-
Accelerating Use of Fully Homomorphic Encryption
Protecting and preserving personally identifiable information (PII), intellectual property, intelligence insights, and other forms of sensitive information has never been more critical. A steady cadence of data breaches and attacks are reported seemingly daily. As the use of cloud computing and virtual networks becomes increasingly pervasive for storing, processing, and moving information, concerns around data vulnerability, access, and privacy are similarly on the rise. Four research teams take on development of novel hardware accelerator to enable new levels of data and privacy protection.
-
-
Are Telegram and Signal Havens for Right-Wing Extremists?
Since the violent storming of Capitol Hill and subsequent ban of former U.S. President Donald Trump from Facebook and Twitter, the removal of Parler from Amazon’s servers, and the de-platforming of incendiary right-wing content, messaging services Telegram and Signal have seen a deluge of new users. Steven Feldstein and Sarah Gordon write that the two services rely on encryption to protect the privacy of user communication, which has made them popular with protesters seeking to conceal their identities against repressive governments in places like Belarus, Hong Kong, and Iran. “But the same encryption technology has also made them a favored communication tool for criminals and terrorist groups, including al Qaeda and the Islamic State.” Telegram has purged Islamic State from the platform, and it could the same with far-right violent extremists.
-
-
After the Insurrection, America’s Far-Right Groups Get More Extreme
As the U.S. grapples with domestic extremism in the wake of the Jan. 6 insurrection at the U.S. Capitol, warnings about more violence are coming from domestic intelligence and law enforcement agencies. Two experts – the authors of a recent book on extremist violence in the United States – say that some members have left extremist groups in the wake of the Jan. 6 violence. But the members who remain, and the new members they are attracting, are increasing the radicalization of far-right groups.
-
-
Rapidly Restoring the Electrical Grid after Cyberattack
Some 330 million Americans rely on the nation’s critical infrastructure to keep the country humming. Disruptions to electrical grids, communications systems, and supply chains can be catastrophic, yet all of these are vulnerable to cyberattack. RADICS program delivers novel technologies, custom testbed, and evaluation exercises to enable utilities and first responders to quickly restore critical infrastructure amidst a cyberattack.
-
-
Spotting Deepfakes by Looking at Light Reflection in the Eyes
Computer scientists have developed a tool that automatically identifies deepfake photos by analyzing light reflections in the eyes. The tool proved 94 percent effective with portrait-like photos in experiments.
-
-
U.S. Set to Retaliate against Russia, China for Massive Cyber Attacks
Senior officials in the Biden administration on Friday said that the administration is finalizing its decision on how to retaliate forcefully for state-sponsored hacking, as fears in the United States and Western Europe are growing over the consequences of two recent major cyberattacks. Officials said that U.S. retaliatory measures – “some seen, some unseen” – will be coming in matter of weeks, nit months.
-
-
America's Place in Cyberspace: The Biden Administration’s Cyber Strategy Takes Shape
In cyber policy, the SolarWinds and Microsoft hacks have dominated the first weeks of President Joseph Biden’s administration. Even so, the administration has outlined its cyber strategy in speeches by President Biden and Secretary of State Antony Blinken and in the president’s Interim Strategic National Security Guidance [PDF]. The emerging strategy is anchored in, and is reflective of, the ideological, geopolitical, technological, and diplomatic pillars of Biden’s broader vision for U.S. foreign policy and national security.
-
-
Two R&D Projects to Enhance Mobile Network Traffic Security
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the Cybersecurity and Infrastructure Security Agency (CISA) are jointly announcing the final two research and development (R&D) awards for the newly launched Secure and Resilient Mobile Network Infrastructure (SRMNI) project.
-
-
How Biden’s Cyber Strategy Echoes Trump’s
On March 3, the Biden administration released its Interim National Security Strategic Guidance. Herb Lin writes that the interim guidance document is, by definition, a work in progress, and one would expect a final guidance document to be roughly consistent with the interim guidance but also to contain a more substantial elaboration on the interim guidance. With two exceptions — emphasizing diversity in the national talent base and strongly implies government investment in cybersecurity –”all other areas addressed in the Biden interim guidance, I believe the statements are substantially the same. If this is true, it suggests great continuity in cyber policy and strategy between administrations as different as Biden’s and Trump’s. Of course, the Trump National Cyber Strategy wasn’t all that different from Obama’s cyber strategy, either.”
-
-
Sea-Level Rise up to Four Times Global Average for Coastal Communities
Coastal populations are experiencing relative sea-level rise up to four times faster than the global average – according to new research. is the first to analyze global sea-level rise combined with measurements of sinking land.
-
-
The Microsoft Exchange Hack and the Great Email Robbery
The world is probably days away from the “Great Email Robbery,” in which a large number of threat actors around the globe are going to pillage and ransom the email servers of tens of thousands of businesses and local governments, Nicholas Weaver writes. Or at least pillage those that the purported Chinese actors haven’t already pillaged.” And now the Biden administration has a real hard policy problem: What now? The SolarWinds hack may have been significant, but [the Exchange attack] will affect far more institutions,” Weaver writes. “The Exchange attack showed complete disregard for possible consequences on behalf of those responsible for the breach,” but “without consequences, such broad attacks will simply continue.”
-
-
Cyber Threat Looms Large over German Election
Whether hacking attacks or disinformation campaigns, online meddling could sway public opinion and influence the outcome of the September vote, experts warn. Recent incidents suggest that the threat is real.
-
-
Was SolarWinds a Different Type of Cyber Espionage?
The Biden administration announced that it will impose sanctions and other measures against Russia in response to the SolarWinds incident. The cybersecurity firm FireEye disclosed the compromise of numerous government and private-sector networks in December 2020. SolarWinds is among the top cybersecurity breaches the U.S. government has ever confronted and has raised critical questions about the integrity of federal networks and Russia’s ultimate intentions. “Given the incident’s significance, it is understandable that the Biden administration is grappling with how to appropriately address it,” Erica D. Borghard writes. But setting aside important limitations of economic sanctions as a policy tool to address malign cyber behavior, “there is a gap between how administration officials are framing the nature of the SolarWinds incident and what the available evidence indicates about it,” she adds.
-
-
A Framework for Secure Cyber-Physical Systems
Cyber-physical systems (CPS), which combine modern networking with physical actuators, can be vulnerable against hackers. Recently, researchers at DGIST developed a new framework for CPSs that is resilient to a sophisticated kind of cyberattack. Unlike existing solutions, the proposed approach allows for real-time detection and recovery from the attack while ensuring stable operation. This paves the way for secure and reliable CPSs across various application domains, such as smart cities and unmanned public transportation.
-
-
SolarWinds Hack Bigger, More Dangerous than Previously Thought, Tech Execs Warn
Executives with technology companies impacted by the massive cybersecurity breach known as the SolarWinds hack are giving U.S. lawmakers more reason to worry, warning the intrusion is both bigger and more dangerous than first realized.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.