Social Media & 21st-Century Warfare

One lawmaker believes Russia’s use of social media to influence last year’s election demonstrated how warfare has moved away from the battlefield and toward the Internet and the US has been slow to adjust.

US Democrat Senator Mark Warner said “We may have in America the best 20th-century military that money can buy, but we’re increasingly in a world where cyber vulnerability, misinformation and disinformation may be the tools of conflict,” 

“What we may have seen are the first tools of 21st-century disinformation.”

As vice chairman of the Senate Intelligence Committee, Warner has helped lead one of the congressional investigations into the Russian meddling in the 2016 election.

During a public interview with The Atlantic’s Steve Clemons, he gave updates on the progress of the investigation and stressed the importance of social media companies helping Congress understand the extent of Russia’s involvement.

According to Warner, there are three things the committee knows to be true: Russia hacked both political parties and used that information in President Donald Trump’s favor; Russia attacked but didn’t fully break into the voter registration systems of 21 states; Russia used paid advertising and fake accounts on social media to disseminate misinformation to voters.

The sophistication of Russia’s cyber campaign was “unprecedented,” he said. It was also cheap. Warner said the amount Moscow spent in total influencing the American, French and Dutch elections was about a quarter the cost of building an F-35 fighter jet.

“If Russia’s goal was primarily to sow chaos … and secondarily elect Mr. Trump, they had a pretty good rate of return,” he said.

While Warner said social media companies have helped the investigation thus far, there’s still more they can do.

For instance, though Facebook linked a troll farm in St. Petersburg, Russia, to many election-related ads, he said the company has so far only sought out bad actors who paid for ads in Russian rubles. “I think the Russian services maybe know how to use dollars and euros,” he said.

Later, after his committee met with Twitter officials, Warner said the company “showed an enormous lack of understanding” on the seriousness of this issue, CBS reported. He also called the meeting “deeply disappointing.”

The committee has already asked Twitter, Facebook and Google to testify before Congress on Nov. 1.

In addition to reluctant social media companies, another barrier the committee has faced is Trump’s unwillingness to acknowledge any Russian involvement in the first place, Warner said. Without any point of contact in the White House, it’s difficult to lead a government-wide effort to bolster electoral systems against a future attack.

“Our job is to determine whether there was collaboration or collusion, but equally if not more importantly, to determine, how to prevent this from happening again,” he said.

DefenseOne:

You Might Also Read:

Hillary Clinton’s Cyber Warfare Warning:

Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations:

 

« Cyber Criminals Threaten DDoS Attacks
Phishing Is The Top Cyberattack Vector In 2017 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.