-
Preparing for Great Power Conflict
How has the military experience gained by both the U.S. military and the PLA since 2001 shaped the way both militaries train? What effect do these experiences and training trends have on readiness for major power conflict?
-
-
Six Things to Watch Following Meta's Threads Launch
Meta’s ‘Twitter killer,’ Threads, launched on July 6 to media fanfare. With another already politically charged U.S. election on the horizon, online hate and harassment at record highs, and a rise in antisemitism and extremist incidents both on- and offline, a new social media product of this scale will present serious challenges.
-
-
Chinese Intelligence-Linked Hackers Targeted U.S. Government Agencies in Microsoft Hack
Hackers linked to China’s intelligence agencies, are behind a monthlong campaign that breached some unclassified U.S. email systems, allowing them to access to a small number of accounts at the U.S. State Department and a handful of other organizations.
-
-
Fact Check: Why Do we Believe Fake News?
Fake news has become a real threat to society. Some internet users are more likely to accept misinformation and fake news as true information than others. How do psychological and social factors influence whether we fall for them or not? And what can we do against it?
-
-
Preliminary Injunction Limiting Government Communications with Platforms Tackles Illegal “Jawboning,” but Fails to Provide Guidance on What’s Unconstitutional
A July 4 preliminary injunction issued by a federal judge in Louisiana limiting government contacts with social media platforms deals with government “jawboning” is a serious issue deserving serious attention and judicial scrutiny. The court order is notable as the first to hold the government accountable for unconstitutional jawboning of social media platforms, but it is not the serious examination of jawboning issues that is sorely needed. The court did not distinguish between unconstitutional and constitutional interactions or provide guideposts for distinguishing between them in the future.
-
-
Muting Trump’s “Megaphone” Easier Said Than Done
How do you cover Donald Trump? He’s going to do a lot of speeches, and parts of his message will be provably false, reflect intolerance, and promote anti-democratic ideas. Political experts suggest ways media can blunt the former president’s skillful manipulation of coverage to disseminate falsehoods and spread messages which are often sharply divisive and periodically dangerous.
-
-
Stressed for a Bit? Then Don’t Click It, Cybersecurity Experts Advise
Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack. Phishing psychology study explores what makes workers vulnerable.
-
-
Recent Chinese Cyber Intrusions Signal a Strategic Shift
On 25 May, Australia and its partners in the Five Eyes intelligence-sharing network—Canada, New Zealand, the UK and the US—made a coordinated disclosure on a state-sponsored cyber hacking group dubbed ‘Volt Typhoon’. The group has been detected intruding on critical infrastructure since 2021, but the nature of recent intelligence on its behavior hints at worrying developments in the Chinese cyber establishment.
-
-
Researchers Devise a Way to Evaluate Cybersecurity Methods
A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive, so engineers often apply what are known as obfuscation schemes. MIT researchers have developed a system which analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.
-
-
How Secure Are Voice Authentication Systems Really?
Voice authentication has increasingly been used in remote banking, call centers and other security-critical scenarios. Attackers can break voice authentication with up to 99 percent success within six tries.
-
-
U.S. Agencies Buy Vast Quantities of Personal Information on the Open Market – a Legal Scholar Explains Why and What It Means for Privacy in the Age of AI
The issues pf the protection of personal information in the digital age is increasingly urgent. Today’s commercially available information, coupled with the now-ubiquitous decision-making artificial intelligence and generative AI like ChatGPT, significantly increases the threat to privacy and civil liberties by giving the government access to sensitive personal information beyond even what it could collect through court-authorized surveillance.
-
-
As Cybercrime Evolves, Organizational Resilience Demands a Mindset Shift
Facing the threat of state-sponsored cyberattack groups, the financial motivations of organized cybercrime gangs and the reckless ambitions of loosely knit hacktivist collectives, organizations are fighting a cybersecurity battle on multiple fronts.
-
-
From Wadham to GCHQ and Back: Robert Hannigan on Cybercrime, Spying and the AI Tsunami Coming Our Way
Is the much-vaunted cyber-Armageddon likely or even possible? One experts says that “‘State cyber threats do get overplayed. They can’t do everything and countries over-estimate their cyber capabilities – just as they over estimate their military capability.” The expert insists, however, that “The challenges are ‘moving very fast’, as potential attackers learn fast.”
-
-
To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping
Over the past several years, ransomware attacks have become a persistent national security threat. The inability to respond effectively to this challenge has normalized what should be intolerable: organized cybercriminals harbored by hostile states regularly disrupting and extorting businesses and essential services, causing misery in the process.
-
-
The ‘Truther Playbook’: Tactics That Explain Vaccine Conspiracy Theorist RFK Jr’s Presidential Momentum
Polls show that Robert Kennedy’s Jr., promoting anti-vaccine conspiracy theories, has been drawing surprising early support in his campaign for the Democratic presidential nomination. Kennedy is using the “truther playbook” - – promising identity and belonging, revealing “true” knowledge, providing meaning and purpose, and promising leadership and guidance – which prove to be appealing in our current post-truth era, in which opinions often triumph over facts, and in which charlatans can achieve authority by framing their opponents as corrupt and evil and claiming to expose this corruption. These rhetorical techniques can be used to promote populist politics just as much as anti-vaccine content.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.