United States Gov't Makes Most Demand on Twitter


Recently, a set of surprisingly childish threats made their way to Twitter, promising death and destruction at a Broadway theater showing a one-man show featuring none other than former heavyweight champion, Mike Tyson.

While police took the threats seriously, beefing security at the theater to match, it also unveiled a rather unexpected – and entirely more ominous – development about just how much the United States government is asking out of Twitter in terms of cooperation.

With the recent "Arab Spring" events from Libya, Egypt and Iran last year, the United States Government has gotten an eyeful of just what kind of power Twitter can have in terms of organizing dissent. Occupy Wall Street protests have used it, and several criminal investigations – like those of the recent Tyson show tweets – have used it to keep an eye on those using it to stage protests and other actions.

Out of 849 requests for Twitter users' information from around the world between January 1 and June 30, 679 of those requests came from the United States government. Twitter, meanwhile, acceded to said requests 75 percent of the time, which in turn represents more granted requests than in all of 2011.

Naturally, Twitter is quick to reassure users that they only forked over information to the government in support of "criminal investigations," but that still leaves more than a few people unsettled.

Take, for example, Malcom Harris, an Occupy protestor arrested during the Brooklyn Bridge march on charges of "disorderly conduct," which could mean just about anything. Harris' Twitter information had been subpoenaed a month prior to his arrest, however, and even Twitter objected to that one.

Moreover, Boston police recently demanded access to Twitter's files for every account related to either @OccupyBoston or #BostonPD, a much larger swath and a much more disturbing request.

See Russia Times America’s report on FBI access to Facebook accounts below.

Users have come to rely on the Internet as a free exchange of ideas, but that exchange of ideas seems to be getting less free with each new request. Sure, taken one by one, the requests often seem reasonable – things like the Tyson show tweets featuring things like "ain't no joke yo I'm serious people are gonna die just like in aurora," here referring to the tragic killings at a showing of The Dark Knight Rises, should be taken seriously – but it's the steadily growing numbers, and the blanket requests, that are causes for concern.

Thus, there are calls for more concrete protections, fewer weasel-words, less legalese and a more clear definition of what constitutes a "threat" or a "criminal threat" – lest everyone suddenly find themselves engaged in "disorderly conduct," or as Stephen King once put it, "suspicion of unknown hanky-panky," and having their Twitter feeds searched.

Protecting citizens from random lunatics who go so far as to advertise their imminent mayhem on Twitter is one thing, but there is a limit, and a limit that needs to be clearly defined so as not to cast too wide a net and ensnare those whose presence is merely inconvenient to the government.

Edited by Braden Becker

Contributing TechZone360 Writer

Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More