dragnet surveillance

ICIT Introduces: Center for Cyber-Influence Operations Studies (CCIOS)

“This is an advisory that studies the weaponized digital applications used by foreign nation-states for influence operations” – James Scott, Sr. Fellow ICIT & CCIOS The weaponization of digital vectors for a more expedient and potent manner of message delivery has become a pandemic as nation-states use technological means to streamline distribution of fake news, .. read more

Equifax: The Hazards of Dragnet Surveillance Capitalism Part 2: Just Another Data Breach? Or C-Suite Criminal Negligence?

The reckless handling of data collected in capitalistic dragnet surveillance has developed into a national security and privacy epidemic.  The Equifax breach should epitomize the consequences of negligent data brokerage and serve as a wake-up call to similar organizations who profit from dragnet surveillance and the employment of psychographic and demographic Big Data algorithms. In .. read more

ICIT Publication: I Got 99 Problems But a Breach Ain’t One

Critical Infrastructure Information Security systems are failing under persistent adversarial efforts because too many organizations still depend on antiquated legacy systems, un-cyber-hygienic personnel, and devices that lack security-by-design. This is not merely a cyberwar, we are now in a state of cyber-kinetic-meta war. There was no clear beginning and there will be no end. The .. read more

ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks .. read more