Beware The Ghost Stories Of Cyber Space

Former Director of NSA and CIA, Michael Hayden, has a wonderful description of Cyber Space.  He divided in to “Pipes” and “Water.” The former constituted the hardware and software of cyber space.  What made it run.  The latter was the information in it and that which flowed through it.

The on-going 2024 American Presidential campaign is  - to say the least - a highly charged one.  And already Russia, China, and Iran have used their AI powered software “bots” to “pollute the water” with false and distorted information magnified from what appear to be multiple sources. And doing it with unprecedented speed and volume.

The era of the hopeful Bill Gates’ cyber space as the “global public square” is long gone now squalid and littered with lies and half-truths taken over by bot gangs of varying ideology and purpose.

For the young people of today - my graduate students, for instance - it is a frightening new experience. Justifiably concerned, their fears are exacerbated by this polluted water turning tainted information into “ghost stories” told around the Cyber information camp fire.

While most of my young student are not familiar with Latin or Roman law, I try to tell them the watch word of an Old Spy for any social media “ghost stories” -  Caveat Emptor – buyer beware.

A Spy Smells Roses

I am an old spy and DC hand.  Consequently, I have spent four decades sorting through stories, opinions, lies, and a combination of some and all.  I smell roses, I look for the funeral.  When I hear or see information from any source - I trust nothing. 

While that somewhat cynical approach reflects my life experience as an information consumer, I suggest strongly to my students they too need to filter information from so-called social media and “news sources.” Carefully. Very carefully.

In doing so I take my lessons and I ask them to think about Three Questions as an informed information consumer: Who is saying it? Why is it being said?  Why is it being said now? 

Who is saying it?: 

It is on this first point that we are particularly vulnerable as social media consumers.  Social media in America is unregulated in any true form beside some self-inflicted efforts among the larger players and occasional government forays into election interference. And the ability to mask who says something has been the hallmark of the internet since Day One.

Now, add to it, powerful software bots powered by Artificial intelligence with an ability to repeat the lie ad-nauseum, any time, any place.  A “truth” repeated is truth that becomes believed. 

From my day, a Russian Cold War propogandists dream.  Now the capability is on steroids. Moscow’s intelligence services are currently in the lead in this practice.  Little wonder.  But, other groups – on all sides of the political spectrum in cyber space also now have this capability and are clearly using it.

Bottom line: who is passing out this information?  What is the source?  Do you recognize it?  Who are they tied to?

Why Is It Being Said?

It is equally important to ask why something is being said.  How does someone want the information to be presented to effect the situation at hand. One effective methodology is to make the information deliberately provocative and shocking.  Part click bait, part/whole propaganda. Got your attention, though, and thus it enters the information “atmosphere.”

I tell my students they need to apply their skepticism as they would to on-line commercial advertising and social influencers hawking product. These sources clearly wish to bend the interpretation of “facts” toward their bias and have you buy the “product” in a fast moving market space.

Bottom Line: Why is it being said?

Why Is it Being Said Now?

Ninety percent of life is showing up. In order words, being there is crucial.  Getting there first gives you an edge on the story.  You can bend and twist it to your will.

But, the first statement out there may not be the best insight and thus can easily be distorted or biased.  How many times have stories been corrected due to additional facts coming after the initial action– thus being ignored or downplayed by the sheer force of “getting there first.”

Famous Washington Post editor Ben Bradlee used to talk about newspapers as the “first draft of history.”

Bottom line: He never talked about how the first draft almost always had to be cleaned up.

Caveat Emptor

So, as we travel through this year’s campaigns plied and piled with the “polluted waters” of social media and so-called “news,” I remind my students to keep their mental guard up at all times.

Written on the entrance to a building I used to work in was another useful piece of advice – “and ye shall know the truth,” it reads, “and the truth shall make you free.” 

Bottom Line: Who is saying it? Why is it being said?  And why is it being said now?

Image: Ideogram

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

You Might Also Read:  

Hamlet’s IP & AI:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies
Progress In Deepfake Detection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.