Does Elon Musk Owning Twitter Increase Cyber Security Risks?

Elon Musk has finally bought Twitter for $44 billion and Saudi Arabian Prince Alwaleed bin Talal helped Musk finance the $44 billion acquisition of Twitter by rolling over his $1.9 billion shares in the social media company. That decision makes Saudi entities the second-largest shareholder in Twitter, behind only Musk himself.

Now US Senator Chris Murphy is calling on the federal government to investigate national security concerns raised by Saudi Arabia’s role in Elon Musk’s takeover of Twitter. “We should be concerned that the Saudis, who have a clear interest in repressing political speech and impacting US politics, are now the second-largest owner of a major social media platform,” Senator  Murphy said in a Twitter tweet.

Critics of Elon Musk’s purchase of Twitter say it will reduce the limits on hate speech and misinformation. Furthermore, some say acquisition also presents major cyber security concerns. Now that a critical public communications network has become private property, there are major cyber risks to be addressed.

Elon Musk’s fortune comes from owning Tesla; he had to sell off some of his stock to gain the cash needed to complete the Twitter deal. However, Tesla depends on the Chinese Communist Party’s good graces not just for its manufacturing (its Gigafactory in Shanghai makes over 70,000 cars a month), but also 24% of its revenue and its primary growth market.

This means a crucial communications network is now owned by a man whose business and personal fortune are open to the influence of an authoritarian government, one that has proven itself to happy to use intimidation against both companies and other governments for political purposes.

Not so long ago, Twitter was considered a "wild west," where threat actors who ranged from ISIS to Neo-Nazis to Russian trolls ran wild, easily pushing hate, calls for violence and disinformation on topics ranging from elections to the pandemic. 

Over time, Twitter's management - now dismissed by Musk - learned several hard lessons and Twitter developed a range of policies for user safety and content moderation. Not everyone agreed on them, but they transformed the social media platform into a less hateful place and some commentators are questioning what might happen ow that Twitter is run by someone who doesn’t just oppose the concept of content moderation, but is himself a frequent and often controversial user?

According to reports, the new owner intends to improve Twitters profitability to recover his investment and has already introduced a fee for users who want to keep or register to be awarded the blue tick signifying a verified user. The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

Another measure to improve profitability is to cut costs by cutting the workforce, possibly by as much as 75 percent and large-scale dismissals have already been announced. Such massive headcount reductions are likely to affect security team numbers, capability, and overall workforce quality. A drop in cyber security resilience is a concern for the hundreds of millions of Twitter users, from celebrities to service members, whose personal information is held by the platform.

Critics argue that this danger goes beyond protecting users' data privacy. This is because of the  particularly influential role that Twitter plays in the social media ecosystem where it is the 'go-to place' for policymakers, the media and large numbers of the public to find and share information on fast-moving topics of news, especially during crises, conflict and elections.

Twitter:    DefenseOne:     CNN:    Bloomberg:     Wired:     Trend Micro:  

You Might Also Read: 

Twitter, Free Speech & Disinformation

 

« AI Scannning For Weapon At Sports Venues & Arenas
Russia Prepares To Disconnect From The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.