Twitter Blocks Data Access By US Spy Agencies

Twitter has reportedly banned US intelligence agencies from using Dataminr, a service it part-owns that provides real-time alerts for breaking news like natural disasters, terror attacks, and actionable business events.

The Wall Street Journal reported recently, citing US intelligence officials who say that Twitter was concerned about the "optics" of the relationship.

The social network told the Journal that its "data is largely public and the US government may review public accounts on its own, like any user could."

Dataminr, which Twitter owns a 5% stake in, works by trawling Twitter's "firehouse" of all public tweets, using sophisticated software to automatically monitor it for developing news and events that the user might be interested in. It can flag up potentially significant news events before they make their way to the media — a tweet from a company employee laid off in a restructuring, for example, or a photo of the damage immediately after a terror attack taken by a survivor.

It is used by workers in the financial industry looking to get the edge on actionable events, where being first to someone can be the difference between profit and loss. It is also popular with journalists for getting alerts on breaking news and finding sources on the ground.

US spy agencies have also made use of the service for monitoring terror attacks, like those in Brussels, but according to the Journal, Twitter has now made Dataminr pull the plug. The social network is — an unnamed intelligence official alleges — concerned about looking too friendly to the agencies, at a time of soured relationships between the tech industry and the US government over policy issues like encryption and surveillance.

In a statement, a Twitter spokesperson told Business Insider that "we have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes," and that "this is a longstanding Twitter policy, not a new development."

However, US agencies were reportedly able to use Dataminr for two years before the ban was enacted.

Business Insider:

« ISIS Developing Driverless Cars
Artificial Intelligence And Racism »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

CSC Cyber Games

CSC Cyber Games

CSC Cyber Games is an innovative platform dedicated to empowering individuals with the tools and knowledge to excel in the ever-evolving world of cybersecurity.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Center for Technology Training (CTT)

Center for Technology Training (CTT)

CTT is a distinguished Computer Training School in Tampa. We specialize in offering comprehensive IT certification programs, including Cyber Security.

Axiler

Axiler

Axiler’s AI-driven self-healing architecture seamlessly detect, patch, and neutralize threats in real-time, ensuring systems remain secure and ever-adaptable.