• Is Your Car Vulnerable to Cyberattacks?

    The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.

  • Can 'Cyber Moonshot' save America?

    It took Pearl Harbor to convince a majority of Americans that the United States that it should enter World War II. It took the Soviets launching its Sputnik satellite into orbit to convince Americans of the need to be in space. It took the bombings of 9/11 to anger and energize the nation into a war on terror. “But can the United States avoid a cyber Pearl Harbor?” Troy Turner asks. “The nation must not wait to find out, and it shouldn’t take such a life-changing event to get the country to understand the need for fast action on cybersecurity,” he writes.

  • Voting-Machine Parts Made by Foreign Suppliers Stir Security Concerns

    Voting machines which are widely used across the United States contain parts made by companies with ties to China and Russia, researchers found, raising anxious questions about the security of voting machines which use overseas suppliers. Several government agencies are now looking into the issue. Alexa Corse writes that a report issued Monday by Interos Inc., an Arlington, Virginia-based supply-chain monitoring company, says that voting-machine vendors could be at risk of using insecure components from overseas suppliers which generally are difficult to vet and monitor.

  • Click Here to Kill

    The idea of an online assassination market was advanced long before it was possible to build one, and long before there was anything resembling the dark web. Susan Choi writes that a threshold had been crossed: advances in encryption and cryptocurrency make this dark vision a reality: Journalists at BBC News Russia confirmed that on 12 March 2019, the first known case of a murder being ordered on the dark web and successfully carried out by hired assassins. The FBI and DHS are worried.

  • Authoritarian Regimes Employ New Twitter Tactics to Quash Dissent

    When protesters use social media to attract attention and unify, people in power may respond with tweeting tactics designed to distract and confuse, according to a new study. Authoritarian regimes appear to be growing more savvy in their use of social media to help suppress mass movements.

  • Facebook's Ad Delivery System Deepens the U.S. Political Divide

    Facebook is wielding significant power over political discourse in the United States, thanks to an ad delivery system that reinforces political polarization among users, according to new research. The study shows for the first time that Facebook delivers political ads to its users based on the content of those ads and the information the media company has on its users—and not necessarily based on the audience intended by the advertiser.

  • Samoa Has Become a Case Study for “Anti-Vax” Success

    In Samoa, Facebook is the main source of information. Michael Gerson writes that it is thus not surprising that anti-vaccination propaganda, much of it generated in the United States, has arrived through social media and discourages Samoan parents from vaccinating their children. “This type of import has helped turn Samoa into a case study of ‘anti-vax’ success — and increased the demand for tiny coffins decorated with flowers and butterflies,” he writes, adding: “Samoa is a reminder of a pre-vaccine past and the dystopian vision of a post-vaccine future.”

  • Telefonica Deutschland Chooses Huawei to Build Its German 5G Network

    Rebuffing U.S. pressure, German mobile provider Telefonica Deutschland announced Wednesday that it has chosen Finland’s Nokia and China’s Huawei to build its 5G network in Germany, the company. Huawei is a global leader in constructing equipment and infrastructure for ultra-high-speed 5G data networks, but the intelligence services of leading Western countries have argue that Huawei is a security threat because of its close ties with the Chinese military and intelligence establishments. 

  • Unlawful Metadata Access Is Easy When We’re Flogging a Dead Law

    After watching this year’s media raids and the prosecution of lawyers and whistleblowers, it’s not hard to see why Australians wonder about excessive police power and dwindling journalistic freedom. But these problems are compounded by another, less known issue: police, and other bodies not even involved in law enforcement, have broad powers to access metadata. Each year, police alone access metadata in excess of 300,000 times.

  • U.K. Intelligence Probing Russian Election Meddling

    Britain’s cybersecurity agency is investigating whether state-sponsored Russian hackers were behind the leaks of British government documents used by opposition politicians to embarrass Boris Johnson’s ruling Conservative Party ahead of Thursday’s general election.

  • The New Kind of Warfare Reshaping Global Politics

    The list is long: Russian internet trolls interfering in the 2016 U.S. election; Russian operatives murdering Putin’s opponents abroad; Chinese spies manipulating Australian politics while the country’s coast guard ships harass Japanese fishing fleets, and much more. Simon Clark writes that these are not random acts of autocratic aggression. Rather, they are examples of a new form of warfare which is becoming a bigger challenge for the United States and its western allies: gray-zone conflict.

  • Social Media Vetting of Visa Applicants Violates the First Amendment

    Beginning in May, the State Department has required almost every applicant for a U.S. visa—more than fourteen million people each year—to register every social media handle they’ve used over the past five years on any of twenty platforms. “There is no evidence that the social media registration requirement serves the government’s professed goals” of “strengthen” the processes for “vetting applicants and confirming their identity,” Carrie DeCell and Harsha Panduranga write, adding: “The registration requirement chills the free speech of millions of prospective visitors to the United States, to their detriment and to ours,” they write.

  • Going After the Good Guys: The Government’s Ransomware Identity Crisis

    Government agencies find it difficult to keep pace with the rapidly evolving cybercrime – especially when it comes to ransomware and malware. Ryan Blanch, a criminal defense attorney who has been involved in myriad cybercrime cases, writes that “sometimes, the government seems to be going after the good guys instead of the bad guys.”

  • A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors

    Earlier this fall Google announced that it had demonstrated “quantum supremacy” – that is, that it performed a specific quantum computation far faster than the best classical computers could achieve. IBM promptly criticized the claim, saying that its own classical supercomputer could perform the computation at nearly the same speed with far greater fidelity. “So how can you make sense of what is going on?” Subhash Kak, a professor of Electrical and Computer Engineering, asks. “As someone who has worked on quantum computing for many years, I believe that due to the inevitability of random errors in the hardware, useful quantum computers are unlikely to ever be built.”

  • Telegram: The Latest Safe Haven for White Supremacists

    Telegram, the online social networking, may not be as popular in the U.S. as Twitter or Facebook, but with more than 200 million users, it has a significant audience. And it is gaining popularity. ADL reports that Telegram has become a popular online gathering place for the international white supremacist community and other extremist groups who have been displaced or banned from more popular sites.