Hacking WiFi Routers For Years – Forbes


Forbes
Latest WikiLeaks Show The CIA Has Been Hacking WiFi Routers For Years
Forbes
On Friday, ZDNet reported that documents released by WikiLeaks show how the CIA has been remotely tapping into routers in private homes and businesses with a variety of tools so as to gain access to those computer networks. Included in the "dozens of ...

Read the rest here:
Latest WikiLeaks Show The CIA Has Been Hacking WiFi Routers For Years - Forbes

Wikileaks dump details how the CIA can easily hijack routers – SiliconANGLE (blog)

The Central Intelligence Agency likes to hack Wi-Fi routers.

Thats the major takeaway from a new dump from Wikileaks that includes the details of software used by the agency to spy on all and sundry.

Called Cherry Blossom, the CIA-designed hacking softwareuses a modified version of a routers firmware to turn it into a surveillance tool. The firmware allows the agency to monitor thetargets internet traffic remotely, scan for useful information such aspasswords and redirect the target to a desired website.

The idea of the CIA spying on people isnt particularly groundbreaking, but what is more interesting is that Cherry Blossom can be installed remotely with zero physical access to the router itself. It uses a process called FlyTrap by which an implanted device can then be used to monitor the Internet activity of and deliver software exploits to targets of interest, the CIA manual noted.

The method of attack is to hijack the over-the-air firmware upgrade functionality. Many wireless devices allow a firmware upgrade over the wireless link, meaning a wireless device can often be implanted without physical access, the manual noted. Supported devices can be implanted by upgrading the firmware using a variety of tools/techniques.

The document would appear to be somewhat old, given that it includes references to as of August 2012. Still, no router would be safe from Cherry Blossom. The manual described different versions of the hacking tool tailored to a multiplebrands and models of routers, including devices from Asus, Belkin, Buffalo, Dell, DLink, Linksys, Motorola, Netgear, Senao and US Robotics.

Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap, Wikileaks noted in its press release. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. That beaconed information contains device status and security information that the CherryTree then logs into a database.

In response to this information, the CherryTree sends a Mission with operator-defined tasking, Wikileaks continued. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.

Althoughthe CIA is legally restricted from operating within the borders of the United States, if youre reading this from another country and are doing something untoward, it may be advisable for you to turn off your router very quickly.

Go here to see the original:
Wikileaks dump details how the CIA can easily hijack routers - SiliconANGLE (blog)

Wikileaks Documentary Makers Accuse Assange of Censorship – Newsweek

We are the producers of Risk , a documentary film about Julian Assange and WikiLeaks.

We unequivocally defend WikiLeaks journalistic right to publish true and newsworthy information.

The Trump administrations threats against WikiLeaks and attacks on press freedom are chilling. As Margaret Sullivan recently argued in the Washington Post, prosecuting WikiLeaks under the Espionage Act would set a dangerous precedent for all journalists.

Daily Emails and Alerts- Get the best of Newsweek delivered to your inbox

We were disturbed, however, to learn that Julian Assange and WikiLeaks sent cease and desist letters to our distributors demanding they stop the release of Risk: We therefore demand that you immediately cease the use and distribution of all images of the Named Participants and that you desist from this or any other infringement of the rights of the Named Participants in the future.

In WikiLeaks efforts to prevent the distribution of Risk , they are using the very tactics often used against them legal threats, false security claims, underhanded personal attacks, misdirection and with the same intentions: to suppress information and silence speech.

Filmmaker Laura Poitras speaks as former National Security Agency (NSA) contractor turned whistleblower Edward Snowden is seen on a video conference screen during an award ceremony for the Carl von Ossietzky journalism prize on December 14, 2014 in Berlin, Germany. Adam Berry/Getty

Since 2016, Assange and his lawyers have repeatedly demanded that we remove scenes from the film in which Assange speaks about the two women who made sexual assault allegations against him in 2010 and Swedens investigation which has since been discontinued.

In response to our refusal to remove these scenes, Assange and his lawyers are now claiming that Risk threatens the safety of the staff who consented to being filmed, and furthermore, that we are being sexist by including Assanges own comments about women in the film.

These arguments are not only false, they are a deliberate effort at misdirection.

Risk was filmed over the course of many years, beginning in 2011. Assange and WikiLeaks freely consented to participating in the film, knowing we were making an independent documentary. Neither WikiLeaks nor Assange have any editorial control of Risk. There were individuals who requested from the beginning not to appear in the film, and those requests were respected.

Wikileaks and their lawyers were shown the film before each public screening, most recently inside the Ecuadorian embassy in London on April 1, 2017. Each time, we invited their responses.

WikiLeaks comments have consistently been about image management, including: demands to remove scenes from the film where Assange discusses sexual assault allegations against him; requests to remove images of alcohol bottles in the embassy because Ecuador is a Catholic country and it looks bad; requests to include mentions of WikiLeaks in the 2016 U.S. presidential debates; and, requests to add more scenes with attorney Amal Clooney because she makes WikiLeaks look good.

It is only after we declined to make the changes they tried to impose that WikiLeaks raised objections to Risk . Their attempts to censor the content of the film are an effort to prevent reporting on Assanges own words. They also constitute a saddening break with WikiLeaks own ideals.

Last month, WikiLeaks lawyers published an op-ed saying they object to our editing in the United States. However, Assange has known since 2015 that we were editing in the U.S. In 2016, he signed an agreement to license WikiLeaks own footage to us and raised no objection to mailing a hard drive with footage directly to our editing room in New York City.

WikiLeaks has also repeatedly publicized their participation in Risk , most recently re-tweeting a link to the films trailer on April 10, 2017 (a tweet that has since been deleted), without raising any concerns.

In their cease and desist letter, lawyers for WikiLeaks and Assange state: The unauthorized release of the Film has caused our clients to suffer ongoing irreparable harm, and exponentially increasing damages every time a new viewer sees the Film.

All the participants in Risk agreed for years to be in the film. We have no obligation to seek WikiLeaks or Assanges authorization to release the film. In fact, our rights under the First Amendment are protected precisely because we are engaging in independent journalism. Assange himself has criticized the media for seeking permission from public figures before releasing stories.

