X Taking Payments From Terrorists

The social media platform  X has been accused by campaigners of ignoring US sanctions by providing verified accounts to individuals and entities affiliated with Hezbollah, Iran, Russia, Houthi rebels, and other proscribed entities.

The Tech Transparency Project (TTP) claims it has  that  X  granted blue check marks to accounts tied to Hezbollah members, amongst others.  A tick allows longer posts and better promotion for a fee of $8 per month.

An account belonging to Hezbollah secretary general Hassan Hasrallah is claimed to be ID verified, meaning the Lebanese terrorist would have been required  to submit a selfie and a government-issued identity card to verify his identity.

Musk's decision to charge for check marks was one of the most controversial changes he made after he bought Twitter in 2022, with critics saying the move would make issues of disinformation worse, opening the platform to impersonators. The tick mark was previously free, meant to indicate that the social media platform had verified the identity behind the account. The recipients were mosty journalists, political leaders and various celebrities.

In some cases, those included people facing sanctions in the US, which opened the company to criticism that it was giving a platform to the wrong people and accusations that it was breaking US sanctions law. Now that the system is paid, however, "X may be raising new legal issues," the TTProject said.

TTP also acknowledged that X  has removed the ticks from the accounts it had identified after its report was published,  claiming that its security is "robust".

The TTP identified other accounts that had seemingly paid-for subscription accounts, including one belonging to NTV, a state-controlled television channel in Russia. The US made trade with Russia illegal after its invasion of Ukraine.

Hours after TTP’s report was published, X removed all of the  tick marks mentioned in the report and suspended the account of at least one Iranian-sponsored militia  Othere losing their  blue ticks were accounts for Hezbollah leader Hassan Nasrallah and Houthi rebels in Yemen.

Tech Transparency Project     |     The Register     |     Forbes     |     AllSides     |     MCAC     |     Readwrite      |

BBC     |

Image: Philip Oroni

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« International Initiative To Control Commercial Spyware
Deepfakes Deployed In Mobile Banking Malware Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.