-
Lawmakers Raising Alarm over Huawei’s Risk to National Security – in the U.S. and Abroad
Huawei is heavily subsidized by the Chinese government, so its products are much cheaper than the equipment produced by the company’s Western competitors – thus allowing the Chinese company to insinuate itself into a the communication infrastructure of countries where the Chinese intelligence agencies are interested in augmenting their information-gathering capabilities. U.S. lawmakers are angry at the Pentagon’s objections to Commerce Department regulations which would have made it more difficult for U.S. companies to sell to Huawei. “Huawei is an arm of the Chinese Communist Party and should be treated as such,” the senators write to the secretary of defense. “It is difficult to imagine that, at the height of the Cold War, the Department of Defense would condone American companies contracting with KGB subsidiaries because Moscow offered a discount.”
-
-
Is There a Targeted Troll Campaign Against Lisa Page? A Bot Sentinel Investigation
“Homewrecker.” “Traitor.” “Tramp.” These are just some of the insults flung at Lisa Page—the former FBI lawyer whom President Trump has targeted for her text messages critical of him during the 2016 election—in the almost 4,000 responses to a tweet she posted on 18 January. “Public figures often receive online abuse, after all. “But the replies to Page’s tweet stand out. They likely represent a targeted trollbot attack—one that nobody has reported on until now,” Christopher Bouzy, the founder and CEO of Bot Sentinel, writes. The troll attack on Page “looks a lot like the coordinated campaigns we witnessed during the 2016 election, when a swarm of accounts would suddenly begin tweeting the same toxic messaging. All this raises a question: Who is behind the apparent trollbot activity against Page?”
-
-
It Is Now 100 Seconds to Midnight
The Bulletin of the Atomic Scientists’ Doomsday Clock is now closer to midnight than ever in its history. The Bulletin cites worsening nuclear threat, lack of climate action, and rise of “cyber-enabled disinformation campaigns” in moving the clock hand. December 2020 marks the 75th anniversary of the first edition of the Bulletin of the Atomic Scientists, initially a six-page, black-and-white bulletin and later a magazine, created in anticipation that the atom bomb would be “only the first of many dangerous presents from the Pandora’s Box of modern science.”
-
-
Artificial Intelligence and the Manufacturing of Reality
The belief in conspiracy theories highlights the flaws humans carry with them in deciding what is or is not real. The internet and other technologies have made it easier to weaponize and exploit these flaws, beguiling more people faster and more compellingly than ever before. It is likely artificial intelligence will be used to exploit the weaknesses inherent in human nature at a scale, speed, and level of effectiveness previously unseen. Adversaries like Russia could pursue goals for using these manipulations to subtly reshape how targets view the world around them, effectively manufacturing their reality. If even some of our predictions are accurate, all governance reliant on public opinion, mass perception, or citizen participation is at risk.
-
-
How Russia May have Used Twitter to Seize Crimea
Online discourse by users of social media can provide important clues about the political dispositions of communities. New research suggests it can even be used by governments as a source of military intelligence to estimate prospective casualties and costs incurred from occupying foreign territories. New research shows real-time social media data may have been a source of military intelligence for the Kremlin and potentially other governments.
-
-
Encryption “Backdoors” Would Weaken Election Security: Election Protection Coalition
A coalition working on improving elections security sent a letter to Attorney General William Barr Wednesday, criticizing the AG for recent comments he made in he called on tech companies to create a “backdoor” in their devices. The backdoor would allow law enforcement to examine the communications of individuals arrested on suspicion of committing crimes or engaging in terrorism.
-
-
“Like” at Your Own Risk
New “Chameleon” Attack Can Secretly Modify Content on Facebook, Twitter. or LinkedIn: That video or picture you “liked” on social media of a cute dog, your favorite team or political candidate can actually be altered in a cyberattack to something completely different, detrimental and potentially criminal.
-
-
How Iran’s Military Outsources Its Cyberthreat Forces
Two years ago, I wrote that Iran’s cyberwarfare capabilities lagged behind those of both Russia and China, but that it had become a major threat which will only get worse. It had already conducted several highly damaging cyberattacks. Since then, Iran has continued to develop and deploy its cyberattacking capabilities. It carries out attacks through a network of intermediaries, allowing the regime to strike its foes while denying direct involvement.
-
-
Letting “A Fox Loose in A Chicken Coop”: U.K. Intel Anxious about Huawei Deal
High-level officials at the U.K. Government Communications Headquarters (GCHQ), the British equivalent of the U.S. NSA (and Britain’s largest intelligence agency), said they were concerned about the imminent decision by the government of Boris Johnson to allow Huawei access to the U.K. new telecoms network infrastructure. A high-level GCHQ source told The Times that handing Huawei access the U.K. telecom networks would be akin to “letting a fox loose in a chicken coop.”
-
-
Researcher Tests “Vaccine” Against Hate
Amid a spike in violent extremism around the world, a communications researcher is experimenting with a novel idea: whether people can be “inoculated” against hate with a little exposure to extremist propaganda, in the same manner vaccines enable human bodies to fight disease.
-
-
"Redirect Method": Countering Online Extremism
In recent years, deadly white supremacist violence at houses of worship in Pittsburgh, Christchurch, and Poway demonstrated the clear line from violent hate speech and radicalization online to in-person violence. With perpetrators of violence taking inspiration from online forums, leveraging the anonymity and connectivity of the internet, and developing sophisticated strategies to spread their messages, the stakes couldn’t be higher in tackling online extremism. Researchers have developed the Redirect Method to counter white supremacist and jihadist activity online.
-
-
YouTube’s Algorithms Might Radicalize People – but the Real Problem Is We’ve No Idea How They Work
Does YouTube create extremists? It’s hard to argue that YouTube doesn’t play a role in radicalization, Chico Camargo writes. “In fact, maximizing watchtime is the whole point of YouTube’s algorithms, and this encourages video creators to fight for attention in any way possible.” Society must insist on using algorithm auditing, even though it is a difficult and costly process. “But it’s important, because the alternative is worse. If algorithms go unchecked and unregulated, we could see a gradual creep of conspiracy theorists and extremists into our media, and our attention controlled by whoever can produce the most profitable content.”
-
-
Homomorphic Encryption Improves Cloud Security
A new approach to encryption — homomorphic encryption system — could improve user perception of cloud computing services where the users are concerned about private or personal data being exposed to third parties.
-
-
An Open Source Effort to Encrypt the Internet of Things
End-to-end encryption is a staple of secure messaging apps like WhatsApp and Signal. Such encryption ensures that no one—even the app developer or the device manufacturer—can access the user’s data as it travels the web. “But what if you could bring some version of that protection to increasingly ubiquitous—and notoriously insecure—Internet of Things devices?” asks Lili Hay Newman.
-
-
Chinese Communist Party’s Media Influence Expands Worldwide
Over the past decade, Chinese Communist Party (CCP) leaders have overseen a dramatic expansion in the regime’s ability to shape media content and narratives about China around the world, affecting every region and multiple languages, according to a new report. This trend has accelerated since 2017, with the emergence of new and more brazen tactics by Chinese diplomats, state-owned news outlets, and CCP proxies.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.