Like WikiLeaks, our journalism has been the target of U.S. government investigation, secret grand jury, and threats by elected officials. We fully understand and empathize with the dangers WikiLeaks is facing, and we stand in solidarity with all journalists and publishers around the world currently under attack.

Visit link:
Wikileaks Documentary Makers Accuse Assange of Censorship - Newsweek

Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program – Threatpost

Wikileaks released details of what it claims is a CIA-developed wireless router hacking program targeting home wireless routers and business wireless networks. The program is called Cherry Blossom and leverages custom router firmware called FlyTrap, according to the organizationslatest leak posted Thursday.

Cherry Blossom provides a means of monitoring the Internet activity of, and performing software exploits on, targets of interest, according to the report.

Thereleaseis part of itsongoing Vault 7 leaksthat began in March and have continued almost weekly exposingCIA activities and capabilities.

According to the documents, the CIA created modified router firmware called FlyTrap that could be installed on routers remotely. Once successfully installed, FlyTrap would then monitor the targets internet traffic and scan for email addresses, chat usernames, MAC addresses and VoIP numbers. FlyTrap also allowed government agents to redirect traffic to desirable sites.

Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a command and control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database, according to Wikileaks.

Listed by the CIA are hundreds of individual consumer- and business-class wireless router models targeted by the agency from brands made by 3Com, D-Link, Linksys and Panet Tec. The Cherry Blossom framework in the alleged CIA documents describes a program and software used for contract year 2011-2012.

If the router is configured to allow firmware to be updated remotely (and tons are) you are at risk. I would put the percentage of (home) routers out there vulnerable to this type of attack at well over 80 percent, said Rick McElroy, security strategist at Carbon Black.

Exploiting misconfigured routers is nothing new, and something adversaries have been doing for years.

McElroy notes that in March, Wikileaks revealed a similar alleged CIA plot targeting more than 300 enterprise-class Cisco routers and switches. Based on the Vault 7 public disclosure, Cisco launched an investigation into the products that could potentially be impacted by these and similar exploits and vulnerabilities, wrote Cisco at the time in security bulletin announcing fixes for the alleged CIA hacks.

According to Wikileaks documents, FlyTrap is capable of setting up VPN tunnels to Cherry Blossom-controlled VPN servers in order to give an operator access to clients on the FlyTraps WLAN/LAN for further exploitation.

Clearly the most difficult aspect of a Cherry Blossom program is implanting the FlyTrap firmware on the targeted wireless router. To that end, the alleged CIA document suggests using a CIA exploitation tool such as Tomato or Surfside for targeting vulnerabilities in commercial routers.

In instances where a wireless device doesnt permit an over-the-air update, the CIA developed what are called Wireless Upgrade Packages. Its unclear what or how these packages might be deployed to targeted systems. Also ambiguous, is another suggested means of installing FlyTrap on routers using the Claymore tool. According to the leaked CIA document, the Claymore tool is a survey, collection, and implant tool for wireless (802.11/WiFi) devices.

The last method for installing FlyTrap on one of the hundreds of routers listed is described: Use the Devices Firmware Upgrade Web Page over a Wired (LAN) Link this technique would likely be used in a supply chain operation, the alleged CIA describes.

For security expert Udi Yavo, CTO and co-founder of enSilo, he believes this last method mentioned indicates that the CIA intercepted some router devices in the supply chain and created back doors that could later be exploited.

The CIA has the ability to compromise the device in the supply chain. In these cases, no vulnerability or misconfiguration is needed. However, a lot of IoT devices are easy to compromise. For example, during DEFCON 2016 over 40 zero days were found in IoT devices. And that was in 2016, before that it was even easier, Yavo said.

It should be noted, however, that the CBlossom architecture does not limit itself to wireless devices in general, wired network devices could be implanted/compromised in the same fashion to achieve the same goals, read the alleged CIA document.

View original post here:
Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via 'Cherry Blossom' Program - Threatpost

News in brief: Facebook moderators revealed to terrorists; WikiLeaks release Cherry Blossom; language-translating … – Naked Security

Your daily round-up of some of the other stories in the news

A serious flaw in Facebooks software put counter-terrorism moderators at risk after revealing their personal details to the very people they were monitoring.

The bug caused the personal profiles of content moderators to be in displayed in the activity logs of groups where targets were admins.

More than 1,000 staff over 22 departments were affected. And, of those, six were evaluated as high priority after their profiles were seen by suspect Egyptian Islamic State supporters.

The Guardian reports, one of the six has gone into hiding for fear of being tracked own and butchered.

A spokeperson for the social media giant confirmed the breach, saying Our investigation found that only a small fraction of the names were likely viewed, and we never had evidence of any threat to the people impacted or their families as a result of this matter.

WikiLeaks just released its latest tranche of stolen data, this time relating to a suite of router and Wi-Fi hacking tools from the US Central Intelligence Agency (CIA).

The tools come from a project dubbed Cherry Blossom (WikiLeaks variously writes both Cherry Blossom and CherryBlossom, but the leaked documents routinely refer to Cherry Blossom, or CB for short, if youre a stickler for precision).

In the words of its own Quick Start Guide, the CB project focused on internet surveillance:

The Cherry Blossom (CB) system provides a means of monitoring the internet activity of and performing software exploits on targets of interest. In particular, CB is focused on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to achieve these goals.

Intriguingly, the above summary is accompanied by a footnote that adds the following comment:

The CB architecture does not limit itself to wireless devices in general, wired network devices (e.g., routers, gateways) can be compromised in a similar fashion to achieve the same goals.

If you arent already taking security as seriously on your router as you do on your mobile phone or your laptop, this leak might be the impetus you need to change your mind.

The latest clever piece of technology could make desperately riffling through travel phrasebooks and the fear of asking for directions while in a foreign country a thing of the past.

The Pilot is the worlds first earphone that translated languages in real time, reports Science Alert. It fits into your ear like a standard wireless earpiece and works by communicating with a smartphone app to translate between two languages. Translations can be made between English, French, Spanish, Portuguese and Italian, but more will be added as upgrades.

Currently the earpieces are sold in pairs, so you and the person youre talking to each wear one earpiece, but creators Waverly Labs are planning for future versions to translate from everything around you.

