• Containing Online Hate Speech as If It Were a Computer Virus

    Artificial intelligence is being developed which will allow advisory “quarantining” of hate speech in a manner akin to malware filters – offering users a way to control exposure to “hateful content” without resorting to censorship.

  • Resilience Guidebook for State of Idaho

    In times of growing cyber threats and severe weather, resilience – the ability to continue providing emergency services while damaged infrastructure is restored – has emerged as a growing concern among leaders at state and local levels.

  • How New Voting Machines Could Hack Our Democracy

    The United States has a disturbing habit of investing in unvetted new touchscreen voting machines that later prove disastrous. Jennifer Cohn writes that as we barrel toward what is set to be the most important election in a generation, Congress appears poised to fund another generation of risky touchscreen voting machines called universal use Ballot Marking Devices (or BMDs), which function as electronic pens, marking your selections on paper on your behalf. Most leading election security experts instead recommend hand-marked paper ballots as a primary voting system, with an exception for voters with disabilities.

  • Seizure-Triggering Attack Is Stark Example of How Social Media Can Be Weaponized

    Followers of the Epilepsy Foundation’s Twitter handle were targeted last month with posts containing strobe light GIFs and videos which could have caused seizures for people with epilepsy, the foundation announced Monday. “While this kind of activity may not bear the hallmarks of a cyberattack, which can trick users into clicking malicious links or knock a website offline by flooding it with junk traffic, this attack shows that platforms can have even their normal functions weaponized in order to cause physical harm,” Shannon Vavra writes.

  • Is Your Car Vulnerable to Cyberattacks?

    The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.

  • Can 'Cyber Moonshot' save America?

    It took Pearl Harbor to convince a majority of Americans that the United States that it should enter World War II. It took the Soviets launching its Sputnik satellite into orbit to convince Americans of the need to be in space. It took the bombings of 9/11 to anger and energize the nation into a war on terror. “But can the United States avoid a cyber Pearl Harbor?” Troy Turner asks. “The nation must not wait to find out, and it shouldn’t take such a life-changing event to get the country to understand the need for fast action on cybersecurity,” he writes.

  • Voting-Machine Parts Made by Foreign Suppliers Stir Security Concerns

    Voting machines which are widely used across the United States contain parts made by companies with ties to China and Russia, researchers found, raising anxious questions about the security of voting machines which use overseas suppliers. Several government agencies are now looking into the issue. Alexa Corse writes that a report issued Monday by Interos Inc., an Arlington, Virginia-based supply-chain monitoring company, says that voting-machine vendors could be at risk of using insecure components from overseas suppliers which generally are difficult to vet and monitor.

  • Click Here to Kill

    The idea of an online assassination market was advanced long before it was possible to build one, and long before there was anything resembling the dark web. Susan Choi writes that a threshold had been crossed: advances in encryption and cryptocurrency make this dark vision a reality: Journalists at BBC News Russia confirmed that on 12 March 2019, the first known case of a murder being ordered on the dark web and successfully carried out by hired assassins. The FBI and DHS are worried.

  • Authoritarian Regimes Employ New Twitter Tactics to Quash Dissent

    When protesters use social media to attract attention and unify, people in power may respond with tweeting tactics designed to distract and confuse, according to a new study. Authoritarian regimes appear to be growing more savvy in their use of social media to help suppress mass movements.

  • Facebook's Ad Delivery System Deepens the U.S. Political Divide

    Facebook is wielding significant power over political discourse in the United States, thanks to an ad delivery system that reinforces political polarization among users, according to new research. The study shows for the first time that Facebook delivers political ads to its users based on the content of those ads and the information the media company has on its users—and not necessarily based on the audience intended by the advertiser.

  • Samoa Has Become a Case Study for “Anti-Vax” Success

    In Samoa, Facebook is the main source of information. Michael Gerson writes that it is thus not surprising that anti-vaccination propaganda, much of it generated in the United States, has arrived through social media and discourages Samoan parents from vaccinating their children. “This type of import has helped turn Samoa into a case study of ‘anti-vax’ success — and increased the demand for tiny coffins decorated with flowers and butterflies,” he writes, adding: “Samoa is a reminder of a pre-vaccine past and the dystopian vision of a post-vaccine future.”

  • Telefonica Deutschland Chooses Huawei to Build Its German 5G Network

    Rebuffing U.S. pressure, German mobile provider Telefonica Deutschland announced Wednesday that it has chosen Finland’s Nokia and China’s Huawei to build its 5G network in Germany, the company. Huawei is a global leader in constructing equipment and infrastructure for ultra-high-speed 5G data networks, but the intelligence services of leading Western countries have argue that Huawei is a security threat because of its close ties with the Chinese military and intelligence establishments. 

  • Unlawful Metadata Access Is Easy When We’re Flogging a Dead Law

    After watching this year’s media raids and the prosecution of lawyers and whistleblowers, it’s not hard to see why Australians wonder about excessive police power and dwindling journalistic freedom. But these problems are compounded by another, less known issue: police, and other bodies not even involved in law enforcement, have broad powers to access metadata. Each year, police alone access metadata in excess of 300,000 times.

  • U.K. Intelligence Probing Russian Election Meddling

    Britain’s cybersecurity agency is investigating whether state-sponsored Russian hackers were behind the leaks of British government documents used by opposition politicians to embarrass Boris Johnson’s ruling Conservative Party ahead of Thursday’s general election.

  • The New Kind of Warfare Reshaping Global Politics

    The list is long: Russian internet trolls interfering in the 2016 U.S. election; Russian operatives murdering Putin’s opponents abroad; Chinese spies manipulating Australian politics while the country’s coast guard ships harass Japanese fishing fleets, and much more. Simon Clark writes that these are not random acts of autocratic aggression. Rather, they are examples of a new form of warfare which is becoming a bigger challenge for the United States and its western allies: gray-zone conflict.