Beware The Ghost Stories Of Cyber Space

Former Director of NSA and CIA, Michael Hayden, has a wonderful description of Cyber Space.  He divided in to “Pipes” and “Water.” The former constituted the hardware and software of cyber space.  What made it run.  The latter was the information in it and that which flowed through it.

The on-going 2024 American Presidential campaign is  - to say the least - a highly charged one.  And already Russia, China, and Iran have used their AI powered software “bots” to “pollute the water” with false and distorted information magnified from what appear to be multiple sources. And doing it with unprecedented speed and volume.

The era of the hopeful Bill Gates’ cyber space as the “global public square” is long gone now squalid and littered with lies and half-truths taken over by bot gangs of varying ideology and purpose.

For the young people of today - my graduate students, for instance - it is a frightening new experience. Justifiably concerned, their fears are exacerbated by this polluted water turning tainted information into “ghost stories” told around the Cyber information camp fire.

While most of my young student are not familiar with Latin or Roman law, I try to tell them the watch word of an Old Spy for any social media “ghost stories” -  Caveat Emptor – buyer beware.

A Spy Smells Roses

I am an old spy and DC hand.  Consequently, I have spent four decades sorting through stories, opinions, lies, and a combination of some and all.  I smell roses, I look for the funeral.  When I hear or see information from any source - I trust nothing. 

While that somewhat cynical approach reflects my life experience as an information consumer, I suggest strongly to my students they too need to filter information from so-called social media and “news sources.” Carefully. Very carefully.

In doing so I take my lessons and I ask them to think about Three Questions as an informed information consumer: Who is saying it? Why is it being said?  Why is it being said now? 

Who is saying it?: 

It is on this first point that we are particularly vulnerable as social media consumers.  Social media in America is unregulated in any true form beside some self-inflicted efforts among the larger players and occasional government forays into election interference. And the ability to mask who says something has been the hallmark of the internet since Day One.

Now, add to it, powerful software bots powered by Artificial intelligence with an ability to repeat the lie ad-nauseum, any time, any place.  A “truth” repeated is truth that becomes believed. 

From my day, a Russian Cold War propogandists dream.  Now the capability is on steroids. Moscow’s intelligence services are currently in the lead in this practice.  Little wonder.  But, other groups – on all sides of the political spectrum in cyber space also now have this capability and are clearly using it.

Bottom line: who is passing out this information?  What is the source?  Do you recognize it?  Who are they tied to?

Why Is It Being Said?

It is equally important to ask why something is being said.  How does someone want the information to be presented to effect the situation at hand. One effective methodology is to make the information deliberately provocative and shocking.  Part click bait, part/whole propaganda. Got your attention, though, and thus it enters the information “atmosphere.”

I tell my students they need to apply their skepticism as they would to on-line commercial advertising and social influencers hawking product. These sources clearly wish to bend the interpretation of “facts” toward their bias and have you buy the “product” in a fast moving market space.

Bottom Line: Why is it being said?

Why Is it Being Said Now?

Ninety percent of life is showing up. In order words, being there is crucial.  Getting there first gives you an edge on the story.  You can bend and twist it to your will.

But, the first statement out there may not be the best insight and thus can easily be distorted or biased.  How many times have stories been corrected due to additional facts coming after the initial action– thus being ignored or downplayed by the sheer force of “getting there first.”

Famous Washington Post editor Ben Bradlee used to talk about newspapers as the “first draft of history.”

Bottom line: He never talked about how the first draft almost always had to be cleaned up.

Caveat Emptor

So, as we travel through this year’s campaigns plied and piled with the “polluted waters” of social media and so-called “news,” I remind my students to keep their mental guard up at all times.

Written on the entrance to a building I used to work in was another useful piece of advice – “and ye shall know the truth,” it reads, “and the truth shall make you free.” 

Bottom Line: Who is saying it? Why is it being said?  And why is it being said now?

Image: Ideogram

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

You Might Also Read:  

Hamlet’s IP & AI:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies
Progress In Deepfake Detection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.