-
EU issues call to action to combat Russian “propaganda”
The European Commission and lawmakers have accused Russia of orchestrating a “disinformation campaign” aimed at destabilizing the bloc and called for increased measures to combat the threat. “There seems frankly little doubt that the pro-Kremlin disinformation campaign is an orchestrated strategy, delivering the same disinformation stories in as many languages as possible, through as many channels as possible, as often as possible,” EU Security Commissioner Julian King told the European Parliament in Strasbourg on 17 January.
-
-
Declining trust in facts, institutions imposes real costs on U.S. society
Americans’ reliance on facts to discuss public issues has declined significantly in the past two decades, leading to political paralysis and collapse of civil discourse, according to a RAND report. This phenomenon, referred to as “Truth Decay,” is defined by increasing disagreement about facts, a blurring between opinion and fact, an increase in the relative volume of opinion and personal experience over fact, and declining trust in formerly respected sources of factual information.
-
-
Responding to Truth Decay: Q&A with RAND’s Michael Rich and Jennifer Kavanagh
Winston Churchill is reported to have said, “A lie gets halfway around the world before the truth can get its pants on.” Experts say it is worse now. With social media, false or misleading information is disseminated all over the world nearly instantaneously. Another thing that’s new about Truth Decay is the confluence of factors that are interacting in ways we do not fully understand yet. It is not clear that key drivers like our cognitive biases, polarization, changes in the information space, and the education system’s struggle to respond to this sort of challenge have ever coincided at such intensive and extreme levels as they do now. Russian disinformation and hacking campaigns against the United States and other Western democracies are the most obvious examples of the amplification – and exploitation – of Truth Decay. Garry Kasparov, the chess master and Russian dissident, said about Russian disinformation efforts: “The point of modern propaganda isn’t only to misinform or push an agenda. It is to exhaust your critical thinking … to annihilate truth.”
-
-
New malware espionage campaign compromises mobile devices around the world
Cybersecurity experts have uncovered a new malware espionage campaign infecting thousands of people in more than twenty countries. Hundreds of gigabytes of data have been stolen, primarily through mobile devices compromised by fake secure messaging clients. The Trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more. The threat, called Dark Caracal, may be a nation-state actor and appears to employ shared infrastructure which has been linked to other nation-state actors.
-
-
Interconnected technological risks: Responding to disruptions of cyber-physical systems
When infectious diseases strike, the World Health Organization acts swiftly, coordinating with the U.S. Centers for Disease Control and Prevention and its foreign counterparts to contain the threat. But there is no equivalent international organization similarly dedicated to identifying and mitigating a cyberattack. The World Economic Forum (WEF), however, is bringing together infrastructure and technology developers, insurers and government officials from across the globe to develop strategies for responding to interconnected technological risks, including those that can cascade when hackers disrupt cyber-physical systems.
-
-
Tracking and reacting to Russian attacks on democracy
Last week, a U.S. government report outlined attacks made by Russian President Vladimir Putin on democratic institutions over nearly two decades. The report details the many ways in which the Russian government has combined Soviet-era approaches with today’s technological tools. Princeton’s Jacob Shapiro says: “While not a revelation to people who have been following the issue, the depth and intensity of Russian efforts against America’s allies in Europe are striking and well-documented in the report. While some may argue that turnabout is fair play insofar as the United States and its European allies have been aggressively pushing their vision of governance inside Russia and its allies for decades, those efforts have taken place in the context of institutions that abide by widely accepted legal norms. What is striking about the Russian effort is the extent to which it employed actors and approaches that clearly and routinely transgress Russian, international, and domestic laws in the places they operate. To me, the extralegal nature of Russian influence efforts was just striking.”
-
-
Threat identification tool addresses cybersecurity in self-driving cars
Instead of taking you home from work, your self-driving car delivers you to a desolate road, where it pulls off on the shoulder and stops. You call your vehicle to pick you up from a store and instead you get a text message: Send $100 worth of Bitcoin to this account and it’ll be right over. You buckle your seatbelt and set your destination to a doctor’s appointment, but your car won’t leave your driveway because it senses it’s been hacked. These three hypothetical scenarios illustrate the breadth of the cybersecurity challenges that must be overcome before autonomous and connected vehicles can be widely adopted. While every new generation of auto tech brings new security risks, the vulnerabilities that come along with advanced mobility are both unprecedented and under-studied, the paper states.
