-
As bad news stories spread on social media, they become more negative, inaccurate, and hysterical
News stories about potential threats become more negative, inaccurate, and hysterical when passed from person to person, new research finds. Even drawing the public’s attention to balanced, neutral facts does not calm this hysteria. “The more people share information, the more negative it becomes, the further it gets from the facts, and the more resistant it becomes to correction,” says one researcher.
-
-
Internet search data shows link between anti-Muslim and pro-ISIS searches in U.S.
In ethnically alike communities where poverty levels run high, anti-Muslim internet searches are strongly associated with pro-ISIS searches, according to a new analysis. This pattern, say the authors of a new study, suggests that counterterrorism policies targeting Muslims may do the opposite of what they intend, making these communities even more vulnerable to radicalization.
-
-
Atlantic Council launches a website to track Russian disinformation
The Atlantic Council yesterday launched a new webpage – DisinfoPortal.org – an interactive online guide to track the Kremlin’s disinformation campaigns abroad. The portal brings together 23 top organizations and more than 80 experts fighting Russian disinformation in the United States and Europe. “It’s time to stop ‘admiring the problem’ of Russian disinformation and start fighting back, using the tools of democratic societies to counter the autocrat’s playbook,” said Ambassador Daniel Fried of the Atlantic Council.
-
-
Synack launches a pro bono Secure the Election initiative
Redwood City, California-based cybersecurity firm Synack has launched the Secure the Election initiative, a pro bono campaign to help states secure voting systems before 2018 Midterm elections. Other cybersecurity companies have been in touch with states about offering free, or reduced price, services to help secure elections.
-
-
Cold War-era KGB “active measures” and the Kremlin’s contemporary way of war
Bob Seely, a Conservative MP for the Isle of Wight and a Russia researcher, has just published the first comprehensive definition of the nature of modern Russian warfare. The paper draws a direct comparison between Cold War-era KGB “Active Measures” and the aggression of Putin’s Russia. “From fake news aimed at Europe to the propaganda of RT, and from the occupation of Crimea to the streets of Salisbury, Russia is waging a very modern kind of conflict on the West – as well as on the Russian people themselves,” Seely said.
-
-
Increased IT security at hospitals does not equal fewer cyberattacks, breaches
The Verizon Data Breach report indicates the health care sector is the top target for cyberattacks. And, as hospitals do more to guard against attacks, it’s not necessarily translating into fewer data breaches, according to new research. Researchers found that the increased use of information technology security systems by hospitals did not equal fewer breaches, contrary to predictions.
-
-
Corporate data collection and U.S. national security: Expanding the conversation in an era of nation state cyber aggression
What has the Russia investigation revealed about risks inherent in mass private data collection? Carrie Cordero writes that one thing we learned from the Russia investigation is that we may be framing the conversation about corporate data collection too narrowly. “Based on what we have learned publicly so far about the Russian election interference, it is worth pausing to reflect on the national security implications of corporate data collection and aggregation as it relates to the collection of individual, private citizens’ data,” she says. “Although the Senate Select Committee on Intelligence (SSCI) and special counsel investigations are not yet complete, we know enough already about Russia’s interference in the 2016 election to understand that data collected from private companies and organizations can be accessed, exposed and potentially misused in a way that is harmful to the country’s institutional stability. At the very least, its misuse sows distrust and confusion. At worst, it shreds the institutional and societal fabric that holds the country together.”
-
-
Mapping DHS’s new cybersecurity strategy, highlighting S&T’s R&D support
Last month at a cybersecurity conference, Homeland Security Secretary Kirstjen Nielsen previewed the May unveiling of DHS’s new cybersecurity strategy and issued a stern warning to cybercriminals. The new DHS Cybersecurity Strategy was released 15 May. Nielsen said: “I have a news flash for America’s adversaries: Complacency is being replaced by consequences. We will not stand on the sidelines while our networks are compromised. We will not abide the theft of our data, our innovation and our resources. And we will not tolerate cyber meddling aimed at the heart of our democracy.”
-
-
World Cup 2018: British intelligence briefs players, staff on Russian cyberthreats
The U.K. Football Association (FA) said it was taking cybersecurity seriously this summer – the Soccer World Cup tournament will be held in Russia from 15 June to 15 July — and will be taking advice from the National Cyber Security Center (NCSC) at the GCHQ (the British equivalent of the U.S. NSA). The England team will be briefed by GCHQ staff before flying out to the World Cup to help them stay safe from Russian hackers.
-
-
The era of fake video begins
“Deepfake” videos produced by Russian-linked trolls are the latest weapon in the ongoing fake news war. The Kremlin-backed trolls are already experimenting with new video manipulation techniques which use artificial intelligence to create convincing doctored videos. Franklin Foer writes the internet has always contained the seeds of postmodern hell, and that mass manipulation, from clickbait to Russian bots to the addictive trickery that governs Facebook’s News Feed, is the currency of the medium. In this respect, the rise of deepfakes is the culmination of the internet’s history to date—and probably only a low-grade version of what’s to come. Fake-but-realistic video clips are not the end point of the flight from reality that technologists would have us take. The apotheosis of this vision is virtual reality. “The ability to manipulate consumers will grow because VR definitionally creates confusion about what is real,” Foer writes. “Several decades ago, after giving the nascent technology a try, the psychedelic pamphleteer Timothy Leary reportedly called it ‘the new LSD’.”
-
-
Regulation or research? Searching for solutions to reduce Truth Decay in the media
What is social media’s role in the decline of trust in the media? Is government intervention needed to help stop the spread of misinformation on these platforms? These questions were the focus of a recent RAND Corporation event on the connection between the media and Truth Decay.
-
-
Mobile security messages 20 percent more effective if warnings vary in appearance
Using brain data, eye-tracking data and field-study data, researchers have confirmed something about our interaction with security warnings on computers and phones: the more we see them, the more we tune them out. But the major study also finds that slight changes to the appearance of warnings help users pay attention to and adhere to warnings 20 percent more of the time.
-
-
Hacker accused of aiding Russian spies in massive breach gets prison
A Kazakh-born computer hacker who U.S. prosecutors say unwittingly worked with a Russian spy agency in a massive Yahoo data breach has been sentenced to five years in prison. Karim Baratov was named in an indictment last year that charged two Russian spies with orchestrating the 2014 Yahoo breach involving 500 million users — one of the largest breaches at any Internet company.
-
-
Russia asks Apple to help it enforce ban on Telegram
Russia’s communications regulator says it has asked U.S. technology giant Apple to help it block the popular messaging service Telegram in Russia. The regulator sent a letter to Apple asking it to block push notifications for Telegram users in Russia, ensuring that Apple phone and tablet users do not receive alerts about new messages and rendering the application less useful.
-
-
Internet of Things: when objects threaten national security
We all know personal devices can be hacked, but a whole country’s security could be at risk too. With the rise of the so-called Internet of Things (IoT), and against the backdrop of cyberwarfare, digital surveillance and digital subversion, the risk to national security is increasing. Earlier this year the head of the UK National Cyber Security Centre publicly stated that a major cyber-attack on the country’s essential services was a question of “when, not if.”
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.