-
What is Vladimir Putin really up to? Carnegie scholars aim to find out
The Trump administration’s national security team – of not the president himself – is increasingly concerned that Russia is expanding its influence around the world at a time when the United States and leading Western powers in Europe are focused on their own domestic problems. The Carnegie Endowment for International Peace is about to launch a two-year project, called “The Return of Global Russia: A Reassessment of the Kremlin’s International Agenda,” aiming to examine and analyze Russia’s activist foreign and military policies. According to Carnegie researchers, Moscow is trying to systematically undermine democracies such as the United States and alliances like the European Union and the North Atlantic Treaty Organization.
-
-
Sen. Marco Rubio: “Vladimir Putin chose to interfere in U.S. elections”
“[W]hat is abundantly clear is that Vladimir Putin chose to interfere in the U.S. elections — in my opinion, not so much to favor one candidate over another, but to sow instability”; “[H]is ultimate goal was to ensure that whoever was elected the next U.S. president, they did so with their credibility damaged. I also think that he wanted to exploit the already existing divisions in American society for the purpose of forcing us to go through what we’re going through right now — investigations, divisive debates, talk about impeachment, and the like.”
-
-
Bolstering cybersecurity in harsh environments
According to the U.S. Federal Bureau of Investigation, the financial loss from cybercrime in the U.S. was over $1.3 billion in 2016. As this number is only expected to rise in the upcoming years, the military, businesses and individuals are seeking new ways to guard their information. Physical unclonable function (PUF) devices hold promise.
-
-
“Hacking for Defense” class an example of Stanford’s relationship with the U.S. military
Alongside all the tech companies and consulting firms present at career fairs, Stanford students looking for employment are likely to encounter another major industry when talking to recruiters: the defense sector. Although anti-war activism in the Vietnam era severed many of the university’s ties with the U.S. military, the relationship between the two has seen a revival over the years, and national security and defense institutions are more visible on campus now than they were just a decade ago. A relatively new class, MS&E 297, adds yet another wrinkle to that ongoing narrative – and one that not everyone is happy about.
-
-
Social media trends can predict vaccine scares tipping points
Analyzing trends on Twitter and Google can help predict vaccine scares that can lead to disease outbreaks, according to a new study. Researchers examined Google searches and geocoded tweets with the help of artificial intelligence and a mathematical model. The resulting data enabled them to analyze public perceptions on the value of getting vaccinated and determine when a population was getting close to a tipping point.
-
-
House passes important cybersecurity legislation
Yesterday (Monday) the House unanimously passed H.R. 3359, the Cybersecurity and Infrastructure Security Agency Act of 2017. This important legislation will streamline the current structure of the National Protection and Programs Directorate (NPPD) and re-designate it as the Cybersecurity and Infrastructure Agency (CISA) to more effectively execute cybersecurity and critical infrastructure related authorities.
-
-
Cyber trends in 2017: The rise of the global cyberattack
A new report, Cyber maturity in the Asia–Pacific region 2017, distils the major trends from a year’s worth of cyber events and looks at how countries in the region are measuring up to the challenges and opportunities posed by the internet and ever-more-connected IT infrastructure. Although cyber maturity and cybersecurity generally improved over the past year, the threat landscape worsened. Cybercriminals are investing in more advanced and innovative scams, and nation-states are prepared to launch massively destructive attacks causing huge collateral damage.
-
-
Simple tool tells whether websites suffered a data breach
Computer scientists have built and successfully tested a tool designed to detect when websites are hacked by monitoring the activity of email accounts associated with them. The researchers were surprised to find that almost 1 percent of the websites they tested had suffered a data breach during their 18-month study period, regardless of how big the companies’ reach and audience are. “No one is above this—companies or nation states— it’s going to happen; it’s just a question of when,” said the senior researcher.
-
-
The “Russia Story”; Russia’s meddling was U.S. “intelligence failure”; cyber forensics, and more
· What is the “Russia Story”?
· Defending the West from Russian disinformation: The role of institutions
· What Putin really wants
· Russian bots manipulate online conversation about Olympics, sexual harassment
· WikiLeaks faces four U.S. probes into its 2016 election role and CIA leaks
· Rep. Eric Swalwell breaks down how Russia infected the U.S. election
· As Russia subverts missile treaty, U.S. looking at new weapons
· Exposing Russian interference – the value of real-time forensics
· Ex-spy chief: Russia’s election hacking was an “intelligence failure”
· Company that used Russian coders for Pentagon project strikes deal
-
-
Cybersecurity expert: Iranian hacking is a “coordinated, probably military, endeavor”
On the heels of a report this week documenting Iran’s increasingly aggressive hacking attacks around the globe, a cybersecurity expert assessed that the advanced nature of the attacks suggests a “coordinated, probably military, endeavor.” A report released this week, by FireEye, a cybersecurity firm, noticed increased and increasingly advanced cyber-espionage efforts by groups that have been tied to Iran, and to the nation’s Islamic Revolutionary Guard Corps (IRGC).
-
-
Lawmakers request additional documents from DHS re: Kaspersky investigation
U.S. House Science, Space, and Technology Committee chairman Lamar Smith (R-Texas) sent a letter Tuesday to the Department of Homeland Security (DHS) requesting documents and information related to the DHS directive to all government agencies to identify and remove Kaspersky Lab software from their computer systems.
-
-
Power grid test bed helps national grid resilience
Essential services like hospitals and water treatment depend on energy distribution to ensure reliable and continuous operations. As the power grid evolves, becoming more connected and responsive, those new, smart devices can introduce greater cyber vulnerabilities. To address this challenge, the power grid test bed at the U.S. Department of Energy’s 890-square-mile Idaho National Laboratory has been transitioned to a more adaptive architecture.
-
-
Why the president’s anti-Muslim tweets could increase tensions
Last week, President Trump retweeted to his nearly 44 million followers a series of videos purporting to show Muslims assaulting people and destroying Christian statues. These videos, originally shared by an extremist anti-Muslim group in the U.K., were shown to be inaccurate and misleading. Our research may shed light on why President Trump shared anti-Muslim videos with his followers. As the White House press secretary said, his decision was a direct response to a perceived threat posed by Muslims. However, religious threat is not a one-way street. Attacking Muslims is not likely to stop religious conflict, but instead increase religious tension by fostering a spiraling tit-for-tat of religious threat and prejudice that increases in severity over time. This type of cyclical process has long been documented by scholars. If people who feel discriminated against because of their religion retaliate by discriminating against other religions, religious intolerance is only going to snowball. If President Trump really wants to stop religious violence, social psychology suggests he should refrain from it himself.
-
-
NIST offers help for contractors secure unclassified government information
It is crunch time for government contractors. They only have until 31 December 2017 to demonstrate they are providing appropriate cybersecurity for a class of sensitive data called Controlled Unclassified Information (CUI). Otherwise, they risk losing their contracts. For organizations that may be struggling to meet the deadline, the National Institute of Standards and Technology (NIST) has a new publication intended to help.
-
-
U.K. government agencies told to remove Kaspersky software from their systems
In another example of a Western government taking decisive action to limit the ability of Russian government hackers to steal sensitive information, The U.K. cyber security agency on Friday has advised U.K. government agencies to remove Kaspersky Lab’s products from their systems.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.