-
-
Time for election reform
Congressional investigations have uncovered extensive interference - attempted fraud - by Russia and other foreign agents, including attempts to hack electronic voting machines, attempts to hack voter rolls to add or delete voters, targeted internet advertising, and targeted fake news and trolling. Here are five obvious reforms to strengthen the “critical infrastructure” of our democracy.
-
-
How to respond to Russia's attacks on democracy
Much of the public discourse concerning Russian interference has highlighted Russia’s use of disinformation to meddle in the U.S. elections, but the Kremlin’s activities extend beyond just interfering in elections. These activities encompass a comprehensive, asymmetric toolkit that exacerbates existing social divisions in Western societies, aiming to undermine democratic governments and institutions. Moscow, as a declining power, has opted for low-cost methods such as information warfare, hacking, political support for extremist groups, economic coercion, and illicit finance in an effort to undermine its perceived enemies in the West and create the perception that democracy is an inherently corrupt system.
-
-
Russia’s troll factory expands office to 12,000 square meters
Russian government disinformation and hacking specialists had good eighteen months: they were successful in their campaigns to bolster far-right, nationalist, anti-European political parties and leaders in France (Marine Le Pen), Germany (AfD), and the Netherlands (Geert Wilders); they were successful in raising the profile of populist causes which would weaken European institutions (Brexit, Catalonian independence, Scottish separatism, and Italy’s referendum); and they succeeded in helping Donald Trump, a polarizing, divisive leader who is more responsive to Russian interests and outlook, become president of the United States. Russia’s infamous troll factory in St. Petersburg, which played a major role in the Russian government’s disinformation campaigns on social media, is expanding its office to 12,000 square meters, three times bigger than its previous work space.
-
-
Intel AMT security issue: Attackers may bypass login credentials in corporate laptops
Helsinki, Finland-based F-Secure reported a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than thirty seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.
-
-
Developing a secure, un-hackable net for quantum devices
To date, communicating via quantum networks has only been possible between two devices of known provenance that have been built securely. With the EU and the United Kingdom committing €1 billion and £270 million, respectively, into funding quantum technology research, a race is on to develop the first truly secure, large-scale network between cities that works for any quantum device.
-
-
Why do we need to know about prime numbers with millions of digits?
Prime numbers are more than just numbers that can only be divided by themselves and one. They are a mathematical mystery, the secrets of which mathematicians have been trying to uncover ever since Euclid proved that they have no end. An ongoing project – the Great Internet Mersenne Prime Search – which aims to discover more and more primes of a particularly rare kind, has recently resulted in the discovery of the largest prime number known to date. Stretching to 23,249,425 digits, it is so large that it would easily fill 9,000 book pages. You may be wondering, if the number stretches to more than 23m digits, why we need to know about it? We need to know about the properties of different numbers so that we can not only keep developing the technology we rely on, but also keep it secure. But whether or not huge prime numbers, such as the 50th known Mersenne prime with its millions of digits, will ever be found useful is an irrelevant question. The merit of knowing these numbers lies in quenching the human race’s intellectual thirst that started with Euclid’s proof of the infinitude of primes and still goes on today.
-
-
Russian hackers who hacked DNC are now targeting U.S. Senate: Experts
Russian hackers from the group known as “Fancy Bear” are targeting the U.S. Senate with a new espionage campaign, according to cybersecurity firm TrendMicro. Fancy Bear was one of the Russian government’s hacking groups employed by the Kremlin in 2016 to help Donald Trump win the presidency, and TrendMicro analysts say the group has spent the past few months laying the groundwork for an espionage campaign against the U.S. Senate. Analysts say that the group’s efforts to gather the emails of America’s political elite suggest that the Kremlin plans to continue to interfere in the American political process.
-
-
Quantum speed limit may put brakes on quantum computers
Over the past five decades, standard computer processors have gotten increasingly faster. In recent years, however, the limits to that technology have become clear: Chip components can only get so small, and be packed only so closely together, before they overlap or short-circuit. If companies are to continue building ever-faster computers, something will need to change. One key hope for the future of increasingly fast computing is my own field, quantum physics. Quantum computers are expected to be much faster than anything the information age has developed so far. But my recent research has revealed that quantum computers will have limits of their own – and has suggested ways to figure out what those limits are.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.