-
Secure Election Act will not be ready before midterms
Senator James Lankford (R-OK) said Tuesday the Secure Elections Act, bipartisan legislation designed “to protect elections from cyberattacks,” won’t be ready before November. Last month’s Senate committee mark-up was abruptly postponed by Senate Rules and Administration Committee Chairman Roy Blunt (R-Mo.) over a lack of Republican support and objections by some secretaries of state and the White House.
-
-
Numbers, trends in health care data breaches nationwide, 2010-2017
Health plans – entities that cover the costs of medical care – accounted for the greatest number of patient records breached over the past seven years, according to an analysis of U.S. health care data. The report examined changes in data breaches during a period when electronic health records were being widely adopted across the country. While the largest number of data breaches took place at heath care providers – hospitals, physician offices, and similar entities – breaches involving the greatest number of patient records took place at health plans.
-
-
Protecting the power grid from cyberattacks
As the national power grid becomes increasingly dependent on computers and data sharing—providing significant benefits for utilities, customers, and communities—it has also become more vulnerable to both physical and cyber threats. While evolving standards with strict enforcement help reduce risks, efforts focused on response and recovery capabilities are just as critical––as is research aimed at creating a well-defended next generation smart grid.
-
-
The Road to Power: Idaho outfit behind rash of racist, anti-Semitic robocalls
The Road to Power, a white supremacist and anti-Semitic broadcasting outlet based in Sandpoint, Idaho, continues to ramp up its tactic of robocalling communities nationwide with racist, anti-Semitic and bigoted language. The calls, which have targeted communities in California, Idaho, Iowa, Florida and Pennsylvania, seek to exploit current events by disseminating vile, offensive commentary.
-
-
Why it’s unwise for the U.K. to boast about its cyberattack capability
The U.K. government is very publicly investing more money in its ability to conduct cyberattacks and, at the same time, it is becoming increasingly open in talking about the attacks it has conducted in the past – and those it might conduct in future. There are risks involved in publicly signaling the imminence of cyber and other attacks, especially against capable adversaries with a demonstrable appetite for taking risks and a cavalier attitude about collateral damage. The U.K. needs to think more carefully about how it integrates cyber operations, and communication about them, into its wider approach – not only towards Russia but across the whole spectrum of national security operations.
-
-
Economic benefit of NIST’s encryption standard at least $250 billion
NIST has released a study that estimates a $250 billion economic impact from the development of its Advanced Encryption Standard (AES) over the past twenty years. AES is a cryptographic algorithm used to encrypt and decrypt electronic information. It was approved for use by the federal government in November 2001 and has since been widely adopted by private industry. Today, AES protects everything from classified data and bank transactions to online shopping and social media apps.
-
-
A new cybersecurity research group focuses on human behavior
Sociologist David Maimon’s earliest research examined the effects neighborhoods have in determining why some people in neighborhoods engage in crime and deviant behaviors. In 2010, he turned his focus to cybercrime and the unique online ecosystem in which cybercriminals thrive. Maimon leads the Evidence-based Cybersecurity Research Group at GSU. “The notion of ‘cybersecurity’ in academic literature and the world is still technical,” he said. “Our work is unique in that we focus on human behavior.”
-
-
U.S. prepared to strike in cyberspace
The United States is prepared to go on the offensive in cyberspace to ensure adversaries know there is a price to pay for hacks, network intrusions and other types of attacks. President Donald Trump signed a new National Cyber Strategy on Thursday, calling for a more aggressive response to the growing online threat posed by other countries, terrorist groups and criminal organizations.
-
-
Amnesty International toils to tell real videos from fakes
Increasingly sophisticated artificial-intelligence video tools, like FakeApp, are raising concerns by helping the technically astute create realistic computer-generated videos known as “deepfakes.” A deepfake video can put a person’s face on somebody else’s body, make them say words they never uttered, show them in a place they’ve never been, or even put them at an event that never occurred.
-
-
How to fight information manipulations: 50 recommendations
French government think tanks have issued 50 recommendations to combat “information manipulations.” The recommendations are part of an exhaustive new study published by the Center for Analysis, Planning and Strategy (CAPS) — attached to the ministry of foreign affairs — and the Institute for Strategic Research of the Military School (IRSEM) — attached to the ministry of the armed forces. It warns that information manipulation, defined as “the intentional and massive distribution of false or biased news for hostile political purposes,” aims to “undermine the foundations of our democracy” and thereby constitute a threat to national security.
-
-
More evidence dossier did not start Russia investigation
ABC News’ latest reporting corroborates the now well-known fact: The Christopher Steele’s dossier was not the impetus for the FBI’s Russia investigation.
-
-
Government hacking raises new security concerns
News of governments such as Russia and North Korea deploying their tech teams to hack into companies for political reasons has made headlines (think Sony after release of the movie The Interview). But what about when the U.S. government “hacks” to get around security measures designed to protect consumers? Can those hacks backfire and put us all at risk?
-
-
Identifying extremists online even before they post dangerous content
The number and size of online extremist groups using social networks to harass users, recruit new members, and incite violence is rapidly increasing. New research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content.
-
-
Broadcasting the reactionary right on YouTube
A new report presents data from approximately 65 political influencers across 81 channels to identify the “Alternative Influence Network (AIN)”; an alternative media system that adopts the techniques of brand influencers to build audiences and “sell” them political ideology.
-
-
Beyond deep fakes: Automatically transforming video content into another video's style
Researchers have created a method that automatically transforms the content of one video into the style of another. For instance, Barack Obama’s style can be transformed into Donald Trump. Because the data-driven method does not require human intervention, it can rapidly transform large amounts of video, making it a boon to movie production, as well as to the conversion of black-and-white films to color and to the creation of content for virtual reality experiences.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.