-
Creating Virtual Cyber Defense Tool
Researchers are helping protect the country’s most secretly held assets through a partnership that’s creating state-of-the-art, virtual cyberattack defenses. The researchers have customized an existing MSU-designed Netmapper computer program to develop next-generation cyber learning and training software that can scan and map the military’s complex computer network infrastructures.
-
-
Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say
U.S. intelligence agencies have assessed that Chinese operatives have pushed false messages across social media platforms, aiming to amplify and exaggerate the actions of the U.S. government in order to sow panic, increase confusion, and deepen political polarization in the already-on-edge American public. The amplification techniques are alarming to U.S. officials because the disinformation showed up as texts on many Americans’ cellphones, a tactic that several of the officials said they had not seen before. American officials said the operatives had adopted some of the techniques mastered by Russia-backed trolls. That has spurred agencies to look at new ways in which China, Russia and other nations are using a range of platforms to spread disinformation during the pandemic. President Trump himself has shown little concern about China’s actions, dismissing worries over China’s use of disinformation when asked about it on Fox News. “They do it and we do it and we call them different things,” he said. “Every country does it.”
-
-
Can Twitter Anticipate Attacks against Asians and Asian Americans?
Computer scientists are gleaning a wealth of information from Twitter users to document the social impacts of the novel coronavirus pandemic. For example, a new study finds that the increased use of terms like “Chinese virus” and “Wuhan virus” on the social media platform correlated strongly with a rise in media reports of attacks on Chinese and other Asians.
-
-
Twenty-Five Years Later, Oklahoma City Bombing Inspires a New Generation of Extremists
On April 19, 1995, Timothy McVeigh detonated a truck bomb in front of the Murrah Federal Building in Oklahoma City. The blast destroyed the building, killing 168 men, women and children and injuring hundreds more. Twenty-five years later, the Oklahoma City bombing remains the deadliest act of domestic terrorism in American history. McVeigh and his accomplice, Terry Nichols, were not part of any large, well-funded terrorist organization; they were American extremists acting on their own. Today, their deadly legacy is one of the inspirations for a new and violent segment of the white supremacist movement.
-
-
Beyond Encryption: Protecting Privacy While Keeping Survey Results Accurate
Consumer data is continuously being collected by various organizations, including local governments, marketing agencies and social media companies. These organizations assure anonymity and confidentiality when collecting this data, however, existing data privacy laws don’t guarantee that data breaches won’t occur. Data privacy laws require encryption and, in some cases, transforming the original data to “protected data” before it’s released to external parties, but experts say this is inadequate.
-
-
Toward an Unhackable Quantum Internet
A quantum internet could be used to send un-hackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss. Researchers have found a way to correct for signal loss.
-
-
What to Make of New U.S. Actions Against Foreign Telecoms
Recent moves by the administration mark another concrete step in the U.S. campaign to limit the digital and economic influence of Chinese telecommunications companies both within and outside U.S. borders. Justin Sherman writes that “The moves also demonstrate that current American efforts to limit the influence of the Chinese telecommunications sector are much broader than just the well-publicized targeting of Chinese telecom giant Huawei.”
-
-
The Coronavirus Contact Tracing App Won't Log Your Location, but It Will Reveal Who You Hang Out With
The Australian federal government has announced plans to introduce a contact tracing mobile app to help curb COVID-19’s spread in Australia. Roba Abbas and Katina Michael write in The Conversation that rather than collecting location data directly from mobile operators, the proposed TraceTogether app will use Bluetooth technology to sense whether users who have voluntarily opted-in have come within nine metres of one another. Contact tracing apps generally store 14-21 days of interaction data between participating devices to help monitor the spread of a disease. The TraceTogether app has been available in Singapore since March 20, and its reception there may help shed light on how the new tech will fare in Australia.
-
-
Bolstering Cybersecurity for Systems Linking Solar Power to Grid
DOE has awarded researchers $3.6 million to advance technologies that integrate solar power systems to the national power grid. “As U.S. energy policy shifts toward more diverse sources, particularly solar, the Energy Department understands the critical importance of protecting these systems and technologies,” said Alan Mantooth, U Arkansas Professor of electrical engineering and principal investigator for the project.
-
-
Strengthening Mobile Device Email Security and Privacy
Large and small organizations alike now rely heavily on mobile devices like smartphones or tablets to enable their workers, customers and management to connect and collaborate, even when some or all of them are working remotely. But device users may prioritize convenience over strong security, accidently share sensitive information with unintended audiences, or use their corporate- or government-owned devices in contexts in which sensitive business information should not be shared.
-
-
Deepfakes 2.0: The New Era of “Truth Decay”
Deepfake technology has exploded in the last few years. Deepfakes use artificial intelligence (AI) “to generate, alter or manipulate digital content in a manner that is not easily perceptible by humans.” The goal is to create digital video and audio that appears “real.” Brig. Gen. R. Patrick Huston and Lt. Col. M. Eric Bahm write that a picture used to be worth a thousand words – and a video worth a million – but deepfake technology means that “seeing” is no longer “believing.” “From fake evidence to election interference, deepfakes threaten local and global stability,” they write.
-
-
Cybersecurity Requires International Cooperation, Trust
Most experts agree that state-sponsored hackers in Russia are trying to use the internet to infiltrate the U.S. electrical grid and sabotage elections. And yet internet security teams in the U.S. and Europe actively seek to cooperate with their Russian counterparts, setting aside some of their differences and focusing on the issues where they can establish mutual trust.
-
-
Quantum Computers Will Break the Internet, but Only If We Let Them
Tomorrow’s quantum computers are expected to be millions of times faster than the device you’re using right now. Whenever these powerful computers take hold, it will be like going from a Ford Model T to the Starship Enterprise. Hackers may soon be able to expose all digital communications by using advanced quantum computers. A new form of cryptography would stop them, but it needs to be put into place now.
-
-
Putin’s Long War Against American Science
A decade of health disinformation promoted by President Vladimir Putin of Russia has sown wide confusion, hurt major institutions and encouraged the spread of deadly illnesses. The Putin regime mandates vaccination at home, but has launched a broad and sophisticated disinformation campaign in an effort to lower vaccine rates in Western countries, with two goals in mind: discredit Western science and medicine, and weaken Western societies by facilitating the re-emergence of diseases such as measles, long thought to have been eradicated. The COPVID-19 epidemic has not escaped the notice of the Kremlin’s disinformation and propaganda specialists. “As the pandemic has swept the globe, it has been accompanied by a dangerous surge of false information,” William Broad writes. “Analysts say that President Vladimir V. Putin of Russia has played a principal role in the spread of false information as part of his wider effort to discredit the West and destroy his enemies from within.”
-
-
Social Media Has Positive Possibilities in Pandemic
Social media has the power to both inform and deceive – and do both at speeds we have never experienced. That fact has, once again, been on display as the COVID-19 epidemic has dominated social media platforms for weeks.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.