• British Army to Engage in Social Media Warfare as New Cyber Division Unveiled

    The British Army is to engage in social media warfare, its most senior soldier has announced as he launched a new division of the military dedicated to fighting cyber threats. The new formation, titled 6 Division (6 Div), will seek to influence the behavior of the public and adversaries by specializing in “information warfare.” It is expected to react to social media “attacks” on Britain, and proactively launch similar offensives.

  • Facebook Isn’t Responsible as Terrorist Platform, Court Says

    Facebook Inc. doesn’t have to face a lawsuit by victims of Hamas attacks and their relatives who claimed that the social network unlawfully assisted the terror group, a federal appeals court ruled. the lawsuit was among several around the U.S. testing whether victims of terrorist attacks and their families can hold social-media companies to account for allowing violent extremists to use their platforms to recruit followers. The terrorism victims attempted for the first time to argue that social-media companies could be held liable under the U.S. Anti-Terrorism Act.

  • Tech Companies Not Doing Enough to Fight Phishing Scams

    Technology companies could be doing much more to protect individuals and organizations from the threats posed by phishing, according to new research. However, users also need to make themselves more aware of the dangers to ensure potential scammers do not obtain access to personal or sensitive information.

  • State Election Offices Made for an Easy Target for Russian Hackers

    In the months before the 2016 presidential election, one U.S. state received a notification from a federally backed cybersecurity group, warning about suspicious cyber activity directed at its networks. The state IT officials did not share the alert with other state government leaders and as late at January 2018, the same officials reported nothing “irregular, inconsistent, or suspicious” took place before the vote. In fact, GRU, Russia’s military intelligence agency, had scanned one of the state’s “election-related” domains, according to a new Senate report.

  • The Kremlin Weaponized News: RT and Sputnik

    Russian government media outlets RT and Sputnik perform three functions on behalf of the Kremlin, its policies, and its preferences. The first is “damage control” function for the Russian state during incidents such as the poisoning of Sergei and Yulia Skripal in the United Kingdom. The second is to project Russian strength and construct news agendas favorable to the Kremlin and its outlook. The third function is weakening Western democracies by discrediting democratic, free-market, liberal, and pluralist values.

  • Hacking Connected Cars to Gridlock Whole Cities

    In the year 2026, at rush hour, your self-driving car abruptly shuts down right where it blocks traffic. You climb out to see gridlock down every street in view, then a news alert on your watch tells you that hackers have paralyzed all Manhattan traffic by randomly stranding internet-connected cars. Researchers warn that even with increasingly tighter cyber defenses, the amount of data breached has soared in the past four years, but objects becoming hackable can convert the rising cyber threat into a potential physical menace.

  • 2020 Election Security Can’t Wait Till 2020

    In the wake of last week’s testimony by Special Counsel Robert Mueller and the detailed report released by the Senate Intelligence Committee, the press coverage has emphasized—understandably—the need to harden U.S. defenses against various forms of cyber interference that Russia—and now Iran, too—appear intent on carrying out in the 2020 election. While it’s true that 2020 election security is critical, it’s important to emphasize that protecting our elections can’t wait until 2020 is upon us. That’s because, if our foreign adversaries’ goal is (as the Senate Intelligence Committee report confirmed) to undermine American confidence in our own democracy, the opportunities to do so are already unfolding.

  • Sounding the Alarm about Another Kind of 9/11

    Richard Clarke knows some things about clear and present dangers. As the first U.S. counterterrorism czar, he tried to alert important White House decision-makers before September 11 about the threat of a terrorist attack on U.S. soil, but those warnings were largely ignored; afterwards, he famously apologized publicly for the government’s failures. These days, Clarke is trying to get people to think hard about the next big attack—the cyber version—and all the ones that have already happened.

  • Hackers’ Latest Target: School Districts

    Some hackers demand ransom; others sweep up personal data for sale to identity thieves. But whatever hackers’ motives, school systems around the country have been the targets of their cyberattacks. Nearly two-thirds of school districts in the United States serve fewer than 2,500 students, and many do not have a staff member dedicated solely to cybersecurity.

  • U.S. Election Infrastructure: Troubling Bipartisan Conclusions

    The Senate Select Committee on Intelligence (SSCI) released its first of several bipartisan reports about its own investigation into Russia’s 2016 election interference on Thursday. This one focused on Russian efforts against U.S. election infrastructure. The finding that dominated headlines was that Russia targeted election systems in all 50 states in 2016. This meant the Russian effort reached far deeper into the U.S. than previously understood by officials. What also caught people’s attention about the report was how heavily redacted it was. The report, with its worrying conclusions, provokes one overwhelming question: What can be done to stop this from happening again?

  • What the Mueller Investigation Was Always About

    In the partisan warfare that dominated last Wednesday’s hearings, we’ve forgotten the point: Our elections are under threat, and the president doesn’t much care. Robert Mueller was originally charged with investigating Russian efforts to influence the outcome of the 2016 election and that only secondarily was he tasked with figuring out whether the president had obstructed justice by impeding that investigation. The whole point of the Mueller investigation and report is that Russia hacked an election, that it is right now hacking the next election, and that this is a threat to national security and the long-standing American experiment in representative democracy.

  • Russian Twitter Trolls Stoke Anti-immigrant Lies Ahead of Canadian Election

    Russian troll activity on Twitter aimed at influencing public opinion has attracted a lot of attention in the United States and other western democracies. Canadians may feel it’s not an issue here. But a recent examination of Twitter data suggests there are reasons to be concerned as the country heads into a federal election.

  • Russia Targeted Election Infrastructure in All 50 States in 2016: Senate Intel Report

    On Thursday the Senate Intelligence Committee releases the first volume in the Committee’s bipartisan investigation into Russia’s attempts to interfere with the 2016 U.S. elections, dealing with Russia’s attacks on the U.S. election infrastructure. The Committee found that Russia targeted election systems in all 50 states in 2016. In the majority of cases, Russia’s attacks went undetected by the states and federal officials at the time. The report suggested that the Russian efforts in 2016 might have been cataloging options “for use at a later date” — a possibility that officials of the National Security Agency, DHS, and the FBI said was their biggest worry.

  • Russian Government-linked Hacker Group Releases Powerful Adroid Malware

    The St. Petersburg-based Special Technology Center (STC), a Russian technology group linked to the GRU, Russia’s military intelligence branch, was sanctioned by the U.S. government for its role in the 2016 Kremlin-directed cyberattacks on the U.S. election infrastructure. STC is back in the news. This time, for developing n especially powerful and persistent malware, dubbed Monokle.

  • Using Social Media to Analyze, Thwart Terrorist Activity

    It is known that much terrorist activity utilizes the power and immediacy of online social media and social networking tools to coordinate its attacks, rally support and spread the various agendas of the different groups and networks. Researchers explains how we might turn the tables on the terrorists and use those tools to analyze terrorist activity and make predictions about future scenarios, and so have the tools to thwart them in their deadly endeavors.