• Russian government’s fission know-how hard at work in Europe

    The objective of Russia’s broad, systematic disinformation and cyberattacks campaign against Western democracies is ambitious. Moscow has made fragmenting Europe into one of its primary strategic objectives. Dividing European populations from within and turning them against one another via targeted influence operations is a central component of this overarching strategic objective.


  • Russia has been cyber-attacking “U.K. media, telecommunications, and energy sectors”: U.K. cybersecurity chief

    Ciaran Martin, CEO of the U.K. National Cyber Security Center (NCSC): “I can confirm that Russian interference, seen by the National Cyber Security Center, has included attacks on the U.K. media, telecommunications and energy sectors. That is clearly a cause for concern — Russia is seeking to undermine the international system.”

  • Russia “weaponized information” to sow discord in West, destroy post-WWII international order: Theresa May

    U.K. prime minister Theresa May, in an extraordinary attack on Russia’s broad cyber-campaign against Western countries, has accused Russia of meddling in the elections of Western democracies and planting fake stories in other countries’ media in a sustained effort to “weaponize information” in order to sow discord and deepen internal conflicts Western democracies. May, speaking at the Lord Mayor’s Banquet on 13 November 2017, said that Russia’s goal was to destabilize, if not destroy, the post-Second World Order rules-based international order.

  • Russia has been cyber-attacking “U.K. media, telecommunications, and energy sectors”: U.K. cybersecurity chief

    Ciaran Martin, CEO of the U.K. National Cyber Security Center (NCSC): “I can confirm that Russian interference, seen by the National Cyber Security Center, has included attacks on the U.K. media, telecommunications and energy sectors. That is clearly a cause for concern — Russia is seeking to undermine the international system.”

  • Extremist content and Russian disinformation online: Working with tech to find solutions

    “It’s been more than a year since my colleagues and I described in writing how the Russian disinformation system attacked our American democracy. We’ve all learned considerably more since then about the Kremlin’s campaigns, witnessed their move to France and Germany and now watch as the world worst regimes duplicate their methods. Yet our country remains stalled in observation, halted by deliberation and with each day more divided by manipulative forces coming from afar. The U.S. government, social media companies, and democracies around the world don’t have any more time to wait. In conclusion, civil wars don’t start with gunshots, they start with words. America’s war with itself has already begun. We all must act now on the social media battlefield to quell information rebellions that can quickly lead to violent confrontations and easily transform us into the Divided States of America.”

  • Biology can show us how to stop hackers

    “Biology is the true science of security. And by that I mean that organisms have had to contend with adversaries and competitors from the very beginning of their evolutionary history. As a result, they’ve evolved an incredible repertoire of defense systems to protect themselves,” says an expert on biology and computation. “Looking at how biological systems have learned to protect themselves can suggest novel approaches to security problems,” ASU’s Professor Stephanie Forrest says. “What I try to do is look at biological mechanisms and principles and translate those mechanisms and architectures into computational algorithms that protect computers.”

  • Russia’s pro-Trump campaign began early, aiming to help him win GOP primaries: WSJ

    The U.S. intelligence community cited December 2015 as the earliest suspected time that Russian government social media account began their broad campaign in support of Donald Trump. A Wall Street Journal investigation reveals that the Kremlin’s campaign of support for Trump began six months earlier, in June 2015, days after he announced his candidacy. This earlier Russian disinformation campaign was aimed to help Trump defeat his Republican primary rivals. This early campaign, however, already engaged in dissemination of fake stories aiming to tarnish Hillary Clinton and undermine her campaign.

  • “Combosquatting” attacks, hiding in plain sight, trick computer users

    To guard against unknowingly visiting malicious websites, computer users have been taught to double-check website URLs before they click on a link. But attackers are now taking advantage of that practice to trick users into visiting website domains that contain familiar trademarks — but with additional words that change the destination to an attack site. The attack strategy, known as combosquatting, is a growing threat, with millions of such domains set up for malicious purposes.

  • DOJ considering charging Russian government officials in DNC, Podesta hacks

    The Department of Justice has identified six Russian government officials involved in hacking the DNC and using the information against candidate Hillary Clinton during the 2016 election. Prosecutors have enough evidence to bring charges against those individuals by next year. The information gathered by DOJ supports the U.S. intelligence community’s conclusion that Russian President Vladimir Putin ordered Russian government agencies to launch a coordinated effort to help Trump win the November election. DOJ has identified Russian hackers working for both military and intelligence agencies in Russia.

  • A third of the internet is under DoS attack

    For the first time, researchers have carried out a large-scale analysis of victims of internet denial-of-service (DoS) attacks worldwide. And what they found is, in a phrase from their study, “an eye-opening statistic.” The researchers found that about one-third of the IPv4 address space was subject to some kind of DoS attacks, where a perpetrator maliciously disrupts services of a host connected to the internet. IPv4 is the fourth version of an Internet Protocol (IP) address, a numerical label assigned to each device participating in a computer network.

  • Challenges to U.S. election integrity

    Various concerns about the security of U.S. elections have arisen over the past two decades, some more significant than others. While many studies have shown that voter fraud, for instance, is vanishingly rare in the U.S., what about the state of electoral administration, lost votes, and cyberattacks? MIT experts offer insights on data, technology, and election security in an era of rising concern.

  • Israeli software gives New York power plants “Iron Dome” protection against failures

    An Israeli company that developed the software for Israel’s Iron Dome anti-missile system is working with the New York Power Authority to prevent unexpected shutdowns. New York State Robert Moses Niagara Power Plant, Blenheim-Gilboa Pumped-Storage Power Plant, and a 500 MW plant in Queens now have software based on the software that runs Iron Dome.

  • Russia’s disinformation posts reached 126 million Americans: Facebook

    Disinformation specialists at the Internet Research Agency (IRA), a Kremlin-affiliated Russian group, created 80,000 Facebook posts which were directly served to 29 million Americans. After the posts were liked, shared, and commented on, they traveled to the news feeds of approximately 126 million Americans at some point between January 2015 and August 2017. These numbers mean that Russian-produced disinformation and propaganda reached about 40 percent of the U.S. population. Facebook says that IRA’s 80,000 posts come on top the 3,000 political ads created by the IRA – and that these ads were seen by 11.4 million Americans. “Many of the ads and posts we’ve seen so far are deeply disturbing — seemingly intended to amplify societal divisions and pit groups of people against each other,” said Facebook’s General Counsel Colin Stretch. “They would be controversial even if they came from authentic accounts in the United States. But coming from foreign actors using fake accounts, they are simply unacceptable.”

  • Insinuation and influence: How the Kremlin targets Americans online

    The objective of Kremlin influence operations, part of a larger set of tactics and strategies known as active measures, is to make the target population more amenable to Kremlin wants and desires. They achieve this either by gaining a sympathetic hearing of their views, or failing that, by keeping us busy fighting among ourselves. The Kremlin seeks both to sow discord and create chaos in Western societies and rally support for, or limit opposition to, its geopolitical agenda.

  • WannaCry report shows NHS chiefs knew of security danger, but management took no action

    A report from the parliamentary National Audit Office into the WannaCry ransomware attack that brought down significant parts of Britain’s National Health Service in May 2017 has predictably been reported as blaming NHS trusts and smaller organizations within the care system for failing to ensure that appropriate computer security measures such as software updates and secure firewalls were in place. But the central NHS IT organization, NHS Digital, provided security alerts and the correct patches that would have protected vulnerable systems well before WannaCry hit. This is not a cybersecurity failure in the practicalities, but a failure of cybersecurity management at the top level.