Snowden Explains Why The CIA Is On Instagram

The Central Intelligence Agency is using social media games beyond the confines of its already very active Twitter and Facebook accounts. Besides just revealing one of its former deputy directors was an extra in the latest episode of Game of Thrones, CIA director Gina Haspel recently announced that the CIA would be heading to Instagram in a growing attempt by the agency to mainstream its image.

From safety in Moscow, the whistleblower Edward Snowden, once a CIA and National Security Agency contractor, says that’s just the latest attempt by American intelligence to fix its image. 

In 2013 Snowden leaked a bulk of damning top-secret documents revealing a series of mass surveillance abuses that the CIA and the US Government claimed it was not doing.

“What's happened here is the intelligence agencies have drawn the wrong conclusions, at least from the public's perspective, from the backlash of 2013,” he said in the latest episode of Motherboard podcast CYBER. Snowden thinks while the revelations of bulk data collection turned public sentiment against American intelligence activities, the agencies themselves took away the wrong lesson. 

“And in the wake of doing that, right, this sort of damage control, they went: ‘Maybe the real story of 2013 isn't that we got caught breaking the law,” he said. 

“Instead, what we're gonna do is we're going to try to change the laws and be more flexible, more accommodating, so we can do what we want. And at the same time, what we really have here is a PR issue.”

He said for those exact reasons, these once clandestine agencies (the NSA was once known colloquially as the “No-Such-Agency" turned to social media. 

“They get Twitter accounts. Instagram accounts with puppies and everything like that, because they want to be friendly. They want to be on your side,” he said.

Ironically, the NSA famously had trouble recruiting new operators after the Snowden leaks, with young hackers and computer programming majors turning away from the signals intelligence agency. But, if an Instagram account helps the CIA, maybe the NSA will also use one. 

Motherboard

You Might Also Read:

Widepsread Campaign Hacking Instagram Accounts:

 

 

« A Microphchip That Can Stop Cyber Attacks
Israel Responds To A Cyber Attack With Bombs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.