Catch up with all of todays stories on Naked Security

Excerpt from:
News in brief: Facebook moderators revealed to terrorists; WikiLeaks release Cherry Blossom; language-translating ... - Naked Security

WikiLeaks Reveals How the CIA Could Hack Your Router – WIRED

vF wYZYJA"$Vrd8H=Z P$aL:kC?s7'{ _d8G:2 jWki?wW[egGMO'^|7s^X$gOypsvQLvE|Cv@hMRx9[:5;; v'6nH PO=7dgF;&Yo/k5;uogn'~tyhLy{ri#M[O'A;R/ 6YG yswy5{iK'riOZ1}oS-[;sA9?Lxuw~YpCxf,kOYi+x+G}T;_r`.UHOONm0'U r6cN'O13Nd K J3Y cXt;t'a24h!DZtd:rAW?tKq]Vl<9tbmSM|vu&V=f$)9XBix0MaxK Vh" %TqGA%uq">Sq. zbU ]$S9M>:MsdLiS8vk5Q"E]{rlUi$EsybSE_Ir`GN*Ch9lByaNmn3SnVWz$:WH;_I?$JnJX.Q [Gf+2 i3qtXLwypA~Le8GuO<"9}hz. #Ufb"O_3| N&t=lz~-<"{p~9WFH3oqhq'h L.}rl?(c0Svt1aw)6'i90Ff0P) Vg*H%:XM@ b`^ 47?Wb/y+_~hygA${q_}'K_G@fIeO}+ltLF c:_"f+N`9G)[if'o./=J?_SP?ON?JADk Z=C'g_s:?BcQ?@ppv/4+7yz=[=BH}rS+qpc4$UoGr8aM9 /0~>wR2XR"`[{}rtdJaZJ}xE~@XOJoaC} Xr&PwKnD _x_ZnL@`P)z$kG;mcd7UV>^?vO.eL6# Hqdr*oe5'x0;A 8}$#8-2||ii >AfdB- yiO~p> d|EDK7P_ti;lA> t"E8!8bt@0|}v093fb:`N4>b/C"4=qz{t]3aM;M[OO=Wt%;M9$tw%1Y!Y)n7O-DRR >M~j,#6Z] p(^.?:Q./ m'Cw&==~ qAJogGa>") P*L(bkTB!8!+cQ|xq /*l+Jw}wXu{dU07j8}! Icj]oQM9: U,*8IR %nDh;}8;!;*g5 V],.e7 jzvbfm5F[#"q.6fPk7Uv} tZ@ag(-tXl[%X 49' -gZa P0n0 7n?uY2 6AR/`Vu,Pe}R]H]| B ;K(EZQ}xTRm aBmTN70*BM]/]1U:ViOP{`,oh-f<.EKx u96Ehk64[b%#,tA.vw%pB?eY7mmLdP#[Q+5mrH;@FSAm<|d7n49xW k@-D ~LPy5=Mvd;wSAve[-+^kNS6SU04c4f&vN=/RiWg|4sNP=S*|43Yc6s.m&Li)G01d0LlD u%Lu2i)2 H'{DdZAK[iST-#NV?V;l.TiSP#Q?Vo:6% 5C+Y23 rX3U,gMcx5;6vs4|7iPi:s*N{a6T[2z Y"k._fq1o]`Ctc?m> 7h}~!Sd4["vN/wZ>-^&umKI] _WqZsy *|uV}| X{R SkZ,Gy$63'RVo| Bn u}$TGq?@r; }cCKtMoX}'I;mFO]bwX =yCmcZwBh>'6KL!GB;PU jjyDbqavcd1w|/UcOmz}])[]g,y"fbflASj8MsSK5$GQA+;}?u|Qn*N*/ "(E z;BNu{4m>;Esyo2 /0u=t#L?y *^0 NDSyL);tO53m)'_sMr3zM& J{]ie{^v39: /;c1YXlXVqX`N#{KX04oC{:Satfs>:FL0r~2AhXfy<#'}d1M&}xy2/O>8ta1FnL=^h4Y^ IX!`M0pcNQa#fm6iB>4?gfFCah~6AhX=h F{eh4>)aSf>4?fO%~ [ V@3{Z/Lai`l5Y/Lf@m}@zPl5q[[ 2nFcO 0> Z 7aHbaQ K6RrO[ &Qm GXW5LaJV@$ZuZ>l5^>@9xK*[Ie2>49H^s3[/{r<=9es{Z~V@za}600fhr6MJr3r~Ih5^'O@6SSONONzqd K&%^~d ?W1P1dJ}3}~XAjh$t|@>Baq8^T2l5>IHj h}Wh5^Hi/{r:=9MfvfzEzgEzgrfzEzgEzg\^:`6^gYkkY8l8WWcWcTZkm6al54W9P1h9'[ C*ca*4P9dM{%jh22>mF[ OCaaf1W6i[ _9}jhPIuV@UnPWF9PFiKaEl5^HrY}lel5>{jh@KXzvh~N5{6|xyn=t9|O|HSO =WZCbSG.Eou_IB]enU6E,KyD7kj{KU'r0/ml">~ X_D|5o;*pFwFy<9)`c:G1?-OGM.+R5:AbB+,W)ajx/ZxsjCK'^s}PJFH5XmyVCAU]^^5ozzk_b/Pn}L{oM(ByWZ2Ve~uL"B%Zv2+;K[/;^G!LZ*|?x3G`]_&[j3oT]7{Wg!gsdR2^=f>J0Lkz'9Rl;L) wIFc$foqi7t{owUwYAL=fzi3=fvi3m13=f@f{L=f3{i3sYy131WOa2d+UiX=fpa=c6{zlX=fp17{ `=cvX=fp1?{`=cvoX=cv;{1 =fp=fC{=cp1{Vh=c=f{np=fC{=cp1{{1=fp=fB{[=cpYh=cv;{1{np=fC{[=cp1{{>=f5=fu{Z~}3 L ZjW)X=wcMU} m,EN[:8sdx]DTo%-^h;~z^Cy Ny+]@`D[6=6I|,fDk8&31tTX{yaCG%N$Ele~}>M'(E*OR)6 g}heeW6GddUPug7zRIrm7 lV8$F *_@V/JzL[Q,:0|na8x O4}m >:44LUCL[$Zl' /|SmSM+A:X``A&d< /0S/SGDx*1}brvp[ 7Xsw4K=byR1LQ-DEv=u!QgW2?n6WIu&^W^St[_` QxA z`z`{Q0"k`fZEOP 3u>:Yu]? k3~K:SAy74{*@(/l V/g@weKW}OzK!/I'$.:/XrVAl2$M~`.3,M* e/o.Vb`[w[!]r(*=c%~y& 6MiO~x&;m*-0 s/vj*I`7L v3r,$6qk[u?W(?BfSs;v? 5d8?fW u NEY]1ve>YG;A y=(a?)Je&$^pKR>)Gq ?CC[.