• Cyberspace Is Critical Infrastructure – It Will Take Effective Government Oversight to Make It Safe

    A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a dog.” The New Yorker cartoon doesn’t apply today. Not only do your browser, service provider and apps know you’re a dog, they know what breed you are, what kind of dog food you eat, who your owner is and where your doghouse is. Cyberspace can function as critical infrastructure only when it’s safe for everyone, but legal and regulatory protections in cyberspace have not kept up with the times.

  • Official: U.S. Adversaries Taking Sides, Wielding Influence Ahead of Election

    Russia, China and Iran are all actively meddling in U.S. presidential politics hoping to persuade American voters to put their preferred candidate in the White House, according to an extraordinary warning from Washington’s top counterintelligence official. As was the case in 2016, Russia is actively working to help Trump. Russia has also recruited Ukrainian “actors” to manufacture dirt on Joe Biden and his son, to be fed into the investigation of the Bidens by Senator Ron Johnson (R-Wisconsin). China and Iran would prefer to see Biden in the White House, but their interference efforts are not at the level of Russia’s broad campaign to help Trump. Trump rejected that part of the intelligence community’s assessment which details Russia’s broad effort on his behalf. “The last person Russia wants to see in office is Donald Trump,” he said. “I don’t care what anybody says.”

  • ‘Deepfakes’ Ranked as Most Serious AI Crime Threat

    Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism. : “As the capabilities of AI-based technologies expand, so too has their potential for criminal exploitation. To adequately prepare for possible AI threats, we need to identify what these threats might be, and how they may impact our lives,” says one expert.

  • Consumers Do Not Fully Trust Smart Home Technologies

    Researchers investigating the trust consumers have in “smart home” – homes in which smart devices are connected to each other to create an “internet of things” (IoT) — found that consumers were worried about the likelihood of security incidents. Businesses and policymakers will have to work together to gain consumer trust in smart home technologies.

  • Russian Government Hackers Stole, Leaked Classified U.K. Trade Documents Ahead of 2019 Election

    A treasure trove of classified documents about secret trade negotiations between the United States and the United Kingdom – discussion which aimed to prepare the U.S.-U.K. economic relationship for the post-Brexit era – were stolen by Russian government hackers and leaked to the opposition Labour Party ahead of the December 2019 general election. The Russian government hackers stole the classified papers – 451 pages in all — from an email account of Liam Fox, who was then the U.K. trade secretary.

  • New Method to Defend against Smart Home Cyberattacks

    Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices.

  • Pompeo: U.S. Will Take Action on Chinese Software in “Coming Days

    Chinese software companies operating in the United States assiduously collect customers’ personal date, browsing habits, facial images, and other information and deliver it to China’s intelligence agencies for possible use by China when it would serve China’s interests to do so. Secretary of State Mike Pompeo said Sunday that the fact the Chinese software companies serve as information collectors for China’s intelligence agencies poses a serious national security threat to the United States, and that the administration, in the coming days, will soon announce a series of measures aiming to restrict the ability of Chinese software companies to operate in this way, and ban some companies from operating in the United States altogether.

  • Election Cyber Surge Initiative Launches

    On Friday, the University of Chicago’s Cyber Policy Initiative (CPI) announced the launch of the Election Cyber Surge initiative to help address the urgent need to connect state and local election offices with volunteer technologists. The initiative will create a database which will allow officials to search for potential volunteers in their state or city by skillset, subject matter expertise, or cybersecurity experience.

  • Research on Voting by Mail Says It’s Safe – from Fraud and Disease

    As millions of Americans prepare to vote in November – and in many cases, primaries and state and local elections through the summer as well – lots of people are talking about voting by mail. Some critics – including President Donald Trump on several occasions – have cast doubt on the integrity of mail-in voting, even though some of them have voted by mail in the past. The evidence shows that voting by mail is rarely subject to fraud, does not give an advantage to one political party over another and can in fact inspire public confidence in the voting process, if done properly.

  • New Partnership Aims to Detect, Mitigate Attempts to Subvert, Delegitimize November Election

    Four of the U.S. leading institutions focused on analysis of mis- and disinformation in the social media landscape have created a new partnership — the Election Integrity Partnership (EIP) – which aims to detect and mitigate the impact of attempts to prevent or deter people from voting or to delegitimize election results.

  • “Knock Codes” for Smartphone Security Are Easily Predicted

      Smartphone owners who unlock their devices with knock codes aren’t as safe as they think, according to new research. Knock codes work by letting people select patterns to tap on a phone’s locked screen. LG popularized the method in 2014, and now there are approximately 700,000 people using this method in the U.S. alone, along with one million downloads worldwide of clone applications for Google Android devices generally.

  • Huawei and TikTok Are at the Forefront of a New Drift to Regionalism – Many Others Will Follow

    Huawei and TikTok were two of the most successful examples of globalization. Both of these Chinese companies are now at the mercy of a widening geopolitical divide. The U.S. has led an increasingly successful campaign to eliminate Huawei from the global market over alleged security fears, and is threatening to ban TikTok too. These developments are signs of attempts by the U.S. to decouple from China’s economy and concentrate on alliances within its own political and economic sphere. It chimes with the wider drift away from globalization towards a more regional approach to trade.

  • This Year’s CyberForce Competition to Be Held Virtually

    Last week the Department of Energy (DOE) opened registration for the 2020 CyberForce Competition, the sixth iteration of the Department’s collegiate-level cyber defense competition designed to inspire and develop the next generation of energy sector cybersecurity professionals. Because of the pandemic, the 2020 CyberForce Competition will be held on 14 November completely in a virtual environment, with individual competitors rather than teams representing their respective academic institutions.

  • Chinese Government Hackers Charged with IP, COVID-19 Research Theft

    U.S. DOJ accused China on Tuesday of sponsoring criminal hackers to target biotech firms around the world working on coronavirus vaccines and treatments, as the FBI said the Chinese government was acting like “an organized criminal syndicate.”

  • U.K. Government, Intel. Took "Eye Off the Ball” Regarding Russia’s Direct Threat to U.K.: Report

    A report on Russian interference in British politics concluded on Tuesday that the Kremlin tried to influence the outcome of the 2016 Brexit referendum and the British government’s ignorance of potential meddling was “astonishing.” The report also found similar evidence for Russian interference in the Scottish independence referendum of 2014.