-
Securing U.S. election: Congressional panel release report, recommendations
The Congressional Task Force on Election Security released its Final Report, including ten specific recommendations on what the federal government and states can and should be doing to secure U.S. elections. “Russia’s unprecedented assault on the country’s elections in 2016 – including targeting twenty-one states’ voting systems – exposed serious national security vulnerabilities to our election infrastructure – which includes voting machines and voter registration databases,” the Task Force said. The members of the Task Force also introduced legislation, the Election Security Act, to implement the recommendations of the report.
-
-
U.S. intel chiefs warn Russia intending to meddle in midterm elections
Director of National Intelligence Dan Coats, in a Tuesday testimony before the Senate Intelligence committee, said that one of the major security challenges the United States faces is the continuing cyber activity by Russia, North Korea, China, and Iran, emphasizing “the potential for surprise in the cyber realm”: “Frankly, the United States is under attack,” Coats said. “Under attack by entities that are using cyber to penetrate virtually every major action that takes place in the United States.” Coats said that Russia views its interference in the 2016 election as a success. “There should be no doubt that Russia perceives its past efforts as successful and views the 2018 U.S. midterm elections as a potential target for Russian influence operations,” he said.
-
-
What’s important is not that Russia changed the 2016 election outcome, “but that it attempted to do so”: Report
In an important new report on the challenges that Russia’s aggressive posture poses for U.S. interests in the world, and to U.S. democratic institutions and social cohesion at home, Council on Foreign Relations Senior Fellows Robert D. Blackwill and Philip H. Gordon warn that the United States has so far failed to elevate Russia’s intervention in U.S. elections to the national priority that it is. They add that the United States has neglected to respond to Russia’s intervention in a way sufficient to deter future attacks. They argue, “A wide range of additional measures is therefore needed in order to better protect U.S. society and political and electoral systems from further intervention.”
-
-
Most states’ election systems remain vulnerable to hacking or systemic failure
Less than nine months before midterm elections, a new study shows that most state election systems remain vulnerable to hacking and other interference by foreign governments bent on disrupting the election process. Researchers have conducted research and interviewed election officials to determine their election security preparedness after U.S. intelligence agencies concluded that Russia tried to influence the 2016 election by targeting state voting systems.
-
-
To prevent cyberattacks, create agency similar to National Transportation Safety Board: Experts
After arguably the worst year ever for cyberattacks and data breaches, Indiana University research suggests it may be time to create an independent cybersecurity agency board comparable in approach to the National Transportation Safety Board that investigates airplane crashes and train derailments.
-
-
Energy-efficient encryption for the internet of things
Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key. Public-key encryption protocols are complicated, and in computer networks, they’re executed by software. But that won’t work in the internet of things, an envisioned network that would connect many different sensors — embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags — to online servers. Embedded sensors that need to maximize battery life can’t afford the energy and memory space that software execution of encryption protocols would require. Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold.
-
-
A quantum leap for quantum communication
Quantum communication, which ensures absolute data security, is one of the most advanced branches of the “second quantum revolution.” In quantum communication, the participating parties can detect any attempt at eavesdropping by resorting to the fundamental principle of quantum mechanics — a measurement affects the measured quantity. Thus, the mere existence of an eavesdropper can be detected by identifying the traces that his measurements of the communication channel leave behind. The major drawback of quantum communication today is the slow speed of data transfer, which is limited by the speed at which the parties can perform quantum measurements. Researchers have devised a method that overcomes this speed limit, and enables an increase in the rate of data transfer by more than 5 orders of magnitude.
-
-
Using AI, machine learning to understand extent of online hate
The Anti-Defamation League’s (ADL) Center for Technology and Society (CTS) announced preliminary results from an innovative project that uses artificial intelligence, machine learning, and social science to study what is and what isn’t hate speech online. The project’s goal is to help the tech industry better understand the growing amount of hate online. CTS has collaborated with the University of California at Berkeley’s D-Lab since April 2017 to develop the Online Hate Index. ADL and the D-Lab have created an algorithm that has begun to learn the difference between hate speech and non-hate speech. The project has completed its first phase and its early findings are described in a report released today. In a very promising finding, ADL and the D-Lab found the learning model identified hate speech reliably between 78 percent and 85 percent of the time.
