-
New Tech Aims to Help Societies Learn to Spot Fake News
Despite its relatively recent entrance into common parlance, “fake news” punctuated some of the most important elections of recent years, including 2016’s BREXIT referendum and U.S. presidential campaign. Thanks to social media, fake news can now be disseminated at breakneck pace to vast audiences that are often unable or unwilling to separate fact from fiction. Studies suggest that fake news spreads up to six times faster on social media than genuine stories, while false news stories are 70 percent more likely to be shared on Twitter. Preslav Nakov writes that all is not lost, though: “Fortunately, an emerging set of technologies are increasingly capable of identifying fake news for what it actually is, thereby laying the foundations for communities to do the same. The challenge is to ensure that these platforms get to where they are needed most.”
-
-
EU to Take Action against Fake News and Foreign Electoral Interference
Russian government-backed cyber aggression against democratic societies is heightening concerns in the West following a series of high-profile incidents. Russia’s electoral interference seriously threatens European democratic societies by promoting anti-EU, populist, far-right, ethnonationalist, xenophobic, and anti-American extremist forces.
-
-
Disinformation and Terrorism
Most of the discussions that take place around the concept of disinformation–false information spread deliberately to deceive–typically focus on the role of nation-states like Russia and China. But violent non-state actors, including terrorist groups, rely on disinformation as well, and some groups have developed fairly sophisticated disinformation capabilities. The objectives of these non-state actors can vary but are almost always some combination of spreading fear and terror, recruiting new followers to the cause, radicalizing individuals, and confusing and distracting public safety officials in order to sap finite resources.
-
-
A Hacker’s Paradise? 5G and Cybersecurity
The rollout of fifth-generation mobile networks — which offer the potential for downloads speeds of up to 10 times faster than today’s — will change how we communicate, work and stream video. However, the faster speeds are also likely to present an opportunity for hackers to target more devices and launch bigger cyberattacks, experts say. The problem is unlikely to be the security of 5G technology itself. The weak link in 5G’s security is likely to be communication between devices connected to the internet.
-
-
Campaign Finance Enforcement Is an Essential Component of National Security
Russia is at it again, so this week’s campaign finance enforcement action – in which two Russian-born associates of Rudy Giuliani have been indicted and arrested for violating campaign finance laws, including allegedly funneling Russian money into the main pro-Trump political action committee (PAC) — could not have come at a more important time for defending American democracy from foreign interference. The 2016 presidential election was subject to “sweeping and systematic” interference, and the next presidential election is just a year away with the FBI warning that “the Russians are absolutely intent on trying to interfere with our elections.”
-
-
Russia's Disinformation War Is Just Getting Started
The disinformation wars are only just getting started, warns a new report on Russian social media interference released by the Senate Select Committee on Intelligence. Published last week, the report offers the most comprehensive look at the efforts of the Russian propaganda factory known as the Internet Research Agency to divide Americans, undermine public faith in the democratic process, and aggressively support Donald Trump before and after the 2016 election. Paris Martineau writes in Wired that in addition to affirming much of what had been reported about Russian online interference over the past three years—including in Robert Mueller’s sweeping indictment of the IRA in February 2018—the report offers a comprehensive look at the extent of past foreign influence operations and recommendations on how best to prepare for those yet to come. It’s the second volume to come out of the Senate Intel Committee, though this one is “much more detailed in its analysis, meticulously cited, and concerned with influence and impact,” says one expert. “The conclusions in the second volume are notably bolder and unequivocal in supporting academic research and the advisory groups’ findings. It reads like a different report altogether.”
-
-
Racists Are Recruiting. Watch Your White Sons.
Raising teenagers can be terrifying. Squishy little babies become awkward hormonal creatures who question their parents’ authority at every turn. Joanna Schroeder writes that she expected that. “What I didn’t predict was that my sons’ adolescence would include being drawn to the kind of online content that right-wing extremists use to recruit so many young men,” she writes. “Unfortunately, extremists know how to find new recruits in the very place our sons spend so much of their time: online. And too often, they’re more aware than we are of how vulnerable young white men are to radicalization.”
-
-
Aerial Threat: Why Drone Hacking Could Be Bad News for the Military
Unmanned aerial vehicles, more commonly called drones, are now a fundamental part of defense force capability, from intelligence gathering to unmanned engagement in military operations. But what happens if our own technology is turned against us? As with all IT technology, manufacturers and users may leave the digital doors unlocked. This potentially leaves opportunities for cyber-criminals and perhaps even cyber-warfare.
