Fake News Will Lead To A Cyber War

Fake news - we have all heard about it, but sometimes struggle to grasp the extent of its impact. With the next generation moving to online and social media as the go-to news source, and a good chunk of what is put out on social media being fake, it is left up to the reader to determine whether the information is true or not.  

When people start to believe everything they read, it makes the world a very unpredictable place. With no indicators on the source or truth of the news on social media, many countries, democracies and nation states will struggle with transparency and could become politically unstable.

It only takes one fake news story from a trustworthy source to devalue the entire news feed, forcing us to question what is real and what is not.

To put it bluntly, fake news is a form of cyber attack and will only grow significantly in 2018 and beyond.

Fake News Leads to Cyberwar

Information cyber wars have become a major disruption to our way of life, filling our daily news and feeds with fake information to influence our actions and change the outcome of important and vital decisions.

Rather than focusing on important citizen’s needs, such as taxes, healthcare and education, many governments are now embroiled in trust and transparency challenges caused by the continuous disruption from cyber-attacks.   
 
Many recent cyber incidents have been stealing huge amounts of personal and sensitive information that is then being used to pursue and influence our nation’s decision making.

When a cyber-attack from another nation-state tries to influence our way of life, our society, or the outcome of our democracy, should this be considered an act of war?

Large troll factories and botnet farms are using our stolen personal information to guarantee that our news feeds are filled with fake information that attracts your reaction to respond and participate, creating a growing trend which now circles your friends and family.

This all starts from a machine-controlled bot, which is not to get you to click on a link or install malicious malware, but to get you to share malicious information, influence your friend’s decisions and distrust your own government, creating divide rather than impartiality.      

Nation Ownership of Cyber Attacks Lacking

One thing that is clear is that cyber-attacks are crossing country borders and disrupting our way of life, without nation states taking responsibility.

We hear about cyber-criminal groups that are behind many of the major cyber incidents in recent years whether it was a major data breach, ransomware or government agencies classified data being targeted.  

Several companies and governments have linked these groups to nation states, but without revealing concrete evidence, these nation-states simply deny any involvement.  

Without clear cooperation and transparency, this will continue to grow as a major problem with a possibility of a full-on cyber war as retaliation.
 
Nation Acceptance of Cyber Crimes Causing Disruption

To prevent such a major catastrophe from occurring, governments and nation states need to work together with full cooperation and transparency to ensure that cyber attribution is possible and hold each other responsible for the actions of criminal organisations carrying out cyber-attacks from within their borders. 

It is important that governments do not provide a safe haven for cyber criminals to carry out such attacks, especially when they are doing it for both financial, political gains and extreme aggression.

Trust has become an issue in cyberspace and information wars are in full effect with the clear intention of political and social disruption. This itself should be considered an intent of war using extreme aggression. It is time for governments to act, protect democracy and our way of life.

SecurityInfoWatch:      Image: Nick Yougson

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Does Fake News Affect Threat Intelligence?:
          
 

« IBM’s Watson Takes On The IoT
Home Working Is A Threat To Cybersecurity »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.

Gray Tier Technologies (GTT)

Gray Tier Technologies (GTT)

Gray Tier is an advanced security company that focuses on developing technical solutions to the toughest cyber security challenges facing our customers.