|h. C8H AN[F370JxE):;%Ub]Muj X-,qtKLl[)ckdmd+tD8EqB<[:8WQ,v)-t[2 aA&q1%]x!P:GZUv1/dq/TKVNGH16L&Y| `"~'i8U%le Ck(OW[3" Re}*x7,7HAwZodQ8G-'~q#t(?b&b5$8Ur'z,L#%]GfK`E$Avcms"bOB@;,nv"# DB,aRLx]T} PPvp|sfC /Ck[ WxajJ;$0 | "ElF ;X'j|Q0,,l,f)GJ>H4kGC.66G4$dw5L%7(`: hR2 Rh#-a`q/J;V"BE+M`C<$M' Ra|XB_<`[~`){hB8{}`&FXIxY(0_vDQQa`qTJmqB<}~ XcODQ#sx(~O )^+f=5FEsE+oN |hCH[Nw'nSQpC7/Eo1ZFLjWWYmnmQU}Bxq1c-xwW5s)0rABvx-J0^j 5~us4K&5JmQ21RWvL umT*v[t& i';P sd:%:m!=Ati?n:u #M`{%#M`g]B=M=)mN,LM;ZS,hLv#B>^=:>Ve@^4)5U&Hs |0&/E-9si|$c;;oZb0aQ 7IR51gwOE$=IrQf`r7,=njS-RH5P&k!tZV!0!S ),R|++wS))q2;(B5t>rfwV<*As@ CU3;+MUo=uLxe|5%MaXO~ VyaKN=!f }_bb%!is &I &Z<)nRpJ7 Xul+]nQTB(lyZ5nQFtYNwMGos-@b%HOM:s*Es/)E`=/ENUL<8N ;E:>}JRo{m7MKc'`|wH :vM_cw1sg3}c3_Mug^k"Wi05}=k0"(oDF9ADk55id_xr[w@IN3S `N-:2t6Nt9q'ML}&51}8upYZ8S]@%'USkpte(}}rp$fZ[ff=OaOVQ/B'I`V6Th&?}mKv>J9 ,t"3|bJ4Qn={~mKe?R p?2}`LZR^5hy+Xl2DcZ!ycy65n>h1HA}RkNw[b6nw?oQo.ywzv^|OO%7] KHuQl)&;AvnM3AVohaBi$g5s*gn7_:< aqC3gG-ARZsq&Z+4~pC'Zb=)=6gc=]GM|{ +&{3(>Bss*mtJ$~KYZn?9%]e%;Q{Z-c4ot@$[k9qmxQq} aZzn1=yfe(/ k|^5{3dTS?h:QE%8 ;0I'$)FyzG/eavWavj]KT)h< ^}Yqk]&!7D"?TZ%{Na' W'T]G_gcX|gz&sSxg_hkbgkOg9]Gom/& kVP=UZ9+;}dIhyl@'7Ys)+(nF'x=uikNu(HE(cm~I % pWa1Q!ZM?_w|#V^UV.K0i~ @nUK!^Qudw(xtW`UhUWnC ,m 4$a vK'('nbJ#KZ;5{ &Y,ajUO'^(zJ5zK9RH"UKV.dHqV 3#teDt)iUQ{' w,ngN^Rto:o2_^[VCLOsZn,UQejnvNjDAnl)!^xB*cP9nJ:*nY@ u4496N|;PvtZH3.,Ne8mS 8kAbLHyn!~qY ar*Xf[PHA_*xg:?4_+qan1L3?0^&$)AA ^SrUPA=D(cv6~ku[9 K m`Nhpc +1p0M~u7c:.fbunREtLci,[Fkmd*rTSuN@|5X^o@6]C&(?F<*~x2~Gc9?yi]{/*ung*([8Kwe~z?[.3IA6FNll:_@$as_$.@ {vKYrxX(Qzuju gJ>]Op j~h 8CK|@yfk 2s[s0Ko*i+dK7H)F0"X16m0xg+MFYs^81_s]U'qnSz|Qn S=7qWTwxQzMaFN@kwEqz&c$/DsVHho*> h [!6&bg8[dI@dZ$/Mjo(SW_Jji@LvX[[L9g&wW )|'b.]jO0EVqw/WB1X~I1L|3&(}Dc?Mw_psOu4 OV_|?d'Zrd"b><~t}p~T]V5?)Q?1fn6!sy*LoJ GoQa1o_yuk_.{sL}3)N&F|2-=J|)N5PLNM_y 8Rs,,}w6] z*NjRL4b5*$glsIT#N[ AFb)]1RGb1slmv#9q:/^|fcg4.[`@Yw6)wN*CsC_HghAEx|F;*Fh#uo9RXGgyV>.Bwr @J)/ Hs ^1 :b|EQ0ka3j%fv~j'[jw|Y) 0-NHJd1/b]2AFMHxTO%W4Wr5;FeO7+=uw^$5U1Fx9~61=>C@lRX~g&:" Xp,Bz|@KedD^p4|B=_+_ =E9.Y{a'X>!ah[h BIBUf}'-xK8Mr#$.{WL7G:Jh@.qy@h@i8BJa|T%bgH!zs^cDtTTiKYbTEc-d+o6|HV;R?]W^`9y /D3c_D:ch-m=FP-54?b |[xdac;'d6[Bg+!ED&5HpVgZb]k(~s`-g>ik3c<>3?vNrP/]U@PVRK?|j;UBTQVUj+ *u4)W-:=DZ?; Ca[n5DVyYY`o6 '3a]wk^r]HOiDyn5ir>/s; [@,!lm7S#zn>oWL/(H0gLlp|VtzQzWxsp::R9u@D/8Q)>t[>vaA D 1aho]kh8y@J@S`,.+jiT>)Y0_&I* ~o _W(K0'7LcBh4?.4fAM%6EdA`F[1$fu~~}u.XS$69I1^b+/g$^h _2p'Lo8;!T7o[e$7FC1: bK=b5EF]+P4:qNgTbz@Jq7s#~g!J@}iT,/e|U.Rh C;G>THH&ANQnBSGxq #b#`JI5~b a-!^=!;~Hd}v~qQiT=~X@N/EC/%fnAZS~NK<xVi5]94]rRFShJ]33w2Ot2a J$xI6|ou%*sYsosMscbz']*TpI)+Ym7ik(<{@},UGg/c915O8;p?7D(_yq9{"W!&G(!?3:7D|m<:R?|a1OEUI > 1E*}e[8d3oF+aMAWpem,F:cgaM[X&TjxHBCQ@(<+fu%.(BEQ]}k-7`nyR&f`cBcSdl2qF{pJ.qVEA'")[&Ur,78?O(>kb=, 8BS]?MgKQ@E*/XtWkr:}ue/zK_r>+T<4CfS C/sbbsz?$skaHVz{vh[vRII|Cx$E:Zq?r[eBw@e6s!"P}K5yOIhfwTfK/E@rw"3cG;$YWchti5|"l''ckdzH;5t?ROnv=OGkK6O]m^E&K|gWEuo^9;2Az}!ep["19:_.-uiC^r*^+'dLJul {jeE)NsVEM_z:@ybEu,0F#LD8XD(z_h{ ZjhTc$bH/NCp)JzXz4u(A1^ /HN:(X<,L/0@BW+:nw

