Exfiltrated metadata from internet service providers and social media platforms can be plugged into big data analytics and once the right algorithm is applied, can allow an adversary surgically precise psychographic targeting of critical infrastructure executives with elevated privileges. Why is no one talking about this?
About This Quote
About James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology.