• How Far-Right Extremists Are Exploiting Pandemic

    Far-right extremists have been linked to bombing plots tied to the coronavirus pandemic, spotted holding anti-Semitic signs at protests outside state capitols, and seen trafficking on fringe platforms in all manner of conspiracy theories about the virus. As the coronavirus pandemic continues to ravage millions of lives and paralyze much of the economy, these extremists in the United States are seizing every opportunity to reach out to thousands of potential followers and expand their ranks.

  • Protecting Oneself from the Latest Internet Sex Crime: Sextortion

    What makes sextortion — the use of intimate images or videos that have been captured to then extort compliance from a victim — different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.” But in many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

  • Senate Intel Releases Report on Intel Community Assessment of Russian Interference

    On Tuesday, Senate Select Committee on Intelligence released a new report, the fourth and penultimate volume in the Committee’s bipartisan Russia investigation. The latest installment examines the sources, tradecraft, and analytic work behind the 2017 Intelligence Community Assessment (ICA) that determined Russia conducted an unprecedented, multi-faceted campaign to interfere with the 2016 U.S. presidential election. “One of the ICA’s most important conclusions was that Russia’s aggressive interference efforts should be considered ‘the new normal,’” said Senator Richard Burr (R-North Carolina), the committee’s chairman.

  • Creating Virtual Cyber Defense Tool

    Researchers are helping protect the country’s most secretly held assets through a partnership that’s creating state-of-the-art, virtual cyberattack defenses. The researchers have customized an existing MSU-designed Netmapper computer program to develop next-generation cyber learning and training software that can scan and map the military’s complex computer network infrastructures.

  • Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say

    U.S. intelligence agencies have assessed that Chinese operatives have pushed false messages across social media platforms, aiming to amplify and exaggerate the actions of the U.S. government in order to sow panic, increase confusion, and deepen political polarization in the already-on-edge American public. The amplification techniques are alarming to U.S. officials because the disinformation showed up as texts on many Americans’ cellphones, a tactic that several of the officials said they had not seen before. American officials said the operatives had adopted some of the techniques mastered by Russia-backed trolls. That has spurred agencies to look at new ways in which China, Russia and other nations are using a range of platforms to spread disinformation during the pandemic. President Trump himself has shown little concern about China’s actions, dismissing worries over China’s use of disinformation when asked about it on Fox News. “They do it and we do it and we call them different things,” he said. “Every country does it.”

  • Can Twitter Anticipate Attacks against Asians and Asian Americans?

    Computer scientists are gleaning a wealth of information from Twitter users to document the social impacts of the novel coronavirus pandemic. For example, a new study finds that the increased use of terms like “Chinese virus” and “Wuhan virus” on the social media platform correlated strongly with a rise in media reports of attacks on Chinese and other Asians.

     

  • Twenty-Five Years Later, Oklahoma City Bombing Inspires a New Generation of Extremists

    On April 19, 1995, Timothy McVeigh detonated a truck bomb in front of the Murrah Federal Building in Oklahoma City. The blast destroyed the building, killing 168 men, women and children and injuring hundreds more. Twenty-five years later, the Oklahoma City bombing remains the deadliest act of domestic terrorism in American history.  McVeigh and his accomplice, Terry Nichols, were not part of any large, well-funded terrorist organization; they were American extremists acting on their own. Today, their deadly legacy is one of the inspirations for a new and violent segment of the white supremacist movement.

  • Beyond Encryption: Protecting Privacy While Keeping Survey Results Accurate

    Consumer data is continuously being collected by various organizations, including local governments, marketing agencies and social media companies. These organizations assure anonymity and confidentiality when collecting this data, however, existing data privacy laws don’t guarantee that data breaches won’t occur. Data privacy laws require encryption and, in some cases, transforming the original data to “protected data” before it’s released to external parties, but experts say this is inadequate.

  • Toward an Unhackable Quantum Internet

    A quantum internet could be used to send un-hackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss. Researchers have found a way to correct for signal loss.

  • What to Make of New U.S. Actions Against Foreign Telecoms

    Recent moves by the administration mark another concrete step in the U.S. campaign to limit the digital and economic influence of Chinese telecommunications companies both within and outside U.S. borders. Justin Sherman writes that “The moves also demonstrate that current American efforts to limit the influence of the Chinese telecommunications sector are much broader than just the well-publicized targeting of Chinese telecom giant Huawei.”

  • The Coronavirus Contact Tracing App Won't Log Your Location, but It Will Reveal Who You Hang Out With

    The Australian federal government has announced plans to introduce a contact tracing mobile app to help curb COVID-19’s spread in Australia. Roba Abbas and Katina Michael write in The Conversation that rather than collecting location data directly from mobile operators, the proposed TraceTogether app will use Bluetooth technology to sense whether users who have voluntarily opted-in have come within nine metres of one another. Contact tracing apps generally store 14-21 days of interaction data between participating devices to help monitor the spread of a disease. The TraceTogether app has been available in Singapore since March 20, and its reception there may help shed light on how the new tech will fare in Australia.

  • Bolstering Cybersecurity for Systems Linking Solar Power to Grid

    DOE has awarded researchers $3.6 million to advance technologies that integrate solar power systems to the national power grid. “As U.S. energy policy shifts toward more diverse sources, particularly solar, the Energy Department understands the critical importance of protecting these systems and technologies,” said Alan Mantooth, U Arkansas Professor of electrical engineering and principal investigator for the project.

  • Strengthening Mobile Device Email Security and Privacy

    Large and small organizations alike now rely heavily on mobile devices like smartphones or tablets to enable their workers, customers and management to connect and collaborate, even when some or all of them are working remotely. But device users may prioritize convenience over strong security, accidently share sensitive information with unintended audiences, or use their corporate- or government-owned devices in contexts in which sensitive business information should not be shared.

  • Deepfakes 2.0: The New Era of “Truth Decay”

    Deepfake technology has exploded in the last few years. Deepfakes use artificial intelligence (AI) “to generate, alter or manipulate digital content in a manner that is not easily perceptible by humans.” The goal is to create digital video and audio that appears “real.” Brig. Gen. R. Patrick Huston and Lt. Col. M. Eric Bahm write that a picture used to be worth a thousand words – and a video worth a million – but deepfake technology means that “seeing” is no longer “believing.”  “From fake evidence to election interference, deepfakes threaten local and global stability,” they write.

  • Cybersecurity Requires International Cooperation, Trust

    Most experts agree that state-sponsored hackers in Russia are trying to use the internet to infiltrate the U.S. electrical grid and sabotage elections. And yet internet security teams in the U.S. and Europe actively seek to cooperate with their Russian counterparts, setting aside some of their differences and focusing on the issues where they can establish mutual trust.