• The Case That Could Hand the Future to China

    What would the future look like if China leads 5G technology? We should contemplate this question because, as Mercy Kuo writes, fifth-generation cellular network technology, or 5G, will transform our daily lives with such inventions as autonomous-driving vehicles, artificial intelligence, the Internet of Things, and smart cities. If we want to maintain U.S. technology leadership and protect our values, we should be clear-eyed about the perilous consequences that could come with losing our unique lead.”

  • It’s Not Only Jeremy Corbyn’s Mob that Welcomes Anti-Semites. It’s the Whole Bourgeois Left

    “On a scale of one to 10, how much would it surprise you that the Labour Party’s new poster boy, the young activist featured prominently in its election campaign material, is a semi-literate anti-Semite?” Rod Liddle asks in The Times. “I think, if you’ve been watching carefully these past few years, the score is probably around the two to three area.”

  • Nazi Symbols and Racist Memes: Combating School Intolerance

    The number of Americans between the ages of 15 and 21 who saw extremist content online jumped by about 20 percent, to 70.2 percent from 58.3 percent, between 2013 and 2016, according to a new study. As more such material spills from the web to young people and into classrooms nationwide, educators increasingly find themselves under pressure to combat this new front of hate. Many educators say they feel ill-equipped to recognize what students absorb from the web, much less to address it.

  • Earthquake Conspiracy Theorists Are Wreaking Havoc During Emergencies

    Scientists have been trying hard to be able to predict earthquakes, because accurately predicting an earthquake would save lives, decrease property damage, and allow people to have some measure of control over one of nature’s most frightening and unpredictable events. Scientific predictions of the location and time of specific tremors are modest in scope – which have created an opening for earthquake conspiracy theorists who “claim that they have discovered the key to accurate quake prediction, as well as the hidden secrets behind why these tremors happen,” Anna Merlan writes.

  • The “fictional narrative” that Ukraine meddled in the 2016 U.S. election “advance[s] Russian interests”: Fiona Hill

    Fiona Hill, who until July this year was the National Security Council’s top Russia adviser, on Thursday told the House Intelligence Committee that it is a “fictional narrative” that Ukraine, and not Russia, meddled in the 2016 U.S. election that Trump won. “The unfortunate truth is that Russia was the foreign power that systematically attacked our democratic institutions in 2016,” Hill said. “It is beyond dispute, even if some of the underlying details must remain classified.” Hill pleaded with the Intelligence panel, “In the course of this investigation, I would ask that you please not promote politically driven falsehoods that so clearly advance Russian interests.”

  • Flaw in iVote System Used in Australian Election

    Flaws in the iVote internet and telephone voting system used in the 2019 New South Wales election could have made it vulnerable to undetectable voter fraud, a new report has revealed. A new report has shown how the iVote system suffers from an error in its verification process that could allow the verification of votes to be “tricked”, meaning some valid votes could be converted into invalid ones, and not counted.

  • Who's Responsible When Your Car Gets Hacked?

    In the future, when cars can drive themselves, grand theft auto might involve a few keystrokes and a well-placed patch of bad computer code. At that point, who will be liable for the damages caused by a hacker with remote control of a 3,000-pound vehicle?

  • Secure Data Transmission with Ultrasound

    Due to the Internet of Things (IoT), an increasing number of devices have learned to communicate with each other. Ultrasound communication is an entirely new method for data exchange between IoT devices and mobile phones. Researchers have now developed a first open communication protocol including an open-source development kit for ultrasound communication which makes near-field communication safer.

  • Online Disinformation and Emerging Tech: Are Democracies at Risk?

    Online disinformation campaigns supported by fundamental changes in military and geopolitical strategies of major players such as Russia and China harden tribal factions and undermine the security of infrastructure systems in targets such as the United States, as state and non-state actors mount increasingly sophisticated cyberattacks on democratic institutions, Brad Allenby writes. Whether the United States and other democracies are up to this challenge remains to be seen, he says.

  • White Supremacists Embrace "Accelerationism"

    Accelerationism is a term white supremacists have assigned to their desire to hasten the collapse of society as we know it. The term is widely used by those on the fringes of the movement, who employ it openly and enthusiastically on mainstream platforms, as well as in the shadows of private, encrypted chat rooms. 

  • UAH to Offer H4Di Cybersecurity Course

    The University of Alabama in Huntsville (UAH) says it will be the first in the state to offer the Hacking for Defense (H4Di) cybersecurity class beginning in spring semester 2020. H4Di teaches students to work with the defense and intelligence communities to rapidly address the nation’s emerging threats and security challenges.

  • Russian Hackers Attacked Me and Other Military Spouses. Why Can’t We Sue?

    In a systematic campaign aiming to sow panic and confusion, Russian government hackers, masquerading as ISIS fighters, have been hacking computers and smartphones of spouses of U.S. military personnel, stealing and distributing their personal and financial information, and spreading lies about the on the dark web. “Almost as astonishing as the discovery that Russia was behind the attacks was finding out that U.S. citizens have no legal recourse against foreign governments that target them online,” writes Lorri Volkman, whose husband serves in the military, and was attacked by Russian hackers four years ago.

  • New Report on Russia’s Online Operations: Pseudo-Think Tanks, Personas

    The Kremlin used many different techniques in its effective campaigns of interference in the politics of Western democracies, including the 2016 U.S. presidential election. One such technique is “narrative laundering” – the technique of moving a certain narrative from its state-run origins to the wider media ecosystem through the use of aligned publications, “useful idiots,” and, perhaps, witting participants. “Given that many of these tactics are analogs of those used in Cold-War influence operations, it seems certain that they will continue to be refined and updated for the internet era, and are likely to be used to greater effect,” a new report says.

  • Why Cyber Operations Do Not Always Favor the Offense

    Among policymakers and analysts, the assumption that cyberspace favors the offense is widespread. Those who share this assumption have been urging the U.S. government to prioritize offensive cyber operations. Rebecca Slayton writes that the belief in offense dominance is understandable – but mistaken: A focus on offense “increases international tensions and states’ readiness to launch a counter-offensive after a cyberattack, and it often heightens cyber vulnerabilities,” she writes.

  • Lessons from the Cyberattack on India’s Largest Nuclear Power Plant

    In early September, a cyberattack occurred at the Kudankulam nuclear power plant in India. The Indian nuclear monitoring agency finally admitted that the nuclear plant was hacked, and on 30 October Indian government officials acknowledged the intrusion. “As the digitalization of nuclear reactor instrumentation and control systems increases, so does the potential for malicious and accidental cyber incidents alike to cause harm,” Alexander Campbell and Vickram Singh write.