-
Research Shows How Terrorism Affects Our Language and Voting Patterns
Following the series of terrorist attacks between 2015 and 2017, German twitter users shifted their language towards that of the far right AfD party. Eventually voters rewarded the party at the 2017 election.
-
-
Quantum Cryptography Applications
The development of quantum computing means that the use of classic cryptography for secure communications is in danger of becoming obsolete. Quantum cryptography, on the other hand, uses the laws of quantum mechanics to ensure total security. One example of this is quantum key distribution, which enables two parties to secure a message via a random secret key.
-
-
Cybersecurity Goes Undercover to Protect Electric-Grid Data
Researchers, inspired by one of the mysteries of human perception, invented a new way to hide sensitive electric grid information from cyberattack: Within a constantly changing color palette.
-
-
Are We Asking Too Much of Cyber?
Both cyber enthusiasts and skeptics may be asking too much of cyber. “U.S. cyber strategies should be more explicit about articulating not only the strategic benefits cyberspace offers but also its limitations,” Erica Lonegran and Michael Poznansky write. “More realism about cyberspace may help leaders truly integrate cyber capabilities.”
-
-
Using Quantum Physics to Secure Wireless Devices
From access cards and key fobs to Bluetooth speakers, the security of communication between wireless devices is critical to maintaining privacy and preventing theft. Unfortunately, these tools are not foolproof and information on how to hack, clone and bypass these systems is becoming easier to find.
-
-
CCP’s Increasingly Sophisticated Cyber-enabled Influence Operation
Last week DOJ announced police officers from China’s Ministry of Public Security (MPS) created thousands of fake online personas on social media sites to target Chinese dissidents through online harassment and threats. The announcement marked the first definitive public attribution to a specific Chinese government agency of covert malign activities on social media. The MPS, however, is one of many party-controlled organizations that analysts have long suspected of conducting covert and coercive operations to influence users on social media.
-
-
The Key to Securing Legacy Computing Systems
For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.
-
-
“Smart” Tech Coming to a City Near You
The data-driven smart tech trend extends far beyond our kitchens and living rooms. Will real-time sensors and data offer new solutions to the challenges cities face, or just exacerbate existing inequalities?
-
-
U.S.-China Tech Competition Expands to AI Regulations
Competition between the U.S. and China in artificial intelligence has expanded into a race to design and implement comprehensive AI regulations. The efforts to come up with rules to ensure AI’s trustworthiness, safety, and transparency come at a time when governments around the world are exploring the impact of the technology on national security and education.
-
-
The Liberal Cyber Order
Grand strategy is a theory of security, a logical narrative about how states employ the instruments of national power to make themselves safe. States may choose from a variety of grand strategies. Joshua Rovner writes that two grand strategies are particularly important to the current U.S. debate: restraint and liberal internationalism. Last month the Biden administration released its National Cybersecurity Strategy, which offers a full display of the foundations of liberal internationalism. This is surprising, since Joe Biden’s approach to national security has always blended liberal ideals with realist restraint.
-
-
The 2020 Election Saw Fewer People Clicking on Misinformation Websites: Study
Stanford scholars find a smaller percentage of Americans visited unreliable websites in the run-up to the 2020 U.S. election than in 2016 – which suggests mitigation and education efforts to identify misinformation are working.
-
-
Banning TikTok Could Weaken Personal Cybersecurity
TikTok is not be the first app to be scrutinized over the potential exposure of U.S. user data, but it is the first widely used app that the U.S. government has proposed banning over privacy and security concerns. As a cybersecurity researcher, I see potential risks if the U.S. attempts to ban TikTok. The type of risk depends on the type of ban.
-
-
Anti-Zionism as Antisemitism: How Anti-Zionist Language from the Left and Right Vilifies Jews
Seven decades after Israel’s founding, some criticism of the country continues to promote age-old antisemitic tropes. Even before Israel was founded, conversations about the Zionist movement and the creation of the State of Israel at times included explicit anti-Jewish animus or espoused ideas historically wielded against Jewish communities. Today, many anti-Zionist activists continue to perpetuate this language.
-
-
Study Links Hard-Right Social Media with Incidents of Civil Unrest
An increase in social media activity on “hard-right” platforms — those that purport to represent viewpoints not welcome on “mainstream” platforms — contributes to rightwing civil unrest in the United States, according to a new study. A new Yale-led study finds evidence that social media activity on hard-right platforms contributes to political unrest offline. “The magnitude of the effect we found is modest but two characteristics of social media and civil unrest caution against dismissing it,” said Yale sociologist Daniel Karell.
-
-
Democracies Must Regulate Digital Agents of Influence
It would be a mistake to limit the public policy debate to traditional state-on-state espionage or major power rivalry. Such platforms and the advent of the eerily relatable artificial intelligence tool ChatGPT are society-changing technologies that cannot be dismissed as benign or treated as a public good closed to any regulatory or governance process.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.