-
Radicalization Pipelines: How Targeted Advertising on Social Media Drives People to Extremes
Behind-the-scenes mechanisms feed an item you search for on Google, “like” on social media, or come across while browsing into custom advertising on social media. Those mechanisms are increasingly being used for more nefarious purposes than aggressive advertising. The threat is in how this targeted advertising interacts with today’s extremely divisive political landscape. As a social media researcher, I see how people seeking to radicalize others use targeted advertising to readily move people to extreme views.
-
-
U.S. Cyber Officials Bracing for Fallout from “Log4j” Vulnerability
More than a month after the Log4j software vulnerability was first discovered, U.S. cybersecurity officials are still warning about it, saying that some criminals and nation state adversaries may be waiting to make use of their newfound access to critical systems.
-
-
The Metaverse Offers a Future Full of Potential – for Terrorists and Extremists, Too
The metaverse is an immersive virtual reality version of the internet where people can interact with digital objects and digital representations of themselves and others, and can move more or less freely from one virtual environment to another. As terrorism researchers, we see a potential dark side to the metaverse. Although it is still under construction, its evolution promises new ways for extremists to exert influence through fear, threat and coercion. Considering our research on malevolent creativity and innovation, there is potential for the metaverse to become a new domain for terrorist activity.
-
-
Leveraging Social Media During a Disaster
During a disaster, many people turn to social media seeking information. But communicating during disasters is challenging, especially using an interactive environment like social media where misinformation can spread easily.
-
-
Aiding Evaluation of Adversarial AI Defenses
There are many inherent weaknesses that underlie existing machine learning (ML) models, opening the technology up to spoofing, corruption, and other forms of deception. Evaluation testbed, datasets, tools developed on GARD program were released to jump-start community and encourage creation of more robust defenses against attacks on ML models.
-
-
What Will 2022 Bring in the Way of Misinformation on Social Media? 3 Experts Weigh In
At the end of 2020, it seemed hard to imagine a worse year for misinformation on social media, given the intensity of the presidential election and the trauma of the COVID-19 pandemic. But 2021 proved up to the task, starting with the Jan. 6 insurrection and continuing with copious amounts of falsehoods and distortions about COVID-19 vaccines.
-
-
What Is Log4j? A Cybersecurity Expert Explains the Latest Internet Vulnerability, How Bad It Is and What’s at Stake
Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. So what is this humble piece of internet infrastructure, how can hackers exploit it and what kind of mayhem could ensue?
-
-
UTEP to Advance Cybersecurity Talent Pipeline with $4M Grant
Award will support highly qualified computer science students, with an emphasis on Hispanic and female students.
-
-
Moral Echo Chambers on Social Media May Boost Radicalization: Study
As Congress continues to investigate the storming of the U.S. Capitol on Jan. 6, psychologists are examining how online communities can foster radical thoughts and intentions. A new study finds that that social media echo chambers can create a strong bond and increase the likelihood of radicalization.
-
-
CISA Hosts Cybersecurity Navigators Forum for Election Officials
CISA recently concluded a forum for state and local election officials to discuss cyber navigator programs. Cyber navigators are state liaisons that can help under-resourced local jurisdictions manage their cyber risks, help sort through the onslaught of risk information, advice, and available services, and help fast-track mitigation efforts. DHS is currently in the midst of its “Election Security” sprint, focused on the need to cement the resilience of the nation’s democratic infrastructures and protect the integrity of its election.
-
-
Computer Attacks with Laser Light
Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts in the LaserShark project. The researchers demonstrate hidden communication into air-gapped computer systems: Data transmitted to light-emitting diodes of regular office devices.
-
-
Extradited Kremlin-Linked Russian Businessman Charged with Cybercrimes, along with Four Other Russian Suspects
Russian businessman Vladislav Klyushin was extradited from Switzerland to the United States last week over his involvement in a global scheme to trade on hacked confidential information. One of Klyushin’s codefendants, Ivan Ermakov, a former officer in Russia’s GRU military intelligence, was charged in court in 2018 for his role in hacking and disinformation operations the GRU conducted in 2016 as part of Russia’s interference in the U.S. presidential elections.
-
-
Problems in Regulating Social Media Companies’ Extremist, Terrorist Content Removal Policies
The U.S. government’s ability to meaningfully regulate major social media companies’ terrorist and extremist content removal policies is limited.
-
-
Far Too Little Vote Fraud to Tip Election to Trump, AP Finds
>The Associated Press conducted a thorough review of every potential case of voter fraud in the six battleground states disputed by former President Donald Trump.Joe Biden won the 79 Electoral College votes of these states by a combined 311,257 votes out of 25.5 million ballots cast for president. The AP comprehensive review has found fewer than 475 potential fraud cases. The cases could not throw the outcome into question even if all the potentially fraudulent votes were for Biden, which they were not, and even if those ballots were actually counted, which in most cases they were not.
-
-
Securing U.S. Democracy
Most of the homeland security architecture built in the past twenty years has been devoted to protecting Americans from an act of international terrorism. Carrie Cordero writes that as a result, Americans are safer than they were twenty years ago from a terrorist attack directed or inspired by foreign groups on U.S. soil. She says, though, that more significantly, the threats to American safety and security have compounded in the past two decades. “These disparate threats and circumstances have challenged the effectiveness of the homeland security enterprise.”
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.