Social Media & 21st-Century Warfare

One lawmaker believes Russia’s use of social media to influence last year’s election demonstrated how warfare has moved away from the battlefield and toward the Internet and the US has been slow to adjust.

US Democrat Senator Mark Warner said “We may have in America the best 20th-century military that money can buy, but we’re increasingly in a world where cyber vulnerability, misinformation and disinformation may be the tools of conflict,” 

“What we may have seen are the first tools of 21st-century disinformation.”

As vice chairman of the Senate Intelligence Committee, Warner has helped lead one of the congressional investigations into the Russian meddling in the 2016 election.

During a public interview with The Atlantic’s Steve Clemons, he gave updates on the progress of the investigation and stressed the importance of social media companies helping Congress understand the extent of Russia’s involvement.

According to Warner, there are three things the committee knows to be true: Russia hacked both political parties and used that information in President Donald Trump’s favor; Russia attacked but didn’t fully break into the voter registration systems of 21 states; Russia used paid advertising and fake accounts on social media to disseminate misinformation to voters.

The sophistication of Russia’s cyber campaign was “unprecedented,” he said. It was also cheap. Warner said the amount Moscow spent in total influencing the American, French and Dutch elections was about a quarter the cost of building an F-35 fighter jet.

“If Russia’s goal was primarily to sow chaos … and secondarily elect Mr. Trump, they had a pretty good rate of return,” he said.

While Warner said social media companies have helped the investigation thus far, there’s still more they can do.

For instance, though Facebook linked a troll farm in St. Petersburg, Russia, to many election-related ads, he said the company has so far only sought out bad actors who paid for ads in Russian rubles. “I think the Russian services maybe know how to use dollars and euros,” he said.

Later, after his committee met with Twitter officials, Warner said the company “showed an enormous lack of understanding” on the seriousness of this issue, CBS reported. He also called the meeting “deeply disappointing.”

The committee has already asked Twitter, Facebook and Google to testify before Congress on Nov. 1.

In addition to reluctant social media companies, another barrier the committee has faced is Trump’s unwillingness to acknowledge any Russian involvement in the first place, Warner said. Without any point of contact in the White House, it’s difficult to lead a government-wide effort to bolster electoral systems against a future attack.

“Our job is to determine whether there was collaboration or collusion, but equally if not more importantly, to determine, how to prevent this from happening again,” he said.

DefenseOne:

You Might Also Read:

Hillary Clinton’s Cyber Warfare Warning:

Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations:

 

« Cyber Criminals Threaten DDoS Attacks
Phishing Is The Top Cyberattack Vector In 2017 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.

Device42

Device42

Device42 is a trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT.

Axelerated Solutions

Axelerated Solutions

Axelerated Solutions offer a comprehensive range of technology services tailored to meet our clients' diverse needs. Our focus is on delivering innovative and secure solutions.