Social Media Intelligence

Secret Architects behind Social Media’s Non Violent Revolution

Communication between parties is now constant and happens at the speed of light. Regardless of which generation you are from, baby boomers, X, Y etc or whether you are in a private organisation, government or corporate, social media platform use continues to rise. The big question is how to handle it and avoid becoming the victim of a ‘non-violent revolution’.

“Every two days now we create as much information as we did from the dawn of civilization up until 2003” – Eric Schmidt.”

Social media is a necessity for many corporations, trying to advertise their products and reaching new or potential customers and for governments to pass new ideas, legislations and Act’s to their constituents. At the end of any social media information are all of us.

Saying that, social media is nothing less and nothing more than an exchange of information – unprocessed, non-filtered and non-controlled content in most occasions and typically it is tangible.

Social media platforms are often used to spark non-violent resistance/revolutions, not only against individuals but also corporations or governments. It is now the most effective way is to destroy reputation and credibility.

Beginning of Social Media Non-Violent Revolutions/Resistance

I believe the starting point of when social media was used as a tool for non-violet resistance was 1998 when Mr Srdjan Popovic, the leader of the “Resistance” movement used non-violent methods, including social media, to remove president Slobodan Milosevic and his regime. Mr Srdjan Popovic published several books about non-violent resistance and heavily included social media platforms as a tool.

The burning torch of political revolution which shaped Middle East in recent times started in the Winter of 2011 with a single matchstick, Mr Mohammed Bouaziz, who committed self-immolation and that news sparked an entire new Middle East confilict. The platform used to speed up the Arab Spring uprising was Twitter.

To understand the social media platform, Twitter, for example, you must understand that Twitter according to its web site states “What you share on Twitter may be viewed all around the world instantly. You are what you Tweet!”

There are so many other examples in past decade of using social media platforms as a tool for non-violent revolutions/resistance. However, it appears most corporations and governments have not learned lessons from it. The question is not when or where it is happening, but that it is it happening in the background without knowing. The most important question is who are the architects of such social media non-violent resistance/revolution and how this will impact corporations or government.

Corporations and social media are best friends until these non-violent architects behind curtains decide to use social media to turn against corporations or governments. Corporations will use all means at their disposal to grow their army of followers and engage the most successful PR / Media companies to create appealing images for their audience. Corporations and governments spend millions of dollars in monitoring success rates via SEO gurus and their companies. It takes just one spark for architects of non-violent resistance/revolution to use same audience for creating results that damage reputation, brand, even stop corporations trading or perhaps to turn political opinion in favor of others.

The biggest failure for most corporations and governments is to spend so much time in data mining and collecting data about audience that the most crucial element is disregarded – the need to develop Key Intelligence Needs for preventing architects to spark non-violent revolution across all social media platforms.

Developing these Key Intelligence Needs and the information Risk Management Protocols that go with them give corporations and governments a fighting chance to successfully combating a non-violent revolution. There are many highly skilled human intelligence /counter intelligence operatives available who have been well schooled in monitoring information and investigating sources. It is imperative to understand that every piece of information has a source and each person of interest a name and surname. These individuals are the architects of non-violent resistance/revolution and once information is on social media platform it is most likely that information will reach end consumer – all of us.

Information Risk Management Protocol is a reality for every corporation or government. How information is monitored, stored and distributed as well developing Key Intelligence Needs should include human intelligence/investigative experts along with cyber and business intelligence specialists, particularly in an era where the Deep/Dark Web is more and more present in daily life and can be used to silently influence social media.

Insight Intelligence Group - Charity

 

As most of you already know, I am getting in the ring for the second time in a couple of weeks – 7th April 2018 @ The Star Casino Sydney.

It is huge challenge for myself and everyone else around me, trying to complete daily work, book writing, studying and most importantly time with my son Matteo who every day make sure I walk, talk and not to be in pain and it is extremely challenge for him to keep his 46 y/o “old man” happy without Nutella.

Reason why I am doing this, is not money, not a glory, not promotion but to give back to the life and to empower those who needs most. Those who think that there is no other way that to end their life and SUICIDE not only sucks but shouldn’t happen on first place.

Suicide claims 8 Australian lives per day. It is the leading cause of death among those aged 15-44.

The goal here is to raise as much money as possible for the Black Dog Institute – they do incredible job and they need your support, my sweat and all assistance you can offer.

Thank you all on my behalf, my company behalf and all those who are supporting me in this cause.

https://corporatefighter2018.everydayhero.com/au/mario-mean-machine-bekes

 

@blackdoginst @corporatefighter @corporatefitnesscentre @thestarsydney #blackdoginstitute #corporatefighter #thestar #april6th142

Cyber Security and Human Intelligence

Human Element Presents Biggest Cyber Risk

The human element of cyber risk presents one of the biggest challenges in the security environment, one expert has said.

