Beware The Ghost Stories Of Cyber Space

Former Director of NSA and CIA, Michael Hayden, has a wonderful description of Cyber Space.  He divided in to “Pipes” and “Water.” The former constituted the hardware and software of cyber space.  What made it run.  The latter was the information in it and that which flowed through it.

The on-going 2024 American Presidential campaign is  - to say the least - a highly charged one.  And already Russia, China, and Iran have used their AI powered software “bots” to “pollute the water” with false and distorted information magnified from what appear to be multiple sources. And doing it with unprecedented speed and volume.

The era of the hopeful Bill Gates’ cyber space as the “global public square” is long gone now squalid and littered with lies and half-truths taken over by bot gangs of varying ideology and purpose.

For the young people of today - my graduate students, for instance - it is a frightening new experience. Justifiably concerned, their fears are exacerbated by this polluted water turning tainted information into “ghost stories” told around the Cyber information camp fire.

While most of my young student are not familiar with Latin or Roman law, I try to tell them the watch word of an Old Spy for any social media “ghost stories” -  Caveat Emptor – buyer beware.

A Spy Smells Roses

I am an old spy and DC hand.  Consequently, I have spent four decades sorting through stories, opinions, lies, and a combination of some and all.  I smell roses, I look for the funeral.  When I hear or see information from any source - I trust nothing. 

While that somewhat cynical approach reflects my life experience as an information consumer, I suggest strongly to my students they too need to filter information from so-called social media and “news sources.” Carefully. Very carefully.

In doing so I take my lessons and I ask them to think about Three Questions as an informed information consumer: Who is saying it? Why is it being said?  Why is it being said now? 

Who is saying it?: 

It is on this first point that we are particularly vulnerable as social media consumers.  Social media in America is unregulated in any true form beside some self-inflicted efforts among the larger players and occasional government forays into election interference. And the ability to mask who says something has been the hallmark of the internet since Day One.

Now, add to it, powerful software bots powered by Artificial intelligence with an ability to repeat the lie ad-nauseum, any time, any place.  A “truth” repeated is truth that becomes believed. 

From my day, a Russian Cold War propogandists dream.  Now the capability is on steroids. Moscow’s intelligence services are currently in the lead in this practice.  Little wonder.  But, other groups – on all sides of the political spectrum in cyber space also now have this capability and are clearly using it.

Bottom line: who is passing out this information?  What is the source?  Do you recognize it?  Who are they tied to?

Why Is It Being Said?

It is equally important to ask why something is being said.  How does someone want the information to be presented to effect the situation at hand. One effective methodology is to make the information deliberately provocative and shocking.  Part click bait, part/whole propaganda. Got your attention, though, and thus it enters the information “atmosphere.”

I tell my students they need to apply their skepticism as they would to on-line commercial advertising and social influencers hawking product. These sources clearly wish to bend the interpretation of “facts” toward their bias and have you buy the “product” in a fast moving market space.

Bottom Line: Why is it being said?

Why Is it Being Said Now?

Ninety percent of life is showing up. In order words, being there is crucial.  Getting there first gives you an edge on the story.  You can bend and twist it to your will.

But, the first statement out there may not be the best insight and thus can easily be distorted or biased.  How many times have stories been corrected due to additional facts coming after the initial action– thus being ignored or downplayed by the sheer force of “getting there first.”

Famous Washington Post editor Ben Bradlee used to talk about newspapers as the “first draft of history.”

Bottom line: He never talked about how the first draft almost always had to be cleaned up.

Caveat Emptor

So, as we travel through this year’s campaigns plied and piled with the “polluted waters” of social media and so-called “news,” I remind my students to keep their mental guard up at all times.

Written on the entrance to a building I used to work in was another useful piece of advice – “and ye shall know the truth,” it reads, “and the truth shall make you free.” 

Bottom Line: Who is saying it? Why is it being said?  And why is it being said now?

Image: Ideogram

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

You Might Also Read:  

Hamlet’s IP & AI:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies
Progress In Deepfake Detection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Aleo

Aleo

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.