• State Election Offices Made for an Easy Target for Russian Hackers

    In the months before the 2016 presidential election, one U.S. state received a notification from a federally backed cybersecurity group, warning about suspicious cyber activity directed at its networks. The state IT officials did not share the alert with other state government leaders and as late at January 2018, the same officials reported nothing “irregular, inconsistent, or suspicious” took place before the vote. In fact, GRU, Russia’s military intelligence agency, had scanned one of the state’s “election-related” domains, according to a new Senate report.

  • The Kremlin Weaponized News: RT and Sputnik

    Russian government media outlets RT and Sputnik perform three functions on behalf of the Kremlin, its policies, and its preferences. The first is “damage control” function for the Russian state during incidents such as the poisoning of Sergei and Yulia Skripal in the United Kingdom. The second is to project Russian strength and construct news agendas favorable to the Kremlin and its outlook. The third function is weakening Western democracies by discrediting democratic, free-market, liberal, and pluralist values.

  • 2020 Election Security Can’t Wait Till 2020

    In the wake of last week’s testimony by Special Counsel Robert Mueller and the detailed report released by the Senate Intelligence Committee, the press coverage has emphasized—understandably—the need to harden U.S. defenses against various forms of cyber interference that Russia—and now Iran, too—appear intent on carrying out in the 2020 election. While it’s true that 2020 election security is critical, it’s important to emphasize that protecting our elections can’t wait until 2020 is upon us. That’s because, if our foreign adversaries’ goal is (as the Senate Intelligence Committee report confirmed) to undermine American confidence in our own democracy, the opportunities to do so are already unfolding.

  • U.S. Election Infrastructure: Troubling Bipartisan Conclusions

    The Senate Select Committee on Intelligence (SSCI) released its first of several bipartisan reports about its own investigation into Russia’s 2016 election interference on Thursday. This one focused on Russian efforts against U.S. election infrastructure. The finding that dominated headlines was that Russia targeted election systems in all 50 states in 2016. This meant the Russian effort reached far deeper into the U.S. than previously understood by officials. What also caught people’s attention about the report was how heavily redacted it was. The report, with its worrying conclusions, provokes one overwhelming question: What can be done to stop this from happening again?

  • What the Mueller Investigation Was Always About

    In the partisan warfare that dominated last Wednesday’s hearings, we’ve forgotten the point: Our elections are under threat, and the president doesn’t much care. Robert Mueller was originally charged with investigating Russian efforts to influence the outcome of the 2016 election and that only secondarily was he tasked with figuring out whether the president had obstructed justice by impeding that investigation. The whole point of the Mueller investigation and report is that Russia hacked an election, that it is right now hacking the next election, and that this is a threat to national security and the long-standing American experiment in representative democracy.

  • Russian Twitter Trolls Stoke Anti-immigrant Lies Ahead of Canadian Election

    Russian troll activity on Twitter aimed at influencing public opinion has attracted a lot of attention in the United States and other western democracies. Canadians may feel it’s not an issue here. But a recent examination of Twitter data suggests there are reasons to be concerned as the country heads into a federal election.

  • Russia Targeted Election Infrastructure in All 50 States in 2016: Senate Intel Report

    On Thursday the Senate Intelligence Committee releases the first volume in the Committee’s bipartisan investigation into Russia’s attempts to interfere with the 2016 U.S. elections, dealing with Russia’s attacks on the U.S. election infrastructure. The Committee found that Russia targeted election systems in all 50 states in 2016. In the majority of cases, Russia’s attacks went undetected by the states and federal officials at the time. The report suggested that the Russian efforts in 2016 might have been cataloging options “for use at a later date” — a possibility that officials of the National Security Agency, DHS, and the FBI said was their biggest worry.

  • Russian Government-linked Hacker Group Releases Powerful Adroid Malware

    The St. Petersburg-based Special Technology Center (STC), a Russian technology group linked to the GRU, Russia’s military intelligence branch, was sanctioned by the U.S. government for its role in the 2016 Kremlin-directed cyberattacks on the U.S. election infrastructure. STC is back in the news. This time, for developing n especially powerful and persistent malware, dubbed Monokle.

