Edward Snowden Joins Twitter & Follows NSA

edward-snowden-joins-twitter-stays-classy-follows-the-nsa-1.jpeg

Now over a million followers. 

Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter.

His opening tweet was: "Can you hear me now?" In his profile, Edward Snowden says he "used to work for the government. Now I work for the public". He quickly gathered thousands of followers.

So far, Snowden, who is wanted in the US for leaking secrets, only follows one other Twitter user - the US National Security Agency (NSA).
He is believed to be living in Moscow where he is sheltering from US prosecutors.

In his second tweet - a reply to US astrophysicist Neil deGrasse Tyson - Mr Snowden joked: "Now we've got water on Mars! Do you think they check passports at the border? Asking for a friend."

And in another tweet he said: "Hero, traitor - I'm just a citizen with a voice." The @Snowden account was verified by Twitter and within nine hours of joining, Mr Snowden had accumulated more than 710,000 followers.

In June, former Olympian and reality TV star Caitlyn Jenner became the fastest person on Twitter to reach one million followers - in just over four hours.

Mr Snowden left the US in 2013 after leaking to the media details of extensive Internet and phone surveillance by US intelligence. His information made global headlines when the Guardian newspaper reported that the NSA was collecting the telephone records of tens of millions of Americans.

Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US. Although some consider him a traitor for his revelations, many others around the world say he is a champion of civil liberties.

In the US he faces charges that could put him in prison for up to 30 years.
Earlier this year, speaking via video-link to a Geneva audience, he said he would like to be granted asylum in Switzerland. He has previously worked in Geneva undercover for the CIA.

Regarding a possible return to the US, he told the audience that the authorities there had given him no assurances of a fair trial. "The only thing they've said at this point was that they would not execute me," he said. "That's not quite the same thing as agreeing to a fair and open trial."
BBC: http://bbc.in/1KQz49Z

 

« Social Media and the 'Information War’- Russia is Winning
Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.

Ory Corp

Ory Corp

Ory's IAM/CIAM solutions are designed to empower businesses with the tools they need to protect their users, services and things, and maintain compliance.