Snowden Explains Why The CIA Is On Instagram

The Central Intelligence Agency is using social media games beyond the confines of its already very active Twitter and Facebook accounts. Besides just revealing one of its former deputy directors was an extra in the latest episode of Game of Thrones, CIA director Gina Haspel recently announced that the CIA would be heading to Instagram in a growing attempt by the agency to mainstream its image.

From safety in Moscow, the whistleblower Edward Snowden, once a CIA and National Security Agency contractor, says that’s just the latest attempt by American intelligence to fix its image. 

In 2013 Snowden leaked a bulk of damning top-secret documents revealing a series of mass surveillance abuses that the CIA and the US Government claimed it was not doing.

“What's happened here is the intelligence agencies have drawn the wrong conclusions, at least from the public's perspective, from the backlash of 2013,” he said in the latest episode of Motherboard podcast CYBER. Snowden thinks while the revelations of bulk data collection turned public sentiment against American intelligence activities, the agencies themselves took away the wrong lesson. 

“And in the wake of doing that, right, this sort of damage control, they went: ‘Maybe the real story of 2013 isn't that we got caught breaking the law,” he said. 

“Instead, what we're gonna do is we're going to try to change the laws and be more flexible, more accommodating, so we can do what we want. And at the same time, what we really have here is a PR issue.”

He said for those exact reasons, these once clandestine agencies (the NSA was once known colloquially as the “No-Such-Agency" turned to social media. 

“They get Twitter accounts. Instagram accounts with puppies and everything like that, because they want to be friendly. They want to be on your side,” he said.

Ironically, the NSA famously had trouble recruiting new operators after the Snowden leaks, with young hackers and computer programming majors turning away from the signals intelligence agency. But, if an Instagram account helps the CIA, maybe the NSA will also use one. 

Motherboard

You Might Also Read:

Widepsread Campaign Hacking Instagram Accounts:

 

 

« A Microphchip That Can Stop Cyber Attacks
Israel Responds To A Cyber Attack With Bombs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.