-
Judge Rebukes Barr’s Handling of Mueller Report
U.S. District Judge Reggie Walton Thursday sharply criticized the way Attorney General William Barr handled the Special Counsel Robert Mueller’s Russia report, saying Barr had made “misleading public statements” to spin the investigation’s findings in favor of President Donald Trump. AP reports that the scolding from the judge was unusually blunt, with the judge saying that “he struggled to reconcile Barr’s public characterizations of the report — which included his statement that Mueller found ‘no collusion’ between the Trump campaign and Russia — with what the document actually said.”
-
-
No Foreign Meddling in Super Tuesday Primaries: U.S. Officials
U.S. voters who headed to the polls to cast ballots in Super Tuesday primaries encountered scattered problems, some causing long lines or delays, but nothing that could be attributed to foreign interference, U.S. officials said. As a precaution, U.S. security and intelligence officials warned voters Monday to expect foreign actors to try to sway their views as they prepared to vote in key presidential primaries. The U.S. intelligence community, and the exhaustive Mueller investigation, found incontrovertible evidence that Russia engaged in a broad and successful campaign to help Donald Trump win the 2016 election. Earlier Tuesday, acting DHS Secretary Chad Wolf told lawmakers that the threat, whether it manifested during Tuesday’s primary elections or during the general election in November, is growing. “We see an ongoing influence campaign by Russia,” he said, adding “We would not be surprised if other adversaries are not also looking at what they’re doing.”
-
-
Understanding Russian Subversion
Since 2014, Russia has undertaken a wide range of subversive activities intended to influence the domestic politics of the United States, its partners, and its allies. A new RAND study synthesizes previous work, discussing what Russian subversion is and the capabilities Russia uses to undertake it today.
-
-
If We Build It (They Will Break In)
Attorney General William Barr has staked his ground in the long-running debate over law enforcement access to encrypted communications. Last fall, Barr criticized end-to-end encryption as “enabling dangerous criminals to cloak their communications and activities behind an essentially impenetrable digital shield.” As the debate continues, commentators and policymakers often overlook a historical example of the problems with law enforcement access.
-
-
Random Toxicity? What’s Going on in @benjaminwittes’s Mentions
Benjamin Wittes, the editor of Lawfare, had supported Brett Kavanaugh’s 2018 nomination to the Supreme Court early on, said nice things about him, and defended him against allegations he thought were spurious. But though he publicly changed his position after Christine Blasey Ford came forward and testified, he writes that ever since, every twit of his, regardless of its topic, is responded to with hundreds or even thousands of angry twits, with practically identical wording, accusing him of having been a “Buddy of Kavanaugh.” Matters only got worse when he supported, albeit tepidly, the appointment of Bill Barr for Attorney General. Who is behind these thousands of similar twits?
-
-
Bipartisan Bill Would Reimburse Telcoms for Replacing Huawei’s, ZTE’s Equipment
New bipartisan legislation aims to protect American communications networks from threats presented by foreign suppliers like Huawei and ZTE. The “rip and replace” part of the legislation would offer relief to reimburse smaller telecommunications providers – largely in rural areas – by reimbursing them for the costs of removing and replacing untrusted foreign equipment.
-
-
Tool Identifies, Exposes Violent Extremists Online
In an increasingly connected world, there are plenty of opportunities for extremists to communicate, recruit, spread propaganda, and incite violence. From videos being shared on Facebook and Twitter, to more niche instant-messaging services such as Telegram, to coded postings on Gab, 4 Chan, and 8chan — the number and reach of communications channels available to extremists has never been greater. The Network Contagion Research Institute (NCRI), a non-partisan organization, has developed a platform – Contextus – which uses machine-learning to track and expose extremist discourse online.
-
-
“Surfing Attack” Hacks Siri, Google with Ultrasonic Waves
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge.
-
-
For Better Cybersecurity, New Tool Fools Hackers into Sharing Keys
Instead of blocking hackers, a new cybersecurity defense approach actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
-
-
Tools to Help Fight Disinformation Online
Today’s information ecosystem brings access to seemingly infinite amounts of information instantaneously. It also contributes to the rapid spread of misinformation and disinformation to millions of people. Researchers at RAND’s Truth Decay initiative worked to identify and characterize the universe of online tools targeted at online disinformation, focusing on those tools created by nonprofit or civil society organizations.
-
-
Protecting Sensitive Metadata So It Cannot Be Used for Surveillance
MIT researchers have designed a scalable system that secures the metadata of millions of users in communications networks, to help protect the information against possible state-level surveillance. The system ensures hackers eavesdropping on large networks cannot find out who is communicating and when they’re doing so.
-
-
Hackers Are Everywhere. Here’s How Scholars Can Find Them.
The world of cyber operations is full of hard national security choices. Ben Buchanan asks: “How do long-held ideas of counterintelligence, deterrence and deception apply in this new arena of competition? How does escalation work with hacking? Who carried out this intrusion, and what was the intention behind it? Most of all, what does any of this mean for geopolitics in the modern age, and how can scholars communicate that to policymakers?”
-
-
Digital Threats to Democracy
A new study surveyed hundreds of technology experts about whether or not digital disruption will help or hurt democracy by 2030. Of the 979 responses, about 49 percent of these respondents said use of technology “will mostly weaken core aspects of democracy and democratic representation in the next decade,” while 33 percent said the use of technology “will mostly strengthen core aspects of democracy.”
-
-
Spies, Election Meddling, And Disinformation: Past and Present
Calder Walton writes that following Russia’s “sweeping and systematic” attack on the 2016 U.S. presidential election—which was intended to support Moscow’s favored candidate, Donald J. Trump, and undermine his opponent, Hillary Clinton—the media frequently labeled the operation “unprecedented.” “The social-media technologies that Russia deployed in its cyber-attack on the United States in 2016 were certainly new,” he writes, “but Russia’s strategy was far from unusual. In fact, the Kremlin has a long history of meddling in U.S. and other Western democratic elections and manufacturing disinformation to discredit and divide the West.”
-
-
Growing Tory Opposition to Boris Johnson’s Huawei Decision
David Davis, a leading Conservative MP and a former Brexit Secretary, has warned that allowing Chinese technology giant Huawei to build some of the infrastructure for the U.K. 5G communication network could be seen as “the worst decision made by a British prime minister.” The government Huawei move represented the “worst intelligence decision since MI6’s recruitment of Kim Philby,” Davis said, adding that if the government allowed Huawei access to the U.K. 5G infrastructure, then “We are handing the keys to large parts of the country over to China.” Davis was blunt: “This is the ground on which future wars will be fought.”
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.