-
De-Risking Authoritarian AI
You may not be interested in artificial intelligence, but it is interested in you. AI-enabled systems make many invisible decisions affecting our health, safety and wealth. They shape what we see, think, feel and choose, they calculate our access to financial benefits as well as our transgressions. In a technology-enabled world, opportunities for remote, large-scale foreign interference, espionage and sabotage —via internet and software updates—exist at a ‘scale and reach that is unprecedented’.
-
-
The U.K. Government Is Very Close to Eroding Encryption Worldwide
The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption. If it passes, the Online Safety Bill will be a huge step backwards for global privacy, and democracy itself.
-
-
If Cyber Is Uninsurable, the United States Has a Major Strategy Problem
The opinions of leaders in the insurance industry are opinions not to be taken lightly, as experienced leaders and among the most respected minds in the global market. And they’re concerned. Or downright terrified. The debate within the insurance industry over cyber risks reveals an important potential weakness, but the reality is far more nuanced.
-
-
Sandia Helps Develop Digital Tool to Track Cloud Hackers
Sandia programmers are helping the federal Cybersecurity and Infrastructure Security Agency (CISA) through an innovative program that enlists Microsoft cloud users everywhere to track down hackers and cyberterrorists.
-
-
Hateful Usernames in Online Multiplayer Games
The online games industry continues to fall short in protecting players from hate and extremist content in games. Usernames are a basic part of any online experience. A new report focuses on hateful usernames, which should be the easiest content for companies to moderate.
-
-
China’s Cyber Interference and Transnational Crime Groups in Southeast Asia
The Chinese Communist Party has a long history of engagement with criminal organizations and proxies to achieve its strategic objectives. This activity involves the Chinese government’s spreading of influence and disinformation campaigns using fake personas and inauthentic accounts on social media that are linked to transnational criminal organizations.
-
-
Can You Trust AI? Here’s Why You Shouldn’t
Across the internet, devices and services that seem to work for you already secretly work against you. Smart TVs spy on you. Phone apps collect and sell your data. Many apps and websites manipulate you through dark patterns, design elements that deliberately mislead, coerce or deceive website visitors. This is surveillance capitalism, and AI is shaping up to be part of it.
-
-
The Promise—and Pitfalls—of Researching Extremism Online
While online spaces are key enablers for extremist movements, social media research hasn’t provided many answers to fundamental questions. How big of a problem is extremism, in the United States or around the world? Is it getting worse? Are social media platforms responsible, or did the internet simply reveal existing trends? Why do some people become violent?
-
-
Bolstering Cyber Safety on Roads and Highways
A new research center is helping prevent potential cyberattacks that could threaten to impede the safe and efficient movement of people and goods in the United States and throughout the world.
-
-
A New Way to Look at Data Privacy
Researchers create a privacy technique that protects sensitive data while maintaining a machine-learning model’s performance. The researchers created a new privacy metric, which they call Probably Approximately Correct (PAC) Privacy, and built a framework based on this metric that can automatically determine the minimal amount of noise that needs to be added.
-
-
Satellite Security Lags Decades Behind the State of the Art
Thousands of satellites are currently orbiting the Earth, and there will be many more in the future. Researchers analyzed three current low-earth orbit satellites and found that, from a technical point of view, hardly any modern security concepts were implemented. Various security mechanisms that are standard in modern mobile phones and laptops were not to be found.
-
-
Preparing for Great Power Conflict
How has the military experience gained by both the U.S. military and the PLA since 2001 shaped the way both militaries train? What effect do these experiences and training trends have on readiness for major power conflict?
-
-
Six Things to Watch Following Meta's Threads Launch
Meta’s ‘Twitter killer,’ Threads, launched on July 6 to media fanfare. With another already politically charged U.S. election on the horizon, online hate and harassment at record highs, and a rise in antisemitism and extremist incidents both on- and offline, a new social media product of this scale will present serious challenges.
-
-
Chinese Intelligence-Linked Hackers Targeted U.S. Government Agencies in Microsoft Hack
Hackers linked to China’s intelligence agencies, are behind a monthlong campaign that breached some unclassified U.S. email systems, allowing them to access to a small number of accounts at the U.S. State Department and a handful of other organizations.
-
-
Fact Check: Why Do we Believe Fake News?
Fake news has become a real threat to society. Some internet users are more likely to accept misinformation and fake news as true information than others. How do psychological and social factors influence whether we fall for them or not? And what can we do against it?
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.