• A Russian-American fraud; Russia goal: Unraveling U.S. democracy; disinformation & military readiness, and more

    · Reading the Mueller indictment: A Russian-American fraud

    · Mueller’s indictment ends Trump’s myth of the Russia “hoax”

    · Russian influence campaign: What’s in the latest Mueller indictment

    · Did Russia affect the 2016 election? It’s now undeniable

    · “Something was weird”: Inside the Russian effort to bamboozle Florida

    · What Mueller’s new Russia indictments mean — and what they don’t

    · Mueller’s indictment of Russian hackers highlights the stakes of the Microsoft case

    · For Russia, unraveling U.S. democracy was just another day job

    · The campaign finance loophole that could make the next Russian attack perfectly legal

    · Lessons about Russian social media meddling from Mueller’s indictment

    · White House objects to Russian hacking that doesn’t benefit Trump

    · How Russia turned the internet against America

    · Mueller’s message to America

    · Foreign disinformation is a threat to military readiness, too

  • Thirteen Russians criminally charged for interfering in 2016 election

    The sheer audacity, scope, and sophistication of the Kremlin’s hacking and disinformation campaign to ensure the victory of Donald Trump in the 2016 presidential election have been exposed a short time ago in a 37-page indictment handed down by the office or Special Counsel Robert Mueller against thirteen Russians and three Kremlin-related organization. The detailed 37-page indictment says that the Russians’ operations “included supporting the presidential campaign of then-candidate Donald J. Trump” “and disparaging Hillary Clinton,” his Democratic opponent. The Russians posed as Americans to operate bogus social media accounts, buy advertisements, and stage political rallies. These Russian government operatives stole the identities of real people in the United States to post online and built computer systems in the United States to conceal the Russian origin of their activity, the indictment says. The indictment contradicts Trump’s false assertions that the idea that there was a Russian campaign to undermine the U.S. democratic process was nothing more than a “hoax,” “witch hunt,” and “fake news” concocted by the “dishonest media” and Democrats to explain Hillary Clinton’s loss.

  • U.K.: Russia launched last June’s costly NotPetya cyberattacks

    Russian military hackers were behind the NoPetya cyberattack on Ukraine that spread globally last year, the British government said. The United States said June’s NotPetya ransomware attack caused billions of dollars in damage across Europe, Asia, and the Americas. U.K. Defense Secretary Gavin Williamson said Russia was “ripping up the rule book” and the U.K. would respond.

  • Securing U.S. election: Congressional panel release report, recommendations

    The Congressional Task Force on Election Security released its Final Report, including ten specific recommendations on what the federal government and states can and should be doing to secure U.S. elections. “Russia’s unprecedented assault on the country’s elections in 2016 – including targeting twenty-one states’ voting systems – exposed serious national security vulnerabilities to our election infrastructure – which includes voting machines and voter registration databases,” the Task Force said. The members of the Task Force also introduced legislation, the Election Security Act, to implement the recommendations of the report.

  • U.S. intel chiefs warn Russia intending to meddle in midterm elections

    Director of National Intelligence Dan Coats, in a Tuesday testimony before the Senate Intelligence committee, said that one of the major security challenges the United States faces is the continuing cyber activity by Russia, North Korea, China, and Iran, emphasizing “the potential for surprise in the cyber realm”: “Frankly, the United States is under attack,” Coats said. “Under attack by entities that are using cyber to penetrate virtually every major action that takes place in the United States.” Coats said that Russia views its interference in the 2016 election as a success. “There should be no doubt that Russia perceives its past efforts as successful and views the 2018 U.S. midterm elections as a potential target for Russian influence operations,” he said.

  • What’s important is not that Russia changed the 2016 election outcome, “but that it attempted to do so”: Report

    In an important new report on the challenges that Russia’s aggressive posture poses for U.S. interests in the world, and to U.S. democratic institutions and social cohesion at home, Council on Foreign Relations Senior Fellows Robert D. Blackwill and Philip H. Gordon warn that the United States has so far failed to elevate Russia’s intervention in U.S. elections to the national priority that it is. They add that the United States has neglected to respond to Russia’s intervention in a way sufficient to deter future attacks. They argue, “A wide range of additional measures is therefore needed in order to better protect U.S. society and political and electoral systems from further intervention.”

  • Most states’ election systems remain vulnerable to hacking or systemic failure

    Less than nine months before midterm elections, a new study shows that most state election systems remain vulnerable to hacking and other interference by foreign governments bent on disrupting the election process. Researchers have conducted research and interviewed election officials to determine their election security preparedness after U.S. intelligence agencies concluded that Russia tried to influence the 2016 election by targeting state voting systems.

