-
Telefonica Deutschland Chooses Huawei to Build Its German 5G Network
Rebuffing U.S. pressure, German mobile provider Telefonica Deutschland announced Wednesday that it has chosen Finland’s Nokia and China’s Huawei to build its 5G network in Germany, the company. Huawei is a global leader in constructing equipment and infrastructure for ultra-high-speed 5G data networks, but the intelligence services of leading Western countries have argue that Huawei is a security threat because of its close ties with the Chinese military and intelligence establishments.
-
-
Unlawful Metadata Access Is Easy When We’re Flogging a Dead Law
After watching this year’s media raids and the prosecution of lawyers and whistleblowers, it’s not hard to see why Australians wonder about excessive police power and dwindling journalistic freedom. But these problems are compounded by another, less known issue: police, and other bodies not even involved in law enforcement, have broad powers to access metadata. Each year, police alone access metadata in excess of 300,000 times.
-
-
U.K. Intelligence Probing Russian Election Meddling
Britain’s cybersecurity agency is investigating whether state-sponsored Russian hackers were behind the leaks of British government documents used by opposition politicians to embarrass Boris Johnson’s ruling Conservative Party ahead of Thursday’s general election.
-
-
The New Kind of Warfare Reshaping Global Politics
The list is long: Russian internet trolls interfering in the 2016 U.S. election; Russian operatives murdering Putin’s opponents abroad; Chinese spies manipulating Australian politics while the country’s coast guard ships harass Japanese fishing fleets, and much more. Simon Clark writes that these are not random acts of autocratic aggression. Rather, they are examples of a new form of warfare which is becoming a bigger challenge for the United States and its western allies: gray-zone conflict.
-
-
Social Media Vetting of Visa Applicants Violates the First Amendment
Beginning in May, the State Department has required almost every applicant for a U.S. visa—more than fourteen million people each year—to register every social media handle they’ve used over the past five years on any of twenty platforms. “There is no evidence that the social media registration requirement serves the government’s professed goals” of “strengthen” the processes for “vetting applicants and confirming their identity,” Carrie DeCell and Harsha Panduranga write, adding: “The registration requirement chills the free speech of millions of prospective visitors to the United States, to their detriment and to ours,” they write.
-
-
Going After the Good Guys: The Government’s Ransomware Identity Crisis
Government agencies find it difficult to keep pace with the rapidly evolving cybercrime – especially when it comes to ransomware and malware. Ryan Blanch, a criminal defense attorney who has been involved in myriad cybercrime cases, writes that “sometimes, the government seems to be going after the good guys instead of the bad guys.”
-
-
A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors
Earlier this fall Google announced that it had demonstrated “quantum supremacy” – that is, that it performed a specific quantum computation far faster than the best classical computers could achieve. IBM promptly criticized the claim, saying that its own classical supercomputer could perform the computation at nearly the same speed with far greater fidelity. “So how can you make sense of what is going on?” Subhash Kak, a professor of Electrical and Computer Engineering, asks. “As someone who has worked on quantum computing for many years, I believe that due to the inevitability of random errors in the hardware, useful quantum computers are unlikely to ever be built.”
-
-
Telegram: The Latest Safe Haven for White Supremacists
Telegram, the online social networking, may not be as popular in the U.S. as Twitter or Facebook, but with more than 200 million users, it has a significant audience. And it is gaining popularity. ADL reports that Telegram has become a popular online gathering place for the international white supremacist community and other extremist groups who have been displaced or banned from more popular sites.
-
-
The Drums of Cyberwar
A recent study found that if hackers were to take down the electric grid in just fifteen states and Washington, D.C., 93 million people would be without power, quickly leading to a “rise in mortality rates as health and safety systems fail; a decline in trade as ports shut down; disruption to water supplies as electric pumps fail and chaos to transport networks as infrastructure collapses.” The cost to the economy, the study reported, would be astronomical: anywhere from $243 billion to $1 trillion. “Sabotaging critical infrastructure may not be as great an existential threat as climate change or nuclear war, but it has imperiled entire populations already and remains a persistent probability,” Sue Halperin writes.
-
-
New Research Center Will Fight Misinformation
On 3 December, the University of Washington launched the Center for an Informed Public (CIP). The CIP, an interdisciplinary center housed in UW’s Information School, will use applied research to engage with the public through community partners such as libraries to confront the misinformation epidemic. “If we care about common goals — things like safe communities, justice, equal opportunity — we have to care also about facts, truth and accuracy,” UW President Ana Mari Cauce said. “Misinformation can be weaponized. It has been weaponized to divide us and to weaken us.”
-
-
Mobile Devices Blur Work and Personal Privacy Increasing Cyber Risks
Organizations aren’t moving quickly enough to identify cyber security threats linked to the drive toward using personal mobile devices in the workplace, cybersecurity researchers warn. “The breakneck speed of digital transformation brought with it opportunities as well as threats,” one researcher said. “Organizations don’t appear to be keeping up with the pace of change, deliberately putting the brakes on digital transformation because it comes with security challenges.”
-
-
Setting New Record for Cracking Encryption Keys
An international team of computer scientists had set a new record for two of the most important computational problems which are the basis for nearly all of the public-key cryptography which is currently used in the real world.
-
-
The Dark Psychology of Social Networks
Every communication technology brings with it different constructive and destructive effects. Jonathan Haidt and Tobias Rose-Stockwell write that it typically takes some time to find and improve the balance between these negative and positive effects. The note that as social media has aged, the initial optimism which welcomed the new technology’s introduction has been replaced by a growing awareness of the technology deleterious effects – especially on the quality and purpose of political discussion.
-
-
Former Envoy Huntsman: Putin Likely ‘Joyful’ About Ukraine Theory
President Donald Trump’s former ambassador to Russia said Vladimir Putin is likely “joyful” about the renewed prominence of a debunked conspiracy theory that Ukraine was responsible for meddling in the 2016 election, which experts consider Russian disinformation.
-
-
Russian Hackers Source of Labour Party’s “NHS for Sale” Document
In a press conference last week, Jeremy Corbin, the leader of the Labour Party, showed the attendees a hefty document – 451 pages! — which, he claimed, was a classified government document detailing secret U.K-U.S. negotiations between the Conservative Party-led government and the United States to sell parts of the U.K. National Health Service (NHS) to American investors. Experts say Russian government hackers stole the document and handed it to Labour in order to discredit the government and deepen polarization ahead of the 12 December parliamentary election.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.