{"id": 592666459718967296, "lang": "en", "text": "RT @taosecurity: Keynote @hurdonthehill says orgs should assume compromise, then detect and respond to remove intruders. @Georgetown http:/\u2026", "urls": [], "user": {"id": 2963445730}, "id_str": "592666459718967296", "source": "<a href=\"http://twitter.com/download/iphone\" rel=\"nofollow\">Twitter for iPhone</a>", "deleted": false, "hashtags": [], "retrieved": "2017-06-07--04-02-07", "created_at": "Mon Apr 27 12:27:49 +0000 2015", "retweet_count": 4, "user_mentions": [{"id": 17767238, "name": "Richard Bejtlich", "screen_name": "taosecurity"}, {"id": 2963445730, "name": "Rep. Will Hurd", "screen_name": "HurdOnTheHill"}, {"id": 7856542, "name": "Georgetown Univ.", "screen_name": "Georgetown"}], "legacy_imported": true, "retweeted_status": {"id": 592665872273121282, "lang": "en", "text": "Keynote @hurdonthehill says orgs should assume compromise, then detect and respond to remove intruders. @Georgetown http://t.co/0dX6uPqI7m", "urls": [], "user": {"id": 17767238}, "media": [{"id": 592665872151482368, "url": "http://t.co/0dX6uPqI7m", "type": "photo", "sizes": {"large": {"h": 631, "w": 841, "resize": "fit"}, "small": {"h": 255, "w": 340, "resize": "fit"}, "thumb": {"h": 150, "w": 150, "resize": "crop"}, "medium": {"h": 450, "w": 600, "resize": "fit"}}, "media_url": "http://pbs.twimg.com/media/CDmSeHwWEAAv08n.jpg", "display_url": "pic.twitter.com/0dX6uPqI7m", "expanded_url": "https://twitter.com/taosecurity/status/592665872273121282/photo/1", "media_url_https": "https://pbs.twimg.com/media/CDmSeHwWEAAv08n.jpg"}], "id_str": "592665872273121282", "source": "<a href=\"http://www.apple.com\" rel=\"nofollow\">iOS</a>", "hashtags": [], "created_at": "Mon Apr 27 12:25:29 +0000 2015", "retweet_count": 4, "user_mentions": [{"id": 2963445730, "name": "Rep. Will Hurd", "screen_name": "HurdOnTheHill"}, {"id": 7856542, "name": "Georgetown Univ.", "screen_name": "Georgetown"}], "favorite_count": 3}}