Twitter Hacks: Real Consequences Abound For Twitter's Fake Tweets

Twitter Has To Figure Out Its Hack Problem..Or Else
Open Image Modal

(Reuters) - Does Twitter have a credibility problem?

For many, a single fake tweet from the Associated Press account that briefly roiled financial markets on Tuesday, driving the Dow Jones industrial average down about 145 points, vividly reaffirmed the fearsome, near-instantaneous power of the 140-character message.

But the security lapse also revived doubts about Twitter's place in the media landscape - and its ultimate value - at a moment when its status as one of today's essential information networks had seemed all but cemented.

Just a week after social media networks took criticism for helping circulate misinformation about the alleged perpetrators of the Boston Marathon bombing, Twitter's security shortcomings fell under a harsh spotlight Tuesday after a hacker group commandeered the AP Twitter account and falsely reported that explosions in the White House had injured President Barack Obama.

The AP was only the latest hacking victim in recent days after Twitter accounts belonging to National Public Radio, CBS 60 Minutes and others were breached. Last year, Reuters News was the victim of hackers who briefly took over one of its Twitter accounts and posted false tweets.

The latest hack was by far the most significant: the single AP tweet stunned investors and effectively wiped out $136.5 billion of the S&P 500 index's value in a matter of minutes.

Although the news agency later disclosed that one of its employees may have inadvertently given away company passwords as the result of a "phishing" attack by the hackers, security experts quickly faulted Twitter for its longstanding failure to implement two-factor authentication, a double-layered password feature used by the likes of Google Inc and Microsoft Inc that might have prevented the spate of high-profile Twitter hijackings.

"It's one of those cases that we are seeing too often. It's getting unnerving," said Robert Quigley, a journalism lecturer specializing in social media at the University of Texas. "What media organizations need to do is pressure Twitter to have a more secure website."

Although Twitter has repeatedly declined to address its product roadmap, the company has signaled that it will soon unveil two-factor authentication, including a public job posting in February that suggested the company was hiring to tackle the problem.

Mark Risher, the founder of a security consultancy that counts social media companies Pinterest and Tumblr among its clients, said introducing more measures like two-factor authentication would make Twitter more cumbersome to use and potentially slow its user growth - a critical concern for a company that relies on advertising revenues. But he warned that a prolonged rash of high-profile hacks, and an eroding sense of user trust, would hurt Twitter more.

"There's always a tradeoff between convenience and safety," Risher said. "But a security issue damages Twitter's brand."

NEWSWIRE OR PLATFORM

For Twitter, the hacking has raised questions about its credibility just as it is beginning to assume a central role in a fast-changing media landscape, with the volume of tweets rising to more than 400 million a day. Earlier this month, the Securities and Exchange Commission ruled that U.S. companies may report material information such as quarterly results on Twitter, as long as investors are alerted in advance. Days later, Bloomberg L.P. said it would funnel Twitter directly into its terminals used by thousands of traders on Wall Street.

At the same time, the world's leading news organizations and Twitter, which has 200 million users around the world, have become increasingly intertwined in a symbiotic, if sometimes troublesome, relationship.

Dan Gillmor, a journalism professor at Arizona State University, said the hacks have especially hurt news outlets because their Twitter accounts are often the primary way that their news reaches consumers who may not subscribe to a newspaper or have access to a newswire.

Twitter has touted itself as a critical newswire of sorts, such as during the 2011 tsunami in Japan, when it helped emergency responders locate survivors, or when it became a vital lifeline for some New Yorkers as television sets fell dark during Hurricane Sandy last year.

But last week, in the wake of the Boston bombings, some of those who previously viewed Twitter as an indispensable news source began turning against the service upon discovering that the wisdom of crowds is, in fact, an adage not often applicable on the Internet.

Steve Brunetto, a senior executive at Edgewave, a network security company, said Tuesday's hacking undermined Twitter at a sensitive time.

"On the heels of the Boston Marathon bombing, everyone's trying to figure out, ‘Okay, where does Twitter fit into that news cycle? Where does Twitter fit into disseminating information?'" Brunetto said. "They've got an opportunity to legitimize themselves as a real player in that information life cycle but they get knocked down a peg every time somebody says, ‘Oh, you can't believe what you read on Twitter.'"

Jeff Jarvis, a prominent Internet pundit and a journalism professor at City University of New York, said that the confusion caused by social media in recent weeks was not an indictment of social media but rather a reminder that the onus falls on professional reporters to verify information.

"No, the Internet's not broken," Jarvis said.

The rise of social media means that "you now hear more bar-room debates and speculation than before," he added. "But that doesn't mean you should believe it more than you ever did."

Tom Schrader, managing director for U.S. equity trading at Stifel Nicolaus Capital Markets in Baltimore, said there were a lot of clues in the false AP tweet that should have kept traders from reacting, in particular the wording of the message.

"We saw it, we saw the initial reaction. Initially our reaction was, pull your bids (until we) see whether this is legit or not. We found no legitimacy to it and went back into the market as normal," he said.

