Does Fake News Affect Threat Intelligence?

The concept of ‘fake news’ has plagued media for the past couple of years, but what is its impact upon business-level cyber-security?

Recently a roundtable, hosted by the Threat Intelleigence experts at Anomali, on the concept of ‘Hybrid Threats’, which was chaired by former GCHQ director turned professor Sir David Omand, and attended by a selection of industry names.

The concept of Hybrid Threats, according to Omand, was not one he is keen on and he claimed that he preferred the “old fashioned term subversion, where one country tries to influence another.” He said that this usually involved three tactics: intimidation, propaganda and dirty tricks.

The use of these tactics, he claimed, leads to “erosion in confidence,” while propaganda “restricts free speech when government has to have a reputation for truth."

All of this may not seem to be too relevant to cyber-security, but in recent instances where arrests have been made over interference in the 2016 US election, the concept of what is real and what is not needs to be a serious factor, and in the case of threat intelligence, knowing what is a genuine alert and what is fake can paint a much clearer picture of a threat.

This moved the discussion on to the concept of fake news, as Omand said:

“Threat intelligence is needed to pull together different bits of information from different sectors and see the pattern, or if it is just a coincidence.”

Valentina Soria, head of intelligence at Morgan Stanley, said that as a threat intelligence practitioner, her job is to interpret threat intelligence and make sure that the difference between fake and real news is determined.

She claimed that hybrid threats have further complicated the ability to make sense of it all, as at the heart of threat intelligence is credibility of the information you rely on, and propagation of fake news has made it much more difficult.

“We can see the potential impact that the fake news phenomena can have,” she said, claiming that threat intelligence can help a business understand threats and form a strategy, but ‘false flags’ and threat actors using different tools mean it can be difficult for a business to focus on what is a genuine threat to the business.

In an open discussion on fake news, cyber psychologist Dr Mary Aiken said that there is not a way to legislate around this, but there is an opportunity for ‘cyber ethics’ in the social media models and for the social media platforms to become more responsible players.

“When we look to having fact checking, and false claims on what a politician said, there is an absence of critical thinking to the bombardment of young people with fake and false information and it becomes a modus operandi of ‘that’s ok, everything is fake’. When a group of people who will become the policy makers in time, what will their frame of reference be and what will be their critical thinking?”

Hugh Njemanze, CEO of Anomali, said that there was a responsibility for social media algorithms to be more transparent to see what has happened and investigate, and transparency will enable that.

Soria added that it is quite hard to demonstrate the real life cause, impact and effect of fake news, especially when this could have influenced voters ahead of an election.

Aiken said that a real world sophisticated model can be created, but are they still fit for purpose in cyber-environments? That is why models need to be invested in that can make sense of human behavior and manipulation.

The conversation moved on to filtering and the need for automated tools to do such a job, but ultimately the problem remains the same when it comes to determining what is a genuine threat and what is not. Whether it is fake news or a false flag, it requires a person’s attention to determine what is important for the business.

As Soria said, threat intelligence processing involves determining a pattern that affects your business, and fake news could be the square peg trying to fit into the round hole.

Infosecurity Magazine: 

You Might Also Read:

Fake News Is A Cybesecurity Threat For Businesses:

Prime Minister Wants A 'fake news' Rapid Response Team:

 

« Autonomous Cars Hit The Road In California
Cybercriminals Use Fake Websites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Active Navigation

Active Navigation

Active Navigation is a data privacy and governance software company.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.