, 9 tweets, 2 min read Read on Twitter
A few notes on Bezos' security apparatus. The guys I knew at FBI and Secret Service often ended up in VIP Protection, a lucrative post-government position where salaries can be in the high 6 digits. It's a serious job, especially to protect the richest of the rich. 1/
A few have reached out since Bezos memo with some interesting thoughts; all of them work in VIP world so won't go public but all are experts. First, all stated their governing philosophy: "our advice is if you never want to see it out there, then don't do it." Too late. 2/
Second, interestingly, before the memo, all of them believed it to be an insider job, likely the girlfriend's phone (there was some speculation on that). Someone got her phone and shared it. Not likely to be Bezos phone. "People like Bezos don't 'lose' their phones," one said 3/
explaining that there are mechanisms in place to erase and shut systems down immediately if the VIP's phone/computer/cyberfootprint go missing. And someone like Bezos has extensive cyber protections that would withstand most (but not all) hacking attempts. 4/
Third, some interesting takes after the letter. They all thought it was unusual and likely not a mistake for Bezos to name his security head. Names are often not given in their field. Bezos specifically states he "retained" Gavin de Becker, a serious professional. 5/
Bezos wanted the name out there and also the use of the word "retained" shows Bezos wanted it known that de Becker wasn't an 'inside' guy (always a fear after any breach) and would be willing to look at the possibility of insider hack since he was new. 6/
Fourth, reference to Saudi Arabia was "more than speculation," one said. "you just don't do that. de Becker wouldn't let him do that." Meaning that the Bezos security team has already done some cyber forensic analysis and knows it wasn't insider, and may have hints of who. 7/
This is why reps for Bezos also stated in interviews that they believe a government entity was involved, but didn't say US. In other words, under that theory, SA's sophisticated intell folks did the hack (either on own b/c of Khashoggi investigation or possibly asked to) and 8/
fed that information to AMI.
Anyway, this is the take from a bunch of guys who are in this space now and who think and prepare for physical, personal and cyber security for some of the richest people on earth. 9/9
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Juliette Kayyem
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!