X Taking Payments From Terrorists

The social media platform  X has been accused by campaigners of ignoring US sanctions by providing verified accounts to individuals and entities affiliated with Hezbollah, Iran, Russia, Houthi rebels, and other proscribed entities.

The Tech Transparency Project (TTP) claims it has  that  X  granted blue check marks to accounts tied to Hezbollah members, amongst others.  A tick allows longer posts and better promotion for a fee of $8 per month.

An account belonging to Hezbollah secretary general Hassan Hasrallah is claimed to be ID verified, meaning the Lebanese terrorist would have been required  to submit a selfie and a government-issued identity card to verify his identity.

Musk's decision to charge for check marks was one of the most controversial changes he made after he bought Twitter in 2022, with critics saying the move would make issues of disinformation worse, opening the platform to impersonators. The tick mark was previously free, meant to indicate that the social media platform had verified the identity behind the account. The recipients were mosty journalists, political leaders and various celebrities.

In some cases, those included people facing sanctions in the US, which opened the company to criticism that it was giving a platform to the wrong people and accusations that it was breaking US sanctions law. Now that the system is paid, however, "X may be raising new legal issues," the TTProject said.

TTP also acknowledged that X  has removed the ticks from the accounts it had identified after its report was published,  claiming that its security is "robust".

The TTP identified other accounts that had seemingly paid-for subscription accounts, including one belonging to NTV, a state-controlled television channel in Russia. The US made trade with Russia illegal after its invasion of Ukraine.

Hours after TTP’s report was published, X removed all of the  tick marks mentioned in the report and suspended the account of at least one Iranian-sponsored militia  Othere losing their  blue ticks were accounts for Hezbollah leader Hassan Nasrallah and Houthi rebels in Yemen.

Tech Transparency Project     |     The Register     |     Forbes     |     AllSides     |     MCAC     |     Readwrite      |

BBC     |

Image: Philip Oroni

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« International Initiative To Control Commercial Spyware
Deepfakes Deployed In Mobile Banking Malware Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.