Wait! What??? What I meant by that was......
Ramblings, musings, corrections, and other disjointed thoughts
Conquering Tech Debt!!
Do Not Rely on Influencers for Breaking News insight!!
In today’s digital world, a lot of people often turn to social media for real-time news. However, this has led to a growing problem—many individuals mistake the opinions of social media influencers for facts. Whether it’s a celebrity entrepreneur, a political commentator, or a lifestyle blogger, having a large following does not make someone a credible journalist or expert in cybersecurity, geopolitics, or any other specialized field.
A prime example of this occurred recently when Elon Musk, the owner of X (formerly Twitter), blamed Ukraine for a massive Distributed Denial-of-Service (DDoS) attack on the platform. His accusation was based solely on some of the attacking IP addresses being linked to Ukraine—an oversimplification of cybersecurity that ignores the complex and often deceptive nature of cyberattacks.
The Dangers of Relying on Influencers for Breaking News
Influencers, even those with technical expertise in some areas, are not always qualified to analyze every situation. When Musk made his claim, cybersecurity professionals were quick to point out that IP addresses alone are not reliable indicators of the true source of an attack. Threat actors frequently use compromised machines, proxies, and VPNs to disguise their origins. Yet, despite the lack of evidence, Musk’s assertion gained traction simply because of his enormous influence.
This is just one example of how social media personalities—whether they be business magnates, YouTubers, or Twitter pundits—can shape public perception without proper verification.
Why Critical Thinking Matters
Instead of taking an influencer’s word at face value, consider these steps to verify information:
1. Check Multiple Known Credible Sources – Traditional journalism outlets, cybersecurity firms, and independent fact-checkers often provide more reliable analyses than a single social media post.
2. Understand the Expertise of the Speaker – Owning a tech company does not automatically make someone an expert in global cybersecurity threats.
3. Look for Official Statements – Government agencies, cybersecurity experts, and affected organizations often release reports with factual details.
4. Be Aware of Biases and Agendas – Influencers, including Musk, may have personal or business motivations for the opinions they share.
Conclusion
While social media is a powerful tool for communication, it is also a breeding ground for misinformation. The recent X platform DDoS attack controversy highlights why relying on influencers for news—especially in highly technical or political matters—is a mistake. The responsibility to separate fact from opinion falls on all of us, and that requires critical thinking, skepticism, and a commitment to seeking out reliable sources.
Next time a social media personality makes a bold claim about breaking news, ask yourself:
Are they an expert, smart or just an influencer?
--John
#Influencers #News #ExpertOpinion #X #Elon #SocialMedia #CyberSecurity
Links:
Linktree:
https://linktr.ee/johnjrice
Medium:
https://medium.com/@johnjrice
Substack:
https://johnjrice.substack.com
LinkedIn:
https://www.linkedin.com/in/johnjrice315
John’s Bookclub! A quasi book review: Russian Information Warfare by Bilyana Lilly
I try to read a book a week — yeah, I know, peak nerd behavior — but it’s my way to unwind. When I really enjoy one, I figure, why not share? Think of it like Oprah’s Book Club, but with fewer celebrities and absolutely no fan base.
Dr. Bilyana Lilly’s Russian Information Warfare is an amazing deep dive into one of the most complex and consequential aspects of modern conflict: Russia’s strategic use of information as a weapon via the FSB, GRU, SVR, and Russia based threat actors. We live in an era where cyber operations, propaganda, and disinformation campaigns shape global events as much (or more so) as traditional military tactics, Lilly delivers a compelling and meticulously researched analysis that demystifies and simplifies the Russian approach to information warfare.

Key Themes and Insights:
1. A Multi-Layered Approach to Warfare
Lilly expertly illustrates how Russia does not see information warfare as a standalone tool but as an integrated part of its military and geopolitical strategy. From state-sponsored cyberattacks to psychological operations that manipulate public opinion, she highlights how Russia seamlessly blends traditional military tactics with digital deception to achieve its strategic objectives.
2. The Role of Cyber Operations
The book provides a detailed examination of Russia’s sophisticated cyber capabilities, demonstrating how Russian actors have repeatedly exploited vulnerabilities in Western infrastructure. Through real-world examples, such as election interference and critical infrastructure breaches, Lilly explains how these cyber operations are not random acts but deliberate, strategic maneuvers aimed at destabilizing adversaries.
3. Disinformation as a Weapon
One of the most striking aspects of the book is its exploration of Russian disinformation campaigns. Lilly dissects the ways in which Russian operatives use social media, state-sponsored news agencies, and covert influence campaigns to sow discord, erode trust in democratic institutions, and create confusion among adversaries. She provides case studies that showcase how narratives are carefully constructed to influence global events.
4. The Concept of "Reflexive Control"
A particularly insightful section delves into the Russian military doctrine of “reflexive control,” a psychological strategy that involves shaping an opponent’s perception and decision-making process to guide them toward a predetermined outcome—often without them realizing they are being manipulated. This concept, Lilly argues, is central to Russia’s success in information warfare.
