-
YouTube’s Algorithms Might Radicalize People – but the Real Problem Is We’ve No Idea How They Work
Does YouTube create extremists? It’s hard to argue that YouTube doesn’t play a role in radicalization, Chico Camargo writes. “In fact, maximizing watchtime is the whole point of YouTube’s algorithms, and this encourages video creators to fight for attention in any way possible.” Society must insist on using algorithm auditing, even though it is a difficult and costly process. “But it’s important, because the alternative is worse. If algorithms go unchecked and unregulated, we could see a gradual creep of conspiracy theorists and extremists into our media, and our attention controlled by whoever can produce the most profitable content.”
-
-
Homomorphic Encryption Improves Cloud Security
A new approach to encryption — homomorphic encryption system — could improve user perception of cloud computing services where the users are concerned about private or personal data being exposed to third parties.
-
-
An Open Source Effort to Encrypt the Internet of Things
End-to-end encryption is a staple of secure messaging apps like WhatsApp and Signal. Such encryption ensures that no one—even the app developer or the device manufacturer—can access the user’s data as it travels the web. “But what if you could bring some version of that protection to increasingly ubiquitous—and notoriously insecure—Internet of Things devices?” asks Lili Hay Newman.
-
-
Chinese Communist Party’s Media Influence Expands Worldwide
Over the past decade, Chinese Communist Party (CCP) leaders have overseen a dramatic expansion in the regime’s ability to shape media content and narratives about China around the world, affecting every region and multiple languages, according to a new report. This trend has accelerated since 2017, with the emergence of new and more brazen tactics by Chinese diplomats, state-owned news outlets, and CCP proxies.
-
-
Combating the Latest Technological Threat to Democracy: A Comparison of Facebook and Twitter’s Deepfake Policies
Twitter and Facebook have both recently announced policies for handling synthetic and manipulated media content on their platforms. Side-by-side comparison and analysis of Twitter and Facebook’s policies highlights that Facebook focuses on a narrow, technical type of manipulation, while Twitter’s approach contemplates the broader context and impact of manipulated media.
-
-
Israeli Court to Hear Case against Spy-Software Company NSO Behind Closed Doors
On Thursday, a judge at Tel Aviv’s District Court begin hearing arguments as to why Israel’s Ministry of Defense (MoD) should revoke the export license of NSO Group. The firm’s Pegasus software has been used to target journalists and activists in several countries – including in Morocco, Saudi Arabia, Mexico, and the United Arab Emirates.
-
-
Why Britain's Spooks Are Wrong to Downplay the Risks of Huawei
The U.K. wants Huawei’s 5G technology because of what John Hemmings correctly describes as the company’s “laughably cheap prices” (Huawei’s prices are cheap because the company is heavily subsidized by the Chinese government). Hemmings writes that it is this desire for inexpensive technology which leads British decisionmakers – among them Sir Andrew Parker, the outgoing director of MI5, Britain’s spy agency — to ignore the geopolitical context of an increasingly authoritarian China, which is funding Huawei’s expansion across Europe, and also ignore the reason behind China’s promotion of Huawei: The fact that China is the leading source of global cyber espionage.
-
-
If Russia Hacked Burisma, Brace for the Leaks to Follow
The Kremlin hackers who helped put Donald Trump in the White House are at it again – this time in an effort to keep him there, and the hacking of the Ukrainian energy company Burisma by hackers of the GRU, Russia’s military intelligence service, is one of the first plays in their new campaign. Andy Greenberg writes that what should worry Americans – both voters and journalists – is the next play: the selective release of documents – some forged, some doctored – by Kremlin disinformation and propaganda specialists, timed to inflict maximum damage on Joe Bide’s campaign and be of maximum help to the Trump campaign. Greenberg asks: “Did the U.S. learn enough from 2016 to ignore” such selective leaks?
-
-
Latest “Intrusion Truth” Data Dump Peels Back Layers on Chinese Front Companies
Intrusion Truth, the anonymous group which gained a name for itself by publishing detailed blog posts about suspected nation-state hackers, released new information last Thursday detailing how Chinese technology companies are recruiting attackers working on Beijing’s behalf.
-
-
Countering Hate Speech by Detecting, Highlighting “Help Speech”
Researchers have developed a system that leverages artificial intelligence to rapidly analyze hundreds of thousands of comments on social media and identify the fraction that defend or sympathize with disenfranchised minorities such as the Rohingya community. Human social media moderators, who couldn’t possibly manually sift through so many comments, would then have the option to highlight this “help speech” in comment sections.
-
-
Things Are about to Get a Lot More Confusing for Cybercriminals
While cyberdeception is not totally new as a way to fend off cybercriminals – researchers have been looking into this technique for a few years now – researchers are now taking a unique approach: using cognitive science to inform how to deceive attackers effectively.
-
-
Russian Spies Hacked Ukrainian Gas Company at Heart of Trump Impeachment Trial, Company Says
Operatives of the GRU, the Russian military intelligence service which orchestrated the hacking and social media campaign in 2016 to help Donald Trump win the election, have hacked Burisma Holdings, the Ukrainian gas company which is at the center of the upcoming impeachment trial of Trump. In 2019, Trump withheld congressionally approved military aid to Ukraine in order to pressure Ukraine to help him undermine the candidacy of former vice president Joe Biden by having Volodymyr Zelensky, Ukraine’a president, announce that Ukraine was launching an investigation of Burisma, on whose board Joe Biden’s son served from 2014 to 2019.
-
-
U.S. in Last-Ditch Effort to Sway U.K.’s Huawei Decision
The government of Boris Johnson will today (Monday) face last-minute lobbying blitz by the Trump administration to exclude Huawei from the U.K. 5G network. Johnson’s decision is expected before the end of the month, and the U.S. has threatened that intelligence sharing with the U.K. would be restricted if Johnson did not block Huawei. The U.S. intelligence community has evidence that Huawei is using its technological reach to serve as the eyes and ears of the Chinese intelligence services.
-
-
Cyberspace Is the Next Front in Iran-U.S. Conflict – and Private Companies May Bear the Brunt
Iran and other nations have waged a stealth cyberwar against the United States for at least the past decade, largely targeting not the government itself but, rather, critical infrastructure companies. This threat to the private sector will get much worse before it gets better and businesses need to be prepared to deal with it.
-
-
U.S. Monitoring Cyberspace for Signs of Iranian Aggression
U.S. government officials are watching and waiting, with many believing it is only a matter of time before Iran lashes out in cyberspace for the U.S. drone strike that killed Quds Force commander Qassem Soleimani last week. According to the latest advisory from the Department of Homeland Security, there are still “no specific, credible threats” to the United States. But officials say Iran’s public assurances that it is done retaliating mean little.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.