Feeds

Wikileaks founder blasts reopening of rape probe

New 'unrelated' case filed in US

Maximizing your infrastructure through virtualization

Wikileaks founder Julian Assange has blasted Sweden's investigation into allegations against him for sexual misconduct after prosecutors reopened a probe into charges he raped a woman last month.

"It appears to be highly irregular and some kind of legal circus," Assange told the TV service of newspaper Expressen on Thursday. “Today I also had a case filed against me in the United States on a wholly unrelated manner,” he added without elaborating.

The charges come as Assange is applying for a permit to live and work in Sweden, a legal haven for journalists and whistleblowers, Assange said. The investigations may “prevent that application going ahead,” he said, adding “we will find a replacement if it comes to that."

Claims that Assange had non-consensual sex with two women in Sweden first surfaced last month, following demands by the Pentagon that Wikileaks return some 92,000 mostly classified military documents concerning the US war in Afghanistan. The whistle-blowing website has already published about 77,000 records, an action that prompted strong condemnation from US military officials. Some human rights organizations have also claimed the move put Afghan civilians at risk.

Assange has said the remaining 15,000 documents will be posted in the coming weeks, once names and other sensitive details are redacted. Pentagon officials have warned they may spill even “more explosive” secrets than the first batch.

Assange on Thursday suggested the controversy generated by Wikileaks may be stoking the investigations.

“As I have said before, there was clearly a smear campaign, and who was behind this, we do not know,” he said. “Now, whether that turns out to be a smear campaign done by a couple of people for personal motives or ideological motives, or that is larger and involves geopolitical concerns, or whether it is a mixture of all those, we do not know.”

A senior Swedish prosecutor on Wednesday said the rape case was being reopened, a little more than a week after a it was first opened and then abruptly closed.

“There is reason to believe that a crime has been committed,” she said. A separate investigation into an allegation Assange molested another woman is being extended to include possible “sexual coercion and sexual molestation.”

More coverage from Reuters, The New York Times and The Wall Street Journal is here, here and here. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.