$>F/dV~xS |#?[;7P &,mMP7ZUcR N@r -BWjW.l$aWP7e(_sh2Y3K|@ @qX!@.#_qiIUhqGW*+w( 1/MBEH=sg?Gy 8p}#j4GF?{_64[W`'/;,!m@!q4U' $!Y}=<^w2SIs`4^efH5*V1Ss{a/[LtyY"'"Wd|eO8]m6BGn-,sf'$0~oy]VH5"h`sg}JmTEQk(S.n 9qyha/<[XB)#%$Y>]BBuzSM_>r>(R;<*{Th>_j:>3J.,z:NzD uhd?,#ojxbp2b-} i|H=sXn D}>Iiaz5qXG?ND)C}y? D*7-CK" b:[k6c1)|^O.(&{czpZBeS=o27P7sH!xs`jz3'Dtm#Q*AH[|uqjpsTN&Skui lK9y?>aP>gI(i>H_} %^!]yeC'*/QEu/9]~5o-K-Nq3I@5q%4)(> E+r/T _ 3*p 9["/Neg6Q6YG.>PBUqoM)a[tCp%ot;u@-ro-5?Z6-fs[.z[Z*R4z9edKx~.K?78~drK<_T,-Y]*9YMKiKil?K%K%oW n{4q?n0}| XCYW4wN/lquCPX*RFVvvgZMF? x*U Z+~>uS83=:;|yF,8CMQ2/8ub%vS%#zbe+.{h8*h. i]rMlSCx`N8,l4vt$7F',;6Xf9=X(hy$~{A"AF%HdUF!z*PuTi_OcMyDXaOp^U{?{d2g| &,cPm^ZbQ4#bo'X'/B[FXrmx2V6?pDtg[Z$55Yy{x_+ v>7 YpV9 Np[6K' ;GcF ot'VG.H7&#[x 5p]#QrJR(gSjPwpQu$TtQ|`WGATRaNo#X#Cda#?/6'Z!jV _?7#" ` `=p%Sd"l#*jp? '"/r!<8d5VXbPW-&@iM6B6WQrz9+Y,Hr''%-lk2)NS>B<{YojW/!]%RWk*MI[K ":"' G` =M^XUy[+(FI/B~&op!73*9%ux:%^C/XbF|DR%&mR'172Q8u`_&jbzFW6/93g[s6Wu:vlq8O,Jeflpz*W]UD{HDP(v['%w(%|&.+:%{f; !4pbu>,hu%2z2~P>1M'B!wz*snR&_:NL>x/ms;n8/j=.[ZdKm0.eE5KJ]$ASIP";??uq?>4CK}4+&Rf5p1Y5mJshW6{O'{.s hGf+jEzUe3&+FY KK`v{>_&R}^~E`u4TFY]m$iY}Kn!WDL}2yJD*mT]"V{ipF335;9{%[/Kaz?a'oRXRXVX_K4&K%Ifnsw`gmQ9FE.=O-;h>%6-6d*IZ;R5%>#tbyhH^^Z!kE@/0,"SUoh%#O 0tg$n8=i+0Pk.^OKxv[Z)BAX4rqVE#{jG8983sVKe^Rz- p|u]pcSx9M6;z w5~W}Q7]!MR<<@XBVOF-K128(BYFL:qo6j/ov84)t *g?ueu7w#Y:+t0yk=+$kVrno?x9t:q1bc@pE'b&.:@+B@!O0]Q5$@dMe7%.!,b$#o%x";ZI rd|:C.8jRZ" 8q4NU"[]M9G!i) -wn1m=TW|3t `zpY$ poht:"FhbgcM< ?/hh#)x3Oe?a/Q3a&PgNUPWBP/-oMl..~A8Fns(+@# yu"fb>gCtF%u:S!APJLA02Dp[LKU2*!{gxE :V|z@x#YgD(g9JH3U`(U-0* d Rt.6#UpQ E`FHO9_3/%C V1TDP.N;b1q.Pv+]apy0t| CHbE'f'Rv]yR;c.&?Vj4[ F/PwU%;`W>N:'G"2hYqDxPlCx_t?R-U(LI!%3=_V-l>#XDYl ov8pHl#b"q$DxUewdd"a$L$^s)=<]u2' EwwRPXx){ q1bF:DvC RA@lOW 3-B! yL2 lNPjP)"U=$BQdvTILlA+xU&j|mK/J_dMr#qzhik;)@D3EgFrYC- ya{JKy2^@F&xgq[~,iT%(+#iv7Aj4)Np%*/0Z{N4U8FpX&["2k/Y`2C#VOQjoe NA$X%Fb'@PnOD-QHe"OYOhFhMH$@t`F.* ig@+yG4 zbl,z^ox;@Tj@$lpYBv-8mD'?aFG^'H7WM&H}vV9YQ4p"@':|R@hEACqq V}Wq0]Vl|K27>/v`514fmsEI:H.63[6*IEtJL0"43fh @i Bu~(B7i-0['5ET0p$`6-CWZi0rW)y 80sv? tK2vb>;[`(<0co5*s&qSm&nHFzh;;2?_yfzCVGt:q)l8q'`oWRO-pXD^G-PBOnN#t&_c&Yg(,|WM<[2NB*i,8$rh6j`x}"N+lf2%)Vg aj9&Xr[|}`t)f6b.