  • U.S. Intelligence Director Dan Coats Creates Senior Election Security Position

    Director of National Intelligence Daniel Coats announced he established the position of Intelligence Community (IC) Election Threats Executive (ETE). The ETE will serve as the DNI’s principal adviser on threats to elections and matters related to election security. Additionally, the ETE will coordinate and integrate all election security activities, initiatives, and programs across the IC and synchronize intelligence efforts in support of the broader U.S. government.

  • U.S. Efforts to Counter Russian Disinformation and Malign Influence

    “President Vladimir Putin’s Russia seeks to weaken Western governments and transatlantic institutions, discredit democratic and liberal values, and create a post-truth world,” says Alina Polyakova. “Russian disinformation campaigns aim to amplify existing social divisions and further polarize democratic societies. As such, they don’t stop when the ballot box closes. Elections may provide an ideal high-impact opportunity for a disinformation actor, but the barrage of disinformation against Western democracies, including the United States, continues between election cycles. Disinformation, as a tool of Russia’s political warfare, is not new. But what is new is that, today, what used to take years, takes minutes. The advance of digital technology and communication allows for the high-speed spread of disinformation, rapid amplification of misleading content, and massive manipulation via unsecured points of influence. This digital ecosystem creates opportunities for manipulation that have exceeded the ability of democratic nations to respond, and sometimes even to grasp the extent of the challenge.”

  • How the U.S. Can Fight Russian Disinformation for Real

    “Where we ought to be setting the rules of engagement, the tone, and the moral compass in responding to Russia’s information war, the United States has been a tardy, timid, or tertiary player, with much of our public servants’ good work on this issue stymied by domestic politicization. Disinformation is not a political issue; it is a democratic one. Beyond that challenge, the United States has not invested sufficient resources to be competitive in the fight against disinformation. Russian information warfare continues to target the United States and our allies, as well as the rules-based international order. However, countering it has not been a budgetary priority” — Nina Jankowicz.

  • Cyber Threats Go Beyond Hackers and Scams but to Democracy Itself

    Much of the discussion surrounding threats of the information age are focused on digitally enabled foreign influence and interference. However, analysis of adversaries’ information campaigns as seen in the 2016 presidential elections and Brexit referendum doesn’t capture the full extent of the problem that is the manipulation society already created. Tech giants haven’t just inadvertently created a new path for information warfare. Rather they have created the architecture for the persistent manipulation of whole societies – an architecture freely used by both adversaries and the tech corporations themselves. Just as market capitalism led to a market society, surveillance capitalism has led to the manipulation society.

  • FBI Director: China No. 1 Counter-Intelligence Threat to the U.S.

    The FBI has more than 1,000 investigations of U.S. intellectual property theft in all 50 states with nearly all leading back to China, FBI Director Christopher Wray said, calling China the No. 1 counter-intelligence threat to the United States. Wray described the threat as “more deep, more diverse, more vexing, more challenging, more comprehensive and more concerning than any counter-intelligence threat that I can think of.”

  • 40 U.S. Diplomats in Cuba Have Suffered Brain Damage: Medical Report

    Brain imaging of 40 U.S. government personnel who served at the U.S. embassy in Havana in 2016, and who experienced a host of neurological symptoms after possible exposure of an unknown source, revealed significant differences in brain tissue and connectivity when compared to healthy individuals, according to a new report. Images reveal key brain differences, particularly in the cerebellum, between impacted patients and healthy individuals, which may underlie clinical findings previously reported by brain experts.

  • Bolstering Democracy in the Digital Age

    The Knight Foundation announced a commitment of nearly $50 million in research to better understand how technology is transforming our democracy and the way we receive and engage with information. “Amidst a growing debate over technology’s role in our democracy, these investments will help ensure society is equipped to make evidence-based decisions on how to govern and manage the now-digital public square, Knight said.