Does Elon Musk Owning Twitter Increase Cyber Security Risks?

Elon Musk has finally bought Twitter for $44 billion and Saudi Arabian Prince Alwaleed bin Talal helped Musk finance the $44 billion acquisition of Twitter by rolling over his $1.9 billion shares in the social media company. That decision makes Saudi entities the second-largest shareholder in Twitter, behind only Musk himself.

Now US Senator Chris Murphy is calling on the federal government to investigate national security concerns raised by Saudi Arabia’s role in Elon Musk’s takeover of Twitter. “We should be concerned that the Saudis, who have a clear interest in repressing political speech and impacting US politics, are now the second-largest owner of a major social media platform,” Senator  Murphy said in a Twitter tweet.

Critics of Elon Musk’s purchase of Twitter say it will reduce the limits on hate speech and misinformation. Furthermore, some say acquisition also presents major cyber security concerns. Now that a critical public communications network has become private property, there are major cyber risks to be addressed.

Elon Musk’s fortune comes from owning Tesla; he had to sell off some of his stock to gain the cash needed to complete the Twitter deal. However, Tesla depends on the Chinese Communist Party’s good graces not just for its manufacturing (its Gigafactory in Shanghai makes over 70,000 cars a month), but also 24% of its revenue and its primary growth market.

This means a crucial communications network is now owned by a man whose business and personal fortune are open to the influence of an authoritarian government, one that has proven itself to happy to use intimidation against both companies and other governments for political purposes.

Not so long ago, Twitter was considered a "wild west," where threat actors who ranged from ISIS to Neo-Nazis to Russian trolls ran wild, easily pushing hate, calls for violence and disinformation on topics ranging from elections to the pandemic. 

Over time, Twitter's management - now dismissed by Musk - learned several hard lessons and Twitter developed a range of policies for user safety and content moderation. Not everyone agreed on them, but they transformed the social media platform into a less hateful place and some commentators are questioning what might happen ow that Twitter is run by someone who doesn’t just oppose the concept of content moderation, but is himself a frequent and often controversial user?

According to reports, the new owner intends to improve Twitters profitability to recover his investment and has already introduced a fee for users who want to keep or register to be awarded the blue tick signifying a verified user. The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

Another measure to improve profitability is to cut costs by cutting the workforce, possibly by as much as 75 percent and large-scale dismissals have already been announced. Such massive headcount reductions are likely to affect security team numbers, capability, and overall workforce quality. A drop in cyber security resilience is a concern for the hundreds of millions of Twitter users, from celebrities to service members, whose personal information is held by the platform.

Critics argue that this danger goes beyond protecting users' data privacy. This is because of the  particularly influential role that Twitter plays in the social media ecosystem where it is the 'go-to place' for policymakers, the media and large numbers of the public to find and share information on fast-moving topics of news, especially during crises, conflict and elections.

Twitter:    DefenseOne:     CNN:    Bloomberg:     Wired:     Trend Micro:  

You Might Also Read: 

Twitter, Free Speech & Disinformation

 

« AI Scannning For Weapon At Sports Venues & Arenas
Russia Prepares To Disconnect From The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.