|-Z~9w~z7}_ps-Iq/n[oz 5[Fm[25LYVEK> u=tp??P~9yr0!>~ )P ^>)dNc;F-bMe;M!ZY}s77'tL}_fi-EL$5qntDcPmnrz8!3[GzaGOg<*(4HMc:jGn+@lG]4j^w1.Wtf>[im!`Io3]zhEjzh3>ZG7rJs2~nrZ5hUu6cQs9VilU Mcns*5:+k/9VT^bVPX UwU}!QQ'pRQ^Z`|0/'#{A's p^],LY*vb38"o[g[M4D&;_x{W*,]cCd8|ObLZ{Ne!4TLMn 1O`cWPe|VL xNHIDL)TW7Gej2rr93 1[->3cu=''=(m]fa];Y2e}%XfM wQ N6<)1qU5w3wN4 xn_3q)M&>o!vE$V(-pA:0 *GlBG;BgZ.(xx)+WE#5i3d*Tmgr.;n5 h,kelpy++>CEV0>w9B#Z$'PS8tr_Xp6!9IK]s-/W2r 'JfVo^5NQm r2WK=vAfy&?7^Wo-IIEl5F5V2xl^2Mv~6P^8v9~EEm)/??[ 'k;lv|YA:5p g5//:_qeD?_/[={>97Rw7'a9t2pet:;Cw+>!T{-H<5@Gi`7 &-o/^hjm/Rgj&/PG}]Tnl/hXt|?g!%V&sH=yv57B5P|EOz3Fp*V`?aOzTnwlq 5P!#^cffp+{8Cg1 qbIv7.1:4b_/J$@[^[TF-K8}8rAu(CD)0{o#[[&s4 s;~n.ad,XqbMdx]63IB/GLn e[~X :L5xA^,)VO`n^O]Fat9Z uD6 G|DyPJg//er*I:_}" lw_Cp?t8Y3)Y|sr,=_DEf([txR=&vxqnH:|'v8=v; LeD]F}f~9Jb>*f5Kd8TSKGy mzKk2@3$,@gi%taMGv&~B_z*ViSy|5g>[ZVs*8G 7474]F+&d3tl?2icA9yeSPmepf7"g'vl/9:7Uy9:9 9V"loG^{RpzF =fA3#;I?o~^E5$v[K~w83m?5N%X2F5/gdVtugMivwB1N'36/gpX`KDU. P 7B$2pj[} @M>MWrBkTj`,lpR ;:1CI{a&d$kB,kI -af YB3_uQWuAK*R[6amj%UI 8#{'PAr!u0IeW L-bppU>kq gTNj|iXjiQyS-Zftrz&m};Xphht q2;8uYF6&q3_LC,q[O^lUKleS{c % *cQin+l.!gT+N"*sm =M.fSFW3mFvVj3%SP-a:Xc5$y}j3lOP/yp:l8u6N^a'%,2cjB~j;q336=}gi*DJkNr<~%#]axT2Qi0epP{* >t$c_]jOrd?gqa~R.Vu"M=Io/ ?3zzE^;Cd^yTBGoCF"J:C"JNHD9$OpD<-[BRl8WI trvX& &UY!yB`xLI &m#9L.wx mz & ,OnPjK!`";]9Z=Z|lZGKz)'qN5/&Tm>v Cmn4ujs9kjsjf 6H:Crx8L. :";@q*854i7[8-DOq"H(2 *2 ?u0 4{c ,pQ2W.".%X76=NAe7]'WB.DfG(VUe"# _h&F}Ur-"GglLG &Z11-/SP[t"_ [edkp>QqoysB)Zz$DQZ]<6OZ8P2mFl^)lx!)AoACD]N%NX`4i:C-g[#Sw^L=Xr$y(^!X&2Z+U4%<8 !`kB2>eTLKbzR Nv1WGKK8tI*,DR*RwJhCb H8c.U~(bS"`0E/49k=C#IMy]3aW1]c.r|K<>S0VHHf (n.P{=>>f(OFJ`Co%3X{k'go(`Z4k|))%( Tg8ppqkH.O(*Y"k4*F*."KU~>1vJ#3n)zp8 YoI-AFHM2ldmuk9jd%UCyGN YP0tm0@`V@G|(A@ (|P6Sk7B!$ZqHMSSq:T,`7(L5* 9$DRR6?:z9iG%.!WmmAYJ;n%(3<(j{/=KFB}v3~/2>Y8U&s1viMP'.'XeHD|-XbsEA[2j>, 6"Pbi@8.5iA|PW"!7 Ij[[~6RCSOe'a|tL%0(-9f)DJ5gs]'xYS+I xZ##:,]3 Jg'Eq8hb<0JLK GJ!}{*S_7 NziX0!~R O=NcfJ;Bn4!z(!>]s!t%8um f53a`sw0P77H]>Q5qI o&#c F&|MO_/AUMUXz C>X=SQRv3F?HyY+^ep7,Z)!PqnmX'H&P{4J'?q1SSB%f>76E';>(No_yiDNqIg.pELM.Be"{-~7?>hffgadOJoPW*3|+k(R+u6 jl+27GMkmn/i)<:ed ku$s1rDW:hPe_OG=yBz1_zY~r[i2(~7w:$TX^nex*O`@*4-bL;#r&6V80VV9,'OT{-13 1[rNMCN5&hSkT9>Ss:<:/>

