Snowden Explains Why The CIA Is On Instagram

The Central Intelligence Agency is using social media games beyond the confines of its already very active Twitter and Facebook accounts. Besides just revealing one of its former deputy directors was an extra in the latest episode of Game of Thrones, CIA director Gina Haspel recently announced that the CIA would be heading to Instagram in a growing attempt by the agency to mainstream its image.

From safety in Moscow, the whistleblower Edward Snowden, once a CIA and National Security Agency contractor, says that’s just the latest attempt by American intelligence to fix its image. 

In 2013 Snowden leaked a bulk of damning top-secret documents revealing a series of mass surveillance abuses that the CIA and the US Government claimed it was not doing.

“What's happened here is the intelligence agencies have drawn the wrong conclusions, at least from the public's perspective, from the backlash of 2013,” he said in the latest episode of Motherboard podcast CYBER. Snowden thinks while the revelations of bulk data collection turned public sentiment against American intelligence activities, the agencies themselves took away the wrong lesson. 

“And in the wake of doing that, right, this sort of damage control, they went: ‘Maybe the real story of 2013 isn't that we got caught breaking the law,” he said. 

“Instead, what we're gonna do is we're going to try to change the laws and be more flexible, more accommodating, so we can do what we want. And at the same time, what we really have here is a PR issue.”

He said for those exact reasons, these once clandestine agencies (the NSA was once known colloquially as the “No-Such-Agency" turned to social media. 

“They get Twitter accounts. Instagram accounts with puppies and everything like that, because they want to be friendly. They want to be on your side,” he said.

Ironically, the NSA famously had trouble recruiting new operators after the Snowden leaks, with young hackers and computer programming majors turning away from the signals intelligence agency. But, if an Instagram account helps the CIA, maybe the NSA will also use one. 

Motherboard

You Might Also Read:

Widepsread Campaign Hacking Instagram Accounts:

 

 

« A Microphchip That Can Stop Cyber Attacks
Israel Responds To A Cyber Attack With Bombs »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

NeoGuardian

NeoGuardian

NeoGuardian offer robust solutions to protect your data and systems against cyber threats, with an innovative and fully business-focused approach.