-
-
Using Machine Learning to Hunt Down Cybercriminals
An increasingly popular form of cyber-attack is to hijack IP addresses for a range of goals, from sending spam and malware to stealing Bitcoin. It’s estimated that in 2017 alone, routing incidents such as IP hijacks affected more than 10 percent of all the world’s routing domains. Existing efforts to detect IP hijacks tend to look at specific cases only when they’re already in process. But what if we could predict these incidents in advance by tracing things back to the actual hijackers themselves?
-
-
Senate Intel Committee: Russia Is Already Trying to Influence the 2020 Election
In recent months, President Donald Trump has intensified his efforts to advance the lies spread by the Kremlin and undermine the U.S. intelligence community consensus that Russia meddled in the 2016 presidential election. On July 25, Trump asked his Ukrainian counterpart to help push a Russian and far-right conspiracy theory that the U.S. cybersecurity company Crowdstrike worked with Ukranians and Democrats to frame Russia for election meddling. Patrick Tucker writes in Defense One that one important contribution of the second report on Russia’s meddling in the 2016 election, issued by the Republican-led Senate Select Committee on Intelligence, is that the committee, chaired by Sen. Richard Burr (R-North Carolina), is decisively refuting Trump and his conspiracy theory.
-
-
Senate Intel Committee: Russia Used Social Media to support Donald Trump “at the direction of the Kremlin”
On Tuesday, the Senate Select Committee on Intelligence released a new report, titled Russia’s Use of Social Media. It is the second volume released in the Committee’s bipartisan investigation into Russia’s attempts to interfere with the 2016 U.S. election. The new report examines Russia’s efforts to use social media to sow societal discord and influence the outcome of the 2016 election, led by the Kremlin-backed Internet Research Agency (IRA). The Committee found that the IRA sought to influence the 2016 U.S. presidential election by harming Hillary Clinton’s chances of success and supporting Donald Trump at the direction of the Kremlin. The Committee found that IRA social media activity was overtly and almost invariably supportive of then-candidate Trump to the detriment of Secretary Clinton’s campaign.
-
-
Independent Adviser Calls for Overhaul of U.K. Counter-Extremism Strategy
The U.K. government’s independent advisor on extremism is calling for a complete overhaul of the government’s strategy – recommending a new taskforce led by the Home Secretary. The U.K. Commission for Countering Extremism on Monday, 7 October, published its findings and recommendations in a new report, Challenging Hateful Extremism.
-
-
Independent Adviser Calls for Overhaul of U.K. Counter-Extremism Strategy
The U.K. government’s independent advisor on extremism is calling for a complete overhaul of the government’s strategy – recommending a new taskforce led by the Home Secretary. The U.K. Commission for Countering Extremism on Monday, 7 October, published its findings and recommendations in a new report, Challenging Hateful Extremism.
-
-
Free Speech Is Killing Us
There has never been a bright line between word and deed. Yet, for years, the founders of Facebook and Twitter and 4chan and Reddit tried to pretend that the noxious speech prevalent on those platforms wouldn’t metastasize into physical violence. Andrew Marantz writes in the New York Times that in the early years of this decade, back when people associated social media with Barack Obama or the Arab Spring, Twitter executives referred to their company as “the free-speech wing of the free-speech party.” “No one believes that anymore,” Marantz writes. Marantz says that after spending the past few years embedded as a reporter with the trolls and bigots and propagandists who are experts at converting fanatical memes into national policy, “I no longer have any doubt that the brutality that germinates on the internet can leap into the world of flesh and blood.” He adds: “The question is where this leaves us. Noxious speech is causing tangible harm. Yet this fact implies a question so uncomfortable that many of us go to great lengths to avoid asking it. Namely, what should we — the government, private companies or individual citizens — be doing about it?”
-
-
U.K. Government Drive to Tackle Extremism Is “Inadequate”
The drive to tackle extremism in the United Kingdom is failing because the government’s response is “inadequate” and “unfocused,” according to an official report published Monday. Extremist activity is contributing to a climate of censorship and fear, limiting expression, religion and belief while those countering it receive little support. The report warns that hateful, hostile and supremacist beliefs are increasingly visible in the U.K. today. “The Far Right’s narratives of a racial or cultural threat to “natives” from “aliens” have been making their way into the mainstream. “As are Islamists’ ideas for defending a single politicized and communal Muslim identity against the West’s corrupting influence. And the Far Left’s conflation of anti-imperialist and antisemitism”, it said.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.