See original here:
WikiLeaks Reveals How the CIA Could Hack Your Router - WIRED

Step into Julian Assange’s office — and into his head? – CNET

I'm sitting at Julian Assange's desk, surrounded by WikiLeaks papers and blinking servers. Assange's black leather shoes rest on the floor. There's a glass of whiskey nearby and snacks scattered across the table.

The only thing missing is the WikiLeaks founder himself.

WikiLeaks founder Julian Assange has been hidden away in the Ecuadorian Embassy in London since June 2012.

On June 19, it will be five years since Assange placed himself under self-imposed house arrest in the Ecuadorian Embassy in London. Sitting in his office, I want to know what it's like being confined the way he is. And I want to know what it means for someone living under the strain of isolation to hold such influence over a world spinning on outside his window.

The thing is, I'm not in Assange's actual office. I'm in rainy Liverpool, England, some 200 miles from London where Assange is famously holed up. Here, at theFACT art centre, two artists have erected what they say is a perfect scale re-creation of the tiny room where the WikiLeaks founder has lived, worked and conspired to shape world events since 2012.

Seeing Assange hiding out in the embassy, artists Carmen Weisskopf and Domagoj Smoljo, collectively known as Mediengruppe Bitnik, decided to slip him a message. In January 2013 they sent a parcel to the embassy containing a hidden camera, which snapped pictures of its journey and automatically posted them to Twitter. When Assange opened the package, he obligingly posed for the camera.

Contact established, the artists visited the embassy and met with Assange throughout 2013. They weren't allowed to photograph anything, but they claim to have meticulously recorded and reconstructed every detail of Assange's 43-square-foot sanctuary. Exhibited in Liverpool earlier this year, where visitors could explore the fake office for free, their re-creation will next be displayed atEcole Polytechnique Federale de Lausannein Switzerland.

I went to Liverpool to get a better sense of a man some call a champion of free speech and transparency, and others denounce as a renegade -- or even a puppet of Russia -- who enables traitors and spies to serve his own political agenda.

Assange entered the Ecuadorian embassy, a modest red brick building tucked away behind posh department store Harrods, in June 2012. The Australia-born WikiLeaks founder claimed diplomatic asylum to avoid an international arrest warrant issued in Sweden two years earlier over alleged sexual offenses.

He refused to submit to questioning about the allegations, saying that if he was extradited to Sweden he might subsequently be turned over to the United States, where he faces the more daunting prospect of prosecution for publishing classified documents and even espionage, charges that could lead to decades in prison.

A police officer stands outside the Ecuadorian Embassy in London, where WikiLeaks founder Julian Assange has lived for almost five years. The embassy takes up just the ground floor and has no outdoor space.

The 45-year-old computer programmer has remained ever since in this strange sanctum somewhere between the White House and the Kremlin, cut off from his children and the wider world. During his self-imposed exile, Wikileaks has revealed a US intelligence agency wiretapped German leader Angela Merkel, published thousands of behind-the-scenes emails from Hillary Clinton's 2016 presidential election campaignand revealed CIA secrets in the recent Vault 7 leak.

Then last month, something huge happened: Swedish prosecutors dropped the sexual assault investigation that prompted Assange's flight from authorities. Yet he remains in his bolthole. If he steps outside he'll be collared by law enforcement on a lesser charge of jumping bail. British police officers have stood watch outside his doorat a cost to UK taxpayers estimated at 13 million between 2012 and 2015 alone ($16.8 million or AU$22.3 million).

If he's nicked by British bobbies, extradition to the US becomes a real possibility. So paradoxically, now that the original charges have been dropped, Assange's position is even more uncertain. His life in limbo continues.

I didn't know what to expect when I walked into Julian Assange's office.

Broadcasts from the embassy, as well as photos, YouTube videos and even aTV series, offer a look over his shoulder and a rough idea of what his inner sanctum looks like. But now, standing in this replica, it becomes real. The Ecuadorian Embassy takes up just about 2,153 square feet on one floor, with no outdoor space and no direct sunlight.

I trail my finger over the jumble of papers stacked on the table.

The first thing that strikes me is just how unstriking the office is. A desk juts out from the wall, strewn with snacks and cables and a venerable silver Apple laptop. A round table crowds the middle of the room, with a ThinkPad laptop, Olympus dictaphone and various papers on it. Shelves filled with books, folders and bits of stationery line the cream-colored walls. It's just an office. Ordinary, mundane.

It's exactly like the type of space many of us are confined in for eight hours a day -- except we get to walk out every night.

25

Inside Julian Assange's office

Entering the replica, you know you're stepping inside a copy, a portrait, an artist's impression. The question is -- do these details accurately represent Assange's life?

The artists say they re-created the office from memory. I tried to ask Assange himself how accurate it is, but whoever manages the WikiLeaks Twitter account replied to my direct messages only to ask for more information about the exhibition and then stopped answering.

So I asked exhibition curator David Garcia. According to Garcia, in a "post-truth" world offake news, artistic hoaxes and creative interpretations of reality turn the tables on those who lie to achieve power. "The artist can be a researcher," he says, "using the tools and traditions of art not only to produce beautiful art but also to investigate, to pull back the curtain and expose how power operates."

Sitting at a desk that looks like Assange's, I decide to trust the artists' details to project myself into Assange's room, and by extension, into his head.

A jumble of virtually prehistoric Nokia and Samsung phones are piled on the mantlepiece, presumably burners. A cinema ticket is a reminder of the places Assange can't go. Two photos are stuck in the glass door of a wooden cabinet: a picture of Assange and another of Pirate Bay co-founderGottfrid Svartholm, who has been in actual prison in Sweden and Denmark on hacking and fraud charges. In the photos, each holds handwritten signs calling for the other's freedom.

A Vivienne Westwood bag perches atop the bookshelf. Perhaps it was left by the outspoken fashion designer herself -- she's just one of the famous people who've visited the embassy. Yoko Ono, John Cusack, Pamela Anderson, Nigel Farage andLady Gaga have all hung out with Assange there. He's certainly not without human interaction.

