Edward Snowden Joins Twitter & Follows NSA

edward-snowden-joins-twitter-stays-classy-follows-the-nsa-1.jpeg

Now over a million followers. 

Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter.

His opening tweet was: "Can you hear me now?" In his profile, Edward Snowden says he "used to work for the government. Now I work for the public". He quickly gathered thousands of followers.

So far, Snowden, who is wanted in the US for leaking secrets, only follows one other Twitter user - the US National Security Agency (NSA).
He is believed to be living in Moscow where he is sheltering from US prosecutors.

In his second tweet - a reply to US astrophysicist Neil deGrasse Tyson - Mr Snowden joked: "Now we've got water on Mars! Do you think they check passports at the border? Asking for a friend."

And in another tweet he said: "Hero, traitor - I'm just a citizen with a voice." The @Snowden account was verified by Twitter and within nine hours of joining, Mr Snowden had accumulated more than 710,000 followers.

In June, former Olympian and reality TV star Caitlyn Jenner became the fastest person on Twitter to reach one million followers - in just over four hours.

Mr Snowden left the US in 2013 after leaking to the media details of extensive Internet and phone surveillance by US intelligence. His information made global headlines when the Guardian newspaper reported that the NSA was collecting the telephone records of tens of millions of Americans.

Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US. Although some consider him a traitor for his revelations, many others around the world say he is a champion of civil liberties.

In the US he faces charges that could put him in prison for up to 30 years.
Earlier this year, speaking via video-link to a Geneva audience, he said he would like to be granted asylum in Switzerland. He has previously worked in Geneva undercover for the CIA.

Regarding a possible return to the US, he told the audience that the authorities there had given him no assurances of a fair trial. "The only thing they've said at this point was that they would not execute me," he said. "That's not quite the same thing as agreeing to a fair and open trial."
BBC: http://bbc.in/1KQz49Z

 

« Social Media and the 'Information War’- Russia is Winning
Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Inspired eLearning

Inspired eLearning

Inspired eLearning provide turn-key Security Awareness and Compliance training programs.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.