WikiLeaks slams U.S. for pursuing Snowden
WikiLeaks has assisted NSA leaker in his request for political asylum in Ecuador
IDG News Service - U.S. officials should be condemned for "bullying" other nations in their attempts to get them to turn over Edward Snowden, the former U.S. National Security Agency contractor, who leaked classified information on massive surveillance programs there, WikiLeaks founder Julian Assange said Monday.
Officials with WikiLeaks, assisting Snowden in his request for political asylum in Ecuador, Iceland and other countries, said Snowden has a right under the United Nations' Refugee Convention to seek asylum and the U.N. agreement supersedes espionage charges Snowden faces in the U.S.
The refugee pact protects people "who are being persecuted for political opinion," said Michael Ratner, president emeritus of the Center for Constitutional Rights and an attorney for WikiLeaks. Whistleblowers exposing government corruption are included in those protections, said Ratner, who helped with Assange's application for asylum in Ecuador.
"It is counterproductive and unacceptable for the Obama administration to try and interfere with those rights," Assange said during a press briefing Monday. "It reflects poorly on the U.S. administration, and no self-respecting country would submit to such interference or such bullying by the U.S. in this matter."
Snowden is safe, healthy and in good spirits, Assange said. He declined to give Snowden's location. Snowden had been in Russia, en route to Ecuador, but has gone into hiding in a possible attempt to discourage the U.S. from seeking extradition.
Ecuador is considering Snowden's asylum request, Ricardo PatiA+-o Aroca, Ecuador's minister of foreign affairs, trade and integration, said Monday. WikiLeaks spokesman Kristinn Hrafnsson said Snowden has also applied for asylum in Iceland and other countries, but he declined to name the other countries.
Assange and Ratner slammed the Obama administration for pursuing charges against Snowden. Secretary of State John Kerry's description of Snowden as a traitor is inaccurate and contrary to U.S. law, Assange said.
"The Obama administration was not given a mandate by the people of the United States to hack and spy upon the entire world, to breach the U.S. Constitution and the laws of other nations in the manner that it has," Assange said. The U.S. attempts to extradite Snowden "further demonstrates the breakdown in the rule of law by the Obama administration."
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- Webinar: IBM IIM for Fraud, Abuse and Waste in Government View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You...
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.