Actor Pamela Anderson on one of her trips to bring lunch to Julian Assange at the Ecuadorian Embassy, clutching a book by another of his celebrity visitors, Vivienne Westwood.

Looking up, I spy an Anonymous mask eyeing the room from within a cabinet. And half-hidden on the floor behind the desk, resting incongruously, a gas mask and oxygen tank. Assange isn't going scuba diving any time soon: according to the artists, the embassy supplied him a mask in case of a gas or bomb attack.

I take a closer look and see a laptop labeled "Twitter." Printed emails from the US State Department. A Freedom of Information Act request. Folders labeled "Intelligence Iraq," "Scientology," "Snowden," "Sweden."

From these details, it's tempting to imagine how Assange sees himself. Prominently displayed on the mantlepiece are a DVD of the 1969 satire "Putney Swope" and a copy of Neal Stevenson's "Zodiac," both stories of lone heroes standing up to corrupt corporations. Among the authors on the bookshelves are assorted iconoclasts and literary bad boys: James Joyce, Will Self, Irvine Welsh, Slavoj iek, Quentin Tarantino.

There are several Douglas Adams books as well -- there's certainly something darkly absurd about Assange's situation.

Other items have delicious double meaning: a Kubrick DVD boxset includes "The Shining," in which Jack Nicholson plays a man slowly going mad in an isolated hotel. And among the only women on the bookshelf is Virginia Woolf with "A Room of One's Own."

I've been in this ersatz office for a couple of hours, poking about, taking pictures and notes, and I'm growing bored and fidgety. I try to picture a day in this room turning into hundreds upon hundreds of days.

Confinement took its toll on Assange almost from the start. A medical and psychological evaluation released by Wikileaks claims he suffers from dental problems and chronic pain in his right shoulder, and frequently loses track of time as his sleep is disrupted.

In September 2012, just three months after entering the embassy, Assangescuffled with an embassy security guard. A few months later, he apparently trashed his room. In response, embassy staff suggested controlling his access to alcohol. Last year, another contretemps saw embassy staff cut off Assange's internet access.

Psychologist Lesley Perman-Kerr, an associate fellow and chartered member of the British Psychological Society, points out Assange is technically free both to leave and to live -- even while confined, he can work and interact with people.

But when isolation stretches into years, Perman-Kerr suggests depression can set in, leading to what she calls "a mental shutdown where the person in effect gives up."

Assange hasn't given up interacting with the outside world, even if it is through the computer on his desk. But in this case, Perman-Kerr calls technology that enables communication "a double-edged sword," functioning as both lifeline and tormenter that starkly underscores a world in which Assange isn't fully participating.

"It's like seeing someone prepare a mouthwatering meal but you are unable to smell or taste it," she says.

Parman-Kerr identifies the isolation and disconnection people often feel the longer they're cut off from the world. As they experience growing physical and mental stress, their actions could "become more bizarre and desperate," she says.

Sitting in the fake office, I hear music drifting through the window from the FACT lobby outside. "Thorn In My Side" by the Eurythmics is playing. And then, with perfect comic timing, the twang of "Freebird" by Lynyrd Skynyrd. I decide to take that as a sign.

I walk out the door and feel the rain on my face.

Batteries Not Included: The CNET team shares experiences that remind us why tech stuff is cool.

CNET Magazine: Check out a sampling of the stories you'll find in CNET's newsstand edition.

See more here:
Step into Julian Assange's office -- and into his head? - CNET

WikiLeaks founder Julian Assange: We have more material …

WikiLeaks founder Julian Assange wont say whether Russia had any involvement in the emails his organization released on the eve of last weeks Democratic National Convention. But he says there are more leaks coming.

We have more material related to the Hillary Clinton campaign, Assange told CNNs Anderson Cooper on Friday night from the Ecuadorian Embassy in London, where the 45-year-old Australia native has been living in exile for several years. That is correct to say that.

Assange admitted that last weekends release of the DNC emails which suggested that members of the partys national committee were plotting against Bernie Sanders in an effort to boost Hillary Clinton during their hard-fought primary was timed to coincide with the Monday start of the Democratic convention in Philadelphia.

Thats when we knew there would be maximum interest by readers, but also we have a responsibility to, Assange said. If we published after [the convention], you can just imagine how outraged the Democratic voting population would have been.

Bu he is refusing to disclose where he got those emails, which U.S. officials believe were obtained in a hack of the DNCs servers by Russian intelligence. The Republican nominee, Donald Trump, has staked out a relatively soft position against the Kremlin.

The difficulty that WikiLeaks has, of course, is that we cant go around speculating on who our sources are. That would be irresponsible, Assange said in an interview that aired Sunday on NBCs Meet the Press. I do think its an interesting question, of course, as to who our sources are. But as a source protection organization that many sources from across the world of many different types rely on to protect their identity, and their rights, to communicate the truth to the public. And thats what were talking about here, communicating the truth.

What I can say categorically is that we have published proof that the election campaign of Bernie Sanders was sabotaged in a corrupt manner by [former DNC Chair] Debbie Wasserman Schultz and others within the DNC, he added. We can say that categorically. We have published proof. But as for anything else, we can only speculate.

In comments that were widely reported in the wake of the leaked DNC emails, Assange told ITV last month that information WikiLeaks had accumulated on Clinton could proceed to an indictment. But those comments appear to refer to material that was published last week and not the material that WikiLeaks has yet to leak.

Assange said he has no interest in tipping the U.S. election in favor of any candidate, including Trump. But its clear Assange did not appreciate the Clinton campaigns response to the publication of the DNC emails.

In order to divert attention from proof that we published that the Sanders campaign was subverted within the DNC, Assange said on NBC, the Clinton campaign tries to take attention away from a very serious domestic allegation about election interference and try and bring in foreign policy.

And in the same interview with ITV, Assange criticized Clintons foreign policy and what he viewed as her attacks on the press.

We do see her as a bit of a problem for freedom of the press more generally, Assange said. She has a long history of being a liberal war hawk, and we presume she is going to proceed.

Original post:
WikiLeaks founder Julian Assange: We have more material ...