Does Elon Musk Owning Twitter Increase Cyber Security Risks?

Elon Musk has finally bought Twitter for $44 billion and Saudi Arabian Prince Alwaleed bin Talal helped Musk finance the $44 billion acquisition of Twitter by rolling over his $1.9 billion shares in the social media company. That decision makes Saudi entities the second-largest shareholder in Twitter, behind only Musk himself.

Now US Senator Chris Murphy is calling on the federal government to investigate national security concerns raised by Saudi Arabia’s role in Elon Musk’s takeover of Twitter. “We should be concerned that the Saudis, who have a clear interest in repressing political speech and impacting US politics, are now the second-largest owner of a major social media platform,” Senator  Murphy said in a Twitter tweet.

Critics of Elon Musk’s purchase of Twitter say it will reduce the limits on hate speech and misinformation. Furthermore, some say acquisition also presents major cyber security concerns. Now that a critical public communications network has become private property, there are major cyber risks to be addressed.

Elon Musk’s fortune comes from owning Tesla; he had to sell off some of his stock to gain the cash needed to complete the Twitter deal. However, Tesla depends on the Chinese Communist Party’s good graces not just for its manufacturing (its Gigafactory in Shanghai makes over 70,000 cars a month), but also 24% of its revenue and its primary growth market.

This means a crucial communications network is now owned by a man whose business and personal fortune are open to the influence of an authoritarian government, one that has proven itself to happy to use intimidation against both companies and other governments for political purposes.

Not so long ago, Twitter was considered a "wild west," where threat actors who ranged from ISIS to Neo-Nazis to Russian trolls ran wild, easily pushing hate, calls for violence and disinformation on topics ranging from elections to the pandemic. 

Over time, Twitter's management - now dismissed by Musk - learned several hard lessons and Twitter developed a range of policies for user safety and content moderation. Not everyone agreed on them, but they transformed the social media platform into a less hateful place and some commentators are questioning what might happen ow that Twitter is run by someone who doesn’t just oppose the concept of content moderation, but is himself a frequent and often controversial user?

According to reports, the new owner intends to improve Twitters profitability to recover his investment and has already introduced a fee for users who want to keep or register to be awarded the blue tick signifying a verified user. The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

Another measure to improve profitability is to cut costs by cutting the workforce, possibly by as much as 75 percent and large-scale dismissals have already been announced. Such massive headcount reductions are likely to affect security team numbers, capability, and overall workforce quality. A drop in cyber security resilience is a concern for the hundreds of millions of Twitter users, from celebrities to service members, whose personal information is held by the platform.

Critics argue that this danger goes beyond protecting users' data privacy. This is because of the  particularly influential role that Twitter plays in the social media ecosystem where it is the 'go-to place' for policymakers, the media and large numbers of the public to find and share information on fast-moving topics of news, especially during crises, conflict and elections.

Twitter:    DefenseOne:     CNN:    Bloomberg:     Wired:     Trend Micro:  

You Might Also Read: 

Twitter, Free Speech & Disinformation

 

« AI Scannning For Weapon At Sports Venues & Arenas
Russia Prepares To Disconnect From The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Sucuri

Sucuri

Sucuri provide a complete website security solution to protect against hacks and clean up after security incidents.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

BlueSwarm

BlueSwarm

With a team spanning over 4 continents, Blueswarm helps protect customers from nefarious cyber attackers.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Singularico

Singularico

Singularico help secure your software using the power of AI.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.