Monday, May 30, 2011

Gennette Nicole on Pic Tweeted from Rep. Weiner’s Account

The Daily News has a statement from Gennette Nicole regarding the controversy swirling around an explicit image Tweeted via Rep. Anthony Weiner’s Twitter account. Mediaite has a fair assessment of where the story stands for now:

It may be too soon to say for sure, but this Memorial Day weekend may go down in the annals of Twitter history as one of the strangest ones imaginable. Rep. Anthony Weiner claimed that his Twitter account had been hacked after an inappropriate photo surfaced that was alleged to have been sent to a college student via the social media platform. There are a slew of legitimate questions, however, that remain. Once answered, they could do irreparable damage to some high profile personalities, particularly if there is more to the story, as there most certainly is.

As for Gennette Nicole’s statement, Big Government and associated Breitbart sites made the decision to redact or withhold Gennette’s name and personal information as it was determined unnecessary for an accurate reporting of the still developing story.

The notion that a verified Twitter account, in this instance, belonging to a member of Congress, can allegedly be hacked and continue to remain verified raises serious questions for Twitter. That an official account of a member of Congress can be hacked has even broader ramifications. Many taxpayers may not think it the laughing matter Rep. Anthony Weiner appeared to think it was, given his own reaction.

Also from Gennette’s statement:

The last 36 hours have been the most confusing, anxiety-ridden hours of my life. I’ve watched in sheer disbelief as my name, age, location, links to any social networking site I’ve ever used, my old phone numbers and pictures have been passed along from stranger to stranger.

When contacted, sources on Capitol Hill raised serious concerns given that such a hacked account could potentially provide access to confidential, if not classified, information, by facilitating access to government servers via an existing Virtual Private Network. The extent of any hack would have to be investigated before any determination in that regard could be made. (more…)

No comments: