Skip to content
  • Home Home Home, current page.
  • Moments Moments Moments, current page.

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
Snowden's profile
Edward Snowden
Edward Snowden
Edward Snowden
Verified account
@Snowden

Tweets

Edward SnowdenVerified account

@Snowden

I used to work for the government. Now I work for the public. President at @FreedomofPress.

freedom.press
Joined December 2014

Tweets

  • © 2018 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not working for you?

    Hover over the profile pic and click the Following button to unfollow any account.

    Say a lot with a little

    When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.

    Learn the latest

    Get instant insight into what people are talking about now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    Edward Snowden‏Verified account @Snowden 16 Aug 2016

    The hack of an NSA malware staging server is not unprecedented, but the publication of the take is. Here's what you need to know: (1/x)

    4:40 AM - 16 Aug 2016
    • 3,027 Retweets
    • 3,732 Likes
    • Stephanie Charles Douthat 🚧⛓ Ellie Kendal Sona Cronin Andrea Tate neha Timika Friend Анатоль Анатольев Billy Lee
    87 replies 3,027 retweets 3,732 likes
      1. New conversation
      2. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        1) NSA traces and targets malware C2 servers in a practice called Counter Computer Network Exploitation, or CCNE. So do our rivals.

        18 replies 1,198 retweets 1,376 likes
      3. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        2) NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. This is how we follow their operations.

        15 replies 1,155 retweets 1,312 likes
      4. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        3) This is how we steal their rivals' hacking tools and reverse-engineer them to create "fingerprints" to help us detect them in the future.

        9 replies 1,128 retweets 1,297 likes
      5. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        4) Here's where it gets interesting: the NSA is not made of magic. Our rivals do the same thing to us -- and occasionally succeed.

        20 replies 1,145 retweets 1,417 likes
      6. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        5) Knowing this, NSA's hackers (TAO) are told not to leave their hack tools ("binaries") on the server after an op. But people get lazy.

        29 replies 1,069 retweets 1,337 likes
      7. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        6) What's new? NSA malware staging servers getting hacked by a rival is not new. A rival publicly demonstrating they have done so is.

        23 replies 1,323 retweets 1,454 likes
      8. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        7) Why did they do it? No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack.

        17 replies 1,082 retweets 1,309 likes
      9. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        8) Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant:

        33 replies 1,044 retweets 1,203 likes
      10. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        9) This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server.

        23 replies 1,557 retweets 1,738 likes
      11. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        10) That could have significant foreign policy consequences. Particularly if any of those operations targeted US allies.

        17 replies 1,166 retweets 1,384 likes
      12. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        11) Particularly if any of those operations targeted elections.

        28 replies 1,122 retweets 1,461 likes
      13. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        12) Accordingly, this may be an effort to influence the calculus of decision-makers wondering how sharply to respond to the DNC hacks.

        23 replies 1,017 retweets 1,288 likes
      14. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        13) TL;DR: This leak looks like a somebody sending a message that an escalation in the attribution game could get messy fast.

        61 replies 1,699 retweets 2,080 likes
      15. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        Bonus: When I came forward, NSA would have migrated offensive operations to new servers as a precaution - it's cheap and easy. So? So...

        26 replies 898 retweets 1,279 likes
      16. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        The undetected hacker squatting on this NSA server lost access in June 2013. Rare public data point on the positive results of the leak.

        37 replies 1,142 retweets 1,834 likes
      17. Edward Snowden‏Verified account @Snowden 16 Aug 2016
        Replying to @Snowden

        You're welcome, @NSAGov. Lots of love.

        188 replies 2,216 retweets 5,851 likes
      18. 6 more replies
      1. Bad John Brown‏ @BadJohnBrown 16 Aug 2016
        Replying to @Snowden

        .@Snowden Thanks for the breakdown:pic.twitter.com/4B7ROY4rfj

        0 replies 24 retweets 32 likes
        Thanks. Twitter will use this to make your timeline better. Undo
        Undo
      1. New conversation
      2. lnOrOut‏ @Undetermined_US 16 Aug 2016
        Replying to @Snowden

        Not really seeing how revealing internal methods serves the US public interest here. Wish you would reconsider the appropriateness.

        2 replies 0 retweets 2 likes
      3. Jan Ciger‏ @janoc200 16 Aug 2016
        Replying to @Undetermined_US @Snowden

        Let's get real - he didn't reveal anything that wasn't known already or that is not obvious to security experts.

        3 replies 0 retweets 19 likes
      4. lnOrOut‏ @Undetermined_US 16 Aug 2016
        Replying to @janoc200 @Snowden

        That's your opinion.

        1 reply 0 retweets 1 like
      5. Jan Ciger‏ @janoc200 16 Aug 2016
        Replying to @Undetermined_US @Snowden

        Of course it is. Care to point out where it is actually incorrect?

        1 reply 0 retweets 17 likes
      6. lnOrOut‏ @Undetermined_US 16 Aug 2016
        Replying to @janoc200 @Snowden

        Why don't you cite previous public info of the methods Snowden attributed to the NSA, since you challenged me.

        3 replies 0 retweets 2 likes
      7. Jan Ciger‏ @janoc200 16 Aug 2016
        Replying to @Undetermined_US @Snowden

        2013 article on the TAO:http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html …

        1 reply 2 retweets 17 likes
      8. lnOrOut‏ @Undetermined_US 16 Aug 2016
        Replying to @janoc200 @Snowden

        What I was referring to: " NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. "

        2 replies 0 retweets 0 likes
      9. Jan Ciger‏ @janoc200 16 Aug 2016
        Replying to @Undetermined_US @Snowden

        I think that is fairly evident to anyone who has read the articles about compromising things like Juniper routers.

        0 replies 0 retweets 13 likes
      10. End of conversation

    Loading seems to be taking a while.

    Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

      Promoted Tweet

      false

      • © 2018 Twitter
      • About
      • Help Center
      • Terms
      • Privacy policy
      • Cookies
      • Ads info