-
All’s Clear for Deep Fakes: Think Again
A few analysts are claiming that the bark of deepfakes is worse than their bite. Robert Chesney, Danielle Citron, and Hany Farid disagree, writing that “Now is not the time to sit back and claim victory over deep fakes or to suggest that concern about them is overblown. The coronavirus has underscored the deadly impact of believable falsehoods, and the election of a lifetime looms ahead. More than ever we need to trust what our eyes and ears are telling us.”
-
-
Wobbly” Tracing App “Failed” Clinical Safety and Cybersecurity Tests
The government’s coronavirus contact tracing app has so far failed the tests needed to be included in the NHS app library, HSJ understands. Jasmine Rapson writes in HJS that the app is being trialed on the Isle of Wight this week, ahead of a national rollout later this month. Senior NHS sources told HSJ it had thus far failed all of the tests required for inclusion in the app library, including cyber security, performance and clinical safety. There are also concerns at high levels about how users’ privacy will be protected once they log that they have coronavirus symptoms, and become “traceable,” and how this information will be used. Senior figures told HSJ that it had been hard to assess the app because the government was “going about it in a kind of a ham-fisted way. They haven’t got clear versions, so it’s been impossible to get fixed code base from them for NHS Digital to test. They keep changing it all over the place.” HSJ’s source described the app as “a bit wobbly.”
-
-
Software Flaws Often Reported First on Social Media Networks
Software vulnerabilities are more likely to be discussed on social media before they’re revealed on a government reporting site, a practice that could pose a national security threat. At the same time, those vulnerabilities present a cybersecurity opportunity for governments to more closely monitor social media discussions about software gaps.
-
-
Predicting and Countering Cyberttacks
The U.K Defense and Security Accelerator (DASA) announce nearly £1m to further develop technology that predicts and counters cyber-attacks. “This work will develop, adapt and merge the novel approaches explored in Phase 1 of the competition, to proactively defend deployed U.K. military systems and networks from the rapidly growing threat of offensive cyber action from aggressive adversaries,” DASA said.
-
-
Cyber Operations against Medical Facilities During Peacetime
In the face of the coronavirus pandemic, governments around the world have tried to compensate for insufficient hospital beds and intensive care units by nationalizing private medical facilities and relying on military ships and improvised evac hospitals. Adina Ponta writes that at a time when overcrowded medical and testing facilities struggle with shortages in supplies and a huge influx of patients, hacker groups have exploited their inattention to cybersecurity.
-
-
New Privacy Threat Combines Device Identification with Biometric Information
A new study by computer scientists has revealed a new privacy threat from devices such as smartphones, smart doorbells and voice assistants that allows cyber attackers to access and combine device identification and biometric information.
-
-
The COVIDSafe App Was Just One Contact Tracing Option. These Alternatives Guarantee More Privacy
Since its release on Sunday, experts and members of the public alike have raised privacy concerns with the Australian federal government’s COVIDSafe mobile app. Many Australians have said that they worried about “the security of personal information collected” by the app. In its coronavirus response, the government has a golden opportunity to build public trust. There are other ways to build a digital contact tracing system, some of which would arguably raise fewer doubts about data security than the app.
-
-
The Department of Defense Should Not Wage Cyber War Against Criminal Hackers During the Coronavirus Crisis
Politicians and pundits in the United States have frequently described the challenge of controlling the COVID pandemic with the language of waging war. Erica D. Borghard writes that given this terminology, it can be tempting to look to the Department of Defense (DOD) to solve problems it was not meant to address. While nefarious actors in cyberspace are seeking to capitalize on scared and vulnerable individuals during the pandemic for criminal gain and national strategic objectives, “any efforts to leverage DOD capabilities in combating these efforts must distinguish between nation-state and criminal activity,” she writes.
-
-
Studying Ideologically Motivated Cyberattacks
A John Jay College of Criminal Justice project on cyberterrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The John Jay project will study and aggregate ideologically motivated cyberattacks and will create a new, unique dataset – the Cyber-Extremist Crime Database (Cyber-ECDB) – which will track ideologically motivated cyberattacks against U.S. targets from 1998 to present.
-
-
Examining Australia’s COVIDSafe Tracing App
The Australian government releases an App called COVIDSafe to help in tracing contacts of those infected with the coronavirus. As is the case with similar apps in other countries, COVIDSafe has raised privacy concerns, especially about the potential of abuse by government agencies and hacking by cybercriminals. The University of Sydney academics from the disciplines of cybersecurity, media, law and health comment on COVIDSafe, its pros and cons.
-
-
Solving “Link Discovery” Problem for Terahertz Data Networks
When someone opens a laptop, a router can quickly locate it and connect it to the local Wi-Fi network. That ability is a basic element of any wireless network known as link discovery, and now a team of researchers has developed a means of doing it with terahertz radiation, the high-frequency waves that could one day make for ultra-fast wireless data transmission.
-
-
The Deepfake iPhone Apps Are Here
On Sunday, Lawfare’s Jacob Schulz, like many Americans, woke up to see that President Donald Trump had retweeted a misleading gif of his presumptive Democratic challenger, Joe Biden. Schultz notes that Trump’s dissemination of a deepfake video was met with alarm. David Frum, for example, noted the significance of the president’s retweet: “Instead of sharing deceptively edited video—as Trump and his allies have often done before—yesterday Trump for the first time shared a video that had been outrightly fabricated.” Schulz adds: “Soon, people will be able to use their iPhones not just to turn themselves into mildly convincing late-night comedians but to convincingly turn Joe Biden into whatever they want. When that happens, in the now-infamous words of Samantha Cole of Motherboard, ‘We are truly f****d.’”
-
-
How Far-Right Extremists Are Exploiting Pandemic
Far-right extremists have been linked to bombing plots tied to the coronavirus pandemic, spotted holding anti-Semitic signs at protests outside state capitols, and seen trafficking on fringe platforms in all manner of conspiracy theories about the virus. As the coronavirus pandemic continues to ravage millions of lives and paralyze much of the economy, these extremists in the United States are seizing every opportunity to reach out to thousands of potential followers and expand their ranks.
-
-
Protecting Oneself from the Latest Internet Sex Crime: Sextortion
What makes sextortion — the use of intimate images or videos that have been captured to then extort compliance from a victim — different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.” But in many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.
-
-
Senate Intel Releases Report on Intel Community Assessment of Russian Interference
On Tuesday, Senate Select Committee on Intelligence released a new report, the fourth and penultimate volume in the Committee’s bipartisan Russia investigation. The latest installment examines the sources, tradecraft, and analytic work behind the 2017 Intelligence Community Assessment (ICA) that determined Russia conducted an unprecedented, multi-faceted campaign to interfere with the 2016 U.S. presidential election. “One of the ICA’s most important conclusions was that Russia’s aggressive interference efforts should be considered ‘the new normal,’” said Senator Richard Burr (R-North Carolina), the committee’s chairman.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.