While many businesses will rightly focus on the digital elements of cyber security and attack prevention, such as ensuring server security or malware protection, staff training is just as important.

Phishing-type cyber attacks utilising ransomware are now commonplace and the impact they have on Australian businesses can be devastating. The person that receives an email or accepts an online scenario at face-value is often the weakest link in the security chain, said Mario Bekes, managing director of Insight Intelligence, and no IT system can protect a business from ignorance.

Bekes said that companies need to invest in their ‘human firewall’ to help protect against attacks which are becoming ever-more sophisticated in their use of social engineering.

“We have seen a growing awareness from firms of the need to look at their cyber security from a people perspective and not just an IT perspective. However, there is a long way to go for firms to act on this effectively,” Bekes told Insurance Business.

For brokers, it is important that their clients remain informed about the changing threat landscape. Relevant, on-going staff training could be the difference between the prevention of a cyber-attack or a small business being forced to pay a ransom for their data in the event of a breach.

Bekes said that all businesses should consider cyber cover and stressed that the industry has an important role to play in the cyber security market.

“I’m no insurance broker, but I think every business should consider cyber protection and what the consequences are if they get compromised,” he explained. “Insurance has a big role to play in this and insurers have the opportunity to play a leading role in helping to stop problems in the first place.”

It is often said that any business with an internet connection is at risk of cyber-attacks and experts across both the cyber security and cyber insurance industry have said that ignorance is no longer a defence. This could have a lasting impact on the insurance landscape as it means that directors could be held responsible in the event of a data breach.

The rise of the Internet of Things (IoT) will see more threats created in 2017 and beyond. One recent attack, which shut down major international sites such as Netflix, Twitter and Paypal by utilising security cameras and other IoT devices, points to the future of cyber-attacks around the world.

Bekes sees the development of IoT-based attacks as a key issue for the cyber industry over the coming year. By utilising smart devices, hackers will be able to attack more businesses with more frequency, highlighting the importance cyber cover will increasingly have.

Mario Bekes

Cyber Security and Human Intelligence

Turning cyber defence into proactive protection

302-2On a daily basis the tabloids report new cyber-attacks and in the past 12 months some of the largest organisations have lost considerable amounts of data. This includes people’s private information as well as company data. Lloyd’s of London predicts the value to be $53billion this year alone – and that does not factor in losses from damaged reputations.

In military terminology, cyber attacks would be considered as asymmetric warfare where a perpetrator using minimal logistics, tactics and resources attacks a primary target and chooses the time and place of the cyber-attack. Unfortunately, it is most likely the perpetrators will never be prosecuted, instead the ransoms will continue and losses will accumulate to the point that some corporations will yield and many SME’s will cease to function.  We are all so reliant on technology, this is where we are heading.

In today’s business DNA age, corporations heavily rely on automated systems and software to protect and defend their intellectual property. What few focus on is changing their approach from defence to reducing/minimsing the risk. With one click you can purchase the ultimate defending software or simply hire an IT company that specialises in cyber protection. However, this approach will not produce the take way the problem. Cyber attackers see the challenge to hack your company and in most of the cases the source codes of defence software can be found in the deep or dark web.

Sophisticated cyber attackers do not randomly choose their next victim. They do their research, they apply social engineering to collect data about their victim and all of this is converted into useful intelligence. Once when useful intelligence is viable the attack will occur.

No one knows the extent of the total cyber-attacks that have happened or are happening right now. We do know that it is occurring, and it will continue unless corporations and governments start combining and sharing their social media and human intelligence coupled with ongoing employee training to help them recognise possible cyber-attacks.

Perpetrators will use all the available tools possible in their possession. In most cases all they need is a computer screen and their social engineering skills. Every corporation’s weakest link is the human factor not your IT system or the software you are using. People know how and where your data is stored but what they don’t know who is weakest link in your organisation to open that door.

Proactively applying the methods and tactics of human and social media intelligence combined with your technical defence strategies will guarantee your safety. It is a simple formula, if you respond to a cyber-attack by paying the ransom or adding extra IT protection features you defend yourself. What you need to add is monitoring trends and patterns, training your key staff in human intelligence, helping employees recognise social engineering and understanding how to effectively investigate incidents.

It needs to be understood that perpetrators can inflict considerable damage with minimal resources (asymmetric warfare) even if when a corporation spends huge amounts to tighten IT security measures. The battle is lost when the most important factor, the human factor, has been taken out of equation.

Before responding to a cyber attack, you must understand who your opponent is and what their modus operandi is. The only way to do this is by applying human and social media intelligence methods.

 

Mario Bekes