• Achieving better security with randomly generating biological encryption keys

    Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavory hands — but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler.

  • Manafort wanted polling data sent to Ukrainians

    When, during the 2016 campaign, Paul Manafort sent Trump campaign’s internal polling data to Konstantin Kilimnik – a cut-out for the GRU, Russia’s military intelligence branch — he intended that data to be handed off to two Kremlin-allied Ukrainian oligarchs, Serhiy Lyovochkin and Rinat Akhmetov. Manafort told his accountant in August 2016 he was expecting $2.4 million from Ukraine in November 2016. His spokesman insists that money was payment for an old debt and not the data.

  • How Russia hacked U.S. power grid

    In an aptly titled investigative report — “America’s Electric Grid Has a Vulnerable Back Door—and Russia Walked Through It” — the Wall Street Journal has used “documents, computer records and interviews” to reconstruct exactly how Russian hackers accessed the U.S. electric grid in the spring of 2016, an attack that continued through 2017 and possibly 2018.

  • Manafort shared Trump campaign polling with Konstantin Kilimnik, a cut-out to Russian intelligence

    While he was the chairman of the Donald Trump presidential campaign, Paul Manafort shared internal campaign polling data with Konstantin Kilimnik, a cut-out for the GRU, Russia’s military intelligence service. Analysts believe he is, in fact, a Russian intelligence operative. It appears that the Trump campaign’s internal data Manafort shared with Russian intelligence was aimed to help the GRU to make the Kremlin’s social-media disinformation effort on behalf of Trump more targetd and effective, especially in suppressing the African American vote for Hillary Clinton. Kilimnik was indicted by Special Counsel Robert Mueller’s grand jury on 8 June 2018 on charges of obstruction of justice and conspiracy to obstruct justice by attempting to tamper with a witness on behalf of Manafort.

  • Problems using mobile technologies in public health care

    Many health care providers in remote locations around the world are actively using newer mobile technologies like text messaging and fingerprint identification to deliver important services and timely information to their patients. While the efforts are well-intended, two new studies find that such approaches need to be closely monitored to make sure they are meeting targeted goals. The two recently published studies identified multiple problems integrating mobile technologies into public health care.

  • Hundreds of German politicians hacked – except those on the pro-Russia far right

    The personal and job-related information of German Chancellor Angela Merkel, senior politicians, and members of the Bundestag from all political parties was released by hackers and posted to Twitter. The leaked information included office letters, internal memos, departmental communicatin, contact details, office access passcodes, and more. The only politicians who were not hacked and the information of which was not released: Members of the populist, far-right, pro-Russia Aleternative for Germany (AfD). In the run-up to the fall 2017 federal election in Germany, the GRU, Russia’s military intelligence, helped the AfD by employing the same combination of hacking and social media disinformation the GRU had succefully used to help Donald Trump win the 2016 U.S. election. The Russian campaign was successful, and the AfD is now the thiord-largest party in the Bundestag.

  • European far-right groups eschew violence to broaden appeal

    More than seventy years after the defeat of Nazi Germany, ethno-nationalist and white supremacist movements in Europe continue to thrive. They include far-right political parties, neo-Nazi movements, and apolitical protest groups. These groups’ outward rejection of violence expands the reach of their message, and  can increase the potential for radicalization.

  • How we built a tool that detects the strength of Islamophobic hate speech on Twitter

    In a landmark move, a group of MPs recently published a working definition of the term Islamophobia. They defined it as “rooted in racism,” and as “a type of racism that targets expressions of Muslimness or perceived Muslimness.” In our latest working paper, we wanted to better understand the prevalence and severity of such Islamophobic hate speech on social media. Such speech harms targeted victims, creates a sense of fear among Muslim communities, and contravenes fundamental principles of fairness. But we faced a key challenge: while extremely harmful, Islamophobic hate speech is actually quite rare.

  • From encrypting the web to encrypting the net: 2018 year in review

    We saw 2017 tip the scales for HTTPS. In 2018, web encryption continues to improve. The focus has begun to shift toward email security, and the security community is shifting its focus toward further hardening TLS, the protocol that drives encryption on the Internet.

  • AI advancement opens health data privacy to attack

    Advances in artificial intelligence have created new threats to the privacy of health data, a new study shows. The study suggests current laws and regulations are nowhere near sufficient to keep an individual’s health status private in the face of AI development.

  • Terrorism lawsuits threaten lawful speech: 2018 in review

    One of the most important principles underpinning the Internet is that if you say something illegal, you should be held responsible for it—not the owners of the site or service where you said it. That principle has seen many threats this year—not just in federal legislation, but also in a string of civil lawsuits intended to pin liability on online platforms for allegedly providing material support to terrorists.

  • Social media efforts to combat foreign interference

    In the wake of revelations throughout 2017 that Russia had exploited social media platforms to influence the 2016 presidential election, executives from Facebook, Twitter, and Google appeared before the Senate Judiciary Committee on 31 October 2017 to discuss foreign interference on their platforms. Over ten months later, on 5 September 2018, representatives from tech giants were again called to Capitol Hill to update lawmakers on their efforts in the lead-up to the midterm elections. A new report reviews and analyzes the steps taken by online information platforms to better defend against foreign interference since 2016, specifically focusing on three lines of effort: policies to address inauthentic behavior, measures to improve advertising transparency, and forward-looking investments and external partnerships.

  • The IRA and political polarization in the United States

    Russia’s Internet Research Agency (IRA) launched an extended attack on the United States by using computational propaganda to misinform and polarize U.S. voters. A new report from the Computational Propaganda roject at Oxford University’s Oxford Internet Institute (OII) provides the first major analysis of this attack based on data provided by social media firms to the Senate Select Committee on Intelligence (SSCI). The analysis answers several key questions about the activities of the known IRA accounts, and identifies which aspects of the IRA’s campaign strategy got the most traction on social media and the means of microtargeting U.S. voters with particular messages.

  • Cybercrime is on the rise, and Norway is worried

    As society becomes ever more technology-driven and digitized, electronic crime is rising along with it. In Norway, cybercrime results in an annual loss of 0.64 percent of Norway’s GDP — this amounts to NOK 19 billion ($2.2 billion) a year, money that does not benefit society.

  • A personality trait puts you at risk for cybercrime

    Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research examines the behaviors – both obvious and subtle – that lead someone to fall victim to cybercrime involving Trojans, viruses and malware.