Twitter says purported White House account was a fake
Microblogging site changes account name and bio; page left in place for continued updates
Computerworld - For more than a year, an @TheWhiteHouse account on Twitter Inc.'s microblogging site was used to dutifully send out more than 1,500 alerts about speeches, press briefings and other Bush administration news. The Twitter account's claim that it was officially sanctioned by the White House appeared believable, if only because it was so earnest — and boring.
Then, when President Barack Obama was inaugurated on Tuesday, his picture appeared at the top of the Twitter page, and the updates continued. The number of "followers" who had signed up to get the updates quickly soared, from about 3,800 on Monday to nearly 16,000 as of today.
But it turns out that the account was a fake.
Twitter officials today changed the identifying information displayed on the @TheWhiteHouse page. Previously, the name of the account was listed as "The White House," and the biographical description read, "The head of the Executive Branch." Now the account name is "White House News," and the bio says in part that the account is "unaffiliated with the White House." In addition, Obama's photo has been removed and replaced by an icon. The person who set up the account isn't identified.
The changes — which were announced by Twitter CEO Evan Williams in a post on his Twitter page — are apparently within the company's right under its terms of service. But Twitter didn't close the account; instead, it simply changed the name and bio information to make it clear that the account isn't an official government one.
This isn't the first time that Twitter has changed inaccurate account information on pages, according to co-founder Biz Stone. "There have been other times when we've contacted account holders to let them know we have a policy against impersonation and had profile information changed accordingly," Stone wrote in an e-mail response to questions.
Asked whether Twitter searches out accounts that violate its terms of service, Stone wrote, "We proactively search for and remove spam and links to malware on our network, but we don't do the same for potential terms-of-service violations."
Twitter can shut down accounts for such violations if it finds them. But, Stone wrote, "shutting down accounts is not the only solution in all cases — for example, account holders may alter the profile so there is no longer any confusion."
All three of those accounts are currently listed on the @TheWhiteHouse page as "following." Like it, they also have "unaffiliated" or "not affiliated" disclaimers as part of their bios, and the same icon is being displayed at the top of the four pages. In the case of the @USSupremeCourt page, the account description changes may have been made recently, according to a comparison of Google cache records.
Despite the presence of the fake accounts, there are a growing number of federal agencies and employees that do appear to legitimately be using Twitter, including the Department of State and the Transportation Security Administration's blog team.
Management and technology consulting firm BearingPoint Inc. has compiled the GovTwit Directory, an evolving online listing of Twitter accounts set up by federal, state, local and international government entities. The firm, which also has set up an @GovTwit account on the Twitter site, lists @TheWhiteHouse in its directory, but with a parenthetical "unofficial" tag.
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Need to Replace MS Threat Management Gateway? Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Web Apps White Papers | Webcasts