• Studying Ideologically Motivated Cyberattacks

    A John Jay College of Criminal Justice project on cyberterrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The John Jay project will study and aggregate ideologically motivated cyberattacks and will create a new, unique dataset – the Cyber-Extremist Crime Database (Cyber-ECDB) – which will track ideologically motivated cyberattacks against U.S. targets from 1998 to present.

  • Examining Australia’s COVIDSafe Tracing App

    The Australian government releases an App called COVIDSafe to help in tracing contacts of those infected with the coronavirus. As is the case with similar apps in other countries, COVIDSafe has raised privacy concerns, especially about the potential of abuse by government agencies and hacking by cybercriminals. The University of Sydney academics from the disciplines of cybersecurity, media, law and health comment on COVIDSafe, its pros and cons.

  • Solving “Link Discovery” Problem for Terahertz Data Networks

    When someone opens a laptop, a router can quickly locate it and connect it to the local Wi-Fi network. That ability is a basic element of any wireless network known as link discovery, and now a team of researchers has developed a means of doing it with terahertz radiation, the high-frequency waves that could one day make for ultra-fast wireless data transmission.

  • The Deepfake iPhone Apps Are Here

    On Sunday, Lawfare’s Jacob Schulz, like many Americans, woke up to see that President Donald Trump had retweeted a misleading gif of his presumptive Democratic challenger, Joe Biden. Schultz notes that Trump’s dissemination of a deepfake video was met with alarm. David Frum, for example, noted the significance of the president’s retweet: “Instead of sharing deceptively edited video—as Trump and his allies have often done before—yesterday Trump for the first time shared a video that had been outrightly fabricated.” Schulz adds: “Soon, people will be able to use their iPhones not just to turn themselves into mildly convincing late-night comedians but to convincingly turn Joe Biden into whatever they want. When that happens, in the now-infamous words of Samantha Cole of Motherboard, ‘We are truly f****d.’”

  • How Far-Right Extremists Are Exploiting Pandemic

    Far-right extremists have been linked to bombing plots tied to the coronavirus pandemic, spotted holding anti-Semitic signs at protests outside state capitols, and seen trafficking on fringe platforms in all manner of conspiracy theories about the virus. As the coronavirus pandemic continues to ravage millions of lives and paralyze much of the economy, these extremists in the United States are seizing every opportunity to reach out to thousands of potential followers and expand their ranks.

  • Protecting Oneself from the Latest Internet Sex Crime: Sextortion

    What makes sextortion — the use of intimate images or videos that have been captured to then extort compliance from a victim — different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.” But in many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

  • Senate Intel Releases Report on Intel Community Assessment of Russian Interference

    On Tuesday, Senate Select Committee on Intelligence released a new report, the fourth and penultimate volume in the Committee’s bipartisan Russia investigation. The latest installment examines the sources, tradecraft, and analytic work behind the 2017 Intelligence Community Assessment (ICA) that determined Russia conducted an unprecedented, multi-faceted campaign to interfere with the 2016 U.S. presidential election. “One of the ICA’s most important conclusions was that Russia’s aggressive interference efforts should be considered ‘the new normal,’” said Senator Richard Burr (R-North Carolina), the committee’s chairman.

  • Creating Virtual Cyber Defense Tool

    Researchers are helping protect the country’s most secretly held assets through a partnership that’s creating state-of-the-art, virtual cyberattack defenses. The researchers have customized an existing MSU-designed Netmapper computer program to develop next-generation cyber learning and training software that can scan and map the military’s complex computer network infrastructures.

  • Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say

    U.S. intelligence agencies have assessed that Chinese operatives have pushed false messages across social media platforms, aiming to amplify and exaggerate the actions of the U.S. government in order to sow panic, increase confusion, and deepen political polarization in the already-on-edge American public. The amplification techniques are alarming to U.S. officials because the disinformation showed up as texts on many Americans’ cellphones, a tactic that several of the officials said they had not seen before. American officials said the operatives had adopted some of the techniques mastered by Russia-backed trolls. That has spurred agencies to look at new ways in which China, Russia and other nations are using a range of platforms to spread disinformation during the pandemic. President Trump himself has shown little concern about China’s actions, dismissing worries over China’s use of disinformation when asked about it on Fox News. “They do it and we do it and we call them different things,” he said. “Every country does it.”

  • Can Twitter Anticipate Attacks against Asians and Asian Americans?

    Computer scientists are gleaning a wealth of information from Twitter users to document the social impacts of the novel coronavirus pandemic. For example, a new study finds that the increased use of terms like “Chinese virus” and “Wuhan virus” on the social media platform correlated strongly with a rise in media reports of attacks on Chinese and other Asians.

     

  • Twenty-Five Years Later, Oklahoma City Bombing Inspires a New Generation of Extremists

    On April 19, 1995, Timothy McVeigh detonated a truck bomb in front of the Murrah Federal Building in Oklahoma City. The blast destroyed the building, killing 168 men, women and children and injuring hundreds more. Twenty-five years later, the Oklahoma City bombing remains the deadliest act of domestic terrorism in American history.  McVeigh and his accomplice, Terry Nichols, were not part of any large, well-funded terrorist organization; they were American extremists acting on their own. Today, their deadly legacy is one of the inspirations for a new and violent segment of the white supremacist movement.

  • Beyond Encryption: Protecting Privacy While Keeping Survey Results Accurate

    Consumer data is continuously being collected by various organizations, including local governments, marketing agencies and social media companies. These organizations assure anonymity and confidentiality when collecting this data, however, existing data privacy laws don’t guarantee that data breaches won’t occur. Data privacy laws require encryption and, in some cases, transforming the original data to “protected data” before it’s released to external parties, but experts say this is inadequate.

  • Toward an Unhackable Quantum Internet

    A quantum internet could be used to send un-hackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss. Researchers have found a way to correct for signal loss.

  • What to Make of New U.S. Actions Against Foreign Telecoms

    Recent moves by the administration mark another concrete step in the U.S. campaign to limit the digital and economic influence of Chinese telecommunications companies both within and outside U.S. borders. Justin Sherman writes that “The moves also demonstrate that current American efforts to limit the influence of the Chinese telecommunications sector are much broader than just the well-publicized targeting of Chinese telecom giant Huawei.”

  • The Coronavirus Contact Tracing App Won't Log Your Location, but It Will Reveal Who You Hang Out With

    The Australian federal government has announced plans to introduce a contact tracing mobile app to help curb COVID-19’s spread in Australia. Roba Abbas and Katina Michael write in The Conversation that rather than collecting location data directly from mobile operators, the proposed TraceTogether app will use Bluetooth technology to sense whether users who have voluntarily opted-in have come within nine metres of one another. Contact tracing apps generally store 14-21 days of interaction data between participating devices to help monitor the spread of a disease. The TraceTogether app has been available in Singapore since March 20, and its reception there may help shed light on how the new tech will fare in Australia.