Oli Freeling-Wilkinson is chief executive officer of Knowsis, a London company that picks out and amalgamates financially relevant tweets and other social media content for traders. "We do have spam controls in place, but it's an ongoing war," he said. "It's much more difficult to work out what's going on when people are hacking into official accounts, especially in the heat of the moment."

While Twitter has occasionally signaled that it believes it could become more than a passive distribution network - a shift marked by last year's purchase of Summify, a small startup that specialized in surfacing relevant news - it has also taken pains to distance itself from the content of tweets and maintain strict neutrality from a legal perspective.

Twitter Chief Executive Dick Costolo told an Online News Association gathering last autumn that Twitter's primary responsibility was to create a platform, rather than to play an editorial role in determining which tweets people should see.

"A company trying to build media is creating or curating content, and that's not the kind of company we're creating," Costolo said.

Gillmor, from Arizona State, said Twitter did not need to guarantee the quality or veracity of its content in order to grow into a media juggernaut.

"It's not whether Twitter is credible or not, it's what people do with it," he said. "Every news organization feels it has no alternative but to use Twitter. But everyone at the traditional news organizations has to be thinking really hard about what that means, from whether the security is sufficient on these third-party platforms to what it means to be turning part of your stuff over to new kinds of publishers."

(Reporting By Gerry Shih; Additional reporting by Jennifer Saba, Ryan Vlastelica and Caroline Valetkevitch in New York and Alina Selyukh in Washington; Editing by Claudia Parsons)

Support HuffPost

At HuffPost, we believe that everyone needs high-quality journalism, but we understand that not everyone can afford to pay for expensive news subscriptions. That is why we are committed to providing deeply reported, carefully fact-checked news that is freely accessible to everyone.

Whether you come to HuffPost for updates on the 2024 presidential race, hard-hitting investigations into critical issues facing our country today, or trending stories that make you laugh, we appreciate you. The truth is, news costs money to produce, and we are proud that we have never put our stories behind an expensive paywall.

Would you join us to help keep our stories free for all? Your will go a long way.

Support HuffPost

Before You Go

9 Gadgets To Help You Avoid Surveillance
Fingerprint Gel(01 of09)
Open Image Modal
The Japanese government counter-terrorism practice of fingerprinting foreigners who enter the country may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of faking fingerprints for scanners.Learn how to make your own here. (credit:AP)
White Noise Generator(02 of09)
Open Image Modal
Worried someone around you is secretly recording everything you do? No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing audio jammers. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices. (credit:<a href="http://www.flickr.com/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name="Flickr:" data-vars-item-type="text" data-vars-unit-name="5bb36459e4b0fa920b979048" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="29" data-vars-position-in-unit="29">Flickr:</a><a href="http://www.flickr.com/people/anonymous9000/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name=" Anonymous9000" data-vars-item-type="text" data-vars-unit-name="5bb36459e4b0fa920b979048" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/people/anonymous9000/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="30" data-vars-position-in-unit="30"> Anonymous9000</a>)
Phonekerchief(03 of09)
Open Image Modal
MIT's Technology Review calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "Faraday cages" like this (sold by uncommongoods) to block your cellphone's call signal, WiFi and GPS. Handy now that federal courts are ruling that cops can track suspects via cellphone sans warrant, and Apple can remotely disable your phone camera with a click. As security researcher Jacob Appelbaum said in an interview with N+1 back in April, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you don't want to be tracked? (credit:uncommongoods)
LED-Lined Hat(04 of09)
Open Image Modal
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. Amie, a hacker on WonderHowTo, shows the world how to make one, while this German art exhibition lays out how these ingenious devices work. (credit:AP)
Bug Detector(05 of09)
Open Image Modal
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a common phrase. Today they're sold in all sorts of shops for surveillance paranoids. (credit:Gadget Playground)
Camera Map(06 of09)
Open Image Modal
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The NYC Surveillance Camera Project is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in Boston, Chicago and Bloomington, Indiana. Notbored.org has even published a guide to making your own surveillance camera maps (here). (credit:AP)
Dazzle Camouflage(07 of09)
Open Image Modal
Credit to artist Adam Harvey for this one. Inspired by the "dazzle camouflage" used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out The Perilous Glamour of Life Under Surveillance for some tips on designing your own camera-fooling face paint. (credit:Adam Harvey)
Throwaway Cellphone(08 of09)
Open Image Modal
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. $10 TracFones work on most major networks, including AT&T, T-Mobile, Sprint and Verizon, and come with minutes prepaid so you can dispose of the devices when you're done. (credit:AP)
RFID-Blocking Wallet(09 of09)
Open Image Modal
Radio-Frequency Identification (RFID) chips are now regularly implanted in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner scrape your information and track your whereabouts. Luckily, gadget geeks have come to the rescue again, this time with RFID-blocking wallets. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: just nuke it in the microwave for five seconds. Of course, whatever you're microwaving might burst into flames first... (credit:AP)