Five things: What the hack of the U.S. military’s Twitter account means

Five things: What the hack of the U.S. military’s Twitter account means

What does the hack of social media accounts for the U.S. military’s central command – by people claiming to be working with Islamic State (ISIL) militants – mean to Canadian governments and politicians? Here’s what you need to know. 1. A hacked Twitter account isn’t necessarily a threat to national security. Merely breaking into a Twitter account doesn’t give hackers access to state

What does the hack of social media accounts for the U.S. military’s central command – by people claiming to be working with Islamic State (ISIL) militants – mean to Canadian governments and politicians? Here’s what you need to know.

1. A hacked Twitter account isn’t necessarily a threat to national security.

Merely breaking into a Twitter account doesn’t give hackers access to state secrets, because the service isn’t directly connected to internal government systems. But such hacks are embarrassing to the target organization, and damage reputations, while they also embolden malicious attackers, according to experts.

False tweets that go out on official accounts can have wide-ranging effects. For instance, in April 2013, the Associated Press news service had its Twitter account hacked, and a false tweet proclaimed: “Breaking: Two Explosions in the White House and Barack Obama is injured.” That message sent the Dow Jones Industrial average plummeting before the Associated Press announced the hack, and had its account suspended.

In November, the Canadian government launched a “digital diplomacy” initiative that focuses on diplomats using social media to engage people. Foreign Affairs Minister John Baird has been pushing Twitter diplomacy for almost a year. But these sorts of accounts could be targets for hackers wanting to embarrass the government.

2. But how a social media account is hacked could be a problem.

One of the most popular ways to hack a social media account is to go after users through emails that look safe, but have malicious software hidden inside. These “phishing” emails are difficult to defend against, and have become more complex. Once a target takes the bait, a hacker can gain access to a private network and sensitive information.

In Monday’s attack, the hackers did something public; that alerts security officials who can then track down the source of the breach, which is better than a hacker quietly moving around a system for days, weeks or months, says Mark Nunnikhoven, vice-president cloud and emerging technologies from security the firm Trend Micro.

3. Social media accounts don’t receive high security attention.

The federal government oversees 162 social media accounts, according to a government website, including 88 Twitter accounts, 28 YouTube channels and 36 Facebook pages. (That doesn’t include the accounts of MPs and senators.) Departments usually see these accounts as marketing and communications tools. Multiple people within a department may have to access accounts on a regular basis, leading to less complicated — and less secure — passwords.

“Organizations tend to think of their public relations sides as not being mission-critical,” says David Skillicorn, a computer security expert from Queen’s University.

“People don’t take their passwords seriously enough. It never surprises me that the password is 12345.”

4. There are things government can do.

The government doesn’t control the computer network running those social media services, meaning “they’re restricted by what Twitter or YouTube is able to do,” says Nunnikhoven. “You can’t add additional (layers of) encryption because it’s not your system.”

But departments can practise proper password hygiene, he says: Make passwords more complex; don’t use the same password for multiple accounts; and control who has access to the password itself. They should also limit the number of services linked with a Twitter, YouTube or Facebook account, Nunnikhoven says, just in case one of those services gets hacked, giving malicious actors a way into a Twitter account.

5. But we don’t know what the government actually IS doing.

No one from Treasury Board responded to questions about what, if any, measures the federal government is taking to prevent itself from being the subject of a hack similar to the one that hit U.S. Central Command on Monday.

jpress@ottawacitizen.com

Twitter.com/jpress

5 things: What the hack of the U.S. military's Twitter account means

Please follow and like us:

RSS BIDD

  • The Rising influence of Chinese Social Media 16th Jan 2019
    iir.cz image from article source: flickr.com People Can Say ‘No’: The Rising influence of Chinese Social Media It is worth noting that with the wider use of internet and social media, the social media and its users obtain stronger influence in China, both domestically and internationally. The Chinese social media users, especially the young generation […]
  • Metzgar paper published by USC Center on Public Diplomacy 16th Jan 2019
    mediaschool.indiana.edu Associate professor Emily Metzgar (Maggie Richards | The Media School) A paper by associate professor Emily Metzgar published by the USC Center on Public diplomacy [JB emphasis] analyzes the United States’ seven-decade history of government-sponsored international broadcasting.“Seventy Years of the Smith-Mundt Act and U.S. International Broadcasting: Back to the Future?” finds that while the […]
  • The ‘dark side’ of digital diplomacy: countering disinformation and propaganda 16th Jan 2019
    realinstitutoelcano.org image (not from article) from Corneliu Bjola | Head of the Oxford Digital Diplomacy Research Group (#DigDiploROx) | @CBjola Excerpt: Theme The ‘dark side’ of digital diplomacy, that is, the strategic use of digital technologies as tools to counter disinformation and propaganda by governments and non-state actors has exploded in the recent years thus […]
  • State Department’s Integrated Country Strategy for Greece published 16th Jan 2019
    E.Tsiliopoulos, newgreektv.com uncaptioned image from entry The State Department’s Integrated Country Strategy (ICS) for Greece recognizing the country’s position in the Eastern Mediterranean as being of key importance to US national security and energy priorities. Excerpt: Below is the full report: ... To combat attempts to destabilize the region, Mission Greece will support democratic institutions, […]
  • A Year in Review: Azerbaijan Optimizes Its Balanced Foreign Policy in 2018 16th Jan 2019
    Rahim Rahimov, jamestown.org, January 15, 2019 Image (not from article) fromExcerpt: Russia has pursued its own active official and public diplomacy [JB emphasis] with Azerbaijan. Bilateral relations seem to be warming significantly, with the two countries’ presidents having met six times in 2018, including two official reciprocal visits (see EDM September 18, October 24, 2018). […]

RSS Diplo Portal Belgrade

Most Viewed Posts

  • Twitter Suspends Hamas Accounts (973)
    By ROBERT MACKEYLast Updated, Sunday, Jan. 19 | Several Twitter accounts used by the military wing of Hamas have been suspended by the social network in recent days, angering the Islamist militants and delighting Israel’s military. #Twitter has suspended the official account of #Hamas, a terrorist group that uses social media to threaten #Israel http://t.co/g1UxKc9fpf
  • Brain drain in Serbia today (272)
    How does the Serbian government cope with the problem of brain drain today? The latest OECD publication, SOPEMI 2014 shows that 39 thousand persons emigrated in 2012 from Serbia to OECD countries only. (At the beginning of the global economic and financial crisis, the emigration from Serbia to OECD countries amounted to 27,000 in 2008.)
  • Humanitarian Intervention: Advantages and Disadvantages in East Timor and Kosovo (265)
    Have There Been Occasions on Which the Advantages of Humanitarian Intervention Using Armed Force have Outweighed the Disadvantages? Humanitarian intervention can be defined as the attempts of a foreign state to prevent violations of human rights in another state, often through the use of armed force. The use of armed force to protect human rights,

How Belgrade based diplomats use Digital Diplomacy and Internet 2016

Diplo Portal Belgrade

Please follow and like us:
Scroll Up

Enjoy this blog? Please spread the word :)