Does Elon Musk Owning Twitter Increase Cyber Security Risks?

Elon Musk has finally bought Twitter for $44 billion and Saudi Arabian Prince Alwaleed bin Talal helped Musk finance the $44 billion acquisition of Twitter by rolling over his $1.9 billion shares in the social media company. That decision makes Saudi entities the second-largest shareholder in Twitter, behind only Musk himself.

Now US Senator Chris Murphy is calling on the federal government to investigate national security concerns raised by Saudi Arabia’s role in Elon Musk’s takeover of Twitter. “We should be concerned that the Saudis, who have a clear interest in repressing political speech and impacting US politics, are now the second-largest owner of a major social media platform,” Senator  Murphy said in a Twitter tweet.

Critics of Elon Musk’s purchase of Twitter say it will reduce the limits on hate speech and misinformation. Furthermore, some say acquisition also presents major cyber security concerns. Now that a critical public communications network has become private property, there are major cyber risks to be addressed.

Elon Musk’s fortune comes from owning Tesla; he had to sell off some of his stock to gain the cash needed to complete the Twitter deal. However, Tesla depends on the Chinese Communist Party’s good graces not just for its manufacturing (its Gigafactory in Shanghai makes over 70,000 cars a month), but also 24% of its revenue and its primary growth market.

This means a crucial communications network is now owned by a man whose business and personal fortune are open to the influence of an authoritarian government, one that has proven itself to happy to use intimidation against both companies and other governments for political purposes.

Not so long ago, Twitter was considered a "wild west," where threat actors who ranged from ISIS to Neo-Nazis to Russian trolls ran wild, easily pushing hate, calls for violence and disinformation on topics ranging from elections to the pandemic. 

Over time, Twitter's management - now dismissed by Musk - learned several hard lessons and Twitter developed a range of policies for user safety and content moderation. Not everyone agreed on them, but they transformed the social media platform into a less hateful place and some commentators are questioning what might happen ow that Twitter is run by someone who doesn’t just oppose the concept of content moderation, but is himself a frequent and often controversial user?

According to reports, the new owner intends to improve Twitters profitability to recover his investment and has already introduced a fee for users who want to keep or register to be awarded the blue tick signifying a verified user. The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

Another measure to improve profitability is to cut costs by cutting the workforce, possibly by as much as 75 percent and large-scale dismissals have already been announced. Such massive headcount reductions are likely to affect security team numbers, capability, and overall workforce quality. A drop in cyber security resilience is a concern for the hundreds of millions of Twitter users, from celebrities to service members, whose personal information is held by the platform.

Critics argue that this danger goes beyond protecting users' data privacy. This is because of the  particularly influential role that Twitter plays in the social media ecosystem where it is the 'go-to place' for policymakers, the media and large numbers of the public to find and share information on fast-moving topics of news, especially during crises, conflict and elections.

Twitter:    DefenseOne:     CNN:    Bloomberg:     Wired:     Trend Micro:  

You Might Also Read: 

Twitter, Free Speech & Disinformation

 

« AI Scannning For Weapon At Sports Venues & Arenas
Russia Prepares To Disconnect From The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.