Institute for Critical Infrastructure Technology – “Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks that weaponize psychographic and demographic Big Data algorithms. In this publication, entitled “Metadata: The Most Potent Weapon in This Cyber War – The New Cyber-Kinetic-Meta War,” ICIT offers a rich analysis of this underreported threat to our National Security through a comprehensive assessment of how meta-exploits are hyper-evolving an already next-generation adversarial landscape. This includes discussions on:
- How dragnet surveillance and retroactive legislation impede cybersecurity
- How S.J. Res 34 allows ISPs to undermine national security and privacy
- How Meta-Exploits expedite nation-state attacks on critical infrastructure
- How Meta-Exploitation:
- of Big data and metadata augments extremist recruiting
- of Niche personnel enables cyber-kinetic attacks
- Unmasks users with psychographic and demographic algorithms
- Transforms remote contractors into insider threats
- Undermines Democratic institutions
- Impedes financial systems
- Precisely tailors disinformation and fake news
- Disrupts energy systems
- Can cripple the healthcare sector..”
Sorry, comments are closed for this post.