Formerly known as Wikibon

A New Era of Cyber Security – The Weaponization of Social Data

Cyber Warfare: A Dangerous Game of Escalation

At the recent CyberConnect cyber security event in NYC, John Furrier and I sat down with James Scott, Sr. Fellow at the Institute for Critical Infrastructure Technology (ICIT). James and his colleague Parham Eftekhar are experts in cyber security and consult with officials in the US Senate and other federal agencies. This was one of the most interesting interviews we’ve conducted this year. Here’s a quick summary but I’d urge you to listen to the video clips from the interview. According to Scott:

 

  • The biggest threat to our national security is the “weaponization of social media.”
  • Social media giants like Facebook, Google and others are using metadata access to essentially censor what users see to profit from what Scott calls “dragnet surveillance.”
  • Russia, China, Iran and other nation states have dramatically different approaches to how they approach hacking…their play books are are noticeably different and often clearly discernable.
  • Nation states generally and Russia specifically are adept at targeting critical infrastructure executives and duping them to steal credentials.
  • A sophisticated “cyber caliphate” has emerged that exploits digital tooling to accelerate the radicalization of Islamic terrorists.
  • Social media platforms like Facebook are more relevant than institutions like the United Nations. Such media are able to shape public opinion and influence policy much more than established systems.
  • As a result, nation states can begin to control populations without firing a shot. Through fake news, content placement and media manipulation, major players can affect outcomes through social media.
  • The 2020 election is going to be a war of ideas, memes and influence, fought on the battlegrounds of social platforms.
  • Beware! If you stay in a Chinese owned hotel (like the Waldorf Astoria) – they may be listening.

Video Summary

Here’s the curated interview:

 

Here are the sequences of the video clips – there’s so much great information here from James Scott that I hope you can take the time to listen:

  •  James Scott of ICIT is all over Cyber, Federal & the Future
  •  ICIT & Centrify bring the content and the star speakers follow
  •  How ICIT consults with federal agents on advanced persistent threats (APTs)
  •  How Nation States Dupe Critical Infrastructure Executives
  •  The Different Hacking Profiles of Russia, China and other Nation States
  •  How NATO and US Allies Collaborate on Cyber
  •  Legislation to Weaken Encryption is Like Outlawing Math!
  •  “I can’t comment on Stuxnet”
  •  Facebook is More Relevant than the UN
  •  The Biggest Threat: The Weaponization of Facebook, Twitter, Youtube & Google
  •  How Millennials Think About Security & Privacy
  •  Does Public Policy Miss the Point on Cyber?
  •  How to Control the Population without Firing Guns @icitorg
  •  Propaganda will Shape the 2020 Election – @icitorg
  •  How Media Manipulation Shapes your Thinking
  •  How Fake News Works
  •  How the Cyber Caliphate Recruits & Accelerates Self-Radicalization
  •  How Bad Guys Use Data to Attack and Manipulate the US
  •  The Chinese are Buying Hotels…there’s a reason – they’re listening!
Article Categories

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
"Your vote of support is important to us and it helps us keep the content FREE. One click below supports our mission to provide free, deep, and relevant content. "
John Furrier
Co-Founder of theCUBE Research's parent company, SiliconANGLE Media

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well”

You may also be interested in

Book A Briefing

Fill out the form , and our team will be in touch shortly.
Skip to content