  • To prevent cyberattacks, create agency similar to National Transportation Safety Board: Experts

    After arguably the worst year ever for cyberattacks and data breaches, Indiana University research suggests it may be time to create an independent cybersecurity agency board comparable in approach to the National Transportation Safety Board that investigates airplane crashes and train derailments.

  • Energy-efficient encryption for the internet of things

    Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key. Public-key encryption protocols are complicated, and in computer networks, they’re executed by software. But that won’t work in the internet of things, an envisioned network that would connect many different sensors — embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags — to online servers. Embedded sensors that need to maximize battery life can’t afford the energy and memory space that software execution of encryption protocols would require. Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold.

  • A quantum leap for quantum communication

    Quantum communication, which ensures absolute data security, is one of the most advanced branches of the “second quantum revolution.” In quantum communication, the participating parties can detect any attempt at eavesdropping by resorting to the fundamental principle of quantum mechanics — a measurement affects the measured quantity. Thus, the mere existence of an eavesdropper can be detected by identifying the traces that his measurements of the communication channel leave behind. The major drawback of quantum communication today is the slow speed of data transfer, which is limited by the speed at which the parties can perform quantum measurements. Researchers have devised a method that overcomes this speed limit, and enables an increase in the rate of data transfer by more than 5 orders of magnitude.

  • Using AI, machine learning to understand extent of online hate

    The Anti-Defamation League’s (ADL) Center for Technology and Society (CTS) announced preliminary results from an innovative project that uses artificial intelligence, machine learning, and social science to study what is and what isn’t hate speech online. The project’s goal is to help the tech industry better understand the growing amount of hate online. CTS has collaborated with the University of California at Berkeley’s D-Lab since April 2017 to develop the Online Hate Index. ADL and the D-Lab have created an algorithm that has begun to learn the difference between hate speech and non-hate speech. The project has completed its first phase and its early findings are described in a report released today. In a very promising finding, ADL and the D-Lab found the learning model identified hate speech reliably between 78 percent and 85 percent of the time.

  • Trump supporters, extreme right “share widest range of junk news”: Study

    A network of Donald Trump supporters shares the widest range of “junk news” on Twitter, and a network of extreme far-right conservatives on Facebook, according to analysis by Oxford University. The Oxford researchers find that on Twitter, a network of Trump supporters shares the widest range of junk news and circulates more junk news than all other political audience groups combined. On Facebook, extreme hard right pages – distinct from Republican pages – both share the widest range and circulate the largest volume of junk news compared with all the other audiences. Specifically, a group of “hard conservatives” circulates the widest range of junk news and accounts for the majority of junk news traffic in the sample. Junk news sources are defined as deliberately publishing misleading, deceptive, or incorrect information purporting to be real news about politics, economics, or culture. This type of content can include various forms of extremist, sensationalist, and conspiratorial material, as well as masked commentary and fake news.

  • “Jackpotting” drains millions from U.S. ATMs

    ATM machines across the country are being targeted by a wave of criminals in search of an illegal high-tech payday. The Secret Service calls this phenomenon “jackpotting,” and are warning U.S. bank attacks are imminent. It is a modern-day version of a bank robbery, but no weapons are used — only malware, a small device or two and a special key that can be purchased on the Internet. When cyberattackers take control of the machine, cash spews out of the ATM like a Las Vegas jackpot. ASU professor helps combat cyberattacks though intelligence-gathering.

  • Russian Tumblr trolls posed as black activists to stoke racial resentment ahead of 2016 U.S. election

    Internet trolls working for the Russian government posed as black activists on Tumblr to share political messages before the 2016 U.S. presidential election, BuzzFeed reports. As was the case with the fake accounts created by Russian government operatives on other social media platforms such as Facebook, Twitter, and Instagram, the fake Tumblr accounts aimed to help Donald Trump win the 2016 election by spreading messages which stoked racial and ethnic resentment and intensified political polarization. A digital forensic analysis tied the fake Tumblr accounts to the St. Petersburg-based Internet Research Agency (IRA), a hacking and disinformation organization employed by the Kremlin to disseminate fake news and commentary on social media as part of the broad Kremlin campaign to weaken Western democracies and undermine organizations such as NATO and the EU.

  • Faraday rooms, air gaps can be compromised, and leak highly sensitive data

    Faraday rooms or “cages” designed to prevent electromagnetic signals from escaping can nevertheless be compromised and leak highly sensitive data, according to new studies. Air-gapped computers used for an organization’s most highly sensitive data might also be secluded in a hermetically-sealed Faraday room or enclosure, which prevents electromagnetic signals from leaking out and being picked up remotely by eavesdropping adversaries. Researchers from Ben-Gurion University showed for the first time that a Faraday room and an air-gapped computer that is disconnected from the internet will not deter sophisticated cyber attackers.