Dutch Town Sues Twitter For Paedophile Conspiracy

As if Twitter's embattled managers are not dealing with enough burning issues, now, a small town in the Netherlands is taking legal action against Twitter over the spread of a conspiracy theory claiming it was once home to a ring of Satanic-worshipping paedophiles. 

False reports that the Dutch town Bodegraven-Reeuwijk, with around 35,000 residents, was the place of the abuse and murder of multiple children in the 1980s were first circulated by three men in 2020. The men concerned have been spreading unfounded stories on Twitter since 2020 about the supposed abuse and murder of children. 

The main faker, who grew up in the town near The Hague, claimed he had witnessed the abuse by a group of people in Bodegraven, as a child. Local authorities want to see all posts relating to the alleged events removed. 
The claims have prompted dozens of people to travel to the town's Vrederust cemetery to leave flowers and tributes at the graves of seemingly random dead children.

The stories caused much unrest in Bodegraven, as scores of followers of the men’s tweets flocked to the local graveyard to lay flowers and written messages at the graves of seemingly random dead children, who they claimed were victims of the satanic ring.

Twitter's lawyer, Jens van den Brink, declined to comment ahead of a hearing at The Hague District Court on Friday 17th September. In 2021, the same court ordered the three original men to remove all tweets about the town, but the claims continue. The town's lawyer, Cees van de Sanden, said Twitter had not responded to a request in July that it find and remove all posts related to the claims. 

Mayor Christiaan van der Kamp said that claims were "very painful and sometimes even threatening for the relatives of the deceased", RTL Nieuws reported.

The three men behind the claims are currently serving jail sentences following convictions in separate cases for incitement and making death threats against a number of people, including Dutch Prime Minister Mark Rutte.

RTL Niews:     BBC:    Reuters:   NYPost:     Yahoo

You Might Also Read: 

Protecting Children In The Digital Age:

 

« The Hacking Of Hospitals Highlights Ransomware
NATO Secret Missile Data Found On The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.