Does Elon Musk Owning Twitter Increase Cyber Security Risks?

Elon Musk has finally bought Twitter for $44 billion and Saudi Arabian Prince Alwaleed bin Talal helped Musk finance the $44 billion acquisition of Twitter by rolling over his $1.9 billion shares in the social media company. That decision makes Saudi entities the second-largest shareholder in Twitter, behind only Musk himself.

Now US Senator Chris Murphy is calling on the federal government to investigate national security concerns raised by Saudi Arabia’s role in Elon Musk’s takeover of Twitter. “We should be concerned that the Saudis, who have a clear interest in repressing political speech and impacting US politics, are now the second-largest owner of a major social media platform,” Senator  Murphy said in a Twitter tweet.

Critics of Elon Musk’s purchase of Twitter say it will reduce the limits on hate speech and misinformation. Furthermore, some say acquisition also presents major cyber security concerns. Now that a critical public communications network has become private property, there are major cyber risks to be addressed.

Elon Musk’s fortune comes from owning Tesla; he had to sell off some of his stock to gain the cash needed to complete the Twitter deal. However, Tesla depends on the Chinese Communist Party’s good graces not just for its manufacturing (its Gigafactory in Shanghai makes over 70,000 cars a month), but also 24% of its revenue and its primary growth market.

This means a crucial communications network is now owned by a man whose business and personal fortune are open to the influence of an authoritarian government, one that has proven itself to happy to use intimidation against both companies and other governments for political purposes.

Not so long ago, Twitter was considered a "wild west," where threat actors who ranged from ISIS to Neo-Nazis to Russian trolls ran wild, easily pushing hate, calls for violence and disinformation on topics ranging from elections to the pandemic. 

Over time, Twitter's management - now dismissed by Musk - learned several hard lessons and Twitter developed a range of policies for user safety and content moderation. Not everyone agreed on them, but they transformed the social media platform into a less hateful place and some commentators are questioning what might happen ow that Twitter is run by someone who doesn’t just oppose the concept of content moderation, but is himself a frequent and often controversial user?

According to reports, the new owner intends to improve Twitters profitability to recover his investment and has already introduced a fee for users who want to keep or register to be awarded the blue tick signifying a verified user. The blue Verified badge on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic, notable, and active.

Another measure to improve profitability is to cut costs by cutting the workforce, possibly by as much as 75 percent and large-scale dismissals have already been announced. Such massive headcount reductions are likely to affect security team numbers, capability, and overall workforce quality. A drop in cyber security resilience is a concern for the hundreds of millions of Twitter users, from celebrities to service members, whose personal information is held by the platform.

Critics argue that this danger goes beyond protecting users' data privacy. This is because of the  particularly influential role that Twitter plays in the social media ecosystem where it is the 'go-to place' for policymakers, the media and large numbers of the public to find and share information on fast-moving topics of news, especially during crises, conflict and elections.

Twitter:    DefenseOne:     CNN:    Bloomberg:     Wired:     Trend Micro:  

You Might Also Read: 

Twitter, Free Speech & Disinformation

 

« AI Scannning For Weapon At Sports Venues & Arenas
Russia Prepares To Disconnect From The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Netskope

Netskope

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.