WikiLeaks Wants A Database To Verify Twitter Users

WikiLeaks has recently tweeted that it wanted to build a database of information about Twitter’s verified users, including personal relationships that might have influence on their lives. Then, after a number of users sounded the alarm on what they perceived to be a massive doxxing effort, WikiLeaks deleted the tweet, but not before blaming that perception on the “dishonest press.”

In a subsequent series of tweets, WikiLeaks Task Force, a verified Twitter account described in its bio as the “Official @WikiLeaks support account”, explained that it wanted to look at the “family/job/financial/housing relationships” of Twitter’s verified users, which includes a ton of journalists, politicians and activists.

The point, the WikiLeaks account claims, is to “develop a metric to understand influence networks based on proximity graphs.” That’s a pretty confusing explanation, and the comment left a number of concerned Twitter users scratching their collective heads and wondering just how invasive this database might be.

The “task force” attempted to clarify what it meant in a number of subsequent tweets, and it sounds like the database is an attempt to understand who or what might be influencing Twitter’s verified users. Imagine identifying relationships like political party affiliation, for example, though it’s unclear if the database would include both online and offline relationships users have.

WikiLeaks mentioned an artificial intelligence software program that it would use to help compile the database, and suggested it might be akin to the social graphs that Facebook and LinkedIn have created.

It was all rather vague, which didn’t help with user concern on Twitter. But WikiLeaks claims the proposed database is not about releasing personal info, like home addresses.

Still, it was an unsettling proclamation for many on Twitter, and followed just a few days after WikiLeaks founder Julian Assange told Fox News that American media coverage is “very dishonest.” It’s a descriptor President-elect Donald Trump famously uses, too.

It seems possible that the point of looking into verified Twitter users, many of whom are journalists, is so that WikiLeaks can rein in the “dishonest media.”

What could be interesting, though, is that building a database would also mean looking into the relationships influencing Trump, who is also verified on Twitter.

Some of those relationships are already publicly known. The Wall Street Journal, for example, has reported that more than 150 institutions hold Trump’s business debts. But many journalists and politicians have complained of lack of transparency from Trump, like his failure to release his tax returns. These critics may welcome a closer look at the powers influencing the next Commander in Chief.

Even if WikiLeaks were to move forward with this database, it seems like it would have store the project off of Twitter. The social communications company tweeted out a statement shortly after the original WikiLeaks tweet: “Posting another person’s private and confidential information is a violation of the Twitter Rules.”

Twitter has already said that it will not allow anyone, including government agencies, to use its services to create surveillance databases, and has a policy against posting another person’s private information on the service.

It’s unclear if WikiLeaks could even promote the project on Twitter without its accounts getting suspended. The social network previously suspended another user, Guccifer 2.0, after publishing personal information about congress members on a third party website and then promoting it on Twitter.

TerrorismWatch:          How Did WikiLeaks Get Clinton's Emails?:

Does Russia Benefit When Assange Reveals Secrets?:

 

 

« Protecting Employees From Data Breaches
The Limits Of Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

PayPal Ventures

PayPal Ventures

PayPal Ventures invests in companies at the forefront of innovation in fintech, payments, commerce enablement, artificial intelligence, blockchain and cryptocurrency, regulatory and cyber technology.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.