Edward Snowden Joins Twitter & Follows NSA

edward-snowden-joins-twitter-stays-classy-follows-the-nsa-1.jpeg

Now over a million followers. 

Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter.

His opening tweet was: "Can you hear me now?" In his profile, Edward Snowden says he "used to work for the government. Now I work for the public". He quickly gathered thousands of followers.

So far, Snowden, who is wanted in the US for leaking secrets, only follows one other Twitter user - the US National Security Agency (NSA).
He is believed to be living in Moscow where he is sheltering from US prosecutors.

In his second tweet - a reply to US astrophysicist Neil deGrasse Tyson - Mr Snowden joked: "Now we've got water on Mars! Do you think they check passports at the border? Asking for a friend."

And in another tweet he said: "Hero, traitor - I'm just a citizen with a voice." The @Snowden account was verified by Twitter and within nine hours of joining, Mr Snowden had accumulated more than 710,000 followers.

In June, former Olympian and reality TV star Caitlyn Jenner became the fastest person on Twitter to reach one million followers - in just over four hours.

Mr Snowden left the US in 2013 after leaking to the media details of extensive Internet and phone surveillance by US intelligence. His information made global headlines when the Guardian newspaper reported that the NSA was collecting the telephone records of tens of millions of Americans.

Mr Snowden is believed to have downloaded 1.7 million secret documents before he left the US. Although some consider him a traitor for his revelations, many others around the world say he is a champion of civil liberties.

In the US he faces charges that could put him in prison for up to 30 years.
Earlier this year, speaking via video-link to a Geneva audience, he said he would like to be granted asylum in Switzerland. He has previously worked in Geneva undercover for the CIA.

Regarding a possible return to the US, he told the audience that the authorities there had given him no assurances of a fair trial. "The only thing they've said at this point was that they would not execute me," he said. "That's not quite the same thing as agreeing to a fair and open trial."
BBC: http://bbc.in/1KQz49Z

 

« Social Media and the 'Information War’- Russia is Winning
Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Scamnetic

Scamnetic

Scamnetic offer an everyday application that helps consumers detect every type of scam in real time – removing human error from the equation.