Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Twitter employee who deactivated Trump's account on last day told to 'get a lawyer'

There is a reasonable chance the person could have violated the Computer Fraud and Abuse Act, a cybersecurity lawyer said 

Alexandra Wilts
Washington DC
Friday 03 November 2017 15:48 EDT
Comments
A tweet is displayed at The Daily Show-produced 'Donald J. Trump Presidential Twitter Library' (Photo by Drew Angerer/Getty Images)
A tweet is displayed at The Daily Show-produced 'Donald J. Trump Presidential Twitter Library' (Photo by Drew Angerer/Getty Images) (Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

The ex-Twitter employee who deactivated Donald Trump’s account should not say anything and “get a lawyer”, a prominent cybersecurity lawyer has said.

For 11 minutes on Thursday, Mr Trump was prevented from re-tweeting Fox & Friends videos or attacking Democrats on the social media platform after a Twitter customer support employee, on their last day at the company, intentionally cut off service to the President's account.

But while many applauded the ex-employee’s action, there is a reasonable chance the person could have violated the Computer Fraud and Abuse Act – the primary law used to prosecute hackers, Tor Ekeland told the newspaper The Hill.

The legislation states that unauthorised use of a “protected” computer system is against the law. But the definition of protected is very broad and in practice could refer to any computer, The Hill reported.

“If this happened in California, where Twitter is headquartered if they were no longer an employee at the time – particularly if their employment had been terminated – or if they had not been authorised to suspend or delete accounts, they could have broken the law,” Mr Ekeland said.

However, the facts of the case are still murky and the law is widely considered to be “a mess”, he added.

The statute has been unevenly applied, Mr Ekeland noted, and various courts around the country have come up with seemingly contradictory rulings on what unauthorised access actually means.

An employee who was tasked with monitoring accounts and given the ability to suspend them would have a good case that no law was broken, Mr Ekeland said. But an employee whose time at the company had technically ended could have the hardest time defending their conduct in a court of law.

“The employee could be in a lot of trouble. This was not just unauthorized access, but damage,” said Mr Ekeland, telling The Hill that causing $5,000 worth of damage could result in a 10-year prison sentence.

Since Mr Trump’s tweets generate a large amount of traffic for Twitter’s business, it could be fairly easy to prove that shutting off the President's account caused damage to the company.

According to the New York Times, the person responsible was not a full-time employee but a third-party contractor.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in