WikiLeaks Wants A Database To Verify Twitter Users

WikiLeaks has recently tweeted that it wanted to build a database of information about Twitter’s verified users, including personal relationships that might have influence on their lives. Then, after a number of users sounded the alarm on what they perceived to be a massive doxxing effort, WikiLeaks deleted the tweet, but not before blaming that perception on the “dishonest press.”

In a subsequent series of tweets, WikiLeaks Task Force, a verified Twitter account described in its bio as the “Official @WikiLeaks support account”, explained that it wanted to look at the “family/job/financial/housing relationships” of Twitter’s verified users, which includes a ton of journalists, politicians and activists.

The point, the WikiLeaks account claims, is to “develop a metric to understand influence networks based on proximity graphs.” That’s a pretty confusing explanation, and the comment left a number of concerned Twitter users scratching their collective heads and wondering just how invasive this database might be.

The “task force” attempted to clarify what it meant in a number of subsequent tweets, and it sounds like the database is an attempt to understand who or what might be influencing Twitter’s verified users. Imagine identifying relationships like political party affiliation, for example, though it’s unclear if the database would include both online and offline relationships users have.

WikiLeaks mentioned an artificial intelligence software program that it would use to help compile the database, and suggested it might be akin to the social graphs that Facebook and LinkedIn have created.

It was all rather vague, which didn’t help with user concern on Twitter. But WikiLeaks claims the proposed database is not about releasing personal info, like home addresses.

Still, it was an unsettling proclamation for many on Twitter, and followed just a few days after WikiLeaks founder Julian Assange told Fox News that American media coverage is “very dishonest.” It’s a descriptor President-elect Donald Trump famously uses, too.

It seems possible that the point of looking into verified Twitter users, many of whom are journalists, is so that WikiLeaks can rein in the “dishonest media.”

What could be interesting, though, is that building a database would also mean looking into the relationships influencing Trump, who is also verified on Twitter.

Some of those relationships are already publicly known. The Wall Street Journal, for example, has reported that more than 150 institutions hold Trump’s business debts. But many journalists and politicians have complained of lack of transparency from Trump, like his failure to release his tax returns. These critics may welcome a closer look at the powers influencing the next Commander in Chief.

Even if WikiLeaks were to move forward with this database, it seems like it would have store the project off of Twitter. The social communications company tweeted out a statement shortly after the original WikiLeaks tweet: “Posting another person’s private and confidential information is a violation of the Twitter Rules.”

Twitter has already said that it will not allow anyone, including government agencies, to use its services to create surveillance databases, and has a policy against posting another person’s private information on the service.

It’s unclear if WikiLeaks could even promote the project on Twitter without its accounts getting suspended. The social network previously suspended another user, Guccifer 2.0, after publishing personal information about congress members on a third party website and then promoting it on Twitter.

TerrorismWatch:          How Did WikiLeaks Get Clinton's Emails?:

Does Russia Benefit When Assange Reveals Secrets?:

 

 

« Protecting Employees From Data Breaches
The Limits Of Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.