-
Can You Trust AI? Here’s Why You Shouldn’t
Across the internet, devices and services that seem to work for you already secretly work against you. Smart TVs spy on you. Phone apps collect and sell your data. Many apps and websites manipulate you through dark patterns, design elements that deliberately mislead, coerce or deceive website visitors. This is surveillance capitalism, and AI is shaping up to be part of it.
-
-
Proposed U.S. Missile Defense Plan a Source of White House, Congress Disagreement
The $874 billion budget passed by the House on Friday calls for the military to maintain a “credible nuclear capability” to deter adversaries, while developing and deploying layered defense systems that can defeat complex missile threats “in all phases of flight.” The White House argues that this contradicts the balance-of-terror on which the nuclear relations of the great powers was based since the 1960s, and which is embedded in nuclear arms control treaties.
-
-
Events That Never Happened Could Influence the 2024 Presidential Election – a Cybersecurity Researcher Explains Situation Deepfakes
The basic idea and technology of a situation deepfake are the same as with any other deepfake, but with a bolder ambition: to manipulate a real event or invent one from thin air. Situation deepfakes have already been used in recent weeks – the first in a Republican National Committee’s ad against President Joe Biden, the second in an anti-Trump ad by Ron DeSantis’s campaign.
-
-
The Promise—and Pitfalls—of Researching Extremism Online
While online spaces are key enablers for extremist movements, social media research hasn’t provided many answers to fundamental questions. How big of a problem is extremism, in the United States or around the world? Is it getting worse? Are social media platforms responsible, or did the internet simply reveal existing trends? Why do some people become violent?
-
-
A New Way to Look at Data Privacy
Researchers create a privacy technique that protects sensitive data while maintaining a machine-learning model’s performance. The researchers created a new privacy metric, which they call Probably Approximately Correct (PAC) Privacy, and built a framework based on this metric that can automatically determine the minimal amount of noise that needs to be added.
-
-
Americans in Former Confederate States More Likely to Say Violent Protest against Government Is Justified, 160 Years After Gettysburg
Americans living in the Confederate states that violently rebelled against the United States during the Civil War express significantly greater support for the notion that it can be justifiable to violently protest against the government. Residents of what are known as the Border States, the slave states that did not secede from the Union, are also more likely than residents of Union states to say it can be justifiable to violently protest against the government.
-
-
Americans in Former Confederate States More Likely to Say Violent Protest against Government Is Justified, 160 Years After Gettysburg
Americans living in the Confederate states that violently rebelled against the United States during the Civil War express significantly greater support for the notion that it can be justifiable to violently protest against the government. Residents of what are known as the Border States, the slave states that did not secede from the Union, are also more likely than residents of Union states to say it can be justifiable to violently protest against the government.
-
-
How an “AI-tocracy” Emerges
Many scholars, analysts, and other observers have suggested that resistance to innovation is an Achilles’ heel of authoritarian regimes. But in China, the use of AI-driven facial recognition helps the regime repress dissent while enhancing the technology, researchers report.
-
-
Preparing for Great Power Conflict
How has the military experience gained by both the U.S. military and the PLA since 2001 shaped the way both militaries train? What effect do these experiences and training trends have on readiness for major power conflict?
-
-
New Book Unveils Untold Story of U.S. Engagement in Afghanistan Prior to Soviet Invasion
Whether in 1979, 2001, or 2021, Afghanistan has frequently been seen as a crisis area in U.S. foreign policy. Robert Rakove sheds new light on the little-known and often surprising history of U.S. engagement in Afghanistan from the 1920s to the Soviet invasion, tracing its evolution and exploring its lasting consequences.
-
-
Six Things to Watch Following Meta's Threads Launch
Meta’s ‘Twitter killer,’ Threads, launched on July 6 to media fanfare. With another already politically charged U.S. election on the horizon, online hate and harassment at record highs, and a rise in antisemitism and extremist incidents both on- and offline, a new social media product of this scale will present serious challenges.
-
-
Close to 100,000 Voter Registrations Were Challenged in Georgia — Almost All by Just Six Right-Wing Activists
Many states allow challenges to voter registration, but officials in Georgia and experts say that in the past challengers have typically had relevant personal knowledge, such as someone submitting a challenge to remove a dead relative from the rolls. Georgia, however, is unusual: changes to the law after the 2020 election explicitly allow citizens unlimited challenges against anyone in their county. Georgia officials say that they did not know of any instances of challenges resulting in a successfully prosecuted case of voter fraud.
-
-
Chinese Intelligence-Linked Hackers Targeted U.S. Government Agencies in Microsoft Hack
Hackers linked to China’s intelligence agencies, are behind a monthlong campaign that breached some unclassified U.S. email systems, allowing them to access to a small number of accounts at the U.S. State Department and a handful of other organizations.
-
-
Outlaw Alliance: How China and Chinese Mafias Overseas Protect Each Other’s Interests
The rise of Chinese organized crime in Europe highlights its ties to the Chinese state, national security officials say. Recent cases show the suspected role of mobsters in Beijing’s campaign to repress diaspora communities and amass influence.
-
-
Under-Investment in Public Health Leaves U.S. Less Prepared for Current and Future Health Risks
Decades of underfunding have left the nation’s public health system ill-equipped to protect the health of Americans, according to a new report. COVID-19 emergency funding helped cControl the pandemic, but did not address structural weaknesses in the U.S. public health system.
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.
Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public
The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.
Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse
The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.
Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says
“We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”