-
Organized Cybercrime: Not Your Grandfather’s Mafia
Does the common stereotype for “organized crime” hold up for organizations of hackers? New research is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.
-
-
Thwarting Hacks by Thinking As the Humans Behind Them
If we understood the humans behind hacking incidents – and their intent – could we stop them? Research reveals the importance of factoring in a hacker’s motive for predicting, identifying and preventing cyberattacks.
-
-
Russia Unleashes New Weapons in Its “Cyber Attack Testing Ground”: Report
“Ukraine is, by and large, a Russian cyberattack testing ground,” Vitali Kremez told Forbes’s Zak Doffman. “One of the inherent cyber dangers with Russia, China, Iran and North Korea, but particularly with Russia, is the potential for state actors to sharpen their tools and techniques on neighboring countries,” Doffman writes. And Russia “doesn’t have Ukraine in its sights with this costly approach, it is looking much further west.”
-
-
Britain Knows It’s Selling Out Its National Security to Huawei
Allowing Chinese telecom company Huawei access to a country’s 5G infrastructure makes that country vulnerable to espionage, sabotage, and blackmail. Yet, last Tuesday, in defiance of sustained U.S. pressure, Britain said it would allow Huawei to be involved in rolling out the U.K. 5G mobile network. “Upon closer inspection, the British government’s reasoning, and the basic assumptions underlying it, are eerily lightweight and sometimes openly self-contradictory.” Thorsten Benner writes. “London’s justification for cooperating with the Chinese telecommunications company is riddled with obvious contradictions.”
-
-
Huawei and 5G: U.K. Had Little Choice but Say Yes to Chinese – Here’s Why
For the time being, the British government can hardly be enjoying the fallout from its Huawei decision. To date, much focus has been on the confidentiality of communications over mobile networks, and risks of spying. A bigger issue is the need to keep the mobile phone network running. We are in an era where everything from Uber and Deliveroo to most credit card machines cannot function without it. The nightmare scenario is a hostile state-affiliated actor shutting down or damaging the mobile networks. It may have effectively been impossible for the U.K. to say no to Huawei, but the current compromise is far from ideal.
-
-
USC Kicks Off 50-State Election Cybersecurity Trainings
Today, 28 January, the University of Southern California is kicking off its nonpartisan, independent, 50-state election cybersecurity training initiative in Maryland. Attendees will learn how to best protect their campaigns against misinformation and disinformation, hacking threats, and how to prepare and manage a potential crisis.
-
-
QAnon-ers’ Magic Cure for Coronavirus: Just Drink Bleach!
QAnon, a fervently pro-Trump conspiracy theory which started with a series of online posts in October 2017 from an anonymous figure called “Q,” imagines a world where Donald Trump is engaged in a secret and noble war with a cabal of pedophile-cannibals in the Democratic Party, the finance industry, Hollywood, and the “deep state.” Will Sommer writes as the global death toll from an alarming new coronavirus surged this week, promoters of the QAnon conspiracy theory were urging their fans to ward off the illness by purchasing and drinking dangerous bleach.
-
-
U.S.: “Serious consequences” If U.K. Allows Huawei Access to Britain’s 5G Network
President Donald Trump has warned British Prime Minister Boris Johnson of “serious consequences” if he allows the Chinese telecom giant Huawei a role in building Britain’s 5G phone network, according to officials on both sides of the Atlantic. Supporters of allowing Huawei access to U.K. communication infrastructure say that the espionage and disruption risk Huawei poses can be mitigated by limiting Huawei’s access to “non-core” segments of Britain’s communication system, but U.S. intelligence officials and their counterparts at Britain’s GCHQ, the eavesdropping spy agency and the country’s largest intelligence service, say restricting Huawei to the non-core “edges” of the new network would make little difference to the security risk.
-
-
Lawmakers Raising Alarm over Huawei’s Risk to National Security – in the U.S. and Abroad
Huawei is heavily subsidized by the Chinese government, so its products are much cheaper than the equipment produced by the company’s Western competitors – thus allowing the Chinese company to insinuate itself into a the communication infrastructure of countries where the Chinese intelligence agencies are interested in augmenting their information-gathering capabilities. U.S. lawmakers are angry at the Pentagon’s objections to Commerce Department regulations which would have made it more difficult for U.S. companies to sell to Huawei. “Huawei is an arm of the Chinese Communist Party and should be treated as such,” the senators write to the secretary of defense. “It is difficult to imagine that, at the height of the Cold War, the Department of Defense would condone American companies contracting with KGB subsidiaries because Moscow offered a discount.”
-
-
Is There a Targeted Troll Campaign Against Lisa Page? A Bot Sentinel Investigation
“Homewrecker.” “Traitor.” “Tramp.” These are just some of the insults flung at Lisa Page—the former FBI lawyer whom President Trump has targeted for her text messages critical of him during the 2016 election—in the almost 4,000 responses to a tweet she posted on 18 January. “Public figures often receive online abuse, after all. “But the replies to Page’s tweet stand out. They likely represent a targeted trollbot attack—one that nobody has reported on until now,” Christopher Bouzy, the founder and CEO of Bot Sentinel, writes. The troll attack on Page “looks a lot like the coordinated campaigns we witnessed during the 2016 election, when a swarm of accounts would suddenly begin tweeting the same toxic messaging. All this raises a question: Who is behind the apparent trollbot activity against Page?”
-
-
It Is Now 100 Seconds to Midnight
The Bulletin of the Atomic Scientists’ Doomsday Clock is now closer to midnight than ever in its history. The Bulletin cites worsening nuclear threat, lack of climate action, and rise of “cyber-enabled disinformation campaigns” in moving the clock hand. December 2020 marks the 75th anniversary of the first edition of the Bulletin of the Atomic Scientists, initially a six-page, black-and-white bulletin and later a magazine, created in anticipation that the atom bomb would be “only the first of many dangerous presents from the Pandora’s Box of modern science.”
-
-
Artificial Intelligence and the Manufacturing of Reality
The belief in conspiracy theories highlights the flaws humans carry with them in deciding what is or is not real. The internet and other technologies have made it easier to weaponize and exploit these flaws, beguiling more people faster and more compellingly than ever before. It is likely artificial intelligence will be used to exploit the weaknesses inherent in human nature at a scale, speed, and level of effectiveness previously unseen. Adversaries like Russia could pursue goals for using these manipulations to subtly reshape how targets view the world around them, effectively manufacturing their reality. If even some of our predictions are accurate, all governance reliant on public opinion, mass perception, or citizen participation is at risk.
-
-
How Russia May have Used Twitter to Seize Crimea
Online discourse by users of social media can provide important clues about the political dispositions of communities. New research suggests it can even be used by governments as a source of military intelligence to estimate prospective casualties and costs incurred from occupying foreign territories. New research shows real-time social media data may have been a source of military intelligence for the Kremlin and potentially other governments.
-
-
Encryption “Backdoors” Would Weaken Election Security: Election Protection Coalition
A coalition working on improving elections security sent a letter to Attorney General William Barr Wednesday, criticizing the AG for recent comments he made in he called on tech companies to create a “backdoor” in their devices. The backdoor would allow law enforcement to examine the communications of individuals arrested on suspicion of committing crimes or engaging in terrorism.
-
-
“Like” at Your Own Risk
New “Chameleon” Attack Can Secretly Modify Content on Facebook, Twitter. or LinkedIn: That video or picture you “liked” on social media of a cute dog, your favorite team or political candidate can actually be altered in a cyberattack to something completely different, detrimental and potentially criminal.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.