• Toward an Unhackable Quantum Internet

    A quantum internet could be used to send un-hackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss. Researchers have found a way to correct for signal loss.

  • Is China winning?

    This year started horribly for China, with a respiratory virus spread in Wuhan, and the Chinese government hiding the truth about it from the world. But the draconian measures taken by the government appears to have worked, and Wuhan is back to normal (to a new, post-COVI-19 normal, that is). The Economist writes that China’s Communist Party hails this as a triumph not only for Chinese science: the country’s vast and well-oiled propaganda machine explains that China brought its epidemic under control thanks to its strong one-party rule – and the fact tat some Western democracies – chief among them the United States – have botched their response to the epidemic shows that Western liberal democracy is an inferior system of government compared to China’s own. “Some, including nervous foreign-policy watchers in the West, have concluded that China will be the winner from the COVID-19 catastrophe. These observers warn that the pandemic will be remembered not only as a human disaster, but also as a geopolitical turning-point away from America,” the Economist writes.

  • What to Make of New U.S. Actions Against Foreign Telecoms

    Recent moves by the administration mark another concrete step in the U.S. campaign to limit the digital and economic influence of Chinese telecommunications companies both within and outside U.S. borders. Justin Sherman writes that “The moves also demonstrate that current American efforts to limit the influence of the Chinese telecommunications sector are much broader than just the well-publicized targeting of Chinese telecom giant Huawei.”

  • The Coronavirus Contact Tracing App Won't Log Your Location, but It Will Reveal Who You Hang Out With

    The Australian federal government has announced plans to introduce a contact tracing mobile app to help curb COVID-19’s spread in Australia. Roba Abbas and Katina Michael write in The Conversation that rather than collecting location data directly from mobile operators, the proposed TraceTogether app will use Bluetooth technology to sense whether users who have voluntarily opted-in have come within nine metres of one another. Contact tracing apps generally store 14-21 days of interaction data between participating devices to help monitor the spread of a disease. The TraceTogether app has been available in Singapore since March 20, and its reception there may help shed light on how the new tech will fare in Australia.

  • Bolstering Cybersecurity for Systems Linking Solar Power to Grid

    DOE has awarded researchers $3.6 million to advance technologies that integrate solar power systems to the national power grid. “As U.S. energy policy shifts toward more diverse sources, particularly solar, the Energy Department understands the critical importance of protecting these systems and technologies,” said Alan Mantooth, U Arkansas Professor of electrical engineering and principal investigator for the project.

  • Strengthening Mobile Device Email Security and Privacy

    Large and small organizations alike now rely heavily on mobile devices like smartphones or tablets to enable their workers, customers and management to connect and collaborate, even when some or all of them are working remotely. But device users may prioritize convenience over strong security, accidently share sensitive information with unintended audiences, or use their corporate- or government-owned devices in contexts in which sensitive business information should not be shared.

  • Deepfakes 2.0: The New Era of “Truth Decay”

    Deepfake technology has exploded in the last few years. Deepfakes use artificial intelligence (AI) “to generate, alter or manipulate digital content in a manner that is not easily perceptible by humans.” The goal is to create digital video and audio that appears “real.” Brig. Gen. R. Patrick Huston and Lt. Col. M. Eric Bahm write that a picture used to be worth a thousand words – and a video worth a million – but deepfake technology means that “seeing” is no longer “believing.”  “From fake evidence to election interference, deepfakes threaten local and global stability,” they write.

  • Cybersecurity Requires International Cooperation, Trust

    Most experts agree that state-sponsored hackers in Russia are trying to use the internet to infiltrate the U.S. electrical grid and sabotage elections. And yet internet security teams in the U.S. and Europe actively seek to cooperate with their Russian counterparts, setting aside some of their differences and focusing on the issues where they can establish mutual trust.

  • Quantum Computers Will Break the Internet, but Only If We Let Them

    Tomorrow’s quantum computers are expected to be millions of times faster than the device you’re using right now. Whenever these powerful computers take hold, it will be like going from a Ford Model T to the Starship Enterprise. Hackers may soon be able to expose all digital communications by using advanced quantum computers. A new form of cryptography would stop them, but it needs to be put into place now.

  • Putin’s Long War Against American Science

    A decade of health disinformation promoted by President Vladimir Putin of Russia has sown wide confusion, hurt major institutions and encouraged the spread of deadly illnesses. The Putin regime mandates vaccination at home, but has launched a broad and sophisticated disinformation campaign in an effort to lower vaccine rates in Western countries, with two goals in mind: discredit Western science and medicine, and weaken Western societies by facilitating the re-emergence of diseases such as measles, long thought to have been eradicated. The COPVID-19 epidemic has not escaped the notice of the Kremlin’s disinformation and propaganda specialists. “As the pandemic has swept the globe, it has been accompanied by a dangerous surge of false information,” William Broad writes. “Analysts say that President Vladimir V. Putin of Russia has played a principal role in the spread of false information as part of his wider effort to discredit the West and destroy his enemies from within.”

  • Social Media Has Positive Possibilities in Pandemic

    Social media has the power to both inform and deceive – and do both at speeds we have never experienced. That fact has, once again, been on display as the COVID-19 epidemic has dominated social media platforms for weeks.

  • Spreading Dangerous News spreads: Why Twitter Users Retweet Risk-Related Information

    In an Internet-driven world, social media has become the go-to source of all kinds of information. This is especially relevant in crisis-like situations, when warnings and risk-related information are actively circulated on social media. But currently, there is no way of determining the accuracy of the information. This has resulted in the spread of misinformation.

  • Bolstering Internet Security

    An innovative protection against website counterfeiting developed by Princeton researchers went live on the internet two months ago, on 19 February, boosting security for hundreds of millions of websites. The rollout was the culmination of over two years of close collaboration between research groups at Princeton and Let’s Encrypt, the world’s largest certificate authority serving 200 million websites.

  • U.S. Military, Government Workers Still Use Zoom Despite FBI Warning

    U.S. military and government employees continue to use the popular videoconferencing application Zoom for official business, despite FBI warnings about privacy and security issues, an action experts fear is increasing the risk of government data breaches.  

  • Huawei and the Third Offset

    In order to effectively mitigate the security risks posed by Huawei, the U.S. Department of Defense needs to fund and integrate cutting-edge technologies from the private sector. Offset strategies are intended to counterbalance an adversary’s military advantages by developing asymmetric technological strengths.