Media retailers just like the Each day Mail, The Mirror, and The Telegraph—have claimed that Sony’s PlayStation four is being utilized by ISIS/ISIL/Daesh to plan its assaults, with The Specific even saying PS4 was used to plot the latest horrifying assaults on Paris.

Nonetheless, as uncovered by Eurogamer, the sourcing and reporting for these tales is extraordinarily suspect. Most are based mostly on feedback from Belgium’s deputy prime minister, Jan Jambon, which got here from a debate on ISIS’s use of on-line recruitment. The talk was held three days earlier than Friday’s terrorist assaults in Paris.

“PlayStation four is much more tough to maintain observe of than WhatsApp,” he stated. “It’s totally, very tough for our providers—not solely Belgian providers however worldwide providers—to decrypt the communication that’s carried out by way of PlayStation four.”

Jambon is almost certainly referring to the PS4’s Get together Chat characteristic, which permits gamers to alternate voice and textual content messages one-to-one or in a bunch, and is certainly encrypted. Nonetheless, there is no proof that the characteristic is definitely being utilized by terrorists, not to mention that it performed an integral half within the Paris assaults.

The mainstream UK media has linked Jambon’s feedback with the Paris assaults by means of an Worldwide Enterprise Instances article, which claimed PS4 was found in raids in Belgium following the assaults. Nonetheless, this stays unconfirmed by the authorities. Notably, a fast learn of the IBT article—which accommodates the road “ISIL might convey an assault plan in Tremendous Mario Maker’s cash and share it privately with one other PS4 person”—would elevate suspicions in regards to the validity of the report.

The IBT article itself was based mostly on one other article on Forbes, which now options a big correction on the high saying: “It has not been confirmed, as initially written, console was discovered because of particular Belgian terror raids. Minister Jambon was talking about ways he is aware of ISIS to be utilizing usually.”

That these two stories led to the publication of headlines like “ISIS terrorists used Sony PlayStation four to plot Paris bloodbath” (The Specific) is at finest misinformed, at worst purposefully sensationalist. That headline has since been modified to “Did ISIS terrorists use a PlayStation four to plot Paris bloodbath within the streets?”

As Eurogamer helpfully highlighted, “[none of the stories] identified the probability PS4, a console that has bought simply shy of 30m items, could be discovered at a house in Belgium occupied by an individual of their twenties.”

Sony has since issued a press release, which reads:

“PlayStation four permits for communication amongst buddies and fellow players and, in widespread with all trendy linked gadgets, this has the potential to be abused. Nonetheless, we take our duties to guard our customers extraordinarily severely and we urge our customers and companions to report actions which may be offensive, suspicious or unlawful. Once we establish or are notified of such conduct, we’re dedicated to taking applicable actions along side the suitable authorities and can proceed to take action.”

Because the world tries to come back to grips with the atrocities that passed off in Paris on the weekend, questions are being requested about how such assaults might ever have taken place. Yesterday, it emerged that a number of former intelligence officers and media analysts have been blaming NSA whistleblower Edward Snowden for revealing intelligence businesses’ surveillance capabilities. The feedback got here following proof that the attackers from Syria have been utilizing encrypted communications.

As we famous within the report, terrorist organisations have been utilizing encryption of varied kinds for greater than 15 years a minimum of—approach earlier than Snowden’s whistleblowing. Within the UK, the assaults have prompted additional dialogue across the controversial “Snooper’s Constitution,” which might give the UK authorities the ability to demand backdoor entry to software program and gear, in addition to make it a criminal offense to disclose the existence of presidency hacking.