• APT37 (Reaper): Overlooked North Korean cyber espionage unit

    An increasingly sophisticated North Korean cyber-espionage unit is using its skills to widen spying operations to aerospace and defense industries, a new study has revealed. Cybersecurity firm FireEye has identified a North Korean group, which it names APT37 (Reaper) and which it says is using malware to infiltrate computer networks. FireEye’s report suggests the group has been active since 2012, but has now graduated to the level of an advanced persistent threat.

  • Fake news “vaccine”: online game may “inoculate” by simulating propaganda tactics

    A new experiment, just launched online, aims to help “inoculate” against disinformation by providing a small dose of perspective from a “fake news tycoon.” The game encourages players to stoke anger, mistrust and fear in the public by manipulating digital news and social media within the simulation. Players build audiences for their fake news sites by publishing polarizing falsehoods, deploying twitter bots, photo-shopping evidence, and inciting conspiracy theories in the wake of public tragedy – all while maintaining a “credibility score” to remain as persuasive as possible. The psychological theory behind the research is called “inoculation”: “A biological vaccine administers a small dose of the disease to build immunity. Similarly, inoculation theory suggests that exposure to a weak or demystified version of an argument makes it easier to refute when confronted with more persuasive claims,” says a researcher.

  • Framework for policymakers to address debate over encryption

    A new report by the National Academies of Sciences, Engineering, and Medicine proposes a framework for evaluating proposals to provide authorized government agencies with access to unencrypted versions of encrypted communications and other data.  The framework is the product of an 18-month study led by a diverse array of leaders from law enforcement, computer science, civil liberties, law, and other disciplines.

  • Social media is helping Putin kill our democracy

    There are few more important issues confronting the West today than what to do about social media companies, which thanks to their ubiquity possess vast riches and daunting influence over our democracies. The Russians have been spreading lies for decades. Active Measures, including fake reports, forged documents, and dastardly conspiracies invented out of thin air, were created by the KGB to smear Western governments. Social media made Moscow’s clandestine work much easier and more profitable. Although the lies currently emanating from the Kremlin resemble Cold War Active Measures in overall form and content, they are now disseminated so quickly, and through so many fronts, trolls, and bots, that Western governments are severely challenged to even keep up with these weaponized lies, much less push back. For this, we have the Internet to thank. While none can deny the countless benefits of the online age, this is one of its most pernicious side effects. It’s time the West seriously addressed the problem, and quickly, since this Kremlin spy game isn’t going away.

  • A Russian-American fraud; Russia goal: Unraveling U.S. democracy; disinformation & military readiness, and more

    · Reading the Mueller indictment: A Russian-American fraud

    · Mueller’s indictment ends Trump’s myth of the Russia “hoax”

    · Russian influence campaign: What’s in the latest Mueller indictment

    · Did Russia affect the 2016 election? It’s now undeniable

    · “Something was weird”: Inside the Russian effort to bamboozle Florida

    · What Mueller’s new Russia indictments mean — and what they don’t

    · Mueller’s indictment of Russian hackers highlights the stakes of the Microsoft case

    · For Russia, unraveling U.S. democracy was just another day job

    · The campaign finance loophole that could make the next Russian attack perfectly legal

    · Lessons about Russian social media meddling from Mueller’s indictment

    · White House objects to Russian hacking that doesn’t benefit Trump

    · How Russia turned the internet against America

    · Mueller’s message to America

    · Foreign disinformation is a threat to military readiness, too

  • Thirteen Russians criminally charged for interfering in 2016 election

    The sheer audacity, scope, and sophistication of the Kremlin’s hacking and disinformation campaign to ensure the victory of Donald Trump in the 2016 presidential election have been exposed a short time ago in a 37-page indictment handed down by the office or Special Counsel Robert Mueller against thirteen Russians and three Kremlin-related organization. The detailed 37-page indictment says that the Russians’ operations “included supporting the presidential campaign of then-candidate Donald J. Trump” “and disparaging Hillary Clinton,” his Democratic opponent. The Russians posed as Americans to operate bogus social media accounts, buy advertisements, and stage political rallies. These Russian government operatives stole the identities of real people in the United States to post online and built computer systems in the United States to conceal the Russian origin of their activity, the indictment says. The indictment contradicts Trump’s false assertions that the idea that there was a Russian campaign to undermine the U.S. democratic process was nothing more than a “hoax,” “witch hunt,” and “fake news” concocted by the “dishonest media” and Democrats to explain Hillary Clinton’s loss.