-
-
Trump supporters, extreme right “share widest range of junk news”: Study
A network of Donald Trump supporters shares the widest range of “junk news” on Twitter, and a network of extreme far-right conservatives on Facebook, according to analysis by Oxford University. The Oxford researchers find that on Twitter, a network of Trump supporters shares the widest range of junk news and circulates more junk news than all other political audience groups combined. On Facebook, extreme hard right pages – distinct from Republican pages – both share the widest range and circulate the largest volume of junk news compared with all the other audiences. Specifically, a group of “hard conservatives” circulates the widest range of junk news and accounts for the majority of junk news traffic in the sample. Junk news sources are defined as deliberately publishing misleading, deceptive, or incorrect information purporting to be real news about politics, economics, or culture. This type of content can include various forms of extremist, sensationalist, and conspiratorial material, as well as masked commentary and fake news.
-
-
“Jackpotting” drains millions from U.S. ATMs
ATM machines across the country are being targeted by a wave of criminals in search of an illegal high-tech payday. The Secret Service calls this phenomenon “jackpotting,” and are warning U.S. bank attacks are imminent. It is a modern-day version of a bank robbery, but no weapons are used — only malware, a small device or two and a special key that can be purchased on the Internet. When cyberattackers take control of the machine, cash spews out of the ATM like a Las Vegas jackpot. ASU professor helps combat cyberattacks though intelligence-gathering.
-
-
Russian Tumblr trolls posed as black activists to stoke racial resentment ahead of 2016 U.S. election
Internet trolls working for the Russian government posed as black activists on Tumblr to share political messages before the 2016 U.S. presidential election, BuzzFeed reports. As was the case with the fake accounts created by Russian government operatives on other social media platforms such as Facebook, Twitter, and Instagram, the fake Tumblr accounts aimed to help Donald Trump win the 2016 election by spreading messages which stoked racial and ethnic resentment and intensified political polarization. A digital forensic analysis tied the fake Tumblr accounts to the St. Petersburg-based Internet Research Agency (IRA), a hacking and disinformation organization employed by the Kremlin to disseminate fake news and commentary on social media as part of the broad Kremlin campaign to weaken Western democracies and undermine organizations such as NATO and the EU.
-
-
Faraday rooms, air gaps can be compromised, and leak highly sensitive data
Faraday rooms or “cages” designed to prevent electromagnetic signals from escaping can nevertheless be compromised and leak highly sensitive data, according to new studies. Air-gapped computers used for an organization’s most highly sensitive data might also be secluded in a hermetically-sealed Faraday room or enclosure, which prevents electromagnetic signals from leaking out and being picked up remotely by eavesdropping adversaries. Researchers from Ben-Gurion University showed for the first time that a Faraday room and an air-gapped computer that is disconnected from the internet will not deter sophisticated cyber attackers.
-
-
Digital dark age fears stoked by Davos elite doing little to address cybersecurity
Business leaders who recently convened in Davos for the annual World Economic Forum fretted over the various catastrophes that could hit the globe hard and – given the recent spate of cyberattacks – cybersecurity was high up on the agenda. The end result was the launch of a Global Center for Cybersecurity (GCC) with a clear mission to “prevent a digital dark age.” The GCC undoubtedly offers a reasonable proposition to nation states, by urging them to collaborate on overcoming cyber threats in a coordinated way. But for such a noble goal to work, it requires deeper resolve to deliver and a level of national commitment unprecedented over previous efforts. Given the increased global uncertainty, we are yet to have faith.
-
-
Record-breaking efficiency for secure quantum memory storage
Researchers have broken through a key barrier in quantum memory performance. Their work has enabled the first secure storage and retrieval of quantum bits. The researchers have more than doubled the efficiency of optical qubit storage—from 30 percent to close to 70 percent—making secure storage and retrieval possible. Quantum memory is essential for future quantum networks. The ability to synchronize quantum bits has applications in long-distance quantum communication protocols or computing algorithms. With efficiency at well over 50 percent, quantum storage now enables protocol security.
-
-
Misinformation campaigns, social media, and science
In some key domains of public life there appear to be coordinated efforts to undermine the reputation of science and innovation. Scientists now protest in the streets just to get governments to base policy on scientific evidence. Long-held scientific consensus on issues like the causes and consequences of climate change or the importance of vaccines for public health is increasingly contested. A new initiative will examine the interplay between systematic misinformation campaigns, news coverage, and increasingly important social media platforms for public understanding of science and technological innovation.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.