BREAKING: GOP Rep. Meets With WikiLeaks’ Julian Assange to Arrange Deal with US
Republican Congressman Dana Rohrabacher (R-CA) met with WikiLeaks founder Julian Assange on Wednesday at the Ecuadorian embassy in London to discuss a possible deal with the United States.
Dailly Caller reports:
Charles Johnson, a conservative journalist, told TheDC that he arranged the meeting for Assange because the WikiLeaks chief wants to strike a deal with the U.S. so he can stop living in asylum.
Rohrabacher’s spokesman Ken Grubbs told TheDC, “I can confirm that the meeting happened” and said that Johnson was in the meeting.
Johnson said that he arranged for the meeting to happen and that Rohrabacher would be the envoy in charge of bringing back a deal to the Trump White House. Assange has taken asylum in the Ecuadorian embassy since August 2012 after facing sexual assault charges in Sweden.
CNN reported in April that the Justice Department wants to press charges against Assange for helping Edward Snowden, a former NSA analyst, release thousands of classified documents.
Recently, WikiLeaks “downloaded” once again on the CIA. This time, the ‘Leak Machine,’ that is Julian Assange and co., have released documents detailing how America’s top spies use a tool called ‘Dumbo’ to take over webcams.
— WikiLeaks (@wikileaks) August 3, 2017
Sputnik News reports:
“Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations,” WikiLeaks said in a press release.
The tool allows for the identification, control and manipulation of the monitoring and detection systems, like webcams and microphones, on a target computer running the Microsoft Windows operating system. It requires a direct access to the computer as it is run from an USB stick.
“All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation,” the press release specified.