-
Fighting Against Disinformation with Lessons from Cybersecurity
Mary Ellen Zurko pioneered user-centered security in the 1990s. Now she is using those insights to help the nation thwart influence operations.
-
-
What Happened When Twitter and Other Social Media Platforms Cracked Down on Extremists
In a Q&A with ProPublica reporter A.C. Thompson, former intelligence officer and data scientist Welton Chang explains how conspiracy theorists and violent racists fled to smaller platforms. Once there, their remarks festered and spread.
-
-
Rivalry in the Information Sphere
How is information confrontation defined in the Russian military-scientific literature and in Russian strategic documents? What are its subtypes, and which Russian organizations contribute to information confrontation efforts? How has information confrontation as an element of Russian military strategy evolved over time, from Imperial Russia to the Putin era? How might the concept and its role in Russian military operations evolve in the future?
-
-
How Unmoderated Platforms Became the Frontline for Russian Propaganda
The Russian invasion of Ukraine has highlighted the evolving complexities of platform governance challenges in an increasingly decentralized information environment. Samantha Bradshaw, Renee DiResta, and Christopher Giles write that “A comprehensive strategy to combat disinformation campaigns must consider full spectrum operations that incorporate both overt and covert dynamics across a wide range of analog, digital, and alternative media,” adding that “An overfocus on covert networks on Facebook and Twitter misses the full expanse of the propaganda strategies that often reach more users through different communication media on popular local media and social media channels.”
-
-
Former U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy
Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.
-
-
Thinking Like a Cyber-Attacker to Protect User Data
Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.
-
-
Rise of Precision Agriculture Exposes Food System to New Threats
Farmers are adopting precision agriculture, using data collected by GPS, satellite imagery, internet-connected sensors and other technologies to farm more efficiently. These practices could help increase crop yields and reduce costs, but the technology behind the practices is creating opportunities for extremists, terrorists and adversarial governments to attack farming machinery, with the aim of disrupting food production.
-
-
NSF Grants to Protect Data, User privacy
Researchers are working on two new cybersecurity projects, recently funded by the National Science Foundation, to ensure trustworthy cloud computing and increase computing privacy for marginalized and vulnerable populations.
-
-
Artificial Intelligence Isn’t That Intelligent
In the world of information security, social engineering is the game of manipulating people into divulging information that can be used in a cyberattack or scam. Cyber experts may therefore be excused for assuming that AI might display some human-like level of intelligence that makes it difficult to hack. Unfortunately, it’s not. It’s actually very easy.
-
-
How Daycare Apps Can Spy on Parents and Children
Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children’s development and to communicate with teachers. However, some of these applications have serious security flaws.
-
-
When the Hardware Traps Criminals
Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
-
-
A Key Role for Quantum Entanglement
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists, including ETH physicists, has now demonstrated experimentally, for the first time, an approach to quantum key distribution that uses high-quality quantum entanglement to provide much broader security guarantees than previous schemes.
-
-
Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Later
In February, the cryptography community was stunned when a researcher claimed that an algorithm that might become a cornerstone of the next generation of internet encryption can be cracked mathematically using a single laptop. Edward Parker and Michael Vermeer write that this finding may have averted a massive cybersecurity vulnerability, but it also raises concerns that new encryption methods for securing internet traffic contain other flaws that have not yet been detected.
-
-
Secure Cryptography with Real-World Devices Is Now Possible
New research published in Nature explains how an international team of researchers have, for the first time, experimentally implemented a type of quantum cryptography considered to be the ‘ultimate’, ‘bug-proof’ means of communication.
-
-
China Tried to Infiltrate Federal Reserve: Senate Report
Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.