WikiLeaks Wants A Database To Verify Twitter Users

WikiLeaks has recently tweeted that it wanted to build a database of information about Twitter’s verified users, including personal relationships that might have influence on their lives. Then, after a number of users sounded the alarm on what they perceived to be a massive doxxing effort, WikiLeaks deleted the tweet, but not before blaming that perception on the “dishonest press.”

In a subsequent series of tweets, WikiLeaks Task Force, a verified Twitter account described in its bio as the “Official @WikiLeaks support account”, explained that it wanted to look at the “family/job/financial/housing relationships” of Twitter’s verified users, which includes a ton of journalists, politicians and activists.

The point, the WikiLeaks account claims, is to “develop a metric to understand influence networks based on proximity graphs.” That’s a pretty confusing explanation, and the comment left a number of concerned Twitter users scratching their collective heads and wondering just how invasive this database might be.

The “task force” attempted to clarify what it meant in a number of subsequent tweets, and it sounds like the database is an attempt to understand who or what might be influencing Twitter’s verified users. Imagine identifying relationships like political party affiliation, for example, though it’s unclear if the database would include both online and offline relationships users have.

WikiLeaks mentioned an artificial intelligence software program that it would use to help compile the database, and suggested it might be akin to the social graphs that Facebook and LinkedIn have created.

It was all rather vague, which didn’t help with user concern on Twitter. But WikiLeaks claims the proposed database is not about releasing personal info, like home addresses.

Still, it was an unsettling proclamation for many on Twitter, and followed just a few days after WikiLeaks founder Julian Assange told Fox News that American media coverage is “very dishonest.” It’s a descriptor President-elect Donald Trump famously uses, too.

It seems possible that the point of looking into verified Twitter users, many of whom are journalists, is so that WikiLeaks can rein in the “dishonest media.”

What could be interesting, though, is that building a database would also mean looking into the relationships influencing Trump, who is also verified on Twitter.

Some of those relationships are already publicly known. The Wall Street Journal, for example, has reported that more than 150 institutions hold Trump’s business debts. But many journalists and politicians have complained of lack of transparency from Trump, like his failure to release his tax returns. These critics may welcome a closer look at the powers influencing the next Commander in Chief.

Even if WikiLeaks were to move forward with this database, it seems like it would have store the project off of Twitter. The social communications company tweeted out a statement shortly after the original WikiLeaks tweet: “Posting another person’s private and confidential information is a violation of the Twitter Rules.”

Twitter has already said that it will not allow anyone, including government agencies, to use its services to create surveillance databases, and has a policy against posting another person’s private information on the service.

It’s unclear if WikiLeaks could even promote the project on Twitter without its accounts getting suspended. The social network previously suspended another user, Guccifer 2.0, after publishing personal information about congress members on a third party website and then promoting it on Twitter.

TerrorismWatch:          How Did WikiLeaks Get Clinton's Emails?:

Does Russia Benefit When Assange Reveals Secrets?:

 

 

« Protecting Employees From Data Breaches
The Limits Of Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.