-
Cyberattacks and Electronic Voting Errors Threaten 2020 Outcome, Experts Warn
Potential electronic voting equipment failures and cyberattacks from Russia and other countries pose persistent threats to the 2020 elections, election security analysts and key Democrats warn.
-
-
4. Chinese Firms Secretly Own Leading VPNs
China’s efforts to implement its persistent surveillance approach outside its borders go beyond helping Huawei to make the company’s 5G technology more competitive, and thus more appealing, to Western and non-Western countries. A recent study found that almost a third (30 percent) of the world’s top virtual private network (VPN) providers are secretly owned by six Chinese companies.
-
-
5. The Ransomware Menace
Experts say that 2019 should be declared the Year of Ransomware Escalation. The increasing number of attacks and the move by perpetrators to target large companies and public institutions in the United States and abroad is a turning point in the evolution of this digital form of blackmail.
-
-
State Officials Are Unhappy with Rollout of Election Security Framework
The federal government has developed a new threat-notification framework, which is meant to give U.S. officials a consistent process for alerting state personnel, the private sector, Congress, and the public of foreign attempts to interfere in U.S. politics through influence operations or cyberactivity. Sean Lyngaas writes that “State officials were only given a generic, one-page summary of the document, which is still restricted to the federal government” and quotes the secretary of state of West Virginia, who said that the document “was “either done without [states’] input or our input was ignored.”
-
-
Military Cyber Operations: The New NDAA Tailors the 48-Hour Notification Requirement
Congress will soon enact the National Defense Authorization Act for Fiscal Year 2020 (NDAA fiscal 2020), which includes a provision that will fine-tune the range of military cyberoperations subject to the 48-hour notification requirement associated with “sensitive military cyber operations.”
-
-
Closing a Critical Gap in Cybersecurity
Last year, following the rising threats in cyberspace, Congress established the U.S. first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). Christopher Krebs, who serves as the first director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), writes that “Unfortunately, too often we come across cybersecurity vulnerabilities sitting on the public internet and are unable to act because we cannot identify the owner of the vulnerable system.”
-
-
GOP Senators: Chinese Drones Pose National Security Threat
A group of GOP senators called on the administration to restrict the use of Chinese drones by U.S. government agencies. “American taxpayer dollars should not fund state-controlled or state-owned firms that seek to undermine American national security and economic competitiveness,” they write.
-
-
The United States Should Not Act as If It's the Only Country Facing Foreign Interference
“Right now, Russia’s security services and their proxies have geared up to repeat their interference in the 2020 election. We are running out of time to stop them.” This stark warning from former National Security Council official Fiona Hill serves as a sharp reminder of the threat to democracy posed by foreign interference and disinformation. Russia’s ongoing interference in U.S. affairs is just a small piece on a big chessboard. A key foreign policy goal of the Kremlin is to discredit, undermine, and embarrass what it sees as a liberal international order intent on keeping Russia down and out. Russia’s systematic attack on U.S. democracy in 2016 was unprecedented, but its playbook is not unique.
-
-
Containing Online Hate Speech as If It Were a Computer Virus
Artificial intelligence is being developed which will allow advisory “quarantining” of hate speech in a manner akin to malware filters – offering users a way to control exposure to “hateful content” without resorting to censorship.
-
-
Resilience Guidebook for State of Idaho
In times of growing cyber threats and severe weather, resilience – the ability to continue providing emergency services while damaged infrastructure is restored – has emerged as a growing concern among leaders at state and local levels.
-
-
How New Voting Machines Could Hack Our Democracy
The United States has a disturbing habit of investing in unvetted new touchscreen voting machines that later prove disastrous. Jennifer Cohn writes that as we barrel toward what is set to be the most important election in a generation, Congress appears poised to fund another generation of risky touchscreen voting machines called universal use Ballot Marking Devices (or BMDs), which function as electronic pens, marking your selections on paper on your behalf. Most leading election security experts instead recommend hand-marked paper ballots as a primary voting system, with an exception for voters with disabilities.
-
-
Seizure-Triggering Attack Is Stark Example of How Social Media Can Be Weaponized
Followers of the Epilepsy Foundation’s Twitter handle were targeted last month with posts containing strobe light GIFs and videos which could have caused seizures for people with epilepsy, the foundation announced Monday. “While this kind of activity may not bear the hallmarks of a cyberattack, which can trick users into clicking malicious links or knock a website offline by flooding it with junk traffic, this attack shows that platforms can have even their normal functions weaponized in order to cause physical harm,” Shannon Vavra writes.
-
-
Is Your Car Vulnerable to Cyberattacks?
The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.
-
-
Can 'Cyber Moonshot' save America?
It took Pearl Harbor to convince a majority of Americans that the United States that it should enter World War II. It took the Soviets launching its Sputnik satellite into orbit to convince Americans of the need to be in space. It took the bombings of 9/11 to anger and energize the nation into a war on terror. “But can the United States avoid a cyber Pearl Harbor?” Troy Turner asks. “The nation must not wait to find out, and it shouldn’t take such a life-changing event to get the country to understand the need for fast action on cybersecurity,” he writes.
-
-
Voting-Machine Parts Made by Foreign Suppliers Stir Security Concerns
Voting machines which are widely used across the United States contain parts made by companies with ties to China and Russia, researchers found, raising anxious questions about the security of voting machines which use overseas suppliers. Several government agencies are now looking into the issue. Alexa Corse writes that a report issued Monday by Interos Inc., an Arlington, Virginia-based supply-chain monitoring company, says that voting-machine vendors could be at risk of using insecure components from overseas suppliers which generally are difficult to vet and monitor.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.