Rapper Talib Kweli banned from Twitter after dispute with woman | The Guardian

Kweli has been suspended for ‘repeated violations of Twitter rules’, but denies harassing Maya Moody on the platformThe US rapper Talib Kweli has been barred from Twitter after sending dozens of messages to a woman, Maya Moody, on the platform.Twitter told the website Jezebel that it had permanently suspended Kweli’s account for “repeated violations of the Twitter rules … Violence, harassment and other similar types of behaviour discourage people from expressing themselves.” The account had been suspended in late July, with Kweli claiming he had moved over to the website Patreon. Continue reading…

Kweli has been suspended for ‘repeated violations of Twitter rules’, but denies harassing Maya Moody on the platform

The US rapper Talib Kweli has been barred from Twitter after sending dozens of messages to a woman, Maya Moody, on the platform.

Twitter told the website Jezebel that it had permanently suspended Kweli’s account for “repeated violations of the Twitter rules … Violence, harassment and other similar types of behaviour discourage people from expressing themselves.” The account had been suspended in late July, with Kweli claiming he had moved over to the website Patreon.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more