5.Lessons for the West
Rather than just diagnosing the problem, Russian Information Warfare offers invaluable insights into how Western nations can recognize and counter these tactics. Lilly provides policy recommendations, strategic frameworks, and practical steps that governments, cybersecurity experts, and intelligence agencies can take to fortify their defenses against Russia’s sophisticated influence operations.
Why This Book Stands Out
Lilly’s expertise in cybersecurity, Russian geopolitics, and military strategy shines through in this book. She combines rigorous academic research with real-world case studies, making the content both highly informative and incredibly engaging. Unlike many analyses that focus purely on technical aspects, Russian Information Warfare connects the dots between history, strategy, and modern-day tactics, giving readers a comprehensive understanding of the broader geopolitical implications.
My Final Thoughts:
For anyone interested in cybersecurity, geopolitics, or modern warfare, Russian Information Warfare is an absolute essential read. Dr. Bilyana Lilly not only unpacks and simplifies the complexities of Russia’s information warfare tactics but also provides a roadmap for defending against them. It is an enlightening, eye-opening, and ultimately empowering book that should be on the reading list of policymakers, security professionals, and global strategists alike.
— John
#bookreview #reading #CyberSecurity #infosec #russia #china #us #nsa #gru #ccp #pla #cia #svr
The Silent Cybersecurity Crisis No One's Talking About
Let’s cut through the crap and noise. While the headlines focus on Trump and Musk gutting the CIA, NSA, and CISA, there’s a much bigger issue that U.S. businesses cannot afford to ignore — the security of your company’s data, networks, and operations.
For years, federal intelligence agencies have been the quiet guardians of the internet, identifying threats, sharing critical intelligence, and helping private businesses defend against cyberattacks. That safety net is unraveling fast.
If these agencies are defunded, dismantled, or have their authority gutted, here’s what happens next:
🔥 The Coming Cyberstorm: What Businesses Should Expect 🔥
🔴 More Ransomware & Data Breaches — The FBI and CISA help disrupt ransomware gangs like REvil and Conti before they cripple entire industries. Without them? Expect more attacks like the Colonial Pipeline hack, which shut down gas supplies for the East Coast, or MGM Resorts, where hackers used social engineering to bring casino operations to a halt.
🔴 Nation-State Cyberattacks on U.S. Companies — China, Russia, North Korea, and Iran don’t just target governments — they target private businesses, stealing intellectual property, financial data, and customer records. CISA and the NSA alert companies to these threats — but if they’re weakened, who will warn you?
🔴 Supply Chain Attacks Will Skyrocket — Remember SolarWinds? A Russian-backed attack compromised 18,000 businesses and U.S. agencies. The private sector didn’t detect it — government intelligence did. Without those agencies in full force, businesses may not know they’re compromised until it’s too late.
🔴 More AI-Powered Fraud & Deepfake Scams — Cybercriminals are already using AI-generated deepfakes to impersonate CEOs and steal millions. The NSA and FBI work to disrupt these threats, but without them, businesses will be completely on their own.
📉 Why This is a Business Problem, Not Just a Government One 📉
If these agencies are gutted, the burden shifts directly to private companies. The Fortune 500 might have the resources to adapt, but what about mid-size businesses, hospitals, manufacturers, and local governments?
Cybersecurity has always been underfunded in the private sector. Now, without strong federal intelligence backing, companies must increase cybersecurity budgets, hire more experts, and implement stronger protections — or risk being the next headline.
🚀 What Business Leaders Must Do NOW 🚀
✅ Increase Cybersecurity Budgets — Security is no longer a “nice to have.” It’s as critical as payroll and legal compliance. If your cybersecurity budget is less than 5% of IT spending, it’s time for a serious adjustment.
✅ Hire & Retain Cybersecurity Talent — Your overworked security team won’t be able to handle nation-state attacks and sophisticated ransomware alone. Invest in hiring, training, and paying them what they’re worth.
✅ Prioritize Threat Intelligence & Incident Response — If you can’t rely on CISA alerts, you need your own threat intelligence strategy. Subscribe to private threat intel services, conduct regular penetration testing, and have an incident response plan ready to go.
✅ Bolster Zero Trust & Security Controls — The days of relying on perimeter security are over. Adopt Zero Trust architecture, enforce multi-factor authentication (MFA), and strengthen endpoint security.
✅ Educate Leadership on the Risk — Cybersecurity isn’t just IT’s problem. CEOs, CFOs, and boards must understand that cyber threats are existential business risks. A single breach can cost millions — or even destroy a company.
💡 The Bottom Line: Step Up or Get Left Behind
If federal cybersecurity agencies are defunded or dismantled, private businesses must take up the fight. There is no cavalry coming — we ARE the front line now.
The question isn’t IF your business will be attacked — it’s WHEN. Will you be ready?
— John
#CyberSecurity #BusinessRisk #Infosec #CISA #NSA #CIA #RiskManagement #ZeroTrust #CyberThreats
Links:
John's Bookclub! A quasi book review: Shadow Warfare by Elizabeth Van Wie Davis
Nobody Is Coming to Save You!!
Linktree https://linktr.ee/johnjrice
Medium https://medium.com/@johnjrice
Substack https://johnjrice.substack.com