Your tweets don't actually belong to you. A New York judge ruled no warrant is needed to subpoena public tweets since Twitter is a third party service. So just keep in mind: what you tweet can, and probably will, be used against you in a court of law. In the continuing saga of law enforcement or government agencies like DHS using social media for monitoring purposes, the police and prosecutors do not need a warrant to subpoena your tweets. That even includes your deleted public tweets, but I saw no reference to what would happen if your tweets are “protected.” New York Matthew Sciarrino Jr. ruled [PDF], “Twitter’s license to use the defendant’s Tweets means that the Tweets the defendant posted were not his.”Perhaps the judge thought he was being clever when he used hashtags on “quash” and “denied.”Malcolm Harris was arrested in October for disorderly conduct, along with more than 700 other protesters during a mass Occupy Wall Street protest on the Brooklyn Bridge. At the time, the Gothamist reported that the cops were accused of trapping Wall Street protesters in order to make the massive arrests. Criminal Court Judge Matthew Sciarrino Jr. is “overseeing a special courtroom dedicated to handling nearly 2,000 Occupy-related cases,” reported Reuters. The judge “ruled that Malcolm Harris did not have standing to challenge the third-party subpoena. Prosecutors from the Manhattan District Attorney’s Office served the subpoena on Twitter in January, requesting Harris’ user information and more than three months’ worth of tweets.”The judge wrote that New York courts have not yet set a precedent to “quash a subpoena issued to a third-party online social networking service seeking to obtain the defendant’s user information and postings.” He drew an analogy comparing the sensitive information contained in tweets and user information to bank record “cases where courts have consistently held that an individual has no right to challenge a subpoena issued against the third-party bank.” Judge Sciarrino pointed at a Second Circuit decision that users have no reasonable expectation of privacy for anything posted online or sent via email. He wrote:The widely believed (though mistaken) notion that any disclosure of a user’s information would first be requested from the user and require approval by the user is understandable, but wrong. While the Fourth Amendment provides protection for our physical homes, we do not have a physical “home” on the Internet. What an Internet user simply has is a network account consisting of a block of computer storage that is owned by a network service provider. As a user, we may think that storage space to be like a “virtual home,” and with that strong privacy protection similar to our physical homes. However, that “home” is a block of ones and zeroes stored somewhere on someone’s computer. As a consequence, some of our most private information is sent to third parties and held far away on remote network servers. A Twitter user may think that the same “home” principle may be applied to their Twitter account. When in reality the user is sending information to the third party, Twitter. At the same time the user is also granting a license for Twitter to distribute that information to anyone, any way and for any reason it chooses.The attorney representing Harris told The Atlantic Wire that he will move to re-argue the decision and that the judge “had mixed up his metaphors.” Attorney Martin Stolar said, “There’s a whole other recent series of decisions from Supreme Court and New York State, about whether or not using a GPS device to track someone uses a warrant. People’s locations while on the street are generally public, like tweets are, but it’s the accumulation of all that information, like someone’s whereabouts, that the courts have said a subpoena is necessary … I think that’s more analogous to tweets than the bank records are.” The government previously issued an Occupy Boston Twitter hashtag subpoena and then claimed you have no right to anonymous speech on Twitter. It’s a trap? Between the Stored Communication Act, a part of Electronic Communications Privacy Act, and social media monitoring, it seems that not only anonymous free speech, but exercising free speech on social media at all is increasingly more dangerous in the United States.Just keep in mind: what you tweet can, and probably will, be used against you in a court of law.Like this? Here’s more posts:Stop Cyber Spying: Stop CISPA the New Enemy of the InternetSmile for the drone: Coming to police stations near you soonFBI Warns Smart Meter Hacking May Cost Utility Companies $400 Million A YearWill we trade freedom for application security?Senator Al Franken: Privacy is a Fundamental RightCounterterrorism database stores all Americans as potential domestic terroristsIs Google co-founder in ‘digital denial’ about walled gardens and web freedom?New Gov’t Weapon: Warrantless Cell Phone SurveillanceCIA wants to spy on you through your appliancesCourt to DOJ: Surfing on Work PC Isn’t HackingUS-CERT: Social engineers target utilities with fake Microsoft support callsHow Hacktivism Led to Discovering Digital Arms DealersYawn, pace, or stare into space? Ridiculous DHS List: You Might Be a Terrorist If…DHS social media monitoring: Watched Facebook, emailed police, arrested photographerFirst Amendment Be Damned: Out of control TSA threatens bloggers Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe