-
A Ban on WeChat and TikTok, a Disconnected World and Two Internets
President Trump’s new executive orders banning Chinese social media apps TikTok and WeChat marked a significant escalation in the ongoing technology tensions between the U.S. and China. Eric Schmidt, former CEO of Google, predicted in 2018 that within the next decade, there would be two distinct Internets: one led by the U.S. and the other one led by China. Only two years after his comments, that prediction seems to have become a reality.
-
-
Cyberspace Is Critical Infrastructure – It Will Take Effective Government Oversight to Make It Safe
A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a dog.” The New Yorker cartoon doesn’t apply today. Not only do your browser, service provider and apps know you’re a dog, they know what breed you are, what kind of dog food you eat, who your owner is and where your doghouse is. Cyberspace can function as critical infrastructure only when it’s safe for everyone, but legal and regulatory protections in cyberspace have not kept up with the times.
-
-
$26 million NSF initiative to establish new Center for Quantum Networks
The National Science Foundation (NSF) has launched a major new initiative to establish and lead the Center for Quantum Networks, or CQN. The new center is funded through an initial $26 million, 5-year grant awarded to the University of Arizona, with an additional five-year $24.6 million renewal option.
-
-
Official: U.S. Adversaries Taking Sides, Wielding Influence Ahead of Election
Russia, China and Iran are all actively meddling in U.S. presidential politics hoping to persuade American voters to put their preferred candidate in the White House, according to an extraordinary warning from Washington’s top counterintelligence official. As was the case in 2016, Russia is actively working to help Trump. Russia has also recruited Ukrainian “actors” to manufacture dirt on Joe Biden and his son, to be fed into the investigation of the Bidens by Senator Ron Johnson (R-Wisconsin). China and Iran would prefer to see Biden in the White House, but their interference efforts are not at the level of Russia’s broad campaign to help Trump. Trump rejected that part of the intelligence community’s assessment which details Russia’s broad effort on his behalf. “The last person Russia wants to see in office is Donald Trump,” he said. “I don’t care what anybody says.”
-
-
‘Deepfakes’ Ranked as Most Serious AI Crime Threat
Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism. : “As the capabilities of AI-based technologies expand, so too has their potential for criminal exploitation. To adequately prepare for possible AI threats, we need to identify what these threats might be, and how they may impact our lives,” says one expert.
-
-
U.S. Accuses Russia of Complex Online Disinformation, Propaganda Operation
The United States has accused Russia of developing a sophisticated “ecosystem” to spread disinformation and propaganda about the coronavirus and other issues. In a new report published on August 5, the State Department said Russia’s online operations use “five main pillars” to amplify false narratives and conspiracy theories in a bid to sow confusion and fear.
-
-
Hateful and Conspiratorial Groups on Facebook
Despite public announcements of efforts to curb hateful speech and misinformation across its platform, Facebook still hosts many spaces in which this content propagates and thrives. While some of these problematic activities occur in small groups, a number of problematic Facebook groups have grown to a significant membership size, yet are still allowed to exist by Facebook. This is not by accident. Facebook has a history of overlooking this kind of behavior, arguing that some hateful content does not go against their Community Standards.
-
-
Consumers Do Not Fully Trust Smart Home Technologies
Researchers investigating the trust consumers have in “smart home” – homes in which smart devices are connected to each other to create an “internet of things” (IoT) — found that consumers were worried about the likelihood of security incidents. Businesses and policymakers will have to work together to gain consumer trust in smart home technologies.
-
-
Russian Government Hackers Stole, Leaked Classified U.K. Trade Documents Ahead of 2019 Election
A treasure trove of classified documents about secret trade negotiations between the United States and the United Kingdom – discussion which aimed to prepare the U.S.-U.K. economic relationship for the post-Brexit era – were stolen by Russian government hackers and leaked to the opposition Labour Party ahead of the December 2019 general election. The Russian government hackers stole the classified papers – 451 pages in all — from an email account of Liam Fox, who was then the U.K. trade secretary.
-
-
New Method to Defend against Smart Home Cyberattacks
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices.
-
-
Pompeo: U.S. Will Take Action on Chinese Software in “Coming Days
Chinese software companies operating in the United States assiduously collect customers’ personal date, browsing habits, facial images, and other information and deliver it to China’s intelligence agencies for possible use by China when it would serve China’s interests to do so. Secretary of State Mike Pompeo said Sunday that the fact the Chinese software companies serve as information collectors for China’s intelligence agencies poses a serious national security threat to the United States, and that the administration, in the coming days, will soon announce a series of measures aiming to restrict the ability of Chinese software companies to operate in this way, and ban some companies from operating in the United States altogether.
-
-
New Algorithms Could Reduce Polarization Engendered by Information Overload
As the volume of available information expands, the fraction a person is able to absorb shrinks. They end up retreating into a narrow slice of thought, becoming more vulnerable to misinformation, and polarizing into isolated enclaves of competing opinions. To break this cycle, computer scientists say we need new algorithms that prioritize a broader view over fulfilling consumer biases.
-
-
TruNews Using Facebook to Disseminate, Amplify Anti-Semitism, Conspiracies
TruNews, the fundamentalist Christian video streaming site which disseminates anti-Semitic, anti-Israel, and Islamophobic propaganda, also posts and livestreams extremist content on social media platforms. Rick Wiles, the site’s founder, and his fellow hosts often combine their hate speech with extreme conspiracy theories. Among the conspiracy theories: the U.S. government spread the Ebola virus on U.S. soil; the U.S. and Israel created ISIS; and that Jews were responsibility for COVID-19 nd the impeachment of President Trump.
-
-
“Ghostwriter” Influence Campaign: Fabricated Content Pushes Narratives Aligned With Russian Security Interests
FireEye says that Mandiant Threat Intelligence has tied together several information operations which FireEye assess with moderate confidence to comprise part of a broader influence campaign—ongoing since at least March 2017—aligned with Russian security interests. FireEye has dubbed this campaign “Ghostwriter.”
-
-
Election Cyber Surge Initiative Launches
On Friday, the University of Chicago’s Cyber Policy Initiative (CPI) announced the launch of the Election Cyber Surge initiative to help address the urgent need to connect state and local election offices with volunteer technologists. The initiative will create a database which will allow officials to search for potential volunteers in their state or city by skillset, subject matter expertise, or cybersecurity experience.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.