{"id":48205,"date":"2022-08-29T16:01:34","date_gmt":"2022-08-29T16:01:34","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33780\/Elon-Musk-Subpoenas-Twitter-Whistleblower-Seeking-Info-On-Spam-Security.html"},"modified":"2022-08-29T16:01:34","modified_gmt":"2022-08-29T16:01:34","slug":"elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/","title":{"rendered":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.reuters.com\/resizer\/sRYPU-_wf7mhzD3lB8IFJIXM43c=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/WLG75LXJB5LZPM5AGQWSXGLIUM.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"36\">\n<p data-testid=\"primary-image-caption\" id=\"primary-image-caption\" class=\"text__text__1FZLe text__medium-grey__3A_RT text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__caption__3L8vY article-body__primary-image-caption__WHVnb\">Elon Musk attends the opening ceremony of the new Tesla Gigafactory for electric cars in Gruenheide, Germany, March 22, 2022. Patrick Pleul\/Pool via REUTERS\/File Photo\/File Photo<\/p>\n<div class=\"registration-prompt__container__2jf5K column article-body__aside-registration-prompt__2ivER\">\n<div class=\"registration-prompt__text-content__o0YET\">\n<h6 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_6__1qUJ5 heading__base__2T28j heading__heading_6__RtD9P registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h6>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<\/div>\n<div readability=\"80.824784724822\">\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">WILMINGTON, Del., Aug 29 (Reuters) &#8211; Elon Musk has subpoenaed a Twitter Inc <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/companies\/TWTR.N\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">(TWTR.N)<\/a> whistleblower, seeking documents and communications on the company&#8217;s spam and alleged security vulnerabilities as the billionaire battles to end his agreement to buy Twitter for $44 billion, according to a court filing on Monday.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Musk sought information from whistleblower Peiter Zatko mostly about the way Twitter measures spam accounts. Musk has said he is walking away from the deal for the company because Twitter misled him and regulators about the true number of spam or bot accounts on the microblogging platform.<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">But Musk also sought documents and communications about alleged attempts to hide security weaknesses, compliance with a 2011 Federal Trade Commission agreement and &#8220;Twitter&#8217;s engagement in any unlawful activity.&#8221;<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI article-body__inline-registration-prompt__1-N9W\">\n<div class=\"registration-prompt__text-content__o0YET\">\n<h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">A spokesman for Twitter declined to comment.<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">A famed hacker widely known as &#8220;Mudge,&#8221; Zatko ended a stint as the head of Twitter&#8217;s security earlier this year, and said in his whistleblower complaint that became public last week that the company falsely claimed it had a solid security plan. <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/markets\/deals\/twitters-former-security-head-alleges-company-misled-regulators-about-security-2022-08-23\/\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\"> read more <\/a><\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The information that Musk obtains from Zatko might lay the groundwork for the Tesla Inc <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/companies\/TSLA.O\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">(TSLA.O)<\/a> chief executive to introduce new fraud claims in his legal battle with Twitter, according to Ann Lipton, a professor at Tulane University Law School.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">However, she said it was unclear if the judge in the Twitter litigation would allow Musk to introduce those claims given the tight schedule for the case and because Musk waived due diligence before signing the deal contract.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">A Twitter attorney said at a court hearing last week that Musk&#8217;s focus on spam as a way to end his agreement to buy the company was &#8220;legally irrelevant&#8221; because Twitter always said its spam counts were only estimates, not binding representations.<\/p>\n<p data-testid=\"paragraph-8\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The two sides have sued each other and are heading to a five-day trial on Oct. 17. Musk wants out of the deal and Twitter is asking Chancellor Kathaleen McCormick of the Delaware Court of Chancery to order him to buy the company for the agreed $54.20 per share.<\/p>\n<p data-testid=\"paragraph-9\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Twitter&#8217;s stock ended down 1% at $40.04 on Monday in New York.<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI\">\n<div class=\"registration-prompt__text-content__o0YET\">\n<h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__default__UPMUu sign-off__text__PU3Aj\">Reporting by Tom Hals in Wilmington, Del.<br \/>\nEditing by Mark Porter and Matthew Lewis<\/span><\/p>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Our Standards: <a data-testid=\"Link\" href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<div class=\"article-body__element__2p5pI\">\n<address class=\"author-bio__author-card__3h9uA horizontal\" readability=\"-0.96934865900383\"><a class=\"author-bio__author-image__3uDqF\" href=\"https:\/\/www.reuters.com\/authors\/tom-hals\/\"><\/a><\/p>\n<div class=\"author-bio__author-info__2IJ1y\" readability=\"8.7241379310345\"><a data-testid=\"Heading\" rel=\"author\" href=\"https:\/\/www.reuters.com\/authors\/tom-hals\/\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__heading_6__1qUJ5 heading__base__2T28j heading__heading_6__RtD9P author-bio__name__3-Uzf\">Tom Hals<\/a><\/p>\n<p data-testid=\"Heading\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__light__1nZjX text__heading_6__1qUJ5 heading__base__2T28j heading__heading_6_light__2VdQi author-bio__company__3i55k\">Thomson Reuters<\/p>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf author-bio__description__3uv33\">Award-winning reporter covering U.S. courts and law from the COVID-19 pandemic to high-profile criminal trials and Wall Street&#8217;s biggest failures with more than two decades of experience in international financial news in Asia and Europe.<\/p>\n<\/div>\n<\/address>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33780\/Elon-Musk-Subpoenas-Twitter-Whistleblower-Seeking-Info-On-Spam-Security.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48206,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10173],"class_list":["post-48205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyspamspywaretwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-29T16:01:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reuters.com\/resizer\/sRYPU-_wf7mhzD3lB8IFJIXM43c=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/WLG75LXJB5LZPM5AGQWSXGLIUM.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security\",\"datePublished\":\"2022-08-29T16:01:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/\"},\"wordCount\":488,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg\",\"keywords\":[\"headline,privacy,spam,spyware,twitter\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/\",\"name\":\"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg\",\"datePublished\":\"2022-08-29T16:01:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,spam,spyware,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyspamspywaretwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/","og_locale":"en_US","og_type":"article","og_title":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-29T16:01:34+00:00","og_image":[{"url":"https:\/\/www.reuters.com\/resizer\/sRYPU-_wf7mhzD3lB8IFJIXM43c=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/WLG75LXJB5LZPM5AGQWSXGLIUM.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security","datePublished":"2022-08-29T16:01:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/"},"wordCount":488,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg","keywords":["headline,privacy,spam,spyware,twitter"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/","url":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/","name":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg","datePublished":"2022-08-29T16:01:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/elon-musk-subpoenas-twitter-whistleblower-seeking-info-on-spam-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,spam,spyware,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyspamspywaretwitter\/"},{"@type":"ListItem","position":3,"name":"Elon Musk Subpoenas Twitter Whistleblower, Seeking Info On Spam, Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48205"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48205\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48206"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}