-
DHS Blocked Circulation of a July Intelligence Bulletin Detailing Russian Disinformation Attacks on Biden
DHS, in early July, blocked publication of a departmental intelligence bulletin which warned intelligence and law enforcement agencies of a broad Russian effort to promote “allegations about the poor mental health” of former Vice President Joe Biden, according to internal emails and a draft of the document obtained by ABC News. Critics of DHS’s decision say that the perplexing decision would fuel fears that U.S. intelligence is being politicized. “By blocking information from being released that describes threats facing the nation,” said John Cohen, the former undersecretary for intelligence at DHS under President Barack Obama, “it undermines the ability of the public and state and local authorities to work with the federal government to counteract the threat.”
-
-
Justice Dept. Never Fully Examined Trump’s Ties to Russia, Ex-Officials Say
As Donald Trump seeks re-election, major questions about his approach to Russia remain unanswered. He has repeatedly shown an unexplained solicitousness toward Russia and deference toward Vladimir Putin, even as Russia, on Putin’s orders, has been systematically trying to subvert American democracy – and the democratic systems of allies of the United States. He has refused to criticize or challenge the Kremlin’s increasing aggressions toward the West, or even raise with Putin the issue of Russia paying bounties to Afghans who kill American soldiers. Michael S. Schmidt writes that one reason we still do not have answers to questions about the scope of Trump’s ties to Russia, and how these ties have influenced his perplexing attitude toward Russia and Putin, is because Rod J. Rosenstein, the former deputy attorney general, maneuvered to keep investigators from completing an inquiry into whether the president’s personal and financial links to Russia posed a national security threat.
-
-
New Technique to Prevent Medical Imaging Cyberthreats
Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Researchers at Ben-Gurion University of the Negev have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors.
-
-
Thwarting Illicit Cryptocurrency Mining with Artificial Intelligence
Cryptocurrencies, such as Bitcoin, are forms of digital money. Instead of minting it like coins or paper bills, cryptocurrency miners digitally dig for the currency by performing computationally intense calculations. A new artificial intelligence algorithm is designed to detect cryptocurrency miners in the act of stealing computing power from research supercomputers.
-
-
Vulnerability of Solar Inverters
Cyber-physical systems security researchers can disrupt the functioning of a power grid using about $50 worth of equipment tucked inside a disposable coffee cup. In a presentation delivered at the recent Usenix Security 2020 conference, the researchers revealed that the spoofing mechanism can generate a 32 percent change in output voltage, a 200 percent increase in low-frequency harmonics power and a 250 percent boost in real power from a solar inverter.
-
-
“We Must Do Better in 2020”: Bipartisan Senate Panel Releases Final Report on Russian 2016 Election Interference
“The Russian government engaged in an aggressive, multi-faceted effort to influence” the “outcome of the 2016 presidential election.” This is the key, bipartisan finding of the fifth and final report of the Senate Intelligence Committee. The committee’s investigation into the massive intervention campaign waged by Russian government agencies and operatives on behalf of then-candidate Donald Trump was thorough, totaling more than three years of investigative activity, more than 200 witness interviews, and more than a million pages of reviewed documents. All five volumes total more than 1300 pages. “We must do better in 2020,” said Senator Marco Rubio (R-Florida) the committee’s chairman. “This cannot happen again,” said Senator Marc Warner (D-Virginia), the committee’s ranking member.
-
-
Hack-and-Leak Operations and U.S. Cyber Policy
The On 27 November 2019, Jeremy Corbyn, then-leader of the U.K. Labour Party, held a press conference in which he held up a hefty, official-looking, heavily redacted document – it was a heavy tome of about 400 pages. the documents Crobyn held in his hand were purported to show the details of discussions between the U.K. and U.S. governments on a post-Brexit trade deal, including demands by U.S. representatives to open access to the United Kingdom’s National Health Service (NHS) for American companies — an inflammatory issue for many voters. James Shires writes that “This is one example of a hack-and-leak operation where malicious actors use cyber tools to gain access to sensitive or secret material and then release it in the public domain.” He argues that “hack-and-leak operations should be seen as the ‘simulation of scandal’: strategic attempts to direct public moral judgement against the operation’s target.”
-
-
Cyberspace Is Critical Infrastructure – It Will Take Effective Government Oversight to Make It Safe
A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a dog.” The New Yorker cartoon doesn’t apply today. Not only do your browser, service provider and apps know you’re a dog, they know what breed you are, what kind of dog food you eat, who your owner is and where your doghouse is. Cyberspace can function as critical infrastructure only when it’s safe for everyone, but legal and regulatory protections in cyberspace have not kept up with the times.
-
-
Official: U.S. Adversaries Taking Sides, Wielding Influence Ahead of Election
Russia, China and Iran are all actively meddling in U.S. presidential politics hoping to persuade American voters to put their preferred candidate in the White House, according to an extraordinary warning from Washington’s top counterintelligence official. As was the case in 2016, Russia is actively working to help Trump. Russia has also recruited Ukrainian “actors” to manufacture dirt on Joe Biden and his son, to be fed into the investigation of the Bidens by Senator Ron Johnson (R-Wisconsin). China and Iran would prefer to see Biden in the White House, but their interference efforts are not at the level of Russia’s broad campaign to help Trump. Trump rejected that part of the intelligence community’s assessment which details Russia’s broad effort on his behalf. “The last person Russia wants to see in office is Donald Trump,” he said. “I don’t care what anybody says.”
-
-
‘Deepfakes’ Ranked as Most Serious AI Crime Threat
Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism. : “As the capabilities of AI-based technologies expand, so too has their potential for criminal exploitation. To adequately prepare for possible AI threats, we need to identify what these threats might be, and how they may impact our lives,” says one expert.
-
-
Consumers Do Not Fully Trust Smart Home Technologies
Researchers investigating the trust consumers have in “smart home” – homes in which smart devices are connected to each other to create an “internet of things” (IoT) — found that consumers were worried about the likelihood of security incidents. Businesses and policymakers will have to work together to gain consumer trust in smart home technologies.
-
-
Russian Government Hackers Stole, Leaked Classified U.K. Trade Documents Ahead of 2019 Election
A treasure trove of classified documents about secret trade negotiations between the United States and the United Kingdom – discussion which aimed to prepare the U.S.-U.K. economic relationship for the post-Brexit era – were stolen by Russian government hackers and leaked to the opposition Labour Party ahead of the December 2019 general election. The Russian government hackers stole the classified papers – 451 pages in all — from an email account of Liam Fox, who was then the U.K. trade secretary.
-
-
New Method to Defend against Smart Home Cyberattacks
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices.
-
-
Pompeo: U.S. Will Take Action on Chinese Software in “Coming Days
Chinese software companies operating in the United States assiduously collect customers’ personal date, browsing habits, facial images, and other information and deliver it to China’s intelligence agencies for possible use by China when it would serve China’s interests to do so. Secretary of State Mike Pompeo said Sunday that the fact the Chinese software companies serve as information collectors for China’s intelligence agencies poses a serious national security threat to the United States, and that the administration, in the coming days, will soon announce a series of measures aiming to restrict the ability of Chinese software companies to operate in this way, and ban some companies from operating in the United States altogether.
-
-
Election Cyber Surge Initiative Launches
On Friday, the University of Chicago’s Cyber Policy Initiative (CPI) announced the launch of the Election Cyber Surge initiative to help address the urgent need to connect state and local election offices with volunteer technologists. The initiative will create a database which will allow officials to search for potential volunteers in their state or city by skillset, subject matter expertise, or cybersecurity experience.
-