#PresidentialAlert: A US National Alert Test

Former National Security Agency contractor Edward Snowden sent an ominous warning Wednesday 3rd Oct after hundreds of millions of electronic devices all across the US received a test of a “presidential alert." In a tweet, Snowden said Americans should take heed of the rapid advance of technology and ask themselves a simple question. 

"All our lives dangle at the end of a wire. Ask yourself: who controls it? How else might it be used? #PresidentialAlert," he said. 

Smartphones began buzzing at 2:18 p.m. ET when a nationwide wireless emergency test, managed by Federal Emergency Management Agency, was sent out. 

"THIS IS A TEST of the National Wireless Emergency Alert System. No action is needed," said the message, under a banner that said "Presidential Alert." TVs and radio got a similar message soon after.

FEMA is required to run a cellphone notification test, used to warn of a myriad of public safety issues, every three years in accordance to a law passed in 2016. 

Despite it being dubbed a "Presidential Alert," President Trump, nor any president, can send out any message they please.

"Except to the extent necessary for testing the public alert and warning system, the public alert and warning system shall not be used to transmit a message that does not relate to a natural disaster, act of terrorism, or other man-made disaster or threat to public safety," says the Integrated Public Alert and Warning System Modernization Act of 2015 signed by former President Barack Obama. As a layer of security to prevent abuse, messages must be approved by multiple FEMA officials. 

Snowden, who was granted asylum in Russia back in 2013 after he leaked secret information from the National Security Agency's surveillance programs and has been there ever since, has routinely chimed in on Twitter with warnings about the government and technology. 

In March, Snowden dubbed Facebook a surveillance company rebranded as "social media" after it was discovered the social media giant suspended Cambridge Analytica, a data analytics firm which worked for President Trump’s campaign, accusing the firm on of not deleting data it had improperly harvested from Facebook users, which number in the tens of millions.

Washington Post

You Might Also Read: 

Snowden Describes Russian Government As 'corrupt':

 

 

« New Tools To Fight Fake News
Neither US Or UK  Investigated Chinese Spy Chips »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.