  • U.K.: Russia launched last June’s costly NotPetya cyberattacks

    Russian military hackers were behind the NoPetya cyberattack on Ukraine that spread globally last year, the British government said. The United States said June’s NotPetya ransomware attack caused billions of dollars in damage across Europe, Asia, and the Americas. U.K. Defense Secretary Gavin Williamson said Russia was “ripping up the rule book” and the U.K. would respond.

  • Securing U.S. election: Congressional panel release report, recommendations

    The Congressional Task Force on Election Security released its Final Report, including ten specific recommendations on what the federal government and states can and should be doing to secure U.S. elections. “Russia’s unprecedented assault on the country’s elections in 2016 – including targeting twenty-one states’ voting systems – exposed serious national security vulnerabilities to our election infrastructure – which includes voting machines and voter registration databases,” the Task Force said. The members of the Task Force also introduced legislation, the Election Security Act, to implement the recommendations of the report.

  • U.S. intel chiefs warn Russia intending to meddle in midterm elections

    Director of National Intelligence Dan Coats, in a Tuesday testimony before the Senate Intelligence committee, said that one of the major security challenges the United States faces is the continuing cyber activity by Russia, North Korea, China, and Iran, emphasizing “the potential for surprise in the cyber realm”: “Frankly, the United States is under attack,” Coats said. “Under attack by entities that are using cyber to penetrate virtually every major action that takes place in the United States.” Coats said that Russia views its interference in the 2016 election as a success. “There should be no doubt that Russia perceives its past efforts as successful and views the 2018 U.S. midterm elections as a potential target for Russian influence operations,” he said.

  • What’s important is not that Russia changed the 2016 election outcome, “but that it attempted to do so”: Report

    In an important new report on the challenges that Russia’s aggressive posture poses for U.S. interests in the world, and to U.S. democratic institutions and social cohesion at home, Council on Foreign Relations Senior Fellows Robert D. Blackwill and Philip H. Gordon warn that the United States has so far failed to elevate Russia’s intervention in U.S. elections to the national priority that it is. They add that the United States has neglected to respond to Russia’s intervention in a way sufficient to deter future attacks. They argue, “A wide range of additional measures is therefore needed in order to better protect U.S. society and political and electoral systems from further intervention.”

  • Most states’ election systems remain vulnerable to hacking or systemic failure

    Less than nine months before midterm elections, a new study shows that most state election systems remain vulnerable to hacking and other interference by foreign governments bent on disrupting the election process. Researchers have conducted research and interviewed election officials to determine their election security preparedness after U.S. intelligence agencies concluded that Russia tried to influence the 2016 election by targeting state voting systems.

  • To prevent cyberattacks, create agency similar to National Transportation Safety Board: Experts

    After arguably the worst year ever for cyberattacks and data breaches, Indiana University research suggests it may be time to create an independent cybersecurity agency board comparable in approach to the National Transportation Safety Board that investigates airplane crashes and train derailments.

  • Energy-efficient encryption for the internet of things

    Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key. Public-key encryption protocols are complicated, and in computer networks, they’re executed by software. But that won’t work in the internet of things, an envisioned network that would connect many different sensors — embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags — to online servers. Embedded sensors that need to maximize battery life can’t afford the energy and memory space that software execution of encryption protocols would require. Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold.

  • A quantum leap for quantum communication

    Quantum communication, which ensures absolute data security, is one of the most advanced branches of the “second quantum revolution.” In quantum communication, the participating parties can detect any attempt at eavesdropping by resorting to the fundamental principle of quantum mechanics — a measurement affects the measured quantity. Thus, the mere existence of an eavesdropper can be detected by identifying the traces that his measurements of the communication channel leave behind. The major drawback of quantum communication today is the slow speed of data transfer, which is limited by the speed at which the parties can perform quantum measurements. Researchers have devised a method that overcomes this speed limit, and enables an increase in the rate of data transfer by more than 5 orders of magnitude.

  • Using AI, machine learning to understand extent of online hate

    The Anti-Defamation League’s (ADL) Center for Technology and Society (CTS) announced preliminary results from an innovative project that uses artificial intelligence, machine learning, and social science to study what is and what isn’t hate speech online. The project’s goal is to help the tech industry better understand the growing amount of hate online. CTS has collaborated with the University of California at Berkeley’s D-Lab since April 2017 to develop the Online Hate Index. ADL and the D-Lab have created an algorithm that has begun to learn the difference between hate speech and non-hate speech. The project has completed its first phase and its early findings are described in a report released today. In a very promising finding, ADL and the D-Lab found the learning model identified hate speech reliably between 78 percent and 85 percent of the time.