The New Cyber-Kinetic Meta-War

ICIT Brief on Metadata – The Most Potent Weapon in This Cyberwar

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks that weaponize psychographic and demographic Big Data algorithms.

In this publication, entitled “Metadata: The Most Potent Weapon in This Cyber War – The New Cyber-Kinetic-Meta War,” the Institute for Critical Infrastructure Technology (ICIT) offers a rich analysis of this underreported threat to our National Security through a comprehensive assessment of how meta-exploits are hyper-evolving an already next-generation adversarial landscape. 

This includes discussions on:

  • How dragnet surveillance and retroactive legislation impede cybersecurity
  • How S.J. Res 34 allows ISPs to undermine national security and privacy
  • How Meta-Exploits expedite nation-state attacks on critical infrastructure
  • How Meta-Exploitation:
    • of Big data and metadata augments extremist recruiting of Niche personnel enables cyber-kinetic attacks
    • Unmasks users with psychographic and demographic algorithms
    • Transforms remote contractors into insider threats
    • Undermines Democratic institutions
    • Impedes financial systems
    • Precisely tailors disinformation and fake news
    • Disrupts energy systems
    • Can cripple the healthcare sector

This paper was authored by James Scott, Sr. Fellow, ICIT. ICIT will present a brief on the paper on Sept 26, 2017 ICIT Cyber Intelligence Briefing in Washington D.C. – Register Here.

Download the paper here: http://icitech.org/wp-content/uploads/2017/07/ICIT-Brief-Metadata-The-Most-Powerful-Weapon-in-This-Cyberwar1.pdf

This is a Security Bloggers Network syndicated blog post authored by The Cylance Team. Read the original post at: Cylance Blog