S 5.156 Secure use of Twitter

Initiation responsibility: IT Security Officer, Head of IT, Supervisor

Implementation responsibility: User

Using the micro-blogging service Twitter, registered users can exchange news and information in short messages with a maximum of 140 characters. The users may register as "followers" of other users so that they receive their text messages.

When registering with this Internet service, the first name and surname, a user name and a password, as well as an email address must be entered. The user name is used to create the URL for the corresponding Twitter site of the user: http://twitter.com/user name. The selected password must have a minimum length of 6 characters and there are no further specifications. However, the users are made aware of the fact that they should select passwords that are as complex as possible ("Be tricky!"). In order to prevent identity theft, the usual password rules should be taken into consideration (see also S 2.11 Provisions governing the use of passwords).

The user IDs can be selected freely during registration. This way, it is possible to use false identities. Names of popular, famous persons or organisations can be selected and messages can be sent on their behalf.

The Twitter providers also offer the "Verified Accounts" option in order to mark user IDs, the identity of which has been checked, with a symbol. So far, this option has only rarely been offered, however.

The way Twitter and similar web services are handled should be clearly defined in every organisation. In this respect, there are several variants:

A government agency or company should establish clear regulations describing:

Just like for all Internet services, the terms and conditions of business should be checked carefully as to whether the mentioned terms and conditions are acceptable from your own perspective before registering as a user. The terms and conditions of business of the Twitter service allow the use of the specified user information for commercial purposes.

Twitter is famous for its quick and widespread disclosure of information. Frequently, information is forwarded via Twitter in such a short space of time that news services had not received it or been able to verify it. Twitter messages are often forwarded without authorisation or verification. Therefore, the verisimilitude of messages should be checked before forwarding or using the messages.

Often, only short URLs are forwarded via Twitter due to the restriction to 140 characters. Short URLs normally have the following format, for example: http://kurzurl.com/d9khqp. The actual link is hidden under this link. This may be problematic, since it is not possible to discern at the first glance where the short URL leads to and users may be lured to websites with malware.

Short URLs may also be used by the so-called spam followers. This term refers to automatically generated accounts generating messages from time to time. Just like accounts of real persons, these are provided with messages and link tips. The links in the various messages suggest varying and interesting link destinations, but link to the same destination site. In order to ensure that users actually click the links, many accounts are created and linked and/or equipped with followers. These accounts follow further real accounts and hope for a large number of clicks to the corresponding links. This way, spam is additionally distributed from active accounts of legitimate Twitter members.

Review questions: