WikiLeaks Wants A Database To Verify Twitter Users

WikiLeaks has recently tweeted that it wanted to build a database of information about Twitter’s verified users, including personal relationships that might have influence on their lives. Then, after a number of users sounded the alarm on what they perceived to be a massive doxxing effort, WikiLeaks deleted the tweet, but not before blaming that perception on the “dishonest press.”

In a subsequent series of tweets, WikiLeaks Task Force, a verified Twitter account described in its bio as the “Official @WikiLeaks support account”, explained that it wanted to look at the “family/job/financial/housing relationships” of Twitter’s verified users, which includes a ton of journalists, politicians and activists.

The point, the WikiLeaks account claims, is to “develop a metric to understand influence networks based on proximity graphs.” That’s a pretty confusing explanation, and the comment left a number of concerned Twitter users scratching their collective heads and wondering just how invasive this database might be.

The “task force” attempted to clarify what it meant in a number of subsequent tweets, and it sounds like the database is an attempt to understand who or what might be influencing Twitter’s verified users. Imagine identifying relationships like political party affiliation, for example, though it’s unclear if the database would include both online and offline relationships users have.

WikiLeaks mentioned an artificial intelligence software program that it would use to help compile the database, and suggested it might be akin to the social graphs that Facebook and LinkedIn have created.

It was all rather vague, which didn’t help with user concern on Twitter. But WikiLeaks claims the proposed database is not about releasing personal info, like home addresses.

Still, it was an unsettling proclamation for many on Twitter, and followed just a few days after WikiLeaks founder Julian Assange told Fox News that American media coverage is “very dishonest.” It’s a descriptor President-elect Donald Trump famously uses, too.

It seems possible that the point of looking into verified Twitter users, many of whom are journalists, is so that WikiLeaks can rein in the “dishonest media.”

What could be interesting, though, is that building a database would also mean looking into the relationships influencing Trump, who is also verified on Twitter.

Some of those relationships are already publicly known. The Wall Street Journal, for example, has reported that more than 150 institutions hold Trump’s business debts. But many journalists and politicians have complained of lack of transparency from Trump, like his failure to release his tax returns. These critics may welcome a closer look at the powers influencing the next Commander in Chief.

Even if WikiLeaks were to move forward with this database, it seems like it would have store the project off of Twitter. The social communications company tweeted out a statement shortly after the original WikiLeaks tweet: “Posting another person’s private and confidential information is a violation of the Twitter Rules.”

Twitter has already said that it will not allow anyone, including government agencies, to use its services to create surveillance databases, and has a policy against posting another person’s private information on the service.

It’s unclear if WikiLeaks could even promote the project on Twitter without its accounts getting suspended. The social network previously suspended another user, Guccifer 2.0, after publishing personal information about congress members on a third party website and then promoting it on Twitter.

TerrorismWatch:          How Did WikiLeaks Get Clinton's Emails?:

Does Russia Benefit When Assange Reveals Secrets?:

 

 

« Protecting Employees From Data Breaches
The Limits Of Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.