-
Cryptography without Using Secret Keys
Most security applications, for instance access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: who will guarantee that the key doesn’t get stolen or hacked? Researchers, using a physical unclonable key (PUK) and the quantum properties of light, researchers present a new type of data security that does away with secret keys.
-
-
How Partisan Hostility Leads People to Believe Falsehoods
Researchers now have a better idea of why people who rely on partisan news outlets are more likely to believe falsehoods about political opponents. And no, it isn’t because these consumers live in media “bubbles” where they aren’t exposed to the truth. Instead, it has to do with how partisan media promote hostility against their rivals.
-
-
U.S. Cyber-Attacked Iran after Iran’s Attack on Saudi Oil: Report
The United States carried out a cyberattack against Iran after Iran attacked Saudi oil facilities in September. Reuters, citing unnamed U.S. officials, reports that the cyberattacks targeted physical hardware which Iran uses to spread propaganda.
-
-
Patching Legacy Software Vulnerabilities Rapidly in Mission-Critical Systems
There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. While the amount of deployed vulnerable software is growing exponentially, the effective means of addressing known vulnerabilities at scale are limited. DARPA seeks to develop targeted software patches to rapidly repair legacy binaries in mission-critical systems, while assuring system functionality is not affected.
-
-
In the Deepfake Era, Counterterrorism Is Harder
For many U.S. intelligence officials, memories of that 9/11 terrorist attacks remain fresh, searing, and personal. Still hanging over the entrance to the CIA’s Counterterrorism Center is a sign that reads, “Today is September 12, 2001.” It’s a daily reminder of the agency’s determination to prevent future attacks—but also of the horrifying costs when intelligence agencies adapt too slowly to emerging threats. For a decade after the Soviet Union’s collapse, the CIA and the FBI were mired in Cold War structures, priorities, processes, and cultures even as the danger of terrorism grew. The shock of 9/11 finally forced a reckoning—one that led to a string of counterterrorism successes, from foiled plots to the operation against Osama bin Laden. But now, nearly two decades later, America’s 17 intelligence agencies need to reinvent themselves once more, this time in response to an unprecedented number of breakthrough technologies that are transforming societies, politics, commerce, and the very nature of international conflict.
-
-
Army Cyber Lobbies for Name Change This Year, as Information Warfare Grows in Importance
Army Cyber Command has been lobbying for a name change to better reflect its growing mission, one in which its cyber professionals are increasingly focused on operating below the threshold of armed conflict every day. Lt. Gen. Stephen Fogarty, Army Cyber commander, says his staff is providing a proposal to change their command’s name to Army Information Warfare Command.
-
-
Interdisciplinary Cyberengineering Team Wins $6M Grant to Combat Cyberattacks
A team of Northern Arizona University researchers won a three-year, $6.3 million grant from the U.S. Air Force to develop nontraditional solutions to the increasing danger of cyberattacks and cyber warfare.
The research will examine the practicality of outsmarting hackers by using new hardware technologies. The researchers say the impact of this work reaches all corners of modern life, helping to protect the computers that control factories, power plants, transportation systems, drones, personal medical devices and more.
-
-
How to Protect Smart Machines from Smart Attacks
Machines’ ability to learn by processing data gleaned from sensors underlies automated vehicles, medical devices and a host of other emerging technologies. But that learning ability leaves systems vulnerable to hackers in unexpected ways, researchers have found.
-
-
New Tech Aims to Help Societies Learn to Spot Fake News
Despite its relatively recent entrance into common parlance, “fake news” punctuated some of the most important elections of recent years, including 2016’s BREXIT referendum and U.S. presidential campaign. Thanks to social media, fake news can now be disseminated at breakneck pace to vast audiences that are often unable or unwilling to separate fact from fiction. Studies suggest that fake news spreads up to six times faster on social media than genuine stories, while false news stories are 70 percent more likely to be shared on Twitter. Preslav Nakov writes that all is not lost, though: “Fortunately, an emerging set of technologies are increasingly capable of identifying fake news for what it actually is, thereby laying the foundations for communities to do the same. The challenge is to ensure that these platforms get to where they are needed most.”
-
-
EU to Take Action against Fake News and Foreign Electoral Interference
Russian government-backed cyber aggression against democratic societies is heightening concerns in the West following a series of high-profile incidents. Russia’s electoral interference seriously threatens European democratic societies by promoting anti-EU, populist, far-right, ethnonationalist, xenophobic, and anti-American extremist forces.
-
-
Disinformation and Terrorism
Most of the discussions that take place around the concept of disinformation–false information spread deliberately to deceive–typically focus on the role of nation-states like Russia and China. But violent non-state actors, including terrorist groups, rely on disinformation as well, and some groups have developed fairly sophisticated disinformation capabilities. The objectives of these non-state actors can vary but are almost always some combination of spreading fear and terror, recruiting new followers to the cause, radicalizing individuals, and confusing and distracting public safety officials in order to sap finite resources.
-
-
A Hacker’s Paradise? 5G and Cybersecurity
The rollout of fifth-generation mobile networks — which offer the potential for downloads speeds of up to 10 times faster than today’s — will change how we communicate, work and stream video. However, the faster speeds are also likely to present an opportunity for hackers to target more devices and launch bigger cyberattacks, experts say. The problem is unlikely to be the security of 5G technology itself. The weak link in 5G’s security is likely to be communication between devices connected to the internet.
-
-
Campaign Finance Enforcement Is an Essential Component of National Security
Russia is at it again, so this week’s campaign finance enforcement action – in which two Russian-born associates of Rudy Giuliani have been indicted and arrested for violating campaign finance laws, including allegedly funneling Russian money into the main pro-Trump political action committee (PAC) — could not have come at a more important time for defending American democracy from foreign interference. The 2016 presidential election was subject to “sweeping and systematic” interference, and the next presidential election is just a year away with the FBI warning that “the Russians are absolutely intent on trying to interfere with our elections.”
-
-
Russia's Disinformation War Is Just Getting Started
The disinformation wars are only just getting started, warns a new report on Russian social media interference released by the Senate Select Committee on Intelligence. Published last week, the report offers the most comprehensive look at the efforts of the Russian propaganda factory known as the Internet Research Agency to divide Americans, undermine public faith in the democratic process, and aggressively support Donald Trump before and after the 2016 election. Paris Martineau writes in Wired that in addition to affirming much of what had been reported about Russian online interference over the past three years—including in Robert Mueller’s sweeping indictment of the IRA in February 2018—the report offers a comprehensive look at the extent of past foreign influence operations and recommendations on how best to prepare for those yet to come. It’s the second volume to come out of the Senate Intel Committee, though this one is “much more detailed in its analysis, meticulously cited, and concerned with influence and impact,” says one expert. “The conclusions in the second volume are notably bolder and unequivocal in supporting academic research and the advisory groups’ findings. It reads like a different report altogether.”
-
-
Racists Are Recruiting. Watch Your White Sons.
Raising teenagers can be terrifying. Squishy little babies become awkward hormonal creatures who question their parents’ authority at every turn. Joanna Schroeder writes that she expected that. “What I didn’t predict was that my sons’ adolescence would include being drawn to the kind of online content that right-wing extremists use to recruit so many young men,” she writes. “Unfortunately, extremists know how to find new recruits in the very place our sons spend so much of their time: online. And too often, they’re more aware than we are of how vulnerable young white men are to radicalization.”
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.