-
Russia Targeted Election Infrastructure in All 50 States in 2016: Senate Intel Report
On Thursday the Senate Intelligence Committee releases the first volume in the Committee’s bipartisan investigation into Russia’s attempts to interfere with the 2016 U.S. elections, dealing with Russia’s attacks on the U.S. election infrastructure. The Committee found that Russia targeted election systems in all 50 states in 2016. In the majority of cases, Russia’s attacks went undetected by the states and federal officials at the time. The report suggested that the Russian efforts in 2016 might have been cataloging options “for use at a later date” — a possibility that officials of the National Security Agency, DHS, and the FBI said was their biggest worry.
-
-
Russian Government-linked Hacker Group Releases Powerful Adroid Malware
The St. Petersburg-based Special Technology Center (STC), a Russian technology group linked to the GRU, Russia’s military intelligence branch, was sanctioned by the U.S. government for its role in the 2016 Kremlin-directed cyberattacks on the U.S. election infrastructure. STC is back in the news. This time, for developing n especially powerful and persistent malware, dubbed Monokle.
-
-
Using Social Media to Analyze, Thwart Terrorist Activity
It is known that much terrorist activity utilizes the power and immediacy of online social media and social networking tools to coordinate its attacks, rally support and spread the various agendas of the different groups and networks. Researchers explains how we might turn the tables on the terrorists and use those tools to analyze terrorist activity and make predictions about future scenarios, and so have the tools to thwart them in their deadly endeavors.
-
-
Cyber Threats from the U.S. and Russia Are Now Focusing on Civilian Infrastructure
Cyber confrontation between the United States and Russia is increasingly turning to critical civilian infrastructure, particularly power grids, judging from recent press reports. The typically furtive conflict went public last month, when the New York Times reported U.S. Cyber Command’s shift to a more offensive and aggressive approach in targeting Russia’s electric power grid. Although both sides have been targeting each other’s infrastructure since at least 2012, according to the Times article, the aggression and scope of these operations now seems unprecedented.
-
-
Johannesburg Power Company Crippled by Ransomware Attack
City Power, the company supplying Johannesburg, South Africa’s economic hub, with electricity, has been attacked by a ransomware virus. The virus has “encrypted all our databases” representatives of the company said. Some of the company’s services have been crippled; the company said it may not be able to respond to a blackout; and more and more residents complain of loss of power. Johannesburg is not the first municipality to have its network infected by ransomware.
-
-
U.S. Intelligence Director Dan Coats Creates Senior Election Security Position
Director of National Intelligence Daniel Coats announced he established the position of Intelligence Community (IC) Election Threats Executive (ETE). The ETE will serve as the DNI’s principal adviser on threats to elections and matters related to election security. Additionally, the ETE will coordinate and integrate all election security activities, initiatives, and programs across the IC and synchronize intelligence efforts in support of the broader U.S. government.
-
-
U.S. Efforts to Counter Russian Disinformation and Malign Influence
“President Vladimir Putin’s Russia seeks to weaken Western governments and transatlantic institutions, discredit democratic and liberal values, and create a post-truth world,” says Alina Polyakova. “Russian disinformation campaigns aim to amplify existing social divisions and further polarize democratic societies. As such, they don’t stop when the ballot box closes. Elections may provide an ideal high-impact opportunity for a disinformation actor, but the barrage of disinformation against Western democracies, including the United States, continues between election cycles. Disinformation, as a tool of Russia’s political warfare, is not new. But what is new is that, today, what used to take years, takes minutes. The advance of digital technology and communication allows for the high-speed spread of disinformation, rapid amplification of misleading content, and massive manipulation via unsecured points of influence. This digital ecosystem creates opportunities for manipulation that have exceeded the ability of democratic nations to respond, and sometimes even to grasp the extent of the challenge.”
-
-
How the U.S. Can Fight Russian Disinformation for Real
“Where we ought to be setting the rules of engagement, the tone, and the moral compass in responding to Russia’s information war, the United States has been a tardy, timid, or tertiary player, with much of our public servants’ good work on this issue stymied by domestic politicization. Disinformation is not a political issue; it is a democratic one. Beyond that challenge, the United States has not invested sufficient resources to be competitive in the fight against disinformation. Russian information warfare continues to target the United States and our allies, as well as the rules-based international order. However, countering it has not been a budgetary priority” — Nina Jankowicz.
-
-
Cyber Threats Go Beyond Hackers and Scams but to Democracy Itself
Much of the discussion surrounding threats of the information age are focused on digitally enabled foreign influence and interference. However, analysis of adversaries’ information campaigns as seen in the 2016 presidential elections and Brexit referendum doesn’t capture the full extent of the problem that is the manipulation society already created. Tech giants haven’t just inadvertently created a new path for information warfare. Rather they have created the architecture for the persistent manipulation of whole societies – an architecture freely used by both adversaries and the tech corporations themselves. Just as market capitalism led to a market society, surveillance capitalism has led to the manipulation society.
-
-
A Russian Military Contractor Has a Shady New Android Malware Kit
A contractor for the Russian military that was sanctioned for interfering in the 2016 U.S. election has developed Android malware that is being used in “highly-targeted” attacks that exfiltrate data using third-party applications. The so-called “Monokle” malware is extremely invasive.It is capable of installing the attacker’s own software certificate in a certificate store and then using it for “man-in-the-middle” attacks, intercepting data before it reaches its intended recipient.
-
-
FBI Director: China No. 1 Counter-Intelligence Threat to the U.S.
The FBI has more than 1,000 investigations of U.S. intellectual property theft in all 50 states with nearly all leading back to China, FBI Director Christopher Wray said, calling China the No. 1 counter-intelligence threat to the United States. Wray described the threat as “more deep, more diverse, more vexing, more challenging, more comprehensive and more concerning than any counter-intelligence threat that I can think of.”
-
-
Bolstering Democracy in the Digital Age
The Knight Foundation announced a commitment of nearly $50 million in research to better understand how technology is transforming our democracy and the way we receive and engage with information. “Amidst a growing debate over technology’s role in our democracy, these investments will help ensure society is equipped to make evidence-based decisions on how to govern and manage the now-digital public square, Knight said.
-
-
Anonymizing Personal Data “Not Enough to Protect Privacy”: Study
Current methods for anonymizing data leave individuals at risk of being re-identified, according to new research. Researchers demonstrated that allowing data to be used — to train AI algorithms, for example — while preserving people’s privacy, requires much more than simply adding noise, sampling datasets, and other de-identification techniques.
-
-
Making it Easier to Program and Protect the Web
Behind the scenes of every web service, from a secure web browser to an entertaining app, is a programmer’s code, carefully written to ensure everything runs quickly, smoothly, and securely. MIT Professor Adam Chlipala builds tools to help programmers more quickly generate optimized, secure code.
-
-
Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Today, regular users of these and similar services number in the billions around the world. The U.S. Justice Department and the FBI have claimed repeatedly that the extensive use of such services hampers their ability to conduct investigations, because they cannot access encrypted communications. Officials in other countries have put forward a proposal they say would provide the needed access. But due to the fundamentals of public key encryption, this regime would end up raising most of the same concerns as other encryption back-door proposals floated in recent years.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.