• “Big picture” platforms boost fight against online terror activity

    The fight against terrorism-related content and illegal financing online is speeding up thanks to new platforms that join up different internet-scouring technologies to create a comprehensive picture of terrorist activity. The idea is that when an online tool discovers a fragment of information it can be added to a constellation of millions of others - revealing links that might otherwise have gone undetected or taken much longer to uncover.

  • Butina pleads guilty to meddling in U.S. politics under the direction of “Russian Official”

    ABC News has obtained a copy of Maria Butina’s plea agreement, and she has decided to plead guilty to conspiracy charges and cooperate with authorities’ ongoing investigations. Butina admits that she and an unnamed “U.S. Person 1,” which sources have identified as longtime Republican operative Paul Erickson, with whom she had a multiyear romantic relationship, “agreed and conspired, with a Russian government official (“Russian Official”) and at least one other person, for Butina to act in the United States under the direction of Russian Official without prior notification to the Attorney General.”

  • Bolstering cyber-physical systems security

    Researchers have been awarded a grant of nearly $1 million to develop stronger safeguards for a wide array of complex systems that rely on computers – from public water supply systems and electric grids to chemical plants and self-driving vehicles. Increasingly, these cyber-physical systems, or CPS, are threatened by both physical and cyberattacks.

  • No time for complacency: How to combat foreign interference after the midterms

    By David Salvo and Joshua Kirschenbaum

    From cabinet officials in the Trump administration to the social media platform companies, there has been widespread acknowledgement in the United States that the Russian government and other authoritarian states targeted the midterm elections and will continue to interfere in U.S. democracy. The administration and Congress have tools at their disposal to raise the costs on those who interfered in the midterms and to deter authoritarian actors from interfering in U.S. democratic institutions and processes in the future. These include punitive measures like sanctions, defensive steps like improving election security and regulating political advertisement online, and congressional oversight functions to hold the administration accountable and keep pressure on tech companies to secure their platforms from manipulation.

  • Russia is trying to undermine Americans’ confidence in the justice system, security experts warn

    By Bastien Inzaurralde

    Cybersecurity, national security, and legal experts are warning that Russia’s efforts to weaken America’s democratic institutions are not limited to elections — but also extend to the U.S. justice system. “While we all focused on the electoral system, I think this disinformation effort is organized to really attack any of the pillars of democracy,” Elizabeth Rindskopf Parker, a former general counsel at the National Security Agency and the CIA, told the Washington Post’s Bastien Inzaurralde. “And when you think of the system that is the most highly regarded among the three branches of government, it is the court system. If you were installed in the position of a Russian disinformation planner, wouldn’t you want to erode that?”

  • DHS S&T awards $1.14 million for improving cyber data privacy

    DHS S&T has awarded a total of $1,149,900 across two organizations to develop new research and development (R&D) capabilities to enhance the management of privacy threats and vulnerabilities.

  • Subtle visual cues in online forums nudge users to reveal more than they would like

    Pictures may be worth a thousand words, but icons may be even more powerful in nudging people to disclose more information online, according to an interdisciplinary team of Penn State researchers. In a study, researchers found that people using an online sexual health forum featuring computer graphics, called icons, that implied a sense of crowd size and connectivity, revealed more sensitive information than visitors to a site without those visual cues.

  • New cryptography must be developed and deployed now, even if quantum threats are a decade away

    Given the current state of quantum computing and the significant challenges that still need to be overcome, it is highly unlikely that a quantum computer that can compromise public-key cryptography – a basis for the security of most of today’s computers and networks – will be built within the next decade, says a new report by the National Academies of Sciences. However, because replacing an established internet protocol generally takes over a decade, work to develop and deploy algorithms that are resilient against an attack by a quantum computer is critical now.

  • GOP tells FBI that NRCC computers were subject of major cyber hack during 2018 midterms

    The Republican Party has told the FBI that its computer network was the victim of a major cyber hack during the 2018 midterms campaign. The National Republican Congressional Committee (NRCC) said it believes that thousands of sensitive emails were exposed as a result of the attack.

  • Reflecting on the past to counter future terrorism

    Warfare in the future will increasingly be about manipulating perceptions, whether by hostile states or non-state actors, according to terrorism expert Brian Michael Jenkins. The creation of fear and anxiety by terrorists, and foreign meddling in U.S. politics, are components of contemporary conflict. A major challenge facing the U.S. is how to get better at countering foes while strengthening national institutions, and U.S. democracy depends on it, Jenkins said.

  • New “deception consistency” method could thwart computer hackers

    Can you deceive a deceiver? That’s the question that computer scientists have recently been exploring. They are looking at how to make cyber deception a more effective tool against malicious hackers. “The main objective of our work is to ensure deception consistency: when the attackers are trapped, they can only make observations that are consistent with what they have seen already so that they cannot recognize the deceptive environment,” the researchers say.

  • Did Manafort meet Assange?

    Donald Trump’s former campaign manager Paul Manafort held secret talks with Julian Assange inside the Ecuadorian embassy in London, and visited around the time he joined Trump’s campaign, the Guardian has been told. Sources have said Manafort went to see Assange in 2013, 2015 and in spring 2016 – during the period when Manafort was made a key figure in Trump’s push for the White House. It is unclear why Manafort wanted to see Assange and what was discussed. But the last meeting is likely to come under scrutiny and could interest Robert Mueller, the special prosecutor who is investigating alleged collusion between the Trump campaign and Russia.

  • Trump regularly briefed on Manafort-Muller discussions

    A lawyer for Paul Manafort repeatedly briefed President Donald Trump’s lawyers on his client’s discussions with federal investigators after Manafort agreed to cooperate with the special counsel. This highly unusual arrangement intensified tensions between Trump’s team and the special counsel’s office after prosecutors discovered it. Muller’s office discovered that Manafort’s lawyers were regularly updating the Trump team after Manafort began cooperating with Muller’s office two months ago. Some legal experts speculated that it was an attempt by Manafort to secure a presidential pardon even as he worked with the special counsel in hopes of a lighter sentence.

  • Seven commandments of fake news: Exposing the Kremlin’s methods

    A 3-series multimedia project by the New York Times reveals how current Kremlin disinformation campaigns stem from a long tradition of weaponizing information. Titled Operation Infektion, the series tells the story of a “political virus,” invented decades ago by the KGB to “slowly and methodically destroy its enemies from the inside,” and which the Kremlin continues to deliberately spread to this day.

  • Revolutionizing cybersecurity through quantum research

    Scientists have found a novel way to safeguard quantum information during transmission, opening the door for more secure and reliable communication for warfighters on the battlefield. Recent advancements of cutting-edge technologies in lasers and nanophysics, quantum optics and photonics have given researchers the necessary tools to control and manipulate miniature quantum systems, such as individual atoms or photons - the smallest particles of light.