Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks that weaponize psychographic and demographic Big Data algorithms.
In this publication, entitled “Metadata: The Most Potent Weapon in This Cyber War – The New Cyber-Kinetic-Meta War,” the Institute for Critical Infrastructure Technology (ICIT) offers a rich analysis of this underreported threat to our National Security through a comprehensive assessment of how meta-exploits are hyper-evolving an already next-generation adversarial landscape.
This includes discussions on:
This paper was authored by James Scott, Sr. Fellow, ICIT. ICIT will present a brief on the paper on Sept 26, 2017 ICIT Cyber Intelligence Briefing in Washington D.C. – Register Here.