Formerly known as Wikibon
Search
Close this search box.

A New Era of Cyber Security – The Weaponization of Social Data

Cyber Warfare: A Dangerous Game of Escalation

At the recent CyberConnect cyber security event in NYC, John Furrier and I sat down with James Scott, Sr. Fellow at the Institute for Critical Infrastructure Technology (ICIT). James and his colleague Parham Eftekhar are experts in cyber security and consult with officials in the US Senate and other federal agencies. This was one of the most interesting interviews we’ve conducted this year. Here’s a quick summary but I’d urge you to listen to the video clips from the interview. According to Scott:

 

  • The biggest threat to our national security is the “weaponization of social media.”
  • Social media giants like Facebook, Google and others are using metadata access to essentially censor what users see to profit from what Scott calls “dragnet surveillance.”
  • Russia, China, Iran and other nation states have dramatically different approaches to how they approach hacking…their play books are are noticeably different and often clearly discernable.
  • Nation states generally and Russia specifically are adept at targeting critical infrastructure executives and duping them to steal credentials.
  • A sophisticated “cyber caliphate” has emerged that exploits digital tooling to accelerate the radicalization of Islamic terrorists.
  • Social media platforms like Facebook are more relevant than institutions like the United Nations. Such media are able to shape public opinion and influence policy much more than established systems.
  • As a result, nation states can begin to control populations without firing a shot. Through fake news, content placement and media manipulation, major players can affect outcomes through social media.
  • The 2020 election is going to be a war of ideas, memes and influence, fought on the battlegrounds of social platforms.
  • Beware! If you stay in a Chinese owned hotel (like the Waldorf Astoria) – they may be listening.

Video Summary

Here’s the curated interview:

 

Here are the sequences of the video clips – there’s so much great information here from James Scott that I hope you can take the time to listen:

  •  James Scott of ICIT is all over Cyber, Federal & the Future
  •  ICIT & Centrify bring the content and the star speakers follow
  •  How ICIT consults with federal agents on advanced persistent threats (APTs)
  •  How Nation States Dupe Critical Infrastructure Executives
  •  The Different Hacking Profiles of Russia, China and other Nation States
  •  How NATO and US Allies Collaborate on Cyber
  •  Legislation to Weaken Encryption is Like Outlawing Math!
  •  “I can’t comment on Stuxnet”
  •  Facebook is More Relevant than the UN
  •  The Biggest Threat: The Weaponization of Facebook, Twitter, Youtube & Google
  •  How Millennials Think About Security & Privacy
  •  Does Public Policy Miss the Point on Cyber?
  •  How to Control the Population without Firing Guns @icitorg
  •  Propaganda will Shape the 2020 Election – @icitorg
  •  How Media Manipulation Shapes your Thinking
  •  How Fake News Works
  •  How the Cyber Caliphate Recruits & Accelerates Self-Radicalization
  •  How Bad Guys Use Data to Attack and Manipulate the US
  •  The Chinese are Buying Hotels…there’s a reason – they’re listening!

Keep in Touch

Thanks to Alex Myerson and Ken Shifman on production, podcasts and media workflows for Breaking Analysis. Special thanks to Kristen Martin and Cheryl Knight who help us keep our community informed and get the word out. And to Rob Hof, our EiC at SiliconANGLE.

Remember we publish each week on theCUBE Research and SiliconANGLE. These episodes are all available as podcasts wherever you listen.

Email david.vellante@siliconangle.com | DM @dvellante on Twitter | Comment on our LinkedIn posts.

Also, check out this ETR Tutorial we created, which explains the spending methodology in more detail.

Note: ETR is a separate company from theCUBE Research and SiliconANGLE. If you would like to cite or republish any of the company’s data, or inquire about its services, please contact ETR at legal@etr.ai or research@siliconangle.com.

All statements made regarding companies or securities are strictly beliefs, points of view and opinions held by SiliconANGLE Media, Enterprise Technology Research, other guests on theCUBE and guest writers. Such statements are not recommendations by these individuals to buy, sell or hold any security. The content presented does not constitute investment advice and should not be used as the basis for any investment decision. You and only you are responsible for your investment decisions.

Disclosure: Many of the companies cited in Breaking Analysis are sponsors of theCUBE and/or clients of theCUBE Research. None of these firms or other companies have any editorial control over or advanced viewing of what’s published in Breaking Analysis.

You may also be interested in

Book A Briefing

Fill out the form , and our team will be in touch shortly.
Skip to content