Social media not only shapes the way we communicate, but also political and social discourses. From this perspective, Platform X, formerly known as Twitter, is once again at the center of criticism for its verification policy. A report from the Tech Transparency Project (TTP) suggests that X, the social network under the aegis of Elon Musk, operates a controversial verification program that is even used by organizations classified as terrorist.

X’s controversial verification policy

The TTP has identified 28 verified accounts associated with individuals and groups deemed by the U.S. government to be threats to national security. They include two leaders of Hezbollah, whose military arm is classified as a terrorist organization by the European Union. In addition, accounts linked to the Houthis in Yemen, which the US also classifies as a terrorist organization, were examined. Additionally, state-owned accounts from Iran and Russia received the coveted blue check mark, raising questions about the extent to which X's verification policies conflict with international sanctions and security concerns.

Violation of US sanctions?

Aside from the moral and ethical concerns, the practice of adding verification badges to such accounts could also have legal consequences for X. The TTP report suggests that the company may be violating US sanctions. What makes the matter particularly explosive is the possibility that these verified accounts could benefit from X's revenue share program, which ensures them a share of the advertising revenue generated by their presence on the platform.

Criticism of the verification system

Since Musk took over, the verification system on X has undergone major changes. Users can now pay for verification without having to prove their identity. This low hurdle for verification is met with widespread criticism as it opens the door to abuse and manipulation. The platform has commented on this explosive issue and announced via the official @‌Safety account that it would review the report and “take action if necessary”. The developments raise fundamental questions about the responsibility of social networks, the regulation of content and the role of these platforms in global security issues.

Twitter

By loading the tweet, you accept Twitter's privacy policy.
Learn more

Load content

Questions and answers:

Question 1: How does X respond to the Tech Transparency Project report?
Response 1: X communicated via the official @‌Safety account that it will review the report and “take action if necessary.”

Question 2: Could X have violated US sanctions?
Answer 2: Yes, checking accounts associated with terrorist organizations could violate US sanctions.

Question 3: What does the Tech Transparency Project report criticize?
Answer 3: The report criticizes X for issuing verification seals to accounts linked to organizations classified as terrorist.

Question 4: Which organizations are mentioned in the TTP report?
Answer 4: The report mentions, among other things, Hezbollah and the Houthis, which are classified as terrorist organizations.

Question 5: What are possible consequences for X?
Answer 5: Possible consequences include legal problems due to violation of US sanctions and criticism of verification practices.

Conclusion

The recent revelations highlight the profound challenges social networks face in dealing with verification processes and the presence of problematic actors. The balance between open communication and the need to prevent abuse and manipulation remains a key point of conflict. For X, this not only means possible legal consequences, but also a test of user trust and public perception. Given these developments, it is crucial that platforms like X implement transparent and responsible policies that protect both freedom of expression and the security and integrity of the digital space.

We invite you to subscribe to the Mimikama newsletter at Newsletter and attend our online lectures and workshops at Mimikama Online Lecture to learn more about this important topic and get involved.

Source: futurezone.at

Also read:

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )