Edward Snowden Joins Twitter & Follows NSA

edward-snowden-joins-twitter-stays-classy-follows-the-nsa-1.jpeg

Now over a million followers. 

Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter.

His opening tweet was: "Can you hear me now?" In his profile, Edward Snowden says he "used to work for the government. Now I work for the public". He quickly gathered thousands of followers.

So far, Snowden, who is wanted in the US for leaking secrets, only follows one other Twitter user - the US National Security Agency (NSA).
He is believed to be living in Moscow where he is sheltering from US prosecutors.

In his second tweet - a reply to US astrophysicist Neil deGrasse Tyson - Mr Snowden joked: "Now we've got water on Mars! Do you think they check passports at the border? Asking for a friend."

And in another tweet he said: "Hero, traitor - I'm just a citizen with a voice." The @Snowden account was verified by Twitter and within nine hours of joining, Mr Snowden had accumulated more than 710,000 followers.

In June, former Olympian and reality TV star Caitlyn Jenner became the fastest person on Twitter to reach one million followers - in just over four hours.

Mr Snowden left the US in 2013 after leaking to the media details of extensive Internet and phone surveillance by US intelligence. His information made global headlines when the Guardian newspaper reported that the NSA was collecting the telephone records of tens of millions of Americans.

Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US. Although some consider him a traitor for his revelations, many others around the world say he is a champion of civil liberties.

In the US he faces charges that could put him in prison for up to 30 years.
Earlier this year, speaking via video-link to a Geneva audience, he said he would like to be granted asylum in Switzerland. He has previously worked in Geneva undercover for the CIA.

Regarding a possible return to the US, he told the audience that the authorities there had given him no assurances of a fair trial. "The only thing they've said at this point was that they would not execute me," he said. "That's not quite the same thing as agreeing to a fair and open trial."
BBC: http://bbc.in/1KQz49Z

 

« Social Media and the 'Information War’- Russia is Winning
Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.